Education, Science, Technology, Innovation and Life
Open Access
Sign In

Utilization and Security Protection of Computer Communication Technology in the Information Age

Download as PDF

DOI: 10.23977/jeis.2024.090210 | Downloads: 6 | Views: 132

Author(s)

Dongyuan Ge 1, Qianyi Fang 2, Qi Han 1

Affiliation(s)

1 State Grid Heilongjiang Information & Telecommunication Company Ltd, Harbin, Heilongjiang, China
2 Faculty of Science, Northeast Forrstry University, Harbin, Heilongjiang, China

Corresponding Author

Dongyuan Ge

ABSTRACT

With the advent of the information age, computer communication technology has been widely applied, promoting the development of various industries. However, the accompanying information security issues have attracted widespread attention. This article explored the current application status of computer communication technology in different fields, analyzed its potential threats in information security, and explored protective measures using CNN (Convolutional Neural Networks) models, aiming to provide guidance and suggestions for industry practitioners. The research structure showed that the average accuracy of the CNN model was 94.8%, significantly better than the 89.5% of the SVM (Support Vector Machine) model. The average response time of the CNN model was only 20.5 milliseconds. The average false alarm rate of the CNN model on the false alarm rate indicator was 7.2%. In the final system overhead experiment, the CNN model required a significant amount of system resources in high traffic environments. From the above data conclusions, it can be seen that the CNN model exhibited higher efficiency and accuracy in network communication security, despite the high resource demand under high load conditions.

KEYWORDS

Network Security, Computer Communication Technology, CNN Model, Safety Protection

CITE THIS PAPER

Dongyuan Ge, Qianyi Fang, Qi Han, Utilization and Security Protection of Computer Communication Technology in the Information Age. Journal of Electronics and Information Science (2024) Vol. 9: 88-94. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090210.

REFERENCES

[1] Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion detection system for dual routing deep capsule network [J]. Computer Research and Development, 2022, 59 (2): 418-429.
[2] Wu Hao, Hao Jiajia, Lu Yunlong. Research on Distributed Network Intrusion Detection System Based on Honey Field in IoT Scenarios [J]. Journal of Communications, 2024, 45 (1): 106-118.
[3] Mallampati S B, Hari S .Fusion of Feature Ranking Methods for an Effective Intrusion Detection System[J]. Computers, Materials, and Continuum (English), 2023, 76(8):1721-1744.
[4] Liu K, Wang M, Rongkuan M A, et al. Detection and localization of cyber attacks on water treatment systems: an entropy-based approach[J].Frontiers of Information Technology & Electronic Engineering, 2022, 23(4):587-603.
[5] Thakkar A, Lohiya R. A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions[J]. Artificial Intelligence Review, 2022, 55(1): 453-563.
[6] Xie Zhongyang. The application of artificial intelligence technology in computer networks [J]. Integrated Circuit Applications, 2023, 40 (1): 360-362.
[7] Siva Shankar S, Hung B T, Chakrabarti P, et al. A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system[J]. Education and Information Technologies, 2024, 29(4): 3859-3883.
[8] Huang Y, Yu Y, Li H, et al. Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection[J]. Digital Communications and Networks, 2022, 8(5): 604-613.
[9] Han H, Fei S, Yan Z, et al. A survey on blockchain-based integrity auditing for cloud data[J]. Digital Communications and Networks, 2022, 8(5): 591-603.
[10] Yuan Y, Zhang J, Xu W, et al. Identity-based public data integrity verification scheme in cloud storage system via blockchain[J]. The Journal of Supercomputing, 2022, 78(6): 8509-8530.
[11] Lei N. Intelligent logistics scheduling model and algorithm based on Internet of Things technology[J]. Alexandria Engineering Journal, 2022, 61(1): 893-903.
[12] Deebak B D, Memon F H, Khowaja S A, et al. In the digital age of 5G networks: Seamless privacy-preserving authentication for cognitive-inspired internet of medical things[J]. IEEE Transactions on Industrial Informatics, 2022, 18(12): 8916-8923.
[13] Mahajan H B. Emergence of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems: solutions, challenges, and future roadmap[J]. Wireless Personal Communications, 2022, 126(3): 2425-2446.
[14] Ramesh G, Logeshwaran J, Aravindarajan V. The Performance Evolution of Antivirus Security Systems in Ultra dense Cloud Server Using Intelligent Deep Learning[J]. BOHR International Journal of Computational Intelligence and Communication Network, 2022, 1(1): 15-19.

Downloads: 8247
Visits: 278847

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.