Paper
23 August 2022 Application of flow feature association mining algorithm in network security situation assessment
Qingpeng Wang, Xuezhong Lu, Mei Zhao
Author Affiliations +
Proceedings Volume 12330, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022); 123300X (2022) https://doi.org/10.1117/12.2646481
Event: International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022), 2022, Huzhou, China
Abstract
In order to strengthen the power network structure of our country, reduce the frequency of electrical equipment and lines, so that the power network can operate normally and smoothly. Based on the above reasons, the flow feature association mining algorithm is introduced into the research of power network security situation assessment to evaluate and predict the safe running state of power network. Firstly, this paper explains the basic algorithm of stream feature mining, including time correlation, IP (Ingress Protection) correlation, type correlation and super warning correlation. Secondly, it is necessary to determine the weight of network security evaluation index and the calculation method of evaluation, and carry out the relevant case analysis. Finally, the network security situation assessment model based on the flow feature association mining algorithm was compared with the BP(Back Propagation) neural network and RBF(Radial Basis Function) neural network evaluation model, and the comparison results showed that Flow feature association mining algorithm can improve the feasibility and accuracy of power network situation assessment. In conclusion, the study of this paper can provide a new research approach for the construction of network security situation assessment.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qingpeng Wang, Xuezhong Lu, and Mei Zhao "Application of flow feature association mining algorithm in network security situation assessment", Proc. SPIE 12330, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022), 123300X (23 August 2022); https://doi.org/10.1117/12.2646481
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Neural networks

Information security

Mining

Evolutionary algorithms

Error analysis

Statistical modeling

Back to Top