Abstract
Accurately evaluating and forecasting the state of computer network security has become essential due to the rise in network threats. The study proposed a model to build a systematic computer network security situation assessment index system by combining the optimized BiLSTM (Bidirectional Long Short-Term Memory) and the least squares support vector machine. This model addresses the issues of low accuracy and lack of prediction ability with current assessment methods. And validate the model performance through a complex and dynamic dataset of 200 samples, the research results show that the least squares support vector machine model shows higher evaluation accuracy, with an average evaluation accuracy of 96.12%. The model combining the least squares support vector machine and the optimized BiLSTM is more consistent with the real situation value, with an average absolute error of about 0.05. The outcomes of the simulation indicate that the least squares support vector machine has a high degree of fitting and clearly illustrates its better scenario assessment performance. The research model’s prediction of computer network security situation shows overall high results. The research results provide decision-makers with more accurate and timely intelligence support, helping them respond quickly and reduce potential security risks.
References
Zacharis A, Katos V, Patsakis C. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. International Journal of Information Security, 2024, 23(4): 2691–2710.
Sheng Y, Li J, Di X, Man Z, Liu Z. Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels. IET Image Process. 2022, 16(10):2769–2790.
Pan X, Zhao T, Chen M, Zhang S. DeepOPF: A Deep Neural Network Approach for Security-Constrained DC Optimal Power Flow. IEEE Transactions on Power Systems, 2021, 36(3):1725–1735.
Martini B, Mori P, Marino F, Saracino A, Castoldi P. Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control. IEEE Communications Magazine, 2020, 58(7):65–71.
Yu Q, Ren J, Zhang J, Liu S, Zhang W. An Immunology-Inspired Network Security Architecture. IEEE Wireless Communications, 2020, 27(5):168–173.
Corallo A, Lazoi M, Lezzi M, Pontrandolfol P. Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 2023, 70(11):3745–3765.
Zhang Z, Cao Y, Cui Z, Zhang W, Chen J. A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G. IEEE Transactions on Vehicular Technology, 2021, 70(6):5234–5243.
Zhao X. A network security algorithm using SVC and sliding window. Wireless networks, 2023,29(1):345–351.
Shu Z, Taleb T. A Novel QoS Framework for Network Slicing in 5G and Beyond Networks Based on SDN and NFV. IEEE Network, 2021, 35(3):212–222.
Schieber B, Samineni B, Vahidi S. Interweaving real-time jobs with energy harvesting to maximize throughput. International Conference and Workshops on Algorithms and Computation. Cham: Springer Nature Switzerland, 2023, 13(3): 305–316.
Dezfuli S M K P. Targeted killings and the erosion of international norm against assassination. Defense & Security Analysis, 2023, 39(2): 191–206.
Zheng K, Chen Y, Jiang Y, Qiao S. A SVM based ship collision risk assessment algorithm. Ocean Engineering, 2020, 202(Apr.15):107062.1–107062.11.
Sareen K, Panigrahi B K, Shikhola T, Nagdevel R. An integrated decomposition algorithm based bidirectional LSTM neural network approach for predicting ocean wave height and ocean wave energy. Ocean engineering, 2023,281(Aug.1 Pt.2):1.1–1.16.
Huang J, Yang S, Li J, Oh J, Kang H. Prediction model of sparse autoencoder-based bidirectional LSTM for wastewater flow rate. Journal of supercomputing, 2023,79(4):4412–4435.
Abbasihafshejani M, Manshaei M H, Jadliwala M. Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain. 2023 IEEE Virtual Conference on Communications (VCC). 2023, 26(3): 45–55.
Abolfathi M, Shomorony I, Vahid A, Jafarian J H. A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception. Proceedings of the 27th ACM on symposium on access control models and technologies. 2022, 8(6):67–78.
Hamdia K M, Zhuang X, Rabczuk T. An efficient optimization approach for designing machine learning models based on genetic algorithm. Neural Computing and Applications, 2020, 33(6):1923–1933.
Du Y, Li F F, Zheng T, Li J. Fast Cascading Outage Screening Based on Deep Convolutional Neural Network and Depth-First Search. IEEE Transactions on Power Systems, 2020, 35(4):2704–2715.
Mazurczyk W, Bisson P, Jover R P, Nakao K, Cabaj K. Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications, 2020, 27(4):6–7.
Sun H, Chen M, Weng J, Liu Z, Geng G. Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism. IEEE Transactions on Vehicular Technology, 2021, 70(10):10880–10893.
Liu J, Ma C, Gui H, Wang S. Transfer learning-based thermal error prediction and control with deep residual LSTM network. Knowledge-based systems, 2022, 237(Feb.15):107704.1–107704.25.
Furdek M, Natalino C, Lipp F, Hock D, Schiano M. Machine Learning for Optical Network Security Monitoring: A Practical Perspective. Journal of Lightwave Technology, 2020, 38(11):2860–2871.
Chen Z, Pasqualetti F, He J, Cheng P, Bullo F. Guest Editorial: Special Issue on Security and Privacy of Distributed Algorithms and Network Systems. IEEE Transactions on Automatic Control, 2020, 65(9):3725–3727.
Pal M, Dedijer S, Laszlo K, Gregor-Svetec D, Cigula T, Pavlovic Z, Milic-Kerestes N. Fold cracking of coated papers: investigation on automated computer-aided visual assessment method. Nordic pulp & paper research journal, 2021, 36(4):626–642.
Wang J, Shi K, Wang L, Pan R, Gao W. A computer vision system for objective fabric smoothness appearance assessment with an ensemble classifier. Textile Research Journal, 2020, 90(3–4):333–343.
Kennedy I R, Hodzic M, Crossan A N, Crossan N, Acharige N, Runcie J W. Estimating Maximum Power from Wind Turbines with a Simple Newtonian Approach. Archives of Advanced Engineering Science, 2023, 1(1):38–54.
Li Wentao, Construction and Analysis of QPSO-LSTM Model in Network Security Situation Prediction, Journal of Cyber Security and Mobility, 2024, 13(3):417–438.
Jiabin Li, Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks, Journal of Cyber Security and Mobility, 2024, 13(3):517–540.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
