An Evaluation Model for Network Security Based on an Optimized Circular Algorithm

Authors

  • Xingfeng Li Department of Commerce and Logistics, Linyi Vocational College, Linyi, 276000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1255

Keywords:

Recurrent neural networks, computer network security assessment, gaussian processes, intrusion detection, grey wolf optimization

Abstract

With more and more control systems accessing computer networks, the increase in their associated vulnerabilities has led to a decreasing security evaluation of the networks. It is essential to secure computer networks from attacks. To this end, the study constructs a network of computer network security evaluation model based on an optimized circular algorithm. To avoid detecting the model’s parameters falling into the local optimum, the model is first optimized based on the Corsi grey wolf optimization (CGWO) algorithm for the hyperparameters of the Gaussian process (GP). To solve the problem of unbalanced data and the GP not having memory capability, the study proposes an optimized Gaussian Mixture Model-Recurrent neural networks (GMM-RNN) algorithm. Experimental results of attack type recognition accuracy showed that the research CGWO-GP algorithm can jump out of the local optimum, and its average value of accuracy reached 98.99%. The average value of the leakage rate was 0.42%, and the average value of the false alarm rate was 0.11%. The average detection accuracy of the GMM-RNN model for eight attack types was 95.899%. The optimal detection accuracy of this model performance was 96.3948%. The training time of the GMM-RNN model was 67.96 s, and the detection time of the test set was 6.45 s, which greatly optimized the real-time performance. The GMM-RNN model was more effective in predicting the security posture of computer networks, and the prediction value can reach 97.65%. The research model was significantly better than other algorithmic models in the performance and evaluation of computer network security and had certain research values.

Downloads

Download data is not yet available.

Author Biography

Xingfeng Li, Department of Commerce and Logistics, Linyi Vocational College, Linyi, 276000, China

Xingfeng Li received his Master’s degree in Engineering from Shandong University of Science and Technology (2012). Currently, he is a lecturer at Linyi Vocational College. His main research fields are big data analysis and network technology. As the main lecturer of logistics Big Data analysis, logistics information system management, business data analysis and other courses, he has guided students to participate in Shandong Electronics and Information Technology Application Competition for many times and won the first prize. He presided over and participated in a number of provincial and municipal subject projects, and published 6 papers in national journals, including 2 in core journals.

References

D. Jafarigiv, K. Sheshyekani, M. Kassouf, “Countering FDI Attacks on DERs Coordinated Control System Using FMI-Compatible Cosimulation.” IEEE Transactions on Smart Grid, 2020, 12(2):1640–1650.

V. Balatska, M. Shabatura. “Exploration of computer network by vulnerability scanner nessus.” Bulletin of Lviv State University of Life Safety, 2020, 20:6–11.

H. Wang, D. Zhao, X. Li. Research on Network Security Situation Assessment and Forecasting Technology. Journal of web engineering, 2020, 19:1239–1265.

L. Mao, S. Sun. “Multiview Variational Sparse Gaussian Processes.” IEEE Transactions on Neural Networks and Learning Systems, 2020, 99:3–11.

N. Rajkumar, A. D’Souza, S. Alex, and G. J. W. “Kathrine Long Short-Term Memory-Based Recurrent Neural Network Approach for Intrusion Detection”. 2019, 30:837–846.

L. Wen. “Security Evaluation of Computer Network Based on Hierarchy”. International Journal of Network Security, 2019, 21(5):735–740.

A. Ij, B. Mah, B. Oc, and B. Am, “Performance evaluation of Convolutional Neural Network for web security”. Computer Communications, 2021, 175(1):58–67.

J. Yang, T. Li, G. Liang, W. He, and Y. Zhao. “A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning”. Computer Modeling in Engineering & Sciences, 2019, 120(1):3–23.

Y. Tang, M. Elhoseny. “Computer network security evaluation simulation model based on neural network”. Journal of Intelligent and Fuzzy Systems, 2019, 37(78):4–8.

L. Wang, J. Yu, B. Qiao, S. Lima, and Á Rocha. “Intelligent evaluation of computer network security based on neural network.” Journal of Intelligent and Fuzzy Systems, 2018, 35(3):2–5.

T. Aldwairi, D. Perera, A. M. Novotny, “An Evaluation of the Performance of Restricted Boltzmann Machines as a Model for Anomaly Network Intrusion Detection”. Computer Networks, 2018, 144(24):111–119.

A. Hl, L. A. Bo, L. A. Ming, and B. Hy, “CNN and RNN based payload classification methods for attack detection”. Knowledge-Based Systems, 2019, 163:332–341.

S. U. Rehman, M. Khaliq, S. I. Imtiaz, A. Rasool, and A. K. Bashir, “DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)”. Future Generation Computer Systems, 2021, 118(2):453–466.

Z. Shen, H. Wang, K. Liu, P. Liu, M. Ba, and M. Y. Zhao, “RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning”. International Journal of Computer Systems Science & Engineering, 2021, 37(1):121–133.

J. Zhang, Z. Qin, S. Wang, “New Adaptive Regularization Parameter Selection Based on Expected Patch Log Likelihood.” Network Security Magazine (English), 2020, 2(1):25–36.

D. Debangan, D. Abhirup, B. Sudipto, “Graphical Gaussian process models for highly multivariate spatial data.” Biometrika, 2021, 4:993–1014.

Y. Fang, D. Karlis, S. Subedi, and D. Steinley, “Infinite Mixtures of Multivariate Normal-Inverse Gaussian Distributions for Clustering of Skewed Data”. Journal of Classification, 2022, 39:510–552.

S. Tripathi, A. Shrivastava, K. C. Jana, “Self-Tuning fuzzy controller for sun-tracker system using Gray Wolf Optimization (GWO) technique”. ISA Transactions, 2020, 101:50–59.

S. Shah, P. J. Hazarika, S. Chakraborty, “The Balakrishnan Alpha Skew Truncated Cauchy Distribution with Applications in Modelling Currency Exchange Rate.” Research Policy: A Journal Devoted to Research Policy, Research Management and Planning, 2020, 49(10):2565–2571.

M. Ma, T. Deng, N. Wang, and Chen Y. “Semi-supervised rough fuzzy Laplacian Eigenmaps for dimensionality reduction”. International journal of machine learning and cybernetics, 2019, 10(2):397–411.

H. Jia, Z. Zhang, H. Liu. “An approach based on expectation-maximization algorithm for parameter estimation of Lamb wave signals.” Mechanical systems and signal processing, 2019, 120(1): 341–355.

R. L. Dou, B. Hu, W. J. Shi. “Incremental Multi-Hop Localization Algorithm Based on Regularized Weighted Least Squares”. International Journal of Pattern Recognition & Artificial Intelligence, 2019, 33(9):1549–1560.

Downloads

Published

2023-08-12

How to Cite

1.
Li X. An Evaluation Model for Network Security Based on an Optimized Circular Algorithm. JCSANDM [Internet]. 2023 Aug. 12 [cited 2024 Aug. 6];12(05):711-32. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22575

Issue

Section

EIC Select