|Table of Contents|

Early warning algorithm for highly sensitive network information based on deep neural network(PDF)

《西安工程大学学报》[ISSN:1674-649X/CN:61-1471/N]

Issue:
2021年第1期
Page:
69-74
Research Field:
计算机科学
Publishing date:

Info

Title:
Early warning algorithm for highly sensitive network information based on deep neural network
Author(s):
TONG Ying1ZHOU Yu1YAO Huanzhang1LIANG Jian1XUE Hu2
(1.Network Security Corps of Jiangsu Provincial Public Security Department,Nanjing 210024, China; 2.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
Keywords:
deep neural network highly sensitive information network early warning data clustering adjacency matrix average degree of node connection early warning and response
PACS:
TP 393
DOI:
10.13338/j.issn.1674-649x.2021.01.011
Abstract:
In order to solve the problem that the traditional sensitive information early warning algorithm is difficult to cluster information effectively, a new sensitive information early warning algorithm is proposed. Firstly, the sensitive information of high word frequency in the network was collected. Secondly, the accurate mining of high sensitive information was completed by setting a reasonable threshold. Thirdly, the high sensitive information was effectively clustered by deep neural network, and the adjacency matrix was constructed. Finally, the connection average of network parameter nodes was calculated. Combined with the above clustering results, the monitoring and early warning of high sensitive information were realized. The experimental results showed that the data sent by the network nodes using the traditional algorithm was not regular, and the warning response time was more than 2 s, while the network data using the deep neural network algorithm presents a fully connected state, and the sensitive information could show a high degree of consistency, and the warning response of the algorithm to the sensitive information could be completed in 1 s. The research shows that the early warning algorithm based on deep neural network can be applied in the field of network security.

References:

[1] 李学国,沈应兰,康先琼.熵分类优化信息敏感值的个性化隐私匿名算法[J].科技通报,2018,34(3):155-158.
LI X G,SHEN Y L,KANG X Q.Entropy classification optimization information sensitive value personalized privacy anonymous algorithm[J].Bulletin of Science and Technology,2018,34(3):155-158.(in Chinese)
[2] 胡钢,高浩,徐翔.基于多属性偏好信息集结的复杂网络重要节点辨识[J].浙江理工大学学报(自然科学版),2019,41(4):482-488.
HU G,GAO H,XU X.Identify important nodes in complex network based on aggregation of multi-attribute preference information[J].Journal of Zhejiang Sci-Tech University(Natural Sciences Edition),2019,41(4):482-488.(in Chinese)
[3] 王文明,王全玉,王英豪,等.面向敏感区域的智能监控与预警数据库研究与设计[J].信息网络安全,2019(12):1-9.
WANG W M,WANG Q Y,WANG Y H,et al.Research and design of intelligent monitoring and early warning database system for sensitive areas[J].Netinfo Security,2019(12):1-9.(in Chinese)
[4] 依不拉音·吾斯曼,郭文强,于凯.面向多形式维文的敏感信息过滤算法研究[J].计算机工程与应用,2020,56(10):127-133.
Yibulayin·Wusiman,GUO W Q,YU K.Research on filtering algorithm for senstive information in multi-form Uyghur[J].Computer Engineering and Applications,2020,56(10):127-133.(in Chinese)
[5] 黄世锐,张恒巍,王晋东,等.基于定性微分博弈的网络安全威胁预警方法[J].通信学报,2018,39(8):29-36.
HUANG S R,ZHANG H W,WANG J D,et al.Network security threat warning method based on qualitative differential game[J].Journal on Communications,2018,39(8):29-36.(in Chinese)
[6] 舒敏,刘华文,郑忠龙,等.结合局部敏感哈希和随机游走的异常检测算法[J].计算机科学与探索,2018,12(12):1950-1960.
SHU M,LIU H W,ZHENG Z L,et al.Outlier detection algorithm combining locality sensitive hashing and random walks[J].Journal of Frontiers of Computer Science and Technology,2018,12(12):1950-1960.(in Chinese)
[7] 黄文明,杨柳青青,任冲.结合信息量和深度学习的领域新词发现[J].计算机工程与设计,2019,40(7):1903-1907.
HUANG W M,YANG L Q Q,REN C.Combining amount of information and depth learning in the field of new words discovery[J].Computer Engineering and Design,2019,40(7):1903-1907.(in Chinese)
[8] 郭嘉丰,范意兴.深度学习检索框架的前沿探索[J].计算机研究与发展,2018,55(9):1987-1999.
GUO J F,FAN Y X.Exploration on neural information retrieval framework[J].Journal of Computer Research and Development,2018,55(9):1987-1999.(in Chinese)
[9] 冯维,徐永鑫,刘浩,等.无线多跳网络快速跨层资源优化分配算法[J].电子与信息学报,2019,41(5):1217-1224.
FENG W,XU Y X,LIU H,et al.A fast convergent cross-layer resource optimization allocation algorithm in wireless multi-hop networks[J].Journal of Electronics & Information Technology,2019,41(5):1217-1224.(in Chinese)
[10] 李振兴,龚旸,翁汉琍,等.广域保护通信重负载下迂回路径重构算法[J].电力系统保护与控制,2019,47(2):40-46.
LI Z X,GONG Y,WENG H L,et al.Reconstruction algorithm for WAP communication network with heavy load[J].Power System Protection and Control,2019,47(2):40-46.(in Chinese)
[11] 周非,高建军,范馨月,等.无线传感网络中基于虚拟力的节点动态覆盖算法[J].系统仿真学报,2018,30(8):2908-2917.
ZHOU F,GAO J J,FAN X Y,et al.Dynamic covering algorithm of node based on virtual force in wireless sensor networks[J].Journal of System Simulation,2018,30(8):2908-2917.(in Chinese)
[12] 王涛春,汪淑萍.两层传感器网络中基于位表的隐私保护top-k查询算法[J].计算机应用研究,2018,35(7):2114-2116.
WANG T C,WANG S P.Privacy-preserving top-k query algorithm based on bits table in two-tiered sensor networks[J].Application Research of Computers,2018,35(7):2114-2116.(in Chinese)
[13] 郝丽,胡大伟.基于BP神经网络和蜂群算法对在T-JIT环境下供应链协同风险的预警研究[J].公路交通科技,2018,35(6):112-120.
HAO L,HU D W.Study on early warning of supply chain coordination risk in T-JIT environment based on BP neural network and bee colony algorithm[J].Journal of Highway and Transportation Research and Development,2018,35(6):112-120.(in Chinese)
[14] 郭小康,简涛,董云龙.基于LVQ网络优化的雷达目标识别算法[J].雷达科学与技术,2019,17(1):33-36.
GUO X K,JIAN T,DONG Y L.Radar target recognition algorithm based on optimized LVQ network[J].Radar Science and Technology,2019,17(1):33-36.(in Chinese)
[15] 杨茹,王俊.关于网络通信安全防御节点路径选择仿真[J].计算机仿真,2018,35(8):223-226.
YANG R,WANG J.Simulation of network communication security and defense node route selection[J].Computer Simulation,2018,35(8):223-226.(in Chinese)
[16] 吴军英,王新颖,常永娟,等.窄带干扰下自组织网络通信中自适应非线性滤波方法研究[J].科学技术与工程,2018,18(2):99-104.
WU J Y,WANG X Y,CHANG Y J,et al.Adaptive nonlinear filtering method in ad hoc networks communication with narrowband interference[J].Science Technology and Engineering,2018,18(2):99-104.(in Chinese)
[17] 蒋俊正,杨杰,欧阳缮.一种新的无线传感器网络中异常节点检测定位算法[J].电子与信息学报,2018,40(10):2358-2364.
JIANG J Z,YANG J,OUYANG S.Novel method for outlier nodes detection and localization in wireless sensor networks[J].Journal of Electronics & Information Technology,2018,40(10):2358-2364.(in Chinese)
[18] 刘立明,李群英,郝成亮,等.基于异常流量可视化的通信网络入侵攻击路径智能跟踪技术[J].科学技术与工程,2019,19(11):230-235.
LIU L M,LI Q Y,HAO C L,et al.Intelligent tracking technology for communication network attack path based on abnormal traffic visualization[J].Science Technology and Engineering,2019,19(11):230-235.(in Chinese)
[19] 琚安康,郭渊博,李涛,等.基于网络通信异常识别的多步攻击检测方法[J].通信学报,2019,40(7):57-66.
JU A K,GUO Y B,LI T,et al.Multi-step attack detection method based on network communication anomaly recognition[J].Journal on Communications,2019,40(7):57-66.(in Chinese)
[20] 黄琴,钱文彬,王映龙,等.面向代价敏感的多标记不完备数据特征选择算法[J].小型微型计算机系统,2018,39(12):2617-2624.
HUANG Q,QIAN W B,WANG Y L,et al.Multi-label feature selection algorithm with incomplete data based on cost sensitivity[J].Journal of Chinese Computer Systems,2018,39(12):2617-2624.(in Chinese)
[21] 于云龙,茹乐,方堃,等.面向高动态移动自组织网络的生物启发分簇算法[J].电子学报,2018,46(4):918-929.
YU Y L,RU L,FANG K,et al.Bio-inspired clustering algorithm for highly dynamic mobile ad hoc networks[J].Acta Electronica Sinica,2018,46(4):918-929.(in Chinese)
[22] 高航,慕晓冬,易昭湘,等.流星余迹通信网络的路由算法[J].计算机科学,2018,45(7):84-89.
GAO H,MU X D,YI Z X,et al.Routing algorithm based on meteor-burst communication[J].Computer Science,2018,45(7):84-89.(in Chinese)
[23] 胡敏,张艳,黄宏程.群智感知网络个性化位置隐私保护算法[J].计算机应用研究,2019,36(3):930-934.
HU M,ZHANG Y,HUANG H C.Personalized location privacy protection algorithm in crowd sensing networks[J].Application Research of Computers,2019,36(3):930-934.(in Chinese)
[24] 孟小冬.大数据背景下链路网络敏感数据防窃取方法[J].西安工程大学学报,2019,32(2):212-217.
MENG X D.Anti-theft method of sensitive data in link network in large data background[J].Journal of Xi’an Polytechnic University,2019,32(2):212-217.(in Chinese)

Memo

Memo:
-
Last Update: 2021-02-24