2022
DOI: 10.1155/2022/2794889
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of Computer Network Security Situation Based on Association Rules Mining

Abstract: Traditional NSSA (network security situational awareness) systems have significant equipment limitations, poor data fusion capabilities, and a low level of analysis and evaluation, making them difficult to adapt to large-scale and complex network environments. This paper proposes the study of computer NSS (network security situation) prediction technology based on AR (association rules) mining to solve this problem. The support-confidence framework is improved by introducing an interest evaluation standard, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Therefore, how to effectively deal with these threats has become one of the urgent issues to be solved at present. In order to better understand the changing trends of network security posture, relevant data statistics and analysis are needed [8,9]. Through the collection and processing of historical data, some important conclusions can be obtained: first, the number of cyber attacks is on the rise year by year; second, different types of attacks are emerging and developing; finally, the complexity of attack methods is increasing.…”
Section: Computation Of Cybersecurity Posturementioning
confidence: 99%
“…Therefore, how to effectively deal with these threats has become one of the urgent issues to be solved at present. In order to better understand the changing trends of network security posture, relevant data statistics and analysis are needed [8,9]. Through the collection and processing of historical data, some important conclusions can be obtained: first, the number of cyber attacks is on the rise year by year; second, different types of attacks are emerging and developing; finally, the complexity of attack methods is increasing.…”
Section: Computation Of Cybersecurity Posturementioning
confidence: 99%
“…Consequently, the rising number of cyber security attacks, including ransomware, denial-of-service, password, and phishing attacks, led to massive data breaches and losses in several reputable financial and industrial businesses, including government and military networks. This advancement in computer networks makes people distrust enterprises, which, in turn, leads firms to mistrust traditional tools and safeguards ( Xue, Tang & Fang, 2022 ; Fedele & Roner, 2022 ; Kärkkäinen, 2015 ).…”
Section: Introductionmentioning
confidence: 99%
“…The current emphasis of cybersecurity research is to extract correlations as well as potential attacks from cyber threat intelligence information. Technologies such as correlation analysis [10], causal inference [11], and semantic reasoning [12] technologies based on knowledge modeling have evolved into novel solutions in the context of big data.…”
Section: Introductionmentioning
confidence: 99%