With the development of network security technology, the situation of network intrusion is becoming increasingly serious. Traditional network intrusion detection methods have the problem of low detection efficiency and the lack of encryption processing in detection rules, which may be cracked by attackers. In order to improve the intrusion detection ability of frequent data transmission in the network, In this paper, a federated learning method based on blockchain technology is proposed, which uses blockchain technology, chain data structure and data block rules to verify the relevant information in passwords, and inserts password strings in multiple blocks to improve the intrusion detection ability of network information. At the same time, this paper analyzes the reasons of information theft and interference, summarizes the characteristics of network intrusion, puts forward the design idea of integrating blockchain technology, and verifies the correctness of this processing method, the fitting of network data and the degree of intrusion detection through actual cases. MATLAB simulation results show that the federated learning method has better network intrusion ability, the intrusion detection degree is over 90%, and the intrusion detection ability rises first and then declines, the overall index is better than the online monitoring method. Therefore, the fusion of blockchain and federated learning method proposed in this paper is suitable for the optimization of network intrusion monitoring. There are still some shortcomings in this research, mainly because there are few research materials related to blockchain technology, which leads to less research data in this paper, and more data will be collected for analysis in the future.
In recent years, with the rapid development of technology fields such as big data, cloud computing, Internet of Things, and mobile Internet, security incidents such as network attacks and data information leakage have occurred frequently, which shows that the current information system falls in the serious security situation, and methods relying on the traditional security protection mechanism to ensure information security has gradually become inadequate. Compared with other software languages, Java language is widely used in the development of large-scale business systems due to its high access, concurrency, and clustering. Source code is the basic element of building a business application system, and logic vulnerabilities or nonstandard programming in code are the roots of application security events. This paper proposes a source code security defect assessment method based on the entropy weight method by deeply analyzing the Java source code security defect detection and repair methods.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.