Evaluation of Network Connection Credibility based on Neural Network

This paper presents an innovative method to evaluate the credibility of network connections based on neural network with back propagation (BP) network model and Levenberg-Marquardt (LM) optimization algorithm. In it, the second-level index values are taken as input and expected evaluation values as output, based on which, L test samples are used to test the trained neural network. At last, a prediction is made to evaluate the current connection credibility according to the trained neural network and corresponding security strategies are adopted on the basis of the evaluation values. It is shown that the nonlinear relationship between the attributes and the credibility of network connections can be established by training neural-network using LM algorithm. Simulation results indicate this method could achieve high evaluation accuracy.

[1]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[2]  Peng Xue Research on Trustworthy Networks , 2005 .

[3]  Michael Atighetchi,et al.  Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[4]  Tian Li,et al.  A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network , 2007 .

[5]  Jiqiang Liu,et al.  Study of Remote Automated Anonymous Attestation in Trusted Computing: Study of Remote Automated Anonymous Attestation in Trusted Computing , 2009 .

[6]  Liu Ji Study of Remote Automated Anonymous Attestation in Trusted Computing , 2009 .

[7]  Hong Zhang,et al.  Study on the Improved BP Algorithm and Application , 2009, 2009 Asia-Pacific Conference on Information Processing.

[8]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[9]  Jun Chen,et al.  Research on Trust Model Based on Behavior and Trusted Computing , 2010 .

[10]  Qiang Huang,et al.  A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform: A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform , 2010 .

[11]  Lu Chen,et al.  Research on Trusted Network Connection: Research on Trusted Network Connection , 2010 .

[12]  Zhang Xing A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform , 2010 .