A Hidden Markov Model-Based Network Security Posture Prediction Model

被引:0
作者
Yang X. [1 ]
机构
[1] School of Electronic Information and Electrical Engineering, Tianshui Normal University, Gansu, Tianshui
关键词
Baum-Welch algorithm; Cybersecurity; Hidden Markov; Posture prediction model; Simulated annealing algorithm;
D O I
10.2478/amns.2023.2.00067
中图分类号
学科分类号
摘要
As a key technology of network security situational awareness, this paper focuses on network security situational prediction technology and proposes a new network security situational prediction model based on Hidden Markov Model. The paper proposes a network security posture prediction method based on the improved Hidden Markov Model for the problem that the Baum-Welch parameter training method of the traditional Hidden Markov Model for posture prediction is sensitive to initial values and easily falls into local optimum. The method obtains the initial parameters by introducing the simulated annealing algorithm and using its excellent probabilistic burst-jump property to find the optimal in the global range. The Baum-Welch algorithm is used to optimize the initial parameters further to obtain the optimal model parameters, and then a more accurate posture prediction model is established. The probability of occurrence of the alarm information sequence corresponding to the network security posture value of 3 at t= 4 is obtained by simulating the network environment for testing, which is 0.000268, 0.000152, 0.000147, 0.000284, and 0.000187. Comparing the generated network security posture values with the real situation, it is found that the predicted results in this paper are highly similar to the real values. It is verified that the improved Hidden Markov method can effectively improve the accuracy of the network security posture prediction model and reflect the network security situation more objectively and realistically. © 2023 Xiaoping Yang, published by Sciendo.
引用
收藏
相关论文
共 20 条
[1]  
Zhan Z., Xu M., Xu S., A Characterization of Cybersecurity Posture from Network Telescope Data, (2016)
[2]  
Beinart M., Navy CIO Looking to Improve Cyber Posture with Tougher Supply Chain Security Standards. Defense Daily, (2019)
[3]  
Smith D.J., Simpson K., Cyber Security, The Safety Critical Systems Handbook (Fifth Edition), pp. 269-283, (2020)
[4]  
Jiang L., Jayatilaka A., Nasim M., Et al., Systematic Literature Review on Cyber Situational Awareness Visualizations, (2021)
[5]  
Barker K., Cyberattack: What Goes Around, Comes Around. SPP Briefing Papers, 12, (2019)
[6]  
Zhang J., Feng H., Liu B., Et al., Research Progress and Future Trend Analysis of Network Security Situational Awareness, (2021)
[7]  
Jianping H.U., Hao H., Qi H.E., Et al., Discussion on the Construction of Cyber Security Situational Awareness Platform in Health Care Industry, Chinese Journal of Health Informatics and Management, (2019)
[8]  
Qian Z.K., Network Security Situation Awareness Framework and Random Forest Assessment Model, Journal of Southwest China Normal University (Natural Science Edition), (2019)
[9]  
Scott R., Changing the industry conversation on cyber security, Naval Architect, (2018)
[10]  
Lenders V., Tanner A., Blarer A., Gaining an edge in cyberspace with advanced situational awareness, IEEE Security & Privacy, 13, 2, (2015)