Recognition of Network Security Situation Elements Based on Depth Stack Encoder and Back Propagation Algorithm
-
摘要: 网络安全态势要素识别的基础是对态势数据集进行有效的特征提取。针对反向传播(BP)神经网络对海量安全态势信息数据学习时过度依赖数据标签的问题,该文提出一种结合深度堆栈编码器和反向传播算法的网络安全态势要素识别方法,通过无监督学习算法逐层训练网络,在此基础上堆叠得到深度堆栈编码器,利用编码器提取数据集特征,实现了网络的无监督训练。仿真实验验证了该方法能有效提升安全态势感知的效能和准确度。Abstract: The basis of the identification of network security situation element is to perform the feature extraction of situation data effectively. Considering the problem that the Back Propagation(BP) neural networks have excessive dependence on data labels when it has a learning of massive security situation information data, a network security situation element identification method is proposed, which combines deep stack encoder and BP algorithm. It trains the network layer by layer through unsupervised learning algorithm. On this basis the deep track encoder by stacking can be obtained. The unsupervised training of the network is realized when using the encoder to extract the characteristic of the data sets. It is verified by simulation experiments that the method can improve the performance and accuracy of situational awareness effectively.
-
表 1 不同样本数量下的BP神经网络和改进型BP神经网络识别率结果
样本数量 识别率 BP 改进BP 1000 0.893 0.940 3000 0.919 0.954 5000 0.924 0.953 7000 0.892 0.954 9000 0.960 0.972 11000 0.957 0.970 13000 0.901 0.987 15000 0.952 0.982 17000 0.963 0.965 19000 0.959 0.986 21000 0.964 0.972 23000 0.966 0.980 25000 0.958 0.989 27000 0.959 0.979 29000 0.965 0.984 31000 0.965 0.988 33000 0.961 0.988 35000 0.972 0.978 37000 0.972 0.992 40000 0.975 0.993 表 2 不同标签占比下的BP神经网络和改进型BP神经网络识别率结果
训练集中标签占比(%) 识别率(DARPA1999) 识别率(ISCX 2012) BP 改进BP BP 改进BP 10 0.899 0.951 0.854 0.926 30 0.925 0.959 0.862 0.934 50 0.936 0.965 0.877 0.936 70 0.939 0.967 0.879 0.944 90 0.942 0.971 0.892 0.949 100 0.951 0.973 0.905 0.952 -
国家计算机网络应急技术处理协调中心. 2017年我国互联网网络安全态势综述[EB/OL]. http://www.cert.org.cn/publish/main/upload/File/situation.pdf, 2018.National Internet Emergency Center. Summary of China’s Internet security situation in 2018[EB/OL]. http://www.cert.org.cn/publish/main/upload/File/situation.pdf, 2018. SRIHARI R K. Situation awareness through concept-based information extraction[EB/OL]. http://www.dawnbreaker.com/vas05, 2015. ZHANG Songmei, YAO Shan, YE Xin'en, et al. A network security situation analysis framework based on information fusion[C]. The 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, Chongqing, China, 2011: 326-332. doi: 10.1109/ITAIC.2011.6030216. 韦勇, 连一峰, 冯登国. 基于信息融合的网络安全态势评估模型[J]. 计算机研究与发展, 2009, 46(3): 353–362.WEI Yong, LIAN Yifeng, and FENG Dengguo. A network security situational awareness model based on information fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353–362. 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17(4): 885–897.CHEN Xiuzhen, ZHENG Qinghua, GUAN Xiaohong, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4): 885–897. LIU Zhiming, LI Sheng, HE Jin, et al. Complex network security analysis based on attack graph model[C]. The 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, 2012: 183–186. doi: 10.1109/IMCCC.2012.50. HINTON G E, OSINDERO S, and TEH Y W. A fast learning algorithm for deep belief nets[J]. Neural Computation, 2006, 18(7): 1527–1554. doi: 10.1162/neco.2006.18.7.1527 ERHAN D, BENGIO Y, COURVILLE A, et al. Why does unsupervised pre-training help deep learning?[J]. The Journal of Machine Learning Research, 2010, 11: 625–660. BENGIO Y. Learning deep architectures for AI[J]. Foundations and Trends in Machine Learning, 2009, 2(1): 1–127. doi: 10.1561/2200000006 VINCENT P, LAROCHELLE H, LAJOIE I, et al. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion[J]. The Journal of Machine Learning Research, 2010, 11: 3371–3408. RIFAI S, VINCENT P, MULLER X, et al. Contractive auto-encoders: Explicit invariance during feature extraction[C]. The 28th International Conference on Machine Learning, New York, USA, 2011: 122-132. EVANS R and GREFENSTETTE E. Learning explanatory rules from noisy data[J]. Journal of Artificial Intelligence Research, 2018, 61: 1–64. doi: 10.1613/jair.5714 BRONSTEIN M M, BRUNA J, LECUN Y, et al. Geometric deep learning: Going beyond Euclidean data[J]. IEEE Signal Processing Magazine, 2017, 34(4): 18–42. doi: 10.1109/MSP.2017.2693418 LIPPMANN R, HAINES J W, FRIED D J, et al. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks, 2000, 34(4): 579–595. doi: 10.1016/S1389-1286(00)00139-0 SHIRAVI A, SHIRAVI H, TAVALLAEE M, et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J]. Computers& Security, 2012, 31(3): 357–374. doi: 10.1016/j.cose.2011.12.012 KONIDARIS G, KAELBLING L P, and LOZANO-PEREZ T. From skills to symbols: Learning symbolic representations for abstract high-level planning[J]. Journal of Artificial Intelligence Research, 2018, 61: 215–289. doi: 10.1613/jair.5575 期刊类型引用(19)
1. 孙顺远,魏志涛. 基于二次移动平均法估计背景光照的二值化方法. 计算机与数字工程. 2024(06): 1830-1836 . 百度学术
2. 赵孔卫,徐广标. 基于像素分析的针织面料卷边性评价研究. 针织工业. 2024(10): 11-14 . 百度学术
3. 卢晓波,徐海,朱俊召,张宇,谭健,高冠男,胡军华,林龙. 基于机器视觉的加热卷烟烟支端部质量检测系统设计. 轻工学报. 2024(06): 101-107+115 . 百度学术
4. 韩海豹,化荣,张虎,陈杰. 量产活禽(肉鸡)智能化运输装备控制系统的设计. 农业技术与装备. 2023(01): 20-22 . 百度学术
5. 支亚京,汤宁,吴兴洋,汪华,胡兴炜,张军. 基于支持向量机的气温自记纸图像数字化. 计算机技术与发展. 2023(10): 216-220 . 百度学术
6. 魏兴凯,蒋峥,傅呈勋,刘斌. 基于光照影响因子的动态Niblack算法研究及应用. 计算机工程与设计. 2022(04): 1066-1073 . 百度学术
7. 徐浩,章明希. 高精密齿轮小缺陷的智能视觉测量. 兵器材料科学与工程. 2021(01): 83-87 . 百度学术
8. 贺欢,吐尔洪江·阿布都克力木,何笑. 一种基于MALLAT算法的图像去雾方法. 新疆师范大学学报(自然科学版). 2020(01): 23-27 . 百度学术
9. 赵琛,张血琴,刘凯,郭裕钧. 基于正则化的多光谱图像二值化处理. 计算机仿真. 2020(04): 436-440 . 百度学术
10. 杜炤鑫,谢海宁,宋杰,周德生,邹晓峰,陈冉,曾平. 基于图像处理和深度学习的配网跳闸故障识别方法. 中国科学技术大学学报. 2020(01): 39-48 . 百度学术
11. 蒋鹏程,熊礼治,韩啸. 一种基于内容保护与优化识别的二维码方案. 软件导刊. 2019(02): 119-122 . 百度学术
12. 安建尧,李金新,孙双平. 基于Prewitt算子的红外图像边缘检测改进算法. 杭州电子科技大学学报(自然科学版). 2018(05): 18-23+39 . 百度学术
13. 陈志伟,徐世许,刘云鹏,曾祥晓. 基于视觉筛选的并联机器人平面抓取系统设计. 制造业自动化. 2018(05): 44-47 . 百度学术
14. 熊炜,徐晶晶,赵诗云,王改华,刘敏,赵楠,刘聪. 基于支持向量机的低质量文档图像二值化. 计算机应用与软件. 2018(02): 218-223+241 . 百度学术
15. 李昌利,周晓晓,张振,樊棠怀. Retinex模型下基于融合策略的雾霾图像增强. 工程科学与技术. 2018(05): 202-208 . 百度学术
16. 于晓,闫振雷,周子杰. 指纹识别网页登录器设计. 实验室研究与探索. 2018(10): 85-88+128 . 百度学术
17. 宋巧君,张东. 基于双边滤波和Black-hat变换的OSTU裂缝分割算法. 信息技术. 2017(12): 90-92 . 百度学术
18. 谢芳娟,曾萍萍,谭菊华. 低分辨率灰度图像传输真实度优化仿真研究. 计算机仿真. 2017(12): 183-186 . 百度学术
19. 田敬波. 基于模板算子边缘检测的图像二值化算法. 信息技术与信息化. 2017(09): 98-101 . 百度学术
其他类型引用(33)
-