Affiliation:
1. Modern Education Technology Center , Wuhan Business University , Wuhan , Hubei , , China .
Abstract
Abstract
This paper constructs a detection technique for large-scale network security threats based on a knowledge graph, extracts the attack features of network security threats using feature template FT, and combines the CNN layer, BiLSTM layer and CRF layer to establish FT-CNN-BiLSTM-CRF large-scale network security threat detection technique. Network security threat performance evaluation experiments and multi-step attack experiments have verified the detection capability of this paper's method. The recall rate of the method built in this paper in detecting malicious data is about 62.39%, the average F1-Score for normal and malicious traffic detection is 0.7482, and the anomaly score for normal traffic detection is almost 0. The detection performance of this paper's method for multi-step network attacks is superior to that of other methods, and it is capable of detecting malicious attacks quickly. Experiments have proved that the method constructed in this paper can meet the requirements of detection capability and efficiency in large-scale network security threats and has high feasibility and application value.
Reference24 articles.
1. Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568.
2. Sun, N., Li, T., Song, G., & Xia, H. (2021). Network security technology of intelligent information terminal based on mobile internet of things. Mobile Information Systems.
3. Xie, L., Hang, F., Guo, W., Lv, Y., Ou, W., & Shibly, F. H. A. (2021). Network security defence system based on artificial intelligence and big data technology. International journal of high performance systems architecture(3/4), 10.
4. Al Tabash, K., & Happa, J. (2018). Insider-threat detection using gaussian mixture models and sensitivity profiles. Computers & Security, 77(AUG.), 838-859.
5. Kayhan, V. O., Agrawal, M., & Shivendu, S. (2023). Cyber threat detection: unsupervised hunting of anomalous commands (uhac). Decision Support Systems.