Skip to main content

Advertisement

Log in

WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The accurate and real-time prediction of network security situation is the premise and basis of preventing intrusions and attacks in a large-scale network. In order to predict the security situation more accurately, a quantitative prediction method of network security situation based on Wavelet Neural Network with Genetic Algorithm (GAWNN) is proposed. After analyzing the past and the current network security situation in detail, we build a network security situation prediction model based on wavelet neural network that is optimized by the improved genetic algorithm and then adopt GAWNN to predict the non-linear time series of network security situation. Simulation experiments prove that the proposed method has advantages over Wavelet Neural Network (WNN) method and Back Propagation Neural Network (BPNN) method with the same architecture in convergence speed, functional approximation and prediction accuracy. What is more, system security tendency and laws by which security analyzers and administrators can adjust security policies in near real-time are revealed from the prediction results as early as possible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Feng D G, Wang X Y. Progress and prospect of some fundamental research on information security in China. Journal of Computer Science and Technology, 2006, 21(5): 740–755.

    Article  MathSciNet  Google Scholar 

  2. Wang H Q, Lai J B, Zhu L et al. Survey of network situation awareness system. Computer Science, 2006, 33(10): 5–10.

    Google Scholar 

  3. Bao X H, Dai Y X, FENG P H et al. A detection and forecast algorithm for multi-step attack based on intrusion intention. Journal of Software, 2005, 16(12): 2132–2138.

    Article  MATH  Google Scholar 

  4. Wang L Y, Liu A Y, Jajodia Sushil. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications, 2006, 29(15): 2917–2933.

    Article  Google Scholar 

  5. Zhang G L, Sun J Z. A novel network intrusion attempts prediction model based on fuzzy neural network. In Proc. International Conference on Computational Science, Berkshire, UK, May 28–31, 2006, pp.419–426.

  6. Zhou B, Shi A G, Cai F et al. Wavelet neural networks for nonlinear time series analysis. In Proc. International Symposium on Neural Networks, Dalian, China, August 19–21, 2004, pp.430–435.

  7. CMU/CERT. Network situational awareness (NetSA). 2006. http://www.cert.org/netsa/.

  8. National Center for Advanced Secure Systems Research. Security Incident Fusion Tools (SIFT) Research Project. 2006. http://www.projects.nca-ssr.org/sift/.

  9. Advanced Research and Development Activity (ARDA). Exploratory Program Call for Proposals 2006, USA, 2007.

  10. Bass T. Intrusion detection systems and multi-sensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99–105.

    Article  Google Scholar 

  11. Chen X Z, Zheng Q H, Guan X H et al. Quantitative hierarchical threat evaluation model for network security. Journal of Software, 2006, 17(4): 885–897.

    Article  MATH  Google Scholar 

  12. Yin X X, William Yurcik, Adam Slagell. The design of VisFlowConnect-IP: A link analysis system for IP security situational awareness. In Proc. third IEEE International Workshop on Information Assurance (IWIA), Washington, USA, March, 2005, pp.141–153.

  13. Zhang Q H. Benveniste A. Wavelet networks. IEEE Trans. Neural Networks, 1992, 3(6): 889–898.

    Article  Google Scholar 

  14. Szu H H, Telfer B, Kadambe B. Neural network adaptive wavelets for signal representation and classification. Optical Engineering, 1992, 31(A): 1906–1907.

    Google Scholar 

  15. Zhang Q. Using on wavelet network in nonparametic estimation. IEEE Trans. Neural Network, 1997, 8(2): 227–236.

    Article  Google Scholar 

  16. Wang X P, Cao L M. Theory, Application and Software Realization of Genetic Algorithm. Xi’an: Xi’an Jiaotong University Press, 2002, pp.43–150.

  17. Project H. Know your enemy: Statistics. 2006. http://www.honeynet.org/papers/staus/.

  18. Yegneswaran V, Barford P, Paxson V. Using Honeynets for Internet situational awareness, 2006, http://www.cs.wisc.edu/∼pb/hotnet-s05_final.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ji-Bao Lai.

Additional information

Supported by the National High Technology Development 863 Program of China under Grant No. 2007AA01Z401, the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No. 20050217007, and the National Defense Advanced Foundation under Grant No. 513150602.

Electronic Supplementary Material

Below is the link to the electronic supplementary material.

(PDF 80.1 kb)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lai, JB., Wang, HQ., Liu, XW. et al. WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization. J. Comput. Sci. Technol. 23, 222–230 (2008). https://doi.org/10.1007/s11390-008-9124-0

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-008-9124-0

Keywords

Navigation