Skip to main content

Advertisement

Log in

A network security posture assessment model based on binary semantic analysis

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Advancements of modern-day industry and the decision support systems have improved the progress of intelligent applications for performing critical tasks. Decision support system is any system or tool which has the potential or ability to support decision making activities. In this paper, a network security posture assessment model for decision making based on binary semantic analysis is proposed to address the problems of traditional network security. By semantic analysis of pre-compiled script files, the behavioral features of script files are obtained based on abstract syntax trees and the supervised learning of samples is performed using BP neural networks to obtain a detection model that can be used for unknown samples. Different from the existing detection methods based on semantic analysis, the network security posture assessment index system is first established, the weights of the indexes are determined by using the sequential relationship analysis method, and finally the binary semantic analysis method is introduced into the decision matrix to realize the network security posture assessment model. The simulation results of the study show that the introduction of binary semantic analysis and sequential relational analysis significantly improves the accuracy of network security posture assessment, and the proposed WebShell detection method has much high accuracy and recall rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Bai B, Nazir S, Bai Y, Anees A (2020) Security and provenance for internet of health things—a systematic literature review. J Softw Evolut Process 1:21. https://doi.org/10.1002/smr.2335

    Article  Google Scholar 

  • Diederich S, Bidlingmaier M, Quinkler M et al (2007) Diagnostik des primren hyperaldosteronismus. Med Klin 102(1):16–21

    Article  Google Scholar 

  • Done B, Khatri P, Done A et al (2010) Predicting novel human gene ontology annotations using semantic analysis. IEEE ACM Trans Comput Biol Bioinf 7(1):91–99

    Article  Google Scholar 

  • Endres D, Adam R, Noppeney U et al (2012) Explicit coding in the brain: data-driven semantic analysis of human fMRI BOLD responses with formal concept analysis. Perception 41(10):67–67

    Google Scholar 

  • Gadotti IC, Armijo-Olivo S, Silveira A et al (2013) Reliability of the craniocervical posture assessment: visual and angular measurements using photographs and radiographs. J Manip Physiol Ther 36(9):619–625

    Article  Google Scholar 

  • Gu Z, Nazir S, Hong C, Khan S (2020) Convolution neural network-based higher accurate intrusion identification system for the network security and communication. Secur Commun Netw 2020:1–10

    Article  Google Scholar 

  • Guillot Y, Gazet A (2010) Automatic binary deobfuscation. J Comput Virol 6(3):261–276

    Article  Google Scholar 

  • Hofmann HT (2002) Unsupervised learning by probabilistic latent semantic analysis. Mach Learn 42(1–2):177–196

    MATH  Google Scholar 

  • Khan R, Zakarya M, Tan Z, Usman M, Jan MA, Khan M (2019) PFARS: enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme. Int J Commun Syst 32(18):e4144

    Article  Google Scholar 

  • Khan R, Ali I, Jan MA, Zakarya M, Khan MA, Alshamrani SS, Guizani M (2021) A hybrid approach for seamless and interoperable communication in the internet of things. IEEE Netw 2021:1–7

    Google Scholar 

  • Kim J, Lee J (2015) A study on the semantic analysis of the type of biomorphic fashion design. J Korean Soc Costume 65(4):19–30

    Article  Google Scholar 

  • Liu CW, Wang YB, Jang CS (2013) Probability-based nitrate contamination map of groundwater in Kinmen. Environ Monit Assess 185(12):10147–10156

    Article  Google Scholar 

  • Masse M, Gaillardetz C, Cron C et al (2000) A new symmetry-based scoring method for posture assessment: Evaluation of the effect of insoles with mineral derivatives. J Manip Physiol Ther 23(9):596–600

    Article  Google Scholar 

  • McCarthy PM, Briner SW, Rus V et al (2007) Textual signatures: identifying text-types using latent semantic analysis to measure the cohesion of text structures. Nat Lang Process Text Min 7(1):107–122

    Article  Google Scholar 

  • Saia R, Boratto L, Carta S et al (2016) Binary sieves: toward a semantic approach to user segmentation for behavioral targeting. Futur Gener Comput Syst 64:186–197

    Article  Google Scholar 

  • Sakai K (2014) Toward a semantic analysis of the welfare state. Annu Rev Sociol 2014(27):73–84

    Article  Google Scholar 

  • Usman M, Jolfaei A, Jan MA (2020) RaSEC: an intelligent framework for reliable and secure multilevel edge computing in industrial environments. IEEE Trans Ind Appl 56(4):4543–4551

    Google Scholar 

  • Yin X, Liu S, Liu L et al (2018) Function recognition in stripped binary of embedded devices. IEEE Access 6:75682–75694

    Article  Google Scholar 

  • Zhong K, Wang Y, Pei J et al (2021) Super efficiency SBM-DEA and neural network for performance evaluation. Inf Process Manag 58(6)

    Article  Google Scholar 

Download references

Funding

The paper did not receive any financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dasheng Wu.

Ethics declarations

Conflict of interest

The author declares that he has no conflicts of interest to this work.

Ethical approval

My paper does not deal with any ethical problems.

Informed consent

I declared to have informed consent for this work.

Additional information

Communicated by Tiancheng Yang.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, D. A network security posture assessment model based on binary semantic analysis. Soft Comput 26, 10599–10606 (2022). https://doi.org/10.1007/s00500-021-06720-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06720-2

Keywords