Affiliation:
1. 1 Admission Office, Guilin Institute of Information Technology , Guilin , Guangxi , , China .
Abstract
Abstract
Inadequate network security defense measures threaten the information and property security of the state and the public, and how to safeguard network security is of vital practical significance. This paper proposes a dynamic security threat assessment model and a robust optimal control strategy to improve the efficiency of detecting network vulnerabilities and the accuracy of detecting network threats in a cloud computing environment. It also protects the privacy of the user's identity through a multi-factor continuous authentication method, encrypts and protects the user's data using a homomorphic encryption algorithm, and strengthens the ability of computers to resist intrusion. Three case studies are conducted to verify the effectiveness of the proposed technical approach: dynamic assessment of security threats, control policy, authentication, and network encryption. The results show that in the network vulnerability control policy and authentication case study, when adding the control policy Tk
= 40, the percentage of network normal nodes, malicious nodes and restorer nodes are 0.98, 0.02, and 0.009, respectively, and the encrypted plaintext ASCII value is distributed in [0,60] in an unordered manner, and the network is in a very desirable security state. Real-time accurate assessments of network security state can be provided by cloud computing-based network security vulnerability and encryption technology.
Reference27 articles.
1. Zhou, W., Zhang, H., & Li, Q. M. (2017). A network risk assessment method based on attack-defense graph model. Journal of Computers (Taiwan), 28(2), 105-118.
2. Onawola, H. J., Aliyu, G., Badamasi, B., & Longe, O. B. (2021). A conceptual model for mitigating security vulnerabilities in iot-based smart grid electric energy distribution systems. International Journal of Engineering Research in Africa, 55, 122-131.
3. Biswas, & Kumar, A. (2017). Source authentication techniques for network-on-chip router configuration packets. Acm Journal on Emerging Technologies in Computing Systems, 13(2), 1-31.
4. Weiwei, W. U., Su, H. U., Lin, D., & Gang, W. U. (2022). Reliable resource allocation with rf fingerprinting authentication in secure iot networks. Science China Information Sciences, 65(7), 1-16.
5. Gu, H., Zhang, J., Liu, T., Hu, M., Zhou, J., & Wei, T., et al. (2020). Diava: a traffic-based framework for detection of sql injection attacks and vulnerability analysis of leaked data. IEEE Transactions on Reliability(1), 69.