[1]苏小玉,董兆伟,孙立辉,等.基于强化 LSTM 的网络安全态势预测方法[J].计算机技术与发展,2021,31(07):127-133.[doi:10. 3969 / j. issn. 1673-629X. 2021. 07. 021]
 SU Xiao-yu,DONG Zhao-wei,SUN Li-hui,et al.Network Security Situation Prediction Method Based on Sigmoid Weighted Strengthened LSTM[J].,2021,31(07):127-133.[doi:10. 3969 / j. issn. 1673-629X. 2021. 07. 021]
点击复制

基于强化 LSTM 的网络安全态势预测方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年07期
页码:
127-133
栏目:
网络与安全
出版日期:
2021-07-10

文章信息/Info

Title:
Network Security Situation Prediction Method Based on Sigmoid Weighted Strengthened LSTM
文章编号:
1673-629X(2021)07-0127-07
作者:
苏小玉董兆伟孙立辉徐奎奎
河北经贸大学 信息技术学院,河北 石家庄 050700
Author(s):
SU Xiao-yuDONG Zhao-weiSUN Li-huiXU Kui-kui
School of Information Technology,Hebei University of Economics and Business,Shijiazhuang 050700,China
关键词:
网络安全态势预测长短时记忆神经网络布谷鸟搜索
Keywords:
network securitysituation predictionlong short term memoryneural networkcuckoo search
分类号:
TP389. 1
DOI:
10. 3969 / j. issn. 1673-629X. 2021. 07. 021
摘要:
网络安全态势预测作为网络安全态势感知的重要组成部分,描述的是安全态势随时间动态变化的行为,具体是根据历史态势值预测未来态势值。 为了提高网络安全态势预测准确率,提出一种基于 sigmoid 加权强化机制的长短期记忆的网络安全态势预测模型。 该方法首先利用 LSTM 神经网络挖掘网络安全态势数据之间的时间相关性;引入 sigmoid 加权线性单元来处理反向传播中的梯度问题,将输入值与 sigmoid 激活函数相乘,从而强化 LSTM 神经网络结构,提高预测的精度。 然后采用布谷鸟搜索算法进行超参数寻优,提高网络训练时间。 最后利用国家互联网应急中心的网络安全态势数据对该模型进行验证,仿真实验结果验证了该方法的合理性,以及该模型具有更快的收敛速度和更小的误差,提高了网络安全预测能力。
Abstract:
As an important part of network security situation perception,network security situation prediction describes the behavior of dynamic changes of security situation over time,and specifically predicts the future situation value according to the historical situation value. In order to improve the accuracy of network security situation prediction, a network security situation prediction model based on sigmoid weighted strengthening mechanism of long and short memory is proposed. This method firstly uses LSTM neural network to mine the temporal correlation between network security situation data. Sigmoid weighted linear unit is introduced to deal with the gradient problem in back propagation,and the input value is multiplied by sigmoid activation function,so as to strengthen the structure of LSTMneural network and improve the prediction accuracy. Then cuckoo search algorithm is used to optimize the super parameters to improve the network training time. Finally,the network security situation data of The National Internet Emergency Response Center is used to verify the model. The simulation has verified the rationality of the proposed method,and the model has a faster convergence speed and a smaller error,which improves the network security prediction ability.

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(07):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(07):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(07):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(07):162.
[5]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(07):7.
[6]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(07):181.
[7]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(07):156.
[8]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(07):129.
[9]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(07):128.
[10]潘文婵 章韵.路由器访问控制列表在网络安全中的应用[J].计算机技术与发展,2010,(08):159.
 PAN Wen-chan,ZHANG Yun.Application of Access Control List on Router in Network Security[J].,2010,(07):159.

更新日期/Last Update: 2021-07-10