Research On Intelligent Application of Machine Learning in Next Generation Computer Network

Authors

  • Yixiang Wang

DOI:

https://doi.org/10.54097/y4dpnd42

Keywords:

Intelligent application; Machine learning; Computer network; Network traffic management; Network security protection; Network resource allocation.

Abstract

As a branch of AI, machine learning (ML) provides a new idea of intelligent management for the next generation computer network with its powerful data processing and pattern recognition capabilities. ML monitors and dynamically adjusts the traffic allocation strategy in real time by establishing a model in network traffic management to avoid congestion. In terms of network security protection, ML realizes anomaly detection, attack behavior identification and adaptive protection, which improves the response ability to unknown threats. In the allocation of network resources, ML predicts traffic changes, supports personalized service recommendation, and enhances user experience and resource utilization efficiency. Although ML has a broad application prospect, the problems it faces, such as data privacy and security, algorithm selection and optimization, and interpretability, cannot be ignored. Therefore, this paper puts forward some countermeasures, such as ensuring data security, optimizing algorithm performance and improving algorithm transparency, to promote the effective application of ML in complex network environment, so as to build a more secure, stable and efficient next-generation computer network, which has important theoretical and practical significance.

Downloads

Download data is not yet available.

References

[1] Li, X., Hu, Z., Wang, H., Fu, Y., & Liu, P. (2020). Deepreturn: a deep neural network can learn how to detect previously-unseen rop payloads without using any heuristics. Journal of Computer Security, 28(5), 499-523.

[2] Wang, H., & Chen, G. (2023). Improving computer network security evaluation with grey relational analysis and probabilistic simplified neutrosophic sets. International journal of knowledge-based and intelligent engineering systems, 27(4), 425-436.

[3] Shen, G., & Li, X. (2023). A fuzzy group decision-making framework for computer network security evaluation with probabilistic linguistic information. International journal of knowledge-based and intelligent engineering systems, 27(3), 355-365.

[4] Gorbett, M., Siebert, C., & Shirazi, H. R. I. (2023). The intrinsic dimensionality of network datasets and its applications 1. Journal of computer security, 31(6), 679-704.

[5] Yang, W. H. (2020). Security detection of network intrusion: application of cluster analysis method. Computer Optics, 44(4), 660-664.

[6] Zhang, Y., Wang, H., & Stavrou, A. (2024). A multiview clustering framework for detecting deceptive reviews. Journal of computer security, 32(1), 31-52.

[7] Xu, S., Qian, Y., & Hu, R. Q. (2020). Edge intelligence assisted gateway defense in cyber security. IEEE Network, 34(4), 14-19.

[8] Yu, J., Peng, K., Zhang, L., & Xie, W. (2024). Image encryption algorithm based on dna network and hyperchaotic system. The Visual Computer, 40(11), 8001-8021.

[9] Liu, X., Xia, C., Wang, T., Zhong, L., & Li, X. (2020). A behavior-aware sla-based framework for guaranteeing the security conformance of cloud service. Frontiers of Computer Science, 14(6), 1-17.

Downloads

Published

18-05-2025

How to Cite

Wang, Y. (2025). Research On Intelligent Application of Machine Learning in Next Generation Computer Network. Highlights in Science, Engineering and Technology, 142, 55-60. https://doi.org/10.54097/y4dpnd42