Computer Science ›› 2021, Vol. 48 ›› Issue (6): 338-342.doi: 10.11896/jsjkx.201200239

• Information Security • Previous Articles     Next Articles

Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network

WANG Jin-heng1, SHAN Zhi-long2, TAN Han-song3, WANG Yu-lin1   

  1. 1 School of Computer Science & Engineering,Guangzhou Institute of Science and Technology,Guangzhou 510540,China
    2 School of Computer Science,South China Normal University,Guangzhou 510631,China
    3 School of Computer Science,Central South University,Changsha 410006,China
  • Received:2020-12-31 Revised:2021-03-06 Online:2021-06-15 Published:2021-06-03
  • About author:WANG Jin-heng,born in 1982,master,lecturer.Her main research interests include computer network technology,artificial intelligence and cloud computing.(11403404@qq.com)
    WANG Yu-lin,born in 1982,master,associate professor.His main research interests include network security and cloud computing.
  • Supported by:
    National Natural Science Foundation of China(61671213),Quality Engineering Construction Project of Guangdong Province,China(2020SZL02) and Teaching Reform and Construction Project of Guangdong Province, China(2018SJG04).

Abstract: In order to improve the performance of network security situation assessment,this paper presents a network security situation assessment method based on genetic optimization probabilistic neural network.Firstly,In the process of network security situation assessment modeling,according to the characteristics of network security situation and common evaluation levels,the network security situation assessment model of PNN neural network is established,and the advantages of PNN neural network in fine-grained network security situation assessment are fully exploited.Then,in order to prevent the slow convergence caused by the fine-grained evaluation of network security situation parameters,the correction factors of PNN are left,and then the stable PNN network security situation assessment model is obtained by iterative training of PNN neural network.Experiments show that compared with the traditional PNN neural network algorithm,by using genetic algorithm to optimize the PNN network security situation assessment classification,evaluation accuracy is higher,average accuracy rate is more than 90%,and training speed is faster.

Key words: Genetic algorithm, Network attack, Network security situation, Probabilistic neural network

CLC Number: 

  • TP393.08
[1]LIU J,SU P R.Review of software and network security [J].Acta Sinica Sinica,2018,29(1):42-68.
[2]SONG J,TANG G L.Research and application of network security situation awareness technology [J].Communication Technology,2018(6):187-192.
[3]XIE L X,WANG Z H.Network security situation assessment method based on cuckoo search Optimized BP neural network [J].Computer Applications,2017,37(7):1926-1930.
[4]LIU H,LIU J H,HUI X Y.Network security situation assessment based on cloud model and Markov chain [J].Computer and Digital Engineering,2019(6):155-159.
[5]YE L,TAN Z J.A network security situation assessment me-thod based on deep learning [J].Intelligent Computer and Application,2019,9(6):73-75.
[6]HAN X L,LIU Y,ZHANG Z J,et al.Overview of network security situation awareness theory and technology and Research on difficult problems [J].Information Security and Communication Security,2019(7):61-71.
[7]OLIMID R F.SecRet:How to Apply the 5E Model for a Master’s Level Network Security Course[J].IEEE Communications Magazine,2019,57(11):54-59.
[8]FENG S,XIONG Z,NIYATO D,et al.Joint Traffic Routing and Virtualized Security Function Activation in Wireless Multihop Networks[J].IEEE Transactions on Vehicular Technology,2019,68(99):9205-9219.
[9]LU Z,QU G,LIU Z.A Survey on Recent Advances in Vehicular Network Security,Trust,and Privacy[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(2):760-776.
[10]MAZURCZYK W,BISSON P,JOVER R P,et al.Challengesand Novel Solutions for 5G Network Security,Privacy and Trust[J].IEEE Wireless Communications,2020,27(4):6-7.
[11]SEVINÇ E,COŞAR A.An Evolutionary Genetic Algorithm for Optimization of Distributed Database Queries[J].2018,54(5):717-725.
[12]KANTOUR N,BOUROUBI S.Cryptanalysis of Merkle-Hell-man cipher using parallel genetic algorithm[J].Mobile Networks and Applications,2019(8):1-12.
[13]JIA W,ZHAO D,ZHENG Y,et al.A novel optimized GA-Elman neural network algorithm[J].Neural Computing and Applications,2019,31(6):1-11.
[14]QU X H,SHI X M.Research on network security situation assessment technology based on analytic hierarchy process [J].Automation Technology and Application,2018,37(11):43-45.
[15]WU J T,QIAO Y F,ZHU S F,et al.Network security situation assessment and prediction method based on HMM [J].Navigation and Control,2018(2):13-20,34.
[16]HUANG Z H.Heuristic network security situation prediction based on simplex vector machine [J].Journal of Hunan Institute of Engineering (Natural Science Edition),2020,30(1):53-56.
[17]CAO J M.Research on Network Security Framework of Hyperheuristic SVM for Big Data [J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition),2020,32(1):23-29.
[18]ZARCA A M,BERNABE J B,SKARMETA A,et al.VirtualIoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks[J].IEEE Journal on Selected Areas in Communications,2020,38(99):1262-1277.
[19]UBARHANDE S D,DOYE D D,NALWADE P S.A timestamp-based algorithm to improve security and performance of mobile ad hoc network[J].Wireless Networks,2019,25(4):1867-1874.
[20]ZHU N,YAO S H,ZHENG X L.Analysis and Model Establishment for Mobile Communication Network Risk Evaluation Index System[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(3):100-106.
[21]LI X.A Real-time Prediction Method of Network Security Risk Based on Predictive Model [J].Journal of Chongqing University of Technology(Natural Science),2019,33(2):132-137.
[1] YANG Hao-xiong, GAO Jing, SHAO En-lu. Vehicle Routing Problem with Time Window of Takeaway Food ConsideringOne-order-multi-product Order Delivery [J]. Computer Science, 2022, 49(6A): 191-198.
[2] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[3] SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240.
[4] WU Shan-jie, WANG Xin. Prediction of Tectonic Coal Thickness Based on AGA-DBSCAN Optimized RBF Neural Networks [J]. Computer Science, 2021, 48(7): 308-315.
[5] ZHENG Zeng-qian, WANG Kun, ZHAO Tao, JIANG Wei, MENG Li-min. Load Balancing Mechanism for Bandwidth and Time-delay Constrained Streaming Media Server Cluster [J]. Computer Science, 2021, 48(6): 261-267.
[6] ZUO Jian-kai, WU Jie-hong, CHEN Jia-tong, LIU Ze-yuan, LI Zhong-zhi. Study on Heterogeneous UAV Formation Defense and Evaluation Strategy [J]. Computer Science, 2021, 48(2): 55-63.
[7] SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363.
[8] GAO Shuai, XIA Liang-bin, SHENG Liang, DU Hong-liang, YUAN Yuan, HAN He-tong. Spatial Cylinder Fitting Based on Projection Roundness and Genetic Algorithm [J]. Computer Science, 2021, 48(11A): 166-169.
[9] YAO Ze-wei, LIU Jia-wen, HU Jun-qin, CHEN Xing. PSO-GA Based Approach to Multi-edge Load Balancing [J]. Computer Science, 2021, 48(11A): 456-463.
[10] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[11] JI Shun-hui, ZHANG Peng-cheng. Test Case Generation Approach for Data Flow Based on Dominance Relations [J]. Computer Science, 2020, 47(9): 40-46.
[12] DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184.
[13] LIANG Zheng-you, HE Jing-lin, SUN Yu. Three-dimensional Convolutional Neural Network Evolution Method for Facial Micro-expression Auto-recognition [J]. Computer Science, 2020, 47(8): 227-232.
[14] YANG De-cheng, LI Feng-qi, WANG Yi, WANG Sheng-fa, YIN Hui-shu. Intelligent 3D Printing Path Planning Algorithm [J]. Computer Science, 2020, 47(8): 267-271.
[15] FENG Bing-chao and WU Jing-li. Partheno-genetic Algorithm for Solving Static Rebalance Problem of Bicycle Sharing System [J]. Computer Science, 2020, 47(6A): 114-118.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!