Computer Network Security Based on IP Identification and Improved Ant Colony Algorithm

Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer networ...

Full description

Saved in:
Bibliographic Details
Published in2023 4th International Conference on Smart Electronics and Communication (ICOSEC) pp. 727 - 731
Main Author Chunfeng, Jiang
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer network security model based on IP identification and improved ant colony algorithm. The proposed algorithm has the 2 major steps: 1. IP Identification Algorithm. The network tomography-based identification method and the IP network router identification method are combined to form the network tomography-based IP network router is proposed to make the accurate recognition of IP 2. Improved Ant Colony Algorithm for Computer Network Security Modelling. We consider optimizing the heuristic function, for the feature attribute data points that can be added to the current rule for improving the algorithm and model performance. In the experiment section, the comparison tests regarding the Average Detection Rate and Average Error Rate are conducted to show the robustness of the proposed model.
AbstractList Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly complex network environment, a lot of work has to be done in the generation of attack graphs. Based on this, the paper proposes the computer network security model based on IP identification and improved ant colony algorithm. The proposed algorithm has the 2 major steps: 1. IP Identification Algorithm. The network tomography-based identification method and the IP network router identification method are combined to form the network tomography-based IP network router is proposed to make the accurate recognition of IP 2. Improved Ant Colony Algorithm for Computer Network Security Modelling. We consider optimizing the heuristic function, for the feature attribute data points that can be added to the current rule for improving the algorithm and model performance. In the experiment section, the comparison tests regarding the Average Detection Rate and Average Error Rate are conducted to show the robustness of the proposed model.
Author Chunfeng, Jiang
Author_xml – sequence: 1
  givenname: Jiang
  surname: Chunfeng
  fullname: Chunfeng, Jiang
  email: jiangchunfengxian@protonmail.com
  organization: Modern College of Northwest University,Xi'an,Shaanxi,China,710130
BookMark eNo1j9FKwzAYhSPohc69gRfxAVrzJ02TXtYyXWE4YcPbkaWJBtukZJnSt7egXh04fOeDc4MuffAGoXsgOQCpHtpmu1s1XEIhckooy4FQUQKBC7SsRCUZJ4wQKeU1emvCMJ6TifjFpO8QP_HO6HN0acKP6mQ6HDxuX3HbGZ-cdVolNzfKd7gdxhi-ZqL2CTehD37Cdf8e5u3HcIuurOpPZvmXC7R_Wu2bdbbZPrdNvckcQJUy0KwATUArzpiylZSkFLQUlh-lIpqWih6F7ggthGaSd9TSgnGrAaQRVrEFuvvVOmPMYYxuUHE6_L9lP_0sT5A
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICOSEC58147.2023.10276101
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350300888
EndPage 731
ExternalDocumentID 10276101
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-1c341c01ca533af988067267f5b8a0c26a2b7cd0247c385d2f2435fc118e7fa3
IEDL.DBID RIE
IngestDate Wed Jan 10 09:28:05 EST 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-1c341c01ca533af988067267f5b8a0c26a2b7cd0247c385d2f2435fc118e7fa3
PageCount 5
ParticipantIDs ieee_primary_10276101
PublicationCentury 2000
PublicationDate 2023-Sept.-20
PublicationDateYYYYMMDD 2023-09-20
PublicationDate_xml – month: 09
  year: 2023
  text: 2023-Sept.-20
  day: 20
PublicationDecade 2020
PublicationTitle 2023 4th International Conference on Smart Electronics and Communication (ICOSEC)
PublicationTitleAbbrev ICOSEC
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.84772
Snippet Network security analysis is the first step in network security management. In order to adapt to the increasing size of the network and the increasingly...
SourceID ieee
SourceType Publisher
StartPage 727
SubjectTerms Abnormal Detection
Adaptation models
Ant Colony Algorithm
Complex networks
Computational modeling
Computer System
Error analysis
Heuristic algorithms
IP Identification
Network security
Robustness
Title Computer Network Security Based on IP Identification and Improved Ant Colony Algorithm
URI https://ieeexplore.ieee.org/document/10276101
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEA66B_Gk4opvInhNTdJH2uNadtkVXBd2lb0tSZqqqKlIe9Bf76QPRUHwVkpCSobkm5nONx9C51QqpjlPSKKjkARMGqJ8XxANcCBlbHgkXaB4PY3Gt8HVMly2ZPWaC2OMqYvPjOce63_5WaErlyqDE84h6nZsrXWI3Bqy1gY6a_tmXkzSm_kwDWMWCM-pgnvd-B_KKTVwjLbQtFuyqRd58qpSefrjVzfGf3_TNup_c_Tw7At9dtCasbvorhNpwNOmvBvPW306fAlwleHC4skMN-zcvE3XYWkz3CQXYMTAljiFG9G-48HzfQFzH176aDEaLtIxaZUTyCNjSUmYBnDSlGkJ3pzMEzikkeCRyEMVS6rBAFwJnQE-C-3HYcZzDm5TriHaMCKX_h7q2cKafYQFNUwJqSgzLAiN6z-fgAsDcQzliab-Aeq7PVm9Nr0xVt12HP7x_ghtOtO4igtOj1GvfKvMCcB6qU5rc34CKgmh5g
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA4yQX1SceLdCL62Jukl7eMsG5tudbApextJmqqorUj7oL_ek14UBcG3EhpScki-c07Pdz6EzomQVDEWWqHyPculQlvScbilAA6ECDTzhQkUJ7E_vHWvFt6iIatXXBitdVV8pm3zWP3LT3JVmlQZnHAGUbdha60C8HuspmutobOmc-bFKLqZ9SMvoC63jS643c74oZ1SQcdgE8XtonXFyJNdFtJWH7_6Mf77q7ZQ95ulh6df-LONVnS2g-5amQYc1wXeeNYo1OFLAKwE5xkeTXHNz02bhB0WWYLr9AK80csKHMGdmL3j3vN9DnMfXrpoPujPo6HVaCdYj5SGhUUVwJMiVAnw50QawjH1OfN56slAEAUmYJKrBBCaKyfwEpYycJxSBfGG5qlwdlEnyzO9hzAnmkouJKGaup42HehDcGIgkiEsVMTZR12zJ8vXujvGst2Ogz_GT9H6cD4ZL8ej-PoQbRgzmfoLRo5Qp3gr9TGAfCFPKtN-AtA8pTA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+4th+International+Conference+on+Smart+Electronics+and+Communication+%28ICOSEC%29&rft.atitle=Computer+Network+Security+Based+on+IP+Identification+and+Improved+Ant+Colony+Algorithm&rft.au=Chunfeng%2C+Jiang&rft.date=2023-09-20&rft.pub=IEEE&rft.spage=727&rft.epage=731&rft_id=info:doi/10.1109%2FICOSEC58147.2023.10276101&rft.externalDocID=10276101