Simulation Research on Computer Network Attack and Defense Model Based on Particle Swarm Optimization Algorithm
In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation mod...
Saved in:
| Published in | 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI) pp. 220 - 225 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
17.10.2023
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ICDACAI59742.2023.00048 |
Cover
| Abstract | In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation model is built by using its main characteristics. Based on PSO (Particle Swarm Optimization) algorithm, this paper studies the simulation of computer network attack and defense model. The research shows that among the three algorithms, the best value of DL (Deep Learning) is 10.73, the best value of AGA (Adaptive Genetic Algorithm) is 14.18, and the best value of this algorithm is 19.53. Similarly, in the comparison of average and worst value, the average and worst value of this algorithm are also due to the other two algorithms. It can be seen that the convergence accuracy and convergence speed of this algorithm are significantly higher than those of DL and AGA. Using the cryptographic mechanism under PSO algorithm, the probability of successful attack is calculated. Using the optimization and improvement of this kind of model to improve the running security of computer network. |
|---|---|
| AbstractList | In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical attack scheme in the computer network. In the process of exploring the computer network attack scheme, the appropriate virus propagation model is built by using its main characteristics. Based on PSO (Particle Swarm Optimization) algorithm, this paper studies the simulation of computer network attack and defense model. The research shows that among the three algorithms, the best value of DL (Deep Learning) is 10.73, the best value of AGA (Adaptive Genetic Algorithm) is 14.18, and the best value of this algorithm is 19.53. Similarly, in the comparison of average and worst value, the average and worst value of this algorithm are also due to the other two algorithms. It can be seen that the convergence accuracy and convergence speed of this algorithm are significantly higher than those of DL and AGA. Using the cryptographic mechanism under PSO algorithm, the probability of successful attack is calculated. Using the optimization and improvement of this kind of model to improve the running security of computer network. |
| Author | Gao, Xin Wang, Jianing Ma, Wenting Jiang, Nannan Sun, Lurong |
| Author_xml | – sequence: 1 givenname: Wenting surname: Ma fullname: Ma, Wenting email: 18845098029@163.com organization: Harbin Huade University,Harbin,Heilongjiang,China,150025 – sequence: 2 givenname: Xin surname: Gao fullname: Gao, Xin email: gaoxin7@yeah.net organization: Harbin Huade University,Harbin,Heilongjiang,China,150025 – sequence: 3 givenname: Jianing surname: Wang fullname: Wang, Jianing email: 43310935@qq.com organization: Harbin Huade University,Harbin,Heilongjiang,China,150025 – sequence: 4 givenname: Nannan surname: Jiang fullname: Jiang, Nannan email: 905511180@qq.com organization: Harbin Huade University,Harbin,Heilongjiang,China,150025 – sequence: 5 givenname: Lurong surname: Sun fullname: Sun, Lurong email: 837802333@qq.com organization: Harbin Huade University,Harbin,Heilongjiang,China,150025 |
| BookMark | eNotj8tOwzAQRY0ECyj9AyT8Ay3jTF5ehpRHpUIRhXU1ScbUahJXjqsKvp6isrpnc490rsR573oW4lbBVCnQd_NyVpTFPNFZHE0jiHAKAHF-JsY60zkmgKizNLkUbmW7fUvBul6-88Dk6408cum63T6wl68cDs5vZREC1VtJfSNnbLgfWL64hlt5TwM3f5c38sHWLcvVgXwnl7tgO_tzUhftl_M2bLprcWGoHXj8vyPx-fjwUT5PFsuneVksJlYpHSYYV5xWJsq41hwBUB5zpI85htKmMQimxkRrOuYhGh2buKIKkXSVQ5oZjSNxc_JaZl7vvO3If68VYKogVfgLz5FZjg |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICDACAI59742.2023.00048 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350339765 |
| EndPage | 225 |
| ExternalDocumentID | 10361061 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-34be6bf27ec9e200a84e29597fa6ddf30fc3599a74233f94f4bab33a9b8067f93 |
| IEDL.DBID | RIE |
| IngestDate | Wed Jan 10 09:27:54 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-34be6bf27ec9e200a84e29597fa6ddf30fc3599a74233f94f4bab33a9b8067f93 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_10361061 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-Oct.-17 |
| PublicationDateYYYYMMDD | 2023-10-17 |
| PublicationDate_xml | – month: 10 year: 2023 text: 2023-Oct.-17 day: 17 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI) |
| PublicationTitleAbbrev | ICDACAI |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8511289 |
| Snippet | In the current computer network, relevant personnel can accurately find that there is a worm attack in the network system, and this kind of attack is a typical... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 220 |
| SubjectTerms | Adaptation models Computational modeling Computer networks Computers Network attack and defense model Particle swarm optimization Particle swarm optimization algorithm Personnel Probability Reliability Simulation |
| Title | Simulation Research on Computer Network Attack and Defense Model Based on Particle Swarm Optimization Algorithm |
| URI | https://ieeexplore.ieee.org/document/10361061 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5uTz6pOPFOHnztXJP0kse5OTbBOZiDvY1cTnRsbWW0CP56k14UBcG3UCgNJzn9eprvOx9CN5EKKFGaeDICsAWK4J7koe9JsFlp4UML6fTOj9NwvGAPy2BZi9VLLQwAlOQz6LpheZavM1W4X2U2w2noSpgWakVxWIm1as6W3-O3k8HQzn_iPpGdxIrQshVn_MM3pYSN0QGaNg-s2CKbbpHLrvr41Yvx3zM6RJ1vhR6efWHPEdqD9Bhl83VSu3HhhlGH7bhxbsDTivON-3ku1AaLVOMhGFvIAnaeaFt8ZzFNu1tm9Y7C83exS_CTfbEktWIT97cv2W6dvyYdtBjdPw_GXm2o4K19n-ceZRJCaUgEioNNDxEzINzGy4hQa0N7RtGAc-FOb6nhzDApJKWCy9iCmuH0BLXTLIVThJWMiRYksuUeMGkCoSMpA82CmMc9zcgZ6rhord6qnhmrJlDnf1y_QPtuxRwq-NElaue7Aq4s3OfyulzmT4ylrXQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA46H_RJxYl38-Br59qklzzOTdl0q4NtsLeRy4mOba2MDsFfb9KLoiD4Fgql7UlOv57m-86H0E0ofeJJ5TkiBDAFCmeOYIHrCDBZaeBDcWH1zoM46E7o49SflmL1XAsDADn5DBp2mO_lq1Ru7K8yk-EksCXMNtrxKaV-IdcqWVtuk9322h3zBD37kWxFVh7Jm3FGP5xTcuB42EdxdcmCL7JobDLRkB-_ujH--54OUP1bo4eHX-hziLYgOULpaL4q_bhwxanDZlx5N-C4YH3jVpZxucA8UbgD2pSygK0r2hLfGVRT9pRhuabw6J2vV_jZvFpWpWYTt5Yv6Xqeva7qaPJwP253ndJSwZm7LsscQgUEQnshSAYmQXhEwWMmXpoHSmnS1JL4jHG7f0s0o5oKLgjhTEQG1jQjx6iWpAmcICxF5CnuhabgAyq0z1UohK-oH7Goqah3iuo2WrO3omvGrArU2R_Hr9Fudzzoz_q9-Okc7dnZsxjhhheolq03cGnAPxNX-ZR_As16sME |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+2nd+International+Conference+on+Data+Analytics%2C+Computing+and+Artificial+Intelligence+%28ICDACAI%29&rft.atitle=Simulation+Research+on+Computer+Network+Attack+and+Defense+Model+Based+on+Particle+Swarm+Optimization+Algorithm&rft.au=Ma%2C+Wenting&rft.au=Gao%2C+Xin&rft.au=Wang%2C+Jianing&rft.au=Jiang%2C+Nannan&rft.date=2023-10-17&rft.pub=IEEE&rft.spage=220&rft.epage=225&rft_id=info:doi/10.1109%2FICDACAI59742.2023.00048&rft.externalDocID=10361061 |