Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Development and application of biological intelligence technology in computer

View through CrossRef
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection system based on agent biological intelligence technology is proposed. The intrusion detection model is implemented based on commonly used traditional machine learning methods. According to the detection index data, the detection effect of each algorithm is analyzed. With the support of the overall structure of the system, analyze the control center, network host, partition control center, and Agent library; adopt corresponding response strategies according to the response rules in the response library, and use the communication module to timely judge whether the intrusion behavior is abnormal, using S5720S-28P-SI -AC24-port full-gigabit three-layer network management enterprise-level network core switch for data exchange; select AD2032 type alarm responder, which can monitor foreign intrusion; through V1.2 green computer information detector, system memory and drive disk All-round evaluation; analyze the realization mode, communication message format and communication protocol of the subject communication, design the data movement process based on the agent; realize the intrusion detection model with the help of the commonly used traditional machine learning method. According to the detection index data, the detection effect of each algorithm is analyzed. The experimental results show that, for the IDA system, when the first five clients suffer intrusion behavior, its detection function can check the abnormal situation in time. When the detection time is in the 40s, the detection accuracy is 70%. When the last five clients suffered intrusion behavior, their detection function was not perfect. When the detection time was 25s, the accuracy no longer increased, and the detection accuracy remained at 40% until 40s. When the first five clients of the Agent-based system suffer from intrusion, the detection accuracy is always high, up to 99%. When the last five clients suffer from intrusion, the detection accuracy can reach 95%. Therefore, the detection accuracy of this system is high. It is proved that the system has obvious advantages in terms of accuracy, which successfully proves that it can effectively solve the problem of network anomaly detection
Title: Development and application of biological intelligence technology in computer
Description:
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection system based on agent biological intelligence technology is proposed.
The intrusion detection model is implemented based on commonly used traditional machine learning methods.
According to the detection index data, the detection effect of each algorithm is analyzed.
With the support of the overall structure of the system, analyze the control center, network host, partition control center, and Agent library; adopt corresponding response strategies according to the response rules in the response library, and use the communication module to timely judge whether the intrusion behavior is abnormal, using S5720S-28P-SI -AC24-port full-gigabit three-layer network management enterprise-level network core switch for data exchange; select AD2032 type alarm responder, which can monitor foreign intrusion; through V1.
2 green computer information detector, system memory and drive disk All-round evaluation; analyze the realization mode, communication message format and communication protocol of the subject communication, design the data movement process based on the agent; realize the intrusion detection model with the help of the commonly used traditional machine learning method.
According to the detection index data, the detection effect of each algorithm is analyzed.
The experimental results show that, for the IDA system, when the first five clients suffer intrusion behavior, its detection function can check the abnormal situation in time.
When the detection time is in the 40s, the detection accuracy is 70%.
When the last five clients suffered intrusion behavior, their detection function was not perfect.
When the detection time was 25s, the accuracy no longer increased, and the detection accuracy remained at 40% until 40s.
When the first five clients of the Agent-based system suffer from intrusion, the detection accuracy is always high, up to 99%.
When the last five clients suffer from intrusion, the detection accuracy can reach 95%.
Therefore, the detection accuracy of this system is high.
It is proved that the system has obvious advantages in terms of accuracy, which successfully proves that it can effectively solve the problem of network anomaly detection.

Related Results

Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
A measurement framework of crowd intelligence
A measurement framework of crowd intelligence
Purpose The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects a...
Application Prospect of Artificial Intelligence in Computer Network Technology
Application Prospect of Artificial Intelligence in Computer Network Technology
 With the continuous development of artificial intelligence technology, its application prospects in computer network technology are gradually showing. In the introduction, the res...
Human Intelligence to Artificial Intelligence: Critical thinking and Emotional Intelligence
Human Intelligence to Artificial Intelligence: Critical thinking and Emotional Intelligence
Artificial Intelligence may be it is branch of computing. The computer science engineering is creating intelligent machines and especially intelligent computer programs. AI could a...
Student Teachers, Computer Anxiety and Computer Experience
Student Teachers, Computer Anxiety and Computer Experience
Recent research has demonstrated the debilitating effect of computer anxiety on achievement in computer related learning. As controversy exists over the merits of increasing experi...
The Role of Computer Deception in Network Security
The Role of Computer Deception in Network Security
With the rapid development of Internet technology, computer has become an indispensable part of modern society. However, with the popularization of computer technology, the problem...
Research on Information Technology Teaching under the Background of Artificial Intelligence
Research on Information Technology Teaching under the Background of Artificial Intelligence
Modern science network technology and artificial intelligence have achieved rapid development in a short period of time, and have become the most critical scientific and technolog...

Back to Top