Next Article in Journal
Design and Analysis of Electrodes for Electrostimulation (TENS) Using the Technique of Film Printing and Embroidery in Textiles
Next Article in Special Issue
A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds
Previous Article in Journal
Gender and Age Estimation Methods Based on Speech Using Deep Neural Networks
Previous Article in Special Issue
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Network Security Situation Awareness Based on the LSTM-DT Model

School of Data Science and Technology, Heilongjiang University, Harbin 150000, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(14), 4788; https://doi.org/10.3390/s21144788
Submission received: 21 June 2021 / Revised: 7 July 2021 / Accepted: 9 July 2021 / Published: 13 July 2021
(This article belongs to the Special Issue Data Privacy, Security, and Trust in New Technological Trends)

Abstract

:
To better understand the behavior of attackers and describe the network state, we construct an LSTM-DT model for network security situation awareness, which provides risk assessment indicators and quantitative methods. This paper introduces the concept of attack probability, making prediction results more consistent with the actual network situation. The model is focused on the problem of the time sequence of network security situation assessment by using the decision tree algorithm (DT) and long short-term memory(LSTM) network. The biggest innovation of this paper is to change the description of the network situation in the original dataset. The original label only has attack and normal. We put forward a new idea which regards attack as a possibility, obtaining the probability of each attack, and describing the network situation by combining the occurrence probability and attack impact. Firstly, we determine the network risk assessment indicators through the dataset feature distribution, and we give the network risk assessment index a corresponding weight based on the analytic hierarchy process (AHP). Then, the stack sparse auto-encoder (SSAE) is used to learn the characteristics of the original dataset. The attack probability can be predicted by the processed dataset by using the LSTM network. At the same time, the DT algorithm is applied to identify attack types. Finally, we draw the corresponding curve according to the network security situation value at each time. Experiments show that the accuracy of the network situation awareness method proposed in this paper can reach 95%, and the accuracy of attack recognition can reach 87%. Compared with the former research results, the effect is better in describing complex network environment problems.

1. Introduction

Although the high-speed interaction of information facilitates our work and life, it also brings various problems related to network security. On 26 September 2020, China’s national Internet Emergency Response Center (CNCERT) released an analysis report on China’s Internet network security monitoring data in the first half of 2020. The report points out that in the first half of 2020, the number of computer malware samples captured was about 18.15 million, and the number of hosts infected with computer malware in China was about 3.04 million, an increase of 25.7%.
Against this background, network security situation awareness (NSSA) technology arises at a historic moment. Endsley [1] put forward the concept of situation awareness for the first time in 1988, defining it as “recognizing and understanding environmental factors under certain time and space conditions, and predicting the development trend of future things”. He designed the three-layer perceptual model: situation element extraction (Level 1), situation understanding (Level 2), and situation prediction (Level 3). In 1999, Bass [2] first proposed the concept of network security situation awareness by combining intrusion monitoring with network attack and defense.
In recent years, combined with a variety of technical means, many scholars have proposed their own NSSA scheme. Zhong [3] proposes an intrusion detection model based on a random forest (RF)-based feature selection approach and neural networks model. Referring to the idea of constructing a hybrid model, we use the SSAE network to learn the characteristics of the dataset, and then use the LSTM network to obtain the probability of each attack and make it assist the DT algorithm in identifying attacks.
Zhong’s [3] method only identifies the types of attacks but cannot explain the impact of each attack. Qian et al. [4] aligned the process of NSSA with the life cycle of security data and analyzed its needs, proposing a multilevel analysis framework, and used the RF algorithm to construct an evaluation model. It evaluates the network security situation from the perspective of the security data life cycle, which makes the NSSA more objective and accurate than the former. This paper chooses to evaluate the network security situation from the perspective of attack and analyzes different types of attacks from two aspects, attack impact and attack probability, which makes the NSSA process more complete and the comprehensive comparison results better.

1.1. Main Contributions

To improve the accuracy and objectivity of NSSA, this paper proposes a new NSSA model, that is, the LSTM-DT model. The main contributions of this paper are summarized as follows:
  • This paper proposes a new NSSA method, which perceives the network security state from three aspects: network situation factor extraction, network situation assessment, and network situation prediction.
  • We propose the concept of “attack probability”, which changes the previous scholars’ limitation of situation awareness only being able to identify attack types, and makes the final situation value more accurate.
  • We propose the concept of “the influence degree of each network attack” and evaluate it by various methods, which makes the identified attack types have a more objective expression.
  • The model has good stability, and the prediction accuracy can reach 95% when describing the general network environment, while the accuracy can still remain above 80% when describing the complex network environment.

1.2. Structure of the Paper

The rest of the paper is organized as follows. First, we present the literature review in Section 2. Then, we introduce the related model and algorithms in Section 3. We describe the design of the LSTM-DT hybrid model in Section 4. Section 5 presents the extraction and evaluation of network security situation elements. Section 6 presents the network security situation prediction algorithm. We propose datasets and experiment methods in Section 7. In Section 8, we analyze and compare the NSSA method proposed in this paper. Finally, some conclusions are given in Section 9.

2. Related Works

In order to better protect the network security, more and more scholars are engaged in the research on the NSSA. Yu et al. [5] propose a network security architecture based on immunology. Zhu et al. [6] describe a NSSA method from the perspective of big data, which includes network security situation detection (NSSD), network security situation understanding (NSSU), and network security situation projection (NSSP).
Based on the three-layer perceptual model of situation awareness proposed by Endsley, we divide the NSSA into three parts: situation element extraction, situation assessment, and situation prediction. The extraction of network security situation elements refers to the extraction of relevant elements in the network according to the established evaluation indexes. Articles [7,8,9] provide network security situation elements from different aspects, but they all have their own limitations. Network security situation assessment refers to dealing with the assessment indicators according to certain rules and analyzing the security incidents. The classic network situation assessment methods include the AHP, fuzzy analytic hierarchy process (FAHP), and set pair analysis. Ji et al. [10] use a method about network security situation assessment based on FAHP. Zhi et al. [11] propose a network security level protection evaluation method based on fuzzy synthesis and AHP (determine the evaluation interval, realize quantitative standardization, objective level protection evaluation method).
Network security situation prediction means predicting the future network situation according to the current network state and historical data. In recent years, the rapid development of machine learning provides a new solution for network situation prediction, such as the support vector machine (SVM) [12] and hidden Markov model (HMM) [13]. Then, deep learning applies to network security situation assessment: for example, [14] summarizes the artificial intelligence related to network security as well as the progress and challenges of current research; [15] studies the performance of different neural networks in the NSSP; and [16] proposes an LSTM network security situation prediction model based on the sigmoid weighted reinforcement mechanism, which can improve the convergence rate.

3. Related Model and Algorithms

3.1. Stack Sparse Auto-Encoder

The auto-encoder (AE) is an effective nonlinear dimensionality reduction method proposed by Hinton [17]. It uses the nonlinear transformation of the hidden layer in the neural network to map the original high-dimensional features. The basic self-encoder only reconstructs the original data, and the output layer data are simply copied to the output layer. The sparse auto-encoder (SAE) adds a sparsity constraint on the activation of hidden layer neurons in the self-encoder model [18]. The encoder uses the average activation value of hidden layer neuron output to constrain, using KL divergence to make it close to a given sparse value, and adds it as a penalty term to the loss function [19]. The loss function of the sparse self-encoder is calculated as follows:
L sparse   = L E + β j KL ρ ρ j = 1 2 k = 1 N i = 1 c | x i k y i k 2 + β j KL ρ ρ j
where N is the total number of input samples x, and C is the feature dimension of samples. The purpose of the self-encoder is to make the raw data x k and the reconstructed data y k more similar: x i k and y i k represent the j - th feature respectively. L E is usually the mean square error function, which represents the loss function of the basic self-encoder. In the loss function formula, ρ is the sparsity parameter, ρ j is the average activation value of the j - th neuron, and β is the penalty factor. KL ρ ρ j represents the penalty term, representing the KL divergence between ρ j ˜ , 1 ρ j ˜ . The specific formula is as follows:
ρ j = 1 2 k = 1 N h j x k KL ρ ρ j = ρ log ρ ρ j + ( 1 ρ ) log 1 ρ l ρ j ˜
The stack sparse auto-encoder is composed of multiple sparse self-encoders stacked and connected with different classifiers [20]. In this paper, the SSAE network unit is used to extract low-dimensional features from the data of each time in the extended sequence ( X t m ,…, X t 2 , X t 1 ), and the feature sequence ( S t m ,…, S t 2 , S t 1 ) is obtained, so as to achieve the purpose of feature learning. Its structure is shown in Figure 1.
The SSAE network inputs data x t into the first SAE to obtain the low-dimensional feature representation of hidden layer vector h t 1 , then inputs h t 1 into the second SAE to obtain the low-dimensional feature representation of hidden layer vector h t 2 , and so on, obtaining the hidden layer vector h t N as the last low-dimensional feature.

3.2. LSTM and DT

The LSTM network [21] is an improved recurrent neural network (RNN) which is used to process sequential signals. It adds memory units to each neural unit in the hidden layer based on the RNN, so that the memory information in the time series can be controlled. Several controllable gates (forgetting gate, input gate, and output gate) are used to transmit information among the units in the hidden layer, which can control the memory and forgetting degree of the information. The LSTM unit calculates the output value h of the hidden layer at time t according to the state value c t 1 of the memory unit at time t 1 , the output value h t 1 of the hidden layer at time t 1 , and the input value x t at time t. According to the flow direction of the signal, the specific calculation rules are as follows:
f t = σ W f x x t + W f t h t 1 + b f i t = σ W i x x t + W i h h t 1 + b i g t = φ W g x x t + W g h h t 1 + b g c t = c t f t + g t i t o t = σ W o x x t + W o h h t 1 + b o h t = φ c t o t
In the formula, W is the weight matrix, b is the offset, σ is the activation function (sigmoid), and φ is the activation function (tanh). The sigmoid function maps the output value of the model to the interval from zero to one, x represents the input value, and F sgm   ( x ) represents the output value. The output value will be judged as an abnormal label if it is closer to one. The calculation formula of the sigmoid function (fsgm) is as follows:
F sgm   ( x ) = 1 + e x 1
The decision tree is a common machine learning method. As the name implies, DT is based on a tree structure, which is a natural mechanism for human beings to use in dealing with decision problems [22]. In a decision tree, the root nodes are composed of samples, the intermediate nodes describe the decision process, and the leaf nodes are the final decision result. In this paper, the C4.5 decision tree algorithm is used to classify samples by gain ratio [23]. The formula for gain rate calculation is as follows:
G a i n ratio ( D , a ) = 1 + e x 1 I V ( a ) = v = 1 V D v | D | log 2 D v | D |
In the formula, G a i n ratio ( D , a ) represents the information gain obtained by partitioning sample collection D with attribute a. D v divides sample collection D with attribute a, and I V ( a ) is the intrinsic value of attribute a.

4. The Design of the LSTM-DT Hybrid Model

The LSTM-DT hybrid model is divided into three parts, which are introduced in detail below.
  • Extraction of network security situation elements
    We evaluate the dataset by the chi-square function in order to set the network security situation elements and give the quantitative formula.
  • Network security situation assessment
    The weight of the selected network security situation elements is calculated by the AHP method. At the same time, we give the attack influence degree of each attack mode.
  • Network security situation prediction
    First, the dataset is extracted through the SSAE network to obtain new low-dimensional abstract features. Then the processed network traffic data are input into the LSTM-DT model in batches for training. The model is divided into two parts: fitting and classification. The LSTM network is used to make the fitting results. The prediction value is regarded as the probability of attack occurrence, and the tag value in the dataset is updated to serve the classification results, defining the type of network attack. Finally, the network security situation value is obtained by the product of attack probability and impact degree in the current time. The model is shown in Figure 2.
The time and space complexity of this model are mainly affected by the DT algorithm and the LSTM algorithm. The time complexity of the DT algorithm depends on the number of features, sample size, and tree depth. The number of multiplication and addition operations in the network affects the time complexity of the LSTM algorithm. In terms of space complexity, the DT algorithm is affected by sample size, feature number, and feature segmentation points. The LSTM algorithm is represented by the number of parameters to be optimized and layers in the neural network.

5. Extraction and Evaluation of Network Security Situation Elements

Referring to the network situation awareness index system constructed by others and combined with the common vulnerability scoring system (CVSS) [24], this paper proposes a quantitative method concerning the impact degree of attack based on the AHP as follows:
  • Determine the risk assessment indicators.
  • Construct the pairwise comparison matrix for the evaluation indexes and obtain their respective weights by the AHP.
  • Calculate the risk assessment index for each attack based on the eigenvalues of training sets.
  • Obtain the impact of each attack through the attack risk assessment index and its corresponding weight.

5.1. Extraction of Network Security Situation Elements

The chi-square function is used to score the eigenvalues of the UNSW-NB15 dataset. The several eigenvalues with the highest correlation coefficient between eigenvalues and attack types are the source sequence number (stcpb), target sequence number (dtcpb), source bits per second (sload), target bits per second (dload), flow rate (rate), target-to-source transaction bytes (dbytes), arrival time between source packets (sinpkt), and source-to-target transaction bytes (sbytes). Thus, we set the risk assessment indicators as packet loss rate, data traffic rate of change, and data throughput of the network. The weights of these three attribute values need to be calculated by AHP. Then, the influence degree of each attack is obtained through the multiattribute utility theory. The formula for the influence degree of each attack is as follows:
F ( j ) = W L U L j + W R U R j + W T U T j
where W L , W R and W T are the weights of the three attributes, and the sum is 1. U is the corresponding utility value, U ( x ) = C / X , X is the corresponding grade score of the attribute, and C is usually 1.

5.1.1. Packet Loss Rate

Packet loss rate refers to the ratio at which the source address sends packets to a destination address that does not receive packets. The quantitative formula for setting the packet loss rate of the network is as follows:
L j = i = 1 n j L 1 i s i + L 2 i D i 2 n j
where L j is the packet loss rate of the j - th attack mode(ten types of the attack, j = 10), n j is the total number of such attacks, L 1 i is the number of packets lost from the source address to the destination address, and S i is the total number of packets sent from the source address to the destination address. In the same way, L 2 i and D i indicate that the destination address sends packets to the source address. Then, we divide the packet loss rate L j into four levels, as shown in Table 1.

5.1.2. Data Traffic Rate of Change

Data traffic refers to the amount of data transmitted on the network, and the rate refers to the change of the data transmitted on the network within a certain continuous time. The formula for setting the data traffic rate of change is as follows:
R j = i = 1 n j a ( τ 1 ) i a τ i n j
where R represents the rate of the j - th attack mode, n is the total number of attacks, Q T i and Q ( T 1 ) i are the traffic values of the network in the current time period T and T-1 in the previous continuous time, which is divided into four levels, as shown in Table 2.

5.1.3. Data Throughput of the Network

Throughput refers to the maximum rate that the device can accept without frame dropping. The test method is sent a number of frames at a certain rate, and the frames transmitted by the device to be tested are calculated. If the number of frames sent is equal to the number received, the transmission rate will be increased and retested; otherwise, the transmission rate will be reduced and retested until obtaining the final result. The quantitative formula is as follows:
T j = i = 1 n j T s i H s i + T d i H d i 2 n j
where T j is the throughput of the j - th attack mode, T s i is the flow packet size sent by the source address, and H s i is the time of arrival. Similarly, T d i and H d i represent the size and time of sending packets from the destination address to the source address. We then divide the throughput into four levels, as shown in Table 3.

5.2. Network Security Situation Assessment

AHP is a decision analysis method of hierarchical weight proposed by Professor T.L. Saaty of the University of Pittsburgh in the early 1970s [25]. It uses the prior knowledge of evaluators to sort the importance of existing indicators and obtains the weights of various risk indicators combined with subjective judgment and objective methods.

5.2.1. Paired Comparison Matrix

Assuming the given m - th evaluation indexes, experts need to construct a paired judgment matrix D (matrix size is m * m). D contains element d j i , which is used to represent the importance of index X i relative to indicator X j . We usually use the method of a nine-grade scale to value it, as shown in Table 4.

5.2.2. Consistency Checking

The consistency checking is conducted on the weight results to determine whether they meet the consistency requirements. The consistency checking needs to work out two indicators C I and R I . C I is the negative average of the eigenvalues from the comparison matrix except the maximum eigenvalue. The solution formula of the consistency index C I [26] is as follows:
CI = ( λ max n ) / ( n 1 )
The smaller the C I (close to zero) is, the more consistent the comparison matrix will be. The R I value refers to the average random consistency index of the comparison matrix. Its value of the comparison matrix about the order 1–9 is shown in Table 5.
Considering the values of C I and R I , the random consistency ratio C R is defined as follows:
CR = CI / RI
If C R is less than 0.10, the comparison matrix satisfies the consistency requirement.

6. Network Security Situation Prediction Algorithm

The C4.5 decision tree algorithm is a very classic classification algorithm. Aiming at the timing of the network situation, we improve the decision tree algorithm presented in [27] and construct the LSTM-DT model algorithm of network situation awareness. The specific process is shown in Figure 3.
Given the network traffic dataset D = [ d 1 , d 2 d n ], take m - th data as the training sets, obtaining D t r = [ d 1 , d 2 d m ], the rest of the data are obtained as the testing sets D t e = [ d m + 1 , d m + 2 d n ]. Based on SSAE, a new feature sequence ( S t m ,…, S t 2 , S t 1 ) is obtained. Furthermore, the standardized training sets can be expressed as:
D t r = s 1 , s 2 , , s m d t = s t t = 1 n s t / n t = 1 n s t t = 1 n s t / n 2 / n
LSTM cell is created by cell state S state , and then LSTM net is constructed. LSTM net is initialized by seed. So far, the construction of the LSTM network has been completed. Nest input data are produced by batch processing, using the LSTM forward calculation method to obtain the predicted value. The LSTM network is updated by the loss rate and learning rate η , obtaining the trained network. In the prediction process, the iterative method is used to output the prediction value P o one by one, and the Z-score standardization is performed on P t e to obtain the prediction sequence corresponding to the test set, which is the probability of attack occurrence. Use P t e to update D t e and generate a new test set D t e . D t r and D t e are used as the input of the classification algorithm based on the DT algorithm, and the output results are ten attack types. Through the information gain calculation, we can obtain the attribute value a b e s t of each tuple in the dataset, and the mapping relationship D v between the attribute value and category is obtained to complete the construction of the tree. The specific algorithm (Algorithm 1) is as follows.
Algorithm 1 Network security situation awareness algorithm based on LSTM-DT model.
Input: D, m, S s t a t e , seed, steps, η , attribute A
Output: Prediction value, loss value and sort results corresponding to test set
1. get D t r , D t e from D by m
2. S t = SSAE ( D t r )
3. D t r ’ = zscore ( S t m )
4. create L S T M c e l l by S s t a t e
5. connect L S T M n e t by L S T M c e l l
6. initialize L S T M n e t by seed
7. for each step in 1:steps
8. P = L S T M f o r w a r d ( D t r ’)
9. Loss = i = 1 m p i y i 2 / m 2
10. update L S T M n e t by Loss and η
11. get L S T M n e t *
12. for each j in 0:(n − m − 1)
P f + i = L S T M n e t *(P)
append P O with P f + i [−1]
13. P t e = de_zscore ( P O )
14. update D t e by P t e
15. get D t e
16. Tree = Create root node n
17. for all attribute A D t e ’ do
Use compute information-theoretic criteria
get a b e s t
18. end for
19. Tree = Create node that tests a b e s t in the root
20. get D v from D t e ’ based on a b e s t
21. for all D v do
T r e e v = C4.5( D v )
Attach T r e e v to the corresponding branch of Tree
22. end for
23. return sort results(attack type)

7. Datasets and Experiments

7.1. Data Sources

This paper uses the UNSW-NB15 public dataset, which is created by the Ixia PerfectStorm tool of the network-wide laboratory and is used to generate a mixture of real modern normal activities and synthetic contemporary attack behaviors. The Tcpdump tool is used to capture 100 GB of raw traffic (such as a PCAP file). The dataset has nine types of attacks, which are Fuzzers, Analysis, Backdoors, Dos, Exploits, Generic, Reconnaissance, Shellcode, and Worms. Using Argus and bro IDS tools, 12 algorithms are developed to generate 49 features with class tags. This dataset has a time feature (stime), and it is continuously distributed in the time dimension. Therefore, choosing to build the LSTM time series mode as a prediction method can reflect its unique advantages. Figure 4 shows the image of time visualization for the dataset. It can be seen from Figure 4 that the network security situation fluctuates back and forth between 0 to 1 in the continuous time.

7.2. Extraction of Network Situation Elements and Analysis of Evaluation Results

7.2.1. Extraction Results of Network Situation Elements

In this paper, the network situation elements are extracted as network data packet loss rate, data traffic rate of change, and data throughput of the network. According to their respective quantitative formulas, the extraction results are shown in the following table. According to Equation (7) and Table 1, the packet loss rate and corresponding level of various attacks can be obtained, as shown in Table 6.
According to Formula (8) and Table 2, the average rate and corresponding level of various attacks can be obtained, as shown in Table 7.
According to Formula (9) and Table 3, the throughput and corresponding level of various attacks can be obtained, as shown in Table 8.

7.2.2. Network Situation Assessment Results

By using the nine-scale method and referring to the results of the chi-square test, the pairwise comparison matrix A = [ 1 3 2 1 / 3 1 1 / 2 1 / 2 2 1 ] of three types of risk indicators is constructed through expert scoring, and then the weights are obtained by the AHP algorithm as W L = 0.54, W R = 0.16, and W T = 0.30. The consistency test showed that CI = 0.0046, CR = 0.0079, which met the requirements of consistency. The threat attribute scores of 10 types of attacks are given respectively. Thus, the attack impact degree F of each type of attack is calculated according to Formula (6) as shown in Table 9.

7.3. Analysis of Network Situation Prediction Results

Network Attack Probability Analysis

The probability of network attack is mainly predicted by the LSTM time series model. In the training process of the dataset, the loss function is used to measure the difference between the estimated value and the observed value of the model. The formula is as follows:
loss   :   L ( y ^ , y ) = ω ( θ ) ( y ^ y ) 2
where ω ( Θ ) is the weight of the real value, y is the real value, and y ^ is the output of the model. Figure 5 shows the image of the loss function when training the dataset after applying the LSTM model. It can be seen that the development trend of the loss function is zero, and the training effect is good
Testing the prediction effect of the LSTM-DT model through the early training, we can obtain the predicted value and fitting effect, as shown in Figure 6.
It can be seen from Figure 7 that the closer the threat predicted value is to 1, the greater the possibility of attack is. In addition, the threshold of attack probability is conventionally defined as 0.5, so if the attack probability is over 0.5, we can see the label as 1. Otherwise, the label is 0. According to the prediction process of the dataset, the accuracy is used to evaluate the fitting results, and the final prediction accuracy is 87%. The predicted value of the model is regarded as the probability of threat occurrence. This improvement makes the threat classification no longer a simple yes or no but has a certain probability flexibility. The higher the probability of occurrence is, the more serious the threat will be. The probability of threat occurrence is defined as follows:
P ( a ) t = P ( a ) , vlus j   Vlus   0 , Others
where v l u s j is the specific attack mode, and V l u s is all attack modes existing in the network. Figure 7 shows the probability of each attack, and the scatter diagram is composed of the predicted value. The yellow solid line represents the average probability of each attack.
From the scatter number in Figure 7, we can see that the data amount of N o r m a l is the largest, and the W o r m s is the smallest. According to the concentration of scattered points, B a c k d o o r and A n a l y s i s can be compared to predict better. By comparing the position of the yellow solid line in the graph, it can be concluded that the attack probability of G e n e r i c is the highest, which is 0.984; the attack probability of N o r m a l is the lowest, which is 0.345.

8. Analysis and Comparison

8.1. Analysis and Comparison of Classification Results

Previous scholars used the random forest and neural network to identify attack types. We apply this to UNSW-NB15 dataset, and the results show that the multiclassification accuracy was 74%. In this paper, the SSAE network is used for feature learning, and the DT model is used for multiclassification, which not only reduces the cost of the model but also improves the classification accuracy to 87%.
To study the multiclass classification effect of classifier categories on network attack types, experiments are carried out in four different classifiers, which are SVM, k-nearest neighbor(KNN), DT, and logistic regression (LR). Here we only use the basic structure of each model for experiments, without using the improved model structure. Future work can increase the types of comparison or change the existing model structure to achieve better results. Then, the accuracy score, precision, recall, and F1 score are used as the evaluation indexes for the experimental results. From Figure 8, we can see that the DT has a good effect on the network threat test, so we choose the decision tree as a multiclass classification tool.
The classification accuracy of each attack is shown in Figure 9.
As can be seen from Figure 9, the RF-NN method depends on the size of the data sample. For the type of attack with a small size, the recognition accuracy will decrease significantly, so the model stability is poor. Although the model method proposed in this paper is also affected by the number of samples, the accuracy of W o r m s (minimum number of samples) is still 36.4%, which is much better than the former. N o r m a l has the highest classification accuracy and it accounts for the largest proportion in the testing sets. Secondly, the types of attack with high accuracy are G e n e r i c , R e c o n n a i s s a n c e , and E x p l o i t s , and the accuracy is 97.3%, 79.3%, and 70.9%. Some attacks such as W o r m s only have 44 records in the testing sets and 174 records in the training sets. Due to the lack of samples, the classification result is relatively poor. Thus, the more records each attack has, the higher the accuracy will be.

8.2. Analysis and Comparison of Network Security Situation Awareness

The network security situation value (NSSV) is calculated by the attack influence degree F and the attack possibility P. It is defined as follows:
N t = a = 1 n N t a n = t = 1 n F t a P ( a ) t n
N t represents the network security situation value in a certain of continuous time, and a represents the number of specific records contained in each situation, here regarded as the window value. P ( a ) t represents the attack probability, and F t a is the attack influence degree corresponding to the attack type identified at this time. The calculation results are shown in Table 10.
The values of a in Formula (15) are 10, 20, and 40, respectively, meaning that every 10, 20, and 40 in a continuous time is a group. Additionally, we extract 20 network situation values from each group to obtain the network security situation and draw a line chart, so as to see the overall security trend of the network. Referring to the National Emergency Plan for Public Emergencies, the network security situation value is divided into five intervals (0.00–0.20, 0.21–0.40, 0.41–0.60, 0.61–0.80, and 0.81–1.00), and the severity degree is security, low risk, medium risk, high risk, and super risk. The result can be seen in Figure 10.
Figure 10 shows that under three different window values, the network security situation values calculated by the LSTM-DT model are more close to the actual operation of the network. Owing to the LSTM being improved by the RNN network, the network security situation awareness method proposed in this paper is applied to the basic RNN network, and the obtained situation value is compared with the LSTM-DT model. Then, we calculate the network security situation values and draw charts compared with the LSTM-DT model.
Taking a window equal to 10 as an example, although the results of the LSTM-DT model are slightly different from the real value in 20 groups, 19 groups of data fall within the same range of the network security situation compared with the real value, obtaining an accuracy rate of 95%. The accuracy rate of the original RNN model is only 80%. This is because the LSTM-DT model applies SSAE feature learning, which makes the efficiency of data prediction higher. On the other hand, the combination of DT and LSTM makes the accuracy higher. Table 11 compares the accuracy, precision, recall, and F1 values of the L-D model and RNN model under different window values.

9. Conclusions

Experiments show that the proposed network security situation awareness method not only can identify the specific attacks faced by the current network but also can quantify the impact of attacks. The results of situational awareness are closer to the actual operation of the network. The NSSA algorithm based on the LSTM-DT model is feasible, and the next step can improve the accuracy of the algorithm by comparing it with various classic algorithms. For example, the super parameter optimization method is introduced to set the cell state vector size and learning rate of the LSTM network more scientifically.
In this paper, the determination of the threshold value of network attack probability is also worth discussing. We regard the threshold value as 0.5 according to popular agreement. The next step is to increase the experimental amount and find the threshold that makes the fitting accuracy reach more than 90%. Moreover, due to the uneven distribution of attack types in the network traffic data, the multiclass classification problem with unbalanced data can be considered to optimize the experimental results.

Author Contributions

Conceptualization, H.Z. and C.K.; methodology, C.K.; software, Y.X.; validation, C.K., H.Z. and Y.X.; formal analysis, H.Z.; resources, C.K.; data curation, H.Z.; writing original draft preparation, H.Z.; writing review and editing, H.Z.; visualization, C.K.; supervision, C.K.; project administration, C.K.; funding acquisition, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the graduates’ innovative research project of Heilongjiang University, project number YJSCX2021-209HLJU.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to the UNSW-NB15 public dataset, which is created by the Ixia PerfectStorm tool of the Australian network security center.

Conflicts of Interest

The authors declare no conflict of interest. They have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Endsley, M.R. Design and evaluation for situation awareness enhancement. In Proceedings of the Human Factors Society Annual Meeting, Chicago, IL, USA, 5–9 October 1988; Sage Publications Sage CA: Los Angeles, CA, USA, 1988; Volume 32, pp. 97–101. [Google Scholar]
  2. Bass, T. Intrusion Detection Systems and Multisensor Data Fusion. Commun. ACM 2000, 43, 99–105. [Google Scholar] [CrossRef]
  3. Zhong, S.H.; Huang, H.J.; Chen, A. An Effective Intrusion Detection Model Based on Random Forest and Neural Networks. Adv. Mater. Res. 2011, 267, 308–313. [Google Scholar] [CrossRef]
  4. Qian, Z.K. Network Security Situation Awareness Framework and Random Forest Assessment Model. J. Southwest China Norm. Univ. 2019, 44, 118–123. [Google Scholar]
  5. Yu, Q.; Ren, J.; Zhang, J.; Liu, S.; Zhang, W. An Immunology-Inspired Network Security Architecture. IEEE Wirel. Commun. 2020, 27, 1–6. [Google Scholar] [CrossRef]
  6. Zhu, B.; Chen, Y.; Cai, Y. Three Kinds of Network Security Situation Awareness Model Based on Big Data. Int. J. Netw. Secur. 2019, 21, 115–121. [Google Scholar]
  7. Zhao, D.; Song, H.; Li, H. Fuzzy integrated rough set theory situation feature extraction of network security. J. Intell. Fuzzy Syst. 2021, 40, 1–12. [Google Scholar]
  8. Kou, G.; Wang, S.; Zhang, D. Recognition of Network Security Situation Elements Based on Depth Stack Encoder and Back Propagation Algorithm. J. Electron. Inf. Technol. 2019, 41, 154–159. [Google Scholar]
  9. Duan, Y.; Li, X.; Yang, X.; Yang, L. Network Security Situation Factor Extraction Based on Random Forest of Information Gain. In Proceedings of the 2019 4th International Conference on Big Data and Computing, Guangzhou, China, 10–12 May 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 194–197. [Google Scholar] [CrossRef]
  10. Ji, F.Z.; Zhou, Y.T.; Tang, Q.J.; Hu, F.X.; Ma, S.F. Network Security Situation Assessment Based on FAHP. In Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering, Ji’nan, China, 24–26 April 2015; Atlantis Press: Amsterdam, The Netherlands, 2015. [Google Scholar]
  11. Zhi, W.W.; Zhou, X.X.; Yang, L. Application of Fuzzy Comprehensive Method and Analytic Hierarchy Process in the Evaluation of Network Security Level Protection Research. J. Phys. Conf. Ser. 2021, 1820, 012187. [Google Scholar] [CrossRef]
  12. Hu, J.; Ma, D.; Liu, C.; Shi, Z.; Hu, C. Network security situation prediction based on MR-SVM. IEEE Access 2019, 7, 130937–130945. [Google Scholar] [CrossRef]
  13. Hu, J.; Guo, S.; Kuang, X.; Meng, F.; Shi, Z. I-HMM-Based Multidimensional Network Security Risk Assessment. IEEE Access 2019, 8, 1431–1442. [Google Scholar] [CrossRef]
  14. Lv, Y.; Ren, H.; Gao, X.; Sun, T.; Guo, X. Multi-Scale Risk Assessment Model of Network Security Based on LSTM; Verification and Evaluation of Computer and Communication Systems; Springer International Publishing: New York, NY, USA, 2020. [Google Scholar]
  15. Wang, G. Comparative study on different neural networks for network security situation prediction. Secur. Priv. 2020, 4, e138. [Google Scholar] [CrossRef]
  16. Dong, Z.; Su, X.; Sun, L.; Xu, K. Network security situation prediction method based on strengthened LSTM neural network. J. Phys. Conf. Ser. 2021, 1856, 012056. [Google Scholar] [CrossRef]
  17. Hinton, G.E.; Salakhutdinov, R.R. Reducing the Dimensionality of Data with Neural Networks. Science 2006, 313, 504–507. [Google Scholar] [CrossRef] [Green Version]
  18. Wen, L.; Gao, L.; Li, X. A New Deep Transfer Learning Based on Sparse Auto-Encoder for Fault Diagnosis. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 136–144. [Google Scholar] [CrossRef]
  19. Li, D.; Deng, L.; Cai, Z.; Yao, X. Notice of Retraction: Intelligent Transportation System in Macao Based on Deep Self-Coding Learning. IEEE Trans. Ind. Inform. 2018, 14, 3253–3260. [Google Scholar] [CrossRef]
  20. Jia, W.; Muhammad, K.; Wang, S.; Zhang, Y. Five-category classification of pathological brain images based on deep stacked sparse autoencoder. Multimed. Tools Appl. 2019, 78, 4045–4064. [Google Scholar] [CrossRef]
  21. Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
  22. Sathyadevan, S.; Nair, R.R. Comparative Analysis of Decision Tree Algorithms: ID3, C4.5 and Random Forest; Springer: New Delhi, India, 2015. [Google Scholar] [CrossRef]
  23. Damanik, I.S.; Windarto, A.P.; Wanto, A.; Poningsih; Andani, S.R.; Saputra, W. Decision Tree Optimization in C4.5 Algorithm Using Genetic Algorithm. J. Phys. Conf. Ser. 2019, 1255, 012012. [Google Scholar] [CrossRef] [Green Version]
  24. Ou, X.; Singhal, A. The Common Vulnerability Scoring System (CVSS); Quantitative Security Risk Assessment of Enterprise Networks; Springer: New York, NY, USA, 2012. [Google Scholar]
  25. Saaty, T.L. What is the Analytic Hierarchy Process? In Mathematical Models for Decision Support; Mitra, G., Greenberg, H.J., Lootsma, F.A., Rijkaert, M.J., Zimmermann, H.J., Eds.; Springer: Berlin/Heidelberg, Germany, 1988; pp. 109–121. [Google Scholar]
  26. Deloach, S.A.; Wood, M.F.; Sparkman, C.H. Multiagent Systems Engineering. Int. J. Softw. Eng. Knowl. Eng. 2008, 11, 231–258. [Google Scholar] [CrossRef]
  27. Alaoui, S.S.; Farhaoui, Y.; Aksasse, B. A Comparative Study of the Four Well-Known Classification Algorithms in Data Mining. In Proceedings of the International Conference on Advanced Information Technology, Services and Systems, Tangier, Morocco, 14–15 April 2017; Springer: Cham, Switzerland, 2017. [Google Scholar]
Figure 1. The network structure of SSAE.
Figure 1. The network structure of SSAE.
Sensors 21 04788 g001
Figure 2. The design of the L-D network situation awareness model.
Figure 2. The design of the L-D network situation awareness model.
Sensors 21 04788 g002
Figure 3. The structure of LSTM-DT network security situation awareness model.
Figure 3. The structure of LSTM-DT network security situation awareness model.
Sensors 21 04788 g003
Figure 4. Time visualization image of the UNSW-NB15 dataset.
Figure 4. Time visualization image of the UNSW-NB15 dataset.
Sensors 21 04788 g004
Figure 5. Model training effect.
Figure 5. Model training effect.
Sensors 21 04788 g005
Figure 6. LSTM model fitting image.
Figure 6. LSTM model fitting image.
Sensors 21 04788 g006
Figure 7. Attack probability of various attacks.
Figure 7. Attack probability of various attacks.
Sensors 21 04788 g007
Figure 8. Classification result evaluation of each classifier.
Figure 8. Classification result evaluation of each classifier.
Sensors 21 04788 g008
Figure 9. Accuracy of identifying various attacks.
Figure 9. Accuracy of identifying various attacks.
Sensors 21 04788 g009
Figure 10. 20 groups of network security situation values under different window sizes.
Figure 10. 20 groups of network security situation values under different window sizes.
Sensors 21 04788 g010
Table 1. Risk indicators of the loss.
Table 1. Risk indicators of the loss.
Risk IndicatorsRisk Level
Loss > 0.002The first rank
Loss > 0.001The second rank
Loss > 0The third rank
Loss = 0The fourth rank
Table 2. Risk indicators of the rate.
Table 2. Risk indicators of the rate.
Risk IndicatorsRisk Level
Rate (<10000)The first rank
Rate (10,000–50,000)The second rank
Rate (50,000–100,000)The third rank
Rate (>100,000)The fourth rank
Table 3. Risk indicators of the throughput.
Table 3. Risk indicators of the throughput.
Risk IndicatorsRisk Level
Throughput (<500)The first rank
Throughput (500–5000)The second rank
Throughput (5000–10,000)The third rank
Throughput (>10,000)The fourth rank
Table 4. Nine-grade scale method.
Table 4. Nine-grade scale method.
ScaleMeaning
1The two indicators have the same importance
3The former is slightly more important than the latter
5The former is a bit more important than the latter
7The former is more important than the latter
9The former is much more important than the latter
2,4,6,8The median value of the above adjacent judgment
reciprocalIf X i is compared with X j to obtain d j i , then X j is compared with X i to obtain 1/ d j i
Table 5. RI value of comparison matrix of order 1–9.
Table 5. RI value of comparison matrix of order 1–9.
123456789
0.000.000.580.901.121.241.321.411.45
Table 6. Each attack type corresponds to the packet loss rate level.
Table 6. Each attack type corresponds to the packet loss rate level.
NORMGenericRCNExploitsFuzzersDosANLSWormsBackdoorsShellcode
00.000570.001840.001020.003190.0008400.001870.001250.00206
4322134221
Table 7. Each attack type corresponds to the average rate level.
Table 7. Each attack type corresponds to the average rate level.
NORMGenericRCNExploitsFuzzersDosANLSWormsBackdoorsShellcode
121,829195,83643,36350,7183914,305137,06436,70555,58045,423
4423124232
Table 8. Each attack type corresponds to the throughput level.
Table 8. Each attack type corresponds to the throughput level.
NORMGenericRCNExploitsFuzzersDosANLSWormsBackdoorsShellcode
36,97455811821189624876753900826563238
4422113322
Table 9. Attack impact of each attack type.
Table 9. Attack impact of each attack type.
Attack ModeLossRateThroughputAttack Impact
Normal4440.25
Generic3440.30
Reconnaissance2220.5
Exploits2320.473
Fuzzers1111
Dos3210.56
Analysis4430.275
Worms2230.45
Backdoors2320.473
Shellcode1220.77
Table 10. Network security situation values 715–725.
Table 10. Network security situation values 715–725.
Attack ProbabilityAttack TypeAttack ImpactNetwork Security Situation Value
1.00Exploits0.4733333330.473
1.00Exploits0.4733333330.473
1.00Dos0.560.560
1.00Exploits0.4733333330.473
0.97Exploits0.4733333330.459
0.96Exploits0.4733333330.454
1.00Exploits0.4733333330.473
1.00Exploits0.4733333330.473
1.00Fuzzers10.740
0.74Exploits0.4733333330.473
Table 11. Comparison between L-D model and RNN model.
Table 11. Comparison between L-D model and RNN model.
WindowsModelAccuracyPrecisionRecallF1
10L-D0.9510.950.97
RNN0.800.730.800.76
20L-D0.900.900.900.90
RNN0.650.720.650.61
40L-D0.800.840.800.78
RNN0.500.670.500.51
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, H.; Kang, C.; Xiao, Y. Research on Network Security Situation Awareness Based on the LSTM-DT Model. Sensors 2021, 21, 4788. https://doi.org/10.3390/s21144788

AMA Style

Zhang H, Kang C, Xiao Y. Research on Network Security Situation Awareness Based on the LSTM-DT Model. Sensors. 2021; 21(14):4788. https://doi.org/10.3390/s21144788

Chicago/Turabian Style

Zhang, Haofang, Chunying Kang, and Yao Xiao. 2021. "Research on Network Security Situation Awareness Based on the LSTM-DT Model" Sensors 21, no. 14: 4788. https://doi.org/10.3390/s21144788

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop