z-logo
open-access-imgOpen Access
RETRACTED: Application Analysis of Artificial Intelligence Technology in Computer Information Security
Author(s) -
Qiushi Ren
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1744/4/042221
Subject(s) - computer science , schema (genetic algorithms) , computer security , firewall (physics) , intrusion detection system , information security , network security , security information and event management , the internet , field (mathematics) , information security management , cloud computing security , world wide web , information retrieval , cloud computing , physics , schwarzschild radius , mathematics , classical mechanics , gravitation , pure mathematics , charged black hole , operating system
With the rapid development of computerization of the network, the internet has brought an unprecedented amount of information to people and the security of computer information has become increasingly prominent. As a way to solve computer information security issues, artificial intelligence has attracted a lot of attention in recent years. Thus, through a survey, some citizens were surveyed so that people have a more realistic understanding of information security when using computers. Based on the research results, a new information security system based on artificial intelligence is proposed. Two important features have been added to the new system: intrusion detection and intelligent firewall. It efficiently detects and handles related behaviors that can impair system operation over time, protecting against advanced and complex viruses on a computer network. In addition, this article uses data mining technology and data fusion technology to strengthen the application of computer network security management. Based on the objectives of calculating information security, the safety test and the performance analysis of the schema are provided to prove the accuracy and validity of the schema. Experimental results show that the information security solutions proposed in this article effectively protect users’ information, respond to information security issues in a timely manner, and respond approximately 50% faster, providing an important reference for the use of artificial intelligence in the Field of Security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here