Open Access
ARTICLE
A New Model for Network Security Situation Assessment of the Industrial Internet
1 College of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China
2 School of Information Technology, Luoyang Normal University, Luoyang, 471934, China
3 Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, 200240, China
* Corresponding Author: Shiming Li. Email:
Computers, Materials & Continua 2023, 75(2), 2527-2555. https://doi.org/10.32604/cmc.2023.036427
Received 29 September 2022; Accepted 29 December 2022; Issue published 31 March 2023
Abstract
To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the projection covariance matrix adaptive evolution strategy (P-CMA-ES) is used to optimize the model parameters. This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion. Moreover, it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data. Finally, a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method. The research results show that this method has strong applicability to the network security situation assessment of complex Industrial Internet systems. It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures, thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.