Skip to main content

A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

Abstract

The current cybersecurity situation is getting worse. In order to improve the accuracy of network security situation prediction, a network security situation prediction method based on BP neural network optimized by Seeker Optimization Algorithm (SOA) is proposed. The algorithm uses the four behavioral characteristics of SOA: the self-interest, altruism, pre-action and uncertainty reasoning to determine the search strategy, find the best fitness individual, obtain the optimal weight and threshold, and then assign value to the random initial weights and thresholds of BP neural network. After training the neural network, the predicted values are obtained. Finally, it is compared with the predicted values obtained by other two optimization algorithms. The experimental results show that this prediction algorithm has higher accuracy, smaller error and better stability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tim, B.: Multi-sensor data fusion for next generation distributed intrusion detection sytem. In: Proceedings of 1999 IRIS National Symposium on Senor and Data Fusion, pp. 1–6. The Johns Hopkins University (1999)

    Google Scholar 

  2. Fava, D.S., Byers, S.R., Yang, S.J.: Projecting cyberattacks through variable-length markov models. IEEE Trans. Inf. Forensics Secur. 3(3), 359–369 (2008)

    Article  Google Scholar 

  3. Fachkha, C., Bou-Harb, E., Debbabi, M.: Towards a forecasting model for distributed denial of service activities. In: Proceedings of the 12th IEEE International Symposium on Network Computing and Applications, pp. 110–117. IEEE, Cambridge (2013)

    Google Scholar 

  4. Thonnard, O., Dacier, M.: Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology. In: Proceedings of the International Conference on Data Mining Workshops, 154–163. IEEE, Pisa (2008)

    Google Scholar 

  5. Ramaki, A.A., Khosravi-Farmad, M., Bafghi, A.G.: Real time alert correlation and prediction using Bayesian networks. In: Proceedings of the 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), pp. 98–103. IEEE, Rasht (2015)

    Google Scholar 

  6. Lu, D.: Research on network situation prediction model based on GA-Elman neural network. Zhejiang University (2017)

    Google Scholar 

  7. Chen, W., Zang, Z., Guo, J., Yu, Q., Tong, J.: Security assessment of network space situational awareness system based on improved bp neural network. Comput. Sci. 45(S2), 335–337+341 (2018)

    Google Scholar 

  8. Zhang, R., Zhang, Y., Liu, W., Fan, Y.: A network security situation prediction method based on improved convolutional neural network. Comput. Eng. Appl. 55(06), 86–93 (2019)

    Google Scholar 

  9. Qian, Z., Jiang, J., Yu, H.: BP neural network prediction method based on improved particle swarm optimization algorithm. Electron. Test (20), 39–40+25 (2015)

    Google Scholar 

  10. Zhao, W.: Research on network intrusion detection method based on SOA-SVM. Autom. Instr. (01), 39–42 (2015)

    Google Scholar 

  11. Han, W., Tian, Z., Huang, Z., Zhong, L., Jia, Y.: System architecture and key technologies of network security situation awareness system YHSAS. Comput. Mater. Continua 59(1), 167–180 (2019)

    Article  Google Scholar 

  12. Tang, X., Zheng, Q., Cheng, J., Sheng, V.S., Cao, R., Chen, M.: A DDoS attack situation assessment method via optimized cloud model based on influence function. Comput. Mater. Continua 60(3), 1263–1281 (2019)

    Article  Google Scholar 

  13. Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095–119 (2018)

    Google Scholar 

  14. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(3), 533–536 (1986)

    Article  Google Scholar 

  15. Zhu, D., Shi, H.: Principle and application of artificial neural networks (2006)

    Google Scholar 

  16. Li, C., Liu, X.: An improved PSO-BP neural network and its application to earthquake prediction. In: Proceedings of the Chinese Control and Decision Conference (CCDC), pp. 3434–3438. IEEE, Yinchuan (2016)

    Google Scholar 

  17. Ding, S., Su, C.: Application of optimizing BP neural networks algorithm based on genetic algorithm. In: Proceedings of the 29th Chinese Control Conference, pp. 2425–2428. IEEE, Beijing (2010)

    Google Scholar 

  18. Dai, C., Zhu, Y., Chen, W.: Seeker optimization algorithm. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 167–176. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74377-4_18

    Chapter  Google Scholar 

Download references

Acknowledgements

This paper is sponsored by key foundation of Science and Technology Development of Henan Province (No. 142102210081) and National Natural Science Foundation of China (No. 61772477).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ran Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, R., Liu, M., Zhang, Q., Cai, Z. (2020). A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics