Artificial Intelligence-Based Network Security System

This article proposes a network security system based on artificial intelligence and its protection method. The system achieves comprehensive monitoring and intelligent analysis of software behavior through the collaborative work of multiple modules, thereby improving the effectiveness and response...

Full description

Saved in:
Bibliographic Details
Published in2024 4th Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS) pp. 713 - 719
Main Authors Chen, Xiulan, Huang, Ning
Format Conference Proceeding
LanguageEnglish
Published IEEE 24.02.2024
Subjects
Online AccessGet full text
DOI10.1109/ACCTCS61748.2024.00132

Cover

Abstract This article proposes a network security system based on artificial intelligence and its protection method. The system achieves comprehensive monitoring and intelligent analysis of software behavior through the collaborative work of multiple modules, thereby improving the effectiveness and response speed of network security protection. Through software detection, behavior analysis, behavior monitoring, data storage, and other modules, comprehensive and intelligent software behavior monitoring and analysis are achieved, abnormal behaviors are accurately detected and timely processed, and the effectiveness of protection is improved.
AbstractList This article proposes a network security system based on artificial intelligence and its protection method. The system achieves comprehensive monitoring and intelligent analysis of software behavior through the collaborative work of multiple modules, thereby improving the effectiveness and response speed of network security protection. Through software detection, behavior analysis, behavior monitoring, data storage, and other modules, comprehensive and intelligent software behavior monitoring and analysis are achieved, abnormal behaviors are accurately detected and timely processed, and the effectiveness of protection is improved.
Author Huang, Ning
Chen, Xiulan
Author_xml – sequence: 1
  givenname: Xiulan
  surname: Chen
  fullname: Chen, Xiulan
  email: luojingbi8898@163.com
  organization: Gansu Open University,Lanzhou,Gansu,China,730000
– sequence: 2
  givenname: Ning
  surname: Huang
  fullname: Huang, Ning
  email: rebel948620025@163.com
  organization: Gansu Open University,Lanzhou,Gansu,China,730000
BookMark eNotjctKxDAUQCPoQsf5A5H-QGteN02WNfgYGHTR7oc0uZFgpyNpRPr3DujqrM45N-RyPs1IyD2jDWPUPHTWDrZXrJW64ZTLhlIm-AXZmtZoAVSAMRquCXS5pJh8clO1mwtOU_rA2WP96BYM1RuWn1P-rHr03zmVterXpeDxllxFNy24_eeGDM9Pg32t9-8vO9vt62RYqVuqRIytjkGdX9L5MAYdDIDQo9SaxhBHNEqCjzxq5zUo4A5pCGfFjUFsyN1fNiHi4Suno8vrgVHFuBEgfgHczEUZ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ACCTCS61748.2024.00132
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798350359985
EndPage 719
ExternalDocumentID 10612935
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-7063ff78fd69854acdbd8d95538b4880fdfbe9645cf2f8ac85652ae0dd8fdabd3
IEDL.DBID RIE
IngestDate Wed Aug 21 05:37:08 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-7063ff78fd69854acdbd8d95538b4880fdfbe9645cf2f8ac85652ae0dd8fdabd3
PageCount 7
ParticipantIDs ieee_primary_10612935
PublicationCentury 2000
PublicationDate 2024-Feb.-24
PublicationDateYYYYMMDD 2024-02-24
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-Feb.-24
  day: 24
PublicationDecade 2020
PublicationTitle 2024 4th Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)
PublicationTitleAbbrev ACCTCS
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8637562
Snippet This article proposes a network security system based on artificial intelligence and its protection method. The system achieves comprehensive monitoring and...
SourceID ieee
SourceType Publisher
StartPage 713
SubjectTerms artificial intelligence
Computer science
Computer viruses
data storage
Federated learning
information
Libraries
Memory
Network security
Real-time systems
software testing
Title Artificial Intelligence-Based Network Security System
URI https://ieeexplore.ieee.org/document/10612935
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA22J0_1o-I3OXhNux_JbnKsi6UKFqEVeitJJgERWinbi7_eSXarRRC8LYGQJcnsm2Tfe0PIXaqFlQpy5gDDDRN4z3QBnjlsMwnwzEZ3_edpMXnlTwuxaMXqUQvjnIvkMzcIj_FfPqztNlyVDcPxBeFJdEgH91kj1mpVv2mihqOqmlczhOTI2cqCLXYayorslU2JqDHukeluvIYs8j7Y1mZgP39ZMf77hY5I_0egR1--oeeYHLjVCentKjTQNmBPiRhtIhcINxl93DPfZPcIXkCnDQecztoidrTxL--T-fhhXk1YWyiBvam0ZiWmGd6X0kOhpODaggEJSuC3zIT49OCNUwUX1mdeaisxicu0SwCwizaQn5Huar1y54RmMgFpci-wP3dJqk2J-aOziufW5Dy_IP0wC8uPxgpjuZuAyz_ar8hhWImoAefXpFtvtu4GUbw2t3H1vgC4558C
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_oPOhpfkz8tgev3fqRdOlxFsemWxFWYbfR5CUgwiaju_jX-5J2KoLgrQRCS9LX32v7-wC4C0uuRIqxr5HKjRp445cJGl_TmAyQRcq560_zZPTCHud83ojVnRZGa-3IZ7prD92_fFypjf1U1rOvLwRPfBf2CPgZr-Vaje43DNLeIMuKbEag7FhbkTXGDm2wyI_gFIcbwzbk2zPWdJG37qaSXfXxy4zx35d0CJ1viZ73_AU-R7Cjl8fQ3mY0eE3JngAfrB0biG4zb_zDftO_J_hCL69Z4N6sibHzagfzDhTDhyIb-U1Ugv-ahpXfp0bDmL4wmKSCs1KhRIEpp6eZtBVq0EidJowrExlRKkFtXFTqAJGmlBLjU2gtV0t9Bl4kAhQyNpzmMx2EpexTB6lVymIlYxafQ8euwuK9NsNYbBfg4o_xW9gfFdPJYjLOny7hwO6KU4SzK2hV642-Jkyv5I3byU88maJP
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+4th+Asia-Pacific+Conference+on+Communications+Technology+and+Computer+Science+%28ACCTCS%29&rft.atitle=Artificial+Intelligence-Based+Network+Security+System&rft.au=Chen%2C+Xiulan&rft.au=Huang%2C+Ning&rft.date=2024-02-24&rft.pub=IEEE&rft.spage=713&rft.epage=719&rft_id=info:doi/10.1109%2FACCTCS61748.2024.00132&rft.externalDocID=10612935