Network Information Security Monitoring Under Artificial Intelligence Environment

被引:1
|
作者
Fu, Longfei [1 ]
Liu, Yibin [1 ]
Zhang, Yanjun [1 ]
Li, Ming [2 ]
机构
[1] Lanzhou Inst Technol, Lanzhou, Peoples R China
[2] State Grid Anhui Elect Power Co Ltd, Informat & Commun Branch, Xuancheng, Peoples R China
关键词
Bat Algorithm; Network Attack; Network Information Security; Random Forest Algorithm; ANOMALY DETECTION;
D O I
10.4018/IJISP.345038
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection (feature selection and traffic classification) are discussed. The improved bat algorithm (O-BA) and the improved random forest algorithm (O-RF) are proposed for optimization. Moreover, the NIS system is designed based on the Agent concept. Finally, the simulation experiment is carried out on the real data platform. The results showed that the detection precision, accuracy, recall, and F1 score of O-BA are significantly higher than those of references [17], [18], [19], and [20], while the false positive rate is the opposite (P < 0.05). The detection precision, accuracy, recall, and F1 score of O-RF algorithm are significantly higher than those of Apriori, ID3, SVM, NSA, and O-RF algorithm, while the false positive rate is significantly lower than that of Apriori, ID3, SVM, NSA, and O-RF algorithm (P < 0.05).
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Artificial intelligence in information security
    Zadeh, J
    Watson, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT II, 2002, : 199 - 201
  • [2] Artificial Intelligence in the Cyber Security Environment
    Vahakainu, Petri
    Lehto, Martti
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 431 - 440
  • [3] Information under the network environment using computer information security technology
    Sun, Qing Li
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 474 - 477
  • [4] The Detection of Abnormal Behavior by Artificial Intelligence Algorithms Under Network Security
    Cao, Hui
    IEEE ACCESS, 2024, 12 : 118605 - 118617
  • [5] Blockchain and artificial intelligence for network security
    Mattos, Diogo Menezes Ferrazani
    Krief, Francine
    Rueda, Sandra Julieta
    ANNALS OF TELECOMMUNICATIONS, 2020, 75 (3-4) : 101 - 102
  • [6] Blockchain and artificial intelligence for network security
    Diogo Menezes Ferrazani Mattos
    Francine Krief
    Sandra Julieta Rueda
    Annals of Telecommunications, 2020, 75 : 101 - 102
  • [7] Research on Security for Personal Information and Privacy Under Network Environment
    Yu, Yong
    Wang, Qun
    Ke, Zun Ping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 277 - 279
  • [8] Music Morphology Interaction under Artificial Intelligence in Wireless Network Environment
    Zhang, LiLan
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [9] Analysis of the Application of Artificial Intelligence in Electronic Information Security under the Background of Internet
    Xu, Hao
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 410 - 412
  • [10] Medical information security in the era of artificial intelligence
    Wang, Yufeng
    Wang, Liwei
    Xue, Chang-ao
    MEDICAL HYPOTHESES, 2018, 115 : 58 - 60