期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
1
作者 Huan Wang Yunlong Tang +4 位作者 Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li 《High-Confidence Computing》 EI 2024年第2期50-61,共12页
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense effectiveness.Therefore,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense strategies.the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions. 展开更多
关键词 Active defense decision-making Cloud boundary network security Intelligent agent reinforcement learning Offensive and defensive game
原文传递
Fast Multi-Pattern Matching Algorithm on Compressed Network Traffic 被引量:2
2
作者 Hao Peng Jianxin Li +1 位作者 Bo Li M.Hassan Arif 《China Communications》 SCIE CSCD 2016年第5期141-150,共10页
Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck ... Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck for multi-pattern matching on online compressed network traffic(CNT), this is because malicious and intrusion codes are often embedded into compressed network traffic. In this paper, we propose an online fast and multi-pattern matching algorithm on compressed network traffic(FMMCN). FMMCN employs two types of jumping, i.e. jumping during sliding window and a string jump scanning strategy to skip unnecessary compressed bytes. Moreover, FMMCN has the ability to efficiently process multiple large volume of networks such as HTTP traffic, vehicles traffic, and other Internet-based services. The experimental results show that FMMCN can ignore more than 89.5% of bytes, and its maximum speed reaches 176.470MB/s in a midrange switches device, which is faster than the current fastest algorithm ACCH by almost 73.15 MB/s. 展开更多
关键词 compressed network traffic network security multiple pattern matching skip scanning depth of boundary
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部