Affiliation:
1. 1 The College of Information Science and Technology , Taishan University , Tai'an, Shandong , , China
2. 2 State-owned Assets Management Office , Taishan University , Tai'an, Shandong , , China
Abstract
Abstract
To strengthen networks’ security performance, here pose suggests a fused full convolutional approach to monitoring computer networks. This paper first analyzes the various performances of the full convolutional model for error problems rate, error reporting, and monitoring effects on various attack categories then proposes a network monitoring scheme for the full convolutional model and introduces the workflow of the full convolutional model in computer network security protection. In terms of accuracy, the full convolutional error rate of the blueprint meets the requirements rate of 96.8%, which is better than the classical network models of Lenet-5 and AlexNet, with 86.2% and 91.6%. The false alarm rate is only 2.37%, which is lower than the 5.74% MLP algorithm and 4.23% SVM algorithm. By comparison, the full convolutional calculation method is more efficient than other calculation methods in the detection rate of attack types such as Dos, Probe, U2R, and R2L. Therefore, the calculation method here is well adapted to computer network security protection requirements.
Subject
Applied Mathematics,Engineering (miscellaneous),Modeling and Simulation,General Computer Science
Reference19 articles.
1. Ayd NMA, Zaim, A. H., Ceylan, K. G. (2019). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517-526.
2. Gang, Q. U., Shaobo, J. I., Min, Q. (2018). Inter-Organizational Coordination, IT Support, and Environment. Tsinghua Science & Technology, 13(003), 374-382.
3. Wang, D,. Jie, J. (2015). Big Data Era of Computer Network Information Security and Protection Strategy Study. Wireless Internet Technology.
4. Li, X. (2018). Design and implementation of network information security monitoring system. Network Security Technology & Application.
5. Wei, Y. H. (2016). The discussion of Network information security defensive system. Journal of the Hebei Academy of Sciences.