2023
DOI: 10.13052/jcsm2245-1439.1211
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence

Zhihong Zhang

Abstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and the design of intrusion detection method for communication network is carried out. By studying the classification and detection pattern matching of communication network intrusion behavior, extracting the intrusion behavior features of communication network based on FS algorithm, and optimizing the intrusion detection and learning effect based on the limit learning machine, the intrus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In Equation ( 1), T om represents the name of any IoT user, and the ID form of the IoT data requester is shown in Equation (2).…”
Section: Design Of Data Sharing and Data Encryption Technology Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In Equation ( 1), T om represents the name of any IoT user, and the ID form of the IoT data requester is shown in Equation (2).…”
Section: Design Of Data Sharing and Data Encryption Technology Solutionsmentioning
confidence: 99%
“…However, with the popularization of IoT devices, security issues are also becoming increasingly prominent. Attackers can use various means to attack IoT devices, such as stealing data, tampering with programs, and infecting malicious software, all of which can cause significant losses to users [1][2][3][4]. Blockchain technology is widely used in various fields due to its characteristics of decentralization, tamper resistance, and transparency.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of machine learning has brought earth shattering changes to people's lifestyles, but it has also brought increasingly serious network security issues. The highly transparent internet has made the manifestations of network security threats more complex [1,2]. At the same time, computer network security protection is becoming increasingly important, and the confrontation between network intrusion and defence, infiltration and reverse osmosis will continue to escalate.…”
Section: Introductionmentioning
confidence: 99%