Paper
9 February 2024 Application of black box genetic algorithm in network security vulnerability mining
Qiang Chen, Jue He, Jinqi Lu
Author Affiliations +
Proceedings Volume 13073, Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023); 130730L (2024) https://doi.org/10.1117/12.3026709
Event: Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023), 2023, Changsha, China
Abstract
To understand the application of network security vulnerability mining, application research of black box genetic algorithm in network security vulnerability mining is put forward. In this paper, firstly, aiming at the high false detection rate and missed detection rate of current system network security mining methods, a system network security vulnerability mining method based on a black box genetic algorithm is proposed. Secondly, the overall security situation of the system network is obtained by the all-around perception of the system network situation. Black-box genetic algorithm is introduced to carry out a black-box fuzzy test, the objective function is selected and the test parameters are generated. The optimized samples are transmitted to the fuzzy test module, and the abnormal situation is recorded in real-time through the log monitoring test system. When the fuzzy test reaches the preset goal, the test is stopped and the system network security vulnerability report is output. The final results show that the false detection rate of the proposed algorithm is low, which proves that the proposed algorithm is reliable.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Qiang Chen, Jue He, and Jinqi Lu "Application of black box genetic algorithm in network security vulnerability mining", Proc. SPIE 13073, Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023), 130730L (9 February 2024); https://doi.org/10.1117/12.3026709
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Mining

Genetic algorithms

Fuzzy logic

Computer security

Information security

Genetics

Back to Top