{"title":"基于神经网络的网络安全预测与态势评估方法","authors":"Liu Zhang, Yanyu Liu","doi":"10.13052/jcsm2245-1439.1245","DOIUrl":null,"url":null,"abstract":"Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"24 1","pages":"547-568"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Security Prediction and Situational Assessment Using Neural Network-based Method\",\"authors\":\"Liu Zhang, Yanyu Liu\",\"doi\":\"10.13052/jcsm2245-1439.1245\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.\",\"PeriodicalId\":37820,\"journal\":{\"name\":\"Journal of Cyber Security and Mobility\",\"volume\":\"24 1\",\"pages\":\"547-568\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cyber Security and Mobility\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.13052/jcsm2245-1439.1245\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cyber Security and Mobility","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13052/jcsm2245-1439.1245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
Network Security Prediction and Situational Assessment Using Neural Network-based Method
Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.
期刊介绍:
Journal of Cyber Security and Mobility is an international, open-access, peer reviewed journal publishing original research, review/survey, and tutorial papers on all cyber security fields including information, computer & network security, cryptography, digital forensics etc. but also interdisciplinary articles that cover privacy, ethical, legal, economical aspects of cyber security or emerging solutions drawn from other branches of science, for example, nature-inspired. The journal aims at becoming an international source of innovation and an essential reading for IT security professionals around the world by providing an in-depth and holistic view on all security spectrum and solutions ranging from practical to theoretical. Its goal is to bring together researchers and practitioners dealing with the diverse fields of cybersecurity and to cover topics that are equally valuable for professionals as well as for those new in the field from all sectors industry, commerce and academia. This journal covers diverse security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications and those involving mobility aspects will also be published.