Abstract

In today’s increasingly severe network security situation, network security situational awareness provides a more comprehensive and feasible new idea for the inadequacy of various single solutions and is currently a research hotspot in the field of network security. At present, there are still gaps or room for improvement in network security situational awareness in terms of model scheme improvement, comprehensive and integrated consideration, algorithm design optimization, etc. A lot of scientific research investments and results are still needed to improve the form of network security in a long and solid way. In this paper, we propose a network security posture assessment model based on time-varying evidence theory for the existing multisource information fusion technology that lacks consideration of the problem of threat occurrence support rate over time and make the threat information reflect the law of time change by introducing a time parameter in the basic probability assignment value. Thus, the existing hierarchical threat posture quantitative assessment technique is improved and a hierarchical multisource network security threat posture assessment model based on time-varying evidence theory is proposed. Finally, the superiority of the proposed model is verified through experiments.

Highlights

  • With the popularity and development of computer and network technology, various network systems have been deeply embedded in the daily production and life of society and individuals [1]

  • The security posture prediction curves on the test set are plotted, and the real values of the posture are compared with the predicted values of the Particle swarm optimization (PSO)-LSTM algorithm, and the results show that the prediction algorithm proposed in this paper can predict the network security posture in the future period better

  • We focus on network security situation prediction and propose a PSO-LSTM neural network-based network security situation prediction algorithm

Read more

Summary

Introduction

With the popularity and development of computer and network technology, various network systems have been deeply embedded in the daily production and life of society and individuals [1]. In January, the user names and passwords of many network service companies, such as Tianya Community, were made public in clear text, leading to the leakage of a large number of user password habits and e-mail addresses [5,6,7,8,9,10]. Various security loopholes, such as cross-site attacks, injection, hijacking, and other problems are rife in the network services, and even strong international companies are not immune [11]. The model is applied to the protocol, and the experimental simulation is carried out. e result verifies the safety and effectiveness of the model. e research in this area has become a hot concern direction, and this paper has done a lot of research work based on this and achieved certain results

Related Work
Analysis of Experimental Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call