Abstract
With the popularization and application of the Internet, information related application technology is constantly infiltrating in the work and life of human beings, playing an unprecedented and increasingly important role. In this paper, in order to completed the application of computer network information security technology management, the author established a security risk quantification model, according to some literature case, determined the operating parameters of genetic algorithm in the specific operation, the data were obtained in the actual system evaluation case, the calculation results using genetic algorithm phase multiplication, matrix method, and proposed the calculation method of risk quantitative model. The final research shows that it is effective and feasible to apply genetic algorithm to network information security technology.


Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Enquiries about data availability should be directed to the authors.
References
Chen Q, Deng Q (2009) Cloud computing and its key techniques. J Comput Appl 9:2563–2566
Chen D, Huang X, Ren X (2010) Analysis of cloud computing and cloud security. Comput Technol Dev 2:027
Feng DG, Zhang M, Zhang Y et al (2011) Study on cloud computing security. J Softw 22(1):71–83
Fu Y, Wu X, Ye Q et al (2010) An approach for information systems security risk assessment on fuzzy set and entropy-weight. Acta Electron Sin 38(7):1489–1494
Hashizume K, Rosado DG, Fernández-Medina E et al (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):5
Katoch S, Chauhan SS, Kumar V (2021) A review on genetic algorithm: past, present, and future. Multimed Tools Appl 80:8091–8126
Kraemer S, Carayon P, Clem J (2009) Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput Secur 28(7):509–520
Li BH, Zhang L, Wang SL et al (2010) Cloud manufacturing: a new service-oriented networked manufacturing model. Comput Integr Manuf Syst 16(1):1–7
Liang Y, Poor HV, Shamai S (2009) Information theoretic security. Found Trends® Commun Inf Theor 5(4–5):355–580
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Wangqun L, Hui W, Jiahong L et al (2011) Research on active defense technology in network security based on non-cooperative dynamic game theory. J Comput Res Dev 48(2):306–316
Acknowledgements
This research is supported by “Research and application of teaching behavior analysis system in smart campus environment “project of science and technology research program of Chongqing Education Commission of China. (NO.KJQN202103301)
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors have not disclosed any competing interests.
Additional information
Communicated by Jia-Bao Liu.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qiang, X.J. Computer application under the management of network information security technology using genetic algorithm. Soft Comput 26, 7871–7876 (2022). https://doi.org/10.1007/s00500-022-06813-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-022-06813-6