Paper
10 November 2022 Research on prediction of security corresponding frequency based on GRU
Zixin Liu, Youlin Cai
Author Affiliations +
Proceedings Volume 12348, 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022); 123482K (2022) https://doi.org/10.1117/12.2641476
Event: 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022), 2022, Zhuhai, China
Abstract
In the security analysis of the situational awareness system, the prediction of the frequency of intrusion events has also become an interesting research point. The accumulation of intrusion frequency in the past and the data after manual screening can assist us in establishing an intrusion perception prediction mechanism. At the same time, with the innovation of hardware technology, we can use deep learning GRU technology to improve prediction efficiency and reduce time-consuming. This article uses statistical data on the frequency of past intrusion events, takes 7 days as a time period for training data and forecasts, uses a hidden layer of 60 neurons and an empirical learning rate. Experiments have proved that the prediction effect of GRU can effectively predict the frequency range of events, and it is expected to be deployed in the situational awareness framework.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zixin Liu and Youlin Cai "Research on prediction of security corresponding frequency based on GRU", Proc. SPIE 12348, 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022), 123482K (10 November 2022); https://doi.org/10.1117/12.2641476
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Situational awareness sensors

Computer security

Information security

Analytical research

Neural networks

Computer intrusion detection

Back to Top