Research on data mining method of network security situation awareness based on cloud computing

被引:3
|
作者
Zhou, Ying [2 ]
Zhao, Guodong [3 ]
Alroobaea, Roobaea [4 ]
Baqasah, Abdullah M. [5 ]
Miglani, Rajan [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Elect Engn, Phagwara, Punjab, India
[2] Tianjin Open Univ, Dept Sci & Technol, Tianjin 300191, Peoples R China
[3] Ningxia Univ, Network Management & Informat Management Ctr, Yinchuan 750021, Ningxia, Peoples R China
[4] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, At Taif 21944, Saudi Arabia
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, At Taif 21944, Saudi Arabia
关键词
cloud computing technology; network; security situation; perception; data mining technology; ARCHITECTURE; MANAGEMENT; SYSTEM; ROBUST; MODEL;
D O I
10.1515/jisys-2022-0037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation of a hybrid network has been analyzed using cloud computing strategy. The simulation results show that a cyber security crash occurs in window 20, after which the protection index drops to window 500. The increase in the security index of 500 windows is consistent with the effectiveness of the concept of this document method, indicating that this document method can sense changes in the network security situation. Starting from the first attacked window, the defense index began to decrease. In order to simulate the added network defense, the network security events in the 295th time window were reduced in the original data, and the defense index increased significantly in the corresponding time period, which is consistent with the method perception results, which further verifies the effectiveness and reliability of this method on the network security event perception. This method provides high-precision knowledge of network security situations and improves the security and stability of cloud-based networks.
引用
收藏
页码:520 / 531
页数:12
相关论文
共 50 条
  • [41] Research on Algorithm of Vehicle Track Data Mining Based on Cloud Computing
    Sun Hailong
    Li Fangsong
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 1439 - 1443
  • [42] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [43] Research on Network Security Situation Awareness and Dynamic Game Based on Deep Q Learning Network
    Guo, Xian
    Yang, Jianing
    Gang, Zhanhui
    Yang, An
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (02): : 549 - 563
  • [44] Research key technologies of the current network security situation awareness
    Guan, X. J.
    Zhang, T.
    Ma, Y. Y.
    Deng, S.
    [J]. MANUFACTURING AND ENGINEERING TECHNOLOGY, 2015, : 149 - 154
  • [45] A Novel Network Topology Sensing Method for Network Security Situation Awareness
    Wang, Yixuan
    Zhao, Bo
    Sun, Zhonghao
    Huo, Zhihui
    Li, Xueying
    Wu, Yabiao
    Li, Jiao
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT IV, 2024, 14490 : 82 - 101
  • [46] Research on Application of Network Security Technology Based on Data Mining
    Wang, Ning
    Qin, Yanyan
    Guo, Shuyang
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 626 - 635
  • [47] Research on the Security of Computer Network under Cloud Computing
    Luo, Lei
    Ge, Wei
    [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 278 - 281
  • [48] Ensemble Visualization For Cyber Situation Awareness of Network Security Data
    Hao, Lihua
    Healey, Christopher G.
    Hutchinson, Steve E.
    [J]. 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2015,
  • [49] Research on Network Security Situation Assessment Method
    Gao, Yuan
    Wen, Jin
    Chen, Pu
    Wang, Zhiqiang
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 140 - 152
  • [50] Research on Network Security Situation Assessment Method
    Jing, Sen
    Li, Min
    Si, Guanlin
    Gao, Ranxin
    [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1912 - 1915