Skip to main content

Research on Automatic Defense Network Active Attack Data Location and Early Warning Method

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2020)

Abstract

The traditional automatic defense network active attack data location and early warning method has the shortcoming of poor localization performance, so the research of automatic defense network active attack data location and warning method is put forward. The active attack data is detected by the space distance of the network node data, and the active attack data is judged whether there is active attack data in the network, which is based on the detected active attack data. The multi-objective binary particle swarm optimization (BPSO) algorithm is used to obtain the optimal task allocation scheme for active attack data location. Based on it, the algorithm of extreme learning machine is used to realize the location and early warning of active attack data. Through the experiment, put forward the automatic Compared with traditional methods, the convergence value of active attack data location and early warning method of defensive network increases 23.61 and the error rate of location decreases by 15. It is fully explained that the proposed automatic defense network active attack data location and early warning method has better localization performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. He, Y.: Research on active security defense system of campus network based on honeypot technology. Comput. Fans 12(4), 21–22 (2016)

    Google Scholar 

  2. Zhu, C., Zhao, D.: A packet allocation protection method for network attack crime prevention. Sci. Technol. Bull. 32(8), 203–206 (2016)

    MathSciNet  Google Scholar 

  3. Dong, X., Lin, L., Zhang, X., et al.: Application of active defense technology in communication network security engineering. Inf. Secur. Technol. 7(1), 80–84 (2016)

    Google Scholar 

  4. Pujiang, L.L.: Research on network security early warning and defense system based on three-domain model. Inf. Secur. Technol. 8(8), 68–72 (2017)

    Google Scholar 

  5. Jiang, S., Luo, T.: Research on detection method of network small disturbance intrusion source location under non-uniform noise environment. Sci. Technol. Eng. 17(5), 247–251 (2017)

    Google Scholar 

  6. Luo, X.W., Tao, H.: Research on Simulation of attack signal location and recognition in wireless communication networks. Comput. Simul. 33(11), 320–323 (2016)

    Google Scholar 

  7. He, C.: Design of computer network security active defense model in big data era. J. Ningbo Vocat. Tech. Coll. 20(4), 97–99 (2016)

    Google Scholar 

  8. Di, Z.: Research on the current situation and defense measures of network security management in Colleges and Universities. Electron. Technol. Softw. Eng. 56(13), 221–221 (2016)

    Google Scholar 

  9. Liu, S., Li, Z., Zhang, Y., et al.: Introduction of key problems in long-distance learning and training. Mob. Networks Appl. 24(1), 1–4 (2019)

    Article  Google Scholar 

  10. Chaocheng, Q., Jianhong, Q.: Network security defense model of metal trading based on attack detection. World Nonferrous Metals 23(7), 77–78 (2016)

    Google Scholar 

  11. Huang, R., Huang, R.: Simulation research on privacy information protection of network users. Comput. Simul. 51(11), 319–322 + 423 (2017)

    Google Scholar 

  12. Liu, S., Bai, W., Srivastava, G., Machado, J.A.T.: Property of self-similarity between baseband and modulated signals. Mob. Networks Appl. 25(4), 1537–1547 (2019). https://doi.org/10.1007/s11036-019-01358-9

    Article  Google Scholar 

  13. Shuai, L., Weiling, B., Nianyin, Z., et al.: A fast fractal based compression for MRI images. IEEE Access 7, 62412–62420 (2019)

    Article  Google Scholar 

  14. Shuke, Yu.: Research on target intrusion detection based on mobile wireless sensor networks. Digital Commun. World 59(12), 6–8 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-zhong Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Jz., Xie, Wd. (2021). Research on Automatic Defense Network Active Attack Data Location and Early Warning Method. In: Liu, S., Xia, L. (eds) Advanced Hybrid Information Processing. ADHIP 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 347. Springer, Cham. https://doi.org/10.1007/978-3-030-67871-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67871-5_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67870-8

  • Online ISBN: 978-3-030-67871-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics