CN109274539A - 基于遗传算法的网络安全配置自动生成系统 - Google Patents
基于遗传算法的网络安全配置自动生成系统 Download PDFInfo
- Publication number
- CN109274539A CN109274539A CN201811350174.5A CN201811350174A CN109274539A CN 109274539 A CN109274539 A CN 109274539A CN 201811350174 A CN201811350174 A CN 201811350174A CN 109274539 A CN109274539 A CN 109274539A
- Authority
- CN
- China
- Prior art keywords
- network
- configuration
- information
- individual
- domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000002068 genetic effect Effects 0.000 title claims abstract description 46
- 239000011159 matrix material Substances 0.000 claims abstract description 44
- 108090000623 proteins and genes Proteins 0.000 claims description 25
- 230000035772 mutation Effects 0.000 claims description 18
- 238000000034 method Methods 0.000 claims description 17
- 210000000349 chromosome Anatomy 0.000 claims description 10
- 238000006243 chemical reaction Methods 0.000 claims 1
- 230000006870 function Effects 0.000 description 19
- 238000005457 optimization Methods 0.000 description 9
- 230000002265 prevention Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000005764 inhibitory process Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000004940 nucleus Anatomy 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350174.5A CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274539A true CN109274539A (zh) | 2019-01-25 |
CN109274539B CN109274539B (zh) | 2019-08-13 |
Family
ID=65193616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811350174.5A Active CN109274539B (zh) | 2018-11-14 | 2018-11-14 | 基于遗传算法的网络安全配置自动生成系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274539B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
-
2018
- 2018-11-14 CN CN201811350174.5A patent/CN109274539B/zh active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1311880A (zh) * | 1998-07-31 | 2001-09-05 | 特许科技有限公司 | 采用人造神经网络和遗传算法的高速公路事件自动检测系统 |
US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
CN101145219A (zh) * | 2007-07-20 | 2008-03-19 | 周远成 | 使用遗传算法进行资源配置子系统 |
CN102204170A (zh) * | 2008-10-31 | 2011-09-28 | 惠普开发有限公司 | 用于网络入侵检测的方法和设备 |
CN101854337A (zh) * | 2009-04-03 | 2010-10-06 | 深圳大学 | 基于安全和服务质量对网络进行优化控制的系统及方法 |
CN102098306A (zh) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | 基于关联矩阵的网络攻击路径分析方法 |
CN103581188A (zh) * | 2013-11-05 | 2014-02-12 | 中国科学院计算技术研究所 | 一种网络安全态势预测方法及系统 |
CN103903073A (zh) * | 2014-04-23 | 2014-07-02 | 河海大学 | 一种含分布式电源及储能的微电网优化规划方法及系统 |
CN107294775A (zh) * | 2017-06-08 | 2017-10-24 | 国网江西省电力公司信息通信分公司 | 基于层次分析法和遗传算法的通信网优化方法 |
CN107222491A (zh) * | 2017-06-22 | 2017-09-29 | 北京工业大学 | 一种基于工业控制网络变种攻击的入侵检测规则创建方法 |
Non-Patent Citations (1)
Title |
---|
ALIREZA TAMJIDYAMCHOLO: "Information Security Risk Reduction Based on Genetic Algorithm", 《IEEE》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039843A (zh) * | 2020-07-24 | 2020-12-04 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN112039843B (zh) * | 2020-07-24 | 2024-02-02 | 中国人民解放军陆军工程大学 | 基于矩阵补全的用户多域权限联合估计方法 |
CN113852608A (zh) * | 2021-09-02 | 2021-12-28 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN113852608B (zh) * | 2021-09-02 | 2024-03-19 | 中国人民解放军63891部队 | 一种基于基因式的防火墙规则异常处理优化方法 |
CN114070655A (zh) * | 2022-01-18 | 2022-02-18 | 北京领御中安科技有限公司 | 网络流量检测规则生成方法及装置、电子设备、存储介质 |
CN115150152A (zh) * | 2022-06-30 | 2022-10-04 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
CN115150152B (zh) * | 2022-06-30 | 2024-04-26 | 中国人民解放军陆军工程大学 | 基于权限依赖图缩减的网络用户实际权限快速推理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN109274539B (zh) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274539B (zh) | 基于遗传算法的网络安全配置自动生成系统 | |
Ammi et al. | Customized blockchain-based architecture for secure smart home for lightweight IoT | |
CN109302310B (zh) | 一种网络运维脆弱性分析方法 | |
CN110046890A (zh) | 一种区块链权限管理系统及方法 | |
WO2016169324A1 (zh) | 一种云计算数据中心访问管理方法和云计算数据中心 | |
Riad et al. | Multi-factor synthesis decision-making for trust-based access control on cloud | |
Singh et al. | Intrusion detection system using genetic algorithm for cloud | |
CN109903046A (zh) | 基于区块链的用户数据管理方法及装置 | |
CN106487770A (zh) | 鉴权方法及鉴权装置 | |
Chatterjee et al. | An efficient fine grained access control scheme based on attributes for enterprise class applications | |
Joshi et al. | A secure data sharing and communication with multiple cloud environments with java API | |
CN113010909A (zh) | 一种科学数据共享平台数据安全分级方法和装置 | |
Han et al. | Optimizing pinned nodes to maximize the convergence rate of multiagent systems with digraph topologies | |
CN104539687B (zh) | 基于信任协商的社区云资源安全共享方法 | |
Namane et al. | Grid and cloud computing security: A comparative survey | |
Bèatrix-May et al. | Integrating blockchain technology in a cyber physical system to secure data | |
Shi et al. | Continuous trust evaluation of power equipment and users based on risk measurement | |
Nguyen et al. | ADSynth: Synthesizing Realistic Active Directory Attack Graphs | |
Rathi et al. | Rule based trust evaluation using fuzzy logic in cloud computing | |
Lim et al. | Intelligent access control mechanism for ubiquitous applications | |
Paintsil et al. | Executable model-based risk analysis method for identity management systems: using hierarchical colored petri nets | |
Devara et al. | Improved database security using cryptography with genetic operators | |
Yahya et al. | Multi-organizational access control model based on mobile agents for cloud computing | |
Palanivel et al. | Securing IoT-Based Home Automation Systems Through Blockchain Technology: Implementation | |
Kumar et al. | Blockchain-driven System for Authentication and Authorization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Bai Wei Inventor after: Pan Zhisong Inventor after: Guo Shize Inventor after: Chen Zhe Inventor after: Wang Cailing Inventor after: Wang Chenyu Inventor after: Xia Shiming Inventor before: Bai Wei Inventor before: Pan Zhisong Inventor before: Guo Shize Inventor before: Chen Zhe Inventor before: Wang Cailing Inventor before: Wang Chenyu Inventor before: Xia Shiming |
|
CB03 | Change of inventor or designer information |