Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis

被引:14
|
作者
He, Fannv [1 ]
Zhang, Yuqing [1 ]
Liu, Donghang [2 ]
Dong, Ying [1 ]
Liu, Caiyun [1 ]
Wu, Chensi [1 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian, Shaanxi, Peoples R China
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Security; Prediction; Hurst; MODWT; WNN-M; RULE;
D O I
10.1007/978-3-319-64701-2_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous models have achieved some breakthroughs in cyber security situation prediction. However, improving the accuracy of prediction, especially long-term prediction, is still a certain challenge. Maximal Overlap Discrete Wavelet Transform (MODWT) with strong ability of information extraction can capture the correlation of the time-series better. Mixed Wavelet Neural Network (WNN) architecture with both Morlet wavelets and Mexican hat wavelets can provide excellent localization and scale detection simultaneously. In this paper, MODWT method and mixed WNN architecture are combined to develop a WNN-M prediction model through data-driven approach. In addition, Hurst exponent is utilized to analyze the predictability of decomposed components for removing poor components. To demonstrate the effectiveness of proposed WNN-M model, 12-hour prediction is considered in a real attack scenario named DARPA given by MIT Lincoln Lab. Experimental results show that the R-2 of WNN-M can be improved by 19.87% and the RMSE of WNN-M can be reduced by 4.05% compared with that of traditional WNN model.
引用
收藏
页码:99 / 111
页数:13
相关论文
共 50 条
  • [1] Wavelet-Based Estimation of Hurst Exponent Using Neural Network
    Kirichenko, Lyudmyla
    Pavlenko, Kyrylo
    Khatsko, Daryna
    [J]. 2022 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), 2022, : 40 - 43
  • [2] A network security situation prediction model based on wavelet neural network with optimized parameters
    Zhang, Haibo
    Huang, Qing
    Li, Fangwei
    Zhu, Jiang
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2016, 2 (03) : 139 - 144
  • [3] Incremental Wavelet Neural Network based Prediction of Network Security Situation
    Liu, Xiaojian
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1199 - 1203
  • [4] Mammogram Diagnostics Using Robust Wavelet-Based Estimator of Hurst Exponent
    Feng, Chen
    Mei, Yajun
    Vidakovic, Brani
    [J]. NEW FRONTIERS OF BIOSTATISTICS AND BIOINFORMATICS, 2018, : 109 - 140
  • [5] A quantitative prediction method of network security situation based on Wavelet Neural Network
    Lai Jibao
    Wang Huiqiang
    Liu Xiaowa
    Liang Ying
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 197 - 202
  • [6] Wavelet-based analysis of network security databases
    Liu, W
    Duan, HX
    Wang, P
    Wu, JP
    Yang, L
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 372 - 377
  • [7] Prediction of structural damage by the wavelet-based neural network
    Yanzhong, Ju
    Chengzhong, Qu
    Xunjiang, Zhang
    Guangyuan, He
    [J]. ENGINEERING STRUCTURAL INTEGRITY: RESEARCH, DEVELOPMENT AND APPLICATION, VOLS 1 AND 2, 2007, : 221 - 225
  • [8] A Method Of Network Security Situation Prediction Based on Gray Neural Network Model
    Nian, Liu
    Geng, Li
    Yong, Liu
    [J]. ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 936 - +
  • [9] Prediction Model of Network Security Situation Based on Regression Analysis
    Xia Wei-wei
    Wang Hai-feng
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 616 - 619
  • [10] On Network Security Situation Prediction Based on RBF Neural Network
    Jiang, Yang
    Li, Cheng-hai
    Yu, Li-shan
    Bao, Bo
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 4060 - 4063