Computer Science ›› 2022, Vol. 49 ›› Issue (7): 357-362.doi: 10.11896/jsjkx.210900103

• Information Security • Previous Articles    

Network Security Situation Prediction Based on IPSO-BiLSTM

ZHAO Dong-mei1,2, WU Ya-xing1, ZHANG Hong-bin3   

  1. 1 College of Computer and Cyber Security,Hebei Normal University,Shijiazhuang 050024,China
    2 Hebei Key Laboratory of Network and Information Security,Hebei Normal University,Shijiazhuang 050024,China
    3 School of Information Science and Engineering,Hebei University of Science and Technology,Shijiazhuang 050018,China
  • Received:2021-09-13 Revised:2021-12-09 Online:2022-07-15 Published:2022-07-12
  • About author:ZHAO Dong-mei,born in 1966,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer federation.Her main research interests include network information security and computer application.
    WU Ya-xing,born in 1997,postgra-duate.His main research interests include network and information security technology.
  • Supported by:
    National Natural Science Foundation of China(61672206),Central Guide Local Science and Technology Development Fund Project(216Z0701G),Key Research and Development Program of Hebei(20310701D) and Natural Science Foundation of Hebei Province(F2019205163).

Abstract: Aiming at the complex network security situation prediction problem,a network security situation prediction model based on improved particle swarm optimization bidirectional long-short term memory(IPSO-BILSTM) network is proposed to improve the convergence speed and prediction accuracy.Firstly,in view of the lack of real situation value in the data set,a situation value calculation method based on attack influence is adopted for situation prediction.Secondly,to address the problems that particle swarm optimization(PSO) algorithm is prone to fall into local optima and unbalanced search capability,the inertia weights and acceleration factors are improved,and the improved particle swarm optimization(IPSO) algorithm has balanced global and local search capability and faster convergence speed.Finally,IPSO is used to optimize the parameters of bidirectional long short term memory(BiLSTM) network,so as to improve the prediction ability.Experimental results show that the fitting degree of IPSO-BiLSTM can reach 0.994 6,and the fitting effect and convergence speed are better than other models.

Key words: Bidirectional long-short term memory, Improved particle swarm optimization, Network security, Neural network, Situation prediction

CLC Number: 

  • TP393
[1]National Internet Emergency Response Center(CNERT/CC).Report on Monitoring Data Analysis of China's Internet Network Security in the first half of 2021 [EB/OL].(2021-07-31)[2021-08-10].
[2]WEN Z C,CHEN Z G,TANG J.Network security situationprediction based on time series analysis[J].Journal of South China University of Technology(Natural Science Edition),2016,44(5):137-143,150.
[3]ZHANG X,HU C Z,LIU S H,et al.Research on network attack Situation Prediction Technology based on Support Vector Machine[J].Computer Engineering,2007(11):10-12.
[4]ZHAO D M,SONG H Q,LI H.Fuzzy integrated rough set theory situation feature extraction of network security[J].Journal of Intelligent & Fuzzy Systems,2021,40(4):8439-8450.
[5]WANG H B,ZHAO D M,LI X X.Research on Network Secu-rity Situation Assessment And Forecasting Technology[J].Journal of Web Engineering,2020,19(7/8):1239-1266.
[6]ZHAO D M,WANG H B.Compound Attack Prediction Method Based on Improved Algorithm of Hidden Markov Model[J].Journal of Web Engineering,2020,19(7/8):1213-1238.
[7]ZHAO D M,LIU J X.Study on network security situationawareness based on particle swarm optimization algorithm[J].Computers & Industrial Engineering,2018,125:764-775.
[8]SONG H Q,ZHAO D M.Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor[J].Mobile Networks and Applications,2021:26(3):1008-1023.
[9]LIU K Z,GOU J P,LUO Z,et al.Prediction method of Dis-solved Gas Concentration in Transformer Oil Based on Particle Swarm Optimization-Long Short-term Memory Network Model[J].Power Grid Technology,2020,44(7):2778-2785.
[10]HU Q S,LI C H,LU Y L,et al.Network Security Situation Prediction Method Based on Hierarchically Optimized Belief Rule Base[J].Computer Engineering,2020,46(12):127-133.
[11]TANG Y Q,LI C H,SONG Y F.Network Security Situation Prediction Based on Improved Particle Swarm Optimization and Extreme Learning Machine[J].Computer Applications,2021,41(3):768-773.
[12]KONG W,DONG Z Y,JIA Y,et al.Short-Term ResidentialLoad Forecasting Based on LSTM Recurrent Neural Network[J].IEEE Transactions on Smart Grid(S1949-3053),2019,1(10):841-851.
[13]HOCHREITER S,SCHMIDHUBER J.Long Short-term Me-mory[J].Neural Computation,1997,9:1735-1780.
[14]KENNEDY J,EBERHART R.Particle swarm optimization[C]//Proceedings of the 1995 International Conference on Neural Networks.Piscataway:IEEE,1995:1942-1948.
[15]ALDAWERI M S,ARIFFIN K Z,ABDULLAH S,et al.AnAnalysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System[J].Symmetry,2020,12(10):1666-1666.
[16]SARIKA C,NISHTHA K.Analysis of KDD-Cup'99,NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT[J].Procedia Computer Science,2020,167:1561-1573.
[17]LUO Z.Research on Network Security Situation Assessmentand Prediction Technology based on Neural Network [D].Xi'an:Northwest University,2018.
[1] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[2] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[3] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[4] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[5] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[6] WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55.
[7] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[8] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[9] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[10] QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24.
[11] YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63.
[12] ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105.
[13] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[14] LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131.
[15] XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141.
Full text



No Suggested Reading articles found!