Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400151-6.doi: 10.11896/jsjkx.220400151

• Information Security • Previous Articles     Next Articles

Network Security Situation Assessment for GA-LightGBM Based on PRF-RFECV Feature Optimization

REN Gaoke1, MO Xiuliang2   

  1. 1 School of Computer Science and Engineering,Tianjin University of Technology,Tianjin 300384,China;
    2 Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology,Tianjin University of Technology,Tianjin 300384,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:REN Gaoke,born in 1996,master.His main research interests include network security situation awareness and so on. MO Xiuliang,born in 1969,associate professor,His main research interests include information security and artificial intelligence.
  • Supported by:
    National Funds-Joint Fund Projects(U1536122),Key Special Project of “Science and Technology Helps Economy 2020” of the Ministry of Science and Technology(SQ2020YFF0413781) and Major Project of Tianjin Science and Technology Commission(15ZXDSGX00030).

Abstract: At present,in the field of cyber security,due to the shortcomings of long training time and high sensitivity to redundant features,traditional machine learning models have been unable to deal with the increasingly complex network space.To improve the accuracy and efficiency of network security situation awareness for massive and high-dimensional network security elements,a GA-LightGBM network security situation awareness model based on PRF-RFECV feature preference is proposed,which first uses parallel random forest to filter out feature importance,then combines recursive feature elimination with cross-validation to select the optimal feature set,and finally uses the global search property of genetic algorithm to select the optimal parameters of LightGBM model for classification.Experimental simulation shows that the model is more accurate and more efficient than the traditional network security situation awareness algorithm in terms of both accuracy and F1 score.

Key words: Network security situation, Light gradient boosting machine, Random forest, Genetic algorithm

CLC Number: 

  • TP393
[1]GONG J,ZHANG X,SHU Q,et al,Survey of network security situation awareness[J].Journal of Software,2017,28(4):1010-1026.
[2]DONG G,LI W,WANG S,et al.The assessment method of network security situation based on improved BP neural network[C]//International Conference on Computer Engineering and Networks.Cham:Springer,2018:67-76.
[3]HE Y.Assessment model of network security situation based on K nearest neighbor and support vector machine[J].Computer Engineering and Applications,2013,49(9):81-84.
[4]ZHAO D M,SONG H Q,ZHANG H B.Network security situation based on time factor and composite CNN structure[J].Computer Science,2021,48(12):349-356.
[5]TAVALLAEE M,BAGHERI E,LU W,et al.A de-tailed analysis of the KDD CUP 99 data set[C]//2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.IEEE,2009:1-6.
[6]MELL P,SCARFONE K,ROMANOSKYS.Common vulnerability scoring system[J].IEEE Security & Privacy,2006,4(6):85-89.
[7]State Council.National master plan for resp-onding to public emergencies[M].Beijing:China Legal Publishing House,2006:4-6.
[8]KE G,MENG Q,FINLEY T,et al.Lightgbm:Ahighly efficient gradient boosting decision tree[J].Advances in Neural Information Processing Systems,2017,30:6-8
[9]ZHOU J Y,HE P F,QIU R F,et al.Research on intrusion detection based on random Forest and gradient[J].Journal of Software,2021,32(10):3254-3265.
[10]SCHONLAU M,ZOU R Y.The random forest algorithm for statistical learning[J].The Stata Journal,2020,20(1):3-29.
[11]NAGHIBI S A,HASHEMI H,BERNDTSSONR,et al.Application of extreme gradient boosting and parallel random forest algorithms for assessing groundwater spring potential using DEM-derived factors[J].Journal of Hydrology,2020,589:125197.
[12]SHANG Q,FENG L,GAO S.A hybrid method for traffic incident detection using random forest-recursive feature elimination and long short-term memory network with bayesian optimization algorithm[J].IEEE Access,2020,9:1219-1232.
[13]KILIÇ H,YÜZGEÇ U.Tournament selection based antlion optimization algorithm for solving quadratic assignment problem[J].Engineering Science and Technology,an International Journal,2019,22(2):673-691.
[14]WANG J H,DAN Z L,et al.NetWork securety situation assessment based on genetic optimized PNN neural netword[J].Computer Science,2021,48(06):338-342.
[15]OPITZ J,BURST S.Macro f1 and macro f1[J].arXiv:1911.03347,2019.
[16]SHAH K,PATEL H,SANGHVI D,et al.A comparative analysis of logistic regression,random forest and KNN models for the text classification[J].Augmented Human Research,2020,5(1):1-16.
[17]TAO P,SUN Z,SUN Z.An improved intrusion detection algorithm based on GA and SVM[J].IEEE Access,2018,6:13624-13631.
[18]SHI Q,KANG J,WANG R,et al.A framework of intrusion detection system based on Bayesian network in IoT[J].International Journal of Performability Engineering,2018,14(10):2280-2293.
[19]DONG G,LI W,WANG S,et al.The assessment method of network security situation based on improved BP neural network[C]//International Conference on Computer Engineering and Networks.Cham:Springer,2018:67-76.
[1] LIU Ziwen, YU Lijuan, SU Yixing, ZHAO Yao, SHI Zhu. Test Case Generation Based on Web Application Front-end Behavior Model [J]. Computer Science, 2023, 50(7): 18-26.
[2] LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue. Adversarial Malware Generation Method Based on Genetic Algorithm [J]. Computer Science, 2023, 50(7): 325-331.
[3] ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306.
[4] CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389.
[5] ZHONG Jialin, WU Yahui, DENG Su, ZHOU Haohao, MA Wubin. Multi-objective Federated Learning Evolutionary Algorithm Based on Improved NSGA-III [J]. Computer Science, 2023, 50(4): 333-342.
[6] SHANG Yuye, YUAN Jiabin. Task Offloading Method Based on Cloud-Edge-End Cooperation in Deep Space Environment [J]. Computer Science, 2023, 50(2): 80-88.
[7] GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49.
[8] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[9] YANG Hao-xiong, GAO Jing, SHAO En-lu. Vehicle Routing Problem with Time Window of Takeaway Food ConsideringOne-order-multi-product Order Delivery [J]. Computer Science, 2022, 49(6A): 191-198.
[10] WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246.
[11] QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794.
[12] ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210.
[13] SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240.
[14] WANG Ze-qing, JI Sheng-peng, LI Xin, ZHAO Zi-xuan, WANG Peng-xu, HAN Xiao-song. Novel College Entrance Filling Recommendation Algorithm Based on Score Line Prediction andMulti-feature Fusion [J]. Computer Science, 2022, 49(11A): 211100266-7.
[15] ZHANG Bing-qing, FEI Qi, WANG Yi-chen, Yang Zhao. Study on Integration Test Order Generation Algorithm for SOA [J]. Computer Science, 2022, 49(11): 24-29.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!