On Network Security Situation Prediction Based on RBF Neural Network

被引:0
作者
Jiang, Yang [1 ]
Li, Cheng-hai [1 ]
Yu, Li-shan [1 ]
Bao, Bo [1 ]
机构
[1] Air Force Engn Univ, Coll Air & Missile Def, Xian 710051, Shaanxi, Peoples R China
来源
PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017) | 2017年
关键词
Network security; Situation prediction; RBF; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem of network security situation prediction, this paper studies the prediction method based on RBF neural network. Through training the RBF neural network, find out the nonlinear mapping relationship between the front N data and the subsequent M data, and then adjust the value of N to explore the different prediction results. The simulation result shows that the proposed method can accurately predict the results of the situation. Compared with the prediction based on BP neural network, the proposed method has a more accurate prediction and a faster convergence speed, a better prediction effect achieved.
引用
收藏
页码:4060 / 4063
页数:4
相关论文
共 12 条
[1]   Measuring, analyzing and predicting security vulnerabilities in software systems [J].
Alhazmi, O. H. ;
Malaiya, Y. K. ;
Ray, I. .
COMPUTERS & SECURITY, 2007, 26 (03) :219-228
[2]  
[Anonymous], 2007, J ADV INFORM FUSION
[3]   Intrusion detection systems and multisensor data fusion [J].
Bass, T .
COMMUNICATIONS OF THE ACM, 2000, 43 (04) :99-105
[4]  
Chen Kai, 2010, Journal of Software, V21, P2367, DOI 10.3724/SP.J.1001.2010.03626
[5]  
Deng Yongjie, 2015, MICROCOMPUTER ITS AP, V34, P1
[6]   Projecting cyberattacks through variable-length Markov models [J].
Fava, Daniel S. ;
Byers, Stephen R. ;
Yang, Shanchieh Jay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :359-369
[7]   Research on cyberspace situational awareness [J].
Gong Z.-H. ;
Zhuo Y. .
Ruan Jian Xue Bao/Journal of Software, 2010, 21 (07) :1605-1619
[8]  
Kim J, 2007, HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, P141, DOI 10.1109/HASE.2007.55
[9]  
Ren Wei, 2006, Computer Engineering and Applications, V42, P136
[10]   基于改进D-S证据理论的网络安全态势评估方法 [J].
汤永利 ;
李伟杰 ;
于金霞 ;
闫玺玺 .
南京理工大学学报, 2015, 39 (04) :405-411