[1]张 然,潘芷涵,朱 亮,等.基于 PCA 与 WNN 的网络安全态势要素提取方法[J].计算机技术与发展,2023,33(07):119-125.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 018]
 ZHANG Ran,PAN Zhi-han,ZHU Liang,et al.An Extraction Method of Network Security Situation Elements Based onPCA and WNN[J].,2023,33(07):119-125.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 018]
点击复制

基于 PCA 与 WNN 的网络安全态势要素提取方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
33
期数:
2023年07期
页码:
119-125
栏目:
网络空间安全
出版日期:
2023-07-10

文章信息/Info

Title:
An Extraction Method of Network Security Situation Elements Based onPCA and WNN
文章编号:
1673-629X(2023)07-0119-07
作者:
张 然潘芷涵朱 亮尹毅峰
郑州轻工业大学 计算机与通信工程学院,河南 郑州 450001
Author(s):
ZHANG RanPAN Zhi-hanZHU LiangYIN Yi-feng
School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450001,China
关键词:
网络安全态势要素提取主成分分析法小波神经网络动量因子
Keywords:
network securitysituation element extractionprincipal component analysiswavelet neural networkmomentum factor
分类号:
TP393
DOI:
10. 3969 / j. issn. 1673-629X. 2023. 07. 018
摘要:
安全态势要素的提取是网络安全态势感知的基础,提取的态势要素质量的好坏直接影响着网络安全态势评估和预测的准确性。 针对大规模网络环境下态势要素提取困难及分类精度不高的问题,提出一种基于 PCA-MF-WNN 的网络安全态势要素提取模型。 该模型利用主成分分析法(PCA) 对预处理后的网络安全数据进行降维,去除冗余的态势要素,然后采用小波神经网络( WNN)对约简后的数据集进行分类训练。 由于传统小波神经网络存在运算效率低和精准度不高的问题,引入动量因子(MF) 对小波函数的伸缩因子、平移因子以及小波神经网络的连接权值进行修正,以提高小波分类器的分类精度与分类效率。 对比实验结果表明,该态势要素提取模型有效提高了态势要素提取的分类精确度和运算效率。
Abstract:
The extraction of situation elements is the basis of network security situation awareness. The quality of situation?
element extraction directly affects the accuracy of network security situation assessment and prediction. To solve
the problems of difficult situationelement extraction and low classification accuracy in large-scale network environments, we propose a network security situation elementextraction model based on PCA-MF-WNN. The model uses Principal Component Analysis ( PCA) to reduce the dimension of the prprocessed network security data and remove the redundant situation elements,and then uses Wavelet Neural Network ( WNN) to classifyand train the reduced data sets. Because the traditional wavelet neural network has the problems of low operation efficiency and lowaccuracy,Momentum Factor
?( MF) is introduced to modify the scaling factor,translation factor of a wavelet function,and the connectionweight of the wavelet neural network,so as to improve the classification accuracy and efficiency of wavelet classifier. The results of comparative experiments show that the model effectively improves the classification accuracy and operation efficiency?
of situation element extraction.

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(07):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(07):132.
[3]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(07):167.
[4]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].,2009,(07):162.
[5]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].,2008,(07):7.
[6]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].,2008,(07):181.
[7]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].,2008,(07):156.
[8]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].,2008,(07):129.
[9]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(07):128.
[10]潘文婵 章韵.路由器访问控制列表在网络安全中的应用[J].计算机技术与发展,2010,(08):159.
 PAN Wen-chan,ZHANG Yun.Application of Access Control List on Router in Network Security[J].,2010,(07):159.

更新日期/Last Update: 2023-07-10