The key technology of computer network vulnerability assessment based on neural network

被引:0
|
作者
Wang, Shaoqiang [1 ]
机构
[1] Changchun Univ, Sch Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
关键词
Neural network; Network vulnerability; Vulnerability index; Vulnerability database; Parallel algorithm;
D O I
10.1186/s13638-020-01841-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the wide application of computer network, network security has attracted more and more attention. The main reason why all kinds of attacks on the network can pose a great threat to the network security is the vulnerability of the computer network system itself. Introducing neural network technology into computer network vulnerability assessment can give full play to the advantages of neural network in network vulnerability assessment. The purpose of this article is by organizing feature map neural network, and the combination of multilayer feedforward neural network, the training samples using SOM neural network clustering, the result of clustering are added to the original training samples and set a certain weight, based on the weighted iterative update ceaselessly, in order to improve the convergence speed of BP neural network. On the BP neural network, algorithm for LM algorithm was improved, the large matrix inversion in the LM algorithm using the parallel algorithm method is improved for solving system of linear equations, and use of computer network vulnerability assessment as the computer simulation and analysis on the actual example designs a set of computer network vulnerability assessment scheme, finally the vulnerability is lower than 0.75, which is beneficial to research on related theory and application to provide the reference and help.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] The key technology of computer network vulnerability assessment based on neural network
    Shaoqiang Wang
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [2] Computer network vulnerability assessment based on Bayesian attribute network
    Wang, Xiu-Juan
    Sun, Bo
    Liao, Yan-Wen
    Xiang, Cong-Bin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (04): : 106 - 112
  • [3] Research on Computer Network Security Technology Based on the BP Neural Network
    He, Xiaochun
    Kan, Ping
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
  • [4] A Computer network intrusion detection technology based on improved neural network algorithm
    Liu R.X.
    Liu, R.X. (run4yp@163.com), 1600, Begell House Inc. (79): : 593 - 601
  • [5] Research on Face Recognition Technology Based on Computer Neural Network
    Tu, Min
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 49 - 52
  • [6] Study on Applying the Neural Network in Computer Network Security Assessment
    Zhou Lianbing
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 639 - 642
  • [7] Design and Implementation of Computer Network Vulnerability Assessment System
    Wang Mian
    Fan Zhiqin
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 167 - 170
  • [8] Design and Implementation of Computer Network Vulnerability Assessment System
    Li, Tianli
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 440 - 445
  • [9] Application of Neural Network Technology in Computer Communication
    Hu Hai
    Li Xiao-ling
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 894 - 898
  • [10] Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory
    Zhu, Xianyou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 359 - 368