Research on data mining method of network security situation awareness based on cloud computing

Abstract Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation of a hybrid network has been analyzed using cloud computing strategy. The simulation results show that a cyber security crash occurs in window 20, after which the protection index drops to window 500. The increase in the security index of 500 windows is consistent with the effectiveness of the concept of this document method, indicating that this document method can sense changes in the network security situation. Starting from the first attacked window, the defense index began to decrease. In order to simulate the added network defense, the network security events in the 295th time window were reduced in the original data, and the defense index increased significantly in the corresponding time period, which is consistent with the method perception results, which further verifies the effectiveness and reliability of this method on the network security event perception. This method provides high-precision knowledge of network security situations and improves the security and stability of cloud-based networks.

[1]  Ashutosh Sharma,et al.  Enabling smart agriculture by implementing artificial intelligence and embedded sensing , 2022, Comput. Ind. Eng..

[2]  D. Qin,et al.  Experimental Data Mining Research on Factors Influencing Friction Coefficient of Wet Clutch , 2021, Journal of Tribology.

[3]  A. Tselykh,et al.  Sustainable Smart Cities: Convergence of Artificial Intelligence and Blockchain , 2021, Sustainability.

[4]  Gurjot Singh Gaba,et al.  A Metaheuristic Approach to Secure Multimedia Big Data for IoT-Based Smart City Applications , 2021, Wireless Communications and Mobile Computing.

[5]  Vivek Kumar Sehgal,et al.  Mobile Networks-on-Chip Mapping Algorithms for Optimization of Latency and Energy Consumption , 2021, Mobile Networks and Applications.

[6]  Bo Wang Multimedia Filtering Analysis of Massive Information Combined with Data Mining Algorithms , 2021, Advances in Multimedia.

[7]  Omar Cheikhrouhou,et al.  Intelligent SLA-Aware VM Allocation and Energy Minimization Approach with EPO Algorithm for Cloud Computing Environment , 2021 .

[8]  Selahattin Bardak,et al.  Predicting Effects of Selected Impregnation Processes on the Observed Bending Strength of Wood, with Use of Data Mining Models , 2021 .

[9]  M. S. Hossain,et al.  A robust and lightweight secure access scheme for cloud based E-healthcare services , 2021, Peer-to-Peer Networking and Applications.

[10]  Li Tao Application of Data Mining in the Analysis of Martial Arts Athlete Competition Skills and Tactics , 2021, Journal of healthcare engineering.

[11]  N. Radchikova,et al.  Assessment of the COVID-19 pandemic situation: Data from two countries with different security measures taken by authorities (Belarus and Russia) , 2021, Data in Brief.

[12]  Archana Singhal,et al.  A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing , 2021, Future Gener. Comput. Syst..

[13]  Gurjot Singh Gaba,et al.  Performance Analysis and Enhancement of Free Space Optical Links for Developing State-of-the-Art Smart City Framework , 2020, Photonics.

[14]  Manoj Kumar,et al.  Layer based security in Narrow Band Internet of Things (NB-IoT) , 2020, Comput. Networks.

[15]  P. M. Joe Prathap,et al.  Nature inspired chaotic squirrel search algorithm (CSSA) for multi objective task scheduling in an IAAS cloud computing atmosphere , 2020 .

[16]  F. Loge,et al.  Water-energy-food security: A Nexus perspective of the current situation in Latin America and the Caribbean , 2020, Energy.

[17]  Ashutosh Sharma,et al.  An efficient architecture for the accurate detection and monitoring of an event through the sky , 2019, Comput. Commun..

[18]  Yi An,et al.  Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China , 2019, Ecological Indicators.

[19]  Yun Xiaochun,et al.  Framework for risk assessment in cyber situational awareness , 2019, IET Inf. Secur..

[20]  Amiya Nayak,et al.  An improved network security situation assessment approach in software defined networks , 2019, Peer-to-Peer Netw. Appl..

[21]  Ahmed Bentajer,et al.  An IBE-based design for assured deletion in cloud storage , 2019, Cryptologia.

[22]  Haiyan Xu,et al.  Methods for virtual machine scheduling with uncertain execution times in cloud computing , 2019, Int. J. Mach. Learn. Cybern..

[23]  Mingtong Li,et al.  Research on the mechanism and influence factors of urban style building based on cloud computing logistics information , 2018, Cluster Computing.

[24]  Mustapha Hedabou,et al.  Some Ways to Secure Elliptic Curve Cryptosystems , 2008 .

[25]  Gurjot Singh Gaba,et al.  Secure Device-to-Device communications for 5G enabled Internet of Things applications , 2021, Comput. Commun..

[26]  Zhihong Tian,et al.  System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS , 2019, Computers, Materials & Continua.

[27]  Ahmed Bentajer,et al.  CS-IBE: A Data Confidentiality System in Public Cloud Storage System , 2018, EUSPN/ICTH.

[28]  Karnam Sreenu,et al.  W-Scheduler: whale optimization for task scheduling in cloud computing , 2017, Cluster Computing.