Skip to main content
Log in

RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

This article was retracted on 14 February 2024

This article has been updated

Abstract

When establishing a network attack strategy, target network information is not certain, and the attacker lacks comprehensive, reliable and real-time attack information, making it difficult to perform an attack. To address this issue, a complex scientific network attack method is proposed. The attacker’s income, losses, costs and encountered risks related to a cyberattack are analysed, an index system is established, and a dynamic Bayesian network is used to comprehensively assess the attack effects on network nodes to overcome drawbacks of the traditional node importance assessment method, which relies on a single network topological index or makes static assessments of the target node. A simulation experiment shows that the proposed method synthesizes more node information and observed data for the attack, thereby avoiding the discrepancy between actual attack effects and theoretical expectations of attacks from static assessment and delivering higher levels of attack accuracy and efficiency than previous methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  1. Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Disc 29(3):626–688

    Article  MathSciNet  Google Scholar 

  2. Andrieu C, De FN, Doucet A (2014) Robust full Bayesian learning for radial basis networks. Neural Comput 13(10):2359–2407

    Article  Google Scholar 

  3. Hellmann T, Staudigl M (2014) Evolution of social networks. Eur J Oper Res 234(3):583–596

    Article  MathSciNet  Google Scholar 

  4. Moignard V, Woodhouse S, Haghverdi L et al (2015) Decoding the regulatory network for blood development from single-cell gene expression measurements. Nat Biotechnol 33(3):269

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  5. Patel J, Shah S, Thakkar P et al (2015) Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques. Expert Syst Appl 42(1):259–268

    Article  Google Scholar 

  6. Bagnall A, Lines J, Hills J et al (2015) Time-series classification with COTE: the collective of transformation-based ensembles. IEEE Trans Knowl Data Eng 27(9):2522–2535

    Article  Google Scholar 

  7. Tatar A, Amorim MDD, Fdida S et al (2014) A survey on predicting the popularity of web content. J Internet Serv Appl 5(1):8

    Article  Google Scholar 

  8. Gagnepain P, Henson RN, Anderson MC (2014) Suppressing unwanted memories reduces their unconscious influence via targeted cortical inhibition. Proc Natl Acad Sci USA 111(13):E1310

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  9. Yerima SY, Sezer S, Mcwilliams G (2016) Analysis of Bayesian classification-based approaches for Android malware detection. Inf Secur IET 8(1):25–36

    Article  Google Scholar 

  10. Ji Z, Ji H (2016) TSCAN: pseudo-time reconstruction and evaluation in single-cell RNA-seq analysis. Nucleic Acids Res 44(13):e117–e117

    Article  PubMed  PubMed Central  Google Scholar 

  11. Kooij JFP, Schneider N, Flohr F et al (2014) Context-based pedestrian path prediction. Lect Notes Comput Sci 8694:618–633

    Article  Google Scholar 

  12. Cecile B, David CJ, Matteo M et al (2015) Clustering attributed graphs: models, measures and methods. Netw Sci 3(3):408–444

    Article  Google Scholar 

  13. Amer MR, Peng L, Todorovic S (2014) HiRF: hierarchical random field for collective activity recognition in videos. In: European Conference on Computer Vision, Springer, Cham, pp 572–585

  14. Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59(1):325–340

    Article  Google Scholar 

  15. Tahan G, Rokach L, Shahar Y (2014) Mal-ID: automatic malware detection using common segment analysis and meta-features. J Mach Learn Res 13(13):949–979

    MathSciNet  Google Scholar 

  16. Mohammed MA, Ghani MKA, Arunkumar N, Hamed RI, Abdullah MK, Burhanuddin MA (2018) A real time computer aided object detection of nasopharyngeal carcinoma using genetic algorithm and artificial neural network based on Haar feature fear. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.07.022

    Article  Google Scholar 

  17. Ashokkumar P, Arunkumar N, Don S (2018) Intelligent optimal route recommendation among heterogeneous objects with keywords. Comput Electr Eng 68:526–535

    Article  Google Scholar 

  18. Hussein AF, Kumar A, Burbano-Fernandez M, Gustavo Ramirez-Gonzalez G, Abdulhay E, de Albuquerque VHC (2018) An automated remote cloud-based heart rate variability monitoring system. IEEE Access. https://doi.org/10.1109/access.2018.2831209

  19. Sarvaghad-Moghaddam M, Orouji AA, Ramezani Z, Elhoseny M, Farouk A, Arun Kumar N (2018) Modelling the spice parameters of SOI MOSFET using a combinational algorithm. Clust Comput. https://doi.org/10.1007/s10586-018-2289-6

    Article  Google Scholar 

  20. Khanna A, Jain S, Aggarwal T, Kumar A, Gupta D, Julka A, Albuquerque V (2018) Optimized cuttlefish algorithm for diagnosis of parkinson’s disease. Cognit Syst Res 52:36–48

    Article  Google Scholar 

  21. Hussein AF, ArunKumar N, Ramirez-Gonzalez G, Abdulhay E, Tavares JMR, de Albuquerque VHC (2018) A medical records managing and securing blockchain based system supported by a genetic algorithm and discrete wavelet transform. Cognit Syst Res 52:1–11. https://doi.org/10.1016/j.cogsys.2018.05.004

    Article  Google Scholar 

  22. Wei J, Meng F, Arunkumar N (2018) A personalized authoritative user-based recommendation for social tagging. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.03.048

    Article  Google Scholar 

Download references

Acknowledgements

Financial support was received through the Excellent Talent Foundation of China West Normal University (No: 17YC497).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pu Zaiyi.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11227-024-05971-8

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zaiyi, P. RETRACTED ARTICLE: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. J Supercomput 76, 1342–1357 (2020). https://doi.org/10.1007/s11227-018-2575-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2575-3

Keywords

Navigation