Network Information Security Monitoring Under Artificial Intelligence Environment

被引:1
|
作者
Fu, Longfei [1 ]
Liu, Yibin [1 ]
Zhang, Yanjun [1 ]
Li, Ming [2 ]
机构
[1] Lanzhou Inst Technol, Lanzhou, Peoples R China
[2] State Grid Anhui Elect Power Co Ltd, Informat & Commun Branch, Xuancheng, Peoples R China
关键词
Bat Algorithm; Network Attack; Network Information Security; Random Forest Algorithm; ANOMALY DETECTION;
D O I
10.4018/IJISP.345038
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection (feature selection and traffic classification) are discussed. The improved bat algorithm (O-BA) and the improved random forest algorithm (O-RF) are proposed for optimization. Moreover, the NIS system is designed based on the Agent concept. Finally, the simulation experiment is carried out on the real data platform. The results showed that the detection precision, accuracy, recall, and F1 score of O-BA are significantly higher than those of references [17], [18], [19], and [20], while the false positive rate is the opposite (P < 0.05). The detection precision, accuracy, recall, and F1 score of O-RF algorithm are significantly higher than those of Apriori, ID3, SVM, NSA, and O-RF algorithm, while the false positive rate is significantly lower than that of Apriori, ID3, SVM, NSA, and O-RF algorithm (P < 0.05).
引用
收藏
页数:25
相关论文
共 50 条
  • [31] Environment Monitoring Based on Sensor Networks and Artificial Intelligence
    Volosencu, Constantin
    COMMUNICATION AND MANAGEMENT IN TECHNOLOGICAL INNOVATION AND ACADEMIC GLOBALIZATION, 2010, : 26 - 26
  • [32] Reasoning under incomplete information in artificial intelligence
    Sombe, Lea
    Journal of Automated Reasoning, 1992, 9 (03):
  • [33] Development of computer network security management technology based on artificial intelligence under big data
    Xu, Xiuhong
    Liao, Zhongming
    Xu, Zhaosheng
    WIRELESS NETWORKS, 2023,
  • [34] How artificial intelligence will change information and IT security in the nuclear world
    Hewes, Mitchell
    IAEA Bulletin, 2023, 64 (02): : 14 - 15
  • [35] ARTIFICIAL-INTELLIGENCE APPLIED TO INFORMATION-SYSTEM SECURITY
    PRESTON, CM
    INFORMATION AGE, 1989, 11 (04): : 217 - 224
  • [36] The Direction of Information Security Control Analysis Using Artificial Intelligence
    Lee, Sangdo
    Shin, Yongtae
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 872 - 877
  • [37] A Comparative Analysis of Information and Artificial Intelligence Toward National Security
    Al-Suqri, Mohammed Nasser
    Gillani, Maryam
    IEEE ACCESS, 2022, 10 : 64420 - 64434
  • [38] Speech denoising algorithm and artificial intelligence application in network security
    Wang, Lei
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2022, 22 (06) : 2243 - 2255
  • [39] The distributed artificial intelligence technology in network security management system
    Feng, B
    Wang, JZ
    Zhang, JP
    Zhang, BS
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1327 - 1329
  • [40] Research on network security strategy of artificial intelligence equipment in telemedicine
    Li, Huabo
    Li, Jiaying
    Huang, Kangyu
    Hong, Zheng
    Lan, Fei
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2021, 128 : 48 - 48