I. Introduction
In continuously updated network technology, network security issues become the main factors influencing the social economy and residents' life, the root cause of this phenomenon lies in the network space to exist the food words, this leads to some individuals or organizations using a small amount of resources, casual destruction individuals or the public's right to privacy, such not only can not guarantee the safety of the public service system, It will also affect the stability of the order in cyberspace. In the face of this phenomenon, artificial intelligence technology, as an emerging technical concept, has gradually begun to be applied and popularized in cyberspace security defense, which plays a positive role in the development of the network. To put it simply, artificial intelligence technology is a new network technology developed based on human brain activity. It can not only fully grasp the rules and characteristics of human activities, but also complete intelligent behavior operation under the guidance of computer technology. [1]–[3] As a brand-new research field, network space also has unique development rules. Please include relatively rich data information, which belongs to the technical function of using technology to defend and protect the overall system platform under the state of network operation. With artificial intelligence technology as the core content of the network security defense very much, such as intelligent as the current most common network defense firewall technology, practical application of the technology type is very rich, but the actual application effect is not ideal, so the development of firewall technology, artificial intelligence inevitably can breakthrough the limitation of the traditional firewall technology, The defense work in cyberspace should be controlled intelligently, so as to master more valuable data information in decision-making statistical analysis, and fully display the application role of intelligent research and control. At the same time, can also open the network security access and control defense program, in order to block malicious attacks and intrusion viruses outside; Intrusion detection technology belongs to the monitoring link of network security defense. It can supervise the network operating environment and related information and discover the security risks in time. According to the intrusion detection structure diagram shown in Figure 1 below, network security access and control defense programs can be opened to block external malicious attacks and invasive virus. Intrusion detection technology belongs to the monitoring link in the network security defense, which can supervise the network operation environment and relevant information, and discover the hidden security risks in time. The specific structure is shown in Figure 1 below. Intrusion monitoring technology with artificial intelligence as the core is the most common form of security defense at the present stage. It has a very wide development space and can accurately and rapidly monitor dangerous intrusion, so as to comprehensively protect network operation security. In addition, the intelligent intrusion monitoring technology can coordinate the operation of the system to ensure its stability and security during the operation. Expert system is a relatively mature artificial intelligence technology. It mainly uses the knowledge base and reasoning mechanism in the system to simulate experts in a certain field to complete decision-making control, and puts forward reasoning solutions consistent with the expert level according to the relevant field knowledge. According to the analysis of the expert system structure diagram shown in Figure 2 below, the intelligent intrusion monitoring technology can also coordinate the operation of the system to ensure its stability and safety during the operation. The expert system belongs to the relatively mature artificial intelligence technology. It mainly uses the knowledge base and reasoning institutions in the system to simulate the experts in a certain field to complete the decision-making control, and will put forward the reasoning answers consistent with the expert level according to the knowledge of the relevant fields. The specific structure is shown in Figure 2 below. In cyberspace security defense, expert system can not only enhance their own security, but also ensure that all decisions have the characteristics of intelligence and automation. This paper mainly studies the application of mimicry defense technology in cyberspace security, focusing on exploring the basic principles and aggressiveness of active defense, so as to clarify the importance of artificial intelligence technology in cyberspace security defense [4]–[6].
Structure diagram of intrusion detection
Structure diagram of expert system