2022
DOI: 10.1515/jisys-2022-0032
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of network information security monitoring system based on adaptive deep detection

Abstract: For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network (DBN) was designed and implemented, and the intrusion detection system model was combined with a support vector machine (SVM). The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 56 publications
0
2
0
Order By: Relevance
“…Currently, network attacks continuously beset the area of network information security, and network security incidents and accidents emerge endlessly. The impact of network information security varies over the individual, organizational, and social levels (Zhu, 2021;Niu et al, 2022). Worldwide, information virus attacks have repeatedly occurred in many countries, causing huge global economic losses.…”
Section: Importance Of Network Information Security Protectionmentioning
confidence: 99%
“…Currently, network attacks continuously beset the area of network information security, and network security incidents and accidents emerge endlessly. The impact of network information security varies over the individual, organizational, and social levels (Zhu, 2021;Niu et al, 2022). Worldwide, information virus attacks have repeatedly occurred in many countries, causing huge global economic losses.…”
Section: Importance Of Network Information Security Protectionmentioning
confidence: 99%
“…UAVs have the potential to either transport energy sources for wireless nodes or act as energy sources for wireless nodes themselves, so extending the lifespan of the network. Cable charging is incompatible with certain software platforms and networks, including the IoT and wireless sensor networks [10,11].…”
Section: Introductionmentioning
confidence: 99%