Visible to the public Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms

TitleResearch on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Publication TypeConference Paper
Year of Publication2019
AuthorsWang, Dongqi, Shuai, Xuanyue, Hu, Xueqiong, Zhu, Li
Conference Name2019 International Conference on Communications, Information System and Computer Engineering (CISCE)
Date Publishedjul
KeywordsBackpropagation, BP Neural Network, Collaboration, Communication networks, computer network security, computer network security evaluation method, computer networks, evaluation, Indexes, Levenberg-Marquardt algorithms, LM-BP algorithm, local minimum point, Metrics, neural nets, Neural Network Security, Neural networks, policy-based governance, pubcrawl, Safety, security, Training, training process
AbstractAs we all know, computer network security evaluation is an important link in the field of network security. Traditional computer network security evaluation methods use BP neural network combined with network security standards to train and simulate. However, because BP neural network is easy to fall into local minimum point in the training process, the evalu-ation results are often inaccurate. In this paper, the LM (Levenberg-Marquard) algorithm is used to optimize the BP neural network. The LM-BP algorithm is constructed and applied to the computer network security evaluation. The results show that compared with the traditional evaluation algorithm, the optimized neural network has the advantages of fast running speed and accurate evaluation results.
DOI10.1109/CISCE.2019.00094
Citation Keywang_research_2019