Security precautionary technology for enterprise information resource database based on genetic algorithm in age of big data

被引:1
|
作者
Chen, Guiping [1 ]
机构
[1] Guizhou Normal Univ, Sch Int Educ, Guiyang 550001, Guizhou, Peoples R China
关键词
Genetic algorithm; big data; network security; intrusion detection; INTRUSION DETECTION;
D O I
10.3233/JCM-193874
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The security precaution of enterprise information resource database is a problem that enterprises pay close attention to extensively. In this paper, intrusion detection technology was studied, and a hybrid genetic algorithm which combined genetic algorithm with Back Propagation (BP) neural network was developed. The algorithm was tested using KDD CUP 99 data set. The results showed that the convergence effect of the hybrid genetic algorithm was good, the detection rate of the algorithm for different attacks was higher than 80%, and the accuracy rate was over 90%. The detection rate, false alarm rate, accuracy rate and detection time of the hybrid genetic algorithm were 91.36%, 6.72%, 92.24%, and 0.34 s respectively, suggesting a better detection performance. The hybrid genetic algorithm also had an accuracy rate of 98.42% in the practical application in the information resource database of an enterprise in Guizhou, China. The hybrid genetic algorithm developed in this study has a good performance in intrusion detection and has great values for the security protection of enterprise information resource database.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
  • [1] Application of big data technology in enterprise information security management
    Li, Ping
    Zhang, Limin
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [2] Email Information Security of Enterprise based on Big Data
    Wu, Ying
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016), 2016, 56 : 257 - 260
  • [3] Research on Agricultural Enterprise Accounting Information Resource Sharing Model Based on Big Data Technology
    Li R.
    Gao Y.
    Journal of Commercial Biotechnology, 2022, 27 (01) : 53 - 63
  • [4] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [5] Approach to estimation of level of information security at enterprise based on genetic algorithm
    Stepanov, L., V
    Parinov, A., V
    Korotkikh, L. P.
    Koltsov, A. S.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [6] Research on Enterprise Financial Accounting Information Security Model Based on Big Data
    Zhong, Ran
    Zhang, Qianying
    Zhao, Yachao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] Research on the security technology of big data information
    Zhu, Hong
    Xu, Zheng
    Huang, Yingzhen
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 1041 - 1044
  • [8] The Application of Big Data and Artificial Intelligence Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Qi
    Zong, Bangfeng
    Lin, Yong
    Li, Zhuangzhuang
    Luo, Xv
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2023, 35 (01)
  • [9] Research on Computer Network Information Security Based on Big Data Technology
    Xiao, Gengyi
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 325 - 329
  • [10] Toward Big Data Analysis to Improve Enterprise Information Security
    Alouneh, Sahel
    Hababeh, Ismail
    Alajrami, Tamer
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES'18), 2018, : 106 - 109