Study on data mining method of network security situation perception based on cloud computing

被引:0
|
作者
Zhang, Yan [1 ]
Kaur, Arshpreet [2 ]
Jagota, Vishal [3 ]
Neware, Rahul [4 ]
机构
[1] ShiJiaZhuang Univ Appl Technol, Dept Informat Engn, Shijiazhuang 050081, Hebei, Peoples R China
[2] GNA Univ, Phagwara, Punjab, India
[3] Madanapalle Inst Technol & Sci, Dept Mech Engn, Madanapalle, Andhra Pradesh, India
[4] Hogskulen Vestlandet, Dept Comp Math & Phys, Bergen, Norway
关键词
data mining technology; network; security situation; cloud computing; security situational awareness;
D O I
10.1515/jisys-2021-0264
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the network has become more complex, and the attacker's ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event into a standard format that can be defined as multiple brochures, creating a general framework for the cyber security situation. According to the large nature of network security situation data, the Hadoop platform is used to extract aggregation rules, and perform model extraction, pattern analysis, and learning on a network security event dataset to complete network security situation rule mining, and establish a framework for assessing the state of network security. According to the results of the federal rule extraction, the level of network node security risk is obtained in combination with signal reliability, signal severity, resource impact, node protection level, and signal recovery factor. A simulation test is performed to obtain the intrusion index according to the source address of the network security alarm. Through the relevant experiments and analysis of the results, the attack characteristics obtained in this study were obtained after manually reducing the network security event in the 295 h window. The results show that after the security event is canceled, the corresponding window attack index decreases to 0, indicating that this method can effectively implement a network security situation awareness. The proposed technique allows you to accurately sense changes in network security conditions.
引用
收藏
页码:1074 / 1084
页数:11
相关论文
共 50 条
  • [21] Study of Layers Construct for Data Mining Platform Based on Cloud Computing
    Lin, Yongzheng
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 106 - 112
  • [22] Communication network security situation analysis based on time series data mining technology
    Jiang, Qingjian
    [J]. OPEN COMPUTER SCIENCE, 2024, 14 (01)
  • [23] Cyber Security Situation Awareness Based on Data Mining
    Liu Jie
    Feng Xuewei
    Li Jin
    Wang Dongxia
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 254 - 258
  • [24] Network security situation assessment and prediction method based on multimodal transformation in edge computing
    Xu, Meng
    Liu, Shenghan
    Li, Xuewu
    [J]. COMPUTER COMMUNICATIONS, 2024, 215 : 103 - 111
  • [25] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [26] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    [J]. 2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353
  • [27] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [28] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [29] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [30] Representation of Network Security Situation Elements Based on Cloud Model
    Kou Guang
    Yang Haopu
    Wang Kun
    Zhang Yuchen
    Wang Shuo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 215 - 224