{"title":"Research on Smart Contract Vulnerability Detection Method of Power Equipment Based on Deep Learning Algorithm","authors":"Liang Zhang, Yuan Fang, Yuexin Shen, Xiyin Wang","doi":"10.1109/ICOCWC60930.2024.10470681","DOIUrl":null,"url":null,"abstract":"With the rapid development of information technology, the problem of network security has become increasingly prominent. Camouflage intrusion, as a common means of network attack, has strong concealment and destructiveness, which brings great security threats to enterprises and organizations. In order to effectively deal with camouflage intrusion, more and more researchers apply machine learning and data mining technology to the field of intrusion detection. Among them, Random Forest (RF) algorithm, as an ensemble learning algorithm, has the advantages of high accuracy and low complexity, and has been widely concerned. However, the traditional RF algorithm still has some problems when dealing with camouflage intrusion detection, such as single feature selection, strong correlation between base classifiers and so on","PeriodicalId":518901,"journal":{"name":"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)","volume":"52 3","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCWC60930.2024.10470681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid development of information technology, the problem of network security has become increasingly prominent. Camouflage intrusion, as a common means of network attack, has strong concealment and destructiveness, which brings great security threats to enterprises and organizations. In order to effectively deal with camouflage intrusion, more and more researchers apply machine learning and data mining technology to the field of intrusion detection. Among them, Random Forest (RF) algorithm, as an ensemble learning algorithm, has the advantages of high accuracy and low complexity, and has been widely concerned. However, the traditional RF algorithm still has some problems when dealing with camouflage intrusion detection, such as single feature selection, strong correlation between base classifiers and so on