Skip to main content

A Variational Generative Network Based Network Threat Situation Assessment

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12282))

Included in the following conference series:

Abstract

In recent years, with the problem of network security is getting worse, the network threat situation assessment becomes an important approach to solve these problems. Aiming at the traditional methods based on data category tag that has high modeling cost, low efficiency, and a long period in the network threat situation assessment, this paper proposes a Variational-Generative (V-G) network assessment method. Firstly, we design the V-G network which is composed of VAE’s encoder and GAN’s discriminator and obtain the reconstruction error of each layer network by training the network collection layer of the V-G network with normal network traffic. Then, conduct the reconstruction error learning by the 3-layer variational autoencoder of the output layer and calculate the abnormal threshold of the training. Moreover, carry out the group threat testing with the test dataset contains abnormal network traffic and calculate the threat probability of each test group. Finally, obtain the Threat Situation Value (TSV) according to the threat probability and the threat impact. The simulation results show that compared with the other methods, this proposed method can evaluate the overall situation of network security threat more intuitively and has a stronger characterization ability for network threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, M.F.: Research on cloud computing security risk assessment based on information entropy and Markov chain. Int. J. Netw. Secur. 20(4), 664–673 (2018)

    Google Scholar 

  2. Wang, H., et al.: Research on network security situation assessment and quantification method based on analytic hierarchy process. Wireless Pers. Commun. 102(2), 1401–1420 (2018). https://doi.org/10.1007/s11277-017-5202-3

    Article  Google Scholar 

  3. Sallam, H.F.: Cyber security risk assessment using multi fuzzy inference system. Int. J. Eng. Innov. Technol. (IJETI) 4(8), 13–19 (2015)

    Google Scholar 

  4. Wen, Z., Chen, Z., Tang, J.: Network security situation quantitative evaluation method based on information fusion. J. Beijing Univ. Aeronaut. Astronaut. 42(8), 1593–1602 (2016)

    Google Scholar 

  5. Feng, W., Wu, Y., Fan, Y.: A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit. Int. J. Intell. Comput. Cybern. 11(4), 511–525 (2018)

    Google Scholar 

  6. He, F., Zhang, Y., Liu, D., Dong, Y., Liu, C., Wu, C.: Mixed wavelet-based neural network model for cyber security situation prediction using MODWT and hurst exponent analysis. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 99–111. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64701-2_8

    Chapter  Google Scholar 

  7. Doersch, C.F.: Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908 (2016)

  8. Goodfellow, I., et al.: Generative adversarial nets. In: Proceedings of the 27th International Conference on Neural Information Processing Systems, pp. 1–9. MIT Press, Massachusetts, Cambridge (2014)

    Google Scholar 

  9. State Council: The State Council of the People’s Republic of China. Overall Emergency Plans for National Sudden Public Incidents. China Lesgal Press, Beijing (2006)

    Google Scholar 

  10. Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Priv. Mag. 4(6), 85–89 (2006)

    Article  Google Scholar 

  11. Common Vulnerability Scoring System v3.0: Specification Document. https://www.first.org/cvss/specification-document. Accessed 05 Feb 2020

  12. Tang, C.H., Yu, S.Z.: A network security situation prediction method based on likelihood BP. Comput. Sci. 36(11), 97–100 (2009)

    MathSciNet  Google Scholar 

  13. Lai, Z.Q.: Network Security Situation Prediction Model Based on Hybrid Optimization RBF Neural Network. Lanzhou University (2017)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the Civil Aviation Joint Research Fund Project of the National Natural Science Foundation of China under granted number U1833107.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyu Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, H., Zeng, R., Wang, F., Xu, G., Zhang, J. (2020). A Variational Generative Network Based Network Threat Situation Assessment. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds) Information and Communications Security. ICICS 2020. Lecture Notes in Computer Science(), vol 12282. Springer, Cham. https://doi.org/10.1007/978-3-030-61078-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61078-4_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61077-7

  • Online ISBN: 978-3-030-61078-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics