Biblio
Filters: Author is CUI, A-jun [Clear All Filters]
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm. 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA). :309—316.
.
2019. In order to better ensure the operation safety of the network, the real-time early warning of network security threats is studied based on the improved ant colony algorithm. Firstly, the network security threat perception algorithm is optimized based on the principle of neural network, and the network security threat detection process is standardized according to the optimized algorithm. Finally, the real-time early warning of network security threats is realized. Finally, the experiment proves that the network security threat real-time warning based on the improved ant colony algorithm has better security and stability than the traditional warning methods, and fully meets the research requirements.
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game. 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA). :289—294.
.
2019. Aiming at the shortcomings of the traditional network active security threat model that cannot continuously control the threat process, a network active security threat model based on offensive and defensive differential game is constructed. The attack and defense differential game theory is used to define the parameters of the network active security threat model, on this basis, the network security target is determined, the network active security threat is identified by the attack defense differential equation, and finally the network active security threat is quantitatively evaluated, thus construction of network active security threat model based on offensive and defensive differential game is completed. The experimental results show that compared with the traditional network active security threat model, the proposed model is more feasible in the attack and defense control of the network active security threat process, and can achieve the ideal application effect.