Computer Science ›› 2021, Vol. 48 ›› Issue (12): 349-356.doi: 10.11896/jsjkx.210400227

• Information Security • Previous Articles     Next Articles

Network Security Situation Based on Time Factor and Composite CNN Structure

ZHAO Dong-mei1,2, SONG Hui-qian1, ZHANG Hong-bin3   

  1. 1 College of Computer and Cyber Security,Hebei Normal University,Shijiazhuang 050024,China
    2 Hebei Key Laboratory of Network and Information Security,Hebei Normal University,Shijiazhuang 050024,China
    3 School of Information Science and Engineering,Hebei University of Science and Technology,Shijiazhuang 050018,China
  • Received:2021-04-21 Revised:2021-09-05 Online:2021-12-15 Published:2021-11-26
  • About author:ZHAO Dong-mei,born in 1966,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.Her main research interests include network information security and computer application.
  • Supported by:
    National Natural Science Foundation of China(61672206),Central Guide Local Science and Technology Development Fund Project(216Z0701G), Key Research and Development Program of Hebei Province(20310701D) and Natural Science Foundation of Hebei Province(F2019205163).

Abstract: In order to solve the problem of low accuracy of traditional network security situation awareness research methods in the case of complex network information,combined with deep learning,this paper proposes a network security situation assessment model based on time factor and composite CNN structure,which combines volume integral solution technology and deep separable technology to form a four layer series composite optimal unit structure.The one-dimensional network data are transformed into two-dimensional matrix and loaded into the neural network model in the form of gray value,so as to give full play to the advantages of convolution neural network.In order to make full use of the time-series relationship between data,time factor is introduced to form fusion data,which makes the network to learn the original data and fusion data with time-series relationship at the same time,the feature extraction ability of the model is increased,the spatial mapping of time-series data is established by using time factor and point convolution,and the integrity of the model structure is increased.Experimental results show that the accuracy of the proposed model on two datasets is 92.89% and 92.60% respectively,which is 2%~6% higher than randomfo-rest and LSTM algorithm.

Key words: CNN, Convolution decomposition, Depthwise separable convolution, Situational awareness, Time factor

CLC Number: 

  • TP393
[1]ENDSLEY M R.Toward a Theory of Situation Awareness in Dynamic Systems[J].Human Actors:The Journal of the Human Factors and Ergonomics Society,1995,37(1):32-64.
[2]BASS T.Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems [C]//1999 Proceedings of the Iris National Symposium on Sensor & Data Fusion.1999:24-27.
[3]LIU X W,YU J G,LV W F,et al.Network security situation:from awareness to awareness-control[J].Journal of Network and Computer Applications,2019,139:15-30.
[4]ZHENG W.Research on situation awareness of network security assessment based on dempster-shafer[J].MATEC Web of Conferences,2020,309(10):02004.
[5]SUN W X.Pso and Svm for Network Security Situation Prediction[J].Computer Applications and Software,2019,36(6):308-316.
[6]LIN W N,CHEN M Z,ZHAN Y Q,et al.Research on an Intrusion Detection Algorithm Based on PCA and Random-forest Classification[J].Netinfo Security,2017(11):50-54.
[7]SHEN L,WEN Z C.Network security situation prediction in the cloud environment based on grey neural network[J].Journal of Computational Methods in Sciences and Engineering,2019,19(1):153-167.
[8]LIU J W,LIU J J,LU Y L,et al.Application of game theory in network security situation awareness[J].Journal of Computer Applications,2017,37(S2):48-51.
[9]ALAOUI I E,GAHI Y.Network Security Strategies in Big Data Context[J].Procedia Computer Science,2020,175:730-736.
[10]WANG Z J,CHEN L,SONG S Y,et al.Automatic cyber security risk assessment based on fuzzy fractional ordinary differential equations[J].Alexandria Engineering Journal,2020,59(4):2725-2731.
[11]DO C T,TRAN N H,HONG C,et al.Game Theory for Cyber Security and Privacy[J].ACM Computing Surveys,2017,50(2):1-37.
[12]BALAJ S,JULIE E G,ROBINSON Y H,et al.Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model[J].Computer Standards & Interfaces,2019,66(OCT):103358.1-103358.10.
[13]ZHAO D M,LIU J X.Study on network security situation awareness based on particle swarm optimization algorithm[J].Computers & Industrial Engineering,2018,125:764-775.
[14]LI S,ZHAO D M.LSTM-based method for comprehension and evaluation of network security situation[C]//2019 18th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/13th IEEE International Confe-rence on Big Data Science and Engineering (TrustCom/BigDataSE).IEEE,2019:723-728.
[15]CHEN J G,QI Z H,CHEN T F.Network security situation awareness based on RBF neural networks[J].Journal of Nanjing University of Posts and Telecommunications(Natural Scien-ce Edition),2019,39(4):88-95.
[16]CHEN H S,CHEN J J.Recurrent Neural Networks Based Wireless Network Intrusion Detection and Classification Model Construction and Optimization[J].Journal of Electronics & Information Technology,2019,41(6):1427-1433.
[17]DEMIR F,SENGUR A,BAJAJ V.Convolutional neural net- works based efficient approach for classification of lung diseases[J].Health Information Science and Systems,2020,8(1):1-8.
[18]SYDNEY M K,SUN Y X.A deep learning method with wrapper based feature extraction for wireless intrusion detection system[J].Computers &Security,2020,92:101752.1-101752.15.
[1] JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186.
[2] YUE Qing, YIN Jian-yu, WANG Sheng-sheng. Automatic Detection of Pulmonary Nodules in Low-dose CT Images Based on Improved CNN [J]. Computer Science, 2022, 49(6A): 54-59.
[3] YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171.
[4] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[5] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[6] ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383.
[7] ZHAO Zheng-peng, LI Jun-gang, PU Yuan-yuan. Low-light Image Enhancement Based on Retinex Theory by Convolutional Neural Network [J]. Computer Science, 2022, 49(6): 199-209.
[8] TAN Zhen-qiong, JIANG Wen-Jun, YUM Yen-na-cherry, ZHANG Ji, YUM Peter-tak-shing, LI Xiao-hong. Personalized Learning Task Assignment Based on Bipartite Graph [J]. Computer Science, 2022, 49(4): 269-281.
[9] HUANG Xiao-sheng, XU Jing. Multi-focus Image Fusion Method Based on PCANet in NSST Domain [J]. Computer Science, 2021, 48(9): 181-186.
[10] XING Hao, LI Ming. Deepfake Video Detection Based on 3D Convolutional Neural Networks [J]. Computer Science, 2021, 48(7): 86-92.
[11] CUI Wen-hao, JIANG Mu-rong, YANG Lei, FU Peng-ming, ZHU Ling-xiao. Combining MCycleGAN and RFCNN to Realize High Resolution Reconstruction of Solar Speckle Image [J]. Computer Science, 2021, 48(6A): 38-42.
[12] LIU Han-qing, KANG Xiao-dong, LI Bo, ZHANG Hua-li, FENG Ji-chao, HAN Jun-ling. Comparative Study on Classification and Recognition of Medical Images Using Deep Learning Network [J]. Computer Science, 2021, 48(6A): 89-94.
[13] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[14] ZHONG Yue, FANG Hu-sheng, ZHANG Guo-yu, WANG Zhao, ZHU Jing-wei. Method of CNN Flag Movement Recognition Based on 9-axis Attitude Sensor [J]. Computer Science, 2021, 48(6): 153-158.
[15] SHU Xin, CHANG Feng, ZHANG Xin, DU Rui, YU Zhuan. Transverse Section Recognition Algorithm Based on BCNN for Fetal Craniocerebral Ultrasound [J]. Computer Science, 2021, 48(4): 151-156.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!