RESEARCH PAPER
Network security situation assessment method based on ACDAE-ResBiGRU
More details
Hide details
1
Chengdu University of Information Technology, China
Submission date: 2024-10-29
Final revision date: 2025-02-19
Acceptance date: 2025-05-28
Online publication date: 2025-07-17
Publication date: 2025-07-17
Corresponding author
jie Zhang
Chengdu University of Information Technology, China
Eksploatacja i Niezawodność – Maintenance and Reliability 2025;27(4):205696
HIGHLIGHTS
- Uses convolutional denoising autoencoder to enhance spatial representation of attack data.
- Channel attention reduces key feature loss in reconstruction improving assessment accuracy.
- Integrates residual BiGRU to mitigate information loss, boosting classification accuracy.
KEYWORDS
TOPICS
ABSTRACT
This paper tackles the limitations of traditional network security assessment methods, which suffer from weak feature representation and low classification accuracy. The proposed approach uses a convolutional denoising autoencoder (CDAE) to enhance feature extraction from attack data, with a channel attention mechanism added in the decoder to retain critical spatial information. Additionally, a BiGRU with residual connections is utilized to better extract and preserve contextual information. The network security situation is assessed by calculating a value based on attack severity and impact. Experimental results show that this method significantly outperforms existing models in accuracy, precision, recall, F1-score, and mean square error, proving its effectiveness for large-scale, high-dimensional data. This study is the first to combine CDAE, channel attention, and residual BiGRU, providing new insights into feature extraction and classification for network security. Future work may evaluate its robustness on varied datasets.
FUNDING
This research was funded by the Sichuan Science and Technology Program, Grant No.2024NSFSC0515 and No.2024ZHCG0182.
REFERENCES (22)
1.
Fan Z, Tan C, Li X. A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps[J]. International Journal of Information and Computer Security, 2021, 14(3-4): 242-262.
https://doi.org/10.1504/IJICS.....
2.
Doynikova E, Kotenko I. CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection[C]//2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP). IEEE, 2017: 346-353.
https://doi.org/10.1109/PDP.20....
3.
Lin P, Chen Y. Dynamic network security situation prediction based on bayesian attack graph and big data[C]//2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE, 2018: 992-998.
https://doi.org/10.1109/ITOEC.....
4.
Li Y, Yao S, Zhang R, et al. Analyzing host security using D‐S evidence theory and multisource information fusion[J]. International Journal of Intelligent Systems, 2021, 36(2): 1053-1068.
https://doi.org/10.1002/int.22....
5.
Alali M, Almogren A, Hassan M M, et al. Improving risk assessment model of cyber security using fuzzy logic inference system[J]. Computers & Security, 2018, 74: 323-339.
https://doi.org/10.1016/j.cose....
6.
Lin Y, Wang J, Tu Y, et al. Time-related network intrusion detection model: a deep learning method[C]//2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 2019: 1-6.
https://doi.org/10.1109/GLOBEC....
7.
Deng Z, Li Y, Zhu H, et al. Sparse stacked autoencoder network for complex system monitoring with industrial applications[J]. Chaos, Solitons & Fractals, 2020, 137:
https://doi.org/10.1016/j.chao....
8.
Yang H Y, Zhang Z X, Zhang L. Network security situation assessments with parallel feature extraction and an improved BiGRU[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 842-848. (in Chi⁃nese).
10.
Li Wangfa. Coal-rock image feature fusion and recognition method based on multi-core learning [J]. Electronic Technology and Software Engineering, 2019(07): 63-65. (in Chinese).
11.
Chakravarthi S S, Kannan R J. Non-linear dimensionality reduction-based intrusion detection using deep autoencoder[J]. International Journal of Advanced Computer Science and Applications, 2019, 10(8).
https://doi.org/10.14569/IJACS....
12.
Liu T, Qi Y, Shi L, et al. Locate-Then-Detect: Real-time Web Attack Detection via Attention-based Deep Neural Networks[C]//IJCAI. 2019: 4725-4731.
https://doi.org/10.24963/ijcai....
13.
Peng Xingwei, Yuan Lingyun. Internet of Things security situation prediction based on ADE-ABiGRU [J]. Network Security and Data Governance, 2023,42 (12): 48-53.
14.
Qin Z, Chang Q, Li Q, et al. Research on Abnormal Feature Extraction and Early Fault Alarm Method of Rolling Bearings Based on CDAE and KLD[J]. International Journal of Acoustics & Vibration, 2023, 28(2).
https://doi.org/10.20855/ijav.....
15.
Zhang J. Music genre classification with ResNet and BiGRU using visual spectrograms[J]. arXiv preprint arXiv:2307.10773, 2023.
16.
Chorney W, Wang H, He L, et al. Convolutional block attention autoencoder for denoising electrocardiograms[J]. Biomedical Signal Processing and Control, 2023, 86:
https://doi.org/10.1016/j.bspc....
17.
Wang Q, Wu B, Zhu P, et al. ECA-Net: Efficient channel attention for deep convolutional neural networks[C]//Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020: 11534-11542.
https://doi.org/10.1109/CVPR42....
18.
Xiaowu Liu, Huiqiang Wang, Hong'wu Lv,et al.. Fusion-based cognitive awareness-control model for network security situation[J]. Journal of Software, 2016, 27(8): 2099-2114.
20.
Xi Rongrong, Yun Xiaochun, ZHANG Yongzheng. Quantitative threat situational assessment based on contextual information[J]. Journal of Software, 2015, 26(7): 1638-1649.
21.
Chen Lisha, ZHANG Fengli, WANG Juan. Construction of network security situation evaluation index system [J]. Journal of Chongqing University of Science and Technology: Natural Science Edition, 2008, 10(3): 135-137.
22.
The State Department. National General Emergency Plan for Public Emergencies [M]. Beijing: China Legal Publishing House, 2006.