Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 335-337.

• Information Security • Previous Articles     Next Articles

Research on Cyberspace Situation Awareness Security Assessment Based on Improved BP Neural Network

CHEN Wei-peng1,2, AO Zhi-gang1, GUO Jie1, YU Qin1, TONG Jun1   

  1. College of Field Engineering,Land Force Engineering University,Nanjing 210007,China1
    73233 Army of PLA,Zhoushan,Zhejiang 316014,China2
  • Online:2019-02-26 Published:2019-02-26

Abstract: This paper used BP neural network algorithm to establish the relationship between the network situation awareness level and the perceived parameters,and situation awareness was assessed quantitatively.The research of neural network in this field is the most mature,but the traditional BP neural network algorithm is slow in feedback error,and it is likely to converge to a local extremum.So the variable step learning strategy and simulated annealing method are used to build a virtual network HoneyNet simulation environment,then the Matlab is used for algorithm simulation.The obtained results are close to the actual results.

Key words: BP neural network, Evaluation index system, Network security, Situation awareness

CLC Number: 

  • TP393.08
[1]罗守山.入侵检测[M].北京:北京邮电大学出版社,2004:82-87.
[2]于德江.灰色系统建模方法的探讨[J].系统工程,1991,9(5):9-12.
[3]谢丽霞,王亚超,于巾博.基于神经网络的网络安全态势感知[J].清华大学学报,2013,53(12):1750-1760.
[4]梁颖,王慧强,赖积保.一种基于粗糙集理论的网络安全态势感知方法[J].计算机科学,2007,34(8):95-97.
[5]张云涛,龚玲.数据挖掘原理与技术[M].北京:电子工业出版社,2004:1-57.
[6]孙德衡.基于指标融合的网络安全态势评估模型研究[D].西安:西北大学,2012.
[7]郑皆亮.基于灰色理论的网络信息安全评估模型研究[D].南京:南京信息工程大学,2005.
[8]飞思科技.神经网络理论和matlab7实现[M].北京:电子工业出版社,2006:15-30.
[9]林蔚天.改进的粒子群优化算法研究及其若干应用[D].上海:华东理工大学,2012.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[3] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[4] LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266.
[5] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[6] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[7] XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660.
[8] XIA Jing, MA Zhong, DAI Xin-fa, HU Zhe-kun. Efficiency Model of Intelligent Cloud Based on BP Neural Network [J]. Computer Science, 2022, 49(2): 353-367.
[9] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[10] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[11] TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517.
[12] CHENG Tie-jun, WANG Man. Network Public Opinion Trend Prediction of Emergencies Based on Variable Weight Combination [J]. Computer Science, 2021, 48(6A): 190-195.
[13] GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320.
[14] WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342.
[15] ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!