Wi-Fi security evaluation model based on BP neural network
Contents Papers|更新时间:2024-06-05
|
Wi-Fi security evaluation model based on BP neural network
Journal on CommunicationsVol. 37, Issue Z1, Pages: 50-56(2016)
作者机构:
1. 北京信息科技大学信息安全系,北京 100192
2. 北京北大方正电子有限公司,北京 100085
作者简介:
基金信息:
High Level Talents Cross Training “Tranining Plan”(Rearch) Project(5111623601);The National Natural Science Foundation of China(61370139);The Social Science Foundation of Beijing(15JGB099)
Hai-yan KANG, Han YAN, Hao-ran HUANG, et al. Wi-Fi security evaluation model based on BP neural network[J]. Journal on Communications, 2016, 37(Z1): 50-56.
DOI:
Hai-yan KANG, Han YAN, Hao-ran HUANG, et al. Wi-Fi security evaluation model based on BP neural network[J]. Journal on Communications, 2016, 37(Z1): 50-56. DOI: 10.11959/j.issn.1000-436x.2016247.
Wi-Fi security evaluation model based on BP neural network
A Wi-Fi security evaluation model was proposed based on BP neural network.Firstly a large number of Wi-Fi hotspots was analyzed
safety information sources about wireless hotspots were selected.Secondly
a model of BP neural network was constructed
the weights were adjusted
and the evaluation system for Wi-Fi safety was formed
which was higher credibility.Finally
on the Android flatform the application based on above theory was designed.A lot of experi-ments show the model is able to scan and evaluate the wireless hotspot around user.It can also provide the disconnect function on unsafe wireless hotspot.
CHEN J , LI H W , ZHANG X Y , et al . Joint adaptation algorithm of rate,mode and channel for IEEE 802.11n [J ] . Journal of Software , 2015 , 26 ( 1 ): 98 - 108 .
孙全富 . 无线局域网数据加密和接入认证机制安全性研究 [D ] . 新疆大学 , 2013 .
SUN Q F . Research on data encryption and access authentication mechanism in wireless local area network security [D ] . Xinjiang Uni-versity , 2013 .
WANG T , ZHANG L S , GAO Y . Abnormality identification of large-span arch bridge based on BP neural improved novelty detection technique [J ] . Journal of Beijing Institute of Technology , 2016 , 36 ( 2 ): 157 - 162 .
LV H F , GU X S . A two level information fusion algorithm based on ant colony neural network [J ] . Journal of Shanghai Jiao Tong Univer-sity , 2016 , 50 ( 8 ): 1323 - 1330 .
TAO Y , TIAN Y H . Application of multilevel extension assessment method in network security evaluation [J ] . Journal of Jilin University (Information Science Edition) , 2013 , 31 ( 1 ): 95 - 100 .
HUANG L , FENG D G , LIAN Y F , et al . Method of DDoS counter-measure selection based on multi-attribute decision making [J ] . Journal of Software , 2015 , 7 : 1742 - 1756 .
Android.net.Wi-Fi包ScanResult类中Wi-Fi无线热点信息 [EB/ OL ] . http://developer.android.com http://developer.android.com .
Android.net.Wi-Fi package ScanResult class Wi-Fi wireless hotspot information [EB/OL ] . http://developer.android.com http://developer.android.com .
Robert Hecht-Nielsen . Theory of the back propagation neural net-work[C]//The International Joint Conference on Neural Networks . 1989 : 593 - 605 .