Improved PSO-FNN for Network Security Node Optimization
Abstract
The network operation data contains a large amount of non-digital information; the traditional neural network cannot be used directly to obtain the network security situation. Reverse propagation due to its inherent shortcomings, neural network structure is often slow training speed, low learning efficiency, prediction accuracy is not high, so it does not meet the fuzzy layer centre of a fuzzy neural network to realize the clustering of input samples and determine the membership centre of the fuzzy neural network, and finally optimize the fuzzy neural network, get the PSO-FNN model, and the model is applied to the acquisition of network security elements. When the particle number starts at N=5, the number of particles, detection rate begins to increase gradually, When N=30, The detection rate reaches 83.856%, Time-consuming is about 308.13s. The rapid evolution of network technology has introduced unprecedented challenges in ensuring network security. As cyber threats become more dynamic and sophisticated, the need for robust and efficient solutions to optimize security nodes within networks is critical. In this context, this study proposes an improved model that integrates Particle Swarm Optimization (PSO) with Fuzzy Neural Networks (FNN), termed as PSO-FNN. This model aims to enhance detection accuracy and computational efficiency by leveraging the optimization capabilities of PSO for feature selection and parameter tuning, thereby addressing the limitations of traditional network security optimization techniques.DOI:
https://doi.org/10.31449/inf.v49i23.7503Downloads
Additional Files
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







