Application of anti-mapping security access technology in network security protection
Author:
Ma Dongjuan1, Li Rui1, Liu Zehui1, Guo Min1, Jin Xin2
Affiliation:
1. 1 State Grid Shanxi Electric Power Research Institute , Taiyuan , Shanxi , , China . 2. 2 Anhui Jiyuan Inspection And Testing Technology Co., Ltd , Hefei , Anhui , , China .
Abstract
Abstract
In the current era, characterized by the pervasive Internet of Everything, trillions of data points are exposed to high-level threats, presenting novel challenges to the domain of cyberspace security. This paper introduces a cybersecurity protection framework derived from the PDRR model, enriched with integrated cybersecurity measures. Utilizing a cyberspace mapping architecture that incorporates anti-mapping security access technology, we analyze the robustness of cybersecurity protections. The framework employs penetration testing queue technology to uncover vulnerabilities within cyberspace, the Hidden Markov Model to assess cybersecurity posture, and the QPSO-LightGBM model to evaluate cybersecurity vulnerabilities. To validate the efficacy of the cyberspace mapping architecture in employing anti-mapping security access technology, we have systematically conducted various experimental methodologies, including penetration testing, security posture sensing, and security vulnerability assessment. This integrated approach provides a comprehensive framework for addressing the complex challenges posed by the vast scale of data in today’s interconnected environments. The average send/receive telegram packets of the network I/O graph in the state of SYN flooding attack grows from 60 packets/sec in the normal state to 2.2*104 packets/sec, and the minimum time of security posture perception by the Hidden Markov Model is only 51.28ms. The accuracy of the QPSO-LightGBM model for network security vulnerability assessment reaches 86.58%. Fully utilizing anti-marker security access technology can improve the understanding of the threat situation in network security and enhance the protection ability.
Publisher
Walter de Gruyter GmbH
Reference23 articles.
1. Zhang, X., Xu, G., & Zhu, J. (2021). Joint latent space models for network data with high-dimensional node variables. Biometrika. 2. Zhu, H., Guo, Y., & Li, Y. (2017). Campus surveying control network construction based on gps. Boletin Tecnico/Technical Bulletin, 55(13), 579–586. 3. Hua, H., Liu, Y., Wang, Y., Chang, D., & Leng, Q. (2018). Visual cryptography based multilevel protection scheme for visualization of network security situation. Procedia Computer Science, 131, 204–212. 4. Sun, W., Wang, L., Wang, P., & Zhang, Y. (2020). Collaborative blockchain for space-air-ground integrated networks. IEEE Wireless Communications, 27(6), 82–89. 5. Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341–350.
|
|