Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction

Authors

  • Guoying Han College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China
  • Bin Zhou College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China
  • Yazi Zhang College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1356

Keywords:

Spectral cluster analysis, Cyber security posture, GA, GWO, SVM

Abstract

The continuous development of information technology has also promoted the progress of the Internet. More people are joining the Internet. The amount of data stored in the network is also increasing, including some important information, which leads to criminals launching attacks on network security. In order to solve the large error in network security situation assessment and poor progress in network security prediction, the study uses spectrum clustering analysis to evaluate the network security situation. Then genetic algorithm, grey wolf optimization algorithm and support vector machine fusion algorithm are used to predict the Network Security Service (NSS). The genetic algorithm is used to optimize the global search ability of the gray wolf optimization algorithm and the parameters of the support vector machine are optimized to evaluate and predict the NSS. The results showed that the maximum error of the proposed model was 0.4112, and the maximum error was 0.5896. The absolute percentage error of this algorithm was 0.0270, while the other algorithms were 0.0745 and 0.0952, respectively. The proposed model has lower errors and time consumption in training and simulation testing compared with other current methods. The network situation assessment and prediction method proposed in the study can effectively improve network security services, ensure the personal information security, and enhance the security of the Internet.

Downloads

Download data is not yet available.

Author Biographies

Guoying Han, College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China

Guoying Han graduated from Shijiazhuang Tiedao University in 2015 with a Master’s degree in Computer Technology Engineering. He is currently a full-time teacher in the Department of Network Engineering at Hebei University of Engineering and Technology. Hosted one provincial-level project and published 17 papers in well-known domestic peer journals. His research areas include computer technology, Internet of Things technology, and artificial intelligence.

Bin Zhou, College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China

Bin Zhou obtained a Master’s degree in Engineering Management from Hebei University of Economics and Trade in Shijiazhuang in 2024. At present, he serves as a full-time teacher and department head in the Department of Electronic Information Engineering at Hebei University of Engineering and Technology. He is the head of the provincial-level first-class professional electronic information engineering and the course leader of the provincial-level first-class course computer network. Main courses include computer networks, fiber optic communication, artificial intelligence, and network optimization. He is also a national undergraduate thesis sampling expert of the Ministry of Education. Published articles in 8 well-known domestic peer-reviewed journals and conference proceedings. Interest areas include machine learning, image processing, pattern recognition, and network security.

Yazi Zhang, College of Network and Communication, Hebei University of Engineering Science, Shijiazhuang, 050091, China

Yazi Zhang graduated from Qingdao University of Technology in 2011 with a Bachelor’s degree in Measurement and control technology and instruments. She has published 3 papers. Current full-time teacher at Hebei University of Engineering and Technology. Her research interests include Internet of things control system and Artificial Intelligence.

References

Salman, F. M., Lehmoud, A. A. M., and Joda, F. A. (2023). Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks. Journal of Cyber Security and Mobility, 12(05), 785–812. https:/doi.org/10.13052/jcsm2245-1439.1258.

Shen M, Tang X, Zhu L, Du X, Guizani M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things Journal, 2019, 6(5): 7702–7712.

Patil N. An enhanced segmentation technique and improved support vector machine classifier for facial image recognition. International Journal of Intelligent Computing and Cybernetics, 2021, 15(2): 302–317.

Tan L, Yu K, Ming F, Cheng X, Srivastava G. Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness. IEEE Consumer Electronics Magazine, 2021, 11(3): 69–78.

Kou G, Wang S, Tang G. Research on key technologies of NSS awareness for attack tracking prediction. Chinese Journal of Electronics, 2019, 28(1): 162–171.

Zhang H, Kang K, Bai W. Hierarchical NSS awareness data fusion method in cloud computing environment. Journal of Computational Methods in Sciences and Engineering, 2023, 23(1): 237–251.

Hussain, S. S., Razak, M. F. A., and Firdaus, A. (2023). Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review. Journal of Cyber Security and Mobility, 13(01), 91–134. https:/doi.org/10.13052/jcsm2245-1439.1314.

Tang Y, Elhoseny M. Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 2019, 37(3): 3197–3204.

Ye C, Shi W, Zhang R. Research on gray correlation analysis and situation prediction of network information security. EURASIP Journal on Information Security, 2021, 2021(1): 1–6.

Mokhtarimousavi S, Anderson J C, Azizinamini A, Hadi, M. Improved support vector machine models for work zone crash injury severity prediction and analysis. Transportation research record, 2019, 2673(11): 680–692.

Navidi M N, Seyedmohammadi J, Seyed Jalali S A. Predicting soil water content using support vector machines improved by meta-heuristic algorithms and remotely sensed data. Geomechanics and Geoengineering, 2022, 17(3): 712–726.

Wu T, Huang Y, Xu Y, ian, J, Liu S, Li Z. SOH prediction for lithium-ion battery based on improved support vector regression. International Journal of Green Energy, 2023, 20(3): 227–236.

Nawi W, Lola M S, Zakariya R, Zainuddin N H, Abd Hamid A A K, Aruchunan E, Nazzrol N S A. Improved of forecasting sea surface temperature based on hybrid ARIMA and support vector machines models. Malaysian Journal of Fundamental and Applied Sciences, 2021, 17(5): 609–620.

Vrigazova B, Ivanov I. Optimization of the ANOVA procedure for support vector machines. International Journal of Recent Technology and Engineering, 2019, 8(4): 5160–5165.

Chen Z. Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. Journal of Computational and Cognitive Engineering, 2022, 1(3): 103–108.

Raj D J S, Ananthi J V. Recurrent neural networks and nonlinear prediction in support vector machines. Journal of Soft Computing Paradigm, 2019, 1(1): 33–40.

Purohit J, Dave R. Leveraging Deep Learning Techniques to Obtain Efficacious Segmentation Results. Archives of Advanced Engineering Science, 2023, 1(1): 11–26.

Zhang H, Li Y, Lv Z, Sangaiah A K, Huang T. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 2020, 7(3): 790–799.

Salman, F. M., Lehmoud, A. A. M., and Joda, F. A. (2023). Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks. Journal of Cyber Security and Mobility, 12(05), 785–812. https:/doi.org/10.13052/jcsm2245-1439.1258.

Wang J, Wu L, Wang H, Choo K K R, He D. An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet of Things Journal, 2020, 8(1): 458–473.

Downloads

Published

2024-09-03

How to Cite

1.
Han G, Zhou B, Zhang Y. Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Oct. 14];13(05):941-62. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/25107

Issue

Section

EIC Select