Paper
15 January 2025 Design and implementation of network security defense system based on deep learning
Yang Gao, Xuezhong Lu, Gulixiati Abulikenmu, Xuefei Su
Author Affiliations +
Proceedings Volume 13516, Fourth International Conference on Network Communication and Information Security (ICNCIS 2024); 1351614 (2025) https://doi.org/10.1117/12.3052142
Event: International Conference on Network Communication and Information Security (ICNCIS 2024), 2024, Hangzhou, China
Abstract
With the growing popularity of the Internet and digital technology, network security threats are increasing, and people's demand for advanced security defense means is rising. By combining advanced deep learning algorithms, AI based network security defense systems can provide real-time, automated threat detection and response. They can not only detect known threat patterns, but also learn to identify new and unknown attack techniques. Based on the requirements of computer network security, this article designs a computer network security protection system. The system applies an artificial intelligence analysis engine and combines hardware and software design optimization to achieve multi-level security protection measures. After testing, the system has high capabilities in data capture rate, restoration rate, data encryption and protection, and can provide an effective solution for the security protection of computer networks.
(2025) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yang Gao, Xuezhong Lu, Gulixiati Abulikenmu, and Xuefei Su "Design and implementation of network security defense system based on deep learning", Proc. SPIE 13516, Fourth International Conference on Network Communication and Information Security (ICNCIS 2024), 1351614 (15 January 2025); https://doi.org/10.1117/12.3052142
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Deep learning

Computer security

Design

Data modeling

Feature extraction

Defense and security

Back to Top