Network Security Situation Prediction Model Based on VMD Decomposition and DWOA Optimized BiGRU-ATTN Neural Network

被引:4
作者
Zhang, Shengcai [1 ]
Fu, Qiming [1 ]
An, Dezhi [1 ]
机构
[1] Gansu Univ Polit Sci & Law, Sch Cyber Secur, Lanzhou 730070, Peoples R China
关键词
Network security; Predictive models; Security; Time series analysis; Data models; Prediction algorithms; Internet of Things; Bidirectional control; Whale optimization algorithms; Attention mechanism; bi-directional gated recurrent unit; dynamic whale optimization algorithm; network security situation prediction; variational mode decomposition;
D O I
10.1109/ACCESS.2023.3333666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of Internet-of-Things (IoT) devices has resulted in a comprehensive transformation of human life. However, the network security challenges posed by the IoT devices have become increasingly severe, necessitating the implementation of effective security mechanisms. Network security situational awareness enables an effective network state prediction for better formulation of network security defense strategies. Existing network security situational prediction methods are typically constrained by situational sequence data, especially those sequences with a high degree of non-stationarity, leading to unstable predictions and low performance. Moreover, in real-world application scenarios, the network security situational sequences are often highly non-stationary. To address these challenges, we introduce a novel hybrid prediction model named Variational Mode Decomposition (VMD) - Dynamic Whale Optimization Algorithm (DWOA) - Bidirectional Gated Recurrent Unit (BiGRU) - Attention Mechanism (ATTN). The proposed model integrates VMD, BiGRU, ATTN, and DWOA. Initially, network security situational awareness sequences are processed using VMD to decompose them into a series of subsequences, thus reducing the non-stationarity of the original sequences. Subsequently, an enhanced DWOA optimization algorithm is introduced for tuning the hyperparameters of the BiGRU-ATTN network. Ultimately, BiGRU-ATTN is employed to predict each of these subsequences, which are then aggregated to yield the final network security situational prediction value. When compared with several existing methods on public network security datasets, the proposed VMD-DWOA-BiGRU-ATTN method demonstrated an improvement in the R<^>2 values ranging from 6.34% to 52.61%. These results substantiate that the model significantly enhances predictive performance.
引用
收藏
页码:129507 / 129535
页数:29
相关论文
共 65 条
  • [2] Adya M, 1998, J FORECASTING, V17, P481, DOI 10.1002/(SICI)1099-131X(1998090)17:5/6<481::AID-FOR709>3.3.CO
  • [3] 2-H
  • [4] Modified whale optimization algorithm for solving unrelated parallel machine scheduling problems
    Al-qaness, Mohammed A. A.
    Ewees, Ahmed A.
    Abd Elaziz, Mohamed
    [J]. SOFT COMPUTING, 2021, 25 (14) : 9545 - 9557
  • [5] A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights
    Alavizadeh, Hooman
    Jang-Jaccard, Julian
    Enoch, Simon Yusuf
    Al-Sahaf, Harith
    Welch, Ian
    Camtepe, Seyit A.
    Kim, Dan Dongseong
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (05)
  • [6] Optimizing connection weights in neural networks using the whale optimization algorithm
    Aljarah, Ibrahim
    Faris, Hossam
    Mirjalili, Seyedali
    [J]. SOFT COMPUTING, 2018, 22 (01) : 1 - 15
  • [7] Review of deep learning: concepts, CNN architectures, challenges, applications, future directions
    Alzubaidi, Laith
    Zhang, Jinglan
    Humaidi, Amjad J.
    Al-Dujaili, Ayad
    Duan, Ye
    Al-Shamma, Omran
    Santamaria, J.
    Fadhel, Mohammed A.
    Al-Amidie, Muthana
    Farhan, Laith
    [J]. JOURNAL OF BIG DATA, 2021, 8 (01)
  • [8] An efficient multilevel color image thresholding based on modified whale optimization algorithm
    Anitha, J.
    Pandian, S. Immanuel Alex
    Agnes, S. Akila
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 178 (178)
  • [9] Clustering based on whale optimization algorithm for IoT over wireless nodes
    Bozorgi, Seyed Mostafa
    Hajiabadi, Mahdi Rohani
    Hosseinabadi, Ali Asghar Rahmani
    Sangaiah, Arun Kumar
    [J]. SOFT COMPUTING, 2021, 25 (07) : 5663 - 5682
  • [10] Cyber risk and cybersecurity: a systematic review of data availability
    Cremer, Frank
    Sheehan, Barry
    Fortmann, Michael
    Kia, Arash N.
    Mullins, Martin
    Murphy, Finbarr
    Materne, Stefan
    [J]. GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2022, 47 (03) : 698 - 736