To better understand the behavior of attackers and describe the network state, we construct an LSTM-DT model for network security situation awareness, which provides risk assessment indicators and quantitative methods. This paper introduces the concept of attack probability, making prediction results more consistent with the actual network situation. The model is focused on the problem of the time sequence of network security situation assessment by using the decision tree algorithm (DT) and long short-term memory(LSTM) network. The biggest innovation of this paper is to change the description of the network situation in the original dataset. The original label only has attack and normal. We put forward a new idea which regards attack as a ...
With the increasing importance of network security, more attention is paid to the research on networ...
In the present context, the deep learning approach is highly applicable for identifying cyber-attack...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...
Part 2: AIInternational audienceAs an emerging technology that blocks network security threats, netw...
The classification of network attack data, and prediction of the next likely set of network traffic ...
In order to reflect the situation of network security assessment performance fully and accurately, a...
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monito...
Situation awareness refers to collect, process, and extract a variety of factors which can affect ...
With the comprehensive promotion of “big data + energy”, new power network security threats are also...
The security of the network has become a primary concern for organizations. Attackers use different ...
There are a lot of uncertainties in the network security situation assessment that depends on is mul...
Based on the design idea of future network, this paper analyzes the network security data sampling a...
Network security situation assessment can project the next behavior of the network by describing the...
In today’s increasingly severe network security situation, network security situational awareness pr...
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyb...
With the increasing importance of network security, more attention is paid to the research on networ...
In the present context, the deep learning approach is highly applicable for identifying cyber-attack...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...
Part 2: AIInternational audienceAs an emerging technology that blocks network security threats, netw...
The classification of network attack data, and prediction of the next likely set of network traffic ...
In order to reflect the situation of network security assessment performance fully and accurately, a...
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monito...
Situation awareness refers to collect, process, and extract a variety of factors which can affect ...
With the comprehensive promotion of “big data + energy”, new power network security threats are also...
The security of the network has become a primary concern for organizations. Attackers use different ...
There are a lot of uncertainties in the network security situation assessment that depends on is mul...
Based on the design idea of future network, this paper analyzes the network security data sampling a...
Network security situation assessment can project the next behavior of the network by describing the...
In today’s increasingly severe network security situation, network security situational awareness pr...
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyb...
With the increasing importance of network security, more attention is paid to the research on networ...
In the present context, the deep learning approach is highly applicable for identifying cyber-attack...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...