Cargando…

The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security

In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memor...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Shi, Yang, Ma, Lu, Yan, Chen, Liquan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9529467/
https://www.ncbi.nlm.nih.gov/pubmed/36199962
http://dx.doi.org/10.1155/2022/5490779
_version_ 1784801500917137408
author Lin, Shi
Yang, Ma
Lu, Yan
Chen, Liquan
author_facet Lin, Shi
Yang, Ma
Lu, Yan
Chen, Liquan
author_sort Lin, Shi
collection PubMed
description In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memory network to build AutoEncoder, extracts text features of page response data of horizontal transgression scenario, and reconstructs text features to restore. Meanwhile, it counts the error between the restored result and the original page response, judges whether the detection result of horizontal transgression is false alarm according to the error threshold of unknown page, and tests the effectiveness of the model effect under real business data by comparing it with other two algorithms, one-class SVM and AutoEncoder, which provides security for enterprise network business. The results show that the LSTM-AutoEncoder model achieves a more balanced index in terms of accuracy, precision, recall, and F1-score in the case of MAE, which is 0.3% more and 0.2% more than the case of MSE in terms of recall and accuracy. It is concluded that the LSTM-AutoEncoder model is more in line with the real business requirements, and the simple model architecture selected for this study can reduce the complexity of the model, speed up the prediction time of the model in the application phase, and improve the performance of the detection software. This indicates that this study has some application prospects in network security.
format Online
Article
Text
id pubmed-9529467
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-95294672022-10-04 The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security Lin, Shi Yang, Ma Lu, Yan Chen, Liquan Comput Intell Neurosci Research Article In order to address the false alarm detection problem caused by the inability to identify the transgression scene pages in the process of horizontal transgression detection, this study proposes a deep learning-based LSTM-AutoEncoder unsupervised prediction model. The model uses long short-term memory network to build AutoEncoder, extracts text features of page response data of horizontal transgression scenario, and reconstructs text features to restore. Meanwhile, it counts the error between the restored result and the original page response, judges whether the detection result of horizontal transgression is false alarm according to the error threshold of unknown page, and tests the effectiveness of the model effect under real business data by comparing it with other two algorithms, one-class SVM and AutoEncoder, which provides security for enterprise network business. The results show that the LSTM-AutoEncoder model achieves a more balanced index in terms of accuracy, precision, recall, and F1-score in the case of MAE, which is 0.3% more and 0.2% more than the case of MSE in terms of recall and accuracy. It is concluded that the LSTM-AutoEncoder model is more in line with the real business requirements, and the simple model architecture selected for this study can reduce the complexity of the model, speed up the prediction time of the model in the application phase, and improve the performance of the detection software. This indicates that this study has some application prospects in network security. Hindawi 2022-09-26 /pmc/articles/PMC9529467/ /pubmed/36199962 http://dx.doi.org/10.1155/2022/5490779 Text en Copyright © 2022 Shi Lin et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Lin, Shi
Yang, Ma
Lu, Yan
Chen, Liquan
The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title_full The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title_fullStr The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title_full_unstemmed The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title_short The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
title_sort application of computer intelligence in the cyber-physical business system integration in network security
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9529467/
https://www.ncbi.nlm.nih.gov/pubmed/36199962
http://dx.doi.org/10.1155/2022/5490779
work_keys_str_mv AT linshi theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT yangma theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT luyan theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT chenliquan theapplicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT linshi applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT yangma applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT luyan applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity
AT chenliquan applicationofcomputerintelligenceinthecyberphysicalbusinesssystemintegrationinnetworksecurity