location:Home > 2020 VOL.3 Feb No.1 > Research on Active Attack Data Location and Early Warning Method for Automatic Defense Network

2020 VOL.3 Feb No.1

  • Title: Research on Active Attack Data Location and Early Warning Method for Automatic Defense Network
  • Name: Vaisakh Ghosh
  • Company: Catholic Universty Of Daegu
  • Abstract:

    The traditional automatic defense network active attack data location early warning method has the disadvantage of poor positioning performance. To this end, a research on the automatic defense network active attack data location early warning method is proposed. The active attack data is detected through the spatial distance of the network node data to determine whether there is active attack data in the network. Based on the detected active attack data, a multi-target binary particle swarm task allocation algorithm is used to obtain the active attack data location task. Based on the optimal allocation scheme, the speed learning machine algorithm is adopted to realize the location and early warning of active attack data. It is obtained through experiments that the convergence value of the proposed automatic defense network active attack data positioning early warning method increases by 23.61% and the positioning error rate decreases by 15% compared with the traditional method. It fully demonstrates that the proposed method for locating early warning data of active defense network active attacks has better positioning performance.

  • Keyword: Automatic Defense; Network; Active Attack Data; Positioning; Early Warning
  • DOI: 10.12250/jpciams2020010116
  • Citation form: Vaisakh Ghosh.Research on Active Attack Data Location and Early Warning Method for Automatic Defense Network[J]. Computer Informatization and Mechanical System, 2020, vol. 3, pp. 127-133.
Reference:

[1]He Yingru. Research on active security defense system of campus network based on honeypot technology [J]. Computer fans, 2016, 12 (4): 21-22.
[2]Zhu Chaojun, Zhao Dandan. A Packet Allocation Protection Method for Network Attack Crime Prevention [J]. Science and Technology Bulletin, 2016, 32 (8): 203-206.
[3]Dong Xiquan, Lin Li, Zhang Xiaojun, et al. Application of Active Defense Technology in Communication Network Security Engineering [J]. Information Security and Technology, 2016, 7 (1): 80-84.
[4]Pujiang, Li Li. Research on network security early warning and defense system based on three-domain model [J]. Information security and technology, 2017, 8 (8): 68-72.
[5]Jiang Shuai, Luo Tianxin. Research on detection method of network small disturbance intrusion source location under non-uniform noise environment [J]. Science and Technology and Engineering, 2017, 17 (5): 247-251.
[6]Pan Weiwei, Tao Hua. Research on Simulation of attack signal location and recognition in wireless communication networks [J]. Computer simulation, 2016, 33 (11): 320-323. [7]He Chun. Design of Computer Network Security Active Defense Model in Big Data Era [J]. Journal of Ningbo Vocational and Technical College, 2016, 20 (4): 97-99.
[8]Zhang Di. Research on the Current Situation and Defense Measures of Network Security Management in Colleges and Universities [J].Electronic Technology and Software Engineering, 2016,56(13): 221-221.
[9]Yu Shuke. Research on Target Intrusion Detection Based on Mobile Wireless Sensor Networks [J]. Digital Communication World, 2017, 59 (12): 6-8.
[10]Qu Chaocheng, Qi Jianhong. Network Security Defense Model of Metal Trading Based on Attack Detection [J]. World Nonferrous Metals, 2016, 23 (7): 77-78.
[11]Huang Ruicheng, HUANGRui-cheng. Simulation Research on Privacy Information Protection of Network Users [J].Computer Simulation, 2017,51(11): 319-322+423.
[12]Diao Zhenjun, Zhang Qi, Cao Zijian. Research on Network Anomaly Detection and Defense System Integrating Snort and Agent [J]. Electronic Design Engineering, 2018, 26 (1): 43-47.

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16