SlideShare a Scribd company logo
1 of 30
A Survey of Network Security
Situational Awareness
Technology
Huda Seyam
3/12/2019
Objective
Definition
01 Introduction
Network Security Situational
Awareness aspects
02
03
outlook04
Situation awareness (SA)
Endsley in 1988 from artificial intelligence
is the recognition of a large number of environmental
elements in time and space, understanding their
meanings, and predicting their status in the near
future
1988
Definition
top-down driven mental model, divided into three main
parts: perception, understanding and projection
Situation awareness (SA)
from the definition of the Joint Directors of
Laboratories (JDL)
is an estimate and prediction of relationships
between entities
- data fusion model, bottom-up
Definition
01 02 03
2006
Tadda et al
proposed evaluation indicators and
methods for situational awareness
systems
1999
Bass proposed a
network situational awareness
function model based on multi-
sensor data fusion
2000
McGuinness and Foy et al.
extended the fourth layer of the
situational awareness model called
Resolution. Resolution represents the
countermeasures needed to deal with
the interdependent risks in the network
Situation
visualization
Situation
prediction
Situational
understanding
Network element
collection
Network Element
Collection
01
Network Element Collection
Accurate and comprehensive extraction of
security situation elements in the network
include
• static configuration information
• dynamic operation information
• network traffic information
Network Element Collection
Jajodia et al
assessed the
vulnerability of the
network by
collecting
vulnerability
information from
the network
Franke et al
data acquired in network
sensors (such as intrusion
detection systems) can go
directly into the
data fusion process
or be interpreted by decision
makers.
But it needs to be combined with
other information, such as
adding human understanding of
security incidents
Wang et al.
proposed an anti-attack concept
attack graph as a measure of
security for different network
configurations to give an
indication of the current
operation of the network
Situational
Understanding
integration of relevant
data to obtain a macro
network security situation
02
Situational Understanding
According to Haines et al. Previous results have shown
that no single control (such as IDS) can detect all
network attacks
fusion algorithms are divided into the following
categories:
• analytic hierarchy process
• logical reasoning
• probability analysis
• rule pattern matching.
1. analytic hierarchy process :
comprehensively consider various situational factors affecting the situation and establish several evaluation
functions
-The weighted average method is the most common and simple method of fusion based on mathematical models.
-Chen et al proposed a hierarchical cybersecurity threat situation quantitative assessment
method.
There is no uniform standard
for the choice of weights and
the basis for stratification,
most of which are based on
domain knowledge or
experience, and lack of
objective basis
Advantage Disadvantage
the implementation
process is relatively
simple
2.logical reasoning :
fuzzy logic inherent logic between information and integrates information
Fuzzy logic is a mathematical method for people to reason about uncertain things, using fuzzy sets and
fuzzy rules
1- single source data is locally evaluated,
2-The corresponding model parameters are selected,
3- The membership function is established for the local evaluation result, which is divided into
corresponding fuzzy sets to realize the fuzzification of specific values, and the results are carried out.
the situational classification is identified by fuzzy rule reasoning, thus completing
the assessment of the current situation
logical reasoning
easy to understand,
and it can reflect
the network
security situation
very intuitively
it requires a detailed
analysis of the type of
attack, and this analysis
is very difficult
Advantage Disadvantage
3.Probabilistic Analysis
Bayesian networks and hidden Markov models
are the most common methods of probability
and statistics.
Bayesian network uses a directed acyclic graph
representation
-The Bayesian Network consists of nodes which
represent different situations and events, each
node contains a conditional probability
allocation table,
to obtain new situation information
Probabilistic Analysis
Park et al. added time factors to the original network. They propose a multi-instance
Bayesian network that can be analyzed over time and incorporate high-level languages to
handle complex situations and uncertainties
methods can fuse all data
and prior knowledge, and
the reasoning process is
clear and easy to
understand.
requires a large amount of
data and takes a long time in
the training process
has some difficulties in
feature extraction and model
construction
Advantage Disadvantage
4.Rule pattern matching.
to build an evaluation model based on expert knowledge and experience, and analyze the
security posture of the entire network through pattern matching
D-S evidence fusion method
-the degree of support for the decision using the data information as evidence. Then look for
a synthetic rule of evidence
-finally achieves the degree of support for a certain decision and completes the process of
data fusion
Rule pattern matching
need to mine the intrinsic
patterns between data,
which can be adapted to
uncertain situations
without prior information
explosion of the number of
associated patterns and the
conflict of evidence, so it
will have a great impact on
the results
Advantage Disadvantage
Situational prediction
predicting the development
trend of the network in the
future according to the
historical information and
current state of the network
security situation
03
Situational prediction
limiting the use of traditional prediction models.
- At present, network security situation
prediction generally adopts methods such as neural
network and time series prediction
- The algorithm uses multiple associated neurons as
the structure of the model, linking the inputs to
the output
Ying et al
improved the BP neural network by using wavelet neural network (WNN) to predict the network
situation
model requires a large
amount of computational
power for training
Advantage Disadvantage
The neural network
model has many
parameters, strong
adaptability, and good
nonlinearity fitting, so it
has strong robustness
method reveals the law of network situation change with time through time
series, and predicts the future situation according to this law.
- Commonly used for time series are HMM algorithm, autoregressive moving
average
- The current situation prediction method mainly uses machine learning,
which has good convergence and fault tolerance, and can handle large-scale
data.
- the hybrid model based on game theory is the future development direction
Time series prediction
Situational Visualization
data to extract high-level
situational results and
display them using some
visualization techniques
04
Situational Visualization
Beaver et al
Visualize the
attack by
screening the
information
generated by the
IDS and collecting
the results of
multi-source
cleaning
Chen et al.
conducted hierarchical
analysis of multiple
data sources and
presented them
according to different
categories data fusion
process
Phan et al.
proposed a time-centric
visualization system
that classifies events by
interacting with
humans and iteratively
produces visual charts.
Outlook
Fusion of Massive Data.
Fusion of Massive Data is difficult
the network situation understanding requires (high-quality data alarm )as a
data source. Due to the detection level of IDS and various firewall systems,
the alarm quality is not very high
- How to extract high-quality data sources and carry out efficient and rapid
integration is the future development trend
-At present, deep learning has received extensive attention, and its
performance and accuracy have reached a very good level.
-Therefore, data fusion technology based on
deep learning will develop rapidly
Outlook
Situational Understanding of Incomplete Warning
The robustness of the network situational awareness system will be tested
when there is an error, omission, or new type of alarm in the device that
generated the data
-How to face the unknown missing data is also a problem that needs to be
solved
-At present, some methods based on logical reasoning, probability which
requires experts to analyze the entire network and summarize the relevant
laws.
-Methods that do not require prior knowledge are often severely affected by
data quality issues, and therefore require more
efficient algorithms
Outlook
Situation Prediction in a Complex Environment
The randomness and uncertainty of network attacks
determine that the change of security situation is a complex
nonlinear process
probabilistic models and machine learning models, which
have good effects on regular time series.
But it does not reflect the complex trend changes very well.
- Therefore, the mathematical model based on
causality needs further research
Reference
Springer Nature Switzerland AG 2019
X. Sun et al. (Eds.): ICAIS 2019, LNCS 11635, pp. 101–109, 2019.
https://doi.org/10.1007/978-3-030-24268-8_10
THANKS!

More Related Content

What's hot

IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET Journal
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...IJECEIAES
 
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...IJECEIAES
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...IJMER
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
Root cause analysis in complex cyber physical systems - Faults Classification
Root cause analysis in complex cyber physical systems - Faults ClassificationRoot cause analysis in complex cyber physical systems - Faults Classification
Root cause analysis in complex cyber physical systems - Faults ClassificationAlessandro Granato
 
fault localization in computer network..
fault localization in computer network..fault localization in computer network..
fault localization in computer network..CDAC PUNE
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIJCNCJournal
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET Journal
 

What's hot (19)

IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...An intrusion detection system for packet and flow based networks using deep n...
An intrusion detection system for packet and flow based networks using deep n...
 
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Root cause analysis in complex cyber physical systems - Faults Classification
Root cause analysis in complex cyber physical systems - Faults ClassificationRoot cause analysis in complex cyber physical systems - Faults Classification
Root cause analysis in complex cyber physical systems - Faults Classification
 
fault localization in computer network..
fault localization in computer network..fault localization in computer network..
fault localization in computer network..
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 

Similar to Network security situational awareness

Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxShakas Technologies
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxShakas Technologies
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxSubhrajyotiPayra
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...IJNSA Journal
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information Systemtulipbiru64
 
Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease PredictionDynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease Predictionijsrd.com
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing SystemNobre Pedro
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningIRJET Journal
 
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...Shakas Technologies
 
Switchgear and protection.
Switchgear and protection.Switchgear and protection.
Switchgear and protection.Surabhi Vasudev
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnansunanthakrishnan
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 

Similar to Network security situational awareness (20)

Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Journals analysis ppt
Journals analysis pptJournals analysis ppt
Journals analysis ppt
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information System
 
Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease PredictionDynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
Dynamic Rule Base Construction and Maintenance Scheme for Disease Prediction
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing System
 
Network Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine LearningNetwork Intrusion Detection System using Machine Learning
Network Intrusion Detection System using Machine Learning
 
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...
Privilege_Escalation_Attack_Detection_and_Mitigation_in_Cloud_Using_Machine_L...
 
Switchgear and protection.
Switchgear and protection.Switchgear and protection.
Switchgear and protection.
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnan
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 

More from Huda Seyam

Blockchain Development Kit
Blockchain Development KitBlockchain Development Kit
Blockchain Development KitHuda Seyam
 
Traffic Sign Detection
Traffic Sign Detection Traffic Sign Detection
Traffic Sign Detection Huda Seyam
 
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallDetect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallHuda Seyam
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense FirewallHuda Seyam
 
Poisson Distribution
Poisson DistributionPoisson Distribution
Poisson DistributionHuda Seyam
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacksHuda Seyam
 
Security Policy
Security PolicySecurity Policy
Security PolicyHuda Seyam
 
Course registration system
Course registration systemCourse registration system
Course registration systemHuda Seyam
 
Wireless Site Survey
Wireless Site SurveyWireless Site Survey
Wireless Site SurveyHuda Seyam
 
Image compression
Image compressionImage compression
Image compressionHuda Seyam
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition Huda Seyam
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
 
Software prototyping
Software prototyping  Software prototyping
Software prototyping Huda Seyam
 

More from Huda Seyam (14)

Blockchain Development Kit
Blockchain Development KitBlockchain Development Kit
Blockchain Development Kit
 
Traffic Sign Detection
Traffic Sign Detection Traffic Sign Detection
Traffic Sign Detection
 
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallDetect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
Poisson Distribution
Poisson DistributionPoisson Distribution
Poisson Distribution
 
Docker
DockerDocker
Docker
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
Security Policy
Security PolicySecurity Policy
Security Policy
 
Course registration system
Course registration systemCourse registration system
Course registration system
 
Wireless Site Survey
Wireless Site SurveyWireless Site Survey
Wireless Site Survey
 
Image compression
Image compressionImage compression
Image compression
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Software prototyping
Software prototyping  Software prototyping
Software prototyping
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Network security situational awareness

  • 1. A Survey of Network Security Situational Awareness Technology Huda Seyam 3/12/2019
  • 2. Objective Definition 01 Introduction Network Security Situational Awareness aspects 02 03 outlook04
  • 3. Situation awareness (SA) Endsley in 1988 from artificial intelligence is the recognition of a large number of environmental elements in time and space, understanding their meanings, and predicting their status in the near future 1988 Definition
  • 4. top-down driven mental model, divided into three main parts: perception, understanding and projection
  • 5. Situation awareness (SA) from the definition of the Joint Directors of Laboratories (JDL) is an estimate and prediction of relationships between entities - data fusion model, bottom-up Definition
  • 6. 01 02 03 2006 Tadda et al proposed evaluation indicators and methods for situational awareness systems 1999 Bass proposed a network situational awareness function model based on multi- sensor data fusion 2000 McGuinness and Foy et al. extended the fourth layer of the situational awareness model called Resolution. Resolution represents the countermeasures needed to deal with the interdependent risks in the network
  • 9. Network Element Collection Accurate and comprehensive extraction of security situation elements in the network include • static configuration information • dynamic operation information • network traffic information
  • 10. Network Element Collection Jajodia et al assessed the vulnerability of the network by collecting vulnerability information from the network Franke et al data acquired in network sensors (such as intrusion detection systems) can go directly into the data fusion process or be interpreted by decision makers. But it needs to be combined with other information, such as adding human understanding of security incidents Wang et al. proposed an anti-attack concept attack graph as a measure of security for different network configurations to give an indication of the current operation of the network
  • 11. Situational Understanding integration of relevant data to obtain a macro network security situation 02
  • 12. Situational Understanding According to Haines et al. Previous results have shown that no single control (such as IDS) can detect all network attacks fusion algorithms are divided into the following categories: • analytic hierarchy process • logical reasoning • probability analysis • rule pattern matching.
  • 13. 1. analytic hierarchy process : comprehensively consider various situational factors affecting the situation and establish several evaluation functions -The weighted average method is the most common and simple method of fusion based on mathematical models. -Chen et al proposed a hierarchical cybersecurity threat situation quantitative assessment method. There is no uniform standard for the choice of weights and the basis for stratification, most of which are based on domain knowledge or experience, and lack of objective basis Advantage Disadvantage the implementation process is relatively simple
  • 14. 2.logical reasoning : fuzzy logic inherent logic between information and integrates information Fuzzy logic is a mathematical method for people to reason about uncertain things, using fuzzy sets and fuzzy rules 1- single source data is locally evaluated, 2-The corresponding model parameters are selected, 3- The membership function is established for the local evaluation result, which is divided into corresponding fuzzy sets to realize the fuzzification of specific values, and the results are carried out. the situational classification is identified by fuzzy rule reasoning, thus completing the assessment of the current situation
  • 15. logical reasoning easy to understand, and it can reflect the network security situation very intuitively it requires a detailed analysis of the type of attack, and this analysis is very difficult Advantage Disadvantage
  • 16. 3.Probabilistic Analysis Bayesian networks and hidden Markov models are the most common methods of probability and statistics. Bayesian network uses a directed acyclic graph representation -The Bayesian Network consists of nodes which represent different situations and events, each node contains a conditional probability allocation table, to obtain new situation information
  • 17. Probabilistic Analysis Park et al. added time factors to the original network. They propose a multi-instance Bayesian network that can be analyzed over time and incorporate high-level languages to handle complex situations and uncertainties methods can fuse all data and prior knowledge, and the reasoning process is clear and easy to understand. requires a large amount of data and takes a long time in the training process has some difficulties in feature extraction and model construction Advantage Disadvantage
  • 18. 4.Rule pattern matching. to build an evaluation model based on expert knowledge and experience, and analyze the security posture of the entire network through pattern matching D-S evidence fusion method -the degree of support for the decision using the data information as evidence. Then look for a synthetic rule of evidence -finally achieves the degree of support for a certain decision and completes the process of data fusion
  • 19. Rule pattern matching need to mine the intrinsic patterns between data, which can be adapted to uncertain situations without prior information explosion of the number of associated patterns and the conflict of evidence, so it will have a great impact on the results Advantage Disadvantage
  • 20. Situational prediction predicting the development trend of the network in the future according to the historical information and current state of the network security situation 03
  • 21. Situational prediction limiting the use of traditional prediction models. - At present, network security situation prediction generally adopts methods such as neural network and time series prediction - The algorithm uses multiple associated neurons as the structure of the model, linking the inputs to the output
  • 22. Ying et al improved the BP neural network by using wavelet neural network (WNN) to predict the network situation model requires a large amount of computational power for training Advantage Disadvantage The neural network model has many parameters, strong adaptability, and good nonlinearity fitting, so it has strong robustness
  • 23. method reveals the law of network situation change with time through time series, and predicts the future situation according to this law. - Commonly used for time series are HMM algorithm, autoregressive moving average - The current situation prediction method mainly uses machine learning, which has good convergence and fault tolerance, and can handle large-scale data. - the hybrid model based on game theory is the future development direction Time series prediction
  • 24. Situational Visualization data to extract high-level situational results and display them using some visualization techniques 04
  • 25. Situational Visualization Beaver et al Visualize the attack by screening the information generated by the IDS and collecting the results of multi-source cleaning Chen et al. conducted hierarchical analysis of multiple data sources and presented them according to different categories data fusion process Phan et al. proposed a time-centric visualization system that classifies events by interacting with humans and iteratively produces visual charts.
  • 26. Outlook Fusion of Massive Data. Fusion of Massive Data is difficult the network situation understanding requires (high-quality data alarm )as a data source. Due to the detection level of IDS and various firewall systems, the alarm quality is not very high - How to extract high-quality data sources and carry out efficient and rapid integration is the future development trend -At present, deep learning has received extensive attention, and its performance and accuracy have reached a very good level. -Therefore, data fusion technology based on deep learning will develop rapidly
  • 27. Outlook Situational Understanding of Incomplete Warning The robustness of the network situational awareness system will be tested when there is an error, omission, or new type of alarm in the device that generated the data -How to face the unknown missing data is also a problem that needs to be solved -At present, some methods based on logical reasoning, probability which requires experts to analyze the entire network and summarize the relevant laws. -Methods that do not require prior knowledge are often severely affected by data quality issues, and therefore require more efficient algorithms
  • 28. Outlook Situation Prediction in a Complex Environment The randomness and uncertainty of network attacks determine that the change of security situation is a complex nonlinear process probabilistic models and machine learning models, which have good effects on regular time series. But it does not reflect the complex trend changes very well. - Therefore, the mathematical model based on causality needs further research
  • 29. Reference Springer Nature Switzerland AG 2019 X. Sun et al. (Eds.): ICAIS 2019, LNCS 11635, pp. 101–109, 2019. https://doi.org/10.1007/978-3-030-24268-8_10