Mathematical modeling analysis of potential attack detection in topology network based on convolutional neural network

被引:0
|
作者
Li, Jie [1 ]
机构
[1] Yantai Vocat Coll, Elect Audiovisual Teaching & Expt Ctr, Yantai 264670, Shandong, Peoples R China
关键词
Topological network; potential attacks; attack detection; convolutional neural network; feature extraction; risk function;
D O I
10.3233/JCM-226586
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
New network attack platforms such as personal to personal botnets pose a great threat to cyberspace, but there is no corresponding detection method to detect them. In order to improve the security of topological networks, this research designs a mathematical modeling analysis method for potential attack detection based on convolutional neural networks. This method determines the potential attack risk assessment function through the feature extraction of vulnerable areas in network topology and the probability model of potential attacks, and then detects potential attacks by means of convolutional neural network data modeling. The experimental results show that the false detection rate and missed detection rate of the three methods for potential attacks are lower than 9% and 8% respectively, but the false detection rate and missed detection rate of the method given in the study are the lowest, and can always be kept below 5%. At the same time, the detection time of potential attacks of this method is shorter than that of the other two detection methods. The detection of potential attacks provides a technical guarantee for the safe operation of the network.
引用
收藏
页码:1101 / 1113
页数:13
相关论文
共 50 条
  • [31] Network Anomaly Detection With Convolutional Neural Network Based Auto Encoders
    Kiziltas, Behlul
    Gul, Ensar
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [32] Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network
    Yang, Hongyu
    Wang, Fengyan
    IEEE ACCESS, 2019, 7 : 64366 - 64374
  • [33] Exploring Model Poisoning Attack to Convolutional Neural Network Based Brain Tumor Detection Systems
    Lata, Kusum
    Singh, Prashant
    Saini, Sandeep
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [34] End-to-End Convolutional Neural Network-based Voice Presentation Attack Detection
    Muckenhirn, Hannah
    Magimai-Doss, Mathew
    Marcel, Sebastien
    2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), 2017, : 335 - 341
  • [35] An Analysis of Parameters of Convolutional Neural Network for Fire Detection
    Son, Geum-Young
    Marshall
    Park, Jangsik
    Lee, Dong-Hee
    PROCEEDINGS OF THE 2019 2ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION MANAGEMENT (ICSIM 2019) / 2019 2ND INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (ICBDSC 2019), 2019, : 21 - 24
  • [36] Convolutional Neural Network based SMS Spam Detection
    Popovac, Milivoje
    Karanovic, Mirjana
    Sladojevic, Srdjan
    Arsenovic, Marko
    Anderla, Andras
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 807 - 810
  • [37] Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network
    Zhang, Xiang
    Tong, Jonathan
    Vishwamitra, Nishant
    Whittaker, Elizabeth
    Mazer, Joseph P.
    Kowalski, Robin
    Hu, Hongxin
    Luo, Feng
    Macbeth, Jamie
    Dillon, Edward
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 740 - 745
  • [38] An Intrusion Detection System Based on Convolutional Neural Network
    Liu, Pengju
    PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019), 2019, : 62 - 67
  • [39] A Surface Defect Detection Based on Convolutional Neural Network
    Wu, Xiaojun
    Cao, Kai
    Gu, Xiaodong
    COMPUTER VISION SYSTEMS, ICVS 2017, 2017, 10528 : 185 - 194
  • [40] Glaucoma Detection based on Deep Convolutional Neural Network
    Chen, Xiangyu
    Xu, Yanwu
    Wong, Damon Wing Kee
    Wong, Tien Yin
    Liu, Jiang
    2015 37TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2015, : 715 - 718