Communication network security situation analysis based on time series data mining technology

被引:0
|
作者
Jiang, Qingjian [1 ,2 ]
机构
[1] Henan Inst Econ & Trade, Sch Internet Things Technol, Zhengzhou 450018, Henan, Peoples R China
[2] Int Joint Res Lab Agr Prod Traceabil Henan, Zhengzhou 450018, Henan, Peoples R China
关键词
communication network security; time series data mining; practical byzantine fault tolerant; attention mechanism; convolutional neural network; cyber security; CHALLENGES;
D O I
10.1515/comp-2023-0104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Communication network security situation analysis prevents unauthorized users from accessing and stealing sensitive information. Network security analysis aims to monitor, discover, and eradicate security flaws by carefully examining the network's architecture, data, and traffic to ensure safety. In time series data mining analysis by cyber terrorism, specialists must pay attention to cyber security, which involves identifying the elements contributing to long-term trends or systemic patterns via pattern-matching algorithms and other types of inferential processing on large datasets. The challenging characteristics of communication network security situation analysis are data loss, security breaches, hacking, and viruses. Hence, in this research, attention mechanism-based convolutional neural network-enabled practical byzantine fault tolerant (AMBCNN-PBFT) has been designed to improve communication network security situation analysis in time series data mining. AMBCNN-PBFT helps to increase communication network security usage and support the expansion during the evaluation system by optimizing the time series data mining. AMBCNN-PBFT effectively predicts the rise in the communication network, associated with faster times series benefits data mining approach. The study concludes that the AMBCNN-PBFT efficiently indicates and validates the communication network security in time series data mining during the evaluation system. The experimental analysis of AMBCNN-PBFT outperforms the data mining time series in terms of accuracy, efficiency, performance, and prediction.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Comprehend network situation using time series data mining and time frequency analysis
    He, Weisong
    Hu, Guangmin
    Kan, Guangyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1053 - 1056
  • [2] Network awareness of security situation information security measurement method based on data mining
    Wang, Jia
    Zhang, Ke
    Li, Jingyuan
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 209 - 219
  • [3] Research on Application of Network Security Technology Based on Data Mining
    Wang, Ning
    Qin, Yanyan
    Guo, Shuyang
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 626 - 635
  • [4] Application of data mining technology in alarm analysis of communication network
    Zheng, Qun
    Li, Yaofeng
    Cao, Jie
    [J]. COMPUTER COMMUNICATIONS, 2020, 163 : 84 - 90
  • [5] Data Mining and Analysis of Large Scale Time Series Network Data
    Morreale, Patricia
    Holtz, Steve
    Goncalves, Allan
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 39 - 43
  • [6] Time Series Data Mining for Network Service Dependency Analysis
    Lange, Mona
    Moeller, Ralf
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 584 - 594
  • [7] Research on data mining method of network security situation awareness based on cloud computing
    Zhou, Ying
    Zhao, Guodong
    Alroobaea, Roobaea
    Baqasah, Abdullah M.
    Miglani, Rajan
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 520 - 531
  • [8] Cyber Security Situation Awareness Based on Data Mining
    Liu Jie
    Feng Xuewei
    Li Jin
    Wang Dongxia
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 254 - 258
  • [9] Study on data mining method of network security situation perception based on cloud computing
    Zhang, Yan
    Kaur, Arshpreet
    Jagota, Vishal
    Neware, Rahul
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 1074 - 1084
  • [10] Application Analysis of Data Encryption Technology in Computer Network Communication Security
    Zhang, Xianjing
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 265 - 267