Computer Network Security Based on IP Identification and Improved Ant Colony Algorithm
Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer networ...
Saved in:
Published in | 2023 4th International Conference on Smart Electronics and Communication (ICOSEC) pp. 727 - 731 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
20.09.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer network security model based on IP identification and improved ant colony algorithm. The proposed algorithm has the 2 major steps: 1. IP Identification Algorithm. The network tomography-based identification method and the IP network router identification method are combined to form the network tomography-based IP network router is proposed to make the accurate recognition of IP 2. Improved Ant Colony Algorithm for Computer Network Security Modelling. We consider optimizing the heuristic function, for the feature attribute data points that can be added to the current rule for improving the algorithm and model performance. In the experiment section, the comparison tests regarding the Average Detection Rate and Average Error Rate are conducted to show the robustness of the proposed model. |
---|---|
AbstractList | Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer network security model based on IP identification and improved ant colony algorithm. The proposed algorithm has the 2 major steps: 1. IP Identification Algorithm. The network tomography-based identification method and the IP network router identification method are combined to form the network tomography-based IP network router is proposed to make the accurate recognition of IP 2. Improved Ant Colony Algorithm for Computer Network Security Modelling. We consider optimizing the heuristic function, for the feature attribute data points that can be added to the current rule for improving the algorithm and model performance. In the experiment section, the comparison tests regarding the Average Detection Rate and Average Error Rate are conducted to show the robustness of the proposed model. |
Author | Chunfeng, Jiang |
Author_xml | – sequence: 1 givenname: Jiang surname: Chunfeng fullname: Chunfeng, Jiang email: jiangchunfengxian@protonmail.com organization: Modern College of Northwest University,Xi'an,Shaanxi,China,710130 |
BookMark | eNo1j9FKwzAYhSPohc69gRfxAVrzJ02TXtYyXWE4YcPbkaWJBtukZJnSt7egXh04fOeDc4MuffAGoXsgOQCpHtpmu1s1XEIhckooy4FQUQKBC7SsRCUZJ4wQKeU1emvCMJ6TifjFpO8QP_HO6HN0acKP6mQ6HDxuX3HbGZ-cdVolNzfKd7gdxhi-ZqL2CTehD37Cdf8e5u3HcIuurOpPZvmXC7R_Wu2bdbbZPrdNvckcQJUy0KwATUArzpiylZSkFLQUlh-lIpqWih6F7ggthGaSd9TSgnGrAaQRVrEFuvvVOmPMYYxuUHE6_L9lP_0sT5A |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICOSEC58147.2023.10276101 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350300888 |
EndPage | 731 |
ExternalDocumentID | 10276101 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i119t-1c341c01ca533af988067267f5b8a0c26a2b7cd0247c385d2f2435fc118e7fa3 |
IEDL.DBID | RIE |
IngestDate | Wed Jan 10 09:28:05 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-1c341c01ca533af988067267f5b8a0c26a2b7cd0247c385d2f2435fc118e7fa3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10276101 |
PublicationCentury | 2000 |
PublicationDate | 2023-Sept.-20 |
PublicationDateYYYYMMDD | 2023-09-20 |
PublicationDate_xml | – month: 09 year: 2023 text: 2023-Sept.-20 day: 20 |
PublicationDecade | 2020 |
PublicationTitle | 2023 4th International Conference on Smart Electronics and Communication (ICOSEC) |
PublicationTitleAbbrev | ICOSEC |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.84772 |
Snippet | Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 727 |
SubjectTerms | Abnormal Detection Adaptation models Ant Colony Algorithm Complex networks Computational modeling Computer System Error analysis Heuristic algorithms IP Identification Network security Robustness |
Title | Computer Network Security Based on IP Identification and Improved Ant Colony Algorithm |
URI | https://ieeexplore.ieee.org/document/10276101 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEA66B_Gk4opvInhNTdJH2uNadtkVXBd2lb0tSZqqqKlIe9Bf76QPRUHwVkpCSobkm5nONx9C51QqpjlPSKKjkARMGqJ8XxANcCBlbHgkXaB4PY3Gt8HVMly2ZPWaC2OMqYvPjOce63_5WaErlyqDE84h6nZsrXWI3Bqy1gY6a_tmXkzSm_kwDWMWCM-pgnvd-B_KKTVwjLbQtFuyqRd58qpSefrjVzfGf3_TNup_c_Tw7At9dtCasbvorhNpwNOmvBvPW306fAlwleHC4skMN-zcvE3XYWkz3CQXYMTAljiFG9G-48HzfQFzH176aDEaLtIxaZUTyCNjSUmYBnDSlGkJ3pzMEzikkeCRyEMVS6rBAFwJnQE-C-3HYcZzDm5TriHaMCKX_h7q2cKafYQFNUwJqSgzLAiN6z-fgAsDcQzliab-Aeq7PVm9Nr0xVt12HP7x_ghtOtO4igtOj1GvfKvMCcB6qU5rc34CKgmh5g |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA4yQX1SceLdCL62Jukl7eMsG5tudbApextJmqqorUj7oL_ek14UBcG3EhpScki-c07Pdz6EzomQVDEWWqHyPculQlvScbilAA6ECDTzhQkUJ7E_vHWvFt6iIatXXBitdVV8pm3zWP3LT3JVmlQZnHAGUbdha60C8HuspmutobOmc-bFKLqZ9SMvoC63jS643c74oZ1SQcdgE8XtonXFyJNdFtJWH7_6Mf77q7ZQ95ulh6df-LONVnS2g-5amQYc1wXeeNYo1OFLAKwE5xkeTXHNz02bhB0WWYLr9AK80csKHMGdmL3j3vN9DnMfXrpoPujPo6HVaCdYj5SGhUUVwJMiVAnw50QawjH1OfN56slAEAUmYJKrBBCaKyfwEpYycJxSBfGG5qlwdlEnyzO9hzAnmkouJKGaup42HehDcGIgkiEsVMTZR12zJ8vXujvGst2Ogz_GT9H6cD4ZL8ej-PoQbRgzmfoLRo5Qp3gr9TGAfCFPKtN-AtA8pTA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+4th+International+Conference+on+Smart+Electronics+and+Communication+%28ICOSEC%29&rft.atitle=Computer+Network+Security+Based+on+IP+Identification+and+Improved+Ant+Colony+Algorithm&rft.au=Chunfeng%2C+Jiang&rft.date=2023-09-20&rft.pub=IEEE&rft.spage=727&rft.epage=731&rft_id=info:doi/10.1109%2FICOSEC58147.2023.10276101&rft.externalDocID=10276101 |