| Literature DB >> 36211000 |
Jianxun Li1, Song Ji1, Yiran Jiang1.
Abstract
The more frequent occurrence of network security incidents has an impact on network security. Through the research on network security situational awareness, this paper constructs a multilevel network security situation evaluation index system from various aspects and uses the Elman neural network optimized by the genetic algorithm to evaluate network security situation. Aiming at the disadvantage of subjective dependence in the traditional assignment method of basic probability assignment function, Elman neural network is used to obtain the basic probability assignment function to increase its objectivity, and it is optimized with the PSD algorithm. In addition, the neural network is further improved by the genetic algorithm. In the traditional D-S evidence theory, an evidence correction step is added to optimize the situation that the final judgment result is incorrect due to evidence conflict. Finally, the fusion rules of the D-S evidence theory are used to fuse the support degrees of the four first-level situations to different security levels to obtain the final network security situation assessment result. The results show that the prediction accuracy of the GA-Elman neural network model is as high as 80%, which is significantly higher than that of the traditional D-S model, indicating that the model proposed in this paper has improved the accuracy of the assessment and prediction results. In conclusion, this study provides feasible theoretical prediction guidance for the accurate assessment of network security posture, reveals the improvement ideas for network security development, and is of great significance for the maintenance of network environment security.Entities:
Mesh:
Year: 2022 PMID: 36211000 PMCID: PMC9546651 DOI: 10.1155/2022/9460985
Source DB: PubMed Journal: Comput Intell Neurosci
Network security situation assessment indicator system.
| First-level indicators | Secondary indicators |
|---|---|
| Availability | Traffic change rate, average survival time of major devices, mean time between failures of major devices, and total subnet traffic |
| Vulnerability | Total number of security devices, total number of open ports on major devices, number and extent of network vulnerabilities, device system type, and memory capacity |
| Threatening | Type and number of alarms, type and severity of attacks, historical frequency of attack events, and distribution and size of threat data packets |
| Disaster tolerance | Network topology, network bandwidth, number of concurrent threads of subnet servers, operating system types of subnet devices, and types of services provided |
Network security assessment level.
| Security level | Description of network operation status |
|---|---|
| Class I (safety) | Network service is not affected |
| Class II (relatively safe) | Network service is slightly affected |
| Class III (basic safety) | Network services are moderately affected |
| Class IV (less safe) | Network services are severely affected |
| Class V (unsafe) | Network services are severely affected |
BPA value corresponding to the network security assessment level.
| Security level | Situation BPA value |
|---|---|
| Class I (safety) | (0.8–1.0] |
| Class II (relatively safe) | (0.45–0.8] |
| Class III (basic safety) | (0–0.45] |
| Class IV (less safe) | (0.55–1.0] |
| Class V (unsafe) | (0–0.55] |
Evidence of cybersecurity posture based on BPA values.
| Sample number | O1 | O2 | O3 | U |
|---|---|---|---|---|
| 4 | 0.023 | 0.098 | 0.821 | 0.031 |
| 15 | 0.241 | 0.398 | 0.162 | 0.148 |
| 26 | 0.346 | 0.443 | 0.119 | 0.144 |
| 42 | 0.279 | 0.398 | 0.251 | 0.039 |
| 65 | 0.109 | 0.406 | 0.239 | 0.261 |
| 74 | 0.152 | 0.374 | 0.279 | 0.163 |
| 81 | 0.056 | 0.178 | 0.706 | 0.037 |
| 98 | 0.197 | 0.218 | 0.499 | 0.042 |
| 88 | 0.118 | 0.235 | 0.507 | 0.139 |
| 93 | 0.326 | 0.102 | 0.428 | 0.118 |
Evaluation results of D-S, Elman, GA-Elman, and DS-GA-Elman.
| Samples | D-S | Elman | GA-Elman | DS-GA-Elman | Desired security level |
|---|---|---|---|---|---|
| 4 | VI | IV | IV | V | IV |
| 15 | III | III | III | III | III |
| 26 | III | II | III | III | III |
| 42 | III | II | II | II | II |
| 65 | III | II | III | III | III |
| 74 | IV | III | II | III | III |
| 81 | IV | IV | IV | IV | IV |
| 98 | V | V | IV | IV | V |
| 88 | V | IV | V | V | V |
| 93 | V | IV | V | IV | IV |
Test results of various evaluation algorithms.
| Algorithm category | Correct number | Correct rate (%) |
|---|---|---|
| D-S | 7 | 70 |
| Elman | 7 | 60 |
| GA-Elman | 6 | 70 |
| DS-GA-Elman | 8 | 80 |
Figure 1Comparison of accuracy of each model.
Figure 2Multimodel prediction of situational value.
MAPE value corresponding to GRU, PSP-GRU, and DEIPSO-GRU algorithm.
| Algorithm category | MAPE value | Prediction correctness |
|---|---|---|
| GRU | 0.042 | Lower |
| PSP-GRU | 0.023 | Medium |
| DEIPSO-GRU | 0.014 | Higher |
Figure 3Relative error comparison between GRU, PSO-GRU, and DEIPSO-GRU.