Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation
DOI:
https://doi.org/10.13052/jcsm2245-1439.1336Keywords:
Partial differential equation, image matching, network security, intelligent early warning systemAbstract
In order to effectively avoid network information leakage and computer network paralysis, and improve the ability of computer network security early warning, it is necessary to design a computer network security intelligent early warning system based on network behavior. Security warning is considered as the second defense mechanism behind the firewall. It can monitor and warn the network without affecting the network performance, so as to provide real-time protection for external attacks, internal attacks and misoperations, and improve the network security. This paper designs an intelligent early warning system for network security based on partial differential equation image matching technology. The system adopts B/S development mode, and the server and browser are located in the campus network. Data fusion technology is used to assess network security, predict potential threats, and add new intrusion features to the feature database for subsequent use. In this paper, a target matching algorithm based on partial differential equation is proposed by using partial differential equation. The algorithm calculates the phase difference through the algebraic combination of orthogonal filter outputs. For scenes with continuous disparity changes, the error matching rate of this algorithm is lower than that of Michael Bleyer algorithm and vertical constraint algorithm. In general, the disparity map generated by this algorithm has high matching accuracy. The results show that the distribution of alarm information is reasonable and in line with the actual situation.
Downloads
References
Yi M, Xu X, Xu L. An intelligent communication warning vulnerability detection algorithm based on iot technology. IEEE Access, 2019, 7(99), 164803–164814.
Behi M, Ghasemigol M, Vahdat N H. A new approach to quantify network security by ranking of security metrics and considering their relationships. International Journal of Network Security, 2018, 20(1), 141–148.
Vajjha H, Sushma, P. Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 2021, 64(2), 1–8.
Einy S Oz C, Navaei Y D. The anomaly- and signature-based ids for network security using hybrid inference systems. Mathematical Problems in Engineering, 2021, 2021(9), 1–10.
Lin P, Chen Y. Network security situation assessment based on text simhash in big data environment. International Journal of Network Security, 2019, 21(4), 699–708.
Li Y, Hua N, Li J, Zhong Z, Zheng X. Optical spectrum feature analysis and recognition for optical network security with machine learning. Optics Express, 2019, 27(17), 24808.
Yu J, Hu M, Wang P, Sundhararajan M, Gao X. Z, Nejad H. V. Evaluation and reliability analysis of network security risk factors based on d-s evidence theory. Journal of Intelligent & Fuzzy Systems, 2018, 34(2), 861–869.
Zhao D, Song H, Li H. Fuzzy integrated rough set theory situation feature extraction of network security. Journal of Intelligent and Fuzzy Systems, 2021, 40(1), 1–12.
Wu D. A network security posture assessment model based on binary semantic analysis. Soft Computing, 2022, 26(20), 10599-10606.
Jiang C. Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022, 2022(3), 1–6.
Kou G, Wang S, Tang G. Research on key technologies of network security situational awareness for attack tracking prediction. Chinese Journal of Electronics, 2019, 28(01), 166–175.
Wang Z, Fang B. Correction to: application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. The Journal of Supercomputing, 2019, 75(9), 5965–5965.
Tang D, Jing W, Ma J, Zhou B, Qian L J. Design of high average power opcpa based on simultaneous temperature and wavelength insensitive phase-matching. IEEE Photonics Journal, 2018, 2018(99), 1–1.
Hong B W, Zhi L Z, Hua F L. Image-text cross-modal matching method based on stacked cross attention. Journal of Signal Processing, 2022, 38(2), 285–299.
Yang J, Wen C K, Ji S, Gao F. Beamspace channel estimation in mmwave systems via cosparse image reconstruction technique. Communications, IEEE Transactions on, 2018, 66(10), 4767–4782.
Yan, J H, Wang, J C, Zhang Y. Remore sensing image quality assessment based on the ratio of spatial feature weighted mutual information. Journal of Imaging Science and Technology, 2018, 62(2), 20505.1–20505.12.
El H H M, El R W. A, El S W, El R E, Mahmoud K R, El S F A. Optimal multi-scale geometric fusion based on non-subsampled contourlet transform and modified central force optimization. International journal of imaging systems and technology, 2019, 29(1), 4–18.
Liu F, Yang J, Liu Y, Li H. Digital image correlation with topology-based matching algorithm on dots pattern and its application in large deformation measurement of nitrile–butadiene rubber. Measurement Science and Technology, 2021, 32(10), 105026.
Jan J B, Ahmadi V, Fathi D. Low-voltage electrically-induced second harmonic generation in a silicon waveguide based on modal phase matching. Journal of Lightwave Technology, 2020, 38(22), 6272–6279.
Zhang B, Long H, Jiang F. Optical image encryption algorithm based on coherent superposition and equal modulus vector decomposition. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2018, 40(2), 438–446.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.