Abstract
Advancements of modern-day industry and the decision support systems have improved the progress of intelligent applications for performing critical tasks. Decision support system is any system or tool which has the potential or ability to support decision making activities. In this paper, a network security posture assessment model for decision making based on binary semantic analysis is proposed to address the problems of traditional network security. By semantic analysis of pre-compiled script files, the behavioral features of script files are obtained based on abstract syntax trees and the supervised learning of samples is performed using BP neural networks to obtain a detection model that can be used for unknown samples. Different from the existing detection methods based on semantic analysis, the network security posture assessment index system is first established, the weights of the indexes are determined by using the sequential relationship analysis method, and finally the binary semantic analysis method is introduced into the decision matrix to realize the network security posture assessment model. The simulation results of the study show that the introduction of binary semantic analysis and sequential relational analysis significantly improves the accuracy of network security posture assessment, and the proposed WebShell detection method has much high accuracy and recall rate.




Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bai B, Nazir S, Bai Y, Anees A (2020) Security and provenance for internet of health things—a systematic literature review. J Softw Evolut Process 1:21. https://doi.org/10.1002/smr.2335
Diederich S, Bidlingmaier M, Quinkler M et al (2007) Diagnostik des primren hyperaldosteronismus. Med Klin 102(1):16–21
Done B, Khatri P, Done A et al (2010) Predicting novel human gene ontology annotations using semantic analysis. IEEE ACM Trans Comput Biol Bioinf 7(1):91–99
Endres D, Adam R, Noppeney U et al (2012) Explicit coding in the brain: data-driven semantic analysis of human fMRI BOLD responses with formal concept analysis. Perception 41(10):67–67
Gadotti IC, Armijo-Olivo S, Silveira A et al (2013) Reliability of the craniocervical posture assessment: visual and angular measurements using photographs and radiographs. J Manip Physiol Ther 36(9):619–625
Gu Z, Nazir S, Hong C, Khan S (2020) Convolution neural network-based higher accurate intrusion identification system for the network security and communication. Secur Commun Netw 2020:1–10
Guillot Y, Gazet A (2010) Automatic binary deobfuscation. J Comput Virol 6(3):261–276
Hofmann HT (2002) Unsupervised learning by probabilistic latent semantic analysis. Mach Learn 42(1–2):177–196
Khan R, Zakarya M, Tan Z, Usman M, Jan MA, Khan M (2019) PFARS: enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme. Int J Commun Syst 32(18):e4144
Khan R, Ali I, Jan MA, Zakarya M, Khan MA, Alshamrani SS, Guizani M (2021) A hybrid approach for seamless and interoperable communication in the internet of things. IEEE Netw 2021:1–7
Kim J, Lee J (2015) A study on the semantic analysis of the type of biomorphic fashion design. J Korean Soc Costume 65(4):19–30
Liu CW, Wang YB, Jang CS (2013) Probability-based nitrate contamination map of groundwater in Kinmen. Environ Monit Assess 185(12):10147–10156
Masse M, Gaillardetz C, Cron C et al (2000) A new symmetry-based scoring method for posture assessment: Evaluation of the effect of insoles with mineral derivatives. J Manip Physiol Ther 23(9):596–600
McCarthy PM, Briner SW, Rus V et al (2007) Textual signatures: identifying text-types using latent semantic analysis to measure the cohesion of text structures. Nat Lang Process Text Min 7(1):107–122
Saia R, Boratto L, Carta S et al (2016) Binary sieves: toward a semantic approach to user segmentation for behavioral targeting. Futur Gener Comput Syst 64:186–197
Sakai K (2014) Toward a semantic analysis of the welfare state. Annu Rev Sociol 2014(27):73–84
Usman M, Jolfaei A, Jan MA (2020) RaSEC: an intelligent framework for reliable and secure multilevel edge computing in industrial environments. IEEE Trans Ind Appl 56(4):4543–4551
Yin X, Liu S, Liu L et al (2018) Function recognition in stripped binary of embedded devices. IEEE Access 6:75682–75694
Zhong K, Wang Y, Pei J et al (2021) Super efficiency SBM-DEA and neural network for performance evaluation. Inf Process Manag 58(6)
Funding
The paper did not receive any financial support.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declares that he has no conflicts of interest to this work.
Ethical approval
My paper does not deal with any ethical problems.
Informed consent
I declared to have informed consent for this work.
Additional information
Communicated by Tiancheng Yang.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, D. A network security posture assessment model based on binary semantic analysis. Soft Comput 26, 10599–10606 (2022). https://doi.org/10.1007/s00500-021-06720-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06720-2