CN111917785B - Industrial internet security situation prediction method based on DE-GWO-SVR - Google Patents

Industrial internet security situation prediction method based on DE-GWO-SVR Download PDF

Info

Publication number
CN111917785B
CN111917785B CN202010783805.3A CN202010783805A CN111917785B CN 111917785 B CN111917785 B CN 111917785B CN 202010783805 A CN202010783805 A CN 202010783805A CN 111917785 B CN111917785 B CN 111917785B
Authority
CN
China
Prior art keywords
industrial internet
wolf
security situation
svr
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010783805.3A
Other languages
Chinese (zh)
Other versions
CN111917785A (en
Inventor
胡向东
吕高飞
白银
韩恺敏
盛顺利
石千磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202010783805.3A priority Critical patent/CN111917785B/en
Publication of CN111917785A publication Critical patent/CN111917785A/en
Application granted granted Critical
Publication of CN111917785B publication Critical patent/CN111917785B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • General Physics & Mathematics (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a DE-GWO-SVR-based industrial internet security situation prediction method, which belongs to the technical field of industrial internet security and comprises the following steps: s1: collecting industrial internet safety data information and safety asset information, preprocessing the information and establishing an industrial internet safety database; s2: processing the security data in the database to obtain an industrial internet security situation value data set; s3: constructing a training sample data set and a test sample data set from data in the industrial internet security situation value data set by adopting a sliding window method; s4: building an industrial internet security situation prediction model based on DE-GWO-SVR to predict future security situations; s5: and (5) checking the safety situation prediction model, and if the safety situation prediction model does not meet the requirements, returning to the step S4 until the prediction result meets the requirements. The method can accurately predict the industrial internet security situation and provide better guarantee for the industrial internet security.

Description

Industrial internet security situation prediction method based on DE-GWO-SVR
Technical Field
The invention belongs to the technical field of industrial internet security, and relates to a DE-GWO-SVR-based industrial internet security situation prediction method.
Background
The internet technology is widely applied to industrial enterprises for centralization, the industrial interconnection brought by high-speed industrialization and informatization promotion brings great convenience to production and life of people, but with the gradual deepening of industrial informatization, the enterprises face various network attack threats at any time in the transformation and upgrading process. With the continued use of IPV6 technology and 5G technology, industrial internet enterprises will now face more sophisticated and varied security threats. Aiming at the requirements of safety and reliability, mass coverage, low time delay and the like of the industrial Internet, the industrial information safety is enhanced, and an omnibearing industrial information safety guarantee system is constructed and is a basic guarantee for the development of intelligent manufacturing enterprises. Traditional network security protection measures such as IDS protection, firewall vulnerability check system protection, data encryption protection and the like are lack of certain autonomy and relevance, and a network situation awareness technology can acquire relevant information causing security situation change under a large-scale industrial internet environment, effectively analyze and evaluate internal security events, carry out sequential prediction on network security threats to be faced recently, and further help security management personnel to make management decisions and preventive actions.
At present, although a machine learning method is applied to the field of network security situation prediction, the machine learning method is applied to the field of general internet, a security situation prediction technology aiming at industrial internet does not exist, and most of the traditional network security situation prediction technologies are not suitable for being directly applied to the industrial internet. Therefore, the industrial network security in the industrial internet environment needs higher security guarantee, and it is very meaningful to research a security situation prediction method with higher accuracy in the industrial internet environment.
Disclosure of Invention
In view of the above, the invention aims to provide a DE-GWO-SVR-based industrial internet security situation prediction method, which solves the problem that the traditional network security situation prediction method cannot be directly applied to the industrial internet well, and provides the industrial internet security situation prediction method with high prediction accuracy and high convergence rate.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for predicting the security situation of an industrial internet based on DE-GWO-SVR comprises the following steps:
s1: collecting industrial internet safety data information and safety asset information, preprocessing the information and establishing an industrial internet safety database;
s2: processing the safety data in the database to obtain an industrial internet safety situation value data set;
s3: constructing a training sample data set and a test sample data set from data in the industrial internet security situation value data set by adopting a sliding window method;
s4: building an industrial internet security situation prediction model based on DE-GWO-SVR to predict future security situations;
s5: and (5) checking the safety situation prediction model, and if the safety situation prediction model does not meet the requirements, returning to the step S4 until the prediction result meets the requirements.
Further, step S2 specifically includes the following steps:
s21: through the research on the situation influence index classification, the extracted data is preprocessed and quantized and graded;
s22: and (4) safety situation value calculation: calculating the security situation value of the industrial internet in one period according to the following formula:
Figure BDA0002621192350000021
in the formula, T represents the magnitude of the security situation value, N represents the total number of different types of attacks in one week, i represents the type, and omega represents the type1、ω2、ω3Represents a weight factor, Vi、Ti、AiRepresenting vulnerability degree values, threat degree values and asset values corresponding to attacks of the same type;
s23: normalization treatment: data were normalized to the [0,1] interval according to the following equation:
Figure BDA0002621192350000022
in the formula, XiAnd Xi' indicates the situation values before and after the normalization processing, respectively, and i is 1,2, …, 150; xmaxAnd XminWhich respectively represent the two maxima and minima in the raw data.
Further, in step S3, a sliding window method is used to determine 80% of data in the industrial internet security situation value sample set as a training sample set, 20% of the data is determined as a test sample set, a sliding window is selected as 5, a single-step prediction mode is used to predict the last 1 security situation value using the first 5 security situation values, and a sample training set D ═ is constructed (X)i,Yi) And sample test set T ═ (X)i,Yi)。
Further, in step S4, the differential evolution algorithm DE is first introduced into the grey wolf algorithm GWO to obtain an improved grey wolf optimization algorithm, the population scale, the maximum iteration number, and the spatial dimension in the improved grey wolf optimization algorithm are initialized, then the training situation prediction model is trained by using the training sample data set constructed in step S3, the residual between the predicted value and the true value obtained by training the sample data set is used as a fitness function to find out the optimal individual, and finally the obtained optimal individual is optimized for the SVR parameters of the support vector regression machine to construct the industrial internet security prediction model based on DE-GWO-SVR.
Further, step S4 specifically includes the following steps:
s41: initializing model parameters: setting N as the number of the wolf populations, G representing the maximum iteration number, a scaling factor F, a cross probability parameter CR and the value ranges of two coefficients C and G involved in the support vector regression, and randomly initializing individuals in the whole population in a search space;
s42: inputting a training sample data set into a DE improved GWO-SVR prediction model for training; randomly generating the position information of all father grey wolf individuals in the population, comparing and selecting the grey wolf with the best adaptability according to the fitness value of each father in the father grey wolf population, respectively using the grey wolf as the father alpha wolf, the grey wolf as the father beta wolf and the grey wolf as the father delta wolf, and updating the position information of other father wolfs in the wolf population by using the following formula:
Figure BDA0002621192350000031
A=a·(2r-1)
wherein D (t) represents the distance between one of the three dominant subjects and the target, xp(t) selecting the current position of the target animal, wherein t represents the current iteration times; r belongs to rand (0,1), A is a synergistic factor; when A is more than or equal to 1, the predatory wolves perform global search at a place far away from the hunting target; when | A |<1, predatory wolves begin to gradually surround prey targets;
s43: differential evolution operation: performing mutation operation with the newly generated filial generation gray wolf individual by using the following formula, and performing cross operation with the target parent alpha wolf to generate an intermediate variant filial generation alpha wolf; comparing the adaptability of the two parent and child alpha wolves in the current iteration process, taking the gray wolves with the best adaptability as new parent alpha wolves, updating the position information of other gray wolves in the wolves, and obtaining new parent alpha wolves, beta wolves and delta wolves after sorting by depending on the individual adaptability values again:
Vi(g)=xr3(g)+F·(xr1(g)-xr2(g))
Figure BDA0002621192350000032
Figure BDA0002621192350000033
in the formula, xr1(g),xr2(g),xr3(g) Is a randomly selected three parent individuals and r1≠r2≠r3≠i,Vi(g) G is the current iteration numerical value of the variant progeny individual; f0Is the initial value of the scaling factor, when F is epsilon (F)0,2F0) And F ∈ (0, 1); CR is cross probability used for controlling cross degree, j represents dimension to be crossed, jrandRepresent integer indices, chosen randomly from {1,2, …, n }.
Further, in step S5, a determination condition is set as whether the highest prediction precision condition is achieved or whether iteration has been performed to the G generation, if a given requirement for terminating the algorithm loop is achieved, the position information of the parent α wolf individual with the best adaptability at this time is output, so as to obtain the best SVR related penalty parameter C and RBF kernel function parameter G, thereby establishing the best industrial internet security situation prediction model, and finally, the test sample data set obtained in S3 is input, so as to obtain a predicted value of the industrial internet security situation.
The invention has the beneficial effects that: compared with the traditional network security situation prediction method, the gray wolf optimization algorithm is improved by using the differential evolution algorithm, the problem that the gray wolf optimization algorithm is not high in solving precision and falls into the local optimal solution is solved, then the punishment coefficient C and the kernel function parameter g of the support vector regression machine are selected by using the improved combined optimization algorithm aiming at the problems of high-dimensional complexity, nonlinearity and openness of the industrial internet security data, and finally the future security situation value is predicted by using the advantages of high training speed, good fitting effect, difficulty in falling into the local optimal solution and the like of the support vector regression algorithm. Therefore, the method and the device solve the problems of low prediction precision of the industrial internet security situation and non-ideal security data processing.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
For the purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a basic structure diagram of an industrial Internet security situation prediction method based on DE-GWO-SVR according to the present invention;
FIG. 2 is a diagram illustrating a security posture value quantification method according to the present invention;
FIG. 3 is a schematic diagram of the calceea priestor of the present invention;
FIG. 4 is a two-dimensional schematic diagram of a standard differential variation strategy according to the present invention;
FIG. 5 is a flowchart of an industrial Internet security situation prediction algorithm based on DE-GWO-SVR according to the present invention.
Detailed Description
The following embodiments of the present invention are provided by way of specific examples, and other advantages and effects of the present invention will be readily apparent to those skilled in the art from the disclosure herein. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention in a schematic way, and the features in the following embodiments and examples may be combined with each other without conflict.
Wherein the showings are for the purpose of illustrating the invention only and not for the purpose of limiting the same, and in which there is shown by way of illustration only and not in the drawings in which there is no intention to limit the invention thereto; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", "front", "rear", etc., based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not intended to indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and therefore the terms describing the positional relationship in the drawings are only used for illustrative purposes and are not to be construed as limiting the present invention, and the specific meaning of the terms described above will be understood by those skilled in the art according to the specific circumstances.
Referring to fig. 1 to 5, fig. 1 is a basic structure diagram of a method for predicting a security situation of an industrial internet based on DE-GWO-SVR, which is suitable for predicting a network security situation under an industrial internet environment, and includes the following steps:
101: data preprocessing: constructing an industrial internet security database according to the industrial enterprise network security data information and the asset value information;
102: evaluation and quantification: and carrying out weighted average on the obtained data, and carrying out normalization processing on the data to obtain a sample data set of the industrial internet security situation value.
103: determining 80% of data of an industrial internet security situation value sample data set as a training sample data set and 20% of data as a test sample data set by adopting a sliding window method, selecting the size of a sliding window as 5, outputting as 1, and constructing a training sample set D ═ X (X)i,Yi) And test sample set T ═ (X)i,Yi)。
104: the method comprises the steps of constructing an industrial internet security situation prediction model based on DE-GWO-SVR to predict the future security situation of the industrial internet;
105: if the prediction model satisfies the requirement, the process is stopped, and if the prediction model does not satisfy the requirement, the process returns to step S4, and the process is repeated until the prediction result satisfies the requirement.
Optionally, in the step 102, the data processing process includes the following steps:
1021: through research on classification of situation influence indexes, extracted data are quantized and graded, and the industrial internet security situation value in a period is calculated according to the following formula:
Figure BDA0002621192350000051
in the formula, T represents the magnitude of the security situation value, N represents the total number of different types of attacks in one week, i represents the type, and omega represents the number of attacks in one week1、ω2、ω3Representing a weight factor, Vi、Ti、AiVulnerability value, threat degree value and asset corresponding to attack representing same typeAnd (4) value.
1023: normalization processing: data were normalized to the [0,1] interval according to the following equation:
Figure BDA0002621192350000052
in the formula, XiAnd X'iEach indicates a situation value before and after normalization processing, i is 1,2, …, 150; xmaxAnd XminRespectively, as the two most significant values in the original data.
In step 104, referring to fig. 5, training to obtain optimal parameters C and g of the SVR according to the data sets D and T obtained in step 103 specifically includes the following steps:
1041: initializing model parameters: setting N as the number of the wolf population, G as the maximum iteration number, the scaling factor F, the cross probability parameter CR and the value range of two coefficients C and G involved in the support vector regression, and randomly initializing individuals in the whole population in a search space.
1042: after model parameters are initialized, a training sample data set is input into a DE improved GWO-SVR prediction model for training. Randomly generating the position information of all father grey wolfs in the population, referring to fig. 3, selecting the best grey wolf as the father alpha wolf, beta wolf and delta wolf according to the fitness value of each father in the father grey wolf group, and updating the position information of other father wolfs in the wolf group by the following formula:
Figure BDA0002621192350000061
A=a·(2r-1)
wherein D (t) represents the distance between the current Hui wolf individual (one of the three dominant Hui wolfs) and the target, xp(t) selecting the current position of the target animal, wherein t represents the current iteration times; r belongs to rand (0,1), and A is a synergistic factor. When the absolute value A is more than or equal to 1, the predatory wolves perform global search at a place far away from the hunting target; when | A |<1, predatory wolves start to gradually surround prey targets, which is equivalent to the algorithm entering a local optimization stage.
1043: differential evolution operation: referring to fig. 4, the following formula is used to perform mutation operation with the newly generated offspring wolf individuals, and then the mutation operation is performed with the target parent alpha wolf to generate the intermediate variant offspring alpha wolf. And comparing the adaptability of the two parent-child alpha wolves in the current iteration process, taking the gray wolves with the best adaptability as new parent alpha wolves, updating the position information of other gray wolves in the wolves, and sequencing by depending on the individual adaptability values again to obtain new parent alpha wolves, beta wolves and delta wolves.
Vi(g)=xr3(g)+F·(xr1(g)-xr2(g))
Figure BDA0002621192350000062
Figure BDA0002621192350000063
In the formula, xr1(g),xr2(g),xr3(g) Is a randomly selected three parent individuals and r1≠r2≠r3≠i,Vi(g) G is the current iteration numerical value of the variant offspring individuals; f0Is the initial value of the scaling factor, when F is the same as (F)0,2F0) And F ∈ (0, 1); CR is the crossover probability and is used for controlling the crossover degree, j represents the dimension to be crossed, jrandRepresent integer indices, chosen randomly from {1,2, …, n }.
In step 105, a determination condition is set as to whether the highest prediction accuracy condition is reached or whether iteration has been performed to the G generation. If the requirement of the given termination algorithm cycle is met, outputting the position information of the parent alpha wolf individual with the best adaptability at the moment, so as to obtain the optimal SVR (support vector regression) related penalty parameter C and RBF (radial basis function) parameter g, and establishing the optimal industrial internet security situation prediction model. And finally, processing the test sample data set, and outputting a situation prediction result to be presented to safety management personnel.
The method is suitable for predicting the security situation of the industrial Internet, and based on a machine learning method, the data set can be subjected to normalization processing, dimensionality reduction, abnormal data detection and correction and the like, so that the prediction precision is improved. The difference evolution algorithm is adopted to avoid the gray wolf algorithm from being easily trapped into a local optimal solution, the optimal support vector regression related parameters are selected by utilizing the improved gray wolf optimization algorithm, and finally the support vector regression is adopted to predict the industrial internet security situation, so that the effects of high prediction precision and strong convergence capability can be achieved.
Finally, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A method for predicting industrial internet security situation based on DE-GWO-SVR is characterized by comprising the following steps: the method comprises the following steps:
s1: collecting industrial internet safety data information and safety asset information, preprocessing the information and establishing an industrial internet safety database;
s2: processing the security data in the database to obtain an industrial internet security situation value data set;
s3: constructing a training sample data set and a test sample data set from data in the industrial internet security situation value data set by adopting a sliding window method;
s4: building an industrial internet security situation prediction model based on DE-GWO-SVR to predict future security situations; introducing a differential evolution algorithm DE into a gray wolf algorithm GWO to obtain an improved gray wolf optimization algorithm, initializing the population scale, the maximum iteration times and the spatial dimension in the improved gray wolf optimization algorithm, training a situation prediction model by using a training sample data set constructed in the step S3, finding out an optimal individual by using a residual error between a predicted value and a true value obtained by training the sample data set as a fitness function, and optimizing a support vector regression SVR parameter by using the obtained optimal individual to construct an industrial internet security prediction model based on DE-GWO-SVR;
s5: and (5) checking the safety situation prediction model, and if the safety situation prediction model does not meet the requirements, returning to the step S4 until the prediction result meets the requirements.
2. The DE-GWO-SVR-based industrial internet security situation prediction method according to claim 1, wherein: step S2 specifically includes the following steps:
s21: through the research on the situation influence index classification, the extracted data is preprocessed and quantized and graded;
s22: and (3) safety situation value calculation: calculating the security situation value of the industrial internet in one period according to the following formula:
Figure FDA0003681979790000011
in the formula, T represents the magnitude of the security situation value, N represents the total number of different types of attacks in one week, i represents the type, and omega represents the type1、ω2、ω3Representing a weight factor, Vi、Ti、AiRepresenting vulnerability degree values, threat degree values and asset values corresponding to attacks of the same type;
s23: normalization processing: data were normalized to the [0,1] interval according to the following equation:
Figure FDA0003681979790000012
in the formula, XiAnd X'iThe security situation values before and after the normalization processing are respectively represented, i is 1,2, … and 150; xmaxAnd XminRepresenting two maxima and minima in the raw data, respectively.
3. The DE-GWO-SVR-based industrial internet security situation prediction method as claimed in claim 1, wherein: in step S3, a sliding window method is used to determine 80% of data in the industrial internet security situation value sample data set as a training sample data set, 20% of the data is determined as a test sample data set, a sliding window is selected as 5, a single step prediction method is used to predict the last 1 security situation value using the first 5 security situation values, and a sample training set D (X) is constructedi,Yi) And sample test set T ═ (X)i,Yi)。
4. The DE-GWO-SVR-based industrial internet security situation prediction method as claimed in claim 1, wherein: step S4 specifically includes the following steps:
s41: initializing model parameters: setting N as the number of the wolf populations, G as the maximum iteration number, a scaling factor F, a cross probability parameter CR and the value ranges of two coefficients C and G related in the support vector regression, and randomly initializing individuals in the whole population in a search space;
s42: inputting a training sample data set into a DE improved GWO-SVR prediction model for training; randomly generating the position information of all father grey wolf individuals in the population, comparing and selecting the grey wolf with the best adaptability according to the fitness value of each father in the father grey wolf population, respectively using the grey wolf as the father alpha wolf, the grey wolf as the father beta wolf and the grey wolf as the father delta wolf, and updating the position information of other father wolfs in the wolf population by using the following formula:
x(t+1)=xp(t)-A·D(t)
A=a·(2r-1)
wherein D (t) represents the distance between one of the three dominant subjects and the target, xp(t) selecting the current position of the target animal, wherein t represents the current iteration times; r belongs to rand (0,1), A is a synergistic factor; when A is more than or equal to 1, the predatory wolves perform global search at a place far away from the hunting target; when | A |<1, predatory wolves begin to gradually surround prey targets;
s43: differential evolution operation: performing mutation operation with the newly generated filial generation gray wolf individual by using the following formula, and performing cross operation with the target parent alpha wolf to generate an intermediate variant filial generation alpha wolf; comparing the adaptability of the two parent-child alpha wolves in the current iteration process, taking the gray wolves with the best adaptability as new parent alpha wolves, updating the position information of other gray wolves in the wolves, and obtaining new parent alpha wolves, beta wolves and delta wolves after sequencing by depending on the individual adaptability values again:
Vi(g)=xr3(g)+F·(xr1(g)-xr2(g))
Figure FDA0003681979790000021
Figure FDA0003681979790000022
in the formula, xr1(g),xr2(g),xr3(g) Is a randomly selected three parent individuals and r1≠r2≠r3≠i,Vi(g) G is the current iteration numerical value of the variant progeny individual; f0Is the initial value of the scaling factor, when F is the same as (F)0,2F0) And F ∈ (0, 1); CR is cross probability used for controlling cross degree, j represents dimension to be crossed, jrandRepresent integer indices, chosen randomly from {1,2, …, n }.
5. The DE-GWO-SVR-based industrial internet security situation prediction method according to claim 4, wherein: in step S5, a determination condition is set as whether the condition reaches the highest prediction precision condition or whether the iteration reaches the G generation, if the requirement of the given termination algorithm loop is reached, the position information of the parent α wolf individual with the best adaptability at this time is output, so as to obtain the best SVR related penalty parameter C and RBF kernel function parameter G, thereby establishing the best industrial internet security situation prediction model, and finally, the test sample data set obtained in step S3 is input, so as to obtain the predicted value of the industrial internet security situation.
CN202010783805.3A 2020-08-06 2020-08-06 Industrial internet security situation prediction method based on DE-GWO-SVR Active CN111917785B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010783805.3A CN111917785B (en) 2020-08-06 2020-08-06 Industrial internet security situation prediction method based on DE-GWO-SVR

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010783805.3A CN111917785B (en) 2020-08-06 2020-08-06 Industrial internet security situation prediction method based on DE-GWO-SVR

Publications (2)

Publication Number Publication Date
CN111917785A CN111917785A (en) 2020-11-10
CN111917785B true CN111917785B (en) 2022-07-15

Family

ID=73287274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010783805.3A Active CN111917785B (en) 2020-08-06 2020-08-06 Industrial internet security situation prediction method based on DE-GWO-SVR

Country Status (1)

Country Link
CN (1) CN111917785B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112801359A (en) * 2021-01-25 2021-05-14 海尔数字科技(青岛)有限公司 Industrial internet security situation prediction method and device, electronic equipment and medium
CN113141272B (en) * 2021-04-20 2022-03-15 浙江大学 Network security situation analysis method based on iteration optimization RBF neural network
CN113222273B (en) * 2021-05-26 2022-06-07 中铁十八局集团有限公司 TBM tunneling rate prediction method based on GWO-FW-MKL-SVR algorithm
CN113358840A (en) * 2021-06-07 2021-09-07 西安邮电大学 Water quality early warning method and system
CN115242428B (en) * 2022-06-08 2024-05-31 大连大学 Network security situation prediction method based on optimized CW-RNN
CN115277159B (en) * 2022-07-22 2023-05-23 重庆邮电大学 Industrial Internet security situation assessment method based on improved random forest
CN115996135B (en) * 2022-09-09 2024-03-12 重庆邮电大学 Industrial Internet malicious behavior real-time detection method based on feature combination optimization

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867498A (en) * 2009-04-17 2010-10-20 中国科学院软件研究所 Network security situation evaluating method
CN102098180A (en) * 2011-02-17 2011-06-15 华北电力大学 Network security situational awareness method
CN102148820A (en) * 2011-01-14 2011-08-10 中国科学技术大学 System and method for estimating network security situation based on index logarithm analysis
CN102694800A (en) * 2012-05-18 2012-09-26 华北电力大学 Gaussian process regression method for predicting network security situation
CN106453293A (en) * 2016-09-30 2017-02-22 重庆邮电大学 Network security situation prediction method based on improved BPNN (back propagation neural network)
CN109598120A (en) * 2018-11-15 2019-04-09 中国科学院计算机网络信息中心 Security postures intelligent analysis method, device and the storage medium of mobile terminal
CN109816204A (en) * 2018-12-25 2019-05-28 南京理工大学 A kind of safety of subway operation Tendency Prediction method based on GA-SVM
CN110378526A (en) * 2019-07-15 2019-10-25 安徽理工大学 The mobile method for predicting of bus station based on GW and SVR, system and storage medium
CN110392048A (en) * 2019-07-04 2019-10-29 湖北央中巨石信息技术有限公司 Network security situation awareness model and method based on CE-RBF
CN111178578A (en) * 2019-11-26 2020-05-19 湖南大学 Financial stock prediction method integrating clustering and ensemble learning

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120068611A (en) * 2010-12-17 2012-06-27 한국전자통신연구원 Apparatus and method for security situation awareness and situation information generation based on spatial linkage of physical and it security
US20130318609A1 (en) * 2012-05-25 2013-11-28 Electronics And Telecommunications Research Institute Method and apparatus for quantifying threat situations to recognize network threat in advance
CN104486141B (en) * 2014-11-26 2018-10-23 国家电网公司 A kind of network security situation prediction method that wrong report is adaptive
CN108520272B (en) * 2018-03-22 2020-09-04 江南大学 Semi-supervised intrusion detection method for improving Cantonese algorithm
CN111476263B (en) * 2019-12-27 2024-02-09 江苏科技大学 Bearing defect identification method based on SDAE and improved GWO-SVM

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867498A (en) * 2009-04-17 2010-10-20 中国科学院软件研究所 Network security situation evaluating method
CN102148820A (en) * 2011-01-14 2011-08-10 中国科学技术大学 System and method for estimating network security situation based on index logarithm analysis
CN102098180A (en) * 2011-02-17 2011-06-15 华北电力大学 Network security situational awareness method
CN102694800A (en) * 2012-05-18 2012-09-26 华北电力大学 Gaussian process regression method for predicting network security situation
CN106453293A (en) * 2016-09-30 2017-02-22 重庆邮电大学 Network security situation prediction method based on improved BPNN (back propagation neural network)
CN109598120A (en) * 2018-11-15 2019-04-09 中国科学院计算机网络信息中心 Security postures intelligent analysis method, device and the storage medium of mobile terminal
CN109816204A (en) * 2018-12-25 2019-05-28 南京理工大学 A kind of safety of subway operation Tendency Prediction method based on GA-SVM
CN110392048A (en) * 2019-07-04 2019-10-29 湖北央中巨石信息技术有限公司 Network security situation awareness model and method based on CE-RBF
CN110378526A (en) * 2019-07-15 2019-10-25 安徽理工大学 The mobile method for predicting of bus station based on GW and SVR, system and storage medium
CN111178578A (en) * 2019-11-26 2020-05-19 湖南大学 Financial stock prediction method integrating clustering and ensemble learning

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A framework for network security situation awareness based on knowledge discovery;Fang Lan et al.;《2010 2nd International Conference on Computer Engineering and Technology》;20100617;全文 *
基于差分WGAN的网络安全态势预测;王婷婷 等;《计算机科学》;20191115;全文 *
基于改进灰狼优化算法的网络流量预测模型;龙震岳 等;《计算机应用研究》;20170614;全文 *

Also Published As

Publication number Publication date
CN111917785A (en) 2020-11-10

Similar Documents

Publication Publication Date Title
CN111917785B (en) Industrial internet security situation prediction method based on DE-GWO-SVR
Li et al. Applying various algorithms for species distribution modelling
CN106453293B (en) A kind of network security situation prediction method based on improved BPNN
Chen et al. Improved XGBoost model based on genetic algorithm
CN110705692B (en) Nonlinear dynamic industrial process product prediction method of space-time attention network
CN110085327A (en) Multichannel LSTM neural network Influenza epidemic situation prediction technique based on attention mechanism
CN112581263A (en) Credit evaluation method for optimizing generalized regression neural network based on wolf algorithm
CN112966714B (en) Edge time sequence data anomaly detection and network programmable control method
CN106682502A (en) Intrusion intension recognition system and method based on hidden markov and probability inference
Xie et al. Unsupervised user identity linkage via factoid embedding
CN110990718B (en) Social network model building module of company image lifting system
CN109523021A (en) A kind of dynamic network Structure Prediction Methods based on long memory network in short-term
CN110619540A (en) Click stream estimation method of neural network
Gandy et al. MMCTest—a safe algorithm for implementing multiple Monte Carlo tests
CN118151020B (en) Method and system for detecting safety performance of battery
CN116151485A (en) Method and system for predicting inverse facts and evaluating effects
CN115051929A (en) Network fault prediction method and device based on self-supervision target perception neural network
Hu et al. An efficient Long Short-Term Memory model based on Laplacian Eigenmap in artificial neural networks
CN116340936A (en) ICS intrusion detection system and method integrating reinforcement learning and feature selection optimization
Jain et al. Increasing fairness in predictions using bias parity score based loss function regularization
CN106778252B (en) Intrusion detection method based on rough set theory and WAODE algorithm
Sergeev et al. Genome-wide analysis of MDR and XDR Tuberculosis from Belarus: Machine-learning approach
CN112528554A (en) Data fusion method and system suitable for multi-launch multi-source rocket test data
Shi et al. A genetic algorithm-based approach for classification rule discovery
JP5401885B2 (en) Model construction method, construction system, and construction program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant