Network Security Situation Assessment Based on Improved WOA-SVM

被引:7
作者
Zhang, Ran [1 ]
Liu, Min [1 ]
Pan, Zhihan [1 ]
Yin, Yifeng [1 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Comp & Commun Engn, Zhengzhou 450001, Henan, Peoples R China
关键词
Network security situation assessment; support vector machine; whale optimization algorithm; adaptive weight; simulated annealing algorithm; WHALE OPTIMIZATION;
D O I
10.1109/ACCESS.2022.3204663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security situation assessment is an important means of understanding the current network security situation to provide a basis for taking security measures. To address the problem that the accuracy of existing network security situation assessment methods needs to be improved, this paper proposes a network security situation assessment method based on support vector machine (SVM) optimized by whale optimization algorithm (WOA) that is improved by adaptive weight (AW) combined with simulated annealing algorithm (SA). In this method, the SVM is embedded into the fitness function calculation of the improved WOA, and the global optimization characteristics of WOA are used to determine the optimal penalty parameter c and kernel function parameter g of the SVM. To solve the problem of the WOA being prone to falling into local extremum and slow convergence when solving large and complex data problems, an adaptive weight is used to adjust the whale position update coefficient, and a simulated annealing algorithm (SA) is used to increase random search factors to avoid falling into local extremum, so as to improve the global optimization ability. The experimental results show that this method is feasible, can assess the network security situation more accurately, and has better convergence than other assessment algorithms based on an improved SVM.
引用
收藏
页码:96273 / 96283
页数:11
相关论文
共 24 条
[1]  
Bass T., 1999, MAGAZINE USENIX SAGE, V24, P40
[2]  
Chen Y., 2018, PROC INT C COMPUT CO, V2, P161
[3]  
[褚鼎立 Chu Dingli], 2019, [电子学报, Acta Electronica Sinica], V47, P992
[4]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[5]  
Cui M., 2019, COMPUT SIMUL, V11, P284
[6]   An overview on semi-supervised support vector machine [J].
Ding, Shifei ;
Zhu, Zhibin ;
Zhang, Xiekai .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (05) :969-978
[7]  
Endsley M. R., 1988, Proceedings of the IEEE 1988 National Aerospace and Electronics Conference: NAECON 1988 (Cat. No.88CH2596-5), P789, DOI 10.1109/NAECON.1988.195097
[8]  
Gong Jian, 2017, Journal of Software, V28, P1010, DOI 10.13328/j.cnki.jos.005142
[9]  
Huang M, 2019, PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), P6, DOI [10.1109/iccsnt47585.2019.8962426, 10.1109/ICCSNT47585.2019.8962426]
[10]   Network Security Situation Assessment Method Based on Markov Game Model [J].
Li, Xi ;
Lu, Yu ;
Liu, Sen ;
Nie, Wei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (05) :2414-2428