Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm

Authors

  • Yunfei Zhang State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China
  • Xingzhi Xu State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China
  • Yayuan Shi State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1335

Keywords:

Cloud computing, network security, deep belief network, differential evolution algorithm

Abstract

With the wide application of cloud computing, network security has become the primary issue in cloud environment. This study focuses on constructing a system focusing on network cloud security situation awareness, and combines deep belief network with differential evolution algorithm to improve the perception and analysis capability of network cloud security. Differential evolution algorithm is used to optimize DBN weights and parameters to improve system performance and generalization ability. In the aspect of system performance evaluation, the effectiveness of the system is verified by a series of experiments. The experimental results show that the system based on DBN-DE has excellent performance in network attack detection and can quickly identify various potential threats. The system also has a low false alarm rate, which can reduce the frequency of administrator intervention, and improve the efficiency and reliability of network cloud security.

Downloads

Download data is not yet available.

Author Biographies

Yunfei Zhang, State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China

Yunfei Zhang, Graduated from the Nanjing University of Posts and Telecommunications in 2003. Working in Ultra High Voltage Branch of State Grid Jiangsu Electric Power CO., LTD. His research interests include Electric Power auto-dispatching.

Xingzhi Xu, State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China

Xingzhi Xu, Graduated from the Adelaide University in 2005. Studied in Electrical Engineering. His research interests include Electric Power auto-dispatching, Artificial Neural.

Yayuan Shi, State Grid Wuxi Power Supply Company; Wuxi, Jiangsu, 214000, China

Yayuan Shi, Graduated from the Southeast University in 2009. Studied in Electrical Engineering. Her research interests include Electric Power auto-dispatching, Integrated Relay.

References

Bello S A, Oyedele L O, Akinade O O, et al. Cloud computing in construction industry: Use cases, benefits and challenges[J]. Automation in Construction, 2021, 122: 103441.

Guo Q, Amin S, Hao Q, et al. Resilience assessment of safety system at subway construction sites applying analytic network process and extension cloud models[J]. Reliability Engineering & System Safety, 2020, 201: 106956.

Jin Y, Chen W, Li H. A cloud-based approach to network security situational awareness[C]//International Conference on Signal Processing, Computer Networks, and Communications (SPCNC 2022). SPIE, 2023, 12626: 607–611.

Xu H, Berres A, Yoginath S B, et al. Smart Mobility in the Cloud: Enabling Real-Time Situational Awareness and Cyber-Physical Control Through a Digital Twin for Traffic[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(3): 3145–3156.

Torkura K A, Sukmana M I H, Cheng F, et al. Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure[J]. IEEE Access, 2020, 8: 123044–123060.

Ignatious H A, El-Sayed H, Khan M A, et al. Analyzing Factors Influencing Situation Awareness in Autonomous Vehicles – A Survey[J]. Sensors, 2023, 23(8): 4075.

Nassif A B, Talib M A, Nasir Q, et al. Machine learning for cloud security: a systematic review[J]. IEEE Access, 2021, 9: 20717–20735.

Jiang D. The construction of smart city information system based on the Internet of Things and cloud computing[J]. Computer Communications, 2020, 150: 158–166.

Aoudni Y, Donald C, Farouk A, et al. Cloud security based attack detection using transductive learning integrated with Hidden Markov Model[J]. Pattern Recognition Letters, 2022, 157: 16–26.

Xu S, Ning J, Li Y, et al. Match in my way: Fine-grained bilateral access control for secure cloud-fog computing[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 19(2): 1064–1077.

Ageed Z S, Zeebaree S R M, Sadeeq M M, et al. Comprehensive survey of big data mining approaches in cloud systems[J]. Qubahan Academic Journal, 2021, 1(2): 29–38.

Dinakarrao S M P, Jantsch A, Shafique M. Computer-aided arrhythmia diagnosis with bio-signal processing: A survey of trends and techniques[J]. ACM Computing Surveys (CSUR), 2019, 52(2): 1–37.

Li W, Wu J, Cao J, et al. Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions[J]. Journal of Cloud Computing, 2021, 10(1): 1–34.

Dwivedi R, Mehrotra D, Chandra S. Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review[J]. Journal of oral biology and craniofacial research, 2022, 12(2): 302–318.

Oke A E, Kineber A F, Al-Bukhari I, et al. Exploring the benefits of cloud computing for sustainable construction in Nigeria[J]. Journal of Engineering, Design and Technology, 2023, 21(4): 973–990.

Ali O, Shrestha A, Chatfield A, et al. Assessing information security risks in the cloud: A case study of Australian local government authorities[J]. Government Information Quarterly, 2020, 37(1): 101419.

Chen B, Wu L, Wang H, et al. A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks[J]. IEEE Transactions on Vehicular Technology, 2019, 69(6): 5813–5825.

Zhang C. Design and application of fog computing and Internet of Things service platform for smart city[J]. Future Generation Computer Systems, 2020, 112: 630–640.

Yaïci W, Krishnamurthy K, Entchev E, et al. Recent advances in Internet of Things (IoT) infrastructures for building energy systems: A review[J]. Sensors, 2021, 21(6): 2152.

Butt U A, Mehmood M, Shah S B H, et al. A review of machine learning algorithms for cloud computing security[J]. Electronics, 2020, 9(9): 1379.

Moudgil V, Hewage K, Hussain S A, et al. Integration of IoT in building energy infrastructure: A critical review on challenges and solutions[J]. Renewable and Sustainable Energy Reviews, 2023, 174: 113121.

Vinoth S, Vemula H L, Haralayya B, et al. Application of cloud computing in banking and e-commerce and related security threats[J]. Materials Today: Proceedings, 2022, 51: 2172–2175.

Elghaish F, Hosseini M R, Matarneh S, et al. Blockchain and the ‘Internet of Things’ for the construction industry: research trends and opportunities[J]. Automation in construction, 2021, 132: 103942.

Bavle H, Sanchez-Lopez J L, Cimarelli C, et al. From slam to situational awareness: Challenges and survey[J]. Sensors, 2023, 23(10): 4849.

Butt U A, Amin R, Aldabbas H, et al. Cloud-based email phishing attack using machine and deep learning algorithm[J]. Complex & Intelligent Systems, 2023, 9(3): 3043–3070.

Wazid M, Das A K, Shetty S, et al. A tutorial and future research for building a blockchain-based secure communication scheme for internet of intelligent things[J]. IEEE Access, 2020, 8: 88700–88716.

Wei P C, Wang D, Zhao Y, et al. Blockchain data-based cloud data integrity protection mechanism[J]. Future Generation Computer Systems, 2020, 102: 902–911.

Medhane D V, Sangaiah A K, Hossain M S, et al. Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach[J]. IEEE Internet of Things Journal, 2020, 7(7): 6143–6149.

Shakya S. An efficient security framework for data migration in a cloud computing environment[J]. Journal of Artificial Intelligence, 2019, 1(01): 45–53.

Kim H. 5G core network security issues and attack classification from network protocol perspective[J]. J. Internet Serv. Inf. Secur., 2020, 10(2): 1–15.

Downloads

Published

2024-04-09

How to Cite

1.
Zhang Y, Xu X, Shi Y. Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm. JCSANDM [Internet]. 2024 Apr. 9 [cited 2024 Jul. 25];13(03):439-60. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24471

Issue

Section

Cyber Security Issues and Solutions