Research on gray correlation analysis and situation prediction of network information security

Chengqiong Ye1, Wenyu Shi1, Rui Zhang1
1Institute of Information Engineering, Anhui Xinhua University, No. 555, Wangjiang West Road, Hefei, 230088, Anhui, China

Tóm tắt

AbstractIn order to further improve the accuracy and efficiency of network information security situation prediction, this study used the dynamic equal-dimensional method based on gray correlation analysis to improve the GM (1, N) model and carried out an experiment on the designed network security situation prediction (NSSP) model in a simulated network environment. It was found that the predicted result of the improved GM (1, N) model was closer to the actual value. Taking the 11th hour as an example, the predicted value of the improved GM (1, N) model was 28.1524, which was only 0.8983 larger than the actual value; compared with neural network and Markov models, the error of the improved GM (1, N) model was smaller: the average error was only 2.3811, which was 67.88% and 70.31% smaller than the other two models. The improved GM (1, N) model had a time complexity that was 49.99% and 39.53% lower than neural network and Markov models; thus, it had high computational efficiency. The experimental results verify the effectiveness of the improved GM (1, N) model in solving the NSSP problem. The improved GM (1, N) model can be further promoted and applied in practice and deployed in the network of schools and enterprises to achieve network information security.

Từ khóa


Tài liệu tham khảo

P. Bhandari, M. Singh, Semantic web based technique for network security situation awareness status prediction. Int. J. Nat. Eng. Sci. 14, 2229–6913 (2015)

A.D. Brucker, L. Brügger, B. Wolff, Formal firewall conformance testing: an application of test and proof techniques. Softw. Test. Verif. Rel. 25, 34–71 (2015). https://doi.org/10.1002/stvr.1544

Y. Hamid, V.R. Balasaraswathi, L. Journaux, M. Sugumaran, Benchmark Datasets for network intrusion detection: a review. Int. J. Netw. Secur. 20, 645–654 (2018)

R. Yadav, V. Kapoor, A hybrid cryptography technique for improving network security. Int. J. Comput. Appl. 141, 25–30 (2016)

T. Jirsik, P. Celeda, Toward real-time network-wide cyber situational awareness (2018), pp. 1–7. https://doi.org/10.1109/NOMS.2018.8406166

M. Azhagiri, A. Rajesh, S. Karthik, A multi-perspective and multi-level analysis framework in network security situational awareness. Int. J. Comput. Netw. Commun. Sec. 5, 71–75 (2017)

D.M. Li, L.B. Deng, B.B. Gupta, H.X. Wang, C. Choi, A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inform. Sci. 479, 432–447 (2019). https://doi.org/10.1016/j.ins.2018.02.060

M. Husák, J. Komárková, E. Bou-Harb, P. Celeda, Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun. Surv. Tut. 21, 640–660 (2019)

Z.M. Yunos, W. Idrus, S.M. Shamsuddin, M.S.I. Saadon, S.M. Yusuf, Enhanced of autism spectrum disorder using grey relational analysis and supervised learning for classification. Paper presented at 2nd Joint Conference on Green Engineering Technology & Applied Computing (IOP Publishing Ltd, Bangkok, 2020)

M.R. Endsley, Design and evaluation for situation awareness enhancement. Proc. Hum. Factors Soc. Ann. Meet. 32, 97–101 (1988). https://doi.org/10.1177/154193128803200221

M.A. Bode, S. Oluwadare, B.K. Alese, A. Thompson, Risk analysis in cyber situation awareness using Bayesian approach. Paper presented at 2015 International Conference on Cyber Situational Awareness (Data Analytics and Assessment (CyberSA), London, 2015)

Y.B. Leau, S. Manickam, A novel adaptive grey Verhulst model for network security situation prediction. Int. J. Adv. Comput. Sci. Appl 7, 90–95 (2016)

D. Kim, T. Lee, S.D. Jung, H.P. In, H. Lee, Cyber threat trend analysis model using HMM. Paper presented at Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security (IEEE Computer Society, Manchester, 2007)

J. Holsopple, S.J. Yang, FuSIA: Future situation and impact awareness. Inform. Fusion, 1–8 (2008). https://doi.org/10.1109/ICIF.2008.4632456

S. Panigrahi, H.S. Behera, A. Abraham, A fuzzy filter based hybrid ARIMA-ANN model for time series forecasting. Paper presented at Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016) (VIT University, Vellore, 2016), pp. 19–21

M. Elsayed, A. Soliman, Prediction of technical reserves based on grey model - GM(1,1): evidence from non-life Egyptian insurance market. J. Busin. Econ 10, 852–860 (2019). https://doi.org/10.15341/jbe(2155-7950)/09.10.2019/006

K.C. Chiu, C.S. Lai, T. Thi, GM(1,N) Analysis of effect of consumer confidence and transaction security on Vietnamese online shopping intention. Paper presented at ICEMC 2019: Proceedings of the 2019 5th International Conference on E-business and Mobile Commerce (ICEMC, Taichung, 2019), pp. 25–29. https://doi.org/10.1145/3332324.3332331.

J. Schmidhuber, Deep learning in neural networks: an overview. Neural Netw. 61, 85–117 (2015). https://doi.org/10.1016/j.neunet.2014.09.003

G.T. Lakshmanan, D. Shamsi, Y.N. Doganata, U. Merve, R. Khalaf, A markov prediction model for data-driven semi-structured business processes. Knowl. Inf. Syst. 42, 97–126 (2015). https://doi.org/10.1007/s10115-013-0697-8

A. Tewari, B.B. Gupta, Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73, 1–18 (2017). https://doi.org/10.1007/s11227-016-1849-x

A. Tewari, B.B. Gupta, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener. Comp. Sy. 108, 909–920 (2018). https://doi.org/10.1016/j.future.2018.04.027

V. Adat, B.B. Gupta, Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst 67, 423–441 (2018). https://doi.org/10.1007/s11235-017-0345-9

A. Dahiya, B.B. Gupta, A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Future Gener. Comp. Sy. 117, 193–204 (2021). https://doi.org/10.1016/j.future.2020.11.027

A.G. Morosan, F. Pop, OCPP security - neural network for detecting malicious traffic. Proceedings of the International Conference on Research in Adaptive and Convergent Systems (RACS '17, Krakow, 2017), pp. 190–195. https://doi.org/10.1145/3129676.3129693.

I. Kotenko, E. Doynikova, Security evaluation for cyber situational awareness (2014), pp. 1197–1204. https://doi.org/10.1109/HPCC.2014.196