The key technology of computer network vulnerability assessment based on neural network

被引:0
|
作者
Wang, Shaoqiang [1 ]
机构
[1] Changchun Univ, Sch Comp Sci & Technol, Changchun 130022, Jilin, Peoples R China
关键词
Neural network; Network vulnerability; Vulnerability index; Vulnerability database; Parallel algorithm;
D O I
10.1186/s13638-020-01841-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the wide application of computer network, network security has attracted more and more attention. The main reason why all kinds of attacks on the network can pose a great threat to the network security is the vulnerability of the computer network system itself. Introducing neural network technology into computer network vulnerability assessment can give full play to the advantages of neural network in network vulnerability assessment. The purpose of this article is by organizing feature map neural network, and the combination of multilayer feedforward neural network, the training samples using SOM neural network clustering, the result of clustering are added to the original training samples and set a certain weight, based on the weighted iterative update ceaselessly, in order to improve the convergence speed of BP neural network. On the BP neural network, algorithm for LM algorithm was improved, the large matrix inversion in the LM algorithm using the parallel algorithm method is improved for solving system of linear equations, and use of computer network vulnerability assessment as the computer simulation and analysis on the actual example designs a set of computer network vulnerability assessment scheme, finally the vulnerability is lower than 0.75, which is beneficial to research on related theory and application to provide the reference and help.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Research on Computer Network Optimization Model Based on Neural Network Algorithm
    Wang Yanhui
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 197 - 202
  • [33] Vulnerability assessment of navigation station equipment network based on complex network theory
    Han Songchen
    Li Peng
    IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 6940 - 6945
  • [34] Research on computer vision capture technology based on deep convolution neural network algorithm
    Pan B.
    International Journal of Wireless and Mobile Computing, 2023, 24 (3-4) : 312 - 321
  • [35] Information Network Risk Assessment Based on AHP and Neural Network
    Su, Chunmei
    Li, Yonggang
    Mao, Wen
    Hu, Shangcheng
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 227 - 231
  • [36] The application of data fusion technology based on neural network in the dynamic risk assessment
    Cheng, Xiaorong
    Ni, Yangdan
    Wang, Ying
    2010 INTERNATIONAL CONFERENCE ON COMMUNICATION AND VEHICULAR TECHNOLOGY (ICCVT 2010), VOL II, 2010, : 285 - 288
  • [37] BP Neural Network-Based Risk Assessment for Industrialization of Patent Technology
    Lu, Dongdong
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 : 620 - 624
  • [38] The Application of Data Fusion Technology Based on Neural Network in the Dynamic Risk Assessment
    Cheng Xiaorong
    Ni Yang Dan
    Wang Ying
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1696 - 1700
  • [39] Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU
    Cao, Bo
    Li, Chenghai
    Song, Yafei
    Fan, Xiaoshi
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [40] IDSVAF: Neural Network Intrusion Detection System Vulnerability Assessment Framework
    Farrell, Richard
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS, ICABCD 2024, 2024,