Skip to main content

A Security Situation Assessment Method Based on Neural Network

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Abstract

In the big data environment, the scale of attacks of Distributed Denial of Service (DDoS) continues to expand rapidly. The traditional network situation assessment method cannot effectively evaluate the security situation of DDoS. A security situation assessment method based on deep learning and a security situation assessment model based on neural network are proposed. The model uses convolutional neural network (CNN), back propagation algorithm (BP) and Long Short-Term memory neural network (LSTM) to learn various network security indicators to achieve a comprehensive assessment of the network. The experimental results show that the model can more easily and accurately evaluate the network security status, which is more accurate and flexible than the existing evaluation methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheng, J., Zhang, C., Tang, X., Sheng, V.S., Dong, Z., Li, J.: Adaptive DDoS attack: detection method based on multiple-kernel learning. Secur. Commun. Netw. 2018 (2018)

    Google Scholar 

  2. Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095 (2018)

    Google Scholar 

  3. Arbor Networks: 2012 Infrastructure Security Report. http://tinyurl.com/ag6tht4. Accessed 22 May 2019

  4. Xu, J., Wei, L., Zhang, Y., Wang, A., Gao, C.: Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113–124 (2018)

    Article  Google Scholar 

  5. Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)

    Article  Google Scholar 

  6. Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016). S0304397516300378

    Article  MathSciNet  Google Scholar 

  7. Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787–796 (2013)

    Article  Google Scholar 

  8. Guang, K., Guangming, T., Xia, D., Shuo, W., Kun, W: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE (2016)

    Google Scholar 

  9. Xiang, S., Lv, Y., Xia, C., Li, Y., Wang, Z.: A method of network security situation assessment based on hidden Markov model (2015)

    Google Scholar 

  10. Luo, J.H., Wu, J., Lin, W.: [IEEE 2017 IEEE International Conference on Computer Vision (ICCV) - Venice, Italy, 22–29 October 2017] 2017 IEEE International Conference on Computer Vision (ICCV) - ThiNet: A Filter Level Pruning Method for Deep Neural Network Compression, pp. 5068–5076 (2017)

    Google Scholar 

  11. Wang, G., Lin, L., Ding, S., Li, Y., Wang, Q., Dari: distance metric and representation integration for person verification (2016)

    Google Scholar 

  12. Jian, S., Gui, Z., Ji, S., Shen, J., Tan, H., Yi, T.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018). S1084804518300031

    Article  Google Scholar 

  13. Cheng, J., Yin, J., Liu, Y., Cai, Z., Li, M.: DDoS attack detection algorithm using IP address features. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) FAW 2009. LNCS, vol. 5598, pp. 207–215. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02270-8_22

    Chapter  Google Scholar 

  14. Gajera, V., Shubham, Gupta, R., Jana, P.K.: An effective multi-objective task scheduling algorithm using min-max normalization in cloud computing. In: International Conference on Applied & Theoretical Computing & Communication Technology. IEEE (2017)

    Google Scholar 

  15. Liang, J., Shi, Z.: The information entropy, rough entropy and knowledge granulation in rough set theory. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 12(01), 37–46 (2008)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333, 617048]; National Natural Science Foundation of China [61762033, 61702539]; Hainan University Doctor Start Fund Project [kyqd1328]; Hainan University Youth Fund Project [qnjj1444]; Social Development Project of Public Welfare Technology Application of Zhejiang Province [LGF18F020019]; Ministry of Education Humanities and Social Sciences Research Planning Fund Project (19YJA710010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meizhu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, X., Chen, M., Cheng, J., Xu, J., Li, H. (2019). A Security Situation Assessment Method Based on Neural Network. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics