CN109274539A - 基于遗传算法的网络安全配置自动生成系统 - Google Patents
基于遗传算法的网络安全配置自动生成系统 Download PDFInfo
- Publication number
- CN109274539A CN109274539A CN201811350174.5A CN201811350174A CN109274539A CN 109274539 A CN109274539 A CN 109274539A CN 201811350174 A CN201811350174 A CN 201811350174A CN 109274539 A CN109274539 A CN 109274539A
- Authority
- CN
- China
- Prior art keywords
- network
- information
- configuration
- individual
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274539A true CN109274539A (zh) | 2019-01-25 |
CN109274539B CN109274539B (zh) | 2019-08-13 |
Family
ID=65193616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811350174.5A Active CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274539B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
-
2018
- 2018-11-14 CN CN201811350174.5A patent/CN109274539B/zh active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
Non-Patent Citations (1)
Title |
---|
ALIREZA TAMJIDYAMCHOLO: "Information Security Risk Reduction Based on Genetic Algorithm", 《IEEE》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN112039843B (zh) * | 2020-07-24 | 2024-02-02 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN113852608B (zh) * | 2021-09-02 | 2024-03-19 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
CN115150152B (zh) * | 2022-06-30 | 2024-04-26 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN109274539B (zh) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274539B (zh) | 基于遗传算法的网络安全配置自动生成系统 | |
Abusorrah et al. | Minimax-regret robust defensive strategy against false data injection attacks | |
CN109302310B (zh) | 一种网络运维脆弱性分析方法 | |
Kesarwani et al. | Development of trust based access control models using fuzzy logic in cloud computing | |
CN110046890A (zh) | 一种区块链权限管理系统及方法 | |
CN112583810B (zh) | 一种基于上下文的虚拟网络零信任方法 | |
CN105072085B (zh) | 一种软件定义网络下的流规则合法性认证方法 | |
Fraga et al. | A taxonomy of trust and reputation system attacks | |
Riad et al. | Multi-factor synthesis decision-making for trust-based access control on cloud | |
Zhang et al. | A graph‐theoretic approach to stability of neutral stochastic coupled oscillators network with time‐varying delayed coupling | |
CN109903046A (zh) | 基于区块链的用户数据管理方法及装置 | |
Bhogal et al. | A review on big data security and handling | |
CN106487770A (zh) | 鉴权方法及鉴权装置 | |
Sanjeevi et al. | The improved DROP security based on hard AI problem in cloud | |
Khalil et al. | IoT-MAAC: Multiple attribute access control for IoT environments | |
KR20200079191A (ko) | 우선 순위가 설정된 멀티 팩터 액세스 제어 시스템 및 방법 | |
Jin et al. | Role and object domain-based access control model for graduate education information system | |
US20220006791A1 (en) | Secured Node Authentication and Access Control Model for IoT Smart City | |
CN108366068A (zh) | 一种软件定义网络下基于策略语言的云端网络资源管理控制系统 | |
Chatterjee et al. | An efficient fine grained access control scheme based on attributes for enterprise class applications | |
Palanivel et al. | Securing IoT-Based Home Automation Systems Through Blockchain Technology: Implementation | |
Pampattiwar et al. | CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision engine | |
Namane et al. | Grid and cloud computing security: A comparative survey | |
Groš | Complex systems and risk management | |
Rathi et al. | Rule based trust evaluation using fuzzy logic in cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Bai Wei Inventor after: Pan Zhisong Inventor after: Guo Shize Inventor after: Chen Zhe Inventor after: Wang Cailing Inventor after: Wang Chenyu Inventor after: Xia Shiming Inventor before: Bai Wei Inventor before: Pan Zhisong Inventor before: Guo Shize Inventor before: Chen Zhe Inventor before: Wang Cailing Inventor before: Wang Chenyu Inventor before: Xia Shiming |