Optimization of network security protection situation based on data clustering

被引:6
|
作者
Ye, Wei [1 ]
Wang, Hongkai [1 ]
Zhong, Yijun [1 ]
机构
[1] State Grid Zhejiang Elect Power Corp, Informat & Telecommun Branch, Hangzhou 310007, Zhejiang, Peoples R China
关键词
Data clustering; Network security protection; Prediction; Evaluation; Data mining; ALGORITHM;
D O I
10.1007/s13198-021-01529-6
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the emerging advancement and the latest study of the data science and computer engineering applications, network security protection is becoming a hog research topic. For the target of improving the network security and satefy protection ability, it is essential and also urget to evaluate the network security situation accurately, to realize the early interception and prevention of network attack. In view of the problem that the traditional fuzzy feature detection method is not good for the recent applications, this paper studies the novel method of optimization of network security protection situation based on data clustering. The network security state distribution model in complex network environment is constructed, the data mining of network security information is carried out by large data mining method, the adaptive feature extraction of the designed network security estimation status is extracted by the novel intrusion recognition and detection methodology, the feature data sets and the processing units of network security situation is extracted, and the fuzzy-C mean data clustering method is then applied to well extract the comprehensive information. The intrusion feature information flow is classified, the network security situation prediction is carried out according to the attribute classification results, and the security situation evaluation and the accurate evaluation are realized. For the verifications of the designed model, we arranged the experiment under the different scenarios. The simulation reflect that the designed framework suits for the network security considered scenario, the accuracy and robustness are both alidated.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Network security situation automatic prediction model based on accumulative CMA-ES optimization
    Wang Jian
    Li Ke
    Zhao Guosheng
    [J]. The Journal of China Universities of Posts and Telecommunications., 2017, 24 (03) - 43
  • [42] Situation Element Extraction of Network Security Based on Logistic Regression and Improved Particle Swarm Optimization
    Li, Dongyin
    Liu, Zhanghui
    [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 569 - 573
  • [43] Distribution Network Security Situation Awareness Method Based on Security Distance
    Xiao, Jun
    Zhang, Baoqiang
    Luo, Fengzhang
    [J]. IEEE ACCESS, 2019, 7 : 37855 - 37864
  • [44] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [45] Ensemble Visualization For Cyber Situation Awareness of Network Security Data
    Hao, Lihua
    Healey, Christopher G.
    Hutchinson, Steve E.
    [J]. 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2015,
  • [46] Modeling and Prediction of Network Security Situation in Big Data Environment
    Li Jingfu
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3037 - 3043
  • [47] Research on Security Anomaly Detection for Big Data Platforms Based on Quantum Optimization Clustering
    Deng, Lijuan
    Wan, Long
    Guo, Jian
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [48] A Security Situation Assessment Method Based on Neural Network
    Tang, Xiangyan
    Chen, Meizhu
    Cheng, Jieren
    Xu, Jinying
    Li, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 579 - 587
  • [49] Network security situation awareness based on neural networks
    Xie, Lixia
    Wang, Yachao
    Yu, Jinbo
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2013, 53 (12): : 1750 - 1760
  • [50] Analysis the Optimization Methods of Computer Network Security and Protection Strategy Based on Genetic Algorithm
    Yao Yuanyao
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 51 - 55