Communication network security situation analysis based on time series data mining technology
Affiliation:
1. School of Internet of Things Technology, Henan Institute of Economics and Trade , Zhengzhou 450018, Henan , China 2. International Joint Research Laboratory for Agricultural Products Traceability of Henan , Zhengzhou 450018, Henan , China
Abstract
Abstract
Communication network security situation analysis prevents unauthorized users from accessing and stealing sensitive information. Network security analysis aims to monitor, discover, and eradicate security flaws by carefully examining the network’s architecture, data, and traffic to ensure safety. In time series data mining analysis by cyber terrorism, specialists must pay attention to cyber security, which involves identifying the elements contributing to long-term trends or systemic patterns via pattern-matching algorithms and other types of inferential processing on large datasets. The challenging characteristics of communication network security situation analysis are data loss, security breaches, hacking, and viruses. Hence, in this research, attention mechanism-based convolutional neural network-enabled practical byzantine fault tolerant (AMBCNN-PBFT) has been designed to improve communication network security situation analysis in time series data mining. AMBCNN-PBFT helps to increase communication network security usage and support the expansion during the evaluation system by optimizing the time series data mining. AMBCNN-PBFT effectively predicts the rise in the communication network, associated with faster times series benefits data mining approach. The study concludes that the AMBCNN-PBFT efficiently indicates and validates the communication network security in time series data mining during the evaluation system. The experimental analysis of AMBCNN-PBFT outperforms the data mining time series in terms of accuracy, efficiency, performance, and prediction.
Publisher
Walter de Gruyter GmbH
Reference33 articles.
1. Z. Gu, S. Nazir, C. Hong, and S. Khan, “Convolution neural network-based higher accurate intrusion identification system for network security and communication,” Secur. Commun. Netw., vol. 2020, pp. 1–10, 2020. 2. M. A. Khan, S. Abbas, A. Rehman, Y. Saeed, A. Zeb, M. I. Uddin, et al., “A machine learning approach for blockchain-based smart home networks security,” IEEE Netw., vol. 35, no. 3, pp. 223–229, 2020. 3. W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, and K. Cabaj, “Challenges and novel solutions for 5G network security, privacy and trust,” IEEE Wirel. Commun., vol. 27, no. 4, pp. 6–7, 2020. 4. W. Li, W. Meng, Z. Liu, and M. H. Au, “Towards blockchain-based software-defined networking: security challenges and solutions,” IEICE Trans. Inf. Syst., vol. 103, no. 2, pp. 196–203, 2020. 5. B. B. Sundaram, P. Rajkumar, M. M. Ananthi, V. S. Kumar, M. J. Vijaykumar, and P. Karthika, “Network security analysis for signal strength based packet filitering,” In 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020, December, pp. 1352–1355.
|
|