Abstract
Security defect detection is a dynamic security protection technology, which can defend against internal and external attacks of network media information. Based on this, a detection method for media information security defect based on genetic algorithm is studied. The distribution model of media information security defect in complex network environment is constructed by signal processing method. The threat index and host threat index which affect media information security in network attack environment are simulated by ARMA model. The defect index of media information security is obtained, which is defined as media information invaded by virus when the index is higher than the set threshold. The weights of the neural network are transformed into genetic neural network to detect the relevance of the extracted virus-invaded media information stream, and the membership characteristics of the media information infected by the virus are obtained. Based on this, the security defects of the media information can be judged and the accurate detection of the media information security defects can be realized. The simulation results show that the method can effectively detect the defects of media information security, and the detection accuracy rate reaches more than 90%, which is significantly better than the contrast method.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13204-021-02137-3/MediaObjects/13204_2021_2137_Fig8_HTML.png)
Similar content being viewed by others
References
Arutyunov VV (2017) On the international research-to-practice conference on modern problems and tasks of information-security assurance (SIB’2017). Sci Tech Inf Process 44(3):170–174
Bom LI, Wang YX, Gao XG (2017) Research on fuzzy proportional guidance law of air-to-ground attack based on genetic algorithm. Acta Armamentarii 38(10):1950–1956
Chen Z, Han D, Qiu L (2017) Research on the performance of cooperation communication system based on indoor double media with wireless channel and power line. Proc Csee 37(9):2589–2598
Gao W, Yel G, Baskonus HM, Cattani C (2020) Complex solitons in the conformable (2+1)-dimensional Ablowitz-Kaup-Newell-Segur equation. AIMS Math 5(1):507–521
Hou D, Han Y, Ma J (2018) Research and application of information security technology in new energy vehicle based on mobile internet. IOP Conf Ser Mater Sci Eng 394(4):042007
Huang YC, Dai X, Zou Y (2017) Parameters design for IPT system based on NSGA-II multi-objective optimization algorithm. J Power Supply 15(4):65–71
Huang H, Xu L, Chen C (2018) Individual tree crown detection and delineation from very-high-resolution UAV images based on bias field and marker-controlled watershed segmentation algorithms. IEEE J Sel Top Appl Earth Observ Remote Sens 11:2253
Kim YW, Cho N, Jang HJ (2018) Trends in research on the security of medical information in Korea: focused on information privacy security in hospitals. Healthc Inform Res 24(1):61–68
Li Z, Chen K (2018) Research on timing optimization of reginal traffic signals based on improved genetic algorithm. IOP Conf Ser Mater Sci Eng 423(1):012191
Lin DS, Ding F (2017) Research on transmission of technology of downward information security for wellbore trajectory control. EURASIP J Inf Secur 2017(1):17
Sengupta A, Kundu S (2017) Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions. IEEE Trans Very Large Scale Integr Syst 25(12):3265–3267
Shangdong L, Ye WU, Yimu JI (2019) Research on security of key algorithms in intelligent driving system. Chin J Electron 28(01):33–42
Shen XD, Hou M, Li QH (2018) Improving available energy of battery packs by genetic algorithm. Chin J Power Sour 42(7):974–976
Shi K (2017) Research on the network information security evaluation model and algorithm based on grey relational clustering analysis. J Comput Theor Nanosci 14(1):69–73
Tello G, Al-Jarrah OY, Yoo PD (2018) Deep-structured machine learning model for the recognition of mixed-defect patterns in semiconductor fabrication processes. IEEE Trans Semicond Manuf 31:315
Xu Y, Wu Z, Liu W (2017) Simulation research on service information security detection on cloud platform. Comput Simul 34(12):370–373
Yang Q (2018) Bearing fault detection algorithm based on Morlet wavelet and multi-mode kernel optimized by genetic algorithm. J Jilin Univ (science edition) 56(1):101–108
Yaqian LI, Jia L, Haibin LI (2018) Research on target tracking algorithm from fisheye camera based on compressive sensing. J Electron Inf Technol 40(5):1242–1249
Yufeng L, Wei H (2017) Research on SAR image change detection algorithm based on hybrid genetic FCM and image registration. Multimed Tools Appl 76(13):15137–15153
Yunjuan SUN (2017) Research on fabric image defect detection based on double chaotic mechanism particle swarm optimization. Wool Textile J 45:80–85
Zhao Z (2018) Research on energy saving design of intelligent building based on genetic algorithm. Wireless Pers Commun 102(3):1–9
Zhao LJ, **a RY, Yang Y (2018) Research on numerical simulation of karst conduit media based on CFP: a case study of Zhaidi karst underground river subsystem of guilin. Acta Geosci Sinica 39(2):225–232
Zhu XL (2018) Application of dynamic ant algorithm-genetic algorithm in coal transportation. Autom Instrum 38(9):180–181
Zhu YH, Liu DN (2018) Simulation research on automatic recommend algorithm for internet of things users query target. J China Acad Electron Inform Technol 13(5):551–554
Acknowledgements
Research project of Hospital (T.C.M) Affiliated to Southwest Medical University: hospital micro-video transmission mode and effect analysis; Luzhou soft science research project—current situation of hospital image micro-video communication and optimization strategy analysis (No. 19RKX0006).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare they have no conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, F. Research on defect detection of media information security based on genetic algorithm. Appl Nanosci 13, 2439–2447 (2023). https://doi.org/10.1007/s13204-021-02137-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13204-021-02137-3