Network security situation assessment with network attack behavior classification

被引:6
|
作者
Yang, Hongyu [1 ,2 ]
Zhang, Zixin [2 ]
Xie, Lixia [2 ]
Zhang, Liang [3 ]
机构
[1] Civil Aviat Univ China, Sch Safety Sci & Engn, Tianjin 300300, Peoples R China
[2] Civil Aviat Univ China, Sch Comp Sci & Technol, Tianjin 300300, Peoples R China
[3] Univ Arizona, Sch Informat, Tucson, AZ USA
基金
中国国家自然科学基金;
关键词
attention mechanism; bidirectional gate recurrent unit; network attack behavior classification; network security situation assessment; parallel feature extraction;
D O I
10.1002/int.22867
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To solve the problems that existing network security situation assessment (NSSA) methods are difficult to extract features and have poor timeliness, an NSSA method with network attack behavior classification (NABC) is proposed. First, an NABC model is designed. The model combines features and advantages of a parallel feature extraction network (PFEN), a bidirectional gate recurrent unit (BiGRU), and the attention mechanism (ATT). The PFEN module is composed of parallel sparse autoencoders which extract key data from different network attack behaviors. The BiGRU module gets the time-series relationship from the state of three different time periods, finds potential representation rules from network attack behaviors. The ATT module pays more attention to the network traffic key information and improves the NABC accuracy. Second, the NABC detects and classifies attacks from network behaviors, the occurrence number of each attack behavior, and the error probability matrix are counted. Finally, the occurrence number of each attack behavior is corrected according to the error probability matrix, and the network security situation value is calculated through combining the severity factor of each attack behavior. The experimental results show that the precision and recall of the NABC model are improved by 5.28% and 5.65%, respectively, compared with the conventional method. The comparison experiment with the classical situation assessment method also proves that the proposed method can assess the overall situation of network security more effectively and comprehensively.
引用
收藏
页码:6909 / 6927
页数:19
相关论文
共 50 条
  • [21] Method for assessment of network security situation with deep learning
    Yang H.
    Zeng R.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 183 - 190
  • [22] Network security situation assessment based on data fusion
    Liu Mixia
    Zhang Qiuyu
    Zhao Hong
    Yu Dongmei
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 542 - 545
  • [23] Research on Network Security Situation Assessment and Forecasting Technology
    Wang, Hongbin
    Zhao, Dongmei
    Li, Xixi
    [J]. JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1239 - 1265
  • [24] A Security Situation Assessment Method Based on Neural Network
    Tang, Xiangyan
    Chen, Meizhu
    Cheng, Jieren
    Xu, Jinying
    Li, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 579 - 587
  • [25] Multi-dimensional Network Security Situation Assessment
    Zhu, Lina
    Xia, Guoen
    Zhang, Zuochang
    Li, Jianhua
    Zhou, Renjie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 153 - 164
  • [26] Application of cloud models in network security situation assessment
    Guo, YB
    Ma, JF
    Wang, YD
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 8570 - 8573
  • [27] An overall design of network security situation assessment system
    Zhao, Yuxin
    Hu, Yuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1132 - 1136
  • [28] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [29] A BIPMU-based network security situation assessment method for wireless network
    Liu, Ziyi
    Yang, Changsong
    Liu, Yueling
    Ding, Yong
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 83
  • [30] Analysis of Network Attack Technologies and Network Security
    Pei, Xu
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 111 - 114