Open Access
Identification of Cybersecurity Elements Based on Convolutional Attention LSTM Networks
Author(s) -
Yingying Hu,
Runjie Liu,
Ziyu Ma
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1757/1/012146
Subject(s) - computer science , identification (biology) , convolutional neural network , situation awareness , artificial intelligence , data mining , feature (linguistics) , machine learning , situation analysis , situational ethics , network security , pattern recognition (psychology) , computer security , engineering , linguistics , philosophy , botany , marketing , business , biology , aerospace engineering , law , political science
As the first step of cybersecurity situational awareness, the accuracy of cybersecurity element recognition will directly affect the results of situational understanding and situational prediction. In this paper, we propose a network element recognition method based on the convolutional attention mechanism combined with a long- and short-term memory network. The input network traffic data is successively passed through the convolutional neural network, attention mechanism, and long- and short-term memory network, which not only takes into account the influence degree of different network attributes on different network behaviors but also realizes that the feature information extracted in the early stage can be circulated in the network, thus providing a discriminant basis for the final network behaviors To verify the effectiveness of our proposed method, we perform experimental validation on the KDD-Cup 1999 (kdd-99) dataset. The results show that our proposed method achieves an accuracy of 98.48% in the identification of network security elements. In addition to this, we also compare and analyze our proposed algorithm with other mainstream algorithms, and the results also validate the effectiveness of our proposed method.