Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 433-437.

• Information Security • Previous Articles     Next Articles

Network Security Situation Forecast Based on Differential WGAN

WGAN Ting-ting, ZHU Jiang   

  1. (School of Communication and Information Engineering,Chongqing University of Post and Telecommunications,Chongqing 400065,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: A network security posture prediction mechanism based on differential WGAN(Wasserstein- GAN) is presented in this paper.This mechanism uses Generative adversarial network (GAN) to simulate the development process of the situation,and realizes the situation forecast from the time Dimension.In order to solve the problem of difficult network training,collapse mode and gradient instability of GAN,this paper put forward the method by using Wasserstein distance as the loss function of GAN and adding the difference term in the loss function,to improve the classification precision of the situation value.The stability of the differential WGAN network was also proved.Experimental andanalysis results show that this mechanism has advantages over other mechanisms in terms of convergence,accuracy and complexity.

Key words: Difference, Generative adversarial network, Situation forecast, Situational awareness, Wasserstein-GAN

CLC Number: 

  • TN918.1
[1]谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报(自然科学版),2013(12):1750-1760.
[2]石波,谢小权.基于D-S证据理论的网络安全态势预测方法研究[J].计算机工程与设计,2013,34(3):821-825.
[3]陈善学,杨政,朱江,等.一种基于累加PSO-SVM的网络安全态势预测模型[J].计算机应用研究,2015,32(6):1778-1781.
[4]田庆安,郭玉锦,王文涛.基于小波与DBN的负荷预测模型[J].兰州理工大学学报,2017,43(2):110-114.
[5]ZHANG H,XU T,LI H.StackGAN:Text to Photo-Realistic Image Synthesis with Stacked Generative Adversarial Networks[C]∥IEEE International Confernece on Computer Vision(ICCV),2016:5908-5916.
[6]吴昊.随机森林预测与纳什均衡策略的高职英语教学模式研究[J].佳木斯职业学院学报,2017(2).
[7]CHANG J,SCHERER S.Learning representations of emotional speech with deep convolutional generative adversarial networks[C]∥IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2017:2746-2750.
[8]ZHAO Y,TAKAKI S,LUONG H T,et al.Wasserstein GAN Waveform Loss-based acoustic model training form Multi-speaker Text-toSpeechsynthesis systems using a wav Net roco-der[J].IEEE Access,2017:7(1):1-10.
[9]王峰,何俊.博弈论在通信对抗态势预测中的应用[J].运筹与管理,2011,20(2):132-136.
[10]RADFORD A,METZ L,CHINTALA S.Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks[J].Computer Science,2015.
[11]朱红春,黄伟,刘海英,等.基于KL散度的面向对象遥感变化检测[J].国土资源遥感,2017,29(2):46-52.
[12]张妍,韩光威,陆宁云,等.基于JS散度的轨道车辆门系统健康状态评估方法[J].机械设计与制造工程,2017,46(11):122-127.
[13]SRIVASTAVA A,VALKOV L,RUSSELL C,et al.VEEGAN:Reducing Mode Collapse in GANs using Implicit Variational Learning[J].arXiv:1705.07761,2017.
[14]王群,董文略,杨莉.基于Wasserstein距离和改进K-medoids聚类的风电/光伏经典场景集生成算法[J].中国电机工程学报,2015,35(11):2654-2661.
[15]ARJOVSKY M,CHINTALA S,BOTTOU L.Wasserstein GAN[J].2017.
[16]NAKAJO K.Improved gradient method for monotone and lipschitz continuous mappings in banach spaces[J].Acta Mathematica Scientia(English Series),2017,37(2):342-354.
[17]李南星,盛益强,倪宏.基于LM算法的MLP模型及其应用[J].网络新媒体技术,2018,7(1):59-63.
[18]MUKKAMALA M C,HEIN M.Variants of RMSProp and Adagrad with Logarithmic Regret Bounds[J].IEEE Transactions Biomed Engineering,2017,5(6):1220-1228.
[19]QIU Z,YAN Z,FEI Y,et al.RGB-DI Images and Fall Convolution Nuernal Network-Based Outdoor Scene Understanding for Mobile Robots.IEEE Transactions on Instrumentation & Measurement,2018,1(99):1-11.
[20]IOFFE S,SZEGEDY C.Batch Normalization:Accelerating Deep Network Training by Reducing Internal Covariate Shift[J].arXiv:1502.03167,2015.
[21]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897.
[1] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[2] HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346.
[3] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[4] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[5] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[6] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[7] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[8] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[9] CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164.
[10] DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202.
[11] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[12] LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184.
[13] SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39.
[14] LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91.
[15] TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!