Abstract
In the big data environment, the scale of attacks of Distributed Denial of Service (DDoS) continues to expand rapidly. The traditional network situation assessment method cannot effectively evaluate the security situation of DDoS. A security situation assessment method based on deep learning and a security situation assessment model based on neural network are proposed. The model uses convolutional neural network (CNN), back propagation algorithm (BP) and Long Short-Term memory neural network (LSTM) to learn various network security indicators to achieve a comprehensive assessment of the network. The experimental results show that the model can more easily and accurately evaluate the network security status, which is more accurate and flexible than the existing evaluation methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cheng, J., Zhang, C., Tang, X., Sheng, V.S., Dong, Z., Li, J.: Adaptive DDoS attack: detection method based on multiple-kernel learning. Secur. Commun. Netw. 2018 (2018)
Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095 (2018)
Arbor Networks: 2012 Infrastructure Security Report. http://tinyurl.com/ag6tht4. Accessed 22 May 2019
Xu, J., Wei, L., Zhang, Y., Wang, A., Gao, C.: Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113–124 (2018)
Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)
Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016). S0304397516300378
Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Comput. 16(4), 787–796 (2013)
Guang, K., Guangming, T., Xia, D., Shuo, W., Kun, W: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE (2016)
Xiang, S., Lv, Y., Xia, C., Li, Y., Wang, Z.: A method of network security situation assessment based on hidden Markov model (2015)
Luo, J.H., Wu, J., Lin, W.: [IEEE 2017 IEEE International Conference on Computer Vision (ICCV) - Venice, Italy, 22–29 October 2017] 2017 IEEE International Conference on Computer Vision (ICCV) - ThiNet: A Filter Level Pruning Method for Deep Neural Network Compression, pp. 5068–5076 (2017)
Wang, G., Lin, L., Ding, S., Li, Y., Wang, Q., Dari: distance metric and representation integration for person verification (2016)
Jian, S., Gui, Z., Ji, S., Shen, J., Tan, H., Yi, T.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117–123 (2018). S1084804518300031
Cheng, J., Yin, J., Liu, Y., Cai, Z., Li, M.: DDoS attack detection algorithm using IP address features. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) FAW 2009. LNCS, vol. 5598, pp. 207–215. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02270-8_22
Gajera, V., Shubham, Gupta, R., Jana, P.K.: An effective multi-objective task scheduling algorithm using min-max normalization in cloud computing. In: International Conference on Applied & Theoretical Computing & Communication Technology. IEEE (2017)
Liang, J., Shi, Z.: The information entropy, rough entropy and knowledge granulation in rough set theory. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 12(01), 37–46 (2008)
Acknowledgements
This work was supported by the Hainan Provincial Natural Science Foundation of China [2018CXTD333, 617048]; National Natural Science Foundation of China [61762033, 61702539]; Hainan University Doctor Start Fund Project [kyqd1328]; Hainan University Youth Fund Project [qnjj1444]; Social Development Project of Public Welfare Technology Application of Zhejiang Province [LGF18F020019]; Ministry of Education Humanities and Social Sciences Research Planning Fund Project (19YJA710010).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tang, X., Chen, M., Cheng, J., Xu, J., Li, H. (2019). A Security Situation Assessment Method Based on Neural Network. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_52
Download citation
DOI: https://doi.org/10.1007/978-3-030-37352-8_52
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37351-1
Online ISBN: 978-3-030-37352-8
eBook Packages: Computer ScienceComputer Science (R0)