Cargando…
The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memor...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9529467/ https://www.ncbi.nlm.nih.gov/pubmed/36199962 http://dx.doi.org/10.1155/2022/5490779 |
_version_ | 1784801500917137408 |
---|---|
author | Lin, Shi Yang, Ma Lu, Yan Chen, Liquan |
author_facet | Lin, Shi Yang, Ma Lu, Yan Chen, Liquan |
author_sort | Lin, Shi |
collection | PubMed |
description | In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memory network to build AutoEncoder, extracts text features of page response data of horizontal transgression scenario, and reconstructs text features to restore. Meanwhile, it counts the error between the restored result and the original page response, judges whether the detection result of horizontal transgression is false alarm according to the error threshold of unknown page, and tests the effectiveness of the model effect under real business data by comparing it with other two algorithms, one-class SVM and AutoEncoder, which provides security for enterprise network business. The results show that the LSTM-AutoEncoder model achieves a more balanced index in terms of accuracy, precision, recall, and F1-score in the case of MAE, which is 0.3% more and 0.2% more than the case of MSE in terms of recall and accuracy. It is concluded that the LSTM-AutoEncoder model is more in line with the real business requirements, and the simple model architecture selected for this study can reduce the complexity of the model, speed up the prediction time of the model in the application phase, and improve the performance of the detection software. This indicates that this study has some application prospects in network security. |
format | Online Article Text |
id | pubmed-9529467 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-95294672022-10-04 The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security Lin, Shi Yang, Ma Lu, Yan Chen, Liquan Comput Intell Neurosci Research Article In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memory network to build AutoEncoder, extracts text features of page response data of horizontal transgression scenario, and reconstructs text features to restore. Meanwhile, it counts the error between the restored result and the original page response, judges whether the detection result of horizontal transgression is false alarm according to the error threshold of unknown page, and tests the effectiveness of the model effect under real business data by comparing it with other two algorithms, one-class SVM and AutoEncoder, which provides security for enterprise network business. The results show that the LSTM-AutoEncoder model achieves a more balanced index in terms of accuracy, precision, recall, and F1-score in the case of MAE, which is 0.3% more and 0.2% more than the case of MSE in terms of recall and accuracy. It is concluded that the LSTM-AutoEncoder model is more in line with the real business requirements, and the simple model architecture selected for this study can reduce the complexity of the model, speed up the prediction time of the model in the application phase, and improve the performance of the detection software. This indicates that this study has some application prospects in network security. Hindawi 2022-09-26 /pmc/articles/PMC9529467/ /pubmed/36199962 http://dx.doi.org/10.1155/2022/5490779 Text en Copyright © 2022 Shi Lin et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Lin, Shi Yang, Ma Lu, Yan Chen, Liquan The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title | The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title_full | The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title_fullStr | The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title_full_unstemmed | The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title_short | The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security |
title_sort | application of computer intelligence in the cyber-physical business system integration in network security |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9529467/ https://www.ncbi.nlm.nih.gov/pubmed/36199962 http://dx.doi.org/10.1155/2022/5490779 |
work_keys_str_mv | AT linshi theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT yangma theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT luyan theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT chenliquan theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT linshi applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT yangma applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT luyan applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity AT chenliquan applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity |