CN109547431A - A kind of network security situation evaluating method based on CS and improved BP - Google Patents
A kind of network security situation evaluating method based on CS and improved BP Download PDFInfo
- Publication number
- CN109547431A CN109547431A CN201811376507.1A CN201811376507A CN109547431A CN 109547431 A CN109547431 A CN 109547431A CN 201811376507 A CN201811376507 A CN 201811376507A CN 109547431 A CN109547431 A CN 109547431A
- Authority
- CN
- China
- Prior art keywords
- network
- neural network
- output
- cuckoo
- weight
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013528 artificial neural network Methods 0.000 claims abstract description 90
- 241000544061 Cuculus canorus Species 0.000 claims abstract description 56
- 238000012549 training Methods 0.000 claims abstract description 41
- 238000011156 evaluation Methods 0.000 claims abstract description 30
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 21
- 238000012360 testing method Methods 0.000 claims abstract description 16
- 230000006870 function Effects 0.000 claims description 32
- 210000002569 neuron Anatomy 0.000 claims description 23
- 241000272177 Cuculiformes Species 0.000 claims description 14
- 238000012546 transfer Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 10
- 239000011159 matrix material Substances 0.000 claims description 7
- 238000012937 correction Methods 0.000 claims description 5
- 244000000626 Daucus carota Species 0.000 claims description 4
- 235000005770 birds nest Nutrition 0.000 claims description 4
- 238000009826 distribution Methods 0.000 claims description 4
- 230000008030 elimination Effects 0.000 claims description 4
- 238000003379 elimination reaction Methods 0.000 claims description 4
- 230000006872 improvement Effects 0.000 claims description 4
- 235000005765 wild carrot Nutrition 0.000 claims description 4
- 238000013507 mapping Methods 0.000 claims description 3
- 238000010845 search algorithm Methods 0.000 abstract description 3
- 238000011158 quantitative evaluation Methods 0.000 abstract 1
- 230000008859 change Effects 0.000 description 7
- 238000005457 optimization Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 230000010355 oscillation Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 238000011478 gradient descent method Methods 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 238000013016 damping Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000013210 evaluation model Methods 0.000 description 1
- 238000009499 grossing Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/084—Backpropagation, e.g. using gradient descent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明的一种基于CS和改进BP神经网络的网络安全态势评估方法,包括四个步骤:S1,获取网络安全态势要素,构成训练样本集和测试样本集,确定BP神经网络结构S2,利用布谷鸟搜索(CS)算法寻找最优的初始权值和阈值S3,引入动量因子和陡度因子改进BP神经网络S4,对改进后的BP神经网络进行训练,最后将训练好的网络用于网络安全态势评估,得到最终的态势值和安全等级。本发明利用改进BP神经网络实现网络安全态势精准的定量评估,降低传统评估方法中专家观点的主观影响,客观全面地反映了网络安全整体状况;结合布谷鸟搜索算法、引入动量因子和陡度因子对其进行改进,加快了收敛速度,减少了时空开销,提高了网络安全态势评估的准确性和实用性。
A network security situation assessment method based on CS and improved BP neural network of the present invention includes four steps: S1, acquiring network security situation elements, forming a training sample set and a test sample set, determining the BP neural network structure S2, using the cuckoo The bird search (CS) algorithm finds the optimal initial weights and thresholds S3, introduces momentum factor and steepness factor to improve the BP neural network S4, trains the improved BP neural network, and finally uses the trained network for network security. Situation assessment to get the final situation value and security level. The invention utilizes the improved BP neural network to realize the precise quantitative evaluation of the network security situation, reduces the subjective influence of the expert opinions in the traditional evaluation method, and objectively and comprehensively reflects the overall network security situation; combined with the cuckoo search algorithm, the momentum factor and the steepness factor are introduced By improving it, the convergence speed is accelerated, the space-time overhead is reduced, and the accuracy and practicability of network security situation assessment are improved.
Description
技术领域technical field
本发明涉及网络安全技术领域,特别是涉及一种基于CS和改进BP神经网络的网络安全态势评估方法。The invention relates to the technical field of network security, in particular to a network security situation assessment method based on CS and improved BP neural network.
背景技术Background technique
随着Internet技术的迅速发展,网络规模也逐渐增加且复杂化,所遭受攻击多元化,安全事件大幅度上涨,安全问题变得日益突出与迫切。网络安全态势评估在此背景下应运而生,逐渐成为下一代网络安防技术的研究重点,网络安全态势评估是指在融合网络安全相关的要素信息的基础上,利用评估算法对网络系统的全局安全态势进行综合分析与实时评估,从而帮助管理人员把握整体网络的安全状况,为网络安全管理指挥、决策提供指导,将风险与损失降到最低限度。With the rapid development of Internet technology, the scale of the network has gradually increased and become more complex, the attacks suffered are diversified, the security incidents have risen sharply, and the security problems have become increasingly prominent and urgent. Network security situation assessment came into being under this background, and gradually became the research focus of next-generation network security technology. Comprehensive analysis and real-time assessment of the situation can help managers grasp the overall network security status, provide guidance for network security management command and decision-making, and minimize risks and losses.
目前,国内外的网络安全态势评估主要分为3类:(1)基于数学模型的方法,代表性方法有基于层次分析法、离偏差法、模糊综合评价法、集对分析法等(2)基于知识推理的方法,代表性方法有基于贝叶斯算法、DS证据理论、图模型、马尔科夫等(3)基于模式识别的方法,代表性方法有基于支持向量机、人工神经网络、粗糙集理论、灰色关联等。At present, the network security situation assessment at home and abroad is mainly divided into three categories: (1) methods based on mathematical models, representative methods are based on AHP, deviation method, fuzzy comprehensive evaluation method, set pair analysis method, etc. (2) Methods based on knowledge reasoning, representative methods are based on Bayesian algorithm, DS evidence theory, graph model, Markov, etc. (3) methods based on pattern recognition, representative methods are based on support vector machine, artificial neural network, rough Set theory, grey relation, etc.
前两种方法应用较多,但是存在主观依赖性强、先验知识获取困难、不合适动态复杂的网络环境等缺点,相较之下,基于模式识别的评估方法具有更高的准确性和客观性,更能适应动态不确定的网络环境,BP神经网络是一种多层前馈网络,因其强大的自学习能力、较好的泛化能力和容错能力等众多优点被广泛应用于态势评估领域,但从应用效果看,目前还存在以下不足:(1)评估数据源单一,导致评估结果存在片面性,可信度较低。(2)时空开销较大,不满足实时性的要求且评估结果不够精确(3)传统BP神经网络存在易形成局部极小、易发生震荡、收敛速度慢等缺点。The first two methods are widely used, but have shortcomings such as strong subjective dependence, difficulty in acquiring prior knowledge, and inappropriate dynamic and complex network environment. In contrast, the evaluation method based on pattern recognition has higher accuracy and objectiveness. BP neural network is a multi-layer feedforward network, which is widely used in situation assessment due to its strong self-learning ability, good generalization ability and fault tolerance ability and many other advantages. However, from the perspective of application effects, there are still the following shortcomings: (1) The evaluation data source is single, resulting in one-sided evaluation results and low reliability. (2) The space-time overhead is large, it does not meet the real-time requirements and the evaluation results are not accurate (3) The traditional BP neural network has shortcomings such as easy to form local minima, easy to oscillate, and slow convergence speed.
发明内容SUMMARY OF THE INVENTION
针对上述情况,为克服现有技术之缺陷,本发明之目的在于提供一种基于CS和改进BP神经网络的网络安全态势评估方法,综合全面的网络安全态势因素,通过自主学习,迭代更新的方式进行精准的态势评估,同时具有较快的运行速度,提高网络安全态势评估的准确性和评估效率,从而真实反映网络安全整体状况。In view of the above situation, in order to overcome the defects of the prior art, the purpose of the present invention is to provide a network security situation assessment method based on CS and improved BP neural network, which integrates comprehensive network security situation factors, and is iteratively updated through self-learning. Carry out accurate situation assessment, and at the same time have a relatively fast operation speed, improve the accuracy and evaluation efficiency of network security situation assessment, so as to truly reflect the overall situation of network security.
其解决的技术方案是,包括以下四个步骤,The technical solution it solves is, including the following four steps:
S1、获取网络安全态势要素,构成训练样本集和测试样本集,确定BP神经网络结构;S1. Obtain network security situation elements, form a training sample set and a test sample set, and determine the BP neural network structure;
S2、利用布谷鸟搜索(CS)算法寻找最优的初始权值和阈值;S2. Use the cuckoo search (CS) algorithm to find the optimal initial weights and thresholds;
S3、引入动量因子和陡度因子改进BP神经网络;S3. Introduce momentum factor and steepness factor to improve BP neural network;
S4、对改进后的BP神经网络进行训练,并将训练好的网络用于网络安全态势评估,得到最终的态势值和安全等级。S4, train the improved BP neural network, and use the trained network for network security situation assessment to obtain the final situation value and security level.
如权利要求1所述的一种基于CS和改进BP神经网络的网络安全态势评估方法,其特征在于,所述步骤S1中获取网络安全态势要素,构成训练样本集和测试样本集为对系统配置信息、系统运行信息和网络流量信息在内的态势要素数据进行规范化处理,得到格式统一的态势指标数据,构成训练样本集和测试样本集;The method for assessing network security situation based on CS and improved BP neural network according to claim 1, characterized in that, in said step S1, network security situation elements are obtained, and a training sample set and a test sample set are formed to configure the system The situational element data including information, system operation information and network traffic information are normalized to obtain situational indicator data in a unified format, which constitutes a training sample set and a test sample set;
所述步骤S1中确定BP神经网络结构,假设有N个信号输入,则输入向量为X=(x1,x2,…,xn),隐藏层节点数为M,则隐藏层输出向量为Y=(y1,y2,…,ym),输出层节点数为L,则输出层向量为O=(o1,o2,…,ol),期望输出向量为D=(d1,d2,…,dl),输入层到隐藏层之间的权值矩阵为W=(W1,W2,…,Wj,…,Wm),隐藏层到输出层之间的权值为V=(V1,V2,…,Vk,…,Vl),隐含层有阈值θj,输出层有阈值rk,隐含层第j个神经元的输出值yj,输出层第k个神经元的输出ok,则:The BP neural network structure is determined in the step S1. Assuming that there are N signal inputs, the input vector is X=(x 1 ,x 2 ,...,x n ), and the number of hidden layer nodes is M, then the hidden layer output vector is Y=(y 1 , y 2 ,...,y m ), the number of output layer nodes is L, then the output layer vector is O=(o 1 ,o 2 ,...,o l ), and the expected output vector is D=(d 1 ,d 2 ,…,d l ), the weight matrix between the input layer and the hidden layer is W=(W 1 ,W 2 ,…,W j ,…,W m ), between the hidden layer and the output layer The weight is V=(V 1 , V 2 ,...,V k ,...,V l ), the hidden layer has a threshold θ j , the output layer has a threshold r k , and the output value of the jth neuron in the hidden layer y j , the output ok of the kth neuron in the output layer, then:
上式中,f(x)为隐含层的传递函数,一般采用sigmoid函数,公式如下:In the above formula, f(x) is the transfer function of the hidden layer, and the sigmoid function is generally used. The formula is as follows:
优选的,所述步骤S2中利用布谷鸟搜索(CS)算法寻找最优的初始权值和阈值具体为:Preferably, in the step S2, using the cuckoo search (CS) algorithm to find the optimal initial weight and threshold is specifically:
S21,初始化种群,依据神经网络权值和阈值特点,随机产生n只布谷鸟对n只布谷鸟进行编码,编码方式采用浮点数编码;S21, initialize the population, and randomly generate n cuckoos according to the weight and threshold characteristics of the neural network Encode n cuckoos, and the encoding method adopts floating-point encoding;
S22,计算适应度,适应度函数为神经网络总误差函数的倒数,如下所示:S22, calculate the fitness, the fitness function is the inverse of the total error function of the neural network, as shown below:
S23,位置更新,保留上一代最优的布谷鸟按照下式更新布谷鸟的位置,得到 S23, location update, keep the best cuckoo of the previous generation Update the position of the cuckoo according to the following formula, get
其中,表示第i个鸟巢在第t代的位置,为点对点乘法,α>0是步长(一般取α=1);L(λ)为Lévy随机搜索路径,而随机步长λ服从Lévy分布;in, represents the position of the i-th bird's nest in the t-th generation, For point-to-point multiplication, α>0 is the step size (generally α=1); L(λ) is the Lévy random search path, and the random step size λ obeys the Lévy distribution;
S24,选择,替换,删除操作,随机产生一个在[0,1]区间的小数r,比较r和发现概率pa的大小,如果r>pa,则按照式(12)更新所有布谷鸟的位置,计算并比较新的布谷鸟和原布谷鸟的适应度,保留适应度较大的布谷鸟,得到更新后的布谷鸟位置如果r≤pa,保留原来的布谷鸟;S24, select, replace, delete operations, randomly generate a decimal r in the [0, 1] interval, compare r with the discovery probability p a , if r>p a , update all cuckoos according to formula (12). Position, calculate and compare the fitness of the new cuckoo and the original cuckoo, keep the cuckoo with greater fitness, and get the updated cuckoo position If r≤p a , keep the original cuckoo;
剔除操作是为保持种群始终处于最优状态,将剔除n*pa个适应度值最差的个体;为使种群规模保持不变,将随机产生n*pa个解(需要对n*pa进行取整操作);同时,对于适应度值较优的个体,将直接传递到下一代;The elimination operation is to keep the population always in the optimal state, and n*p a individuals with the worst fitness values will be eliminated; in order to keep the population size unchanged, n*p a solutions will be randomly generated (need to n*p a solution). a rounding operation); at the same time, for the individual with better fitness value, it will be directly passed on to the next generation;
S25,判断最优布谷鸟是否满足条件或者迭代代数是否达到要求,如果是,则将最优布谷鸟解码获取最优的权值、阈值,执行步骤S3;反之,则执行步骤S23。S25, determine whether the optimal cuckoo meets the conditions or whether the iteration algebra meets the requirements, and if so, decode the optimal cuckoo to obtain the optimal weight and threshold, and execute step S3; otherwise, execute step S23.
优选的,所述步骤S3中所述的引入动量因子和陡度因子对传统BP神经网络进行改进具体为:Preferably, the introduction of the momentum factor and the steepness factor in the step S3 to improve the traditional BP neural network is specifically:
S31,引入动量因子,采用附加动量法改进神经网络的权值修正过程,具体做法是:将上一次或前几次权值调整量的一部分迭加到按本次误差计算所得的权值调整量上,作为本次的实际权值调整量,本发明设计的带有动量项的权值调整公式如下:S31: Introduce a momentum factor and use the additional momentum method to improve the weight correction process of the neural network. The specific method is: adding a part of the last or previous weight adjustment to the weight adjustment calculated according to the current error. Above, as the actual weight adjustment amount this time, the weight adjustment formula with the momentum term designed by the present invention is as follows:
Δw(k+1)=(1-α)ηD(k)+αΔw(k)Δw(k+1)=(1-α)ηD(k)+αΔw(k)
其中,代表为k时刻的负梯度,in, represents the negative gradient at time k,
w即为网络权值,Δw为权值的增量,k为训练次数,α为动量因子,0<α<1,一般取0.95左右,η为学习速率;w is the weight of the network, Δw is the increment of the weight, k is the number of training times, α is the momentum factor, 0<α<1, generally around 0.95, and η is the learning rate;
S32,引入陡度因子,在原转移函数中引入一个陡度因子λ,改进原理是:在权值调整进入平坦区以后,设法压缩神经元的净输入,使其输出退出转移函数的饱和区,以此改变误差函数的形状,从而使调整脱离平坦区,公式如下:S32, introduce a steepness factor, and introduce a steepness factor λ into the original transfer function. The improvement principle is: after the weight adjustment enters the flat area, try to compress the net input of the neuron, so that its output exits the saturation area of the transfer function, so as to This changes the shape of the error function, so that the adjustment is out of the flat region, the formula is as follows:
式中,net为神经元的输入,当发现ΔE接近零,而模型输出与实际值仍有较大偏差时,可判断已进入平坦区,此时令λ>1;当退出平坦区后,再令λ=1。In the formula, net is the input of the neuron. When it is found that ΔE is close to zero, but the model output still has a large deviation from the actual value, it can be judged that it has entered the flat area, at this time, let λ>1; after exiting the flat area, let λ=1.
优选的,所述步骤S4中对改进后的BP神经网络进行训练,并将训练好的网络用于网络安全态势评估具体为:Preferably, in the step S4, the improved BP neural network is trained, and the trained network is used for network security situation assessment, specifically:
S41,神经网络初始化,包括将步骤S2布谷鸟算法得到的BP神经网络的最优初始权值和阈值组合作为参数输入网络进行参数初始化、BP网络其余参数,包括迭代次数N,动量因子α,训练允许误差ε;将训练态势数据作为输入向量,将专家评估的态势值作为输出向量带入优化后的BP神经网络;S41 , initialization of the neural network, including inputting the optimal initial weight and threshold combination of the BP neural network obtained by the cuckoo algorithm in step S2 as parameters into the network for parameter initialization, and the remaining parameters of the BP network, including the number of iterations N, the momentum factor α, and training. Allowable error ε; take the training situation data as the input vector, and take the situation value evaluated by experts as the output vector into the optimized BP neural network;
S42,计算输入层、中间隐含层和输出层的输出,输入层的各神经元对输入向量不进行处理,根据权利要求2步骤计算中间隐含层的输出yj和输出层的输出ok;S42, calculate the output of the input layer, the intermediate hidden layer and the output layer, each neuron in the input layer does not process the input vector, and calculate the output y j of the intermediate hidden layer and the output o k of the output layer according to the step of claim 2 ;
S43,根据计算输出ok与实际输出dk,计算输出层各神经元的误差ek,计算系统总误差E,公式如下:S43 , according to the calculated output ok and the actual output d k , calculate the error ek of each neuron in the output layer, and calculate the total error E of the system, and the formula is as follows:
S44,按照步骤S31计算权重修正量,进而调整各神经元权值;S44, calculate the weight correction amount according to step S31, and then adjust the weight value of each neuron;
S45,随机选取下一个训练数据提供给BP神经网络,指导所有训练数据对BP神经网络进行训练;S45, randomly select the next training data and provide it to the BP neural network, and guide all the training data to train the BP neural network;
S46,判断神经网络全局误差E是否满足精度要求,如果E<ε,那么就结束网络的训练;否则就转到步骤S43继续对各层连接权值继续调整,如此进行迭代训练下去,直到网络的全局误差满足条件或是迭代次数达到N为止;S46, judge whether the global error E of the neural network meets the accuracy requirements, if E<ε, then end the training of the network; otherwise, go to step S43 to continue to adjust the connection weights of each layer, and perform iterative training in this way until the network is fully trained. The global error satisfies the condition or the number of iterations reaches N;
S47,将测试态势数据输人到训练好的具有评估能力的神经网络中,经过映射得到网络的态势值SA,最后通过对照网络总体态势级别表即可得到网络所处的安全等级。S47, the test situation data is input into the trained neural network with evaluation ability, the situation value SA of the network is obtained through mapping, and finally the security level of the network can be obtained by comparing the overall situation level table of the network.
由于以上技术方案的采用,本发明与现有技术相比具有如下优点;Due to the adoption of the above technical solutions, the present invention has the following advantages compared with the prior art;
1,利用改进BP神经网络实现网络安全态势精准的定量评估,降低传统评估方法中专家观点的主观影响,客观全面地反映了网络安全整体状况;1. Use the improved BP neural network to achieve accurate quantitative assessment of network security situation, reduce the subjective influence of expert opinions in traditional assessment methods, and objectively and comprehensively reflect the overall status of network security;
2,针对传统BP神经网络收敛速度慢,易发生震荡和陷入局部最小等缺点,结合布谷鸟搜索算法、引入动量因子和陡度因子对其进行改进,加快了收敛速度,减少了时空开销,提高了网络安全态势评估的准确性和实用性。2. In view of the shortcomings of the traditional BP neural network, such as slow convergence speed, prone to oscillation and falling into local minimum, combined with the cuckoo search algorithm, the introduction of momentum factor and steepness factor to improve it, speed up the convergence speed, reduce the space-time overhead, improve the The accuracy and practicability of network security situation assessment.
附图说明Description of drawings
图1为本发明一种基于CS和改进BP神经网络的网络安全态势评估方法的流程图。FIG. 1 is a flow chart of a network security situation assessment method based on CS and improved BP neural network of the present invention.
图2为本发明实施例所提供的神经网络结构图。FIG. 2 is a structural diagram of a neural network provided by an embodiment of the present invention.
图3为本发明实施例提供的基于CS和改进BP神经网络的评估方法与基于传统BP神经网络的评估方法误差曲线对比图。FIG. 3 is a comparison diagram of error curves between the evaluation method based on CS and the improved BP neural network and the evaluation method based on the traditional BP neural network provided by the embodiment of the present invention.
图4为本发明一种基于CS和改进BP神经网络的网络安全态势评估方法与基于传统BP神经网络的评估方法评估准确率对比图。FIG. 4 is a comparison chart of the evaluation accuracy of a network security situation evaluation method based on CS and improved BP neural network of the present invention and an evaluation method based on traditional BP neural network.
具体实施方式Detailed ways
有关本发明的前述及其他技术内容、特点与功效,在以下配合参考附图1至附图4对实施例的详细说明中,将可清楚的呈现。以下实施例中所提到的结构内容,均是以说明书附图为参考。The foregoing and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of the embodiments with reference to FIG. 1 to FIG. 4 . The structural contents mentioned in the following embodiments are all referenced to the accompanying drawings.
实施例一,一种基于CS和改进BP神经网络的网络安全态势评估方法,包括以下四个步骤,Embodiment 1, a network security situation assessment method based on CS and improved BP neural network, including the following four steps:
S1、获取网络安全态势要素,构成训练样本集和测试样本集,确定BP神经网络结构;S1. Obtain network security situation elements, form a training sample set and a test sample set, and determine the BP neural network structure;
S2、利用布谷鸟搜索(CS)算法寻找最优的初始权值和阈值;S2. Use the cuckoo search (CS) algorithm to find the optimal initial weights and thresholds;
S3、针对传统BP神经网络收敛速度慢,易发生震荡和陷入局部最小等缺点,引入动量因子和陡度因子改进BP神经网络;S3. In view of the shortcomings of the traditional BP neural network, such as slow convergence speed, prone to oscillation and falling into local minimum, the momentum factor and steepness factor are introduced to improve the BP neural network;
S4、对改进后的BP神经网络进行训练,并将训练好的网络用于网络安全态势评估,得到最终的态势值和安全等级。S4, train the improved BP neural network, and use the trained network for network security situation assessment to obtain the final situation value and security level.
实施例二,在实施例一的基础上,所述的步骤S1具体包括:Embodiment 2, on the basis of Embodiment 1, the step S1 specifically includes:
S11,获取网络安全态势要素,构成训练样本集和测试样本集,评估数据源主要来自三大类:基于系统配置信息、基于系统运行信息和基于网络流量信息。第一类数据源是指网络设计和配置状况,如网络拓扑结构、服务软件的安装与设置以及系统的漏洞缺陷等;第二类数据源是指网络系统遭受攻击时的系统运行情况,主要来自于系统运行日志库;第三类数据源主要是指网络即时通信各种流量情况,可通过专用软件监测获取。按照目前的网络现状和指标体系的实际需求,本发明选取Netflow数据、Snort日志和Nessus扫描日志作为态势指标数据源。这三种数据涵盖了流量、攻击和漏洞三方面的信息。反映了网络基本运行状态信息、面临的攻击威胁和潜在的安全威胁状况,能够为网络安全态势感知提供较为全面的数据支持,由于从网络安全设备中采集到的原始数据具有不同的格式和意义,这些数据并不能作为态势评估的输入数据,需要对这些数据进行规范化处理,才能得到格式统一的态势指标数据,构成训练样本集和测试样本集。S11 , acquiring network security situation elements to form a training sample set and a test sample set, and the evaluation data sources mainly come from three categories: based on system configuration information, based on system operation information, and based on network traffic information. The first type of data source refers to the network design and configuration status, such as network topology, installation and setting of service software, and system vulnerabilities and defects; the second type of data source refers to the system operation when the network system is attacked, mainly from It is based on the system operation log library; the third type of data source mainly refers to various traffic conditions of network instant messaging, which can be monitored and obtained through special software. According to the current network status and actual requirements of the indicator system, the present invention selects Netflow data, Snort logs and Nessus scan logs as the data sources of the situation indicators. These three types of data cover traffic, attacks, and vulnerabilities. It reflects the basic operating status information of the network, the attack threats and potential security threats, and can provide comprehensive data support for network security situational awareness. Since the original data collected from network security devices have different formats and meanings, These data cannot be used as input data for situational assessment. These data need to be normalized to obtain situational indicator data in a unified format, which constitutes a training sample set and a test sample set.
S12,确定BP神经网络结构,图2为本发明实施例提供的神经网络结构图。BP神经网络包含1个输入层、1个输出层和多个隐含层,相邻层之间的神经元通过合理的激活函数连接而维持网络的参数,并通过前向传播与反向传播过程结合来进行训练,假设有N个信号输入,则输入向量为X=(x1,x2,…,xn),隐藏层节点数为M,则隐藏层输出向量为Y=(y1,y2,…,ym),输出层节点数为L,则输出层向量为O=(o1,o2,…,ol),期望输出向量为D=(d1,d2,…,dl),输入层到隐藏层之间的权值矩阵为W=(W1,W2,…,Wj,…,Wm),隐藏层到输出层之间的权值为V=(V1,V2,…,Vk,…,Vl),隐含层有阈值θj,输出层有阈值rk。隐含层第j个神经元的输出值yj,输出层第k个神经元的输出ok,则:S12, determine the BP neural network structure, FIG. 2 is a neural network structure diagram provided by an embodiment of the present invention. The BP neural network includes an input layer, an output layer and multiple hidden layers. The neurons between adjacent layers are connected by a reasonable activation function to maintain the parameters of the network, and through the forward propagation and back propagation process Combined for training, assuming there are N signal inputs, the input vector is X=(x 1 ,x 2 ,...,x n ), and the number of hidden layer nodes is M, then the hidden layer output vector is Y=(y 1 , y 2 ,…,y m ), the number of nodes in the output layer is L, then the output layer vector is O=(o 1 ,o 2 ,…,o l ), and the expected output vector is D=(d 1 ,d 2 ,… ,d l ), the weight matrix between the input layer and the hidden layer is W=(W 1 ,W 2 ,…,W j ,…,W m ), and the weight between the hidden layer and the output layer is V= (V 1 , V 2 ,…,V k ,…,V l ), the hidden layer has a threshold θ j , and the output layer has a threshold r k . The output value y j of the jth neuron in the hidden layer and the output o k of the kth neuron in the output layer, then:
上式中,f(x)为隐含层的传递函数,一般采用sigmoid函数,公式如下:In the above formula, f(x) is the transfer function of the hidden layer, and the sigmoid function is generally used. The formula is as follows:
本发明实施例中输入层节点数为8,对应8个态势评估要素:子网内安全设备数(x1),子网内各关键设备开放端口的总量(x2),关键设备访问主流安全网站的频率(x3),报警数目(x4),网络带宽使用率(x5),安全事件历史发生频率(x6),子网流量变化率(x7),子网平均无故障时间(x8)。输出节点数为1,标记为SA(即网络安全态势值)。隐藏层节点数用试凑法得到。首先通过经验公式设置较少的隐节点,然后每次增加等量的隐节点,在使用同一样本集的前提下,选取训练误差最小时对应的节点数。初始隐节点数m为:In the embodiment of the present invention, the number of nodes in the input layer is 8, corresponding to 8 situation assessment elements: the number of security devices in the subnet (x 1 ), the total number of open ports of each key device in the subnet (x 2 ), and the key devices accessing the mainstream Frequency of secure websites (x 3 ), number of alerts (x 4 ), network bandwidth usage (x 5 ), historical frequency of security incidents (x 6 ), rate of change in subnet traffic (x 7 ), average subnet-free failure time ( x8 ). The number of output nodes is 1, which is marked as SA (ie, network security posture value). The number of hidden layer nodes is obtained by trial and error. First, set fewer hidden nodes through empirical formulas, and then increase the same amount of hidden nodes each time. Under the premise of using the same sample set, select the number of nodes corresponding to the minimum training error. The initial number of hidden nodes m is:
其中:n代表输入层节点个数;l代表输出层节点个数;δ代表0—10的常数;隐含层节点数通过上式选取4,经试凑得节点数6。Among them: n represents the number of nodes in the input layer; l represents the number of nodes in the output layer; δ represents a constant from 0 to 10;
实施例三,在实施例一的基础上,所述的步骤S2具体包括:Embodiment 3, on the basis of Embodiment 1, the step S2 specifically includes:
BP神经网络的初始权值和阈值是随机分配的,因此其训练时间一般较长,而且经过训练得到的权值和阈值也可能并非最优,所以本发明采用布谷鸟(CS)算法寻找最优的权值和阈值,具体步骤如下:The initial weights and thresholds of the BP neural network are randomly assigned, so the training time is generally long, and the weights and thresholds obtained after training may not be optimal, so the present invention uses the cuckoo (CS) algorithm to find the optimal value. The weights and thresholds of , the specific steps are as follows:
S21,初始化种群,依据神经网络权值和阈值特点,随机产生n只布谷鸟对n只布谷鸟进行编码,编码方式采用浮点数编码,浮点数编码直观且具有编码长度易控制、编码精度高且大空间搜索能力强等特点,可降低计算复杂性,故本发明采用浮点数编码。根据BP神经网络的设计结构将其所有权值和阈值共同编码成一只布谷鸟,则布谷鸟的编码为:S21, initialize the population, and randomly generate n cuckoos according to the weight and threshold characteristics of the neural network To encode n cuckoos, the encoding method adopts floating-point number encoding. The floating-point number encoding is intuitive and has the characteristics of easy control of encoding length, high encoding precision and strong search ability in large spaces, which can reduce the computational complexity. Therefore, the present invention adopts floating-point number encoding. coding. According to the design structure of the BP neural network, its all values and thresholds are jointly coded into a cuckoo, then the coding of the cuckoo is:
W11W21…WN1V11V21…V1Lθ1…W1MW2M…WNMVM1VM2…VMLθMr1…rL W 11 W 21 …W N1 V 11 V 21 …V 1L θ 1 …W 1M W 2M …W NM V M1 V M2 …V ML θ M r 1 …r L
其中,N为网络的输入层节点数,M为隐藏层节点数,L为输出层节点数,输入层到隐藏层权重矩阵为W,隐藏层到输出层权值矩阵为V,隐藏层阈值矩阵为θ,输出层阈值矩阵为r;Among them, N is the number of nodes in the input layer of the network, M is the number of nodes in the hidden layer, L is the number of nodes in the output layer, the weight matrix from the input layer to the hidden layer is W, the weight matrix from the hidden layer to the output layer is V, and the threshold matrix for the hidden layer is is θ, and the threshold matrix of the output layer is r;
S23,计算适应度,布谷鸟算法属于元启发优化算法,群体中个体的优劣是由适应度来衡量的。适应度值越高代表该个体越接近最优解,结合BP神经网络总误差越小越好的特点,本实例设计的适应度函数为网络实际输出和预测输出之间的误差绝对值和的倒数,即:S23, calculate the fitness, the cuckoo algorithm belongs to the meta-heuristic optimization algorithm, and the strengths and weaknesses of the individuals in the group are measured by the fitness. The higher the fitness value, the closer the individual is to the optimal solution. Combined with the feature that the smaller the total error of the BP neural network, the better, the fitness function designed in this example is the reciprocal of the sum of the absolute values of the errors between the actual output and the predicted output of the network. ,which is:
将步骤S1获取的态势指标数据代入适应度函数,计算这一代布谷鸟的适应度。选择适应度最优的布谷鸟 Substitute the situation index data obtained in step S1 into the fitness function to calculate the fitness of this generation of cuckoos. Select the cuckoo with the best fitness
S23、位置更新。保留上一代最优的布谷鸟更新布谷鸟的位置,得到位置更新公式如下:S23, the location is updated. Keep the best cuckoo of the previous generation Update the position of the cuckoo, get The location update formula is as follows:
其中,表示第i个鸟巢在第t代的位置,为点对点乘法,α>0是步长(一般取α=1);L(λ)为Lévy随机搜索路径,而随机步长λ服从Lévy分布。in, represents the position of the i-th bird's nest in the t-th generation, For point-to-point multiplication, α>0 is the step size (generally α=1); L(λ) is the Lévy random search path, and the random step size λ obeys the Lévy distribution.
计算这一代布谷鸟的适应度,并跟上一代的适应度值作比较,如果更优则更新位置,否则依然保留上一代鸟巢的位置。Calculate the fitness of this generation of cuckoos, and compare it with the fitness value of the previous generation. If it is better, update the position, otherwise, keep the position of the previous generation's nest.
S24,选择,替换,删除操作。随机产生一个在[0,1]区间的小数r,比较r和发现概率pa的大小。如果r>pa,则更新所有布谷鸟的位置,计算并比较新的布谷鸟和原布谷鸟的适应度,保留适应度较大的布谷鸟,得到更新后的布谷鸟位置如果r≤pa,保留原来的布谷鸟。S24, select, replace, delete operations. Randomly generate a decimal r in the interval [0, 1], and compare the size of r with the discovery probability p a . If r>p a , update the positions of all the cuckoos, calculate and compare the fitness of the new cuckoo and the original cuckoo, keep the cuckoo with greater fitness, and get the updated position of the cuckoo If r≤p a , keep the original cuckoo.
剔除操作是为保持种群始终处于最优状态,将剔除n*pa个适应度值最差的个体;为使种群规模保持不变,将随机产生n*pa个解(需要对n*pa进行取整操作);同时,对于适应度值较优的个体,将直接传递到下一代。The elimination operation is to keep the population always in the optimal state, and n*p a individuals with the worst fitness values will be eliminated; in order to keep the population size unchanged, n*p a solutions will be randomly generated (need to n*p a solution). a rounding operation); at the same time, for the individual with better fitness value, it will be directly passed on to the next generation.
S25、判断最优布谷鸟是否满足条件或者迭代代数是否达到要求,如果是,则将最优布谷鸟解码获取最优的权值、阈值,执行步骤S3;反之,则执行步骤S23。S25. Determine whether the optimal cuckoo meets the conditions or whether the iteration algebra meets the requirements. If so, decode the optimal cuckoo to obtain the optimal weight and threshold, and execute step S3; otherwise, execute step S23.
布谷鸟算法属于元启发优化算法,群体中个体的优劣是由适应度来衡量的。适应度值越高代表该个体越接近最优解。结合BP神经网络总误差越小越好的特点,本实例设计的适应度函数为网络实际输出和预测输出之间的误差绝对值和的倒数,即:The cuckoo algorithm belongs to the meta-heuristic optimization algorithm, and the strengths and weaknesses of the individuals in the group are measured by fitness. The higher the fitness value, the closer the individual is to the optimal solution. Combined with the feature that the smaller the total error of the BP neural network, the better, the fitness function designed in this example is the reciprocal of the sum of the absolute value of the error between the actual output and the predicted output of the network, namely:
将步骤S1获取的态势指标数据代入适应度函数,计算这一代布谷鸟的适应度。选择适应度最优的布谷鸟 Substitute the situation index data obtained in step S1 into the fitness function to calculate the fitness of this generation of cuckoos. Select the cuckoo with the best fitness
S23、位置更新。保留上一代最优的布谷鸟更新布谷鸟的位置,得到位置更新公式如下:S23, the location is updated. Keep the best cuckoo of the previous generation Update the position of the cuckoo, get The location update formula is as follows:
其中,表示第i个鸟巢在第t代的位置,为点对点乘法,α>0是步长(一般取α=1);L(λ)为Lévy随机搜索路径,而随机步长λ服从Lévy分布。in, represents the position of the i-th bird's nest in the t-th generation, For point-to-point multiplication, α>0 is the step size (generally α=1); L(λ) is the Lévy random search path, and the random step size λ obeys the Lévy distribution.
计算这一代布谷鸟的适应度,并跟上一代的适应度值作比较,如果更优则更新位置,否则依然保留上一代鸟巢的位置。Calculate the fitness of this generation of cuckoos, and compare it with the fitness value of the previous generation. If it is better, update the position, otherwise, keep the position of the previous generation's nest.
S24、选择,替换,删除操作。随机产生一个在[0,1]区间的小数r,比较r和发现概率pa的大小。如果r>pa,则更新所有布谷鸟的位置,计算并比较新的布谷鸟和原布谷鸟的适应度,保留适应度较大的布谷鸟,得到更新后的布谷鸟位置如果r≤pa,保留原来的布谷鸟。S24, select, replace, and delete operations. Randomly generate a decimal r in the interval [0, 1], and compare the size of r with the discovery probability p a . If r>p a , update the positions of all the cuckoos, calculate and compare the fitness of the new cuckoo and the original cuckoo, keep the cuckoo with greater fitness, and get the updated position of the cuckoo If r≤pa, keep the original cuckoo.
剔除操作是为保持种群始终处于最优状态,将剔除n*pa个适应度值最差的个体;为使种群规模保持不变,将随机产生n*pa个解(需要对n*pa进行取整操作);同时,对于适应度值较优的个体,将直接传递到下一代。The elimination operation is to keep the population always in the optimal state, and n*p a individuals with the worst fitness values will be eliminated; in order to keep the population size unchanged, n*p a solutions will be randomly generated (need to n*p a solution). a rounding operation); at the same time, for the individual with better fitness value, it will be directly passed on to the next generation.
S25、判断最优布谷鸟是否满足条件或者迭代代数是否达到要求,如果是,则将最优布谷鸟解码获取最优的权值、阈值,执行步骤S3;反之,则执行步骤S23。S25. Determine whether the optimal cuckoo meets the conditions or whether the iteration algebra meets the requirements. If so, decode the optimal cuckoo to obtain the optimal weight and threshold, and execute step S3; otherwise, execute step S23.
实施例四,在实施例一的基础上,所述的步骤S3具体包括:Embodiment 4, on the basis of Embodiment 1, the step S3 specifically includes:
S31,引入动量因子,标准BP算法实质上是一种简单的最速下降静态寻优方法,在修正w(k)时,只按照第k步的负梯度方向进行修正,而没有考虑到以前积累的经验,即以前时刻的梯度方向,从而常常使训练过程发生振荡,收敛缓慢,附加动量法权值调整算法的具体做法是:将上一次或前几次权值调整量的一部分迭加到按本次误差计算所得的权值调整量上,作为本次的实际权值调整量。本发明设计的带有动量项的权值调整公式如下:S31, the momentum factor is introduced. The standard BP algorithm is essentially a simple static optimization method of steepest descent. When modifying w(k), it is only modified according to the negative gradient direction of the kth step, without considering the previously accumulated Experience, that is, the gradient direction of the previous moment, which often causes the training process to oscillate and converge slowly. The specific method of the weight adjustment algorithm of the additional momentum method is to superimpose a part of the last or previous weight adjustment to the original weight adjustment. The weight adjustment amount obtained by this error calculation is used as the actual weight adjustment amount this time. The weight adjustment formula with the momentum term designed by the present invention is as follows:
Dw(k+1)=(1-α)ηD(k)+αDw(k)Dw(k+1)=(1-α)ηD(k)+αDw(k)
其中,代表为k时刻的负梯度。in, represents the negative gradient at time k.
w即为网络权值,Dw为权值的增量,k为训练次数,α为动量因子,0<α<1,一般取0.95左右。η为学习速率,在标准BP神经网络中是常数。w is the weight of the network, Dw is the increment of the weight, k is the number of training times, α is the momentum factor, 0<α<1, generally around 0.95. η is the learning rate, which is a constant in standard BP neural networks.
上式的含义是将之前权值变化对本次权值调整趋势的影响,通过一个动量因子来传递。当动量因子α取值为零时,权值的变化仅根据梯度下降法产生;当动量因子α取值为1时,新的权值变化则设置为前一次权值的变化,而依梯度法产生的变化部分则被忽略掉了。以此方式,当增加了动量项后,促使权值的调节向着误差曲面底部的平均方向变化,当网络权值进入误差曲面底部的平坦区时,Dwij(k+1)=Dwij(k),从而防止了Dwij=0的出现,有助于使网络从误差曲面的局部极小值中跳出。这种方法所加的动量因子实际上相当于阻尼项,它减小了学习过程中的振荡趋势,起到了缓冲平滑的作用,从而改善了收敛性。The meaning of the above formula is to transmit the influence of the previous weight change on the current weight adjustment trend through a momentum factor. When the value of the momentum factor α is zero, the change of the weight value is only generated according to the gradient descent method; when the value of the momentum factor α is 1, the new weight value change is set to the previous weight value change, and according to the gradient method The resulting changes are ignored. In this way, when the momentum term is added, the adjustment of the weights is forced to change in the average direction at the bottom of the error surface. When the network weights enter the flat area at the bottom of the error surface, Dw ij (k+1)=Dw ij (k ), thus preventing the appearance of Dw ij =0, which helps the network to jump out of the local minima of the error surface. The momentum factor added by this method is actually equivalent to a damping term, which reduces the oscillation tendency in the learning process and plays a role in buffering and smoothing, thereby improving the convergence.
S32,引入陡度因子BP神经网络在训练过程中当误差平方和接近于零仍有可能模型的输出与实际值存在较大的偏差,造成这种现象的原因是因为误差曲面上存在平坦区。为了防止在网络训练时出现这种情况,本发明引入陡度因子的方法来对标准BP算法进行改进。改进原理是:在权值调整进入平坦区以后,设法压缩神经元的净输入,使其输出退出转移函数的饱和区,以此改变误差函数的形状,从而使调整脱离平坦区。具体做法是,在原转移函数中引入一个陡度因子λ:S32, the steepness factor BP neural network is introduced. In the training process, when the error squared sum is close to zero, there may still be a large deviation between the output of the model and the actual value. The reason for this phenomenon is that there is a flat area on the error surface. In order to prevent this situation during network training, the present invention introduces the method of steepness factor to improve the standard BP algorithm. The improvement principle is: after the weight adjustment enters the flat area, try to compress the net input of the neuron so that its output exits the saturation area of the transfer function, thereby changing the shape of the error function, so that the adjustment is out of the flat area. The specific approach is to introduce a steepness factor λ into the original transfer function:
式中,net为神经元的输入。当发现ΔE接近零,而模型输出与实际值仍有较大偏差时,可判断已进入平坦区,此时令λ>1;当退出平坦区后,再令λ=1。当λ>1时,net坐标压缩了λ倍,神经元函数的敏感区变长,从而使绝对值较大的nett退出饱和区。当λ=1时,转移函数恢复原状,对较小的net具有较高的灵敏度。应用表明,该方法对提高神经网络算法的收敛速度和准确率十分有效。In the formula, net is the input of the neuron. When it is found that ΔE is close to zero, and the model output still has a large deviation from the actual value, it can be judged that it has entered the flat area, and λ>1 at this time; after exiting the flat area, let λ=1. When λ>1, the net coordinate is compressed by λ times, and the sensitive area of the neuron function becomes longer, so that the nett with a larger absolute value exits the saturation area. When λ=1, the transfer function returns to its original state, with higher sensitivity to smaller nets. The application shows that this method is very effective in improving the convergence speed and accuracy of neural network algorithm.
实施例五,在实施例一的基础上,所述的步骤S4具体包括:Embodiment 5, on the basis of Embodiment 1, the step S4 specifically includes:
S41、神经网络初始化。1)参数初始化。将步骤S2得到的BP神经网络的最优初始权值和阈值组合作为参数输入网络。除此之外,初始化BP网络其余参数,包括迭代次数N,动量因子α,训练允许误差ε。2)将训练态势数据作为输入向量,将专家评估的态势值作为输出向量带入优化后的BP神经网络。S41. Neural network initialization. 1) Parameter initialization. The optimal initial weight and threshold combination of the BP neural network obtained in step S2 is input into the network as a parameter. In addition, the remaining parameters of the BP network are initialized, including the number of iterations N, the momentum factor α, and the training allowable error ε. 2) Take the training situation data as the input vector, and take the situation value evaluated by the experts as the output vector into the optimized BP neural network.
S42、计算输入层的输出,输入层的各神经元对输入向量不进行处理,只是简单的将其作为输出传递给隐含层。计算中间隐含层的各神经元的输出,公式如下:S42: Calculate the output of the input layer. Each neuron of the input layer does not process the input vector, but simply transmits it as an output to the hidden layer. Calculate the output of each neuron in the middle hidden layer, the formula is as follows:
计算输出层的各神经元的输出,公式如下:Calculate the output of each neuron in the output layer, the formula is as follows:
上式中,f(x)为隐含层的传递函数,一般采用sigmoid函数,本发明实例引入了陡度因子λ,公式如下:In the above formula, f(x) is the transfer function of the hidden layer, and the sigmoid function is generally used. The example of the present invention introduces the steepness factor λ, and the formula is as follows:
S43、根据计算得到的输出ok与实际输出dk,计算系统总误差E,公式如下:S43. Calculate the total system error E according to the calculated output ok and the actual output dk , and the formula is as follows:
S44、因为系统的总误差E是权值vij,wjk的函数,所以可以通过梯度下降法来调整权值,进而减小误差E,实现迭代优化求解。本发明实施例采用附加动量因子法优化权值修正过程。以wjk为例,公式如下:S44. Because the total error E of the system is a function of the weights v ij , w jk , the weights can be adjusted by the gradient descent method, thereby reducing the error E and realizing iterative optimization solution. The embodiment of the present invention adopts the additional momentum factor method to optimize the weight correction process. Taking w jk as an example, the formula is as follows:
Dw(k+1)=(1-α)ηD(k)+αDw(k)Dw(k+1)=(1-α)ηD(k)+αDw(k)
S45、随机选取下一个训练数据提供给改进BP神经网络,指导所有训练数据对改进BP神经网络进行训练。S45, randomly select the next training data to provide the improved BP neural network, and guide all the training data to train the improved BP neural network.
S46、判断神经网络全局误差E是否满足精度要求。如果E<ε,那么就结束网络的训练;否则就转到步骤(3)继续对各层连接权值继续调整,如此进行迭代训练下去,直到网络的全局误差满足条件或是迭代次数达到N为止。S46. Determine whether the global error E of the neural network meets the accuracy requirement. If E<ε, then end the training of the network; otherwise, go to step (3) to continue to adjust the connection weights of each layer, and perform iterative training until the global error of the network meets the conditions or the number of iterations reaches N. .
S47、将测试态势数据输人到训练好的具有评估能力的神经网络中,经过映射得到网络的态势值SA,最后通过对照表2即可得到网络所处的安全等级。S47 , input the test situation data into the trained neural network with evaluation ability, obtain the network situation value SA through mapping, and finally obtain the security level of the network by comparing Table 2.
神经网络评估结果SA是一个在一定阈值区间内的数值,缺乏一定的现实指导意义,所以在实际的生产生活中,需要对网络安全态势值对应的网络安全等级进行划定。本发明在参考风险评估的基础上,将网络安全态势的等级划分为五级{优,良,中,差,危},各级的态势值范围及网络行为特征如表2所示:The neural network evaluation result SA is a value within a certain threshold range and lacks certain practical guiding significance. Therefore, in actual production and life, it is necessary to delineate the network security level corresponding to the network security situation value. On the basis of the reference risk assessment, the present invention divides the network security situation into five levels {excellent, good, medium, poor, dangerous}, and the situation value range and network behavior characteristics of each level are shown in Table 2:
表2网络总体态势级别表Table 2 Network overall situation level table
本发明具使用时,为了使本领域技术人员更好地理解本方案,下面以实际应用场景对本方案进行说明,采用模拟的网络安全数据本发明提出的网络安全态势评估方法进行仿真对比试验。本申请实施例搭建了一个网络实验环境,普通用户User和攻击者Attacker可通过Internet访问该网络上各主机。定期采集入侵检测系统IDS攻击信息、主机Nessus中采集漏洞扫描信息、Snort采集日志报警信息和路由器Netflow采集网络流量信息,作为本次仿真实验的多源异构原始数据源,然后组织专家对安全风险进行人工评估,得到网络安全态势的实际级别。提取子网内安全设备数(x1),子网内各关键设备开放端口的总量(x2),关键设备访问主流安全网站的频率(x3),报警数目(x4),网络带宽使用率(x5),安全事件历史发生频率(x6),子网流量变化率(x7),子网平均无故障时间(x8)。这8个评估指标构成样本集作为评估模型的输入,专家评估结果作为期望输出,共获得1500条数据。随机选择1000个样本作为训练集,用于训练改进后的BP神经网络;剩余500个样本作为测试集,用来检验网络安全态势评估模型的评估结果与实际结果是否一致即模型的泛化能力;When the present invention is used, in order to make those skilled in the art better understand this solution, the following describes the solution with an actual application scenario, and uses simulated network security data to conduct a simulation comparison test with the network security situation assessment method proposed by the present invention. The embodiment of the present application builds a network experiment environment, and the common user User and the attacker Attacker can access each host on the network through the Internet. Periodically collect IDS attack information of the intrusion detection system, vulnerability scanning information collected from the host Nessus, log alarm information collected by Snort, and network traffic information collected by the router Netflow, as the multi-source heterogeneous original data source for this simulation experiment, and then organize experts to analyze security risks. Conduct manual assessments to get the actual level of cybersecurity posture. Extract the number of security devices in the subnet (x 1 ), the total number of open ports of each key device in the subnet (x 2 ), the frequency of key devices accessing mainstream security websites (x 3 ), the number of alarms (x 4 ), network bandwidth Utilization rate (x 5 ), historical frequency of security incidents (x 6 ), subnet traffic change rate (x 7 ), subnet mean time between failures (x 8 ). These 8 evaluation indicators constitute the sample set as the input of the evaluation model, and the expert evaluation results are used as the expected output, and a total of 1500 pieces of data are obtained. 1000 samples were randomly selected as the training set for training the improved BP neural network; the remaining 500 samples were used as the test set to test whether the evaluation results of the network security situation assessment model were consistent with the actual results, that is, the generalization ability of the model;
在布谷鸟寻优部分,选取布谷鸟种群规模,n=40,设定发现概率pa=0.1,最大迭代代数为40;在BP神经网络部分,设定输入层节点数8。采用试凑法设置隐含层节点的个数为6,输出层输出为态势值,输出节点数1,传递函数为标准的sigmoid函数,最大迭代次数设定为1000,目标函数误差ε=0.05,动量因子α=0.95。本发明实施例设计了算法优化前后的对比试验。图3为本发明实施例提供的基于CS和改进BP神经网络的评估方法与基于传统BP神经网络的评估方法误差曲线对比图。如图3所示,与传统BP神经网络相比,本发明实施例提出的一种基于布谷鸟搜索算法和改进BP神经网络的网络安全态势评估方法不存在局部极小问题,且具有更快的收敛速度和收敛效果。这是由CS算法只需要消耗很少的资源就能找到BP神经网络的初始最优权值和阈值,有效缩短了后期神经网络的训练时间和时空消耗,同时引入了动量因子和陡度因子,大大加快了收敛速度,避免出现局部极值和震荡现象,改善了收敛效果。图4为本发明实施例提供的基于CS和改进BP神经网络的评估方法与基于传统BP神经网络的评估方法评估准确率对比图。如图4所示,随着样本容量的增加,传统BP网络算法评估准确率随之下降,而本发明实例提出的评估方法的准确率曲线稳定在97.5%以上,这说明本发明实例提出的评估方法具有更高的评估精度和更稳定的评估效果。In the cuckoo optimization part, select the cuckoo population size, n = 40, set the discovery probability p a = 0.1, and the maximum iteration algebra is 40; in the BP neural network part, set the number of input layer nodes to 8. The trial and error method is used to set the number of hidden layer nodes to 6, the output layer output is the situation value, the number of output nodes is 1, the transfer function is the standard sigmoid function, the maximum number of iterations is set to 1000, the objective function error ε=0.05, Momentum factor α = 0.95. In the embodiment of the present invention, comparative experiments before and after algorithm optimization are designed. FIG. 3 is a comparison diagram of error curves between the evaluation method based on CS and the improved BP neural network and the evaluation method based on the traditional BP neural network provided by the embodiment of the present invention. As shown in FIG. 3 , compared with the traditional BP neural network, a network security situation assessment method based on the cuckoo search algorithm and the improved BP neural network proposed by the embodiment of the present invention does not have the local minimum problem, and has a faster Convergence speed and convergence effect. This is because the CS algorithm can find the initial optimal weights and thresholds of the BP neural network with only a few resources, which effectively shortens the training time and space-time consumption of the later neural network. At the same time, the momentum factor and the steepness factor are introduced. The convergence speed is greatly accelerated, local extreme values and oscillations are avoided, and the convergence effect is improved. FIG. 4 is a comparison diagram of the evaluation accuracy of the evaluation method based on the CS and the improved BP neural network and the evaluation method based on the traditional BP neural network provided by the embodiment of the present invention. As shown in Figure 4, with the increase of the sample size, the evaluation accuracy of the traditional BP network algorithm decreases, while the accuracy curve of the evaluation method proposed by the example of the present invention is stable at more than 97.5%, which shows that the evaluation proposed by the example of the present invention The method has higher evaluation accuracy and more stable evaluation effect.
以上所述是结合具体实施方式对本发明所作的进一步详细说明,不能认定本发明具体实施仅局限于此;对于本发明所属及相关技术领域的技术人员来说,在基于本发明技术方案思路前提下,所作的拓展以及操作方法、数据的替换,都应当落在本发明保护范围之内。The above is a further detailed description of the present invention in conjunction with the specific embodiments, and it cannot be considered that the specific implementation of the present invention is limited to this; , the expansion and the replacement of the operation method and data should all fall within the protection scope of the present invention.
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811376507.1A CN109547431A (en) | 2018-11-19 | 2018-11-19 | A kind of network security situation evaluating method based on CS and improved BP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811376507.1A CN109547431A (en) | 2018-11-19 | 2018-11-19 | A kind of network security situation evaluating method based on CS and improved BP |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547431A true CN109547431A (en) | 2019-03-29 |
Family
ID=65848164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811376507.1A Pending CN109547431A (en) | 2018-11-19 | 2018-11-19 | A kind of network security situation evaluating method based on CS and improved BP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547431A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149333A (en) * | 2019-05-23 | 2019-08-20 | 桂林电子科技大学 | A kind of network security situation evaluating method based on SAE+BPNN |
CN110363232A (en) * | 2019-06-27 | 2019-10-22 | 南京理工大学 | Evaluation method of interference effect of millimeter wave detector based on BP neural network |
CN110472501A (en) * | 2019-07-10 | 2019-11-19 | 南京邮电大学 | A kind of fingerprint pore coding specification method neural network based |
CN110543412A (en) * | 2019-05-27 | 2019-12-06 | 上海工业控制安全创新科技有限公司 | Automobile electronic function safety assessment method based on neural network accessibility |
CN111126550A (en) * | 2019-12-25 | 2020-05-08 | 武汉科技大学 | Neural network molten steel temperature forecasting method based on Monte Carlo method |
CN111262858A (en) * | 2020-01-16 | 2020-06-09 | 郑州轻工业大学 | Network security situation prediction method based on SA _ SOA _ BP neural network |
CN111327494A (en) * | 2020-02-14 | 2020-06-23 | 山东工商学院 | Multi-domain SDN network traffic situation assessment method and system |
CN112418340A (en) * | 2020-11-27 | 2021-02-26 | 北京无线电测量研究所 | Composite weighted fusion method and system with oscillation damping |
CN112511351A (en) * | 2020-12-01 | 2021-03-16 | 北京理工大学 | Security situation prediction method and system based on MES identification data intercommunication system |
CN112529683A (en) * | 2020-11-27 | 2021-03-19 | 百维金科(上海)信息科技有限公司 | Method and system for evaluating credit risk of customer based on CS-PNN |
CN112615843A (en) * | 2020-12-08 | 2021-04-06 | 国网四川省电力公司信息通信公司 | Power Internet of things network security situation assessment method based on multi-channel SAE-AdaBoost |
CN112700006A (en) * | 2020-12-29 | 2021-04-23 | 平安科技(深圳)有限公司 | Network architecture searching method, device, electronic equipment and medium |
CN112713881A (en) * | 2020-12-10 | 2021-04-27 | 国网四川省电力公司电力科学研究院 | Synchronous clock maintaining system and method based on edge calculation |
CN112905436A (en) * | 2021-04-25 | 2021-06-04 | 中航机载系统共性技术有限公司 | Quality evaluation prediction method for complex software |
CN112926739A (en) * | 2021-03-11 | 2021-06-08 | 北京计算机技术及应用研究所 | Network countermeasure effectiveness evaluation method based on neural network model |
CN113254319A (en) * | 2020-02-12 | 2021-08-13 | 北京沃东天骏信息技术有限公司 | Log alarm-based method and device |
CN113487010A (en) * | 2021-05-21 | 2021-10-08 | 国网浙江省电力有限公司杭州供电公司 | Power grid network security event analysis method based on machine learning |
CN115017820A (en) * | 2022-06-21 | 2022-09-06 | 联峰钢铁(张家港)有限公司 | Method and device for evaluating Si and S contents in molten iron based on neural network and area method |
CN115051864A (en) * | 2022-06-21 | 2022-09-13 | 郑州轻工业大学 | PCA-MF-WNN-based network security situation element extraction method and system |
CN115412301A (en) * | 2022-08-02 | 2022-11-29 | 云南电网有限责任公司信息中心 | Network security prediction analysis method and system |
CN116074658A (en) * | 2023-03-06 | 2023-05-05 | 成都大汇物联科技有限公司 | Hydropower station dam foundation monitoring method and system based on Internet of things |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102054199A (en) * | 2010-12-31 | 2011-05-11 | 中国人民解放军63983部队 | BP (Back Propagation) neural network algorithm based method for analyzing coating aging |
CN106789214A (en) * | 2016-12-12 | 2017-05-31 | 广东工业大学 | It is a kind of based on the just remaining pair network situation awareness method and device of string algorithm |
CN107122869A (en) * | 2017-05-11 | 2017-09-01 | 中国人民解放军装备学院 | The analysis method and device of Network Situation |
CN107222333A (en) * | 2017-05-11 | 2017-09-29 | 中国民航大学 | A kind of network node safety situation evaluation method based on BP neural network |
CN107782857A (en) * | 2017-10-09 | 2018-03-09 | 江苏大学 | Flexible measurement method based on the edible fungus fermented process key parameter for improving CS BPNN |
US20180288100A1 (en) * | 2016-01-08 | 2018-10-04 | Secureworks Corp. | Systems and Methods for Security Configuration |
-
2018
- 2018-11-19 CN CN201811376507.1A patent/CN109547431A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102054199A (en) * | 2010-12-31 | 2011-05-11 | 中国人民解放军63983部队 | BP (Back Propagation) neural network algorithm based method for analyzing coating aging |
US20180288100A1 (en) * | 2016-01-08 | 2018-10-04 | Secureworks Corp. | Systems and Methods for Security Configuration |
CN106789214A (en) * | 2016-12-12 | 2017-05-31 | 广东工业大学 | It is a kind of based on the just remaining pair network situation awareness method and device of string algorithm |
CN107122869A (en) * | 2017-05-11 | 2017-09-01 | 中国人民解放军装备学院 | The analysis method and device of Network Situation |
CN107222333A (en) * | 2017-05-11 | 2017-09-29 | 中国民航大学 | A kind of network node safety situation evaluation method based on BP neural network |
CN107782857A (en) * | 2017-10-09 | 2018-03-09 | 江苏大学 | Flexible measurement method based on the edible fungus fermented process key parameter for improving CS BPNN |
Non-Patent Citations (2)
Title |
---|
王志华: "基于CS-BPNN的网络安全态势评估方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
谢丽霞: "基于布谷鸟搜索优化BP神经网络的网络安全态势评估方法", 《计算机应用》 * |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149333B (en) * | 2019-05-23 | 2021-06-29 | 桂林电子科技大学 | A network security situation assessment method based on SAE+BPNN |
CN110149333A (en) * | 2019-05-23 | 2019-08-20 | 桂林电子科技大学 | A kind of network security situation evaluating method based on SAE+BPNN |
CN110543412A (en) * | 2019-05-27 | 2019-12-06 | 上海工业控制安全创新科技有限公司 | Automobile electronic function safety assessment method based on neural network accessibility |
CN110363232A (en) * | 2019-06-27 | 2019-10-22 | 南京理工大学 | Evaluation method of interference effect of millimeter wave detector based on BP neural network |
CN110363232B (en) * | 2019-06-27 | 2022-09-27 | 南京理工大学 | BP neural network-based millimeter wave detector interference effect evaluation method |
CN110472501B (en) * | 2019-07-10 | 2022-08-30 | 南京邮电大学 | Neural network-based fingerprint sweat pore coding classification method |
CN110472501A (en) * | 2019-07-10 | 2019-11-19 | 南京邮电大学 | A kind of fingerprint pore coding specification method neural network based |
CN111126550A (en) * | 2019-12-25 | 2020-05-08 | 武汉科技大学 | Neural network molten steel temperature forecasting method based on Monte Carlo method |
CN111262858A (en) * | 2020-01-16 | 2020-06-09 | 郑州轻工业大学 | Network security situation prediction method based on SA _ SOA _ BP neural network |
CN111262858B (en) * | 2020-01-16 | 2020-12-25 | 郑州轻工业大学 | Network security situation prediction method based on SA _ SOA _ BP neural network |
CN113254319A (en) * | 2020-02-12 | 2021-08-13 | 北京沃东天骏信息技术有限公司 | Log alarm-based method and device |
CN111327494A (en) * | 2020-02-14 | 2020-06-23 | 山东工商学院 | Multi-domain SDN network traffic situation assessment method and system |
CN111327494B (en) * | 2020-02-14 | 2023-05-16 | 山东工商学院 | Multi-domain SDN network flow situation assessment method and system |
CN112418340A (en) * | 2020-11-27 | 2021-02-26 | 北京无线电测量研究所 | Composite weighted fusion method and system with oscillation damping |
CN112418340B (en) * | 2020-11-27 | 2024-06-04 | 北京无线电测量研究所 | Composite weighted fusion method and system with oscillation damping |
CN112529683A (en) * | 2020-11-27 | 2021-03-19 | 百维金科(上海)信息科技有限公司 | Method and system for evaluating credit risk of customer based on CS-PNN |
CN112511351A (en) * | 2020-12-01 | 2021-03-16 | 北京理工大学 | Security situation prediction method and system based on MES identification data intercommunication system |
CN112615843B (en) * | 2020-12-08 | 2022-07-08 | 国网四川省电力公司信息通信公司 | Power Internet of things network security situation assessment method based on multi-channel SAE-AdaBoost |
CN112615843A (en) * | 2020-12-08 | 2021-04-06 | 国网四川省电力公司信息通信公司 | Power Internet of things network security situation assessment method based on multi-channel SAE-AdaBoost |
CN112713881A (en) * | 2020-12-10 | 2021-04-27 | 国网四川省电力公司电力科学研究院 | Synchronous clock maintaining system and method based on edge calculation |
CN112700006A (en) * | 2020-12-29 | 2021-04-23 | 平安科技(深圳)有限公司 | Network architecture searching method, device, electronic equipment and medium |
CN112926739A (en) * | 2021-03-11 | 2021-06-08 | 北京计算机技术及应用研究所 | Network countermeasure effectiveness evaluation method based on neural network model |
CN112926739B (en) * | 2021-03-11 | 2024-03-19 | 北京计算机技术及应用研究所 | Network countermeasure effectiveness evaluation method based on neural network model |
CN112905436A (en) * | 2021-04-25 | 2021-06-04 | 中航机载系统共性技术有限公司 | Quality evaluation prediction method for complex software |
CN112905436B (en) * | 2021-04-25 | 2023-10-27 | 中航机载系统共性技术有限公司 | Quality evaluation prediction method for complex software |
CN113487010B (en) * | 2021-05-21 | 2024-01-05 | 国网浙江省电力有限公司杭州供电公司 | Power grid network security event analysis method based on machine learning |
CN113487010A (en) * | 2021-05-21 | 2021-10-08 | 国网浙江省电力有限公司杭州供电公司 | Power grid network security event analysis method based on machine learning |
CN115051864A (en) * | 2022-06-21 | 2022-09-13 | 郑州轻工业大学 | PCA-MF-WNN-based network security situation element extraction method and system |
CN115051864B (en) * | 2022-06-21 | 2024-02-27 | 郑州轻工业大学 | PCA-MF-WNN-based network security situation element extraction method and system |
CN115017820A (en) * | 2022-06-21 | 2022-09-06 | 联峰钢铁(张家港)有限公司 | Method and device for evaluating Si and S contents in molten iron based on neural network and area method |
CN115412301A (en) * | 2022-08-02 | 2022-11-29 | 云南电网有限责任公司信息中心 | Network security prediction analysis method and system |
CN115412301B (en) * | 2022-08-02 | 2024-03-22 | 云南电网有限责任公司信息中心 | Predictive analysis method and system for network security |
CN116074658A (en) * | 2023-03-06 | 2023-05-05 | 成都大汇物联科技有限公司 | Hydropower station dam foundation monitoring method and system based on Internet of things |
CN116074658B (en) * | 2023-03-06 | 2023-08-25 | 成都大汇物联科技有限公司 | Hydropower station dam foundation monitoring method and system based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109547431A (en) | A kind of network security situation evaluating method based on CS and improved BP | |
Long et al. | A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN | |
CN110647900A (en) | Method, device and system for intelligent prediction of security situation based on deep neural network | |
CN108400895A (en) | One kind being based on the improved BP neural network safety situation evaluation algorithm of genetic algorithm | |
CN104978612A (en) | Distributed big data system risk predicating method based on AHP-RBF | |
CN104125112B (en) | Physical-information fuzzy inference based smart power grid attack detection method | |
CN111585948A (en) | An intelligent prediction method of network security situation based on power grid big data | |
CN107222333A (en) | A kind of network node safety situation evaluation method based on BP neural network | |
CN109407654A (en) | A kind of non-linear causality analysis method of industrial data based on sparse depth neural network | |
CN104598984B (en) | A kind of failure prediction method based on fuzzy neural network | |
CN102868224B (en) | Secondary network measurement and multimode decision-making method and device for intelligent substation | |
CN104618149B (en) | A kind of heterogeneous network SON intelligence operation management method | |
Cao et al. | Data fusion algorithm for heterogeneous wireless sensor networks based on extreme learning machine optimized by particle swarm optimization | |
CN106453294A (en) | Security situation prediction method based on niche technology with fuzzy elimination mechanism | |
CN117200454A (en) | Intelligent big data monitoring method and Internet of Things system for power distribution devices | |
Xue et al. | Detection and quantification of anomalies in communication networks based on LSTM-ARIMA combined model | |
Zhang et al. | Network security situation prediction model based on EMD and ELPSO optimized BiGRU neural network | |
CN110401955A (en) | A mobile network malicious node detection method and system | |
Xiaogang | Secure Low‐Energy Routing Protocol Based on Dynamic Trust Awareness and Load Balancing in Wireless Sensor Networks | |
Wei et al. | Research on group behavior model based on neural network computing | |
Yu et al. | Trust evaluation of computing power network based on improved particle swarm neural network | |
Wang et al. | Distributed two‐stage state estimation with event‐triggered strategy for multirate sensor networks | |
Feng et al. | A survey of intelligent network fault diagnosis technology | |
CN112085043A (en) | A kind of intelligent monitoring method and system for network security of substation | |
CN113658415B (en) | Early warning method and system of intelligent gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |