IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Network Information Security Monitoring Under Artificial Intelligence Environment

Network Information Security Monitoring Under Artificial Intelligence Environment
View Sample PDF
Author(s): Longfei Fu (Lanzhou Institute of Technology, China), Yibin Liu (Lanzhou Institute of Technology, China), Yanjun Zhang (Lanzhou Institute of Technology, China)and Ming Li (Information and Communication Branch of State Grid Anhui Electric Power Co., Ltd., China)
Copyright: 2024
Volume: 18
Issue: 1
Pages: 25
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco)and Ahmed A. Abd El-Latif (Menoufia University, Egypt)
DOI: 10.4018/IJISP.345038

Purchase

View Network Information Security Monitoring Under Artificial Intelligence Environment on the publisher's website for pricing and purchasing information.

Abstract

At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection (feature selection and traffic classification) are discussed. The improved bat algorithm (O-BA) and the improved random forest algorithm (O-RF) are proposed for optimization. Moreover, the NIS system is designed based on the Agent concept. Finally, the simulation experiment is carried out on the real data platform. The results showed that the detection precision, accuracy, recall, and F1 score of O-BA are significantly higher than those of references [17], [18], [19], and [20], while the false positive rate is the opposite (P < 0.05). The detection precision, accuracy, recall, and F1 score of O-RF algorithm are significantly higher than those of Apriori, ID3, SVM, NSA, and O-RF algorithm, while the false positive rate is significantly lower than that of Apriori, ID3, SVM, NSA, and O-RF algorithm (P < 0.05).

Related Content

Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang. © 2024. 19 pages.
Zhiqiang Wu. © 2024. 15 pages.
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi. © 2024. 27 pages.
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu, Han-Bing Yan. © 2024. 21 pages.
Yuan Tian, Wendong Wang, Jingyuan He. © 2024. 28 pages.
Longfei Fu, Yibin Liu, Yanjun Zhang, Ming Li. © 2024. 25 pages.
Abdulhakim Sabur, Ahmad J. Showail. © 2024. 19 pages.
Body Bottom