Analysis the Optimization Methods of Computer Network Security and Protection Strategy Based on Genetic Algorithm

被引:0
|
作者
Yao Yuanyao [1 ]
机构
[1] Jiangxi Inst Econ Adm, Dept Informat Engn, Nanchang, Jiangxi, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 03期
关键词
genetic algorithm; computer network security; protection strategy; optimization;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
With the further enhancement of the degree of social informatization, the function of computer network and the complexity of its structure are constantly improving. In view of this, the optimization of computer network security and protection strategy based on genetic algorithm was simulated and analyzed. Firstly, the bad character and good suffix rules intrusion detection method were applied to detect network security intrusion behavior, computer network packets were analyzed. Genetic algorithms were applied to optimize the design of computer network security and protection strategies. The results show that the weights of nodes directly affect the quality of network security and protection.
引用
收藏
页码:51 / 55
页数:5
相关论文
共 50 条
  • [41] Analysis on Computer Algorithm and Display Methods of Network Diagrams
    He, Jin
    Zhang, Hongchong
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 253 - 258
  • [42] Adaptive Collaborative Optimization Strategy based on Genetic Algorithm
    Liu, Jihong
    Jiang, Hao
    Xie, Qi
    [J]. ADVANCED MATERIALS AND PROCESSES, PTS 1-3, 2011, 311-313 : 32 - 36
  • [43] Management strategy based on genetic algorithm optimization for PHEV
    [J]. Yu, Zhang, 1600, Science and Engineering Research Support Society (07):
  • [44] Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
    Shang, Yanhong
    Zhang, Jing
    [J]. Zhang, Jing (2016120252@jou.edu.cn), 1600, Hindawi Limited (2021):
  • [45] Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns
    Pandey, Hari Mohan
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 13 - 18
  • [46] Neural Network Optimization Algorithm Based on Improvement Genetic Algorithm
    Wang, Ping
    Jiang, HuaLi
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 330 - 333
  • [47] Research on Optimizing Computer Network Structure Based on Genetic Algorithm and Modified Convex Optimization Theory
    Wang, Jinyu
    [J]. INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2015), 2015, : 434 - 438
  • [48] Methods for Strengthening a Computer Network Security
    Purboyo, Tito Waluyo
    Kuspriyanto
    [J]. PROCEEDINGS OF THE 2013 JOINT INTERNATIONAL CONFERENCE ON RURAL INFORMATION & COMMUNICATION TECHNOLOGY AND ELECTRIC-VEHICLE TECHNOLOGY (RICT & ICEV-T), 2013,
  • [49] Computer Network Information Security and Protection Measures
    Meng, Qingbao
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 903 - 905
  • [50] Discussion on the Protection and Problem of Computer Network Security
    Wan, Biao
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347