Research on data mining method of network security situation awareness based on cloud computing

被引:3
|
作者
Zhou, Ying [2 ]
Zhao, Guodong [3 ]
Alroobaea, Roobaea [4 ]
Baqasah, Abdullah M. [5 ]
Miglani, Rajan [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Elect Engn, Phagwara, Punjab, India
[2] Tianjin Open Univ, Dept Sci & Technol, Tianjin 300191, Peoples R China
[3] Ningxia Univ, Network Management & Informat Management Ctr, Yinchuan 750021, Ningxia, Peoples R China
[4] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, At Taif 21944, Saudi Arabia
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, At Taif 21944, Saudi Arabia
关键词
cloud computing technology; network; security situation; perception; data mining technology; ARCHITECTURE; MANAGEMENT; SYSTEM; ROBUST; MODEL;
D O I
10.1515/jisys-2022-0037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation of a hybrid network has been analyzed using cloud computing strategy. The simulation results show that a cyber security crash occurs in window 20, after which the protection index drops to window 500. The increase in the security index of 500 windows is consistent with the effectiveness of the concept of this document method, indicating that this document method can sense changes in the network security situation. Starting from the first attacked window, the defense index began to decrease. In order to simulate the added network defense, the network security events in the 295th time window were reduced in the original data, and the defense index increased significantly in the corresponding time period, which is consistent with the method perception results, which further verifies the effectiveness and reliability of this method on the network security event perception. This method provides high-precision knowledge of network security situations and improves the security and stability of cloud-based networks.
引用
收藏
页码:520 / 531
页数:12
相关论文
共 50 条
  • [21] The Research on Network Security Situation Awareness Technology
    Zhang, Yongmei
    Jia, Yanmei
    Zhong, Jinxiang
    [J]. CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1321 - 1326
  • [22] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [23] Research on Network Security Situation Awareness System Based on Machine Learning
    Yang Ye-ling
    [J]. PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 122 - 125
  • [24] Study on the Technology of Network Data Mining Based on Cloud Computing
    Wang, Xiao-duan
    Wang, Li
    Ni, Zhen-tao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 312 - 316
  • [25] Research on university laboratory network security based on Cloud Computing
    Li, Dan
    [J]. APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,
  • [26] RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY
    Yang, Bingyu
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1107 - 1116
  • [27] Research on the Internet Data Mining Technology Based on the Cloud Computing
    Shen, Xuejian
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 120 - 120
  • [28] Network Security Situation Awareness Based On Network Simulation
    Lu, Song-song
    Wang, Xiao-feng
    Mao, Li
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 512 - 517
  • [29] Big Data Mining Analysis Method based on Cloud Computing
    Cai, QingQiu
    Cui, HongGang
    Tang, Hao
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [30] A Network Security Situation Awareness Model Based on Artificial Immunity System and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    [J]. COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 212 - 218