Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network

被引:0
|
作者
Ye Ru-jun [1 ]
机构
[1] Zhejiang Business Coll, Hangzhou, Zhejiang, Peoples R China
关键词
fuzzy neutral network; network security; attack and defense decision;
D O I
10.14257/ijsia.2016.10.11.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the safe level of network security, the fuzzy neutral network is applied in optimal attack and defense decision. Firstly, the theory model of attack and defense decision system for network security based on game theory is constructed, the game model of attack and defense model and the dynamical game model of incomplete information are deduced respectively. Secondly, the basic theory of fuzzy neutral network is analyzed, the framework of diagram of fuzzy neutral network is confirmed, and the model of fuzzy membership function is constructed.. Thirdly, the training algorithm of fuzzy neutral network based on improved genetic algorithm is designed, and computing method in every step is given in detail. And the Evaluation of suspicious person and system is carried out. Finally, simulation experiments are carried out, and results show that system profit and response efficiency is improved, then fuzzy neutral network can obtain higher system profit and response efficiency.
引用
收藏
页码:317 / 324
页数:8
相关论文
共 50 条
  • [31] Neural-network-based hardware trojan attack prediction and security defense mechanism in optical networks-on-chip
    He, Xiangyu
    Guo, Pengxing
    Zhou, Jiahao
    Li, Jingsi
    Zhang, Fan
    Hou, Weigang
    Guo, Lei
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (09) : 881 - 893
  • [32] A optimal design of neural network control based on fuzzy logic
    Zhang, YX
    Jiang, FZ
    PROCEEDINGS OF THE 3RD WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-5, 2000, : 957 - 961
  • [33] OPTIMAL MODEL OF ROCKBURST PREDICTION BASED ON THE FUZZY NEURAL NETWORK
    Li, Kai-Qing
    He, Fu-Lian
    Xie, Sheng-Rong
    Zhang, Shou-Bao
    Han, Hong-Qiang
    He, Yong-Jun
    CONTROLLING SEISMIC HAZARD AND SUSTAINABLE DEVELOPMENT OF DEEP MINES: 7TH INTERNATIONAL SYMPOSIUM ON ROCKBURST AND SEISMICITY IN MINES (RASIM7), VOL 1 AND 2, 2009, : 1161 - 1166
  • [34] Optimal Attack Path Generation Based on Supervised Kohonen Neural Network
    Chen, Yun
    Lv, Kun
    Hu, Changzhen
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 399 - 412
  • [35] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [36] Research on training effectiveness assessment of network attack and defense
    Zheng Yuanyuan
    Wang Tao
    Hou Zhiqi
    Proceedings of the First International Symposium on Test Automation & Instrumentation, Vols 1 - 3, 2006, : 165 - 168
  • [37] Research on Optimization Model of Network Attack Defense Game
    Yang, Sun
    Wei, Xiong
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 426 - 429
  • [38] Network Attack Detection Based on Neural Network LSTM
    Sun, Zichao
    Lyu, Peilin
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 1 - 6
  • [39] Research on Teaching Methods and Contents of Public Security Institutions "Network Attack and Defense Technology" Course
    Xu Guo-tian
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 216 - 219
  • [40] Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
    He, Sui
    Lei, Ding
    Shuang, Wang
    Liu, Chunbo
    Gu, Zhaojun
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 651 - 655