首页> 外文会议>2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and ManagementbElectronic resource >Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms
【24h】

Information security technology for computer networks through classification of cyber-attacks using soft computing algorithms

机译:通过使用软计算算法对网络攻击进行分类的计算机网络信息安全技术

获取原文
获取原文并翻译 | 示例

摘要

The Internet is the global platform which revolutionized the computer and communications domain. Although it becomes one of the most useful tools in people's lives, the presence of cyber-attacks that can cause damage, modification, and theft of vital data and information over this platform has increased. Utilization of soft-computing based on the behavior of the network may detect new or modified old attacks. An information security system is developed for the recognition the network infrastructure's behavior. This is limited to Normal, DoS, Probe, U2R, and R2L. The packets on the network are processed in MATLAB and analyze using Fuzzy Logic, Artificial Neural Network, and Fuzzy-Neural Network. Different tests are done with different datasets of varied parameters. The best model for each algorithm, which is rendered from the tests, is used for the information security system. The cyber-attacks were identified within a short period: 51.64us for Fuzzy Logic, 1.34us for Artificial Neural Network, and 14.23us for the Fuzzy Neural Network. The detection rate and accuracy of the three algorithms are 94.84%, 98.51%, 98.60% and 89.74%, 96.09%, 96.19% respectively. The Fuzzy Neural Network has the best performance which used the advantage of Fuzzy Logic and Artificial Neural Network.
机译:互联网是改变计算机和通信领域的全球平台。尽管它已成为人们生活中最有用的工具之一,但通过该平台可导致重要数据和信息遭到破坏,修改和盗窃的网络攻击的数量有所增加。利用基于网络行为的软计算可能会检测到新的或经过修改的旧攻击。开发了一种信息安全系统,用于识别网络基础结构的行为。这仅限于Normal,DoS,Probe,U2R和R2L。网络上的数据包在MATLAB中处理,并使用模糊逻辑,人工神经网络和模糊神经网络进行分析。使用不同参数的不同数据集进行不同的测试。从测试中得出的每种算法的最佳模型用于信息安全系统。可以在短时间内发现网络攻击:模糊逻辑为51.64us,人工神经网络为1.34us,模糊神经网络为14.23us。三种算法的检测率和准确度分别为94.84%,98.51%,98.60%和89.74%,96.09%,96.19%。利用模糊逻辑和人工神经网络的优势,模糊神经网络具有最佳性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号