{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:16:50Z","timestamp":1764937010933,"version":"3.41.2"},"reference-count":30,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2018,8,2]],"date-time":"2018-08-02T00:00:00Z","timestamp":1533168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJICC"],"published-print":{"date-parts":[[2018,10,8]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to solve the shortage of the existing methods for the prediction of network security situations (NSS). Because the conventional methods for the prediction of NSS, such as support vector machine, particle swarm optimization, etc., lack accuracy, robustness and efficiency, in this study, the authors propose a new method for the prediction of NSS based on recurrent neural network (RNN) with gated recurrent unit.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This method extracts internal and external information features from the original time-series network data for the first time. Then, the extracted features are applied to the deep RNN model for training and validation. After iteration and optimization, the accuracy of predictions of NSS will be obtained by the well-trained model, and the model is robust for the unstable network data.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Experiments on bench marked data set show that the proposed method obtains more accurate and robust prediction results than conventional models. Although the deep RNN models need more time consumption for training, they guarantee the accuracy and robustness of prediction in return for validation.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>In the prediction of NSS time-series data, the proposed internal and external information features are well described the original data, and the employment of deep RNN model will outperform the state-of-the-arts models.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijicc-06-2017-0066","type":"journal-article","created":{"date-parts":[[2018,8,2]],"date-time":"2018-08-02T10:00:01Z","timestamp":1533204001000},"page":"511-525","source":"Crossref","is-referenced-by-count":11,"title":["A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit"],"prefix":"10.1108","volume":"11","author":[{"given":"Wei","family":"Feng","sequence":"first","affiliation":[]},{"given":"Yuqin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yexian","family":"Fan","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2018,8,2]]},"reference":[{"issue":"2","key":"key2021041507201650600_ref001","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10845-012-0683-0","article-title":"Information security strategies: towards an organizational multi-strategy perspective","volume":"25","year":"2014","journal-title":"Journal of Intelligent Manufacturing"},{"issue":"1","key":"key2021041507201650600_ref002","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5121\/ijnsa.2014.6103","article-title":"Cloud computing and security issues in the cloud","volume":"6","year":"2014","journal-title":"International Journal of Network Security & Its Applications"},{"year":"2014","key":"key2021041507201650600_ref003","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling"},{"first-page":"8609","article-title":"Improving deep neural networks for LVCSR using rectified linear units and dropout","year":"2013","key":"key2021041507201650600_ref004"},{"key":"key2021041507201650600_ref005","first-page":"1504","article-title":"Equilibrated adaptive learning rates for non-convex optimization","year":"2015","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"6","key":"key2021041507201650600_ref006","first-page":"67","article-title":"A method for comparing and analyzing wireless security situations in two capital cities","volume":"13","year":"2016","journal-title":"Acta Polytechnica Hungarica"},{"key":"key2021041507201650600_ref007","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.asoc.2015.12.009","article-title":"Intelligent mixed H2\/H\u221e adaptive tracking control system design using self-organizing recurrent fuzzy-wavelet-neural-network for uncertain two-axis motion control system","volume":"41","year":"2016","journal-title":"Applied Soft Computing"},{"first-page":"6645","article-title":"Speech recognition with deep recurrent neural networks","year":"2013","key":"key2021041507201650600_ref008"},{"key":"key2021041507201650600_ref009","first-page":"55","article-title":"Multitask learning-based security event forecast methods for wireless sensor networks","volume":"42","year":"2016","journal-title":"Journal of Sensors"},{"issue":"4","key":"key2021041507201650600_ref010","doi-asserted-by":"crossref","first-page":"54","DOI":"10.3390\/fi8040054","article-title":"Network forensics method based on evidence graph and vulnerability reasoning","volume":"8","year":"2016","journal-title":"Future Internet"},{"key":"key2021041507201650600_ref011","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.asoc.2016.05.046","article-title":"A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm","volume":"48","year":"2016","journal-title":"Applied Soft Computing"},{"key":"key2021041507201650600_ref012","first-page":"105","article-title":"Quantitative method for network security situation based on attack prediction","volume":"36","year":"2017","journal-title":"Security and Communication Networks"},{"key":"key2021041507201650600_ref014","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.jmatprotec.2016.07.015","article-title":"EMD-based pulsed TIG welding process porosity defect detection and defect diagnosis using GA-SVM","volume":"239","year":"2017","journal-title":"Journal of Materials Processing Technology"},{"first-page":"1","article-title":"Toward blind nonlinearity estimation in back-propagation algorithm for coherent optical transmission systems","year":"2017","key":"key2021041507201650600_ref015"},{"issue":"8","key":"key2021041507201650600_ref016","first-page":"859","article-title":"Wireless sensor networks: security issues, challenges and solutions","volume":"4","year":"2014","journal-title":"International Journal of Information and Computation Technology"},{"issue":"7553","key":"key2021041507201650600_ref017","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","year":"2015","journal-title":"Nature"},{"issue":"12","key":"key2021041507201650600_ref013","doi-asserted-by":"crossref","first-page":"347","DOI":"10.14257\/ijsia.2016.10.12.28","article-title":"Network security prediction method based on Kalman filtering fusion decision entropy theory","volume":"10","year":"2016","journal-title":"International Journal of Security and Its Applications"},{"year":"2014","key":"key2021041507201650600_ref018","article-title":"Learning longer memory in recurrent neural networks"},{"issue":"6","key":"key2021041507201650600_ref300","first-page":"1137","article-title":"Faster R-CNN: towards real-time object detection with region proposal networks","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"year":"2014","key":"key2021041507201650600_ref019","article-title":"Long short-term memory recurrent neural network architectures for large scale acoustic modeling"},{"key":"key2021041507201650600_ref020","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","article-title":"Deep learning in neural networks: an overview","volume":"61","year":"2015","journal-title":"Neural Networks"},{"issue":"2","key":"key2021041507201650600_ref021","first-page":"272","article-title":"Batik production process optimization using particle swarm optimization method","volume":"86","year":"2016","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"key2021041507201650600_ref022","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"key2021041507201650600_ref023","first-page":"735","article-title":"Analysis on gated recurrent unit based question detection approach","year":"2016","journal-title":"Interspeech"},{"issue":"12","key":"key2021041507201650600_ref024","article-title":"A Markov game model of network security in information system based on copula theory","volume":"55","year":"2017","journal-title":"Bolet\u00edn T\u00e9cnico"},{"key":"key2021041507201650600_ref025","doi-asserted-by":"crossref","first-page":"21046","DOI":"10.1109\/ACCESS.2017.2734681","article-title":"Network security situation awareness based on semantic ontology and user-defined rules for internet of things","volume":"5","year":"2017","journal-title":"IEEE Access"},{"issue":"4","key":"key2021041507201650600_ref026","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1108\/17563781211282286","article-title":"Hybrid model of self-organizing map and kernel auto-associator for internet intrusion detection","volume":"5","year":"2012","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"3","key":"key2021041507201650600_ref027","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.dcan.2016.06.003","article-title":"A network security situation prediction model based on wavelet neural network with optimized parameters","volume":"2","year":"2016","journal-title":"Digital Communications and Networks"},{"key":"key2021041507201650600_ref028","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.procs.2013.05.068","article-title":"A multi-level analysis framework in network security situation awareness","volume":"17","year":"2013","journal-title":"Procedia Computer Science"},{"key":"key2021041507201650600_ref029","first-page":"123","article-title":"Security situation assessment of all-optical network based on evidential reasoning rule","volume":"45","year":"2016","journal-title":"Mathematical Problems in Engineering"}],"container-title":["International Journal of Intelligent Computing and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2017-0066\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2017-0066\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:54:23Z","timestamp":1753397663000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijicc\/article\/13\/1\/25-39\/134414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,2]]},"references-count":30,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,8,2]]},"published-print":{"date-parts":[[2018,10,8]]}},"alternative-id":["10.1108\/IJICC-06-2017-0066"],"URL":"https:\/\/doi.org\/10.1108\/ijicc-06-2017-0066","relation":{},"ISSN":["1756-378X"],"issn-type":[{"type":"print","value":"1756-378X"}],"subject":[],"published":{"date-parts":[[2018,8,2]]}}}