Update Algorithm of Secure Computer Database Based on Deep Belief Network
DOI:
https://doi.org/10.13052/jcsm2245-1439.1311Keywords:
DBN, security computer, update databaseAbstract
In order to ensure the security of large-scale data transmission in a short time and in a wide range during online database updating, this paper presents a secure computer database updating algorithm based on DBN (Deep Belief Network). In this paper, the model adopts multi-layer depth structure for unsupervised feature learning, maps high-dimensional and nonlinear intrusion data to low-dimensional space, establishes the relationship mapping between high-dimensional and low-dimensional, and then uses fine-tuning algorithm to transform the model to achieve the best expression of features. At the same time, this method improves the data processing and method model without destroying the learned knowledge of the model and seriously affecting the real-time performance of detection. In order to overcome the problem of system instability caused by fixed empirical learning rate, this paper proposes a learning rate optimization strategy based on energy change. In the process of feature extraction, the features of different hidden layers are extracted to form combined features. Experiments show that the detection rate of this method can reach 95.31%, and the false alarm rate is 2.14%. This verifies the effectiveness of the secure computer database updating algorithm in this paper. Which can ensure the online update of the secure computer database.
Downloads
References
Qiang W, Fz A, Jian X A. Efficient verifiable databases with additional insertion and deletion operations in cloud computing[J]. Future Generation Computer Systems, 2021, 115:553–567.
Bella G, Curzon P, Lenzini G. Service Security and Privacy as a Socio-Technical Problem: Literature review, analysis methodology and challenge domains[J]. Journal of computer security, 2015, 23(5):563–585.
Shakhovska N, Boyko N, Zasoba Y. Big Data Processing Technologies in Distributed Information Systems[J]. Procedia Computer Science, 2019, 160(2):561–566.
Lazouski A, Martinelli F, Mori P. Usage control in computer security: A survey[J]. Computer Science Review, 2010, 4(2):81–99.
Denning T, Kohno T, Levy H M. Computer Security and the Modern Home[J]. Communications of the ACM, 2013, 56(1):94–103.
Zhan S, Yu L, Wang Z, Du Y, Yu Y, Cao Q, Dang S, Khan Z. Cell traffic prediction based on convolutional neural network for software-defined ultra-dense visible light communication networks[J]. Security and Communication Networks. 2021, 19;2021.
Feng D, Yajie M, Fengxing Z. A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment[J]. The Computer Journal, 2018, 61(6):789–797.
Burr W, Ferraiolo H, Waltermire D. NIST and Computer Security[J]. It Professional, 2014, 16(2):31–37.
Tseng F K, Liu Y H, Chen R J. Advances in Information and Computer Security[J]. Lecture Notes in Computer Science, 2013, 15(1):5–6.
Maram B, Gnanasekar JM, Manogaran G, Balaanand M. Intelligent security algorithm for UNICODE data privacy and security in IOT[J]. Service Oriented Computing and Applications. 2019, 13(1):3–15.
Igor H, Bohuslava J, Martin J. Application of Neural Networks in Computer Security[J]. Procedia Engineering, 2014, 69(15):1209–1215.
Konur S. Specifying safety-critical systems with a decidable duration logic[J]. Science of Computer Programming, 2014, 80(10):264–287.
Hiraoka Y, Murakami T, Yamamoto K. Method of Computer-Aided Fault Tree Analysis for High-Reliable and Safety Design[J]. IEEE Transactions on Reliability, 2016, 65(2):687–703.
Gao Y, Gonzalez V A, Yiu T W. The effectiveness of traditional tools and computer-aided technologies for health and safety training in the construction sector: A systematic review[J]. Computers & Education, 2019, 138(SEP.):101–115.
Theodoridis, Y. Ten Benchmark Database Queries for Location-based Services[J]. The Computer Journal, 2018, 46(6):713–725.
Hazrati M K, Erfanian A. An online EEG-based brain-computer interface for controlling hand grasp using an adaptive probabilistic neural network.[J]. Medical Engineering & Physics, 2010, 32(7):730–739.
Park S, Hong I, Park J. An Energy-Efficient Embedded Deep Neural Network Processor for High Speed Visual Attention in Mobile Vision Recognition SoC[J]. IEEE Journal of Solid-State Circuits, 2016, 51(10):2380–2388.
Hou, Z. K., Cheng, H. L., Sun, S. W., Chen, J., Qi, D. Q., Liu, Z. B. (2019) Crack propagation and hydraulic fracturing in different lithologies. Applied Geophysics, 16(2), 243–251.
Pucciani G, Domenici A, Donno F. A performance study on the synchronisation of heterogeneous Grid databases using CONStanza[J]. Future Generation Computer Systems, 2010, 26(6):820–834.
Cheng, H., Wei, J., Cheng, Z. (2022). Study on sedimentary facies and reservoir characteristics of Paleogene sandstone in Yingmaili block, Tarim basin. Geofluids, 2022.
Stosovic M A, Dimitrijevic M, Litovski V. Computer Security Vulnerability as Concerns the Electricity Distribution Grid[J]. Applied Artificial Intelligence, 2014, 28(4–6):323–336.
Muralidhar K, Parsa R, Sarathy R. A General Additive Data Perturbation Method for Database Security[J]. Management Science, 2011, 45(10):1399–1415.
Kudo T, Takeda Y, Ishino M. An Implementation of Concurrency Control between Batch Update and Online Entries[J]. Procedia Computer Science, 2014, 35(2):1625–1634.
Han, J., Cheng, H., Shi, Y., Wang, L., Song, Y., Zhnag, W. (2016) Connectivity analysis and application of fracture cave carbonate reservoir in Tazhong. Science Technology and Engineering, 16(5), 147–152.
Marcozzi M, Vanhoof W, Hainaut J L. Relational symbolic execution of SQL code for unit testing of database programs[J]. ence of Computer Programming, 2015, 105(Jul.1):44–72.
BalaAnand M, Sivaparthipan C B. Security Privilege for Generating Session Key Using Selective Index for Passwords Validation[J]. Journal of Science and Innovative Engineering & Technology. 2013.
Cheng, H., Ma, P., Dong, G., Zhang, S., Wei, J., Qin, Q. (2022). Characteristics of Carboniferous Volcanic Reservoirs in Beisantai Oilfield, Junggar Basin. Mathematical Problems in Engineering, 2022.
Kundu A, Sural S, Majumdar A K. Database intrusion detection using sequence alignment[J]. International Journal of Information Security, 2010, 9(3):179–191.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.