An Evolutionary Multi-objective Approach for Modelling Network Security

نویسندگان

  • Seyed Mahmood Hashemi
  • Jingsha He
چکیده

Security is the most important issue in a network system. Administrators can more easily understand threats to the network by using a model. In this paper, we present an approach for modelling a network that considers the benefits of the network as well as its limitations. In our approach, we model the system as an optimization problem, which is solved using three algorithms. As the proposed approach is stochastic, it works very efficiently in a network environment. This paper, presents a mathematical model of the system. Model provides easy comprehend of system. Presented model is based on multi-objective optimization problem. One parameter in the presented model is security and another parameter is user productivity. Security is the most important issue in a network system. Administrators can more easily understand threats to the network by using a model. In this paper, we present an approach for modelling a network that considers the benefits of the network as well as its limitations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A multi-objective evolutionary approach for integrated production-distribution planning problem in a supply chain network

Integrated production-distribution planning (PDP) is one of the most important approaches in supply chain networks. We consider a supply chain network (SCN) to consist of multi suppliers, plants, distribution centers (DCs), and retailers. A bi-objective mixed integer linear programming model for integrating production-distribution designed here aim to simultaneously minimize total net costs in ...

متن کامل

Presenting an evolutionary improved algorithm for the multi-objective problem of distribution network reconfiguration in the presence of distributed generation sources and capacitor units with regard to load uncertainty.

Reconfiguration of distribution network feeders is one of the well-known and effective strategies in the distribution network to obtain a new optimal configuration for the distribution feeders by managing the status of switches in the distribution network. This study formulates the multi-objective problem of reconfiguration of a distribution network in the optimal presence of distributed genera...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

An Approach to Reducing Overfitting in FCM with Evolutionary Optimization

Fuzzy clustering methods are conveniently employed in constructing a fuzzy model of a system, but they need to tune some parameters. In this research, FCM is chosen for fuzzy clustering. Parameters such as the number of clusters and the value of fuzzifier significantly influence the extent of generalization of the fuzzy model. These two parameters require tuning to reduce the overfitting in the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017