Skip to main content

Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Abstract

Previous models have achieved some breakthroughs in cyber security situation prediction. However, improving the accuracy of prediction, especially long-term prediction, is still a certain challenge. Maximal Overlap Discrete Wavelet Transform (MODWT) with strong ability of information extraction can capture the correlation of the time-series better. Mixed Wavelet Neural Network (WNN) architecture with both Morlet wavelets and Mexican hat wavelets can provide excellent localization and scale detection simultaneously. In this paper, MODWT method and mixed WNN architecture are combined to develop a WNN-M prediction model through data-driven approach. In addition, Hurst exponent is utilized to analyze the predictability of decomposed components for removing poor components. To demonstrate the effectiveness of proposed WNN-M model, 12-hour prediction is considered in a real attack scenario named DARPA given by MIT Lincoln Lab. Experimental results show that the \({R^2}\) of WNN-M can be improved by 19.87% and the RMSE of WNN-M can be reduced by 4.05% compared with that of traditional WNN model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Tim, B.: Intrusion detection systems and multi-sensor data fusion creating cyberspace situational awareness. Commun. ACM 43(4), 99–105 (2000)

    Article  Google Scholar 

  2. Andalib, A., Zare, M., Atry, F.: A fuzzy expert system for earthquake prediction, case study: the Zagros range. arXiv preprint arXiv:1610.04028 (2016)

  3. AbuDahab, K., Xu, D., Chen, Y.: A new belief rule base knowledge representation scheme and inference methodology using the evidential reasoning rule for evidence combination. Expert Syst. Appl. 51, 218–230 (2016)

    Article  Google Scholar 

  4. Hu, G.Y., Zhou, Z.J., Zhang, B.C., et al.: A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm. Appl. Soft Comput. 48, 404–418 (2016)

    Article  Google Scholar 

  5. Zhou, Z.J., Hu, C.H., Xu, D.L., et al.: New model for system behavior prediction based on belief rule based systems. Inf. Sci. 180(24), 4834–4864 (2010)

    Article  Google Scholar 

  6. Muruganantham, A., Tan, K.C., Vadakkepat, P.: Evolutionary dynamic multiobjective optimization via Kalman filter prediction. IEEE Trans. Cybern. 46(12), 2862–2873 (2016)

    Article  Google Scholar 

  7. Bourque, A., Bedwani, S., Filion, E.J., et al.: A particle filter-based motion prediction algorithm for lung tumors using dynamic magnetic resonance imaging. Int. J. Radiat. Oncol. Biol. Phys. 96(2), S63 (2016)

    Article  Google Scholar 

  8. Khuman, A.S., Yang, Y., John, R., et al.: R-fuzzy sets and grey system theory. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (2016)

    Google Scholar 

  9. Ingle, V., Deshmukh, S.: Hidden markov model implementation for prediction of stock prices with TF-IDF features. In: Proceedings of the International Conference on Advances in Information Communication Technology and Computing, p. 9. ACM (2016)

    Google Scholar 

  10. Baruah, P., Chinnam*, R.B.: HMMs for diagnostics and prognostics in machining processes. Int. J. Prod. Res. 43(6), 1275–1293 (2005)

    Article  MATH  Google Scholar 

  11. Sahin, F., Yavuz, M.Ç., Arnavut, Z., et al.: Fault diagnosis for airplane engines using Bayesian networks and distributed particle swarm optimization. Parallel Comput. 33(2), 124–143 (2007)

    Article  MathSciNet  Google Scholar 

  12. Frigault, M., Wang, L., Singhal, A., et al.: Measuring network security using dynamic bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, pp. 23–30. ACM (2008)

    Google Scholar 

  13. Iqbal, M., Naveed, A.: Forecasting inflation: Autoregressive integrated moving average model. Eur. Sci. J. 12(1) (2016)

    Google Scholar 

  14. Kaur, T., Kumar, S., Segal, R.: Application of artificial neural network for short term wind speed forecasting. In: 2016 Biennial International Conference on Power and Energy Systems: Towards Sustainable Energy (PESTSE), pp. 1–5. IEEE (2016)

    Google Scholar 

  15. Grossman, A., Morlet, J.: Decomposition of Hardy functions into square integrable wavelets of constant shape. Fundam. Pap. Wavelet Theor. 126 (2006)

    Google Scholar 

  16. Partal, T., Kişi, Ö.: Wavelet and neuro-fuzzy conjunction model for precipitation forecasting. J. Hydrol. 342(1), 199–212 (2007)

    Article  Google Scholar 

  17. Khalighi, S., Sousa, T., Oliveira, D., et al.: Efficient feature selection for sleep staging based on maximal overlap discrete wavelet transform and SVM. In: 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC, pp. 3306–3309. IEEE (2011)

    Google Scholar 

  18. Doucoure, B., Agbossou, K., Cardenas, A.: Time series prediction using artificial wavelet neural network and multi-resolution analysis: Application to wind speed data. Renew. Energy 92, 202–211 (2016)

    Article  Google Scholar 

  19. Granero, M.A.S., Segovia, J.E.T., Pérez, J.G.: Some comments on Hurst exponent and the long memory processes on capital markets. Phys. A Stat. Mech. Appl. 387(22), 5543–5551 (2008)

    Article  Google Scholar 

  20. Eom, C., Choi, S., Oh, G., et al.: Hurst exponent and prediction based on weak-form efficient market hypothesis of stock markets. Phys. A Stat. Mech. Appl. 387(18), 4630–4636 (2008)

    Article  Google Scholar 

  21. Zhang, Q., Benveniste, A.: Wavelet networks. IEEE Trans. Neural Netw. 3(6), 889–898 (1992)

    Article  Google Scholar 

  22. Sharma, V., Yang, D., Walsh, W., et al.: Short term solar irradiance forecasting using a mixed wavelet neural network. Renew. Energy 90, 481–492 (2016)

    Article  Google Scholar 

  23. Nayak, P.C., Rao, Y.R.S., Sudheer, K.P.: Groundwater level forecasting in a shallow aquifer using artificial neural network approach. Water Resour. Manag. 20(1), 77–90 (2006)

    Article  Google Scholar 

  24. Xiuzhen, C., Qinghua, Z., Hong, G.X.: A hierarchical network security threat situation of quantitative evaluation method. J. Softw. 17(4), 885–897 (2006)

    Article  Google Scholar 

  25. Kasiviswanathan, K.S., He, J., Sudheer, K.P., et al.: Potential application of wavelet neural network ensemble to forecast streamflow for flood management. J. Hydrol. 536, 161–173 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by The National Natural Science Foundation of China (No. 61572460, No. 61272481), National Key R&D Program of China (No. 2016YFB0800703), The Open Project Program of the State Key Laboratory of Information Security(No. 2017-ZD-01), The National Information Security Special Projects of National Development, the Reform Commission of China [No. (2012)1424], China 111 Project (No. B16037).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuqing Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

He, F., Zhang, Y., Liu, D., Dong, Y., Liu, C., Wu, C. (2017). Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics