Affiliation:
1. 1 Guangzhou Health Science College , Guangzhou , Guangdong , , China .
Abstract
Abstract
With the development and progress of science and technology, an excellent algorithm for data mining of network security hazards is sought, which can effectively discover potential dangers in the network. Based on the XGBoost machine learning algorithm, the differential evolution (DE) algorithm is used to train the XGBoost algorithm, and then an optimized DE-XGBoost algorithm is proposed. The construction of an optimal mining and evaluation model is based on this. The DE-XGBoost algorithm’s performance is assessed against cybersecurity hazards using nominal-type posture indicators when data mining cybersecurity hazards. The experimental results show that the DE-XGboost algorithm has the lowest execution time and memory usage during mining, 5min and 82MB respectively, when the number of records in the dataset is 3,500. The DE-XGboost algorithm averages a digging full rate of 92.3%, which is the highest in terms of digging full rate. The posture evaluation experiment uses the DE-XGboost model to predict the posture value that matches the real value with the maximum number of sample points, which is 10 samples. The DE-XGboost algorithm is the perfect choice for cybersecurity data mining due to its optimal performance and best mining effect.
Reference12 articles.
1. Ni, Z., Li, Q., & Liu, G. (2018). Game-model-based network security risk control. Computer, 51(4), 28-38.
2. Peng, Y., Liu, X., Li, M., Li, Z., & Mi, X. (2020). Sensing network security prevention measures of bim smart operation and maintenance system. Computer Communications, 161(15).
3. Marco, M., Alejandro Maté, & Peral, J. (2017). Application of data mining techniques to identify relevant key performance indicators. Computer Standards and Interfaces.
4. A, P. W. M., A, B. A., & B, M. A. B. (2017). Market segmentation through data mining: a method to extract behaviors from a noisy data set. Computers & Industrial Engineering, 109, 233-252.
5. Xia, F., Che, T., & Wang, W. (2017). Research on the network security risk control based on game model. Boletin Tecnico/Technical Bulletin, 55(4), 639-643.