Network Security Education with Machine Learning Optimization Xiaoyan Yao,Wei Liu Page: 37-43Access through login      Download:   23 times https://doi.org/10.6025/isej/2024/11/2/37-43 Abstract: The current network security environment is increasingly severe, and more than
static network protection mechanisms are needed to meet network security demands.
Dynamic intrusion detection methods can provide real-time protection and
detection for the network security environment. Therefore, this paper builds an
intrusion detection education based on the machine learning algorithm and random
forest and optimizes the model using the FSCA and TPE algorithms. Experimental
results show that the intrusion detection model in this study has higher detection
efficiency than other models and demonstrates strong adaptability, enabling rapid
identification of intrusion behaviors and timely response in different intrusion detection
environments, thereby improving the stability and practicality of the model.
Genetic Algorithm Model for Information Security Communication Miaomiao Fan Page: 44-51Access through login      Download:   17 times https://doi.org/10.6025/isej/2024/11/2/44-51 Abstract: With the increase in the scale and complexity of information communication networks,
the security of communication networks has become increasingly prominent,
making it a key research direction in communication network studies. In this
paper, a mathematical model for information communication is constructed, and a
genetic algorithm is introduced for model optimization. Experimental results show
that the genetic algorithm effectively enhances network reliability and significantly
reduces link costs. In the application experiments, this model can analyze the advantages
of different optimization paths and select the optimal solution based on
actual conditions, ensuring both network reliability and economy, and increasing
overall satisfaction with the network
A Brief Review of Blockchain Technology and Cryptocurrency Education Prathima D Page: 52-59Access through login      Download:   1 times https://doi.org/10.6025/isej/2024/11/2/52-59 Abstract: Blockchain is a record-keeping technology designed to make it impossible to hack
the system or forge the data stored on the blockchain, making it secure and
immutable. It’s a distributed ledger technology (DLT), a digital record-keeping system
for simultaneously recording transactions and related data in multiple places.A digital
currency is one in which transactions are verified, and records are maintained by a
de ce nt r ali se d syst em using crypt o grap hy rathe r th an a ce ntr ali se d
authority.”Decentralised cryptocurrencies such as bitcoin now provide an outlet for
personal wealth that is beyond restriction and confiscation” · “As bitcoin gains ground,
more companies have started accepting the cryptocurrency” ·