Future of Information and Communication Conference (FICC) 2024
4-5 April 2024
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 15 Issue 4, 2024.
Abstract: It is difficult to accurately reflect different network attack events in real time, which leads to poor performance in predicting network security situations. A knowledge graph-based entity recognition model and entity relationship extraction model was developed for enhancing the reliability and processing efficiency of secure data. Then a knowledge graph-based situational assessment method was introduced, and a network security situational prediction model based on self-attention mechanism and gated recurrent unit was constructed. The study's results showed that the constructed prediction model achieved stable mean square error values of approximately 0.0127 and 0.0136 after being trained on the NSL-KDD and CICIDS2017 datasets for 678 and 589 iterations, respectively. The mean square error value was lower due to fewer training iterations compared to other prediction models. The model was embedded into the information security system of an actual Internet company, and the detection accuracy of the number of network attacks was more than 95%. The results of our study indicate that the method used in the study can accurately predict the network security situation and provide technical support for predicting network information security of the same type.
Wei Luo, “Network Security Situation Prediction Technology Based on Fusion of Knowledge Graph” International Journal of Advanced Computer Science and Applications(IJACSA), 15(4), 2024. http://dx.doi.org/10.14569/IJACSA.2024.0150491
@article{Luo2024,
title = {Network Security Situation Prediction Technology Based on Fusion of Knowledge Graph},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2024.0150491},
url = {http://dx.doi.org/10.14569/IJACSA.2024.0150491},
year = {2024},
publisher = {The Science and Information Organization},
volume = {15},
number = {4},
author = {Wei Luo}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.