CN102185735B - Network security situation prediction method - Google Patents

Network security situation prediction method Download PDF

Info

Publication number
CN102185735B
CN102185735B CN 201110105272 CN201110105272A CN102185735B CN 102185735 B CN102185735 B CN 102185735B CN 201110105272 CN201110105272 CN 201110105272 CN 201110105272 A CN201110105272 A CN 201110105272A CN 102185735 B CN102185735 B CN 102185735B
Authority
CN
China
Prior art keywords
learning machine
network security
network
training
safety situation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201110105272
Other languages
Chinese (zh)
Other versions
CN102185735A (en
Inventor
李元诚
王宇飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China Electric Power University
Original Assignee
North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China Electric Power University filed Critical North China Electric Power University
Priority to CN 201110105272 priority Critical patent/CN102185735B/en
Publication of CN102185735A publication Critical patent/CN102185735A/en
Application granted granted Critical
Publication of CN102185735B publication Critical patent/CN102185735B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a network security situation prediction method in the technical field of network information security. The method comprises the following steps of: analyzing the hazard degrees of each network security threat by using a grey clustering analysis method, and further constructing a hierarchical network security situation index system, obtaining network security situation values of each time monitoring point, constructing a time sequence, constructing the time sequence into a training sample set, and performing iterative training on the training sample set by utilizing an integrated learning Boosting algorithm to obtain a weak learning machine sequence meeting error requirements; obtaining a strong learning machine by utilizing the method for calculating the weighted sum of the weak learning machine sequence; and finishing predicting the network security situation values of future time monitoring points by using the strong learning machine. The method is relatively higher in adaptability and relatively lower in prediction error rate in terms of reduction in network security situation value prediction errors.

Description

A kind of network security situation prediction method
Technical field
The invention belongs to the network information security technology field, relate in particular to a kind of network security situation prediction method.
Background technology
Develop rapidly along with the Internet technology, the importance of network security and increasing on the impact of society, network security problem is also more and more outstanding, and becomes gradually Internet and every network service and use the key issue that further develops the solution of needing badly.Network intrusions and attack are just towards trend developments such as distribution, scale, complicated, indirectization in addition; certainly will higher requirement be proposed to the safety product technology; and existing safety product (as IDS, IPS, fire compartment wall etc.) can only provide the most basic intrusion detection information, can't provide to the security postures of future network believable prediction alarm.Therefore realize the security postures prediction alarm of large scale network in the urgent need to studying a new technology.The method that is widely used for describing at present security status is network safety situation and network safety situation value prediction.So-called network safety situation refers to the whole network current safe state and the variation tendency that are made of factors such as various network device operation conditions, network behavior and user behaviors.Network safety situation prediction refers in large-scale network environment, to can cause that the security factor that Network Situation changes is obtained, understood, the development trend of demonstration and predict future.Network security situation prediction method is mainly the method for using single learning machine in artificial intelligence at present, the network safety situation value of some historical discrete times monitoring points is abstracted into time series, and then with the network safety situation forecasting problem as the regression analysis problem, utilize single learning machine to find the solution, this process mainly comprises three parts, is respectively tectonic network Safety index system, computing network security postures value, sets up the network safety situation forecast model.
The tectonic network Safety index system is that the all-network security threat that will be referred to network security is configured to the index system structure according to certain rule, calculates thereby be fit to the network safety situation value.The building method of index system will determine directly whether the network safety situation value can accurately reflect the actual situation of current network, the present invention introduces grey clustering analysis GCA (Grey Clustering Analysis) method thus, thereby has obtained accurately reflecting the index system of current network safe condition.
Computing network security postures value process is exactly to utilize intrusion detection that the diverse network safety means provide category and time statistics as a result, be input to again the network security index system, with the multiplied by weight of every kind of network security threats corresponding in the network security index system, thereby obtain the network safety situation value of each historical time monitoring point.
At present the Forecasting Methodology of network safety situation value, be mainly to utilize single learning machine methods such as neural net, SVMs, and the methodical error of single learning machine is relatively large, be prone to the over-fitting phenomenon, computational process is complicated.The present invention adopts integrated study Boosting algorithm to complete the prediction of network safety situation value for this reason, has effectively improved precision of prediction.
Summary of the invention
Large for single learning machine methodical error of mentioning in the above-mentioned background technology, be prone to the deficiencies such as over-fitting phenomenon, computational process complexity, the present invention proposes a kind of network security situation prediction method.
Technical scheme of the present invention is that a kind of network security situation prediction method is characterized in that said method comprising the steps of:
Step 1: use grey clustering analysis method to analyze every kind of network security threats x 1, x 2..., x nThe extent of injury, and then construct the network safety situation index system T of stratification;
Step 2: with the historical intrusion detection result of the Network Security Device order according to time supervision point i, be input to successively in the network safety situation index system T of stratification, obtain the network safety situation value V of each time supervision point i i
Step 3: use the sliding window method with network safety situation value V iBe configured to time series S, and time series S is configured to the readable training sample set S of integrated study Boosting algorithm Train
Step 4: utilize integrated study Boosting algorithm to training sample set S TrainCarry out the iteration training, obtain weak learning machine sequences h, recycling obtains strong learning machine H to the method for weak learning machine sequences h weighted sum j
Step 5: utilize strong learning machine H jComplete the network safety situation value prediction of future time monitoring point, and set strong learning machine H jLife cycle, if strong learning machine H jReach its life cycle, return to step 3.
Described step 1 comprises the following steps:
Step 1.1: the white function matrix of structure global index;
Step 1.2: determine the grey cluster coefficient according to white function;
Step 1.3: calculate every kind of network security threats x 1, x 2..., x nThe grey cluster coefficient, and determine its grey cluster ownership;
Step 1.4: the grey cluster result is configured to hierarchical network security postures index system T;
Step 1.5: determine the index t in index system T 1, t 2... t nFinal weights omega with respect to the network safety situation value.
Described step 2 comprises the following steps:
Step 2.1: the Network Security Device intrusion detection of adding up each time supervision point i is r as a result i
Step 2.2: with r iDo multiplication with the weight matrix ω of network safety situation index system T, obtain the network safety situation value V of time supervision point i i
Described step 4 comprises the following steps:
Step 4.1: set integrated study Boosting algorithm maximum iteration time k, and set the weak learning algorithm that integrated study Boosting algorithm calls;
Step 4.2: standardization training sample set S Train
Step 4.3: the primary data sample collection D that sets integrated study Boosting algorithm;
Step 4.4: with ω f(l) be probability sample drawn collection D from primary data sample collection D f, and by weak learning algorithm training, obtain weak learning machine h f
Step 4.5: calculate weak learning machine h fTraining error ε f
Step 4.6: calculate weak learning machine h fWeight α f
Step 4.7: the weight of upgrading training sample;
Step 4.8: when satisfying one of following two conditions, execution in step 4.9; Otherwise return to step 4.4;
Condition 1: integrated study Boosting algorithm reaches maximum iteration time k;
Condition 2: sample set D fNo longer change;
Step 4.9: export strong learning machine H j
In described step 4.1, weak learning algorithm is core vector regression CVR.
Training error ε in described step 4.5 fComputing formula be:
ϵ f = Σ l = 1 q ω f ( l )
In formula:
ε fBe training error, f ∈ [1 ..., k];
ω f(l) for extracting probability.
Weight α in described step 4.6 fComputing formula be:
α f = 1 2 ln [ 1 - ϵ f ϵ f ]
In formula:
α fBe weak learning machine h fWeight.
Strong learning machine H in described step 4.9 jComputing formula be:
H j = sign [ Σ l = 1 k α l h l ( x ) ]
In formula:
H jBe strong learning machine;
Sign is sign function;
α lBe weak learning machine h lWeight.
Adopt the present invention that network safety situation is predicted, not only overcome original defective based on single learning machine situation value prediction technology, and improved the accuracy rate of prediction.
Description of drawings
Fig. 1 is the network security situation prediction method flow chart;
Fig. 2 is the network safety situation index system generative process flow chart based on grey clustering analysis method;
Fig. 3 is sliding window method schematic diagram;
Fig. 4 is the weak learning machine flow chart of integrated study Boosting Algorithm for Training;
Fig. 5 is the strong learning machine prediction network safety situation process schematic diagram that utilizes integrated study Boosting algorithm to obtain.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that, following explanation is only exemplary, rather than in order to limit the scope of the invention and to use.
Set up the network safety situation index system and calculate the prerequisite that the situation value is the network safety situation prediction.For this reason, the present invention introduces and based on grey clustering analysis method, original diverse network security threat is analyzed, and then obtains the stratification index system; After obtaining the stratification index system, can computing network security postures value, and discrete-time series is become training sample set according to the sliding window method construct; Training sample set is input in integrated study Boosting algorithm, calling weak learning machine by integrated study Boosting algorithm--core vector regression CVR (Core Vector Regression) carries out sample set and trains to obtain weak learning machine sequence, then the weighting of weak learning machine sequence is become strong learning machine; Utilize at last strong learning machine to complete the prediction of network safety situation value.From the part to integral body, make integrated study Boosting algorithm can be suitable for more generally network safety situation forecasting problem like this.
Fig. 1 is a kind of network security situation prediction method flow chart provided by the invention.In Fig. 1, method provided by the invention comprises following step:
Step 1: use grey clustering analysis method to analyze every kind of network security threats x 1, x 2..., x nThe extent of injury, n is network security threats kind sum, and then constructs the network safety situation index system T of stratification;
Grey clustering analysis GCA (Grey Clustering Analysis) is more outstanding a kind of of clustering method performance, it utilizes the gray scale membership function to differentiate the classification ownership of sample to be clustered, it is advantageous that does not need the large sample collection to support, and can disclose unconspicuous implicit contact between each sample built-in attribute.Setting up process based on the network safety situation index system of grey clustering analysis in the present invention mainly is made of following five steps:
Step 1.1: the white function matrix of structure global index;
If sample X={x to be clustered 1... x i... x m, cluster index Y={y 1... y j... y n, S different cluster ash class arranged, each object xi is for the cluster index y jThe white function that has is d ij, i=1,2 ..., m, j=1,2 ..., n sets up matrix D=[d ij],
D = [ d ij ] = d 11 d 12 . . . d 1 m d 21 d 22 . . . d 2 m . . . . . . . . . . . . d n 1 d n 2 . . . d nm
Step 1.2: determine the grey cluster coefficient according to white function;
Following formula is three class white functions, f (d ij) be the albefaction weight function of the j ash class of i cluster index, f (d ij) ∈ [0,1], λ ijBe f (d ij) threshold values.
The upper measure white function f 1 ( d ij ) = 0 , x ∈ [ - ∞ , a ] x - a x - b , x ∈ [ a , b ] 1 , x ∈ [ b , + ∞ ]
Moderately estimate white function f 2 ( d ij ) = x a , x ∈ [ 0 , a ] a - x b - a , x ∈ [ a , b ] 0 , x ∉ [ 0 , b ]
Lower limit is estimated white function f 3 ( d ij ) = 0 , x ∉ [ 0 , b ] a - x b - a , x ∈ [ a , b ] 1 , x ∈ [ 0 , a ]
Step 1.3: calculate every kind of network security threats x 1, x 2..., x nThe grey cluster coefficient, and determine its grey cluster ownership;
Sample to be tested is done albefaction process, obtain the white function f (d of the relative j ash of i index class ij), obtain the threshold values λ of each grey class ij, and then ask the cluster of the j ash class of i index to weigh
Figure BDA00000575590100075
Obtaining the grey cluster coefficient is σ ij reflection i clustering object is under the jurisdiction of the degree of j ash class.Obtain cluster row vector σ i=(σ i1, σ i2σ is), S is grey class number.σ cBe the Grey Clustering Decision-Making matrix, as the following formula:
σ c = σ 1 . . . σ n = σ 11 . . . σ 1 k . . . . . . . . . σ n 1 . . . σ nk
If certain σ is arranged ik*Satisfy σ ik * = max 1 ≤ k ≤ K { σ ik } = max { σ i 1 , σ i 2 , . . . , σ ik } , Claim clustering object i to belong to grey class k *Namely at cluster row vector σ iIn find out maximum cluster coefficients, grey class is grey class under clustering object i under this maximum cluster coefficients.
Step 1.4: the grey cluster result is configured to hierarchical network security postures index system T;
As Fig. 2, choose in this example the gray scale classification for " by force ", " in ", " weak " three classes, distinguish the extent of injury of map network security threat.
Step 1.5: determine the index t in index system T 1, t 2... t nFinal weights omega with respect to the network safety situation value.
This stage need to determine that every kind of Cyberthreat is for the influence coefficient of network safety situation value, utilize analytic hierarchy process (AHP) set up in stratification index system structure the judgment matrix in twos between every layer of all index and find the solution the characteristic vector of judgment matrix, thereby obtain the influence coefficient of the relative last layer element of each element of every layer, determine successively that with the method for weighted sum the diverse network attack is to the final influence coefficient of network safety situation value at last.Step 1.5 is comprised of following two sub-steps,
The first step: network attack weight assignment
Look for some association area experts that diverse network is threatened and provide weight according to its extent of injury.The general weight that adopts 1-9, weight 1 extent of injury is minimum, rises successively, and the extent of injury of weight 9 is the highest.Recycling Delphi method is obtained expert's average weight that diverse network threatens, as the sample of analytic hierarchy process (AHP).
Second step: utilize analytic hierarchy process (AHP) to determine the final weight allocation of evaluation system
According to " first local; rear whole " strategy, calculate diverse network attack with respect to rule layer ownership " by force " in its grey cluster index system, " in ", the influence coefficient of " weak " three major types, calculate again " by force ", " in ", " weak " three major types is for the influence coefficient of network safety situation value, thereby obtain the diverse network security threat for the final influence coefficient matrix of network safety situation value.Process is as follows:
(1) compare in twos judgment matrix A according to the hierarchical structure structure.In the process that compares in twos, the policymaker need to determine for certain class criterion B k, two indicator layer Elements C iAnd C jWhich is more important, need to quantize its importance degree, uses the scale of 1-9 here.Concrete scale implication sees Table 1:
Table 1 judgment matrix scale and implication thereof
Figure BDA00000575590100091
(2) for n indicator layer Elements C 1C n, by mutually comparing in twos, finally obtain the judgment matrix A that compares in twos;
(3) calculate the relative weighting of element under single criterion, utilize A ω=λ maxω calculates the characteristic vector ω of matrix, with its unit and as Elements C 1C nAt criterion B kUnder weight order;
(4) the total weight order matrix of parameter system;
(5) consistency check of matrix.If CI is the general coincident indicator of judgment matrix, CI=(λ max-n)/(n-1), wherein n is the judgment matrix dimension; RI is the average homogeneity index, and concrete value sees Table 2; CR is the random Consistency Ratio of judgment matrix, and CR=CI/RI is if CR≤0.1 acquired results satisfies consistency.
Table 2 average homogeneity index value
Figure BDA00000575590100101
Step 2: the historical intrusion detection result of Network Security Device is input to the network safety situation index system T of stratification successively according to time supervision point i order, obtains the network safety situation value V of each time supervision point i i
Described step 2 specifically comprises the following steps:
Step 2.1: the Network Security Device intrusion detection of carrying statistics each time supervision point i is r as a result i, r iIt is 1 * n matrix Wherein
Figure BDA00000575590100103
The number of times that occurs for the xm kind network security threats of time supervision point i;
Step 2.2: with r iDo multiplication, ω=[ω with the weight matrix ω of network safety situation index system T 1, ω 2..., ω n] TBe n * 1 matrix, thereby obtain the network safety situation value V of time supervision point i i
Step 3: use the sliding window method with the network safety situation value V of each time supervision point i iBe configured to time series S={V 1, V 2..., V i, and time series S is configured to the readable training sample set S of integrated study Boosting algorithm TrainSpecific as follows:
1: use the sliding window method with the network safety situation value V of each discrete time monitoring point i iBe configured to time series S={V 1, V 2..., V i, be 4 as setting the sliding window size, sliding step is 1, S 1={ V 1, V 2, V 3, V 4, S 2={ V 2, V 3, V 4, V 5, S 3={ V 3, V 4, V 5, V 6, by that analogy, as Fig. 3;
2: time series S is configured to the readable training sample set Strain of integrated study Boosting algorithm, guarantees that namely training sample set Strain satisfies the weak desired data format of learning machine in integrated study Boosting algorithm;
Step 4: utilize integrated study Boosting algorithm to training sample set S TrainTrain and obtain weak learning machine sequences h={ h 1, h 2..., h k, k is integrated study Boosting algorithm maximum iteration time, recycling obtains strong learning machine H to the method for weak learning machine sequences h weighted sum j, j ∈ [1 ,+∞];
Integrated study Boosting algorithm is the outstanding representative of Ensemble Learning Algorithms, its theoretical thought is to utilize certain unsettled weak learning machine to generate a weak learning machine combination, wherein each weak learning machine all exists as basic grader, the classification results of basic grader before the training process of each basic grader all depends on, before being about to, the error of basic grader is used for adjusting the sample probability distribution of current basic grader, and strong learning machine forms by the weighted array of single basic grader.Integrated study Boosting algorithm can obviously improve the accuracy rate of unstable learning machine, and is obvious for the lifting of single learning machine performance.Because the each training of integrated study Boosting algorithm can obtain a basic grader, and each basic grader is to improve on the result of calculation of upper once basic grader, therefore from the training angle, the training process of integrated study Boosting algorithm is exactly a process of continuing to optimize, and namely grader never is stabilized to stable process.Find after deliberation, integrated study Boosting algorithm only need to be adjusted parameter of maximum frequency of training k, and integrated study Boosting algorithm can not cause the study phenomenon to occur.Fig. 4 is the process of the weak learning machine of integrated study Boosting Algorithm for Training, and described step 4 specifically comprises the following steps:
Step 4.1: set integrated study Boosting algorithm maximum iteration time k, and set the weak learning algorithm that integrated study Boosting algorithm calls;
Step 4.2: standardization training sample set S TrainIf time series S 1Be S 1={ V 1, V 2, V 3, V 4, V 1, V 2, V 3, V 4For the input vector of the weak learning algorithm of integrated study Boosting algorithm, according to S 1The network safety situation value V of prediction 5Be its corresponding output vector;
Step 4.3: the primary data sample collection D that sets integrated study Boosting algorithm;
D={S 1, V 5S 2, V 6L S q, V q+4, ω 1(l) be the initial weight of each sample in primary data sample collection D,
Figure BDA00000575590100121
L ∈ [1 ..., q], q is the total number of sample;
Step 4.4: with ω f(l) the sample set D that extracts from primary data sample collection D for probability f, and by weak learning algorithm training, obtain weak learning machine h f, f ∈ [1 ..., k];
ω f(l) the condition of choosing is:
Figure BDA00000575590100122
If satisfy this condition, ω f(l) be its result of calculation; If do not satisfy this condition, ω f(l)=0, wherein,
Figure BDA00000575590100123
Be network safety situation value V i+4Predicted value;
Step 4.5: calculate weak learning machine h fTraining error ε f
ϵ f = Σ l = 1 q ω f ( l )
In formula:
ε fBe training error, f ∈ [1 ..., k];
ω f(l) for extracting probability.
Step 4.6: calculate weak learning machine h fWeight α f
α f = 1 2 ln [ 1 - ϵ f ϵ f ]
In formula:
α fBe weak learning machine h fWeight.
Step 4.7: the weight of upgrading training sample;
ω f + 1 ( l ) = ω f ( l ) e - α f V l h f ( x l ) M f ,
In formula:
ω f+1(l) be the weight of the training sample after upgrading;
ω f(l) be the weight of training sample;
h f(x l) be that weak learning machine is according to input variable x lThe calculated value that obtains;
V lIt is actual situation value;
M fBe normalization coefficient, must guarantee
Figure BDA00000575590100132
Step 4.8: when satisfying one of following two conditions, execution in step 4.9; Otherwise return to step 4.4;
Condition 1: integrated study Boosting algorithm reaches maximum iteration time k;
Condition 2: sample set D fNo longer change;
Step 4.9: export strong learning machine H j
H j = sign [ Σ l = 1 k α l h l ( x ) ]
In formula:
H jBe strong learning machine;
Sign is sign function;
α lBe weak learning machine h lWeight.
What pay special attention to is that the selected core vector regression CVR (Core Vector Regression) of integrated study Boosting algorithm completes the training to sample data in step 4.1.CVR utilizes the former n dimension of MEB Algorithm for Solving Euclidean space R nMiddle target problem Φ, its process is as follows:
(1) utilize kernel function to complete from n dimension Euclidean space R nTo the conversion in Hilbert space, i.e. the dual problem Φ ' of structure target problem Φ in the Hilbert space.
(2) the sample set S according to dual problem Φ ' sets initial MEB.
(3) carry out the MEB algorithm, until obtain the nucleon collection S of sample set S e, be converted into the MEB problem with dual problem Φ ' this moment.If c, r are respectively center of gravity and the radius of ball, use one of B (c, r) expression heavily to be c, radius is the ball of r.Establish error threshold δ>0, ball B (c, (1+ δ) r) is considered as (1+ δ) approximate ball of MEB (S) again.Nucleon collection S cMay be defined as: if proper subclass S cComprised sample point in all S with the MEB of the factor (1+ δ) expansion, that is:
Figure BDA00000575590100141
B (c, R)=MEB (S wherein c), proper subclass S cThe nucleon collection that is called S.
(4) under the constraints of center, find the solution the MEB problem, namely complete finding the solution of target problem Φ.
Step 5: utilize strong learning machine H jComplete the network safety situation value prediction of future time monitoring point, and set strong learning machine H jLife cycle, if strong learning machine H jReach its life cycle, repeating step 3;
Concrete implementation such as Fig. 5 of step 5 are specially:
1: set strong learning machine H jLife cycle T Live
2: check strong learning machine H jLife cycle whether finish, if finished according to step 3 until generate the strong learning machine H of a new generation j+1
Through after the training study of above-mentioned 5 steps, form the network safety situation value prediction model based on integrated study Boosting algorithm, thereby realize the situation value Accurate Prediction to the future time monitoring point.
The present invention compares traditional single learning machine method aspect prediction network safety situation value, precision of prediction is preferably arranged, and has improved the practicality of network safety situation prediction.
The above; only for the better embodiment of the present invention, but protection scope of the present invention is not limited to this, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement are within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (5)

1. network security situation prediction method is characterized in that said method comprising the steps of:
Step 1: use grey clustering analysis method to analyze every kind of network security threats x 1, x 2..., x nThe extent of injury, and then construct the network safety situation index system T of stratification; Described step 1 comprises the following steps:
Step 1.1: the white function matrix of structure global index;
Step 1.2: determine the grey cluster coefficient according to white function;
Step 1.3: calculate every kind of network security threats x 1, x 2..., x nThe grey cluster coefficient, and determine its grey cluster ownership;
Step 1.4: the grey cluster result is configured to hierarchical network security postures index system T;
Step 1.5: determine the index t in index system T 1, t 2... t nFinal weights omega with respect to the network safety situation value;
Step 2: with the historical intrusion detection result of the Network Security Device order according to time supervision point i, be input to successively in the network safety situation index system T of stratification, obtain the network safety situation value V of each time supervision point i iDescribed step 2 comprises the following steps:
Step 2.1: the Network Security Device intrusion detection of adding up each time supervision point i is r as a result i
Step 2.2: with r iDo multiplication with the weight matrix ω of network safety situation index system T, obtain the network safety situation value V of time supervision point i i
Step 3: use the sliding window method with network safety situation value V iBe configured to time series S, and time series S is configured to the readable training sample set S of integrated study Boosting algorithm Train
Step 4: utilize integrated study Boosting algorithm to training sample set S TrainCarry out the iteration training, obtain weak learning machine sequences h, recycling obtains strong learning machine H to the method for weak learning machine sequences h weighted sum jDescribed step 4 comprises the following steps:
Step 4.1: set integrated study Boosting algorithm maximum iteration time k, and set the weak learning algorithm that integrated study Boosting algorithm calls;
Step 4.2: standardization training sample set S Train
Step 4.3: the primary data sample collection D that sets integrated study Boosting algorithm;
Step 4.4: with ω f(l) be probability sample drawn collection D from primary data sample collection D f, and by weak learning algorithm training, obtain weak learning machine h fWherein, ω f(l) for extracting probability;
Step 4.5: calculate weak learning machine h fTraining error ε f
Step 4.6: calculate weak learning machine h fWeight α f
Step 4.7: the weight of upgrading training sample;
Step 4.8: when satisfying one of following two conditions, execution in step 4.9; Otherwise return to step 4.4;
Condition 1: integrated study Boosting algorithm reaches maximum iteration time k;
Condition 2: sample set D fNo longer change;
Step 4.9: export strong learning machine H j
Step 5: utilize strong learning machine H jComplete the network safety situation value prediction of future time monitoring point, and set strong learning machine H jLife cycle, if strong learning machine H jReach its life cycle, return to step 3.
2. a kind of network security situation prediction method according to claim 1, is characterized in that in described step 4.1, weak learning algorithm is core vector regression CVR.
3. a kind of network security situation prediction method according to claim 1, is characterized in that training error ε in described step 4.5 fComputing formula be:
ϵ f = Σ l = 1 q ω f ( l )
In formula:
ε fBe training error, f ∈ [1 ..., k];
ω f(l) for extracting probability.
4. a kind of network security situation prediction method according to claim 1, is characterized in that weight α in described step 4.6 fComputing formula be:
α f = 1 2 ln [ 1 - ϵ f ϵ f ]
In formula:
α fBe weak learning machine h fWeight.
5. a kind of network security situation prediction method according to claim 1, is characterized in that strong learning machine H in described step 4.9 jComputing formula be:
H j = sign [ Σ l = 1 k α 1 h 1 ( x ) ]
In formula:
H jBe strong learning machine;
Sigh is sign function;
α lBe weak learning machine h lWeight.
CN 201110105272 2011-04-26 2011-04-26 Network security situation prediction method Expired - Fee Related CN102185735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110105272 CN102185735B (en) 2011-04-26 2011-04-26 Network security situation prediction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110105272 CN102185735B (en) 2011-04-26 2011-04-26 Network security situation prediction method

Publications (2)

Publication Number Publication Date
CN102185735A CN102185735A (en) 2011-09-14
CN102185735B true CN102185735B (en) 2013-06-12

Family

ID=44571806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110105272 Expired - Fee Related CN102185735B (en) 2011-04-26 2011-04-26 Network security situation prediction method

Country Status (1)

Country Link
CN (1) CN102185735B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611714B (en) * 2012-04-10 2015-12-02 重庆交通大学 Based on the network intrusions Forecasting Methodology of contact discovery technique
CN102694800A (en) * 2012-05-18 2012-09-26 华北电力大学 Gaussian process regression method for predicting network security situation
CN104486141B (en) * 2014-11-26 2018-10-23 国家电网公司 A kind of network security situation prediction method that wrong report is adaptive
CN104573013A (en) * 2015-01-09 2015-04-29 上海大学 Category weight combined integrated learning classifying method
CN104794534B (en) * 2015-04-16 2017-12-15 国网山东省电力公司临沂供电公司 A kind of power grid security Tendency Prediction method based on improvement deep learning model
CN105704119B (en) * 2015-12-31 2018-10-09 北京神州绿盟信息安全科技股份有限公司 A kind of method and device of determining network safety situation distribution
CN106411591B (en) * 2016-09-30 2019-06-21 山东省计算中心(国家超级计算济南中心) A kind of network security situation prediction method based on Hurst index
CN107290305B (en) * 2017-07-19 2019-11-01 中国科学院合肥物质科学研究院 A kind of near infrared spectrum quantitative modeling method based on integrated study
CN108573021B (en) * 2018-02-24 2021-10-08 浙江金华伽利略数据科技有限公司 Comprehensive value evaluation method of dynamic data
CN108881250B (en) * 2018-06-28 2020-07-07 广东电网有限责任公司 Power communication network security situation prediction method, device, equipment and storage medium
CN109120637B (en) * 2018-09-12 2021-02-12 宁德师范学院 Network security supervision platform and method
CN111669375B (en) * 2020-05-26 2021-03-16 武汉大学 Online safety situation assessment method and system for power industrial control terminal
CN112016097B (en) * 2020-08-28 2024-02-27 深圳泓越信息科技有限公司 Method for predicting network security vulnerability time to be utilized
CN114511131A (en) * 2021-12-27 2022-05-17 河北师范大学 Network security situation prediction method and system based on machine learning algorithm
CN114492059B (en) * 2022-02-07 2023-02-28 清华大学 Multi-agent confrontation scene situation assessment method and device based on field energy
CN116757874A (en) * 2023-08-17 2023-09-15 中能聚创(杭州)能源科技有限公司 User energy situation deduction method based on group intelligent analysis

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350745A (en) * 2008-08-15 2009-01-21 北京启明星辰信息技术股份有限公司 Intrude detection method and device
CN101753333A (en) * 2008-11-28 2010-06-23 中华电信股份有限公司 Management system for integrated information security service and the protection method thereof
CN101783752A (en) * 2010-02-10 2010-07-21 哈尔滨工业大学 Network security quantitative estimation method based on network topology characteristic

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350745A (en) * 2008-08-15 2009-01-21 北京启明星辰信息技术股份有限公司 Intrude detection method and device
CN101753333A (en) * 2008-11-28 2010-06-23 中华电信股份有限公司 Management system for integrated information security service and the protection method thereof
CN101783752A (en) * 2010-02-10 2010-07-21 哈尔滨工业大学 Network security quantitative estimation method based on network topology characteristic

Also Published As

Publication number Publication date
CN102185735A (en) 2011-09-14

Similar Documents

Publication Publication Date Title
CN102185735B (en) Network security situation prediction method
Dai et al. A wavelet support vector machine‐based neural network metamodel for structural reliability assessment
CN106453293B (en) A kind of network security situation prediction method based on improved BPNN
CN107797067B (en) Lithium ion battery life migration prediction method based on deep learning
Le Son et al. Remaining useful life estimation based on stochastic deterioration models: A comparative study
He et al. Comprehensive evaluation of regional clean energy development levels based on principal component analysis and rough set theory
CN112506990B (en) Hydrological data anomaly detection method based on spatiotemporal information
CN102694800A (en) Gaussian process regression method for predicting network security situation
CN109376913A (en) The prediction technique and device of precipitation
CN104636449A (en) Distributed type big data system risk recognition method based on LSA-GCC
Sainct et al. Efficient methodology for seismic fragility curves estimation by active learning on Support Vector Machines
CN110334875A (en) Meter and the wind power combined probability prediction technique of evaluation index conflict
Ding et al. Structural damage identification by sparse deep belief network using uncertain and limited data
Bian et al. Abnormal detection of electricity consumption of user based on particle swarm optimization and long short term memory with the attention mechanism
CN102263790A (en) Intrusion detecting method based on integrated learning
Verma et al. A comprehensive review on the nilm algorithms for energy disaggregation
Hong et al. An iterative model of the generalized Cauchy process for predicting the remaining useful life of lithium-ion batteries
CN110837939A (en) Power grid multi-target project screening method and system
CN108898273B (en) User side load characteristic clustering evaluation method based on morphological analysis
CN104751254A (en) Line loss rate prediction method based on non-isometric weighted grey model and fuzzy clustering sorting
CN106203481A (en) Electronics trend prediction method based on mixed nucleus RVM
CN104217296A (en) Listed company performance comprehensive evaluation method
CN114186639A (en) Electrical accident classification method based on dual-weighted naive Bayes
Yao et al. A multipoint prediction model for nonlinear displacement of concrete dam
CN105303194A (en) Power grid indicator system establishing method, device and computing apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130612

Termination date: 20140426