Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network

被引:0
|
作者
Ye Ru-jun [1 ]
机构
[1] Zhejiang Business Coll, Hangzhou, Zhejiang, Peoples R China
关键词
fuzzy neutral network; network security; attack and defense decision;
D O I
10.14257/ijsia.2016.10.11.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the safe level of network security, the fuzzy neutral network is applied in optimal attack and defense decision. Firstly, the theory model of attack and defense decision system for network security based on game theory is constructed, the game model of attack and defense model and the dynamical game model of incomplete information are deduced respectively. Secondly, the basic theory of fuzzy neutral network is analyzed, the framework of diagram of fuzzy neutral network is confirmed, and the model of fuzzy membership function is constructed.. Thirdly, the training algorithm of fuzzy neutral network based on improved genetic algorithm is designed, and computing method in every step is given in detail. And the Evaluation of suspicious person and system is carried out. Finally, simulation experiments are carried out, and results show that system profit and response efficiency is improved, then fuzzy neutral network can obtain higher system profit and response efficiency.
引用
收藏
页码:317 / 324
页数:8
相关论文
共 50 条
  • [41] The Innovation of the Instruction Strategy for the Information Security Course Based on the Network Attack and Defense Training
    Jia, Xueming
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 49 - 52
  • [42] Sensor network security defense strategy based on attack graph and improved binary PSO
    Dong, Chaoxian
    Zhao, Lixin
    SAFETY SCIENCE, 2019, 117 : 81 - 87
  • [43] DDoS Attack Detection Using Fuzzy Neural Network
    Slepovichev, I. I.
    Irmatov, P., V
    Komarova, M. S.
    Bezhin, A. A.
    IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2009, 9 (03): : 84 - 89
  • [44] CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
    Chen J.
    Xiong H.
    Ma H.
    Zheng Y.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (04): : 154 - 166
  • [45] Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
    Li, Jie
    Li, Jing
    International Journal of Network Security, 2024, 26 (01) : 68 - 73
  • [46] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971
  • [47] Research on application of neural network in computer network security evaluation
    Jin, Shujuan (jinshujuan@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [48] Research on application of neural network in computer network security evaluation
    Jin, Shujuan
    Open Electrical and Electronic Engineering Journal, 2015, 8 (01): : 766 - 771
  • [49] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [50] Fast and Efficient Decision-based Attack for Deep Neural Network on Edge
    Jain, Himanshu
    Rathore, Sakshi
    Rahoof, Abdul T. P.
    Chaturvedi, Vivek
    Das, Satyajit
    2020 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS), 2020, : 231 - 236