Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 473504, 8 pages
http://dx.doi.org/10.1155/2014/473504
Research Article

Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm

1Department of Industrial Engineering, Tsinghua University, Beijing 100084, China
2Bengbu Automobile NCO Academy, Bengbu 233011, China
3Tianjin Port (Group), Ltd., Tianjin 300456, China

Received 20 February 2014; Accepted 18 March 2014; Published 27 April 2014

Academic Editors: Y. Mao and Z. Zhou

Copyright © 2014 Yong Zeng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The situation sequence contains a series of complicated and multivariate random trends, which are very sudden, uncertain, and difficult to recognize and describe its principle by traditional algorithms. To solve the above questions, estimating parameters of super long situation sequence is essential, but very difficult, so this paper proposes a situation prediction method based on historical feature pattern extraction (HFPE). First, HFPE algorithm seeks similar indications from the history situation sequence recorded and weighs the link intensity between occurred indication and subsequent effect. Then it calculates the probability that a certain effect reappears according to the current indication and makes a prediction after weighting. Meanwhile, HFPE method gives an evolution algorithm to derive the prediction deviation from the views of pattern and accuracy. This algorithm can continuously promote the adaptability of HFPE through gradual fine-tuning. The method preserves the rules in sequence at its best, does not need data preprocessing, and can track and adapt to the variation of situation sequence continuously.

1. Introduction

With attacks becoming more prevalent, the traditional static passive defense and whole system consolidation are hard to keep up with the changing rhythms, which have huge amounts of investment and affect the network performance. In this case, the dynamic, proactive, and targeted defending measures have been presented, most of which rely on attack situation forecast, that is, network attack situation sensing (NASS) [1, 2]. NASS aims at forecasting future evolution trend of network attack situation based on historical features and current attack indications, guiding dynamic defense, and allowing administrators to take corresponding measures in advanced, and effective manner to quickly respond to the complex and ever-changing attack threats [3, 4].

Rarely studying attack situation forecast, previous researches mostly using existing methods, such as autoregressive moving average model (ARMA), grey model (GM), and radial basis function neural network (RBFNN) [58]. ARMA identifies the dependence relationship and autocorrelation of situation sequences and establish mathematical prediction model [9]. It requests that situation sequences or their certain step difference satisfies the steady suppose, which is too strict to increase suitable scope. As one of GMs, GM(1,1) firstly weakens the randomness of situation sequences by using accumulation, secondly fits the born sequence through index curve, and then does regressive restitution after prediction, which can embody monotonously and slowly changing trend but hardly reflect some characteristics such as random rove and periodic fluctuation [10, 11]. Grey Verhulst is suitable to describe the situation sequences with swing development according to “S” or anti-“S” form [12], and the method dividing the changing line into several stages does not lack rationality, but the difficulty is how to predict the occurrence moment and lasting time of each stage [13]. RBFNN utilizes the nonlinear characteristic to describe the regulation contained in situation sequences [14]. However, evolving regulation of attack situation is infinite and changeable; a practical type neural network with small scale cannot solve well [15, 16].

Situation sequence contains massive complex and inconstant evolution trends, beyond the expression and prediction capability of traditional methods only by some formulas, functions or via some training [17, 18]. Most traditional methods suffer from the confliction among training samples, rely on data preprocessing and artificial intervention heavily, do not support incremental training, and need to rebuild model once situation sequence changes [1921]. Therefore, a situation prediction method based on historical feature pattern extraction (HFPE) is presented. The method measures the similarity between historical feature from the aspects of pattern and accuracy and utilizes multiple order difference operation to discriminate trends. It searches similar indications from recorded historical situation sequence, measures the link intensity of occurred indication upon subsequent effect, and infers the recurrence possibilities of some effects according to current indication. An evolution algorithm is introduced to measure prediction deviation and improve the adaptability of prediction algorithm continuously via gradual fine-tuning.

This paper proceeds as follows: Section 2 discusses algorithm principle for HFPE. Section 3 clarifies algorithm establishment and analysis. Section 4 presents the experiment results and Section 5 concludes the paper.

2. Algorithm Principle

2.1. Basic Definition

Looking from mathematical form, the continuous time-varied curve, , is commonly applied to describe the evolving process of attack situation. This curve is carried out by computer through sampling method, that is, to sample situation values with time interval , and then obtains discrete time sequences composed by , where represents the situation value at moment . To facilitate the research, a basic definition is made as follows: let be the segmental subimage with neighboring segments from moment , let be the segmental gradient, let be the gradient sequence, let , be the characteristic spectrum of , let be zero vector; then For the th component product of , , the angle of inclination, , can be defined as

The stretch rate from to can be calculated by , which is defined as is utilized to adjust the stretch rate, where is the prediction steps.

The following three theorems through further analysis can be easily obtained: (1)   does not change with ; (2) if , then is linear correlative with ; (3) if , then can be the same with through translating and magnifying.

2.2. Prediction Principle

Looking from probability theory and statistics, similar situation curve shapes are more probably derived from similar origin, mechanism, and impact, subsequently resulting in a similar subsequent effect. From the point of view of statistics, when the precedence relations of sequences in time appear frequently, it usually meant that the logical causal relationship exists in a certain degree.

It is supposed that and are known historical feature subpatterns, from the same pattern, , and the further trend after is unknown and needed to be predicted. If is similar with , then it can be deduced that the origin, mechanism, and impact in are similar with those in , and the history after may be repeated after with some differences. According to this principle, the slope of the line segment behind can be forecasted by is utilized to control the predicting steps. When , the trend prediction curve can be recurred by and .

2.3. Measurement System
2.3.1. Fitting Degree

Firstly calculate the angle cosine similarity between slope vectors, secondly introduce more order difference operators to obtain the trend difference of qualitative change and quantitative change, and then acquire the narrowing fitting degree by the difference of similarity degree and trend difference.

Let represent the angle cosine similarity between and ; then

The trend differences of qualitative change and quantitative change are denoted by and , respectively, and the former of which stands for the pattern difference, and the latter stands for the accuracy difference. The above two parameters can be derived by Thus the composite trend, , can be defined by

Let represent backward difference operator, and define and then the order differential recursive equation can be obtained by in which is a positive integer, and (9) meets

Let denote the trend difference between the feature patterns and ; then

The fitting degree function, , can be defined by where the large value of represents a fine fitting, and for and , it can be derived that The occurrence probability of may be 50% statistically, which is too big. Therefore, it is necessary to subtract the penalty term, , and filter by the threshold to narrow the fitting degree.

2.3.2. Universality Degree

Divide the attack situation subsequence into two parts, that is, occurred indication and subsequent effect; the values of the domination intensity of the former to the latter (or call link intensity between the two parts) may be high or low, some of which have a far-ranging representative, and some just have rare earth especially instance. If all the values are treated evenly, then the prediction accuracy will be affected seriously, so it is important to outstand inevitable link of the high intensity and weaken accidental link of the low intensity.

Let be the universality value of in the historical feature pattern , where can be derived by The value of will be updated with the change of and can be accessed directly without waiting to calculate.

The universality value can be shined upon to universality degree in by function , which is shown as follows: The larger value of universality degree reflects finer representativeness of and its extension and more exact patterns predicted by . Otherwise, is just a special example, and the prediction effect is worse.

2.3.3. Contrast Degree

The predication results of situation are usually impacted by link intensity of several different weights. The function mechanism often changes; that is, sometimes they work with a community decision and sometimes with an individual domination. Therefore, it is necessary to trace and adjust between outstanding statistics effect and showing individual advantage.

It is supposed that are not normalized weights, which can be adjusted to by sensitization index (). Then the standardized weight can be derived by and comparison degree can be obtained by If , we can suppose ; then five generalized cutoff points can be acquired; that is, .

Equation (16) can be derived into the form of by where is utilized to adjust comparison degree; that is, outstands statistics effect, shows individual advantage, and maintains the present status.

3. Algorithm Establishment and Analysis

3.1. Prediction Algorithm

The prediction algorithm flow is given in Figure 1. According to historical feature pattern and occurred indication , the algorithm can predict subsequent effect through two main stages, that is, preparation stage and prediction stage, which are marked in the chart.

473504.fig.001
Figure 1: Prediction algorithm flow chart.

As shown in the figure, the preparation part circularly promotes the sliding window , selects poor values of fitting degree to reject, and sensitizes the product of universality degree and fitting degree , which is assigned to . The prediction part first checks whether historical feature pattern set has record. What calls for special attentions is that the value of in the sliding window or the fitting degree value of it with in the occurred indication cannot be too small, because the smaller the above value, the poorer the contribution to prediction value .

3.2. Evolution Algorithm

Evolution algorithm is introduced to measure predicting deviation from the views of pattern and accuracy, which can be fine-tuned to raise the adaptability of prediction algorithm.

The accuracy of adjusting to can be derived by which is based on current weight set and (18) and meets . And the definition can be popularized to , only when is the largest value first met in , which is in ascending order by of ; it can be obtained that

As shown in Figure 2, the evolution algorithm carries on the variables and results of the prediction algorithm and works to promote adaptability after acquiring measured value. is an adjustment variable for and meets . If rises or the distance between and drops, then the adjustment amplitude becomes lower, else becomes higher. If , then decrease the threshold to soften the terms, else increase the threshold. is calculated through fitting degree, , selected by the prediction algorithm, and meeting . When the fitting of and is poor, the adjustment to needs to be cautious; that is, if , then it needs to raise the value of , and if the extension value approximates , then the prediction according to is accurate, and the value raising can be large. To determine , select the best one among value lowering by 5%, current value, and value rising by 5%, and restrict it by a reasonable range to prevent passivating or sharpening.

473504.fig.002
Figure 2: Evolution algorithm flow chart.
3.3. Example Analysis

Figure 3 gives an example of predicting according to the historical feature pattern , in which the value of is , , , , , and .

473504.fig.003
Figure 3: Trend prediction illustration.

According to the prediction algorithm, it can be known through comparing all the values of with that when and , so is selected, and when and , so is also selected, and other values are excluded for they meet , which are partly listed in Table 1. When , the slope becomes larger at and smaller at , which are reflected through and derived by (9), and the relative penalty value is recorded by . And through normalization process, the elements of set are and . Thus, the prediction value is equal to , and so forth, and step trend can be predicted. It can be seen that this scheme has the ability to identify multiple long-range correlation contained in the same situation sequence.

tab1
Table 1: Similarity metric and punishment value.

This part is analyzed according to evolution algorithm. Assuming that and , so , which is smaller than ; thus, the value of needs to be lower, and once , then raise the value of . It can be known that the changing value of universality degree is , and raising this degree can strengthen the role of vector . The changing value of is , and lowering this value can weaken the interference of vector . To bridge the gap between epitaxial scale and measured scale, is adjusted to , and is adjusted to . And for , the value of needs to rise. Table 2 shows that becomes smaller, and becomes larger with continued evolution, which results in rapid rise of , and approach between prediction value and measured value.

tab2
Table 2: Effects of prediction and evolution.

With the passage of time, and keep unchanged, grows linearly, and the algorithm can delete stale data, save recent data, and correct fitting threshold and universality degree. The above process can be complicated not only by autonomous evolution, but also by artificially modified parameters.

4. Experiment Results Analysis

The traditional indexes utilized to measure the prediction accuracy include mean absolute error (MAE), standard deviation error (SDE), and mean absolute percentage error (MAPE) [21] derived by

This section selects MAPE to obtain the relative error between prediction pattern and measured pattern, which is denoted by . The standard deviation of relative error components is denoted by .

4.1. Experiment  1

Figure 4 is a critical subsequence selected from actual network attack situation records, which includes various features such as ascent trend, saturation trend, decline trend, periodic fluctuation, and stochastic disturbance.

473504.fig.004
Figure 4: Historical records of network attack situation.

From the view of the experimental prediction results, the relative errors of HFPE, ARMA, GM(1,1), and RBFNN are 3.28%, 5.89%, 7.18%, and 16.11%, respectively. As shown in Figure 5, in the experiment, ARMA, GM(1,1), and RBFNN need to be artificially identified and protected against cyclical situation fluctuations. The difference transformation utilizes 12 as the distance and is restored after prediction to prevent poor prediction effect; otherwise, the relative errors of GM(1,1) and RBFNN may reach 59.67% and 73.99%, respectively. However, the above method is special, cannot be spread for that data preprocessing of these algorithms does not exist in universal law. On the contrary, HFPE can maintain adaptation to complicated and changeable trends but does not need data preprocessing or artificial cognition.

473504.fig.005
Figure 5: Prediction results of network attack situation.
4.2. Experiment  2

This experiment is to randomly choose subsequences with similar parts, repeat 20 times, and then calculate the average value.

From the view of the experimental prediction results, the relative errors of HFPE, ARMA, GM(1,1), and RBFNN are 8.09%, 20.89%, 44.89%, and 34.75%, respectively. If the situation sequence selected does not exist in any principle, then the relative errors will be 3.96%, 21.72%, 37.47%, and 53.54%, respectively. Figure 6 shows one group of data, in which is a boundary for historical feature pattern and prediction feature pattern.

473504.fig.006
Figure 6: Prediction results of network attack situation.

If put all groups of the historical feature patterns into a new long sequence, and repeat above prediction, then the performance of ARMA and GM(1,1) drops rapidly, and that of HFPE does not change much for that longer sequence containing more correlation is benefit to prediction.

4.3. Experiment  3

To compare differences among four algorithms, random data are utilized to simulate situation sequences. First, extract random data with bits from the entropy pool of Windows 7 system. Then randomly gather subsequence with 16 bits, the former 8 bits of which are occurred indication and the latter 8 bits are subsequent effect. Thirdly, splice occurred indication behind the random sequence to form a historical feature pattern and treat the subsequent effect as a prediction feature pattern. Let us make 100 groups of experiments to test each algorithm’s capacity in resisting random interference and in identifying the correlation with far distance. The average results are listed in Table 3.

tab3
Table 3: Prediction effects of network attack situation.

It can be found from the table data that HFPE has the best performance among the four algorithms. When the scale of experiment is large, this conclusion can be repeated well. And ARMA and RBFNN cannot deal with the random sequences with long bits, while HFPE can perform smoothly.

5. Conclusion

This paper proposes a prediction method based on historical feature pattern, that is, HFPE. The main principle of this algorithm is shown as follows. Fitting degree is introduced to measure the similarity among subsequences from the views of pattern and accuracy. Universality degree is utilized to test the representation of subsequence and its epitaxy. Contrast of the weight system is adjusted by sensitized index, which gives prominence to statistical effect in passivation area and highlights individual strengths in sharpening area. Prediction algorithm and evolution algorithm are proposed to predict situation results according to historical feature patterns. HFPE algorithm maximally reserves the rules in the situation sequences, does not need data preprocessing, and can adapt to the situation changes automatically. The experiment results prove the performance of HFPE.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgment

This work was supported by China Postdoctoral Science Foundation (no. 2013M540107).

References

  1. J. Wang, Z.-G. Qin, and L. Ye, “Research on prediction technique of network situation awareness,” in Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems (CIS '08), pp. 570–574, Chengdu, China, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Zhu, R. Lu, X. Shen, and X. Lin, “Security in service-oriented vehicular networks,” IEEE Wireless Communications, vol. 16, no. 4, pp. 16–22, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Jakobson, J. Buford, and L. Lewis, “Situation management,” IEEE Communications Magazine, vol. 48, no. 3, pp. 110–111, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Lan, W. Chunlei, and M. Guoqing, “A framework for network security situation awareness based on knowledge discovery,” in Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET '10), vol. 1, pp. 226–231, Chengdu, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Lou and K. Ren, “Security, privacy, and accountability in wireless access networks,” IEEE Wireless Communications, vol. 16, no. 4, pp. 80–87, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Feng, M. Knieser, M. Rizkalla, B. King, P. Salama, and F. Bowen, “Embedded system for sensor communication and security,” IET Information Security, vol. 6, no. 2, pp. 111–121, 2012. View at Publisher · View at Google Scholar
  7. B. Magoutas, G. Mentzas, and D. Apostolou, “Proactive situation management in the future internet: the case of the smart power grid,” in Proceedings of the 22nd International Workshop on Database and Expert Systems Applications (DEXA '11), pp. 267–271, Toulouse, Greece, September 2011. View at Publisher · View at Google Scholar
  8. C. G. Keller, T. Dang, H. Fritz, A. Joos, C. Rabe, and D. M. Gavrila, “Active pedestrian safety by automatic braking and evasive steering,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 4, pp. 1292–1304, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Chen, H. Gao, and Y. Fu, “Situation analysis and prediction of web public sentiment,” in Proceedings of the International Symposium on Information Science and Engineering (ISISE '08), vol. 2, pp. 707–710, Shanghai, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Risk-aware cooperative spectrum access for multi-channel cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 516–527, 2014. View at Publisher · View at Google Scholar
  11. R. K. Iyer, Z. Kalbarczyk, K. Pattabiraman et al., “Toward application-aware security and reliability,” IEEE Security & Privacy, vol. 5, no. 1, pp. 57–62, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Janac, “Control of large power systems based on situation recognition and high speed simulation,” IEEE Transactions on Power Apparatus and Systems, vol. 98, no. 3, pp. 710–715, 1979. View at Publisher · View at Google Scholar · View at Scopus
  13. R. K. Iyer, Z. Kalbarczyk, K. Pattabiraman et al., “Toward application-aware security and reliability,” IEEE Security & Privacy, vol. 5, no. 1, pp. 57–62, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Kitadai, M. Nakagawa, H. Baba, and A. Watanabe, “Similarity evaluation and shape feature extraction for character pattern retrieval to support reading historical documents,” in Proceedings of the 10th IAPR International Workshop on Document Analysis Systems (DAS '12), pp. 359–336, Gold Cost, Australia, March 2012. View at Publisher · View at Google Scholar
  15. J. R. Almeida, J. B. Camargo, and P. S. Cugnasca, “Safety and security in critical applications and in information systems ?? A comparative study,” IEEE Latin America Transactions, vol. 11, no. 4, pp. 1127–1133, 2013. View at Publisher · View at Google Scholar
  16. M. Panteli, P. A. Crossley, D. S. Kirschen, and D. J. Sobajic, “Assessing the impact of insufficient situation awareness on power system operation,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 2967–2977, 2013. View at Publisher · View at Google Scholar
  17. M. M. Masud, Q. Chen, L. Khan et al., “Classification and adaptive novel class detection of feature-evolving data streams,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 7, pp. 1484–1497, 2013. View at Publisher · View at Google Scholar
  18. L. Jibao, W. Huiqiang, L. Xiaowu, and L. Ying, “A quantitative prediction method of network security situation based on wavelet neural network,” in Proceedings of the 1st International Symposium on Data, Privacy, and E-Commerce (ISDPE '07), pp. 197–202, Chengdu, China, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. W. He, G. Hu, and H. Xiang, “Apply anomaly grey forecasting algorithm to cyberspace situation prediction,” in Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems (CIS '08), pp. 503–505, Chengdu, China, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. R.-F. Wu and G.-L. Chen, “Research of network security situation prediction based on multidimensional cloud model,” in Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS '12), pp. 409–414, Palermo, Italy, 2012. View at Publisher · View at Google Scholar
  21. X. Cheng and S. Lang, “Research on network security situation assessment and prediction,” in Proceedings of the 4th International Conference on Computational and Information Sciences (ICCIS '12), pp. 864–867, Chongqing, China, August 2012. View at Publisher · View at Google Scholar