Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security situation evaluation method based on CS and improved BP neural network

A BP neural network and network security technology, which is applied in the field of network security situation assessment based on CS and improved BP neural network, can solve the problems of one-sidedness of assessment results, prone to shocks, large time and space overhead, etc., to improve accuracy and practicability , speed up the convergence speed, and reduce the effect of subjective influence

Inactive Publication Date: 2019-03-29
STATE GRID HENAN INFORMATION & TELECOMM CO +2
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The first two methods are widely used, but there are shortcomings such as strong subjective dependence, difficulty in obtaining prior knowledge, and inappropriate dynamic and complex network environments. In contrast, the evaluation method based on pattern recognition has higher accuracy and objectiveness. BP neural network is a multi-layer feed-forward network, which is widely used in situation assessment because of its powerful self-learning ability, good generalization ability and fault tolerance ability. However, from the perspective of application effects, there are still the following deficiencies: (1) The evaluation data source is single, resulting in one-sided evaluation results and low credibility
(2) The space-time overhead is large, does not meet the real-time requirements and the evaluation results are not accurate enough (3) The traditional BP neural network has disadvantages such as easy to form local minimum, easy to oscillate, and slow convergence speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security situation evaluation method based on CS and improved BP neural network
  • Network security situation evaluation method based on CS and improved BP neural network
  • Network security situation evaluation method based on CS and improved BP neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1, a network security situation assessment method based on CS and improved BP neural network, including the following four steps,

[0053] S1. Obtain elements of the network security situation, form a training sample set and a test sample set, and determine the structure of the BP neural network;

[0054] S2, using the cuckoo search (CS) algorithm to find the optimal initial weight and threshold;

[0055] S3. In view of the shortcomings of the traditional BP neural network such as slow convergence speed, prone to oscillation and falling into local minimum, the momentum factor and steepness factor are introduced to improve the BP neural network;

[0056] S4. Train the improved BP neural network, and use the trained network for network security situation assessment to obtain the final situation value and security level.

Embodiment 2

[0057] Embodiment 2, on the basis of Embodiment 1, the step S1 specifically includes:

[0058] S11. Obtain elements of the network security situation to form a training sample set and a test sample set. The evaluation data sources mainly come from three categories: based on system configuration information, based on system operation information and based on network traffic information. The first type of data source refers to network design and configuration status, such as network topology, installation and configuration of service software, and system vulnerabilities; the second type of data source refers to the system operation when the network system is attacked, mainly from The third type of data source mainly refers to various traffic conditions of network instant communication, which can be monitored and obtained through special software. According to the current network status and the actual needs of the indicator system, the present invention selects Netflow data, Snor...

Embodiment 3

[0067] Embodiment 3, on the basis of Embodiment 1, the step S2 specifically includes:

[0068] The initial weights and thresholds of the BP neural network are randomly assigned, so its training time is generally longer, and the weights and thresholds obtained through training may not be optimal, so the present invention uses the cuckoo (CS) algorithm to find the optimal The weight and threshold of , the specific steps are as follows:

[0069] S21, initialize the population, randomly generate n cuckoos according to the characteristics of the neural network weight and threshold To encode n cuckoos, the encoding method adopts floating-point number encoding. The floating-point number encoding is intuitive and has the characteristics of easy control of encoding length, high encoding accuracy and strong search ability in large spaces, which can reduce computational complexity. Therefore, the present invention adopts floating-point number coding. According to the design structure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security situation evaluation method based on CS and improved BP neural network. The method comprises four steps of S1. acquiring network security situation elements, forming a training sample set and a test sample set, and determining a BP neural network structure; S2. seeking an optimal initial weight and a threshold by using a CS algorithm; S3. introducing a momentum factor and a gradient factor to improve the BP neural network; S4. training the improved BP neural network, finally, using the trained network in network security situation evaluation so as toobtain a final situation value and a security level. Network security situation is evaluated precisely and quantitatively by using the improved BP neural network, so that subjective effects of expertopinions in traditional evaluation methods are lowered, and overall network security situation is reflected objectively and comprehensively; and the network security situation is improved by combining the CS algorithm and introducing the momentum factor and gradient factor, the convergence speed is improved, time and space overheads are reduced, and accuracy and practicability of network securitysituation evaluation are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security situation assessment method based on CS and improved BP neural network. Background technique [0002] With the rapid development of Internet technology, the scale of the network has gradually increased and become more complex, the attacks suffered are diversified, the security incidents have increased sharply, and security issues have become increasingly prominent and urgent. In this context, network security situation assessment emerged as the times require, and has gradually become the research focus of next-generation network security technologies. Comprehensive analysis and real-time assessment of the situation can help managers grasp the overall network security situation, provide guidance for network security management command and decision-making, and minimize risks and losses. [0003] At present, the network security situation assessment at h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06N3/08G06N3/04G06N3/00
CPCH04L41/142H04L41/145H04L63/20G06N3/006G06N3/084G06N3/044G06N3/045
Inventor 李文萃郭少勇王世文刘岩杨润华喻鹏徐思雅安致嫄吴利杰丁铖
Owner STATE GRID HENAN INFORMATION & TELECOMM CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products