Abstract
Communication network security situation analysis prevents unauthorized users from accessing and stealing sensitive information. Network security analysis aims to monitor, discover, and eradicate security flaws by carefully examining the network’s architecture, data, and traffic to ensure safety. In time series data mining analysis by cyber terrorism, specialists must pay attention to cyber security, which involves identifying the elements contributing to long-term trends or systemic patterns via pattern-matching algorithms and other types of inferential processing on large datasets. The challenging characteristics of communication network security situation analysis are data loss, security breaches, hacking, and viruses. Hence, in this research, attention mechanism-based convolutional neural network-enabled practical byzantine fault tolerant (AMBCNN-PBFT) has been designed to improve communication network security situation analysis in time series data mining. AMBCNN-PBFT helps to increase communication network security usage and support the expansion during the evaluation system by optimizing the time series data mining. AMBCNN-PBFT effectively predicts the rise in the communication network, associated with faster times series benefits data mining approach. The study concludes that the AMBCNN-PBFT efficiently indicates and validates the communication network security in time series data mining during the evaluation system. The experimental analysis of AMBCNN-PBFT outperforms the data mining time series in terms of accuracy, efficiency, performance, and prediction.
1 Overview of communication network security situation analysis, usage, and its impact
Recently, information security has focused on securing information systems, communications, and network security. Communication and network security underlie information system security, whether micro-segmentation, Wi-Fi networks, or even a user’s voice [1]. Protecting sensitive information and keeping the grid reliable and available in the face of cyber-attacks make network security a top priority. Protecting users and businesses from Malware and cyberattacks like distributed denial of service (DDoS) needs a comprehensive network security plan that integrates a wide range of security solutions [2]. In addition to preventing unauthorized access to private information, network security is crucial for preventing service disruptions and attacks.
The first step is to prevent unauthorized access to any sensitive information. Cybercriminals are always searching for new ways into a system, so they may steal or exploit sensitive information for their ends. Firewalls, encryption, and other stringent security measures protect private information from prying eyes.
It is critical for companies and users that a network’s dependability and functionality be preserved. Downtime and financial loss can result from cyber-attacks like malware and DDoS, interrupting operations and slowing down systems. Companies and users should deploy security measures, including intrusion detection and prevention systems, to protect their networks from intrusions.
Layers of defense protect against different types of attacks and are a common component of effective network security strategies. Firewalls, antivirus programs, encryption, access controls, and monitoring tools are all security measures that can be implemented to identify and prevent intrusions.
Network security is fundamental to safeguard private information and guarantee the continued success of a network. Security measures must be effectively implemented to protect the network and its users from the many cyber threats.
Understanding the overall network’s security condition, seeing faults and aberrant activity on the present web, and providing comments or improvements are all aided by network security personnel’s situational analysis for data transmission, data loss, idealized layout for guaranteeing safety, supplementary checking, and passively defense, active analyzing and strategy development, and generalized perceiving and trend forecasting [3]. Authentication and authorization are critical in maintaining secure communication among users in the business. They first check the identity of the communicating parties before granting various degrees of access to an application [4,5]. Authentication ensures that only the intended user or entity can access a protected resource. This can be accomplished in several methods, including using passwords and other forms of cryptographic protection, biometric data, and multifactor authentication. Only authorized users can access protected data within the system because of the authentication process.
Authorization is the procedure by which the system decides what privileges to grant a user after confirming the user’s identification. Authorization is checking a user’s credentials to ensure they have the right to do what they want in the system. Role-based access control and similar technologies are available for this purpose.
The solution helps to safeguard sensitive data and preserve privacy in corporate communications by combining authentication and authorization to ensure that only authorized users are permitted access to particular levels of an application.
Two-factor authentication and two-factor authorization are crucial parts of any communication security system. A user’s identity can be confirmed through authentication, and their access privileges can be set through authorization. Combining these procedures allows a system to restrict access to restricted data or operations to approved users exclusively, protecting confidential company information.
Data that travel via an organization’s network is often sensitive, necessitating an efficient and secure platform. To detect and prevent possible attacks in real time, network security solutions must cope with vast amounts of detailed data [6].
The Internet is a cyber environment where the number of users is steadily expanding due to the many options available and where access may be assured using information technologies [7]. As computer networks and the Internet continue to spread, many individuals can join in the action. Because of this, the cyber community has seen a dramatic increase in its user base, which presents opportunities and threats.
More people having access to the Internet means more people can share and learn from knowledge and ideas regardless of their physical location. As a result, there is more opportunity for people to learn from one another and work together.
Cybercrime, online harassment, and identity theft have all increased along with the rise in the number of people using the Internet. There is a growing risk of cybercriminals gaining unauthorized access to sensitive information as more people share personal data and conduct activities online.
Strong cyber security measures to guard private information and forestall illegal access are crucial for reducing these dangers. Implementing policies and procedures to educate users on safe online practices, detect and respond to security issues, and use strong passwords, multifactor authentication, encryption, and security software are all examples.
A larger user base in the cyber environment has had many positive effects, but the risks associated with participating in online activities have also grown. To keep private information safe from prying eyes in today’s ever-changing digital environment, it is crucial to implement solid cyber security measures.
When developing a network attack plan, the attacker lacks complete, trustworthy, and real-time assault information, making it difficult to carry out an attack. A complicated scientific network assault approach is developed to overcome this problem [8]. Security breaches and suspicious activity in a network can be investigated with the help of intrusion detection. Establishing a reliable identification system for spotting intrusions or other malicious actions can protect the system, allowing for safe and reliable end-to-end communication [9].
Figure 1 illustrates that let
Data mining can be used for safety modeling forecasting in a network before wrapping up with a look at how equipment for gathering security settings and data mining are related and finally presenting the data mining-based software for monitoring and maintaining network safety in computer systems [10,11]. A technique for its extraction is presented to comprehend better the network security situation, a network to the dynamic nature of information security alert data [12].
1.1 Time series data mining algorithm
Attacks on time series data mining jobs defined and formalized.
Application of PBFT-based attacks to time series data, including transfer and adaptation.
Various applications demonstrate the relevance of these kinds of attacks to the protection of operational networks.
Create an adversarial time series with the Ubuntu Linux open-source framework.
The input dataset contains t = t1, t2, tn, and all the characteristics.
Results: A fresh dataset
Separating time series
Make sets of time series data in the shape of a triangle
Provide the membership function’s intervals
Set Fuzzy Get Time
Partitioning Attributes 5
Repeat
Collect k cluster centers’ properties using AMBCNN-PBFT
Designate k cluster centers as adversaries
Get currency rates using techniques from time series data mining
Until all qualities are divided
Create a new dataset comprised time series by aligning existing ones
Revert the time series dataset
Convolutional neural network (CNN) units are based on an attention mechanism to pick up on crucial fine-grained characteristics, avoid losing data, and have issues with gradient dispersion. In addition, this model keeps the benefits of communication network security in making predictions across time series data [13]. The deep learning model, a CNN, is extensively utilized in image recognition and data analysis. CNNs use convolutional layers to find relevant aspects of data and combine them into a single input representation.
To boost CNNs’ performance and accuracy, attention methods have recently been incorporated into them. This is especially true for tasks that demand the detection of fine-grained important attributes. The model can avoid problems with data loss and gradient dispersion by paying attention only to the most significant aspects of the input data [14].
This method can preserve the benefits of encrypted communication channels while processing time series data. This is because the model can zero in on the most crucial moments and ignore the rest, thanks to the attention mechanism. Applications such as financial analysis, medical diagnosis, and speech recognition all rely heavily on time series data; thus, this may be quite helpful.
For tasks that require the identification of fine-grained important qualities, the accuracy and performance of deep learning models can be greatly enhanced by integrating an attention mechanism into CNN units. When extrapolating across time series data, this method can keep the benefits of secure communication networks [15].
With the present network security situation gradually worsening, hostile attack traffic overwhelms the whole network setting, and the existing malevolent traffic detection model is inadequate in detection efficacy and performance. For the model to increase the throughput per unit period to fulfill its detection efficacy, this study presents a data-processing approach that separates the flow information into a data flow segment [16].
Security ingredients for a particular consensus algorithm to accomplish byzantine fault tolerance, liveness, and safety. In contexts where malevolent actors or network outages are possible, consensus procedures are crucial for maintaining the safety and efficiency of any distributed system.
Byzantine fault tolerance, often known as the ability of a system to continue functioning correctly despite the failure or compromise of some of its nodes, is an essential part of many consensus approaches. To prevent failures or malicious activity, redundant nodes are used.
Consensus approaches also need to be real-time and secure. Safeness relates to the system’s ability to ensure that all nodes agree on the same conclusion and that no conflicting decisions are made, while liveness refers to the system’s ability to make progress and achieve a resolution in a timely way [18].
A new type of Byzantine fault-tolerant, live, and secure consensus mechanism called attention mechanism-based convolutional neural network-enabled practical Byzantine fault tolerant (AMBCNN-PBFT) has been developed to address these issues.
Validating these algorithms’ safety and ensuring they perform as expected is essential since any defect in the consensus mechanism could endanger the entire system. Typical methods include exhaustive testing and auditing, constant monitoring, and updates to fix any newly discovered security holes.
Any consensus mechanism utilized in distributed systems must guarantee Byzantine fault tolerance, liveness, and safety. Testing and double-checking these algorithms for safety and efficiency is essential to keep the system safe from faults and vulnerabilities.
The security and performance of a system depend on the consensus algorithm used. Hence, ensuring and verifying such algorithms’ security is essential [19]. Communication network involves an awareness of all the security suppositions that create such algorithms right and byzantine fault tolerants [20].
Based on the aforementioned discussion, the challenging characteristic to improve the communication network security situation analysis using the attention mechanism-based convolutional neural network-enabled practical Byzantine fault-tolerant (AMBCNN-PBFT) has been designed, and the contribution has been listed [21].
1.2 The main objectives of the article
To analyze the security state in a communication network and provide a flowchart detailing its overall architecture.
Since problems with data loss, security breaches, hacking, and viruses might be communication network security issues elsewhere in the body, network safety needs to be improved with this clever block structure based on an evaluation index system for time series data mining.
The PBFT in the communication network security situation analysis is built on trusted events development that eliminates information and development paths.
The attention mechanism-based convolutional neural network enabled practical Byzantine fault tolerant (AMBCNN-PBFT) has been designed and developed for communication network security situation analysis.
The remaining study is set up as follows: Section 2 is devoted to a survey of appropriate works on studies that analyze the effectiveness of the current approach, Section 3 proposes a strategy for AMBCNN-PBFT and its impacts, Section 4 offers experimental analysis, and Section 5 provides a conclusion along with future perspectives.
2 Impacts and implications of communication network security situation analysis
Yang et al. [22] provide a method for evaluating cybersecurity scenarios using deep antagonistic learning to address the limited performance and adaptability of conventional approaches to assessing network security in the face of a vast volume of data describing network attacks. First, a model of a deep auto encoder-deep neural network is created using a deep autoencoder (DAE). A DAE network is used to classify network threats after doing feature learning on DAE networks. By adjusting the training weights, this work creates an adversarial training process that considers the outcomes of feature learning in DAE throughout the training phase. Compared to existing models, the suggested one is more precise in identifying network attacks and more adaptable in evaluating the network’s state.
Zhang et al. [23] proposed that multi-agent systems (MASs) consist of a collection of autonomous intelligent agents, each of which can gather information, share it, process it, and make decisions on its own. One of the most influential variables on the efficacy of cooperation and coordination is the quality of information exchange between agents. The purpose of this article is to provide a detailed study of recent results on the protection evaluation and synthesis of MASs caused by physical faults and cyber-attacks, including but not limited to fault assessment, sensing, prognosis, and failure regulate of MASs; Internet detectors; and safe power of MASs topic to two Internets. Finally, the report closes with a few suggestions for future research subjects on the security concerns of MASs.
Djenna et al. [24] explained that the Internet of things (IoTs) has emerged as a leading and very promising paradigm for cybercriminals; however, they see IoT-based critical infrastructures as a juicy target. Unique infrastructures like this are more vulnerable to cyber threats and under constant assault. As a result, this research critically examines the most current cybersecurity vulnerabilities for IoT-based critical infrastructures to identify potential solutions. Then, various kinds of cyber threats and vulnerabilities and the practical methods that cybercriminals use to exploit such flaws are discussed. In addition, it gives a taxonomy of potential assaults on virtual computer networks. Finally, discuss security needs and practical suggestions for enhancing cybersecurity solutions.
Safaei et al. [25] explained the usefulness of monitoring, communicating, and reporting on certain physical occurrences in wireless sensor networks (WSNs), which have lately gained more interest across the globe. Due to noise, signal weakness, or even intentional intrusion assaults, the data acquired by WSNs are frequently erroneous. Only a few outlier-detection methods using time series analysis that consider the influential neighbors to guarantee a global collaborative detection have been published in the setting of WSNs. The results of the experiment design and the way it is run show that the method can accurately identify abnormalities.
Ahirwar et al. [26] discussed the clustering using a chaotic biogeography-based optimization with information entropy (CBO-IE) method. The primary goal of CBO-IE is to start the population using chaos theory and then use information entropy ideas to distribute data points in datasets professionally and accurately. Datasets demonstrate the superior performance of CBO-IE over previous clustering techniques; the results are measured using statistics, analytics, the median average squared mistake, precision, and variance F-measure correlation length clock speed difficulty purity index.
Sarker [27] detailed that the intelligent cybersecurity systems or policies to operate artificial neural networks (ANN) are a crucial technology. The wide variety of cybersecurity problems can be intelligently tackled by employing standard deep learning methods such as inter perceptrons, convolutional, perceptron, long short-term memories, ego maps, auto-encoders, confined Boltzmann machines, fully connected channels, formative confrontational systems, depths algorithms, multiple kernel learning, outfits, and metaheuristic. The study concludes with a discussion of numerous open questions and potential avenues for further investigation. When everything is said and done, this study aims to provide a set of principles and pointers for academics and cyber industry experts, particularly those working in deep learning.
Zhang et al. [28] proposed an LSTM-DT model for knowing the state of affairs in computer networks, which incorporates risk management signals and quantifiable methodologies to better understand attacker behavior and explain the network’s current condition. This study adds the notion of attack probability, improving network prediction findings’ accuracy. The model employs the decision tree algorithm (DT) and long short-term memory (LSTM) networks to address the issue of assessing the security of a network over time. This article’s main contribution is a revised explanation of the primary data set’s underlying network state of affairs. Just “attack” and “normal” appear on the original label. The experimental results demonstrate that the suggested approach for network situation awareness can be achieved while recognizing attacks. Compared to previous study findings, discussing complicated network environment challenges has a more noticeable impact.
Ahmed [29] estimated the consequences of cyber security threats on long-term economic development using information and communications technology (ICT). Three productivity frameworks and models were established to quantify the negative externalities spillover effects of cybersecurity in ICT on sustainable economic development. To remove any lingering doubt about the combined methods’ ability to produce reliable results, the models were broken down into two stages: first, a growth accounting approach was developed to provide parametric solutions, and then, in a second stage, a gap between the econometric practice and the calculation of productivity indicators was filled. The most important thing that this study adds is a methodology and model for measuring capital productivity that has been overlooked by previous research and that treats the adverse externality spillover effects of ICT cybersecurity as if pollution emissions created them.
Poongodi et al. [17] discussed that individuals all around the globe are drawn to cryptocurrencies because of their decentralized and anonymous character. The primary goal of cryptocurrency studies is to locate ether and foretell its price by analyzing the past inflationary price pressure of currencies. This study employs linear regression and support vector machine (SVM) to estimate the cost of ether utilizing a historical data set of ether’s daily closing values. The suggested model improves the accuracy of the SVM approach. In addition, using more features in the SVM procedure may raise the proposed model’s accuracy score to be high.
Tao et al. [30] introduced the stack auto encoding-enabled back propagation neural network SAE-BPNN method for networks. The primary function of network security situational awareness is situational assessment, which may acquire security scenarios by thoroughly studying different aspects affecting network status. Next, a back propagation neural network will be fed the low-dimensional data produced by the hidden layer of the stack auto-encoding network. Next, a neural network approach based on backpropagation is used to evaluate network security. Finally, a huge number of tests are run to confirm the efficiency of the suggested strategy.
From the aforementioned discussion, challenging features like data loss, security breaches, hacking, and virusesare taken into deliberation as the importance has not been predicted using time series data mining [23,24,25,27,31]. Further, this research discusses the attention mechanism-based convolutional neural network enabled practical Byzantine fault tolerant (AMBCNN-PBFT), which helps improve the communication network security situation analysis regarding accuracy, performance, prediction rate, and efficiency.
3 Attention mechanism-based convolutional neural network-enabled practical Byzantine fault tolerant and its discussion
A regular functioning distributed system with no Byzantine nodes is required for the standard distributed consistency method to operate (such as malicious tampering with data and transmitting fake messages). A Byzantine network requires an error-tolerant approach to address the data consistency issue. Therefore, this kind of method is a Byzantine fault-tolerant distributed consensus algorithm. The general architecture of the communication network security situation analysis is discussed further in this section.
Figure 2 illustrates that communications security ensures that no unauthorized parties have access to any information being sent or received electronically. The wide range of fields, such as information, is protected when encrypted and unreadable until decoded. To keep network information technology safe from intrusion, hacking, and other forms of damage, you need to implement and keep an eye on a series of cybersecurity solutions. Coverage extends to guidelines on how private data should be handled. The following measures may be taken to increase network security: decomposing a network into smaller parts. Host threat means an assault on a computer to steal its data. Password assaults are a kind of host threat. It was a break-in without permission. Without adequate cyber security safeguards and constant monitoring, network information technology (IT) is at risk of incursion, hacking, and other forms of damage.
The IP address and information regarding the domain name system server, subnet mask, default gateway are provided by the institution to the customer solely to configure the customer equipment and software to obtain access to the services is considered configuration information.
This is because the most network IT systems are linked to the Internet, making them open to cyber-attacks from criminals anywhere globally. Networked IT systems are open to numerous risks without adequate cyber security precautions.
Viruses, worms, and Trojan horses are all examples of malware that can infect a network’s IT system and destroy files, programs, and hardware.
Phishing is an attack method whereby the attacker masquerades as a trusted entity to entice the victim into disclosing personal information or downloading malicious software.
DoS represents “denial of service” and DDoS represents “distributed denial of service,” respectively. To disable a network’s IT system, these attacks flood it with so much data that it crashes.
Attempts to gain unauthorized access to a networked IT system are known as password attacks, and they typically entail guessing or stealing passwords.
Network IT systems can be protected from these and other dangers using cyber security solutions like firewalls, encryption, intrusion detection and prevention systems, multi-factor authentication, and frequent software upgrades and patches. Regular security audits can help pinpoint security holes that need fixing and educate users on how to avoid them.
Network IT systems are open to cyber threats if effective cyber security measures are not implemented and managed. Protecting sensitive data and avoiding unauthorized access and harm to network IT systems require sophisticated cybersecurity techniques and practices.
Data loss, net flow monitoring, and filtering devices can enforce an organization’s security policies. Inspections for malware sift through hardware and software to identify and eliminate any harmful antivirus scanning system. Most antivirus programers have a firewall that blocks malicious software. Viruses, worms, spyware, Trojans, ransomware, and adware are all examples of such dangers. Configuring information in a network entails establishing its parameters, policies, flows, and controls. Eliminating the need for lengthy manual setup during network configuration changes is one of the primary benefits of a virtual network, in which software is part of physical network equipment and appliances. Data transmission is sending information from one computing, network, communication, or electronic device to another over some transmission medium. The system supports device handoff and communication in a p2p, m2m, and np2p network topology. Using a sub-network, an IP address is broken down into its parts – the network address and the host address. After segmenting a network’s speech, subnet masking can further allocate addresses to specific devices. A penetration test is a simulated cyberattack carried out by professional hacker consultants inside a company to seek out and expose any vulnerabilities in the network’s defenses in loopholes.
All the problems that the residents of a fragile area has tend to pile up on one another. It is not easy to reduce a community’s fragility to a single indicator, such as its water supply or the quality of its school system. After all guest operating systems have been removed from a host computer, the host’s icon will change to reflect that it is now undergoing maintenance. A message to that effect will appear in the host’s summary panel. The central processing unit (CPU) is the brain of the operation and controls how fast the hardware can handle data. The speed of a CPU is commonly measured in megahertz (MHz) or gigahertz (GHz). Information saved on hardware and utilized by a computer system is what is meant by “software protection.” It is commonly accepted that “protecting software” includes securing algorithms, code, and user interfaces. In computing and networking, the term “configuration” refers to the characteristics of a system’s hardware and software, such as the number and types of devices linked, the system’s ability and capacity, and the components that make it up. The topology of a network is typically referred to as its configuration. From Figure 2, communication network security situation is not founts to predict.
Figure 3 illustrates that data collection and preparation comprise the bulk of gathering information, focused on collecting as much relevant security data as possible. A scanning device, sensing apparatus, or a specialized programer may gather configuration data from information about the system, user activity, and potential security flaws to effectively store data. Before any data modeling, analysis, or use, there must be a “data preparation” procedure to standardize the raw data. The model representation phase focuses on removing unnecessary parts and the formal representation of the remaining effective ones. Efficient analysis requires effectively reducing objects obtained when elements are being acquired, and this reduction is dependent on the analysis’s purpose. The qualities of the reduced components, the connection between the details, and the order relationship are all referred to in the traditional formulation, describing the precision abstraction process. Confirmation of the evaluation index system is the process of regularizing the logical connection between the attribute values of the elements. In contrast, the quantitative approach assigns numerical values to each element’s attributes. (Qualitative categorization is explained away in this study and instead viewed as a particular case of quantitative categorization.)
The analysis phase may be determined using the solution algorithm, which merges the goal with the model and metric. The algorithm’s inputs and outputs must match up correctly to be considered accurate. As such, it is essential to consider boosting the algorithm’s efficiency to grow in a real-world network setting.
Comprehensive assessment and decision-making based on analytical findings characterize the process of situation prediction, which consists primarily of two tasks: the display of results and the making of decisions after applying knowledge. The result visualization process presents and builds the solutions’ outcomes. A perceptual loop will be completed when the analysis results and conclusions are used in the existing network to strengthen cybersecurity measures (such as patching security holes and updating settings). Thus, factors that primarily impact the time series mining data to improve network safety are to be forecasted; then better performance is deliberated as follows.
Figure 4 illustrates that data mining technology has evolved over the last several years with the steady enhancement of enormous datasets. Big data technology necessitates the use of more traditional than interdisciplinary approaches. In practical applications, it is commonly used in tandem with other technologies, such as artificial intelligence, big data, and machine learning. When seen through the marketplace lens, data mining technology has shown its worth and will likely be used in various new applications shortly. Information acceptance and use research presents serious threats, especially in networking data security online privacy; however, web usage mining has not yet reached the level of mature use. This piece aims to look at data mining techniques for the problem of information security maintenance on computer networks, with the ultimate goal of providing a range of services to this end. In Figure 3, data mining is in action to improve network safety. Data mining is an essential technique that should not be overlooked. Data mining uses computer algorithms to discover patterns in vast datasets that otherwise would be impossible to find. Thus, from the aforementioned discussion, PBET is presented to resolve all the issues, which is primarily a communication network security situation analysis; it has been discussed as follows.
Figure 5 illustrates client information security and privacy protection may be challenging to implement in a complex and large-scale network environment if security protection measures are not planned and deployed cohesively. Traditional security methods sometimes fall short when dealing with vast amounts of data. One must quickly grasp all safety information from a large and complicated distributed system, comprehend the situation from the network’s point of view, assess and forecast its development trend, successfully deal with different security risks, and enhance system safety performance and self-protection abilities. Figure 5 is a graphical representation of the technological architecture for network security situational awareness.
The data used to understand the state of network security originate in a wide range of security systems, each of which generates its unique set of security-related events and data. If these data were to be used directly for risk assessment and prediction, the sheer volume of it would present significant processing challenges. The processing results, especially in real-time, are affected. Integration processes like reduction, merging, and integration cannot be carried out without data pretreatment on the original data set. Therefore, data fusion is a crucial component related to being alert to potential cyber threats, as it is the sole method for efficiently condensing and refining safety information data, providing a solid platform for evaluating security posture and threats. However, enormous, cross-domain, heterogeneous, and dispersed data are hallmarks of network security situational awareness; when applied to a large-scale network environment, standard data fusion technology for situational awareness face significant obstacles and problems. To better manage the network and improve its early warning capability, the network security cognitive process uses timely data gathering and processing to track the show’s security status changes. The aforementioned discussion on the construction of an industrial supply chain in the pathway for AMBCNN-PBFT helps to predict the time series data mining evaluation as influenced by data loss, security breaches, hacking, and viruses, as discussed: AMBCNN-PBFT activation functions may be seen as the gathering of transfer function employed to generate the anticipated output based on inputs and feedbacks, efficiently determining the building of communication network security situation analysis. The existing literature [19,20,22,23] presented that this communication network security situation analysis had not been efficiently foreseen and confirmed. Hence, this study has encompassed AMBCNN-enabled PBFT, which aids in indicating the communication network security situation analysis growth factor efficiently, which is deliberated as follows.
3.1 AMBCNN-PBFT steps
Step 1: The communication network security situation analysis information step is much more critical than it initially seems.
Step 2: Large amounts of data generated by network security form the basis of the evaluation index approach utilized.
Step 3: The belief in the communication network security situation analysis eradicates time series data mining and PBFT. Data loss, security breaches, hacking, and virus issues are problematic.
Step 4: The purpose of creating the AMBCNN-PBFT was to verify an existing communication network security situation analysis platform that outcomes in the network awareness center.
Figure 6 illustrates the official categorization criteria for information security events; this study then evaluates the needs of the present network security scenario and the type, triggers, and mechanisms of network security incidents. The study concludes with a unique downward categorization system for network security events, distinguishing between harmful programmer and network attack incidents in information security incidents. To temporarily or permanently deny users access to a networked computer or its associated resources, an attacker may launch a denial-of-service assault. The term “backdoor attack” refers to a specific kind of hack that takes advantage of vulnerabilities in computer networks. These flaws may result from malicious intent or simple oversight and may be caused by sloppy design, buggy programming, or Malware. Malware and unauthorized access to networks or data are common goals of backdoor attacks. When many computers or other Internet-connected devices are compromised by malicious software and used in an attack, this is called a botnet attack. Firewalls prevent malicious software or hacking attempts from entering a system by screening incoming data for dangerous or unneeded content. A firewall’s other function is to block unauthorized network or Internet-based software from infiltrating a system.
AMBCNN-PBET technology is a step up from the computer review system, and it can assist in creating safe, adequate protection for the computer’s inner workings. To lower the risk coefficient, this system’s primary purpose is to perform computer virus infestation in real time, providing early warnings and notifications when security concerns occur and taking corrective action as needed. Its core features are data and information collecting, analysis, and reaction modules. Data mining for decisions and rules of the association is used extensively to fulfill the system’s basic business logic: similarity and dissimilarity are two characteristics of this system. The system database may find some properties matching the linked function knowledge category. This defensive system’s linked feature is whether the discovered data are connected to the original data; if so, then the presence of a virus has been confirmed. Heterogeneous data, often known as outliers, refer to information that stands out because it has characteristics that deviate from the norm. While heterogeneous data will present some unique challenges to analysts, it will not provide any extra insights to end users. Garbage data do not add value to the user experience, but there are always some data that do this task.
As shown in expression (2),
The time series sigmoid activation functions are hidden layer’s activation functions in every situation, as shown in expression (3).
The activation functions
As shown in expressions (3) and (4),
As shown in equation (5),
Figure 7 shows the CNN model for network security prediction. This study acquired the upgrading of network attacks and increased network security information. To begin, the connections between the features are calculated using correlation coefficients. The correlation coefficients are then arranged in a descending order, and the study groups the data by column. To learn and rebuild features, this study next creates a 1D groups CNN model with numerous 1D convolution kernel and 1D pooling filter. The convolution kernel and pooling filter are organized into groups in each convolution layer and pooling layer. Third, the network security prediction shadow learning models are supplied with the reconstructed features. Reconstruction feature dimensions for each class are set by the fully connected layer. Finally, the suggested CNN model predicts the network security, accuracy, efficiency, and performance analysis. The time series of network security utilizing CNN and heterogeneous reorganization together with matched filtering and time series analysis has been reconstructed.
4 Result and discussion
The research concludes that the AMBCNN-PBFT efficiently forecasts and validates the communication network security situation analysis compared with the time series data mining method based on prediction ratio, performance, efficiency, and accuracy, which are discussed. The selected software for network security is Ubuntu Linux and domain operating system (OS). The data collection period is 2005–2021, and the total number of vulnerabilities is 361.
4.1 Dataset description
Ten attackers in the firewall through network security are taken from the study titled “Cyber-security Modbus ICS Dataset” [32] for this experimental analysis. The report on network security notes that the rising popularity of communication is one of the key factors fueling the market’s expansion. As a result of this factor, numerous expansion prospects should open up, and market vendors should be enticed to make substantial investments. To anticipate future events that will occur at a later point in time, a method known as “time series data mining” has been developed. It forecasts the future based on the presumption that those trends would be consistent with their predecessors.
where
Figure 8 illustrates the malware attackers for network security performance analysis to identify and fix any security flaws in a network by analyzing its architecture, data, and traffic. Without the knowledge or permission of the user, malicious software (malware) can be installed on a computer and used to steal sensitive information or funds. Scanning a computer for known malware is one of the most common detection methods. A successful strategy against cyber security risks requires strict adherence to established best practices. A firewall is a network protection that blocks unauthorized users from accessing the network. A firewall may be implemented in hardware, software, or both. It prevents hackers and other cybercriminals from accessing private, Intranet-based computer networks through the Internet. Measuring the effectiveness of information security programers can provide management with valuable data for making educated choices. The proposed AMBCNN-PBFT demonstrated the maximum efficiency value, an 89.9% enhancement compared to other existing approaches.
Figure 9 illustrates malware attackers for network security efficiency analysis and then generates a report that is both simple to understand and full of quick solutions for security teams’ problems relating to the network. A wide variety of resources, devices, and methods are used to ensure the safety of a network. Safeguards are in place to prevent data breaches and protect the integrity of computer networks. Reasonable network security procedures lessen the likelihood of an attack or data breach. Because of these safeguards, the usage of IT systems is no longer risky in 84%. In an ideal world, apps, antivirus, access management, servers, firewalls, and rules would all be included in the many levels of a network’s security architecture. Compared to other methods, MASs, IoT, CBD-IE, and LSTM-DT, the suggested technique AMBCNN-PBFT is greater in efficiency rate prediction.
Figure 10 illustrates malware attackers for network security evaluation with the information thieves often use spyware and key loggers. However, a virus may also steal sensitive data, including login credentials. An attacker gets unauthorized access to a network, watches the web, and takes sensitive data; this is a passive network attack. Active network attacks include those that alter, encode, or otherwise harm data. Data about unauthorized systems user usage and assaults from outside attackers might be gathered by monitoring the network and system status, behaviors, and usage. The percentage of attacks identified is 90%; when a business takes precautions, it ensures that none of its employees will be harmed by known threats. Protecting from damage is the most excellent defense against it. Compared to other approaches now in use, the recommended AMBCNN-PBFT is greater.
where
Figure 11 shows that malware attackers for network security accuracy information stored in a secure network system will always be correct and up to date. For a system to be reliable, its intake must be complete and uncorrupted. Regarding network communications, authenticity is a subset of accuracy that allows users to verify the data source by tracking down the data’s sender or originator and recording the transmission’s timestamps and receipt of the data. In finance, accuracy is essential for maintaining privacy and security. Regarding sensitive financial data like bank account information, verified accuracy trumps privacy concerns every time in 88%. Authenticating a message is a method of verifying the integrity of a transmission. A code is produced and appended to the end of a message before it is sent over a network. Thus, it can be concluded that no tampering occurred during transmission because the sent and received messages are identical. Compared to other existing methods, MASs, IoT, CBD-IE, and LSTM-DT, the suggested technique AMBCNN-PBFT is more accurate.
Figure 12 illustrates that malware attackers for network security prediction that attackers’ times are predicted through AMBCNN-PBFT; demand for cyber security is increasing in tandem with the widespread use of cloud computing for storing and managing company data and corporate operations [33]. As Internet usage increases, so does the possibility of abuse of network security through attackers. There is room for advancement and financial reward in network security. Protection from possible digital attacks with robust network security may save businesses a lot of money and keep their reputations intact at 96%. In the future of networking, software-defined networking and network function virtualization will play more significant roles, transitioning formerly specialized hardware or locally hosted virtual machines to cloud-hosted software. The proposed AMBCNN-PBFT is higher in predicting sports than other existing methods, as shown in Figure 12.
5 Conclusion
From these methods, MASs, IoT, CBE-IE, and LSTM-DT from the communication network security situation analysis are not anticipated; it efficiently utilizes AMBCNN-PBFT methods, the benefits are expected properly, and the experimental research is compelling. This research makes an AMBCNN-PBET encounter the increasing requirements of progressively reliant time series data mining for communication network security situation analysis. Another area of interest is ensuring data security and desensitizing data while collecting data for network security purposes while protecting users’ privacy and personal information. This is a concern for security-related data collection and data collection in general. In particular, there are occasions when it is necessary to acquire data from users in the name of security, which might include collecting potentially sensitive information about those users. Privacy concerns lead some users to refuse to share their data with others, hence the need for this incentive research. Security-related data collecting is undeniably a critical area of study to ensure the validity of obtained data and the reliability of data collection, transmission, storage, analysis, and utilization. With the complexity of network environments constantly growing, trust management is becoming more vital in aiding automated decision-making. It aids in choosing a definite action by helping to overcome perceived ambiguity and danger. Consider a handful of network security drawbacks. A security solution for a network may be expensive to implement. Costs associated with buying software, installing it, and so on may rapidly build up, even for smaller networks, due to the nature of the aforementioned factors. Network security will safeguard data and the network in a hack, incursion, or other network security incident. The featured work for network security is rising as more and more businesses move their data storage and administrative processes online. Due to the proliferation of Internet use, there is a greater possibility that sensitive commercial organization and personal user data will be misused.
-
Funding information: 2024 Henan Provincial Project for Science and Technology Development. (Project Name: Research on Key Technology of Blockchain and its Application in Tracing the Agricultural Products. Project No. 242102210124).
-
Author contributions: Qingjian Jiang: writing – original draft, writing – review & editing.
-
Conflict of interest: There are no potential competing interests in this paper. The author confirms the content of the manuscript has not been published or submitted for publication elsewhere.
-
Ethical standards: This article abides by ethical standards.
-
Data availability statement: The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
[1] Z. Gu, S. Nazir, C. Hong, and S. Khan, “Convolution neural network-based higher accurate intrusion identification system for network security and communication,” Secur. Commun. Netw., vol. 2020, pp. 1–10, 2020.Search in Google Scholar
[2] M. A. Khan, S. Abbas, A. Rehman, Y. Saeed, A. Zeb, M. I. Uddin, et al., “A machine learning approach for blockchain-based smart home networks security,” IEEE Netw., vol. 35, no. 3, pp. 223–229, 2020.10.1109/MNET.011.2000514Search in Google Scholar
[3] W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, and K. Cabaj, “Challenges and novel solutions for 5G network security, privacy and trust,” IEEE Wirel. Commun., vol. 27, no. 4, pp. 6–7, 2020.10.1109/MWC.2020.9170261Search in Google Scholar
[4] W. Li, W. Meng, Z. Liu, and M. H. Au, “Towards blockchain-based software-defined networking: security challenges and solutions,” IEICE Trans. Inf. Syst., vol. 103, no. 2, pp. 196–203, 2020.10.1587/transinf.2019INI0002Search in Google Scholar
[5] B. B. Sundaram, P. Rajkumar, M. M. Ananthi, V. S. Kumar, M. J. Vijaykumar, and P. Karthika, “Network security analysis for signal strength based packet filitering,” In 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020, December, pp. 1352–1355.10.1109/ICISS49785.2020.9315943Search in Google Scholar
[6] I. El Alaoui and Y. Gahi, “Network security strategies in big data context,” Procedia Comput. Sci., vol. 175, pp. 730–736, 2020.10.1016/j.procs.2020.07.108Search in Google Scholar
[7] N. Tosun, M. Altinöz, E. Çay, T. Çinkiliç, S. Gülseçen, T. Yildirim, et al., “A swot analysis to raise awareness about cyber security and proper use of social media: Istanbul sample,” Int. J. Curric. Instr., vol. 12, pp. 271–294, 2020.Search in Google Scholar
[8] P. Zaiyi, “Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction,” J. Supercomput., vol. 76, no. 2, pp. 1342–1357, 2020.10.1007/s11227-018-2575-3Search in Google Scholar
[9] Z. Gu, S. Nazir, C. Hong, and S. Khan, “Convolution neural network-based higher accurate intrusion identification system for the network security and communication,” Secur. Commun. Netw., vol. 2020, pp. 1–10, 2020.10.1155/2020/8830903Search in Google Scholar
[10] J. Bian and S. Fu, “Application of data mining in predictive analysis of network security model,” Secur. Commun. Netw., vol. 2022, 2022. 10.1155/2022/4922377.Search in Google Scholar
[11] S. Ren, D. Chen, Y. Tao, S. Xu, G. Wang, and Z. Yang, “Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining,” J. Intell. Syst., vol. 31, no. 1, pp. 817–834, 2022.10.1515/jisys-2022-0117Search in Google Scholar
[12] Y. Zhou, G. Zhao, R. Alroobaea, A. M. Baqasah, and R. Miglani, “Research on data mining method of network security situation awareness based on cloud computing,” J. Intell. Syst., vol. 31, no. 1, pp. 520–531, 2022.10.1515/jisys-2022-0037Search in Google Scholar
[13] Y. Liu, S. Garg, J. Nie, Y. Zhang, Z. Xiong, J. Kang, et al., “Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach,” IEEE Internet Things J, vol. 8, no. 8, pp. 6348–6358, 2020.10.1109/JIOT.2020.3011726Search in Google Scholar
[14] F. Almulihi, “Load forecasting of distributed system host based on linear time series model,” Distrib. Process. Syst., vol. 3, no. 4, pp. 53–60, 2022. 10.38007/DPS.2022.030407.Search in Google Scholar
[15] S. B. Alavi, “State consistency algorithm for peer to peer distributed systems based on data mining,” Distrib. Process. Syst., vol. 1, no. 4, pp. 33–40, 2020. 10.38007/DPS.2020.010405.Search in Google Scholar
[16] X. Liu and J. Liu, “Malicious traffic detection combined deep neural network with hierarchical attention mechanism,” Sci. Rep., vol. 11, no. 1, pp. 1–15, 2021.10.1038/s41598-021-91805-zSearch in Google Scholar PubMed PubMed Central
[17] M. Poongodi, A. Sharma, V. Vijayakumar, V. Bhardwaj, A. P. Sharma, R. Iqbal, et al., “Prediction of the price of Ethereum blockchain cryptocurrency in an industrial finance system,” Comput. Electr. Eng., vol. 81, p. 106527, 2020.10.1016/j.compeleceng.2019.106527Search in Google Scholar
[18] E. Sanders, “Economic development and natural ecology based on data mining technology,” Nat. Environ. Prot., vol. 2, no. 2, pp. 41–50, 2021. 10.38007/NEP.2021.020205.Search in Google Scholar
[19] X. Zheng and W. Feng, “Research on practical Byzantine fault tolerant consensus algorithm based on blockchain,” In Journal of Physics: Conference Series, Vol. 1802, no 3. IOP Publishing, 2021, March, p. 032022.10.1088/1742-6596/1802/3/032022Search in Google Scholar
[20] A. Altarawneh and A. Skjellum, “The security ingredients for correct and byzantine fault-tolerant blockchain consensus algorithms,” In 2020 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, 2020, October, pp. 1–9.10.1109/ISNCC49221.2020.9297326Search in Google Scholar
[21] E. Macias, “Design and implementation of intelligent fault diagnosis system for construction machinery supporting wireless communication network,” Kinetic Mech. Eng., vol. 1, no. 3, pp. 17–24, 2020. 10.38007/KME.2020.010303.Search in Google Scholar
[22] H. Yang, R. Zeng, G. Xu, and L. Zhang, “A network security situation assessment method based on adversarial deep learning,” Appl. Soft Comput., vol. 102, p. 107096, 2021.10.1016/j.asoc.2021.107096Search in Google Scholar
[23] D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sin., vol. 8, no. 2, pp. 319–333, 2021.10.1109/JAS.2021.1003820Search in Google Scholar
[24] A. Djenna, S. Harous, and D. E. Saidouni, “Internet of things meet Internet of threats: New concern cyber security issues of critical cyber infrastructure,” Appl. Sci., vol. 11, no. 10. p. 4580, 2021.10.3390/app11104580Search in Google Scholar
[25] M. Safaei, M. Driss, W. Boulila, E. A. Sundararajan, and M. Safaei, “Global outliers detection in wireless sensor networks: A novel approach integrating time‐series analysis, entropy, and random forest‐based classification,” Softw.: Pract. Exper., vol. 52, no. 1, pp. 277–295, 2022.10.1002/spe.3020Search in Google Scholar
[26] M. K. Ahirwar, P. K. Shukla, and R. Singhai, “CBO-IE: a data mining approach for healthcare IoT dataset using chaotic biogeography-based optimization and information entropy,” Sci. Program., vol. 2021, pp. 1–14, 2021.10.1155/2021/8715668Search in Google Scholar
[27] I. H. Sarker, “Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective,” SN Comput. Sci., vol. 2, no. 3, pp. 1–16, 2021.10.1007/s42979-021-00535-6Search in Google Scholar
[28] H. Zhang, C. Kang, and Y. Xiao, “Research on network security situation awareness based on the LSTM-DT model,” Sensors, vol. 21, no. 14. p. 4788, 2021.10.3390/s21144788Search in Google Scholar PubMed PubMed Central
[29] E. M. Ahmed, “Modelling information and communications technology cyber security externalities spillover effects on sustainable economic growth,” J. Knowl. Econ., vol. 12, no. 1, pp. 412–430, 2021.10.1007/s13132-020-00627-3Search in Google Scholar
[30] X. Tao, K. Kong, F. Zhao, S. Cheng, and S. Wang, “An efficient method for network security situation assessment,” Int. J. Distrib. Sens. Netw., vol. 16, no. 11. p. 1550147720971517, 2020.10.1177/1550147720971517Search in Google Scholar
[31] H. I. Fawaz, G. Forestier, J. Weber, L. Idoumghar, and P. A. Muller, “Adversarial attacks on deep neural networks for time series classification,” In 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, 2019, July, pp. 1–8.Search in Google Scholar
[32] https://datasetsearch.research.google.com/search?src=0&query=Communication%20network%20security%20&docid=L2cvMTFycHJ3YnhoeA%3D%3D. 2019.Search in Google Scholar
[33] https://www.kaggle.com/datasets/shenba/time-series-datasets. 2017.Search in Google Scholar
© 2024 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.