Study on data mining method of network security situation perception based on cloud computing

被引:0
|
作者
Zhang, Yan [1 ]
Kaur, Arshpreet [2 ]
Jagota, Vishal [3 ]
Neware, Rahul [4 ]
机构
[1] ShiJiaZhuang Univ Appl Technol, Dept Informat Engn, Shijiazhuang 050081, Hebei, Peoples R China
[2] GNA Univ, Phagwara, Punjab, India
[3] Madanapalle Inst Technol & Sci, Dept Mech Engn, Madanapalle, Andhra Pradesh, India
[4] Hogskulen Vestlandet, Dept Comp Math & Phys, Bergen, Norway
关键词
data mining technology; network; security situation; cloud computing; security situational awareness;
D O I
10.1515/jisys-2021-0264
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the network has become more complex, and the attacker's ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event into a standard format that can be defined as multiple brochures, creating a general framework for the cyber security situation. According to the large nature of network security situation data, the Hadoop platform is used to extract aggregation rules, and perform model extraction, pattern analysis, and learning on a network security event dataset to complete network security situation rule mining, and establish a framework for assessing the state of network security. According to the results of the federal rule extraction, the level of network node security risk is obtained in combination with signal reliability, signal severity, resource impact, node protection level, and signal recovery factor. A simulation test is performed to obtain the intrusion index according to the source address of the network security alarm. Through the relevant experiments and analysis of the results, the attack characteristics obtained in this study were obtained after manually reducing the network security event in the 295 h window. The results show that after the security event is canceled, the corresponding window attack index decreases to 0, indicating that this method can effectively implement a network security situation awareness. The proposed technique allows you to accurately sense changes in network security conditions.
引用
收藏
页码:1074 / 1084
页数:11
相关论文
共 50 条
  • [1] Research on data mining method of network security situation awareness based on cloud computing
    Zhou, Ying
    Zhao, Guodong
    Alroobaea, Roobaea
    Baqasah, Abdullah M.
    Miglani, Rajan
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 520 - 531
  • [2] Hierarchical network security situation awareness data fusion method in cloud computing environment
    Zhang, Hongwu
    Kang, Kai
    Bai, Wei
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (01) : 237 - 251
  • [3] Study on the Technology of Network Data Mining Based on Cloud Computing
    Wang, Xiao-duan
    Wang, Li
    Ni, Zhen-tao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 312 - 316
  • [4] Network awareness of security situation information security measurement method based on data mining
    Wang, Jia
    Zhang, Ke
    Li, Jingyuan
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 209 - 219
  • [5] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [6] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [7] Research on the Big Data Cloud Computing Based on the Network Data Mining
    Zhang, Haiyang
    Zhang, Zhiwei
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 150 - 151
  • [8] Big Data Mining Analysis Method based on Cloud Computing
    Cai, QingQiu
    Cui, HongGang
    Tang, Hao
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [9] A Network Security Situation Assessment Method Based On Attack Intention Perception
    Kou Guang
    Tang Guangming
    Ding Xia
    Wang Shuo
    Wang Kun
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
  • [10] A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining
    He, Qian
    He, Hong
    [J]. SUSTAINABILITY, 2021, 13 (01) : 1 - 17