Application of anti-mapping security access technology in network security protection

Author:

Ma Dongjuan1,Li Rui1,Liu Zehui1,Guo Min1,Jin Xin2

Affiliation:

1. 1 State Grid Shanxi Electric Power Research Institute , Taiyuan , Shanxi , , China .

2. 2 Anhui Jiyuan Inspection And Testing Technology Co., Ltd , Hefei , Anhui , , China .

Abstract

Abstract In the current era, characterized by the pervasive Internet of Everything, trillions of data points are exposed to high-level threats, presenting novel challenges to the domain of cyberspace security. This paper introduces a cybersecurity protection framework derived from the PDRR model, enriched with integrated cybersecurity measures. Utilizing a cyberspace mapping architecture that incorporates anti-mapping security access technology, we analyze the robustness of cybersecurity protections. The framework employs penetration testing queue technology to uncover vulnerabilities within cyberspace, the Hidden Markov Model to assess cybersecurity posture, and the QPSO-LightGBM model to evaluate cybersecurity vulnerabilities. To validate the efficacy of the cyberspace mapping architecture in employing anti-mapping security access technology, we have systematically conducted various experimental methodologies, including penetration testing, security posture sensing, and security vulnerability assessment. This integrated approach provides a comprehensive framework for addressing the complex challenges posed by the vast scale of data in today’s interconnected environments. The average send/receive telegram packets of the network I/O graph in the state of SYN flooding attack grows from 60 packets/sec in the normal state to 2.2*104 packets/sec, and the minimum time of security posture perception by the Hidden Markov Model is only 51.28ms. The accuracy of the QPSO-LightGBM model for network security vulnerability assessment reaches 86.58%. Fully utilizing anti-marker security access technology can improve the understanding of the threat situation in network security and enhance the protection ability.

Publisher

Walter de Gruyter GmbH

Reference23 articles.

1. Zhang, X., Xu, G., & Zhu, J. (2021). Joint latent space models for network data with high-dimensional node variables. Biometrika.

2. Zhu, H., Guo, Y., & Li, Y. (2017). Campus surveying control network construction based on gps. Boletin Tecnico/Technical Bulletin, 55(13), 579–586.

3. Hua, H., Liu, Y., Wang, Y., Chang, D., & Leng, Q. (2018). Visual cryptography based multilevel protection scheme for visualization of network security situation. Procedia Computer Science, 131, 204–212.

4. Sun, W., Wang, L., Wang, P., & Zhang, Y. (2020). Collaborative blockchain for space-air-ground integrated networks. IEEE Wireless Communications, 27(6), 82–89.

5. Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341–350.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3