Study on data mining method of network security situation perception based on cloud computing

被引:0
|
作者
Zhang, Yan [1 ]
Kaur, Arshpreet [2 ]
Jagota, Vishal [3 ]
Neware, Rahul [4 ]
机构
[1] ShiJiaZhuang Univ Appl Technol, Dept Informat Engn, Shijiazhuang 050081, Hebei, Peoples R China
[2] GNA Univ, Phagwara, Punjab, India
[3] Madanapalle Inst Technol & Sci, Dept Mech Engn, Madanapalle, Andhra Pradesh, India
[4] Hogskulen Vestlandet, Dept Comp Math & Phys, Bergen, Norway
关键词
data mining technology; network; security situation; cloud computing; security situational awareness;
D O I
10.1515/jisys-2021-0264
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the network has become more complex, and the attacker's ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event into a standard format that can be defined as multiple brochures, creating a general framework for the cyber security situation. According to the large nature of network security situation data, the Hadoop platform is used to extract aggregation rules, and perform model extraction, pattern analysis, and learning on a network security event dataset to complete network security situation rule mining, and establish a framework for assessing the state of network security. According to the results of the federal rule extraction, the level of network node security risk is obtained in combination with signal reliability, signal severity, resource impact, node protection level, and signal recovery factor. A simulation test is performed to obtain the intrusion index according to the source address of the network security alarm. Through the relevant experiments and analysis of the results, the attack characteristics obtained in this study were obtained after manually reducing the network security event in the 295 h window. The results show that after the security event is canceled, the corresponding window attack index decreases to 0, indicating that this method can effectively implement a network security situation awareness. The proposed technique allows you to accurately sense changes in network security conditions.
引用
收藏
页码:1074 / 1084
页数:11
相关论文
共 50 条
  • [31] Research on Data Mining Algorithm Based on Cloud Computing
    Mai Xiao-Dong
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 1752 - 1756
  • [32] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [33] Analysis of the Data Mining Application Based on Cloud Computing
    Li Xiaohui
    Liu Wei
    Wang Lele
    [J]. ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2426 - 2429
  • [34] Cloud Computing Based Data Mining of Medical Information
    Wang, Lihua
    Zhang, Ze
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 978 - 982
  • [35] Research on data mining algorithm based on cloud computing
    [J]. Mai, Xiao-Dong, 1752, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [36] E-Commerce Network Security Based on Big Data in Cloud Computing Environment
    Zeng, Yifu
    Ouyang, Shuosi
    Zhu, Tuanfei
    Li, Chuang
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [37] A Network Security Situation Awareness Method Based on GRU in Big Data Environment
    Wen, Zhicheng
    Zhang, Longxin
    Wu, Qinlan
    Deng, Wengui
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2023, 37 (01)
  • [38] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [39] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [40] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370