location:Home > 2021 Vol.4 Mar.No.1 > Method for evaluating security situation of optical communication system based on blockchain technology

2021 Vol.4 Mar.No.1

  • Title: Method for evaluating security situation of optical communication system based on blockchain technology
  • Name: Dawid Polap
  • Company: Faculty of Applied Mathematics, Silesian University of Technology, Kaszubska 23, 44-100 Gliwice, Poland
  • Abstract:

    In order to improve the security of blockchain optical communication system, it is necessary to evaluate the security situation of blockchain optical communication system. A security situation evaluation method of blockchain optical communication system based on balanced allocation of spatial channels is proposed. The big data analysis model of security situation of optical communication system in blockchain networking is constructed, and the statistical analysis and channel equilibrium model of security situation evaluation of optical communication system are established by multi-frequency adaptive feature fusion method. The security situation information detection and sample space fusion processing of optical communication system in blockchain networking are carried out by combining intrusion feature detection method, and the quantitative evaluation of security situation of optical communication system is realized by adopting blockchain fusion technology. The simulation results show that the security situation assessment of optical communication system with this method has higher accuracy and better intrusion detection performance, which improves the security and anti-attack ability of optical communication system.

     

  • Keyword: blockchain technology; Optical communication system; Security situation; Evaluation; Channel equalization
  • DOI: 10.12250/jpciams2021090114
  • Citation form: Dawid Polap.Method for evaluating security situation of optical communication system based on blockchain technology[J]. Computer Informatization and Mechanical System,2021,Vol.4,pp.17-22
Reference:

  1. WANG Junhong, YAN Jiarong. Classification algorithm based on undersampling and cost-sensitiveness for unbalanced data[J]. Journal of Computer Applications, 2021, 41(1): 48-52.

  2. LI Yanxia, CHAI Yi, HU Youqiang, et al. Review of imbalanced data classification methods[J]. Control and Decision, 2019, 34(4):673-688.

  3. WU Yuanyuan, SHEN Liyong. Imbalanced fuzzy multiclass support vector machine algorithm based on class-overlap degree undersampling[J]. Journal of University of Chinese Academy of Sciences, 2018, 35(4):536-543.

  4. Zhang Liancheng, Wei Qiang, Tang Xiucun, et al. Path and Port Address Hopping Based SDN Proactive Defense Technology[J].
    Journal of Computer Research and Development,2017,54(12):2761-2771. 

  5. LI Longjie, YU Yang, BAI Shenshen, et al. Intrusion Detection Model Based on Double Training Technique[J]. Transactions of Beijing Institute of Technology,2017,37(12):1246-1252.

  6. LI Xin, DUAN Yongcheng. Network Security Situation Assessment Method Based on Improved Hidden Markov Model[J]. Computer Science, 2020, 47(7): 287-291.

  7. NIE Xichan, ZHANG Yang, YU Dunhui, et al. Spatial crowdsourcing task allocation algorithm for global optimization[J]. Journal of Computer Applications, 2020, 40(7): 1950-1958.

  8. SONG TianShu, TONG YongXin, WANG LiBin, et al. Online Task Assignment for Three Types of Objects under Spatial Crowdsourcing Environment[J]. Journal of Software,2017,28(3):611-630.

  9. CHENG Lei, GAO Maoting. Hybrid Recommendation Algorithm Based on Time Weighted and LDA Clustering[J]. Computer Engineering and Applications, 2019, 55(11):160-166.

  10. AL-SAFFAR A A M,TAO H,TALAB M A. Review of deep convolution neural network in image classification[C]//Proceedings of the 2017 International Conference on Radar,Antenna,Microwave,Electronics,and Telecommunications. Piscataway:IEEE, 2017:26-31.

  11. XU Xiaoyan. Design of network security situation assessment platform based on the improved game model[J]. Modern Electronics Technique, 2016, 39(12):87-90.

  12. QIN Jing, AN Wen, JI Changqing, et al. Review of privacy protection mechanisms in wireless body area network[J]. Journal of Computer Applications, 2021, 41(4): 970-975.

  13. SONG Yong, CAI Zhiping. Normalized Method of Intrusion Detection Data Based on Information Theory in Big Data Environment[J].Journal of Wuhan University(Natural Science Edition),2018,64(02):121-126.

 

 

 

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16