[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3617695.3617720acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

Research on Network Dynamic Security Policy Model Based on Neural Network

Published: 02 November 2023 Publication History

Abstract

As the network is more and more important in people's life, network security has become very important. In the face of a large number of network attacks, we need a network security defense decision support technology, which can quickly and accurately complete the judgment of network defense in a tense environment. Current researchers focus on the improvement and promotion of dynamic defense technology in the field of network security dynamic defense, and fail to consider how to maximize the role of "changing the rules" in the defense system from the overall perspective. Therefore, this paper establishes a dynamic and static fusion of network security defense system, sets the evaluation index, puts forward the construction method of network defense decision-making model, and uses DDoS attack as an example to simulate, show the specific evaluation decision-making process. The simulation results show that the model can accurately assist people to make network defense decisions, and provide a new layer of protection for network security defense.

References

[1]
A. Clark, K. Sun and R. Poovendran, "Effectiveness of IP address randomization in decoy-based moving target defense," 52nd IEEE Conference on Decision and Control, Firenze, Italy, 2013, pp. 678-685.
[2]
M. Dunlop, S. Groat, W. Urbanski, R. Marchany and J. Tront, "MT6D: A Moving Target IPv6 Defense," 2011 - MILCOM 2011 Military Communications Conference, Baltimore, MD, USA, 2011, pp. 1321-1326.
[3]
Xu Xiaoyu. Research on Intelligent Driven Network layer Moving Target Defense Technology [D]. Information Engineering University of Strategic Support Force,2021.
[4]
Jiang, Deyong. (2022). Construction of Computer Network Security Defense System. 10.2991/978-94-6463-046-6_96.
[5]
J. Zhou, "Construction of Computer Network Security Defense System Based On Big Data," 2021 International Conference on Big Data Analysis and Computer Science (BDACS), Kunming, China, 2021, pp. 5-8.
[6]
Eetemadi A, Tagkopoulos I. Genetic Neural Networks: an artificial neural network architecture for capturing gene expression relationships. Bioinformatics. 2019 Jul 1;35(13):2226-2234. 30452523.
[7]
Chen Y. Research on decision optimization of moving target defense based on network attack-defense game Model [D]. Guangxi University,2022
[8]
Tao Yuan, Xia Yong-yong, LIU Zeng-liang, ZHANG Zhi-nan, GUO Chun-xia. Research on simulation model of network defense Effect Using Intelligent Evaluation [J]. Computer Engineering and Application,2009,(19): 78-80
[9]
Sun Qian, XUE Lei-qi, GAO Ling, WANG Hai, WANG Yu-xiang. Network Defense Strategy Selection based on Stochastic Game and Tabu Search [J]. Computer Research and Development,2020, Volume 57 (4): 767-777
[10]
L. Liu, "Discussion and Practice of Computer Network Information and Network Security Protection Strategy," 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), Harbin, China, 2020, pp. 1810-1813.
[11]
W. Qing and C. Hongju, "Computer Network Security and Defense Technology Research," 2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Macau, China, 2016, pp. 155-157.
[12]
S. Sengupta, A. Chowdhary, A. Sabur, A. Alshamrani, D. Huang and S. Kambhampati, "A Survey of Moving Target Defenses for Network Security," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1909-1941, thirdquarter 2020.

Index Terms

  1. Research on Network Dynamic Security Policy Model Based on Neural Network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          BDIOT '23: Proceedings of the 2023 7th International Conference on Big Data and Internet of Things
          August 2023
          232 pages
          ISBN:9798400708015
          DOI:10.1145/3617695
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 02 November 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Analytic Hierarchy Process
          2. Decision-making
          3. Dynamic Defense
          4. Genetic Algorithm
          5. Neural network

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          BDIOT 2023

          Acceptance Rates

          Overall Acceptance Rate 75 of 136 submissions, 55%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 12
            Total Downloads
          • Downloads (Last 12 months)9
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 09 Jan 2025

          Other Metrics

          Citations

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media