Optimization Design of Large-Scale Network Security Situation Composite Prediction System

  • Jinbao ShanEmail author
  • Shenggang Wu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 302)


Because the traditional network security situation compound prediction system cannot overcome the defects of SVM algorithm, the accuracy of extraction results is low. For this reason, a large-scale network security situation compound prediction system is designed. Through data normalization process to optimize the SVM algorithm, to optimize the forecasting calculation module, to provide data base system frame structure, system frame structure can be divided into security situational composite sensing module, situational composite evaluation module and situational composite prediction module, synergy is derived using multiple module network security situational values when attacked, to implement network security situation prediction to complete the system design. Simulation application environment design compared the experimental results show that compared with the traditional prediction system of the proposed system under the same data to forecast, the accuracy of predicted results by 65%, and the operation is very stable.


Large-Scale Network security situation compound forecast Forecast result Accuracy 


  1. 1.
    Zhang, X., Pang, T.: An approach to real-time network security situation prediction. Sci. Technol. Vis. 12(3), 289 (2017)Google Scholar
  2. 2.
    Xin, J., Zhang, C., Li, W., et al.: A power communication network security situation prediction method and system: CN107124394A, 15(04), 110–111 (2017)Google Scholar
  3. 3.
    Man, L.I.: Research on network security situation awareness and prediction of power monitoring system. Inf. Secur. Technol. 8(10), 60–62 (2017)Google Scholar
  4. 4.
    Wei, H.: Discussion on the methods of power information network security situation assessment and prediction. Netw. Secur. Technol. Appl. 12(1), 120–121 (2017)MathSciNetGoogle Scholar
  5. 5.
    Zhang, J., Zhang, B., Shen, Q.: Information system security situation assessment based on data mining. Mod. Electron. 40(21), 77–79 (2017)Google Scholar
  6. 6.
    Chen, Y., Zhu, B., Tian, H., et al.: A network security situation analysis method based on neural network and big data and its system: CN106302522A 17(22), 1200–1203 (2017)Google Scholar
  7. 7.
    Yan, J., Weihong, H., Wei, W.: Design and implementation of large scale network security situation analysis system YHSAS. Inf. Technol. Netw. Secur. 4(1), 222–223 (2018)Google Scholar
  8. 8.
    Zhaojun, G., Ruili, W., Shuaiqing, W.: Research on real-time forecast of security posture of information system based on improved Grey-Markov chain. Comput. Appl. Softw. 34(2), 272–279 (2017)Google Scholar
  9. 9.
    Duanli, W.: Network to detect abnormal data in the database optimization simulation. Comput. Simul. 34(5), 410–413 (2017)Google Scholar
  10. 10.
    Zeng, B., Zhong, P.: Simulation study on network security situation forecast. Comput. Simul. 29(5), 170–173 (2012)MathSciNetGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.College of Information Technology and Art DesignShandong Institute of Commerce and TechnologyJinanChina

Personalised recommendations