Skip to main content
Log in

Computer application under the management of network information security technology using genetic algorithm

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the popularization and application of the Internet, information related application technology is constantly infiltrating in the work and life of human beings, playing an unprecedented and increasingly important role. In this paper, in order to completed the application of computer network information security technology management, the author established a security risk quantification model, according to some literature case, determined the operating parameters of genetic algorithm in the specific operation, the data were obtained in the actual system evaluation case, the calculation results using genetic algorithm phase multiplication, matrix method, and proposed the calculation method of risk quantitative model. The final research shows that it is effective and feasible to apply genetic algorithm to network information security technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Enquiries about data availability should be directed to the authors.

References

  • Chen Q, Deng Q (2009) Cloud computing and its key techniques. J Comput Appl 9:2563–2566

    Google Scholar 

  • Chen D, Huang X, Ren X (2010) Analysis of cloud computing and cloud security. Comput Technol Dev 2:027

    Google Scholar 

  • Feng DG, Zhang M, Zhang Y et al (2011) Study on cloud computing security. J Softw 22(1):71–83

    Article  Google Scholar 

  • Fu Y, Wu X, Ye Q et al (2010) An approach for information systems security risk assessment on fuzzy set and entropy-weight. Acta Electron Sin 38(7):1489–1494

    Google Scholar 

  • Hashizume K, Rosado DG, Fernández-Medina E et al (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):5

    Article  Google Scholar 

  • Katoch S, Chauhan SS, Kumar V (2021) A review on genetic algorithm: past, present, and future. Multimed Tools Appl 80:8091–8126

    Article  Google Scholar 

  • Kraemer S, Carayon P, Clem J (2009) Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput Secur 28(7):509–520

    Article  Google Scholar 

  • Li BH, Zhang L, Wang SL et al (2010) Cloud manufacturing: a new service-oriented networked manufacturing model. Comput Integr Manuf Syst 16(1):1–7

    Google Scholar 

  • Liang Y, Poor HV, Shamai S (2009) Information theoretic security. Found Trends® Commun Inf Theor 5(4–5):355–580

    Article  Google Scholar 

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  • Wangqun L, Hui W, Jiahong L et al (2011) Research on active defense technology in network security based on non-cooperative dynamic game theory. J Comput Res Dev 48(2):306–316

    Google Scholar 

Download references

Acknowledgements

This research is supported by “Research and application of teaching behavior analysis system in smart campus environment “project of science and technology research program of Chongqing Education Commission of China. (NO.KJQN202103301)

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Jian Qiang.

Ethics declarations

Conflict of Interest

The authors have not disclosed any competing interests.

Additional information

Communicated by Jia-Bao Liu.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qiang, X.J. Computer application under the management of network information security technology using genetic algorithm. Soft Comput 26, 7871–7876 (2022). https://doi.org/10.1007/s00500-022-06813-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-06813-6

Keywords