Computer Science and Applications

Network Security Situation Assessment Based on Improved SKNet-SVM

Expand
  • 1. Collage of Computer and Cyber Security, Hebei Normal University, Shijiazhuang 050024, Hebei, China;
    2. Hebei Key Laboratory of Network and Information Security, Hebei Normal University, Shijiazhuang 050024, Hebei, China;
    3. Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security, Shijiazhuang 050024, Hebei, China

Received date: 2022-03-25

  Online published: 2024-03-28

Abstract

In order to improve the accuracy, stability, and robustness of network security situation assessment, a network security situation assessment model based on improved selective kernel convolutional neural network and support vector machine is proposed. Firstly,the traditional kernel for feature extraction is replaced with the improved selective kernel to enhance the adaptability of the convolutional neural network to changes in receptive field,thereby strengthening the correlation between features. Then, the extracted features are fed into the support vector machine for classification, and the grid optimization algorithm is used to optimize the parameters in the support vector machine globally. Finally, the network security situation value is calculated according to the network attack impact index.Experimental results show that the situation assessment model based on improved selective kernel convolutional neural network and support vector machine achieves higher accuracy,stronger stability and robustness compared to traditional convolutional neural networks.

Cite this article

ZHAO Dongmei, SUN Mingwei, SU Mengyue, WU Yaxing . Network Security Situation Assessment Based on Improved SKNet-SVM[J]. Journal of Applied Sciences, 2024 , 42(2) : 334 -349 . DOI: 10.3969/j.issn.0255-8297.2024.02.014

References

[1] Mazurczyk W, Bisson P, Jover R P, et al. Challenges and novel solutions for 5G network security, privacy and trust [J]. IEEE Wireless Communications, 2020, 27(4):6-7.
[2] Bass T. Intrusion detection systems and multisensor data fusion [J]. Communications of the ACM, 2000, 43(4):99-105.
[3] 谢丽霞, 王志华. 基于布谷鸟搜索优化BP神经网络的网络安全态势评估方法[J]. 计算机应用, 2017, 37(7):1926-1930. Xie L X, Wang Z H. Network security situation assessment method based on cuckoo search optimized back propagation neural network [J]. Journal of Computer Applications, 2017, 37(7):1926-1930.
[4] 姜旭炜, 文志诚, 邓勇杰. 基于粗糙集神经网络的网络安全态势评估方法[J]. 湖南工业大学学报, 2015, 29(3):76-82. Jiang X W, Wen Z C, Deng Y J. Network security situation evaluation based on rough set and neural network [J]. Journal of Hunan University of Technology, 2015, 29(3):76-82.
[5] 王金恒, 单志龙, 谭汉松, 等. 基于遗传优化PNN神经网络的网络安全态势评估[J]. 计算机科学, 2021, 48(6):338-342. Wang J H, Shan Z L, Tan H S, et al. Network security situation assessment based on genetic optimized PNN neural network [J]. Computer Science, 2021, 48(6):338-342.
[6] 杨宏宇, 张梓锌, 张良. 基于并行特征提取和改进BiGRU的网络安全态势评估[J]. 清华大学学报(自然科学版), 2022, 62(5):842-848. Yang H Y, Zhang Z X, Zhang L. Network security situation assessments with parallel feature extraction and an improved BiGRU [J]. Journal of Tsinghua University (Science and Technology), 2022, 62(5):842-848. (in Chinese)
[7] 李欣, 段詠程. 基于改进隐马尔可夫模型的网络安全态势评估方法[J]. 计算机科学, 2020, 47(7):287-291. Li X, Duan Y C. Network security situation assessment method based on improved hidden Markov model [J]. Computer Science, 2020, 47(7):287-291. (in Chinese)
[8] Fukushima K. Neocognitron:a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position [J]. Biological Cybernetics, 1980, 36(4):193-202.
[9] Lecun Y, Bottou L, Bengio Y, et al. Gradient-based learning applied to document recognition [J]. Proceedings of the IEEE, 1998, 86(11):2278-2324.
[10] Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks [J]. Communications of the ACM, 2017, 60(6):84-90.
[11] Lin M, Chen Q, Yan S. Network in network [C]//2nd International Conference on Learning Representations, 2014.
[12] Srivastava R K, Greff K, Schmidhuber J. Highway networks [DB/OL]. 2015[2022-03-25]. http://arxiv.org/abs/1505.00387.
[13] Szegedy C, Vanhoucke V, Ioffe S, et al. Rethinking the inception architecture for computer vision [C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016:2818-2826.
[14] Cortes C, Vapnik V. Support-vector networks [J]. Machine Learning, 1995, 20(3):273-297.
[15] Boser B E, Guyon I M, Vapnik V N. A training algorithm for optimal margin classifiers [C]//5th Annual Workshop on Computational learning theory, 1992:144-152.
[16] Platt J C. Fast training of support vector machines using sequential minimal optimization [M]. [S.l.]:The MIT Press, 1998.
[17] Li X, Wang W H, Hu X L, et al. Selective kernel networks [C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020:510-519.
[18] 李小涛. 基于深度学习的网络安全态势感知研究[D]. 西安:西安电子科技大学, 2021.
[19] Yang H, Zeng R, Xu G, et al. A network security situation assessment method based on adversarial deep learning [J]. Applied Soft Computing, 2021, 102:107096.
[20] CVSS. Common vulnerability scoring system v3.1:specification document [EB/OL]. [2022-03-25]. https://www.first.org/cvss/v3-1/cvss-v31-specification_r1.pdf.
[21] Doynikova E, Chechulin A, Kotenko I. Analytical attack modeling and security assessment based on the common vulnerability scoring system [C]//201720th Conference of Open Innovations Association (FRUCT), IEEE, 2017:53-61.
Outlines

/