Mei Hong Chen, School of Electronics and Computer Science, Peking University, Yiheyuan Road, Beijing, P.R.China 100871.
International Journal of Advanced Information and Communication Technology
Received On : April 18, 2020
Revised On : July 22, 2020
Accepted On : August 15, 2020
Published On : September 05, 2020
Volume 07, Issue 09
Pages : 135-140
Abstract
To explore the prediction effect of network security situational awareness on network vulnerabilities and attacks under the background of big data, this study constructs a predictive index system based on the network security situational awareness model. Based on the improved cuckoo algorithm, the cuckoo search radial basis function neural network is used to predict the situation. The weight value in the model is determined by the hierarchical analysis method, vulnerability simulation is conducted by Nessus software and network attack simulation is conducted by Snort software, and then the situation is evaluated by a fuzzy comprehensive evaluation method. Finally, Jquery and Bootstrap software is used to develop the system. The results show that the cuckoo search radial basis function model proposed in this study could predict network security situations more accurately than the radial basis function model, cuckoo search back-propagation neural network model, genetic algorithm radial basis function model and Support vector machine model based on particle swarm optimization model.
Keywords
Network security situational awareness; Radial basis function; Fuzzy comprehensive evaluation; Network vulnerabilities; Network attack.
Cite this article
Mei Hong Chen, “Software Development and Design of Network Security System Under Big Data Analysis, ” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp. 135-140, September. 2020.
Copyright
© 2020 Mei Hong Chen. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.