-
41
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01“…This paper presents a new security mitigation model using artificial neural network (ANN) with interpretive structure modeling (ISM) to improve the 5G network security system. The main goal of this study is to develop a 5G network security mitigation model (5GN-SMM) that leverages the predictive capabilities of ANN and the analysis of ISM to identify and mitigate security threats by providing practices in 5G networks. …”
Get full text
Article -
42
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01Get full text
Article -
43
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01“…In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.…”
Get full text
Article -
44
Reference architecture of the telecom network security protection system for cloud network convergence
Published 2020-05-01Get full text
Article -
45
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
Get full text
Article -
46
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01Subjects: Get full text
Article -
47
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: “…network security situation prediction…”
Get full text
Article -
48
-
49
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
50
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: Get full text
Article -
51
Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices
Published 2015-01-01Get full text
Article -
52
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01“…In the age of big data, large-scale, complexity of heterogeneous network security behavior should be considered. According to the features of huge amount and complex, big data analysis technologies for network security monitoring were proposed. …”
Get full text
Article -
53
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
Get full text
Article -
54
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01Get full text
Article -
55
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article -
56
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
57
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
Get full text
Article -
58
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
Get full text
Article -
59
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01“…The security challenges in the new network security threats which our country was facing were analyzed and recommendations for future network development in China in the field of information security were put forward.…”
Get full text
Article -
60
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. …”
Get full text
Article