Intelligent Network Security Optimization Algorithm Based on Cnns

被引:0
作者
Zheng, Meirong [1 ]
Jia, Ruchun [2 ]
Zhu, Jing [1 ]
Zhang, Shaorong [3 ]
Yao, Wenlong [4 ]
Li, Yuanbin [5 ]
机构
[1] Fujian Chuanzheng Commun Coll, Coll Informat & Intelligent Transportat, Fuzhou, Fujian, Peoples R China
[2] Sichuan Univ, Coll Comp Sci, Chengdu, Sichuan, Peoples R China
[3] Guilin Univ Aerosp Technol, Sch Elect Informat & Automat, Guilin, Guangxi, Peoples R China
[4] Guangxi Vocat Coll Safety Engn, Sch Informat Secur, Guilin, Guangxi, Peoples R China
[5] Sichuan Technol & Business Coll, Intelligent Mfg & Informat Engn Sch, Chengdu 611830, Peoples R China
关键词
convolutional neural networks; intelligent network; network security; risk assessment; DEEP; SYSTEMS; DESIGN;
D O I
10.1002/cpe.70069
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To enhance the precision of security risk assessment and real-time control in edge-based intelligent networks, this article presents a novel risk assessment and control approach leveraging convolutional neural networks (CNNs). This method significantly improves on traditional intelligent network security risk assessment techniques, integrating CNN-based models to achieve higher accuracy and robustness. By incorporating genetic algorithms and proportional integral derivative control optimization, the proposed approach further ensures stability across intelligent network operations. Using the KDDCup99 network security attack database for evaluation, results demonstrate that this approach achieves a high accuracy rate and low false alarm rate. Additionally, the output signal amplitude closely aligns with the expected amplitude, showing only a 0.02 deviation, while maintaining low evaluation and control times. This ensures comprehensive security across edge intelligent systems, addressing key latency and precision requirements and achieving optimal control effects.
引用
收藏
页数:13
相关论文
共 41 条
  • [1] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [2] Chen HQ, 2024, ACM COMPUT SURV, V56, DOI [10.1145/3606017, 10.1007/978-981-97-5597-4_4]
  • [3] Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
    Chen, Xiao
    Li, Chaoran
    Wang, Derui
    Wen, Sheng
    Zhang, Jun
    Nepal, Surya
    Xiang, Yang
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 987 - 1001
  • [4] Detecting false data attacks using machine learning techniques in smart grid: A survey
    Cui, Lei
    Qu, Youyang
    Gao, Longxiang
    Xie, Gang
    Yu, Shui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 170
  • [5] AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways
    Deng, Zehang
    Guo, Yongjian
    Han, Changzhou
    Ma, Wanlun
    Xiong, Junwu
    Wen, Sheng
    Xiang, Yang
    [J]. ACM COMPUTING SURVEYS, 2025, 57 (07)
  • [6] Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system
    Devi, E. M. Roopa
    Suganthe, R. C.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (04)
  • [7] Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    Tellambura, Chintha
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (12) : 7563 - 7577
  • [8] Detecting Vulnerability on IoT Device Firmware: A Survey
    Feng, Xiaotao
    Zhu, Xiaogang
    Han, Qing-Long
    Zhou, Wei
    Wen, Sheng
    Xiang, Yang
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (01) : 25 - 41
  • [9] Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication
    Gu, Zhiwei
    Nazir, Shah
    Hong, Cheng
    Khan, Sulaiman
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [10] Feature selection-integrated classifier optimisation algorithm for network intrusion detection
    Guney, Huseyin
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)