The Application of Neural Network in the Evaluation of the Computer Network Security

被引:0
|
作者
Sui, Zhenyou [1 ]
机构
[1] Inner Mongolia Univ Nationalities, Tongliao 028043, Peoples R China
关键词
Computer network; Safety Evaluation; Neural Network;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Computer network technique, which plays an important role in dealing with file, official document, can also be applied inside the enterprise, outside the network and in the globalized internet. As the computer network provides so much convenience, it also faces many safety loopholes, such as the bug, virus, etc. Therefore, establishing the evaluation system of computer network safety can realize the instantaneity and safety of the evaluation. Neural network which is the most widely used technology in the evaluation of computer network safety is significant for the development of the computer network technology. This text discusses the neural network in the evaluation of computer network safety, analyzes the basic principle of neural network, the importance and application of neural network in the evaluation of the computer network safety. With the constant development of scientific technology, the continuous increase of the socioeconomic level, computer network technology has got new development. With the constant application of computer, more and more factors can threat the safety of the computers and they appear in various forms such as hacker, virus and system bug, etc. These comparably complicated factors are connected. There exist non-linear relations between the evaluation factor of computer network safety and the result. The traditional safety evaluation system is difficult to operate, so the relation between the factor and the safety evaluation cannot be discovered accurately, which makes the accuracy of the evaluation not high. Since the professional safety evaluation system requires a lot of knowledge, then the evaluation result can not be accurate, objective and scientific with no scientificity. The neural network, which is the self-adapted and non-linear dynamic system formed by the connection of different nerve cells, have the effect of calculation, adaptation, identification and controlling. Applying the neural network in the computer network reasonably can improve the scientificity and efficiency of the safety evaluation.
引用
收藏
页码:721 / 724
页数:4
相关论文
共 50 条
  • [31] Application of Swarm Intelligent Algorithm Optimization Neural Network in Network Security
    Xia, Hui
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2016, 71 : 1284 - 1289
  • [32] Convolutional Neural Network for Visual Security Evaluation
    Yang, Ying
    Xiang, Tao
    Liu, Hangcheng
    Liao, Xiaofeng
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (08) : 3293 - 3307
  • [33] Application of Neural Network Technology in Computer Communication
    Hu Hai
    Li Xiao-ling
    [J]. Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 894 - 898
  • [34] Computer network security
    Janson, P
    Rudin, H
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [35] On computer network security
    Ma, Ting-ting
    [J]. Renmin Changjiang/Yangtze River, 2000, 31 (01):
  • [36] Application of Computer Information Encryption Technology in Network Security
    Aimait, Aikebaier Jiang
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 32 - 34
  • [37] NSDF:: a computer network system description framework and its application to network security
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 573 - 600
  • [38] The Application of Computer Information Management Technology in the Network Security
    Zhang, Haicheng
    Zheng, Qun
    Di, Zheng
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT INNOVATION AND BUSINESS INNOVATION (ICMIBI 2016), PT 2, 2016, 58 : 747 - 751
  • [39] The application of data mining technology in computer network security
    Ma Xiao-li
    Zhang Xiao-lei
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1126 - 1129
  • [40] Application of neural network to project evaluation
    School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
    [J]. Dongbei Daxue Xuebao, 2007, 2 (169-171): : 169 - 171