Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network

被引:0
|
作者
Ye Ru-jun [1 ]
机构
[1] Zhejiang Business Coll, Hangzhou, Zhejiang, Peoples R China
关键词
fuzzy neutral network; network security; attack and defense decision;
D O I
10.14257/ijsia.2016.10.11.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the safe level of network security, the fuzzy neutral network is applied in optimal attack and defense decision. Firstly, the theory model of attack and defense decision system for network security based on game theory is constructed, the game model of attack and defense model and the dynamical game model of incomplete information are deduced respectively. Secondly, the basic theory of fuzzy neutral network is analyzed, the framework of diagram of fuzzy neutral network is confirmed, and the model of fuzzy membership function is constructed.. Thirdly, the training algorithm of fuzzy neutral network based on improved genetic algorithm is designed, and computing method in every step is given in detail. And the Evaluation of suspicious person and system is carried out. Finally, simulation experiments are carried out, and results show that system profit and response efficiency is improved, then fuzzy neutral network can obtain higher system profit and response efficiency.
引用
收藏
页码:317 / 324
页数:8
相关论文
共 50 条
  • [41] Sensor network security defense strategy based on attack graph and improved binary PSO
    Dong, Chaoxian
    Zhao, Lixin
    SAFETY SCIENCE, 2019, 117 : 81 - 87
  • [42] The Innovation of the Instruction Strategy for the Information Security Course Based on the Network Attack and Defense Training
    Jia, Xueming
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 49 - 52
  • [43] DDoS Attack Detection Using Fuzzy Neural Network
    Slepovichev, I. I.
    Irmatov, P., V
    Komarova, M. S.
    Bezhin, A. A.
    IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2009, 9 (03): : 84 - 89
  • [44] CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
    Chen J.
    Xiong H.
    Ma H.
    Zheng Y.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (04): : 154 - 166
  • [45] Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
    Li, Jie
    Li, Jing
    International Journal of Network Security, 2024, 26 (01) : 68 - 73
  • [46] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971
  • [47] Research on application of neural network in computer network security evaluation
    Jin, Shujuan (jinshujuan@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [48] Research on application of neural network in computer network security evaluation
    Jin, Shujuan
    Open Electrical and Electronic Engineering Journal, 2015, 8 (01): : 766 - 771
  • [49] Research of fuzzy neural network controller based on rough set
    Wang, Jin-Song
    Zhang, Ren-Zhong
    Zhang, Yu
    Dianji yu Kongzhi Xuebao/Electric Machines and Control, 2008, 12 (04): : 473 - 477
  • [50] Method research of noise diagnosis based on fuzzy neural network
    Taiyuan Univ of Technology, Taiyuan, China
    Int Conf Signal Process Proc, (1370-1373):