Computer Science ›› 2019, Vol. 46 ›› Issue (10): 161-166.doi: 10.11896/jsjkx.180901820

• Information Security • Previous Articles     Next Articles

Network Security Situation Prediction Method Based on NAWL-ILSTM

ZHU Jiang, CHEN Sen   

  1. (Chongqing Key Lab of Mobile Communications Technology,School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
  • Received:2018-09-28 Revised:2019-02-13 Online:2019-10-15 Published:2019-10-21

Abstract: Security situation is the premise of network security warning.The network attacks in complex network environment bring unexpected challenges,causing the sudden network security incidents such as increasing network load and network failure happen at any time.Therefore,taking into account the uncertainty and non-linearity of network security situation time series,in order to further improve the forecast accuracy of network security situation,this paper proposed a network security situation prediction method based on NAWL-ILSTM (Nadam with Look-ahead and Improved Long Short-Term Memory).Firstly,an online updating mechanism is adopted to improve the LSTM to establish time series forecasting model,which can conduct parameter updating in real time for the received online observed data and minimize the cost function,thus solving the problem that traditional LSTM algorithm can’t use network system to transmit data online reasonably,further,optimizing the parameter updating and improving the forecast accuracy of LSTM model.Then,aiming at the problems of slow convergence speed and high training cost in the training process of neural networks,the Look-ahead technology is used to improve the updating formula of Nesterov acceleration gradient adaptive estimated momentum algorithm (Nadam) to accelerate the convergence speed of the model,and then the trai-ning speed of ILSTM prediction model can be accelerated to reduce training time and cost.The simulation experiments based on Pythonin tensorflow environment demonstrate the rationality of the LSTM prediction model based on online updating mechanism.Convergence analysis and comparison experiments show the NAWL algorithm has faster convergence speed.Finally,the comparison experiments show that the proposed model based on NAWL-ILSTM has stronger applicability and higher applicability in situation time series analysis compared with other prediction model.

Key words: Adaptive momentum estimated algorithm, Long short-term memory, Look-ahead technology, Network security situation prediction, Online observation data

CLC Number: 

  • TP393
[1]JAJODIA S,LIU P,SWARUP V,et al.Cyber Situational Awareness:Issues and Research[M].Boston,MA:Spring-Verlag,US,2010.
[2]BOX G E P,JENKINS G M,REINSEL G C.Time series analysis forecasting and control,4th Edition[M].Beijing:Posts & Telecom Press,2005:19-180.
[3]LIANG W,CHEN Z,YAN X,et al.Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model[C]//IEEE International Congress on Internet of Things.IEEE,2017:97-104.
[4]LI F W,ZHENG B,ZHU J,et al. A method of network security situation prediction based on AC-RBF neural network.Journal of Chongqing University of Posts & Telecommunications,2014,26(5):576-581.(in Chinese)
李方伟,郑波,朱江,等.一种基于AC-RBF神经网络的网络安全态势预测方法.重庆邮电大学学报(自然科学版),2014,26(05):576-581.
[5]JIANG Y,LI C H,YU L S,et al.On Network Security Situation Prediction Based on RBF Neural Network[C]//2017 36th Chinese Control Conference,Beijing:Technical Committee on Control Theory of Chinese Association of Automation,2017:4060-4063.
[6]ZHANG S M,LI B X,WANG B Y.The Application of an Improved Integration Algorithm of Support Vector Machine to the Prediction of Network Security Situation[J].Applied Mechanics &Materials,2014,513-517(513-517):2285-2288.
[7]DUAN M.Short-Time Prediction of Traffic Flow Based on PSO Optimized SVM[C]//International Conference on Intelligent Transportation,Big Data & Smart City.IEEE Computer Society,2018:41-45.
[8]WANG X,WU J,LIU C,et al.Fault time series prediction based on LSTM cyclic neural network [J].Journal of Beijing University of Aeronautics and Astronautics,2018,44(4):772-784.(in Chinese)
王鑫,吴际,刘超,等.基于LSTM循环神经网络的故障时间序列预测[J].北京航空航天大学学报,2018,44(4):772-784.
[9]CHEN Z,LIU Y,LIU S.Mechanical State Prediction Based on LSTM Neural Netwok[C]//China Control Conference,Beijing:Technical Committee on Control Theory of Chinese Association of Automation.2017:3876-3881.
[10]ZHU J,MING Y,SONG Y H,et al.Mechanism of situation element acquisition based on deep auto-encoder network in wireless sensor networks[J].International Journal of Distributed Sensor Networks,2017,13(3):155014771769962.
[11]LING F W,ZHANG X Y,ZHU J,et al.Network security situation assessment model based on information fusion [J].Journal of Computer Applications,2015,35(7):1882-1887.(in Chinese)
李方伟,张新跃,朱江,等.基于信息融合的网络安全态势评估模型[J].计算机应用,2015,35(7):1882-1887.
[12]SUN R Q.Research on the price trend prediction model of the stock index based on LSTM neural network[D].Beijing:Capital University of Economics and Business,2016.(in Chinese)
孙瑞奇.基于LSTM神经网络的美股股指价格趋势预测模型的研究[D].北京:首都经济贸易大学,2016.
[13]GREFF K,SRIVASTAVA R K,KOUTNIK J,et al.LSTM:A Search Space Odyssey[J].IEEE Transactions on Neural Networks & Learning Systems,2015,28(10):2222-2232.
[14]DOZAT T.Incorporating Nesterov Momentum into Adam[R].Stanford University,2015.
[15]SUTSKEVER I,MARTENS J,DAHL G,et al.On the importance of initialization and momentum in deep learning[C]//International Conference on International Conference on Machine Learning.JMLR.org,2013:1139-1147.
[16]BALLES L,HENNING P.Dissecting Adam:the sign,magni-tude and variance of stochastic gradients[C]//International Conference on Machine Learning.New York:ACM,2018:693-709.
[17]DUCHI J,HAZAN E,SINGER Y.Adaptive Subgradient Me-thods for Online Learning and Stochastic Optimization[J].Journal of Machine Learning Research,2011,12(7):257-269.
[18]YEUNG S,RUSSAKOVSKY O,NING J,et al.Every Moment Counts:Dense Detailed Labeling of Actions in Complex Videos[J].International Journal of Computer Vision,2017(8):1-15.
[19]ZHANG C,ZHANG C,ZHANG C.An improved Adam Algorithm using look-ahead[C]//International Conference on Deep Learning Technologies.New York:ACM,2017:19-22.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[3] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[4] KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21.
[5] PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300.
[6] LIU Meng-yang, WU Li-juan, LIANG Hui, DUAN Xu-lei, LIU Shang-qing, GAO Yi-bo. A Kind of High-precision LSTM-FC Atmospheric Contaminant Concentrations Forecasting Model [J]. Computer Science, 2021, 48(6A): 184-189.
[7] DING Ling, XIANG Yang. Chinese Event Detection with Hierarchical and Multi-granularity Semantic Fusion [J]. Computer Science, 2021, 48(5): 202-208.
[8] LIU Jia-chen, QIN Xiao-lin, ZHU Run-ze. Prediction of RFID Mobile Object Location Based on LSTM-Attention [J]. Computer Science, 2021, 48(3): 188-195.
[9] LIU Qi, CHEN Hong-mei, LUO Chuan. Method for Prediction of Red Blood Cells Supply Based on Improved Grasshopper Optimization Algorithm [J]. Computer Science, 2021, 48(2): 224-230.
[10] PENG Bin, LI Zheng, LIU Yong, WU Yong-hao. Automatic Code Comments Generation Method Based on Convolutional Neural Network [J]. Computer Science, 2021, 48(12): 117-124.
[11] LIU Xiao-xuan, JI Yi, LIU Chun-ping. Voiceprint Recognition Based on LSTM Neural Network [J]. Computer Science, 2021, 48(11A): 270-274.
[12] ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45.
[13] ZHAO Jia-qi, WANG Han-zheng, ZHOU Yong, ZHANG Di, ZHOU Zi-yuan. Remote Sensing Image Description Generation Method Based on Attention and Multi-scale Feature Enhancement [J]. Computer Science, 2021, 48(1): 190-196.
[14] ZHANG Yu-shuai, ZHAO Huan, LI Bo. Semantic Slot Filling Based on BERT and BiLSTM [J]. Computer Science, 2021, 48(1): 247-252.
[15] CUI Tong-tong, WANG Gui-ling, GAO Jing. Ship Trajectory Classification Method Based on 1DCNN-LSTM [J]. Computer Science, 2020, 47(9): 175-184.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!