Network Security Prediction and Situational Assessment Using Neural Network-based Method

Authors

  • Liu Zhang Department of Electronic Information Engineering, Beihai Vocational College, Beihai, 536000, China
  • Yanyu Liu Department of Electronic Information Engineering, Beihai Vocational College, Beihai, 536000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1245

Keywords:

Cybersecurity, Situational assessment, Convolutional neural network, Elman neural network, Performance optimization

Abstract

Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is not practical and the assessment effect is poor, this study proposes a network security monitoring tool based on situation assessment and prediction to assist network security construction. The framework of the evaluation module is based on convolution neural network. The initial module is introduced to convert some large convolution cores into small convolution cores in series. This is to reduce the operating cost, because building multiple evaluators in series can maximize the retention of characteristic values. This module is the optimized form of Elman neural network. The delay operator is added to the model to respond to the time property of network attack. At the same time, particle swarm optimization algorithm is used to solve the initial weight dependence problem. The research adopts two methods of security situation assessment and situation prediction to carry out model application test. During the test, the commonly used KDD Cup99 is used as intrusion detection data. The experimental results of the network security situation evaluation module show that the optimization reduces the evaluation error by 3.34%, and the accuracy meets the evaluation requirements. The model is superior to the back propagation neural network and the standard Elman model. The model proposed in this study achieves better prediction of posture scores from 0.3 to 0.9, which is more stable than BP neural network. It proves that the model designed by the research can achieve more stable and higher prediction than similar models. It is more practical to obtain better results on the basis of a more stable model architecture and lower implementation costs, which is a meaningful attempt in the wide application of network security.

Downloads

Download data is not yet available.

Author Biographies

Liu Zhang , Department of Electronic Information Engineering, Beihai Vocational College, Beihai, 536000, China

Liu Zhang obtained an engineering degree from Guilin University of Electronic Technology in 2008. She is currently an information system project manager and lecturer in the Department of Electronic information engineering of Beihai Vocational College. She has participated in research on multiple projects, including big data analysis and blockchain applications. She has published multiple articles in the journal. Her areas of interest include information security, system development, and machine learning.

Yanyu Liu, Department of Electronic Information Engineering, Beihai Vocational College, Beihai, 536000, China

Yanyu Liu obtained his Master in Computer Application Technology (2010) from Guilin University of Technology, Guilin. Presently, he is working as Associate Professor in the Department of Electronic Information Engineering, Beihai Vocational College, Beihai. He has participated in the research of multiple projects, including natural human-computer interaction, software reverse engineering, Web3D education software. He has published more than 20 articles in journals and conferences proceedings. His areas of interest include human-computer interact, emotion recognition, action recognition and machine learning.

References

Network security situation detection of internet of things for smart city based on fuzzy neural network. International Journal of Reasoning-based Intelligent Systems, 2020, 12(3): 222–227. https://doi.org/10.1504/IJRIS.2020.109650.

A novel method of network security situation assessment based on evidential network//International Conference on Machine Learning for Cyber Security. Springer, Cham, 2020: 530–539. https://doi.org/10.1007/978-3-030-62223-7_46.

ISA evaluation framework for security of internet of health things system using AHP-TOPSIS methods. IEEE Access, 2020, 8: 152316–152332. https://doi.org/10.1109/ACCESS.2020.3017221.

QoS aware trust-based routing algorithm for wireless sensor networks. Wireless Personal Communications, 2020, 110(4): 1637–1658.

A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks. Sustainability. 2022; 14(19):11950. https://doi.org/10.3390/su141911950.

Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. Springer J. Cloud Comp 11, 26 (2022). https://doi.org/10.1186/s13677-022-00305-6.

Robot visual navigation estimation and target localization based on neural network Paladyn, Journal of Behavioral Robotics, vol. 13, no. 1, 2022, pp. 76–83. https://doi.org/10.1515/pjbr-2022-0005.

Deep learning with convolutional neural network for objective skill evaluation in robot-assisted surgery. International journal of computer assisted radiology and surgery, 2018, 13(12): 1959–1970.

Deep learning for track quality evaluation of high-speed railway based on vehicle-body vibration prediction. IEEE Access, 2019, 7: 185099–185107. https://doi.org/10.1109/ACCESS.2019.2960537.

Adversarial examples for cnn-based malware detectors. IEEE Access, 2019, 7: 54360–54371. https://doi.org/10.1109/ACCESS.2019.2913439.

System identification of PEM fuel cells using an improved Elman neural network and a new hybrid optimization algorithm. Energy Reports, 2019, 5: 1365–1374.

Intelligent outage probability prediction for mobile IoT networks based on an IGWO-elman neural network. IEEE Transactions on Vehicular Technology, 2021, 70(2): 1365–1375. https://doi.org/10.1109/TVT.2021.3051966.

An improved OIF Elman neural network based on CSO algorithm and its applications. Computer Communications, 2021, 171: 148–156.

Tennison: a distributed SDN framework for scalable network security. IEEE Journal on Selected Areas in Communications, 2018, 36(12): 2805–2818. https://doi.org/10.1109/JSAC.2018.2871313.

An intelligent agriculture network security system based on private blockchains. Journal of Communications and Networks, 2019, 21(5): 503–508. https://doi.org/10.1109/JCN.2019.000043.

IoT network security: threats, risks, and a data-driven defense framework. IoT, 2020, 1(2): 259–285.

Distribution network security situation awareness method based on security distance. IEEE Access, 2019, 7: 37855–37864. https://doi.org/10.1109/ACCESS.2019.2906779.

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF. Frontiers of Information Technology & Electronic Engineering, 2019, 20(6): 872–884.

PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access, 2019, 7: 119904–119916. https://doi.org/10.1109/ACCESS.2019.2933165.

AdaptAhead optimization algorithm for learning deep CNN applied to MRI segmentation. Journal of digital imaging, 2019, 32(1): 105–115.

A dilated inception network for visual saliency prediction. IEEE Transactions on Multimedia, 2019, 22(8): 2163–2176. https://doi.org/10.1109/TMM.2019.2947352.

System identification of PEM fuel cells using an improved Elman neural network and a new hybrid optimization algorithm. Energy Reports, 2019, 5: 1365–1374. https://doi.org/10.1016/j.egyr.2019.09.039.

Triple archives particle swarm optimization. IEEE transactions on cybernetics, 2019, 50(12): 4862–4875. https://doi.org/10.1109/TCYB.2019.2943928.

Downloads

Published

2023-06-30

How to Cite

1.
Zhang L, Liu Y. Network Security Prediction and Situational Assessment Using Neural Network-based Method. JCSANDM [Internet]. 2023 Jun. 30 [cited 2024 Sep. 1];12(04):547-68. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/20779

Issue

Section

Articles