A Network Security Situation Prediction Model Enhanced by Multi Head Attention Mechanism
Abstract
The Internet has grown as a result of information technology advancements, and cybercrime is becoming more and more common. To improve the network defense against all kinds of network attacks and reduce the success rate of cyber crimes, the research innovatively proposes to use the multi-tease attention mechanism to improve the gating cycle unit, and use the multi-head attention mechanism to obtain network security feature information at different locations, so as to improve the learning characteristics of network situation prediction and realize network security situation prediction. Three layers comprised the model: the prediction layer, the transform layer, and the circular network layer. The circular network layer was responsible for dimensionality reduction of network information data. Information features were extracted via the transform layer. The outcomes of the predictions were output by the prediction layer. The study's model performed better when taught in both directions, according to the data, and its accuracy could reach roughly 93.5%. The highest level of model accuracy could be reached when other parameters were fixed and the neurons in the feed-forward layer was 28. Compared with other network security situation prediction models, the proposed model could improve the prediction accuracy to around 93.5% and the precision to around 91% on the UNSW-NB15 dataset, while maintaining the F1 value of the model at around 92%. The research-designed model can accurately predict the network security situation changes, which improves the Internet's defense against attacks and maintains the normal operation of the Internet community.DOI:
https://doi.org/10.31449/inf.v49i18.7670Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







