Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on the Application of Artificial Intelligence Technology in the Field of Network Security

Download as PDF

DOI: 10.23977/jaip.2023.060604 | Downloads: 21 | Views: 372

Author(s)

Yang Zhang 1

Affiliation(s)

1 Shanghai Xingwei College, Shanghai, 201300, China

Corresponding Author

Yang Zhang

ABSTRACT

As an important component of national security, cyberspace security is facing increasingly severe and complex security threats. Cyber security attacks are becoming increasingly large-scale and automated. Security detection needs are expanding from point to area, and network security defense needs are transforming from passive to active. Wider areas of attack, stronger network attackers, and more passive defense methods require people to find network security defense strategies that are different from traditional methods. The application of AI (Artificial Intelligence) technology in the field of network security is an innovation in the traditional network security system, which has important guiding significance for further strengthening network security construction. The use of AI technology to enhance internet defense capabilities and enhance network security is widely anticipated. After using AI technology, network data can be monitored. During the process of network information monitoring, risky data will be prohibited from accessing and alarm messages will be issued to computer users, effectively avoiding the invasion of unknown threats and ensuring the security of internal computer information.

KEYWORDS

Artificial intelligence technology; Network security field; Application

CITE THIS PAPER

Yang Zhang, Research on the Application of Artificial Intelligence Technology in the Field of Network Security. Journal of Artificial Intelligence Practice (2023) Vol. 6: 24-28. DOI: http://dx.doi.org/10.23977/jaip.2023.060604.

REFERENCES

[1] Zhan K. Design of computer network security defense system based on artificial intelligence and neural network [J]. Journal of Intelligent and Fuzzy Systems, 2021, 46(9):1-13. 
[2] Guang L F, Lin Z. Analysis of the Application of Artificial Intelligence in Library Computer Network Security [J]. Value Engineering, 2019, 46(18):31-38. 
[3] Hua T L L. Computer network security technology based on artificial intelligence [J]. Journal of intelligent & fuzzy systems: Applications in Engineering and Technology, 2019, 37(5):46-57. 
[4] Lina L, Liying W, Wenxin L. Research on Artificial Intelligence Technology for Network Security[J]. Modern Information Technology, 2022, 25(14):18-24. 
[5] Xie L, Hang F, Guo W, et al. Network security defence system based on artificial intelligence and big data technology [J]. International journal of high performance systems architecture, 2021, 22(34):10-19. 
[6] Veiga A P. Applications of Artificial Intelligence to Network Security [J]. 2022, 44(20):26-41. 
[7] Zhang S, Zhu D. Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities [J]. Computer Networks, 2020, 183(4):10-16. 
[8] Wang Z, Fang B. Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism [J]. The Journal of Supercomputing, 2019, 75(9):5965-5975. 
[9] Yong Q L. Application Analysis of Artificial Intelligence in Library Network Security [J]. Journal of Physics: Conference Series, 2021, 1744(3):21-26. 
[10] Wenjuan H. Application of Artificial Intelligence Technology in Network Security Defense of Big Data [J]. China Computer & Communication, 2021, 33(10):16-24. 
[11] Juan Z. The Application of Artificial Intelligence in Library Network Security [J]. China Computer & Communication, 2019, 42(17):61-72. 
[12] Haolin X. The Effective Application of Artificial Intelligence in Computer Network Technology [J]. China Computer & Communication, 2022, 12(12):16-23.

Downloads: 6176
Visits: 184680

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.