Skip to main content
Erschienen in: Cluster Computing 3/2019

26.11.2017

Research on classification and recognition of attacking factors based on radial basis function neural network

verfasst von: Huan Wang, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui

Erschienen in: Cluster Computing | Sonderheft 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to identify the network attack elements better, and solve the nonlinear data multi-classification problem of the network attack elements, this paper presents a classification model and training method based on radial basis neural network. The model uses the training sample error to construct the cost function to solve the minimum value of the cost function and improve the classification accuracy. In the training process of the model, the K-mean algorithm is improved by constructing the average difference between the samples, the number of the hidden layer nodes and the initial value of the basis function center are determined, and the influence of the hidden layer structure on the classification accuracy is reduced. The learning rate in the gradient algorithm is optimized by Q learning method, and the interference of the learning rate to the training of the network parameters is reduced. The OLS algorithm is used to adjust the weights of the hidden layer to the output layer to improve the accuracy of the model classification output. The simulation results show that the model can solve the nonlinear classification problem of network attack well, and the average accuracy rate is improved by about 9% compared with the existing classification methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Billings, S.A., Wei, H.L., Balikhin, M.A.: Generalized multi scale radial basis function networks. Neural Netw. 20, 1081–1094 (2007)CrossRef Billings, S.A., Wei, H.L., Balikhin, M.A.: Generalized multi scale radial basis function networks. Neural Netw. 20, 1081–1094 (2007)CrossRef
2.
Zurück zum Zitat Bradley, P.S.: Mangasarian, L.K-plane clustering. J. Glob. Optim. 16(1), 23–37 (2000)CrossRef Bradley, P.S.: Mangasarian, L.K-plane clustering. J. Glob. Optim. 16(1), 23–37 (2000)CrossRef
3.
Zurück zum Zitat Zhu, L., Chung, F.L., Wang, S.: Generalized fuzzy c-means clustering algorithm with improved fuzzy partitions[J]. IEEE Trans. Syst. Man Cybernet.-Part B 39(3), 578–591 (2009)CrossRef Zhu, L., Chung, F.L., Wang, S.: Generalized fuzzy c-means clustering algorithm with improved fuzzy partitions[J]. IEEE Trans. Syst. Man Cybernet.-Part B 39(3), 578–591 (2009)CrossRef
4.
Zurück zum Zitat Xiu, Y., Wang, S., Wu, X., et al.: The directional similarity-based clustering method DSCM[J]. J. Comput. Res. Dev. 43(8), 1425–1431 (2006)CrossRef Xiu, Y., Wang, S., Wu, X., et al.: The directional similarity-based clustering method DSCM[J]. J. Comput. Res. Dev. 43(8), 1425–1431 (2006)CrossRef
5.
Zurück zum Zitat Jinna, L., Bai, Y.P.: Research and simulation on RBFNN optimized by particle swarm algorithm. Appl. Mech. Mater. 303, 1431–1434 (2013) Jinna, L., Bai, Y.P.: Research and simulation on RBFNN optimized by particle swarm algorithm. Appl. Mech. Mater. 303, 1431–1434 (2013)
6.
Zurück zum Zitat Flyer, N., Lehto, E., Blaise, S., Wright, G.B., St-Cyr, A.: A guide to RBF-generated finite differences for nonlinear transport: shallow water simulations on a sphere. Lam. J. Comput. Phys. 231, 4078–4095 (2012)MathSciNetCrossRef Flyer, N., Lehto, E., Blaise, S., Wright, G.B., St-Cyr, A.: A guide to RBF-generated finite differences for nonlinear transport: shallow water simulations on a sphere. Lam. J. Comput. Phys. 231, 4078–4095 (2012)MathSciNetCrossRef
7.
Zurück zum Zitat Sun, D., Wan, L.M., Sun, Y.F., Liang, Y.C.: An improved hybrid learning algorithm for RBF neural network. J. Jilin Univ. (Sci. Ed.) 48(5), 817-–822 (2010)MATH Sun, D., Wan, L.M., Sun, Y.F., Liang, Y.C.: An improved hybrid learning algorithm for RBF neural network. J. Jilin Univ. (Sci. Ed.) 48(5), 817-–822 (2010)MATH
8.
Zurück zum Zitat Ding, J.C., Zhang, J., Huang, W.Q., Chen, S.: Laser gyro temperature compensation using modified RBFNN. Sensors 14, 18711–18727 (2014)CrossRef Ding, J.C., Zhang, J., Huang, W.Q., Chen, S.: Laser gyro temperature compensation using modified RBFNN. Sensors 14, 18711–18727 (2014)CrossRef
9.
Zurück zum Zitat Yan, G.H., Lee, R., Kent A., et al.: Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In: CCS’12 Proceedings of the 2012 ACM Conference on Computer and Communications Security. USA:ACM, pp. 553–566 (2012) Yan, G.H., Lee, R., Kent A., et al.: Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In: CCS’12 Proceedings of the 2012 ACM Conference on Computer and Communications Security. USA:ACM, pp. 553–566 (2012)
10.
Zurück zum Zitat Hu, G.Y., Qiao, P.L.: An efficient improvement of CMA-ES algorithm for the network security situation prediction. Open Autom. Control Syst. J. 7(1), 1499–1517 (2015)CrossRef Hu, G.Y., Qiao, P.L.: An efficient improvement of CMA-ES algorithm for the network security situation prediction. Open Autom. Control Syst. J. 7(1), 1499–1517 (2015)CrossRef
11.
Zurück zum Zitat Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. J. Inf. Comput. Sec. 6(1), 63–92 (2014) Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. J. Inf. Comput. Sec. 6(1), 63–92 (2014)
12.
Zurück zum Zitat Salah, S., Maciá-Fernández, G., Díaz-Verdejo, J.E.A.: A model-based survey of alert correlation techniques. Comput. Netw. 57(5), 1289–1317 (2013)CrossRef Salah, S., Maciá-Fernández, G., Díaz-Verdejo, J.E.A.: A model-based survey of alert correlation techniques. Comput. Netw. 57(5), 1289–1317 (2013)CrossRef
13.
Zurück zum Zitat Bateni, M., Baraani, A., Ghorbani, A.A.: Using artificial immune system and fuzzy logic for alert correlation. J. Netw. Sec. 15, 160–174 (2013) Bateni, M., Baraani, A., Ghorbani, A.A.: Using artificial immune system and fuzzy logic for alert correlation. J. Netw. Sec. 15, 160–174 (2013)
14.
Zurück zum Zitat Wang, C.H., Chiou, Y.C.: Alert correlation system with automatic extraction of attack strategies by using dynamic feature weights. J. Comput. Commun. Eng. 5(1), 1–10 (2016)CrossRef Wang, C.H., Chiou, Y.C.: Alert correlation system with automatic extraction of attack strategies by using dynamic feature weights. J. Comput. Commun. Eng. 5(1), 1–10 (2016)CrossRef
15.
Zurück zum Zitat Han, L.Y., Gao, B., Yang, L.: Study of temperature compensation for laser gyro SINS of land-based missile. Tactical Missile Technol. 4, 81–85 (2013) Han, L.Y., Gao, B., Yang, L.: Study of temperature compensation for laser gyro SINS of land-based missile. Tactical Missile Technol. 4, 81–85 (2013)
16.
Zurück zum Zitat Shen, J., Miao, L.J., Wu, J.W.: Application and compensation for startup phase of FOG based on RBF neural network. Infrared Laser Eng. 42, 119–124 (2013) Shen, J., Miao, L.J., Wu, J.W.: Application and compensation for startup phase of FOG based on RBF neural network. Infrared Laser Eng. 42, 119–124 (2013)
17.
Zurück zum Zitat Endsley, M.R.: Final reflections: Situation awareness models and measure. J. Cognit. Eng. Decis. Mak. 9(1), 101–111 (2015)CrossRef Endsley, M.R.: Final reflections: Situation awareness models and measure. J. Cognit. Eng. Decis. Mak. 9(1), 101–111 (2015)CrossRef
18.
Zurück zum Zitat Lenders, V., Tanner, A., Blarer, A.: Gaining an edge in cyberspace with advanced situational awareness. Sec. Privacy IEEE 13(2), 65–74 (2015)CrossRef Lenders, V., Tanner, A., Blarer, A.: Gaining an edge in cyberspace with advanced situational awareness. Sec. Privacy IEEE 13(2), 65–74 (2015)CrossRef
19.
Zurück zum Zitat Li, M.Q., Tian, J., Chen, F.Z.: Improving multiclass pattern recognition with a co-evolutionary RBFNN. Pattern Recognit. Lett. 4, 392–406 (2008)CrossRef Li, M.Q., Tian, J., Chen, F.Z.: Improving multiclass pattern recognition with a co-evolutionary RBFNN. Pattern Recognit. Lett. 4, 392–406 (2008)CrossRef
20.
Zurück zum Zitat Endsley, M.: Situation awareness misconceptions and misunderstandings. J. Cognit. Eng. Decis. Mak. 9(1), 4–32 (2015)CrossRef Endsley, M.: Situation awareness misconceptions and misunderstandings. J. Cognit. Eng. Decis. Mak. 9(1), 4–32 (2015)CrossRef
21.
Zurück zum Zitat Sedaghatbaf, A., Azgomi, M.A.: Attack modeling and security evaluation based on stochastic activity networks. Sec. Commun. Netw. 7(4), 715–737 (2014)MATH Sedaghatbaf, A., Azgomi, M.A.: Attack modeling and security evaluation based on stochastic activity networks. Sec. Commun. Netw. 7(4), 715–737 (2014)MATH
22.
Zurück zum Zitat Wang, Y.: Research on network security situation prediction based on Markov game theory. Int. J. Sec. Its Appl. 9, 301–308 (2016) Wang, Y.: Research on network security situation prediction based on Markov game theory. Int. J. Sec. Its Appl. 9, 301–308 (2016)
23.
Zurück zum Zitat Chuang, A.S., Wu, F., Varaiya, P.: A game-theoretic model for generation expansion planning: problem formulation and numerical comparisons. IEEE Trans. Power Syst. 4, 885–891 (2001)CrossRef Chuang, A.S., Wu, F., Varaiya, P.: A game-theoretic model for generation expansion planning: problem formulation and numerical comparisons. IEEE Trans. Power Syst. 4, 885–891 (2001)CrossRef
24.
Zurück zum Zitat Wang, Y.Z., Yu, M., Li, J.Y., et al.: Stochastic game net and applications in security analysis for enterprise network. Int. J. Inf. Sec. 11(1), 41–52 (2012)CrossRef Wang, Y.Z., Yu, M., Li, J.Y., et al.: Stochastic game net and applications in security analysis for enterprise network. Int. J. Inf. Sec. 11(1), 41–52 (2012)CrossRef
25.
Zurück zum Zitat Hu, G.Y., Qiao, P.L.: Cloud belief rule base model for network security situation prediction. IEEE Commun. Lett. 20(5), 1–1 (2016)CrossRef Hu, G.Y., Qiao, P.L.: Cloud belief rule base model for network security situation prediction. IEEE Commun. Lett. 20(5), 1–1 (2016)CrossRef
Metadaten
Titel
Research on classification and recognition of attacking factors based on radial basis function neural network
verfasst von
Huan Wang
Jian Gu
Xiaoqiang Di
Dan Liu
Jianping Zhao
Xin Sui
Publikationsdatum
26.11.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 3/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1371-9

Weitere Artikel der Sonderheft 3/2019

Cluster Computing 3/2019 Zur Ausgabe