Skip to main content
Erschienen in: Neural Computing and Applications 36/2023

08.04.2023 | S.I.: Evolutionary Computation based Methods and Applications for Data Processing

Exploration of a network security situational awareness model based on multisource data fusion

verfasst von: Xingguo Li, Yu Zhong

Erschienen in: Neural Computing and Applications | Ausgabe 36/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the continuous expansion of the network scale, network technology is also constantly developing. However, with the continuous deterioration of the security environment, the problem of network safety is improving. The traditional single security method has greatly improved the network’s stability, but due to the lack of effective cooperation, it becomes increasingly difficult to understand the state changes of the entire network at all times. In such a large environment, research on network security situational awareness can obtain theoretical value and has certain application prospects. The current understanding of cybersecurity situational awareness is not deep enough. Most cases are built in a single-source environment and cannot accurately reflect the perception of attack phases and sequences. To solve this problem, a new model of network safety situation awareness based on multisource data fusion was proposed. The model can effectively perceive the attack stages and sequences and provide an early warning, which is of great importance to improve the network security situation awareness and maintain the network security environment. On the basis of extracting the degree of dissimilarity, in this paper, the fusion-based method is used to generate the attack trajectory, thus forming the multisource data fusion and reconstruction algorithm and finally forming the network security situational awareness model. Compared with the single-source data fusion and reconstruction algorithm, this method has better performance. The final result shows that when the original number of alarms was 1237, after multisource data fusion, the number of alarms was reduced to 124. Moreover, on the basis of multisource data fusion, the detection rate of the number of alarms reached 86.67%, which was 26.67% higher than that of single-source data fusion; the false alarm rate was 5.63%, which was 1.19% lower than that of single-source data fusion. In addition, when using the trajectory reconstruction method to reconstruct the trajectory, the accuracy of the multisource data fusion algorithm was also 1.18% higher than that of the single source, and the completeness also increased by 2.53% compared with the single source. Therefore, the proposed algorithm has higher efficiency, and it is helpful to establish and study the network safety situation consciousness model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kou G, Wang S, Tang G (2019) Research on key technologies of network security situational awareness for attack tracking prediction. Chin J Electron 28(01):166–175CrossRef Kou G, Wang S, Tang G (2019) Research on key technologies of network security situational awareness for attack tracking prediction. Chin J Electron 28(01):166–175CrossRef
2.
Zurück zum Zitat Zhang J, Jia Y, Zhu D, Hu W, Tang Z (2019) Study on the situational awareness system of mine fire rescue using faster ross girshick-convolutional neural network. IEEE Intell Syst 35(1):54–61CrossRef Zhang J, Jia Y, Zhu D, Hu W, Tang Z (2019) Study on the situational awareness system of mine fire rescue using faster ross girshick-convolutional neural network. IEEE Intell Syst 35(1):54–61CrossRef
3.
Zurück zum Zitat Husak M, Komarkova J, Bou-Harb E, Celeda P (2019) Survey of attack projection, prediction, and forecasting in cyber security. Commun Surv Tutor IEEE 21(1):640–660CrossRef Husak M, Komarkova J, Bou-Harb E, Celeda P (2019) Survey of attack projection, prediction, and forecasting in cyber security. Commun Surv Tutor IEEE 21(1):640–660CrossRef
4.
Zurück zum Zitat Mahendiran A, Appusamy R (2018) An intrusion detection system for network security situational awareness using conditional random fields. Int J Intell Eng Syst 11(3):196–204 Mahendiran A, Appusamy R (2018) An intrusion detection system for network security situational awareness using conditional random fields. Int J Intell Eng Syst 11(3):196–204
5.
Zurück zum Zitat Huang C, Wang C (2018) Network security situation awareness based on the optimized dynamic wavelet neural network. Int J Netw Secur 20(3):593–600 Huang C, Wang C (2018) Network security situation awareness based on the optimized dynamic wavelet neural network. Int J Netw Secur 20(3):593–600
6.
Zurück zum Zitat Rosa FD, Jousselme AL, Gloria AD (2018) A reliability game for source factors and situational awareness experimentation. Int J Serious Games 5(2):45–64CrossRef Rosa FD, Jousselme AL, Gloria AD (2018) A reliability game for source factors and situational awareness experimentation. Int J Serious Games 5(2):45–64CrossRef
7.
Zurück zum Zitat Alnusair A, Zhong C, Rawashdeh M, Hossain MS, Alamri A (2017) Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multimed Tools Appl 76(21):1–21CrossRef Alnusair A, Zhong C, Rawashdeh M, Hossain MS, Alamri A (2017) Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multimed Tools Appl 76(21):1–21CrossRef
8.
Zurück zum Zitat Yu G (2020) Research on computer network information security based on improved machine learning. J Intell Fuzzy Syst 40(3):1–12 Yu G (2020) Research on computer network information security based on improved machine learning. J Intell Fuzzy Syst 40(3):1–12
9.
Zurück zum Zitat Xi R, Yun X, Hao Z (2019) Framework for risk assessment in cyber situational awareness. IET Inf Secur 13(2):149–156CrossRef Xi R, Yun X, Hao Z (2019) Framework for risk assessment in cyber situational awareness. IET Inf Secur 13(2):149–156CrossRef
10.
Zurück zum Zitat Mallik V, Jah MK (2019) Reconciling space object observed and solar pressure albedo-areas via astrometric and photometric data fusion. Adv Space Res 63(1):404–416CrossRef Mallik V, Jah MK (2019) Reconciling space object observed and solar pressure albedo-areas via astrometric and photometric data fusion. Adv Space Res 63(1):404–416CrossRef
11.
Zurück zum Zitat Gorham CL (2020) Developing enterprise cyber situational awareness. Int J Manag Inf Technol 12(3):1–8 Gorham CL (2020) Developing enterprise cyber situational awareness. Int J Manag Inf Technol 12(3):1–8
12.
Zurück zum Zitat Zhang B (2017) Chaotic time series prediction based on the fusion of multi-source collaborative data feature constraints. Acta Technica CSAV (Ceskoslovensk Akademie Ved) 62(1):325–336 Zhang B (2017) Chaotic time series prediction based on the fusion of multi-source collaborative data feature constraints. Acta Technica CSAV (Ceskoslovensk Akademie Ved) 62(1):325–336
13.
Zurück zum Zitat Kodituwakku H, Keller A, Gregor J (2020) InSight2: a modular visual analysis platform for network situational awareness in large-scale networks. Electronics 9(10):1747–1747CrossRef Kodituwakku H, Keller A, Gregor J (2020) InSight2: a modular visual analysis platform for network situational awareness in large-scale networks. Electronics 9(10):1747–1747CrossRef
14.
Zurück zum Zitat Nikoloudakis Y, Kefaloukos I, Klados S, Panagiotakis S, Markakis EK (2021) Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation. Sensors 21(14):4939–4939CrossRef Nikoloudakis Y, Kefaloukos I, Klados S, Panagiotakis S, Markakis EK (2021) Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation. Sensors 21(14):4939–4939CrossRef
15.
Zurück zum Zitat Almeida RB, Junes VC, Machado R (2019) A distributed event-driven architectural model based on situational awareness applied on internet of things. Inf Softw Technol 111:144–158CrossRef Almeida RB, Junes VC, Machado R (2019) A distributed event-driven architectural model based on situational awareness applied on internet of things. Inf Softw Technol 111:144–158CrossRef
16.
Zurück zum Zitat Sivaraman K, Arumugam P (2018) CA comparative study of different network security aspects with NSSA. Int J Pure Appl Math 119(12):9601–9608 Sivaraman K, Arumugam P (2018) CA comparative study of different network security aspects with NSSA. Int J Pure Appl Math 119(12):9601–9608
17.
Zurück zum Zitat Park M, Han J, Oh H (2019) Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wirel Commun Mob Comput 2019(4):1–14 Park M, Han J, Oh H (2019) Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wirel Commun Mob Comput 2019(4):1–14
18.
Zurück zum Zitat Peterman K (2018) BATTLESPACE Businessman of the Year 2018. Battlespace C4ISTAR Technologies 21(3):8–9 Peterman K (2018) BATTLESPACE Businessman of the Year 2018. Battlespace C4ISTAR Technologies 21(3):8–9
19.
Zurück zum Zitat Ukwandu E, Farah M, Hindy H (2020) A review of cyber-ranges and test-beds: current and future trends. Sensors 20(24):7148–7148CrossRef Ukwandu E, Farah M, Hindy H (2020) A review of cyber-ranges and test-beds: current and future trends. Sensors 20(24):7148–7148CrossRef
20.
Zurück zum Zitat Varga S, Brynielsson J, Franke U (2021) Cyber-threat perception and risk management in the Swedish financial sector. Comput Secur 105(1):102239–102239CrossRef Varga S, Brynielsson J, Franke U (2021) Cyber-threat perception and risk management in the Swedish financial sector. Comput Secur 105(1):102239–102239CrossRef
Metadaten
Titel
Exploration of a network security situational awareness model based on multisource data fusion
verfasst von
Xingguo Li
Yu Zhong
Publikationsdatum
08.04.2023
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 36/2023
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-023-08500-5

Weitere Artikel der Ausgabe 36/2023

Neural Computing and Applications 36/2023 Zur Ausgabe

S.I.: Evolutionary Computation based Methods and Applications for Data Processing

Dynamic response prediction of underwater explosive vessel based on LOO-XGBoost model

S.I.: Evolutionary Computation based Methods and Applications for Data Processing

X-ray PCB defect automatic diagnosis algorithm based on deep learning and artificial intelligence

S.I. : Evolutionary Computation based Methods and Applications for Data Processing

Modeling the gaze point distribution to assist eye-based target selection in head-mounted displays

S.I.: Evolutionary Computation based Methods and Applications for Data Processing

Enterprise innovation evaluation method based on swarm optimization algorithm and artificial neural network

Premium Partner