|
一种基于分层置信规则库的云制造系统网络安全态势预测模型
|
Abstract:
云制造系统(Cloud Manufacturing System, CMS)的网络安全对当今制造业影响重大,因此对于云制造系统进行网络安全态势预测(Network Security Situation Prediction, NSSP)变得十分重要。本文提出了一种基于证据推理(Evidential Reasoning, ER)和分层置信规则库(Hierarchical Belief Rule Base, HBRB)的云制造系统网络安全态势预测模型。首先,分析了影响CMS网络安全状况的因素,建立了评估框架,并采用ER算法进行融合,推导出CMS的安全态势值。其次,构建了基于HBRB的云制造系统网络安全态势预测模型,避免了属性过多引起的组合爆炸问题。此外,还使用了一种鲸鱼优化算法(Whale Optimization Algorithm, WOA),用于优化预测模型中的参数。该模型能够充分利用不确定信息与半定量信息,解决了专家知识的不完备性,提高了该预测模型的准确率。
The cyber security of Cloud Manufacturing System (CMS) has a significant impact on today’s manufacturing industry, so it becomes important to perform Network Security Situation Prediction (NSSP) for CMS. In this paper, we propose a network security situation prediction model for CMS based on Evidential Reasoning (ER) and Hierarchical Belief Rule Base (HBRB). First, the factors affecting the cybersecurity status of CMS are analyzed, an assessment framework is established, and the ER algorithm is fused to derive the security posture value of CMS. Second, a cybersecurity posture prediction model for cloud manufacturing systems based on HBRB was constructed to avoid the combinatorial explosion problem caused by too many attributes. In addition, a Whale Optimization Algorithm (WOA) is used to optimize the parameters in the prediction model. The model can make full use of uncertain and semi-quantitative information, which solves the incompleteness of expert knowledge and improves the accuracy of this prediction model.
[1] | 李伯虎, 张霖, 王时龙, 等. 云制造——面向服务的网络化制造新模式[J]. 计算机集成制造系统, 2010, 16(1): 1-7, 16. |
[2] | Corallo, A., Lazoi, M., Lezzi, M. and Pontrandolfo, P. (2023) Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE Transactions on Engineering Management, 70, 3745-3765. https://doi.org/10.1109/tem.2021.3084687 |
[3] | Li, J., Wu, Y., Li, Y., Zhang, Z., Fouad, H. and Altameem, T. (2023) A Network Security Prediction Method Based on Attack Defense Tree. Journal of Nanoelectronics and Optoelectronics, 18, 357-366. https://doi.org/10.1166/jno.2023.3398 |
[4] | Wang, X., Li, S., Liu, M., Wang, Y. and Roy-Chowdhury, A.K. (2021) Multi-Expert Adversarial Attack Detection in Person Re-Identification Using Context Inconsistency. 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, 10-17 October 2021, 15077-15087. https://doi.org/10.1109/iccv48922.2021.01482 |
[5] | Zhao, D., Wang, H. and Wu, Y. (2022) Situation Element Extraction Based on Fuzzy Rough Set and Combination Classifier. Computational Intelligence and Neuroscience, 2022, Article ID: 3429227. https://doi.org/10.1155/2022/3429227 |
[6] | Wang, H., Guo, W., Zhao, R., Zhou, B. and Hu, C. (2019) A Real-Time Online Security Situation Prediction Algorithm for Power Network Based on Adaboost and SVM. In: Yang, C.N., Peng, S.L. and Jain, L., Eds., Security with Intelligent Computing and Big-Data Service, Springer International Publishing, 526-534. https://doi.org/10.1007/978-3-030-16946-6_42 |
[7] | Yin, K., Yang, Y., Yao, C. and Yang, J. (2022) Long-term Prediction of Network Security Situation through the Use of the Transformer-Based Model. IEEE Access, 10, 56145-56157. https://doi.org/10.1109/access.2022.3175516 |
[8] | Cheng, M., Jia, G., Fang, W., Gao, Z. and Zhang, W. (2022) SSA and BPNN Based Efficient Situation Prediction Model for Cyber Security. 2022 18th International Conference on Mobility, Sensing and Networking (MSN), Guangzhou, 14-16 December 2022, 809-813. https://doi.org/10.1109/msn57253.2022.00131 |
[9] | Chen, G. (2022) Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm. Computational Intelligence and Neuroscience, 2022, Article ID: 6314262. https://doi.org/10.1155/2022/6314262 |
[10] | Ding, C., Chen, Y., Algarni, A.M., Zhang, G. and Peng, H. (2022) Application of Fractal Neural Network in Network Security Situation Awareness. Fractals, 30, Article ID: 2240090. https://doi.org/10.1142/s0218348x22400904 |
[11] | Du, X., Ding, X. and Tao, F. (2023) Network Security Situation Prediction Based on Optimized Clock-Cycle Recurrent Neural Network for Sensor-Enabled Networks. Sensors, 23, Article 6087. https://doi.org/10.3390/s23136087 |
[12] | Zhao, D., Shen, P. and Zeng, S. (2023) ALSNAP: Attention-Based Long and Short-Period Network Security Situation Prediction. Ad Hoc Networks, 150, Article ID: 103279. https://doi.org/10.1016/j.adhoc.2023.103279 |
[13] | Xu, M., Liu, S. and Li, X. (2024) Network Security Situation Assessment and Prediction Method Based on Multimodal Transformation in Edge Computing. Computer Communications, 215, 103-111. https://doi.org/10.1016/j.comcom.2023.12.014 |
[14] | Fan, S., Li, F., Wang, B., Zhang, X. and Yan, P. (2022) ELM Based Improved Layered Ensemble Architecture for Security Situation Prediction. 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Beijing, 3-5 October 2022, 630-634. https://doi.org/10.1109/iaeac54830.2022.9929487 |
[15] | Yang, H., Zhang, L., Zhang, X. and Zhang, J. (2021) An Adaptive IoT Network Security Situation Prediction Model. Mobile Networks and Applications, 27, 371-381. https://doi.org/10.1007/s11036-021-01837-y |
[16] | Xie, B., Zhao, G., Chao, M. and Wang, J. (2020) A Prediction Model of Cloud Security Situation Based on Evolutionary Functional Network. Peer-to-Peer Networking and Applications, 13, 1312-1326. https://doi.org/10.1007/s12083-020-00875-9 |
[17] | Liu, D. (2020) Prediction of Network Security Based on DS Evidence Theory. ETRI Journal, 42, 799-804. https://doi.org/10.4218/etrij.2019-0147 |
[18] | Wang, Y., Yang, J., Xu, D. and Chin, K. (2006) The Evidential Reasoning Approach for Multiple Attribute Decision Analysis Using Interval Belief Degrees. European Journal of Operational Research, 175, 35-66. https://doi.org/10.1016/j.ejor.2005.03.034 |
[19] | Yang, J.B., Liu, J., Wang, J., et al. (2006) Belief Rule-Base Inference Methodology Using the Evidential Reasoning Approach-rimer. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, 36, 266-285. https://doi.org/10.1109/tsmca.2005.851270 |
[20] | Mirjalili, S. and Lewis, A. (2016) The Whale Optimization Algorithm. Advances in Engineering Software, 95, 51-67. https://doi.org/10.1016/j.advengsoft.2016.01.008 |
[21] | Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N. and Hartog, F.T.H.D. (2022) ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets. IEEE Internet of Things Journal, 9, 485-496. https://doi.org/10.1109/jiot.2021.3085194 |