Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks

Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks. The trend of unknown network security events can be predicted through multitask learning of the occurrence and transmission characteristics of known network security events. Second, in case of lacking regional data, the quantitative trend of unknown regional network security events can be calculated. This study introduces a sensor network security event forecast method named Prediction Network Security Incomplete Unmarked Data (PNSIUD) method to forecast missing attack data in the target region according to the known partial data in similar regions. Experimental results indicate that for an unknown security event forecast the forecast accuracy and effects of the similarity forecast algorithm are better than those of single-task learning method. At the same time, the forecast accuracy of the PNSIUD method is better than that of the traditional support vector machine method.

[1]  Tai-Hoon Kim,et al.  Detecting bad information in mobile wireless networks based on the wireless application protocol , 2013, Computing.

[2]  Di Wu,et al.  Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities Set: Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities Set , 2012 .

[3]  A. B. Mohamed,et al.  Alert correlation framework using a novel clustering approach , 2012, 2012 International Conference on Computer & Information Science (ICCIS).

[4]  Yongzheng Zhang,et al.  Network Threat Assessment Based on Alert Verification , 2011, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.

[5]  Sheng-Yuan Wang,et al.  Survey of Information Security Risk Assessment , 2010, 2010 International Conference on Electrical and Control Engineering.

[6]  Gong Zheng,et al.  Research on Cyberspace Situational Awareness , 2010 .

[7]  Paramvir Bahl,et al.  Detailed diagnosis in enterprise networks , 2009, SIGCOMM '09.

[8]  Zahid Anwar,et al.  Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[9]  Liang Ying Research on Key Technologies for Implementing Network Security Situation Awareness , 2008 .

[10]  Hongsheng Xi,et al.  A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[11]  Tai-Myung Chung,et al.  Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security , 2007, International Conference on Computational Science.

[12]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[13]  Chen Xiu Quantitative Hierarchical Threat Evaluation Model for Network Security , 2006 .

[14]  Wang Hui,et al.  Survey of Network Situation Awareness System , 2006 .

[15]  Jing Wu,et al.  Using Fuzzy Logic and Entropy Theory to Risk Assessment of the Information Security , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[16]  Song Chen A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security , 2005 .

[17]  Mário M. Freire,et al.  Intelligent Assessment of Distributed Security in TCP/IP Networks , 2004, HSNMC.

[18]  K. Clark,et al.  Qualitative and quantitative analytical techniques for network security assessment , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[19]  Dai Zong-kun Model of Multilevel Fuzzy Comprehensive Risk Evaluation of Information System , 2004 .

[20]  George Cybenko,et al.  Quantitative risk analysis of computer networks , 2003 .

[21]  Duan Yun Information System Security Metrics and Evaluation Model , 2003 .

[22]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[23]  Yuanlong Yu,et al.  Network Intrusion Detection , 2022 .