• Oct 09, 2025 News!The papers published in Vol. 17, No. 3 has been registered with CNKI.   [Click]
  • Sep 28, 2025 News!Vol.17, No. 3 has been published with online version.   [Click]
  • Jul 03, 2025 News!The papers published in Vol. 17, No. 1-2 have been registered with CNKI.   [Click]
General Information
    • ISSN: 1793-8236 (Online)
    • Abbreviated Title Int. J. Eng. Technol.
    • Frequency:  Quarterly 
    • DOI: 10.7763/IJET
    • APC: 500 USD
    • Managing Editor: Ms. Shira. Lu 
    • Abstracting/ Indexing: Inspec (IET), CNKI Google Scholar, EBSCO, Crossref, Ulrich Periodicals Directory, Chemical Abstracts Services (CAS), etc.
    • E-mail: ijet_Editor@126.com
IJET 2025 Vol.17(4): 194-198
DOI: 10.7763/IJET.2025.V17.1326

Exploration of Key Technologies for Network Security Monitoring Based on Distributed Artificial Intelligence

Qu Hongfeng 1, Xuan Yang 1, and Sun Shuo 2
1. Guangxi Vocational & Technical College, Nanning, Guangxi, 5302262, China
2. Dalian Jiaotong University, Dalian, Liaoning, 116028, China
Email: 784701970@qq.com (X.Y.)
*Corresponding author

Manuscript received May 14, 2025; accepted August 4, 2025; published October 24, 2025.

Abstract—In order to explore the key technology of network security monitoring based on distributed artificial intelligence, the method of combining theory with practice is adopted, based on the relevant overview of distributed artificial intelligence, the application of distributed artificial intelligence in network security monitoring is analyzed, and the application effect is discussed with the practical cases. The analysis results show that the network security monitoring technology based on distributed artificial intelligence can accurately monitor complex network security attacks through distributed architecture, multi-source data integration, real-time monitoring, and collaborative work, etc. The monitoring results can provide necessary references and guidance for the solution and treatment of security risks, so as to improve the level of network security protection.

Keywords—distributed artificial intelligence, network security monitoring, system architecture, distributed data acquisition

Cite:  Qu Hongfeng, Xuan Yang, and Sun Shuo, "Exploration of Key Technologies for Network Security Monitoring Based on Distributed Artificial Intelligence," International Journal of Engineering and Technology, vol. 17, no. 4, pp. 194-198, 2025.

Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Copyright © 2009-2025. International Journal of Engineering and Technology. Unless otherwise stated. 
E-mail: ijet_Editor@126.com