Simulation Research on Computer Network Attack and Defense Model Based on Particle Swarm Optimization Algorithm

In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation mod...

Full description

Saved in:
Bibliographic Details
Published in2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI) pp. 220 - 225
Main Authors Ma, Wenting, Gao, Xin, Wang, Jianing, Jiang, Nannan, Sun, Lurong
Format Conference Proceeding
LanguageEnglish
Published IEEE 17.10.2023
Subjects
Online AccessGet full text
DOI10.1109/ICDACAI59742.2023.00048

Cover

Abstract In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation model is built by using its main characteristics. Based on PSO (Particle Swarm Optimization) algorithm, this paper studies the simulation of computer network attack and defense model. The research shows that among the three algorithms, the best value of DL (Deep Learning) is 10.73, the best value of AGA (Adaptive Genetic Algorithm) is 14.18, and the best value of this algorithm is 19.53. Similarly, in the comparison of average and worst value, the average and worst value of this algorithm are also due to the other two algorithms. It can be seen that the convergence accuracy and convergence speed of this algorithm are significantly higher than those of DL and AGA. Using the cryptographic mechanism under PSO algorithm, the probability of successful attack is calculated. Using the optimization and improvement of this kind of model to improve the running security of computer network.
AbstractList In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation model is built by using its main characteristics. Based on PSO (Particle Swarm Optimization) algorithm, this paper studies the simulation of computer network attack and defense model. The research shows that among the three algorithms, the best value of DL (Deep Learning) is 10.73, the best value of AGA (Adaptive Genetic Algorithm) is 14.18, and the best value of this algorithm is 19.53. Similarly, in the comparison of average and worst value, the average and worst value of this algorithm are also due to the other two algorithms. It can be seen that the convergence accuracy and convergence speed of this algorithm are significantly higher than those of DL and AGA. Using the cryptographic mechanism under PSO algorithm, the probability of successful attack is calculated. Using the optimization and improvement of this kind of model to improve the running security of computer network.
Author Gao, Xin
Wang, Jianing
Ma, Wenting
Jiang, Nannan
Sun, Lurong
Author_xml – sequence: 1
  givenname: Wenting
  surname: Ma
  fullname: Ma, Wenting
  email: 18845098029@163.com
  organization: Harbin Huade University,Harbin,Heilongjiang,China,150025
– sequence: 2
  givenname: Xin
  surname: Gao
  fullname: Gao, Xin
  email: gaoxin7@yeah.net
  organization: Harbin Huade University,Harbin,Heilongjiang,China,150025
– sequence: 3
  givenname: Jianing
  surname: Wang
  fullname: Wang, Jianing
  email: 43310935@qq.com
  organization: Harbin Huade University,Harbin,Heilongjiang,China,150025
– sequence: 4
  givenname: Nannan
  surname: Jiang
  fullname: Jiang, Nannan
  email: 905511180@qq.com
  organization: Harbin Huade University,Harbin,Heilongjiang,China,150025
– sequence: 5
  givenname: Lurong
  surname: Sun
  fullname: Sun, Lurong
  email: 837802333@qq.com
  organization: Harbin Huade University,Harbin,Heilongjiang,China,150025
BookMark eNotj8tOwzAQRY0ECyj9AyT8Ay3jTF5ehpRHpUIRhXU1ScbUahJXjqsKvp6isrpnc490rsR573oW4lbBVCnQd_NyVpTFPNFZHE0jiHAKAHF-JsY60zkmgKizNLkUbmW7fUvBul6-88Dk6408cum63T6wl68cDs5vZREC1VtJfSNnbLgfWL64hlt5TwM3f5c38sHWLcvVgXwnl7tgO_tzUhftl_M2bLprcWGoHXj8vyPx-fjwUT5PFsuneVksJlYpHSYYV5xWJsq41hwBUB5zpI85htKmMQimxkRrOuYhGh2buKIKkXSVQ5oZjSNxc_JaZl7vvO3If68VYKogVfgLz5FZjg
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICDACAI59742.2023.00048
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350339765
EndPage 225
ExternalDocumentID 10361061
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-34be6bf27ec9e200a84e29597fa6ddf30fc3599a74233f94f4bab33a9b8067f93
IEDL.DBID RIE
IngestDate Wed Jan 10 09:27:54 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-34be6bf27ec9e200a84e29597fa6ddf30fc3599a74233f94f4bab33a9b8067f93
PageCount 6
ParticipantIDs ieee_primary_10361061
PublicationCentury 2000
PublicationDate 2023-Oct.-17
PublicationDateYYYYMMDD 2023-10-17
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-Oct.-17
  day: 17
PublicationDecade 2020
PublicationTitle 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI)
PublicationTitleAbbrev ICDACAI
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8511289
Snippet In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical...
SourceID ieee
SourceType Publisher
StartPage 220
SubjectTerms Adaptation models
Computational modeling
Computer networks
Computers
Network attack and defense model
Particle swarm optimization
Particle swarm optimization algorithm
Personnel
Probability
Reliability
Simulation
Title Simulation Research on Computer Network Attack and Defense Model Based on Particle Swarm Optimization Algorithm
URI https://ieeexplore.ieee.org/document/10361061
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5uTz6pOPFOHnztXJP0kse5OTbBOZiDvY1cTnRsbWW0CP56k14UBcG3UCgNJzn9eprvOx9CN5EKKFGaeDICsAWK4J7koe9JsFlp4UML6fTOj9NwvGAPy2BZi9VLLQwAlOQz6LpheZavM1W4X2U2w2noSpgWakVxWIm1as6W3-O3k8HQzn_iPpGdxIrQshVn_MM3pYSN0QGaNg-s2CKbbpHLrvr41Yvx3zM6RJ1vhR6efWHPEdqD9Bhl83VSu3HhhlGH7bhxbsDTivON-3ku1AaLVOMhGFvIAnaeaFt8ZzFNu1tm9Y7C83exS_CTfbEktWIT97cv2W6dvyYdtBjdPw_GXm2o4K19n-ceZRJCaUgEioNNDxEzINzGy4hQa0N7RtGAc-FOb6nhzDApJKWCy9iCmuH0BLXTLIVThJWMiRYksuUeMGkCoSMpA82CmMc9zcgZ6rhord6qnhmrJlDnf1y_QPtuxRwq-NElaue7Aq4s3OfyulzmT4ylrXQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA46H_RJxYl38-Br59qklzzOTdl0q4NtsLeRy4mOba2MDsFfb9KLoiD4Fgql7UlOv57m-86H0E0ofeJJ5TkiBDAFCmeOYIHrCDBZaeBDcWH1zoM46E7o49SflmL1XAsDADn5DBp2mO_lq1Ru7K8yk-EksCXMNtrxKaV-IdcqWVtuk9322h3zBD37kWxFVh7Jm3FGP5xTcuB42EdxdcmCL7JobDLRkB-_ujH--54OUP1bo4eHX-hziLYgOULpaL4q_bhwxanDZlx5N-C4YH3jVpZxucA8UbgD2pSygK0r2hLfGVRT9pRhuabw6J2vV_jZvFpWpWYTt5Yv6Xqeva7qaPJwP253ndJSwZm7LsscQgUEQnshSAYmQXhEwWMmXpoHSmnS1JL4jHG7f0s0o5oKLgjhTEQG1jQjx6iWpAmcICxF5CnuhabgAyq0z1UohK-oH7Goqah3iuo2WrO3omvGrArU2R_Hr9Fudzzoz_q9-Okc7dnZsxjhhheolq03cGnAPxNX-ZR_As16sME
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+2nd+International+Conference+on+Data+Analytics%2C+Computing+and+Artificial+Intelligence+%28ICDACAI%29&rft.atitle=Simulation+Research+on+Computer+Network+Attack+and+Defense+Model+Based+on+Particle+Swarm+Optimization+Algorithm&rft.au=Ma%2C+Wenting&rft.au=Gao%2C+Xin&rft.au=Wang%2C+Jianing&rft.au=Jiang%2C+Nannan&rft.date=2023-10-17&rft.pub=IEEE&rft.spage=220&rft.epage=225&rft_id=info:doi/10.1109%2FICDACAI59742.2023.00048&rft.externalDocID=10361061