Security precautionary technology for enterprise information resource database based on genetic algorithm in age of big data

被引:1
|
作者
Chen, Guiping [1 ]
机构
[1] Guizhou Normal Univ, Sch Int Educ, Guiyang 550001, Guizhou, Peoples R China
关键词
Genetic algorithm; big data; network security; intrusion detection; INTRUSION DETECTION;
D O I
10.3233/JCM-193874
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The security precaution of enterprise information resource database is a problem that enterprises pay close attention to extensively. In this paper, intrusion detection technology was studied, and a hybrid genetic algorithm which combined genetic algorithm with Back Propagation (BP) neural network was developed. The algorithm was tested using KDD CUP 99 data set. The results showed that the convergence effect of the hybrid genetic algorithm was good, the detection rate of the algorithm for different attacks was higher than 80%, and the accuracy rate was over 90%. The detection rate, false alarm rate, accuracy rate and detection time of the hybrid genetic algorithm were 91.36%, 6.72%, 92.24%, and 0.34 s respectively, suggesting a better detection performance. The hybrid genetic algorithm also had an accuracy rate of 98.42% in the practical application in the information resource database of an enterprise in Guizhou, China. The hybrid genetic algorithm developed in this study has a good performance in intrusion detection and has great values for the security protection of enterprise information resource database.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
  • [31] Enterprise Supply Chain Optimization Algorithm Based on Big Data
    Li W.
    Li C.
    Zhang D.
    Guo D.
    Computer-Aided Design and Applications, 2024, 21 (S21): : 116 - 133
  • [32] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li, Zhaocui
    Wang, Dan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1841 - 1851
  • [33] DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM
    Li Z.
    Wang D.
    Scalable Computing, 2024, 25 (03): : 1841 - 1851
  • [34] Research on Computer Information Processing Technology in the Age of Big Data
    Wang, Yingli
    Hu, Zhicai
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 326 - 331
  • [35] Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology
    Bao Hongrui
    He Haiguang
    Liu Zhe
    Liu Zhongwei
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 318 - 322
  • [36] Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology
    Zhu Hongqin
    2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 568 - 573
  • [37] Face database security information verification based on recognition technology
    Xue, Shumin
    International Journal of Network Security, 2019, 21 (04): : 601 - 606
  • [38] Application Research of Graphic Design Based on Information Resource-Sharing and Big Data Technology
    Xu, Dan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [39] ANALYSIS OF DATABASE INFORMATION SYSTEM SECURITY RISK ASSESSMENT TECHNOLOGY IN THE ERA OF BIG DATA UNDER THE BACKGROUND OF COGNITIVE IMPAIRMENT
    Liu, Zhangrong
    PSYCHIATRIA DANUBINA, 2022, 34 : S394 - S395
  • [40] Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment
    Wei, Ran
    Yao, Sheng
    MOBILE INFORMATION SYSTEMS, 2021, 2021