RETRACTED ARTICLE: The design of network security protection trust management system based on an improved hidden Markov model

被引:0
作者
Shaojun Chen
机构
[1] Xijing University,School of Computer Science
来源
EURASIP Journal on Information Security | / 2023卷
关键词
Hidden Markov model; Network security; Trust management; System design; Alarm data;
D O I
暂无
中图分类号
学科分类号
摘要
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the trust management mechanisms in these studies do not have a predictive function. Therefore, to predict trust levels and protect network security, this paper innovatively proposes a trust management system for network security protection based on the improved hidden Markov model. The research divides the trust level of inter-node interactions by calculating the threat level of inter-node interactions and predicts the trust level of inter-node interactions through an optimized hidden Markov model. In addition, the study designs an estimation of the types of interactive threats between nodes based on alarm data. The research results show that when inactive interaction tuples are not excluded, the average prediction accuracy of the combined model is 95.5%. In response time, the maximum values of the active and passive cluster management pages are 38 ms and 33 ms, respectively, while the minimum values are 16 ms and 14 ms, with an average of 26.2 ms and 24 ms, respectively. The trust management system designed by the research institute has good performance and can provide systematic support for network security protection, which has good practical significance.
引用
收藏
相关论文
共 47 条
[1]  
Chen Z(2022)Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm J Comput Cogn Eng. 1 103-108
[2]  
Islambouli R(2020)International Wireless Communications and Mobile Computing (IWCMC) IEEE. 2020 2216-2221
[3]  
Sweidan Z(2022)Trust management and data protection for online social networks IET Commun 16 1355-1368
[4]  
Mourad A(2020)A two-way trust management system for fog computing Futur Gener Comput Syst. 106 206-220
[5]  
Abou-Rjeily C(2020)Security access solution of cloud services for trusted mobile terminals based on trust zone Int J Netw Secur. 22 201-211
[6]  
Towards trust-aware IoT hashing offloading in mobile edge computing. S(2020)An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model IEEE Trans Industr Inform. 17 2860-2870
[7]  
Thabit Y(2020)Hybrid intrusion detection system using machine learning Netw Secur. 2020 8-19
[8]  
Lianshan Y(2021)Adaptive and survivable trust management for Internet of Things systems IET Inf Secur. 15 375-394
[9]  
Tao AB(2020)A trust management model based on NSGA-II in mobile grid system Int J Knowl-Based Intell Eng Syst. 24 235-242
[10]  
Abdullah E(2020)Distribution network operation control algorithm for distributed data quality management system Int J Performability Eng. 16 766-774