An Improved Prediction Model for the Network Security Situation

Jingjing Hu*, Dongyan Ma, Liu Chen, Huaizhi Yan, Changzhen Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

This research seeks to improve the long training time of traditional methods that use support vector machine (SVM) for cyber security situation prediction. This paper proposes a cyber security situation prediction model based on the MapReduce and SVM. The base classifier for this model uses an SVM. In order to find the optimal parameters of the SVM, parameter optimization is performed by the Cuckoo Search (CS). Considering the problem of time cost when a data set is too large, we choose to use MapReduce to perform distributed training on SVMs to improve training speed. Experimental results show that the SVM network security situation prediction model using MapReduce and CS has improved the accuracy and decreased the training time cost compared to the traditional SVM prediction model.

Original languageEnglish
Title of host publicationSmart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings
EditorsMeikang Qiu
PublisherSpringer
Pages22-33
Number of pages12
ISBN (Print)9783030341381
DOIs
Publication statusPublished - 2019
Event4th International Conference on Smart Computing and Communications, SmartCom 2019 - Birmingham, United Kingdom
Duration: 11 Oct 201913 Oct 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11910 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Smart Computing and Communications, SmartCom 2019
Country/TerritoryUnited Kingdom
CityBirmingham
Period11/10/1913/10/19

Keywords

  • Acceleration
  • Network security situation
  • Prediction
  • SVM

Fingerprint

Dive into the research topics of 'An Improved Prediction Model for the Network Security Situation'. Together they form a unique fingerprint.

Cite this