Network security threat assessment method based on unsupervised generation reasoning

被引:0
|
作者
Yang H. [1 ]
Wang F. [1 ]
Lü W. [2 ]
机构
[1] School of Computer Science and Technology, Civil Aviation University of China, Tianjin
[2] Pipeline Changchun Transmission and Oil Company, China National Petroleum Corporation, Changchun
关键词
Threat probability; Threat situation assessment; Unsupervised generation reasoning; Variant auto encoder - generative adversarial network (VAE-GAN);
D O I
10.16511/j.cnki.qhdxxb.2020.22.005
中图分类号
学科分类号
摘要
Supervised network data modeling based on data category tags is computationally expensive, inefficient and requires long time for network threat assessments. This paper presents a network security threat assessment method based on unsupervised generation reasoning. A variant auto encoder - generative adversarial network (VAE-GAN) model is designed with training data set containing only normal network traffic input to the network collection layer of the VAE-GAN while monitoring the reconstruction error of each layer network output and a 3-layer variant auto encoder of the output layer is used to train the reconstruction error with a test data set used for group threat testing while monitoring the threat occurrence probability for each group of tests. Finally, the severities of the network security threats are determined based on the threat occurrence probability with a threat situation impact factor used to calculate the threat level to quantify the network security threat. Simulations show that this method more intuitively evaluates the overall network security threat than back propagation (BP) and radical basis function (RBF) methods and more effectively characterizes the network threat. © 2020, Tsinghua University Press. All right reserved.
引用
收藏
页码:474 / 484
页数:10
相关论文
共 15 条
  • [1] Wang H., Chen Z.F., Feng X., Et al., Research on network security situation assessment and quantification method based on analytic hierarchy process, Wireless Personal Communications, 102, 2, pp. 1401-1420, (2018)
  • [2] Zhou C., Pan P., Mao X.Y., Et al., Risk analysis of information system security based on distance of information-state transition, Wuhan University Journal of Natural Sciences, 23, 3, pp. 210-218, (2018)
  • [3] Wen Z.C., Chen Z.G., Tang J., Assessing network security situation quantitatively based on information fusion, Journal of Beijing University of Aeronautics and Astronautics, 42, 8, pp. 1593-1602, (2016)
  • [4] Yu J.J., Hu M., Wang P., Evaluation and reliability analysis of network security risk factors based on D-S evidence theory, Journal of Intelligent & Fuzzy Systems, 34, 2, pp. 861-869, (2018)
  • [5] Zhu W.Y., Network security situation assessment based on Kalman entropy model, Journal of Huaqiao University (Natural Science), 38, 1, pp. 101-104, (2017)
  • [6] Hu G.Y., Zhou Z.J., Zhang B.C., Et al., A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm, Applied Soft Computing, 48, pp. 404-418, (2016)
  • [7] Xie L.X., Wang Y.C., Yu J.B., Network security situation awareness based on neural networks, Journal of Tsinghua University (Science & Technology), 53, 12, pp. 1750-1760, (2013)
  • [8] Doersch C., Tutorial on variational autoencoders, (2016)
  • [9] An J., Cho S., Variational autoencoder based anomaly detection using reconstruction probability, (2015)
  • [10] Goodfellow I.J., Pouget-Abadie J., Mirza M., Et al., Generative adversarial nets, Proceedings of the 27th International Conference on Neural Information Processing Systems, pp. 1-9, (2014)