A Priori Algorithm Based Network Security Situational Awareness Multi-Source Data Correlation Analysis Method

Authors

  • Wei Li Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China
  • Jianjun Li Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China
  • Chengting Zhang Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China
  • Guang Yao Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China
  • Xue Xu Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1263

Keywords:

A priori algorithm, coefficient of variation, NSSA, Data fusion, multilevel evaluation

Abstract

In the context of the information age, the Internet has developed rapidly, but the accompanying network security threats have also become an issue that cannot be ignored. In order to effectively respond to these threats and improve the data processing capabilities of network security situational awareness, the study focuses on the challenges of multi-source data processing and proposes a multi-source data association analysis method based on the A priori algorithm. This method aims to deeply explore the implicit relationships between data and provide stronger support for network attack detection. In addition, the study also designed a multi-level evaluation method based on coefficient of variation indicators, aiming to provide a more objective and comprehensive evaluation of the detection results. After a series of experimental verification, the proposed correlation analysis method has achieved significant results in detecting phishing attacks and DOS attacks, with detection rates of 90.3% and 93.8%, respectively. At the same time, the multi-level evaluation method has also been experimentally proven to provide more reasonable and accurate results for data evaluation. The methods and technologies proposed in the study can not only improve the multi-source data processing ability of network security situational awareness, but also provide valuable references for future network security research and practice.

Downloads

Download data is not yet available.

Author Biographies

Wei Li, Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

Wei Li obtained his ME in Computer Application from Xi’an Jiaotong University in 2009. Presently, he is working as an deputy senior engineer in China Tobacco Zhejiang Industrial Co., Ltd. His areas of interest are computer communication technology, Intelligent network and network security.

Jianjun Li, Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

Jianjun Li obtained his ME in Computer Science and Technology from Zhejiang University in 2005. Presently, he is working as an deputy senior engineer in China Tobacco Zhejiang Industrial Co., Ltd. His areas of interest are computer communication technology, Intelligent network and network security.

Chengting Zhang, Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

Chengting Zhang obtained his BE in Communication Engineering from South China University of Technology in 2008. He obtained his ME in Network Engineering from Zhejiang University in 2010. Presently, he is working as a network administrator in the China Tobacco Zhejiang Industrial Co., Ltd. His areas of interest are computer communication technology and network security.

Guang Yao, Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

Guang Yao obtained his BE in Information Management and Information System from Renmin University of Information Resources Management in 2011. Presently, he is working as an information resources system administrator in China Tobacco Zhejiang Industrial Co., Ltd. His areas of interest are computer communication technology, application system construction, artificial intelligence and network security.

Xue Xu, Information Center, China Tobacco Zhejiang Industrial Co., Ltd, Hangzhou, 310001, China

Xue Xu graduated from North China Electric Power University Software Engineering in 2019. She received her master’s degree in North China Electric Power University Software Engineering in 2019. Presently, she is working as an information system administrator in China Tobacco Zhejiang Industrial Co., Ltd. Her areas of interest are target detection, big data, and artificial intelligence.

References

Zhang H, Li Y, Lv Z, AK Sangaiah, T Huang. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 2020, 7(3):790–799.

Wang X, Cheng M, Eaton J, Chojui Hsieh, S. Felix Wu. Fake node attacks on graph convolutional networks. Journal of Computational and Cognitive Engineering, 2022, 1(4): 165–173.

Xl A, Jybc A, Wl D, DY E, YWB C, WF Yu. Network security situation: From awareness to awareness-control. Journal of Network and Computer Applications, 2019, 139:15–30.

TaoXiao-ling, LiuZi-yi, YangChang-song. An Efficient Network Security Situation Assessment Method Based on AE and PMU. Wireless Communications and Mobile Computing, 2021, 2021(9):1–9.

Zhang D, Hu Y, Cao G, Y Liu, Q Pan. Dataflow Feature Analysis for Industrial Networks Communication Security. Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2020, 38(1):199–208.

Kou G, Wang S, Tang G. Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction. Chinese Journal of Electronics, 2019, 28(1):166–175.

Chen Z. Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. Journal of Computational and Cognitive Engineering, 2022, 1(3): 103–108.

Aur F, Deniz S S, Yazici K. Visual Preferences Assessment of Landscape Character Types Using Data Mining Methods (A priori Algorithm): The Case of Altnsa and Inkoy (Van/Turkey). Journal of Agricultural Science and Technology, 2020, 22(1):247–260.

Tan L, Yu K, Ming F, Cheng X, Srivastava G. Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness. IEEE Consumer Electronics Magazine, 2021, 11(3): 69–78.

Wang X, Huang D, Zhao X. Design of the Sports Training Decision Support System Based on Improved Association Rule, the A priori Algorithm. Intelligent Automation and Soft Computing, 2020, 26(4):755–763.

Lai X, Zhang S, Mao N, J Liu, Q Chen. Kansei engineering for new energy vehicle exterior design: An internet big data mining approach. Computers & Industrial Engineering, 2022, 165:107913–107935.

Musa R A, Manaa M E, Abdul-Majeed G. Predicting Autism Spectrum Disorder (ASD) for Toddlers and Children Using Data Mining Techniques. Journal of Physics: Conference Series, 2021, 1804(1): 12089–12097.

Hasheminejad S, Khorrami M. Clustering of bank customers based on lifetime value using data mining methods. Intelligent Decision Technologies, 2021, 14(4):507–515.

Li J, Li Q, Zhu Y, Y Ma, Xu, Yubin, C Xie. An Automatic Extraction Method of Coach Operation Information from Historical Trajectory Data. Journal of advanced transportation, 2019, 2019(PT.1):1–15.

Tessema A. Audit quality, political connections and information asymmetry: evidence from banks in gulf co-operation council countries. International Journal of Managerial Finance, 2020, 16(5):673–698.

Corstjens J, Depaire B, Caris A, K Sörensen. A multilevel evaluation method for heuristics with an application to the VRPTW. International Transactions in Operational Research, 2019, 27(1):168–196.

Li B, Liu S, Guo Y, Z Du, Z Ding. Multi-core and cross-chain evaluation method based on multi-core mesh collaboration relationship. IEEE Access, 2020, 8(4):151829–151846.

Singh S, Sahni M, Kovid R K. What drives FinTech adoption? A multi-method evaluation using adapted Technology Acceptance Model Journal: Management Decision. Management Decision, 2020, 58(8): 1675–1697.

Downloads

Published

2023-11-17

How to Cite

1.
Li W, Li J, Zhang C, Yao G, Xu X. A Priori Algorithm Based Network Security Situational Awareness Multi-Source Data Correlation Analysis Method. JCSANDM [Internet]. 2023 Nov. 17 [cited 2024 Nov. 23];12(06):869-92. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/23379

Issue

Section

EIC Select