Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network

被引:0
|
作者
Ye Ru-jun [1 ]
机构
[1] Zhejiang Business Coll, Hangzhou, Zhejiang, Peoples R China
关键词
fuzzy neutral network; network security; attack and defense decision;
D O I
10.14257/ijsia.2016.10.11.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the safe level of network security, the fuzzy neutral network is applied in optimal attack and defense decision. Firstly, the theory model of attack and defense decision system for network security based on game theory is constructed, the game model of attack and defense model and the dynamical game model of incomplete information are deduced respectively. Secondly, the basic theory of fuzzy neutral network is analyzed, the framework of diagram of fuzzy neutral network is confirmed, and the model of fuzzy membership function is constructed.. Thirdly, the training algorithm of fuzzy neutral network based on improved genetic algorithm is designed, and computing method in every step is given in detail. And the Evaluation of suspicious person and system is carried out. Finally, simulation experiments are carried out, and results show that system profit and response efficiency is improved, then fuzzy neutral network can obtain higher system profit and response efficiency.
引用
收藏
页码:317 / 324
页数:8
相关论文
共 50 条
  • [21] Research on the Construction of Network Security Attack and Defense Range System in Power Monitoring System
    Wei Mingxin
    INFORMATION TECHNOLOGY AND INTELLIGENT TRANSPORTATION SYSTEMS (ITITS 2017), 2017, 296 : 82 - 90
  • [22] The research of fuzzy neural network
    Zhang, LY
    Bai, Y
    Zhang, XQ
    Sun, YS
    Wang, HK
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 1107 - 1109
  • [23] The research of Network Attack and Defense Training Based on Enterprise Scenario Teaching
    Du Huan-qiang
    Zhu Zhi-mou
    Xu Fang-heng
    Yuan si-da
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 117 - +
  • [24] Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on
    Zhao, Xiu Mei
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 577 - 581
  • [25] The Application of Invasion Examination Technology Based on Fuzzy Neural Network in Network Security of TDCS
    Wang Ruifeng
    Yue Lili
    ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 1574 - 1577
  • [26] Research on Computer Network Security Anti - attack
    Liang, Liu Zheng
    Min, Lai
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 188 - 191
  • [27] The Research of Codeword Based on Fuzzy Hopfield Neural Network
    Fu, Xian
    Ding, Yi
    INTELLIGENT COMPUTING THEORY, 2014, 8588 : 292 - 298
  • [28] Research on land evaluation based on fuzzy neural network
    Liu, YL
    Molenaar, M
    Jiao, LM
    Liu, YF
    REMOTE SENSING FOR AGRICULTURE, ECOSYSTEMS, AND HYDROLOGY V, 2004, 5232 : 565 - 574
  • [29] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [30] Computer network security and defense technology research
    Wang Qing
    Chen Hongju
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 155 - 157