Computer Network Vulnerability Detection and Semantic Data Analysis Optimization Based on Artificial Intelligence

Computer Network Vulnerability Detection and Semantic Data Analysis Optimization Based on Artificial Intelligence

Huiyan Li, Xinhua Xiao
Copyright: © 2022 |Pages: 10
DOI: 10.4018/IJDST.308000
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In order to solve the network security vulnerabilities in the process of network information interaction, which affect the integrity and confidentiality of data. The computer network vulnerability detection and semantic data analysis optimization based on artificial intelligence are proposed, and the results show that the final accuracy of the test set is improved to 88.5%, but the false positive rate is as high as 18%. Based on the direct classification model, the code under test is compared with the vulnerability template, the model fuses the two direct classification models and reduces the false positive rate to less than 5% under the condition that the accuracy is basically the same.
Article Preview
Top

Introduction

With the development of electronic information technology and computer network, the level of network information is also improved, and the network is widely used in medical, military, media and other fields. The increasingly frequent information interaction in the network has led to a series of network problems, in the process of network information interaction, network security loopholes appear, the emergence of these network security vulnerabilities seriously affects the integrity and confidentiality of data. Traditional detection methods have low detection rate and high false alarm rate for unknown and hidden security risks, in this context, it is of great significance to study an automatic scanning method for network security vulnerabilities. Aiming at the existing problems, an automatic detection method of network security vulnerabilities based on artificial intelligence is designed(Bu, S.,2020).With the development of computer science and artificial intelligence research, people begin to pay attention to how intelligent machine system can be better combined with life, enabling intelligent machine systems to understand human natural language has become a research hotspot, which is also called semantic analysis (Zhang, Y., 2020). With the development of computer science and artificial intelligence research, people begin to pay attention to how intelligent machine system can be better combined with life, enabling intelligent machine systems to understand human natural language has become a research hotspot, which is also called semantic analysis. In essence, semantic analysis refers to the use of various methods to understand and analyze the content expressed by a piece of text, speech or a picture. Any understanding of language, things, etc., can be divided into the category of linguistic analysis (Tkatek, S., 2020). The purpose of semantic analysis is to realize automatic semantic analysis of the above-mentioned linguistic units by establishing an effective and universal analysis model and analysis system, thus it can realize the automatic analysis and understanding of the real semantics of the text. Semantic analysis is also an important research branch in the field of artificial intelligence, which is the core technology of artificial intelligence in natural language processing applications, including computational linguistics, machine learning, deep learning, natural linguistics and other disciplines(Li, X., 2020). The method mainly detects whether the target host is under network attack and determines the attack type of the network attack. If the target host is attacked by the network, the network attack is successfully detected and the attack action of the successful network attack is determined; If the network attack is successful, vulnerability information is generated, wherein, the vulnerability information includes the domain name of the network site where the network vulnerability exists, the attack type of the network attack and the attack action of the network attack; The vulnerability information is sent to the network vulnerability platform.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing