Utilization and Security Protection of Computer Communication Technology in the Information Age
DOI: 10.23977/jeis.2024.090210 | Downloads: 3 | Views: 94
Author(s)
Dongyuan Ge 1, Qianyi Fang 2, Qi Han 1
Affiliation(s)
1 State Grid Heilongjiang Information & Telecommunication Company Ltd, Harbin, Heilongjiang, China
2 Faculty of Science, Northeast Forrstry University, Harbin, Heilongjiang, China
Corresponding Author
Dongyuan GeABSTRACT
With the advent of the information age, computer communication technology has been widely applied, promoting the development of various industries. However, the accompanying information security issues have attracted widespread attention. This article explored the current application status of computer communication technology in different fields, analyzed its potential threats in information security, and explored protective measures using CNN (Convolutional Neural Networks) models, aiming to provide guidance and suggestions for industry practitioners. The research structure showed that the average accuracy of the CNN model was 94.8%, significantly better than the 89.5% of the SVM (Support Vector Machine) model. The average response time of the CNN model was only 20.5 milliseconds. The average false alarm rate of the CNN model on the false alarm rate indicator was 7.2%. In the final system overhead experiment, the CNN model required a significant amount of system resources in high traffic environments. From the above data conclusions, it can be seen that the CNN model exhibited higher efficiency and accuracy in network communication security, despite the high resource demand under high load conditions.
KEYWORDS
Network Security, Computer Communication Technology, CNN Model, Safety ProtectionCITE THIS PAPER
Dongyuan Ge, Qianyi Fang, Qi Han, Utilization and Security Protection of Computer Communication Technology in the Information Age. Journal of Electronics and Information Science (2024) Vol. 9: 88-94. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090210.
REFERENCES
[1] Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion detection system for dual routing deep capsule network [J]. Computer Research and Development, 2022, 59 (2): 418-429.
[2] Wu Hao, Hao Jiajia, Lu Yunlong. Research on Distributed Network Intrusion Detection System Based on Honey Field in IoT Scenarios [J]. Journal of Communications, 2024, 45 (1): 106-118.
[3] Mallampati S B, Hari S .Fusion of Feature Ranking Methods for an Effective Intrusion Detection System[J]. Computers, Materials, and Continuum (English), 2023, 76(8):1721-1744.
[4] Liu K, Wang M, Rongkuan M A, et al. Detection and localization of cyber attacks on water treatment systems: an entropy-based approach[J].Frontiers of Information Technology & Electronic Engineering, 2022, 23(4):587-603.
[5] Thakkar A, Lohiya R. A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions[J]. Artificial Intelligence Review, 2022, 55(1): 453-563.
[6] Xie Zhongyang. The application of artificial intelligence technology in computer networks [J]. Integrated Circuit Applications, 2023, 40 (1): 360-362.
[7] Siva Shankar S, Hung B T, Chakrabarti P, et al. A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system[J]. Education and Information Technologies, 2024, 29(4): 3859-3883.
[8] Huang Y, Yu Y, Li H, et al. Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection[J]. Digital Communications and Networks, 2022, 8(5): 604-613.
[9] Han H, Fei S, Yan Z, et al. A survey on blockchain-based integrity auditing for cloud data[J]. Digital Communications and Networks, 2022, 8(5): 591-603.
[10] Yuan Y, Zhang J, Xu W, et al. Identity-based public data integrity verification scheme in cloud storage system via blockchain[J]. The Journal of Supercomputing, 2022, 78(6): 8509-8530.
[11] Lei N. Intelligent logistics scheduling model and algorithm based on Internet of Things technology[J]. Alexandria Engineering Journal, 2022, 61(1): 893-903.
[12] Deebak B D, Memon F H, Khowaja S A, et al. In the digital age of 5G networks: Seamless privacy-preserving authentication for cognitive-inspired internet of medical things[J]. IEEE Transactions on Industrial Informatics, 2022, 18(12): 8916-8923.
[13] Mahajan H B. Emergence of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems: solutions, challenges, and future roadmap[J]. Wireless Personal Communications, 2022, 126(3): 2425-2446.
[14] Ramesh G, Logeshwaran J, Aravindarajan V. The Performance Evolution of Antivirus Security Systems in Ultra dense Cloud Server Using Intelligent Deep Learning[J]. BOHR International Journal of Computational Intelligence and Communication Network, 2022, 1(1): 15-19.
Downloads: | 7931 |
---|---|
Visits: | 272804 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar