{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:15:15Z","timestamp":1766268915593,"version":"3.41.2"},"reference-count":33,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Communication network security situation analysis prevents unauthorized users from accessing and stealing sensitive information. Network security analysis aims to monitor, discover, and eradicate security flaws by carefully examining the network\u2019s architecture, data, and traffic to ensure safety. In time series data mining analysis by cyber terrorism, specialists must pay attention to cyber security, which involves identifying the elements contributing to long-term trends or systemic patterns via pattern-matching algorithms and other types of inferential processing on large datasets. The challenging characteristics of communication network security situation analysis are data loss, security breaches, hacking, and viruses. Hence, in this research, attention mechanism-based convolutional neural network-enabled practical byzantine fault tolerant (AMBCNN-PBFT) has been designed to improve communication network security situation analysis in time series data mining. AMBCNN-PBFT helps to increase communication network security usage and support the expansion during the evaluation system by optimizing the time series data mining. AMBCNN-PBFT effectively predicts the rise in the communication network, associated with faster times series benefits data mining approach. The study concludes that the AMBCNN-PBFT efficiently indicates and validates the communication network security in time series data mining during the evaluation system. The experimental analysis of AMBCNN-PBFT outperforms the data mining time series in terms of accuracy, efficiency, performance, and prediction.<\/jats:p>","DOI":"10.1515\/comp-2023-0104","type":"journal-article","created":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T15:20:56Z","timestamp":1715008856000},"source":"Crossref","is-referenced-by-count":2,"title":["Communication network security situation analysis based on time series data mining technology"],"prefix":"10.1515","volume":"14","author":[{"given":"Qingjian","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Internet of Things Technology, Henan Institute of Economics and Trade , Zhengzhou 450018, Henan , China"},{"name":"International Joint Research Laboratory for Agricultural Products Traceability of Henan , Zhengzhou 450018, Henan , China"}]}],"member":"374","published-online":{"date-parts":[[2024,5,6]]},"reference":[{"key":"2024050617104551389_j_comp-2023-0104_ref_001","doi-asserted-by":"crossref","unstructured":"Z. Gu, S. Nazir, C. Hong, and S. Khan, \u201cConvolution neural network-based higher accurate intrusion identification system for network security and communication,\u201d Secur. Commun. Netw., vol. 2020, pp. 1\u201310, 2020.","DOI":"10.1155\/2020\/8830903"},{"key":"2024050617104551389_j_comp-2023-0104_ref_002","doi-asserted-by":"crossref","unstructured":"M. A. Khan, S. Abbas, A. Rehman, Y. Saeed, A. Zeb, M. I. Uddin, et al., \u201cA machine learning approach for blockchain-based smart home networks security,\u201d IEEE Netw., vol. 35, no. 3, pp. 223\u2013229, 2020.","DOI":"10.1109\/MNET.011.2000514"},{"key":"2024050617104551389_j_comp-2023-0104_ref_003","doi-asserted-by":"crossref","unstructured":"W. Mazurczyk, P. Bisson, R. P. Jover, K. Nakao, and K. Cabaj, \u201cChallenges and novel solutions for 5G network security, privacy and trust,\u201d IEEE Wirel. Commun., vol. 27, no. 4, pp. 6\u20137, 2020.","DOI":"10.1109\/MWC.2020.9170261"},{"key":"2024050617104551389_j_comp-2023-0104_ref_004","doi-asserted-by":"crossref","unstructured":"W. Li, W. Meng, Z. Liu, and M. H. Au, \u201cTowards blockchain-based software-defined networking: security challenges and solutions,\u201d IEICE Trans. Inf. Syst., vol. 103, no. 2, pp. 196\u2013203, 2020.","DOI":"10.1587\/transinf.2019INI0002"},{"key":"2024050617104551389_j_comp-2023-0104_ref_005","doi-asserted-by":"crossref","unstructured":"B. B. Sundaram, P. Rajkumar, M. M. Ananthi, V. S. Kumar, M. J. Vijaykumar, and P. Karthika, \u201cNetwork security analysis for signal strength based packet filitering,\u201d In 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020, December, pp. 1352\u20131355.","DOI":"10.1109\/ICISS49785.2020.9315943"},{"key":"2024050617104551389_j_comp-2023-0104_ref_006","doi-asserted-by":"crossref","unstructured":"I. El Alaoui and Y. Gahi, \u201cNetwork security strategies in big data context,\u201d Procedia Comput. Sci., vol. 175, pp. 730\u2013736, 2020.","DOI":"10.1016\/j.procs.2020.07.108"},{"key":"2024050617104551389_j_comp-2023-0104_ref_007","unstructured":"N. Tosun, M. Altin\u00f6z, E. \u00c7ay, T. \u00c7inkili\u00e7, S. G\u00fclse\u00e7en, T. Yildirim, et al., \u201cA swot analysis to raise awareness about cyber security and proper use of social media: Istanbul sample,\u201d Int. J. Curric. Instr., vol. 12, pp. 271\u2013294, 2020."},{"key":"2024050617104551389_j_comp-2023-0104_ref_008","doi-asserted-by":"crossref","unstructured":"P. Zaiyi, \u201cNetwork security situation analysis based on a dynamic Bayesian network and phase space reconstruction,\u201d J. Supercomput., vol. 76, no. 2, pp. 1342\u20131357, 2020.","DOI":"10.1007\/s11227-018-2575-3"},{"key":"2024050617104551389_j_comp-2023-0104_ref_009","doi-asserted-by":"crossref","unstructured":"Z. Gu, S. Nazir, C. Hong, and S. Khan, \u201cConvolution neural network-based higher accurate intrusion identification system for the network security and communication,\u201d Secur. Commun. Netw., vol. 2020, pp. 1\u201310, 2020.","DOI":"10.1155\/2020\/8830903"},{"key":"2024050617104551389_j_comp-2023-0104_ref_010","doi-asserted-by":"crossref","unstructured":"J. Bian and S. Fu, \u201cApplication of data mining in predictive analysis of network security model,\u201d Secur. Commun. Netw., vol. 2022, 2022. 10.1155\/2022\/4922377.","DOI":"10.1155\/2022\/4922377"},{"key":"2024050617104551389_j_comp-2023-0104_ref_011","doi-asserted-by":"crossref","unstructured":"S. Ren, D. Chen, Y. Tao, S. Xu, G. Wang, and Z. Yang, \u201cIntelligent terminal security technology of power grid sensing layer based upon information entropy data mining,\u201d J. Intell. Syst., vol. 31, no. 1, pp. 817\u2013834, 2022.","DOI":"10.1515\/jisys-2022-0117"},{"key":"2024050617104551389_j_comp-2023-0104_ref_012","doi-asserted-by":"crossref","unstructured":"Y. Zhou, G. Zhao, R. Alroobaea, A. M. Baqasah, and R. Miglani, \u201cResearch on data mining method of network security situation awareness based on cloud computing,\u201d J. Intell. Syst., vol. 31, no. 1, pp. 520\u2013531, 2022.","DOI":"10.1515\/jisys-2022-0037"},{"key":"2024050617104551389_j_comp-2023-0104_ref_013","doi-asserted-by":"crossref","unstructured":"Y. Liu, S. Garg, J. Nie, Y. Zhang, Z. Xiong, J. Kang, et al., \u201cDeep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach,\u201d IEEE Internet Things J, vol. 8, no. 8, pp. 6348\u20136358, 2020.","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"2024050617104551389_j_comp-2023-0104_ref_014","doi-asserted-by":"crossref","unstructured":"F. Almulihi, \u201cLoad forecasting of distributed system host based on linear time series model,\u201d Distrib. Process. Syst., vol. 3, no. 4, pp. 53\u201360, 2022. 10.38007\/DPS.2022.030407.","DOI":"10.38007\/DPS.2022.030407"},{"key":"2024050617104551389_j_comp-2023-0104_ref_015","doi-asserted-by":"crossref","unstructured":"S. B. Alavi, \u201cState consistency algorithm for peer to peer distributed systems based on data mining,\u201d Distrib. Process. Syst., vol. 1, no. 4, pp. 33\u201340, 2020. 10.38007\/DPS.2020.010405.","DOI":"10.38007\/DPS.2020.010405"},{"key":"2024050617104551389_j_comp-2023-0104_ref_016","doi-asserted-by":"crossref","unstructured":"X. Liu and J. Liu, \u201cMalicious traffic detection combined deep neural network with hierarchical attention mechanism,\u201d Sci. Rep., vol. 11, no. 1, pp. 1\u201315, 2021.","DOI":"10.1038\/s41598-021-91805-z"},{"key":"2024050617104551389_j_comp-2023-0104_ref_017","doi-asserted-by":"crossref","unstructured":"M. Poongodi, A. Sharma, V. Vijayakumar, V. Bhardwaj, A. P. Sharma, R. Iqbal, et al., \u201cPrediction of the price of Ethereum blockchain cryptocurrency in an industrial finance system,\u201d Comput. Electr. Eng., vol. 81, p. 106527, 2020.","DOI":"10.1016\/j.compeleceng.2019.106527"},{"key":"2024050617104551389_j_comp-2023-0104_ref_018","doi-asserted-by":"crossref","unstructured":"E. Sanders, \u201cEconomic development and natural ecology based on data mining technology,\u201d Nat. Environ. Prot., vol. 2, no. 2, pp. 41\u201350, 2021. 10.38007\/NEP.2021.020205.","DOI":"10.38007\/NEP.2021.020205"},{"key":"2024050617104551389_j_comp-2023-0104_ref_019","doi-asserted-by":"crossref","unstructured":"X. Zheng and W. Feng, \u201cResearch on practical Byzantine fault tolerant consensus algorithm based on blockchain,\u201d In Journal of Physics: Conference Series, Vol. 1802, no 3. IOP Publishing, 2021, March, p. 032022.","DOI":"10.1088\/1742-6596\/1802\/3\/032022"},{"key":"2024050617104551389_j_comp-2023-0104_ref_020","doi-asserted-by":"crossref","unstructured":"A. Altarawneh and A. Skjellum, \u201cThe security ingredients for correct and byzantine fault-tolerant blockchain consensus algorithms,\u201d In 2020 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, 2020, October, pp. 1\u20139.","DOI":"10.1109\/ISNCC49221.2020.9297326"},{"key":"2024050617104551389_j_comp-2023-0104_ref_021","doi-asserted-by":"crossref","unstructured":"E. Macias, \u201cDesign and implementation of intelligent fault diagnosis system for construction machinery supporting wireless communication network,\u201d Kinetic Mech. Eng., vol. 1, no. 3, pp. 17\u201324, 2020. 10.38007\/KME.2020.010303.","DOI":"10.38007\/KME.2020.010303"},{"key":"2024050617104551389_j_comp-2023-0104_ref_022","doi-asserted-by":"crossref","unstructured":"H. Yang, R. Zeng, G. Xu, and L. Zhang, \u201cA network security situation assessment method based on adversarial deep learning,\u201d Appl. Soft Comput., vol. 102, p. 107096, 2021.","DOI":"10.1016\/j.asoc.2021.107096"},{"key":"2024050617104551389_j_comp-2023-0104_ref_023","doi-asserted-by":"crossref","unstructured":"D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, \u201cPhysical safety and cyber security analysis of multi-agent systems: A survey of recent advances,\u201d IEEE\/CAA J. Autom. Sin., vol. 8, no. 2, pp. 319\u2013333, 2021.","DOI":"10.1109\/JAS.2021.1003820"},{"key":"2024050617104551389_j_comp-2023-0104_ref_024","doi-asserted-by":"crossref","unstructured":"A. Djenna, S. Harous, and D. E. Saidouni, \u201cInternet of things meet Internet of threats: New concern cyber security issues of critical cyber infrastructure,\u201d Appl. Sci., vol. 11, no. 10. p. 4580, 2021.","DOI":"10.3390\/app11104580"},{"key":"2024050617104551389_j_comp-2023-0104_ref_025","doi-asserted-by":"crossref","unstructured":"M. Safaei, M. Driss, W. Boulila, E. A. Sundararajan, and M. Safaei, \u201cGlobal outliers detection in wireless sensor networks: A novel approach integrating time\u2010series analysis, entropy, and random forest\u2010based classification,\u201d Softw.: Pract. Exper., vol. 52, no. 1, pp. 277\u2013295, 2022.","DOI":"10.1002\/spe.3020"},{"key":"2024050617104551389_j_comp-2023-0104_ref_026","doi-asserted-by":"crossref","unstructured":"M. K. Ahirwar, P. K. Shukla, and R. Singhai, \u201cCBO-IE: a data mining approach for healthcare IoT dataset using chaotic biogeography-based optimization and information entropy,\u201d Sci. Program., vol. 2021, pp. 1\u201314, 2021.","DOI":"10.1155\/2021\/8715668"},{"key":"2024050617104551389_j_comp-2023-0104_ref_027","doi-asserted-by":"crossref","unstructured":"I. H. Sarker, \u201cDeep cybersecurity: a comprehensive overview from neural network and deep learning perspective,\u201d SN Comput. Sci., vol. 2, no. 3, pp. 1\u201316, 2021.","DOI":"10.1007\/s42979-021-00535-6"},{"key":"2024050617104551389_j_comp-2023-0104_ref_028","doi-asserted-by":"crossref","unstructured":"H. Zhang, C. Kang, and Y. Xiao, \u201cResearch on network security situation awareness based on the LSTM-DT model,\u201d Sensors, vol. 21, no. 14. p. 4788, 2021.","DOI":"10.3390\/s21144788"},{"key":"2024050617104551389_j_comp-2023-0104_ref_029","doi-asserted-by":"crossref","unstructured":"E. M. Ahmed, \u201cModelling information and communications technology cyber security externalities spillover effects on sustainable economic growth,\u201d J. Knowl. Econ., vol. 12, no. 1, pp. 412\u2013430, 2021.","DOI":"10.1007\/s13132-020-00627-3"},{"key":"2024050617104551389_j_comp-2023-0104_ref_030","doi-asserted-by":"crossref","unstructured":"X. Tao, K. Kong, F. Zhao, S. Cheng, and S. Wang, \u201cAn efficient method for network security situation assessment,\u201d Int. J. Distrib. Sens. Netw., vol. 16, no. 11. p. 1550147720971517, 2020.","DOI":"10.1177\/1550147720971517"},{"key":"2024050617104551389_j_comp-2023-0104_ref_031","doi-asserted-by":"crossref","unstructured":"H. I. Fawaz, G. Forestier, J. Weber, L. Idoumghar, and P. A. Muller, \u201cAdversarial attacks on deep neural networks for time series classification,\u201d In 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, 2019, July, pp. 1\u20138.","DOI":"10.1109\/IJCNN.2019.8852316"},{"key":"2024050617104551389_j_comp-2023-0104_ref_032","unstructured":"https:\/\/datasetsearch.research.google.com\/search?src=0&query=Communication%20network%20security%20&docid=L2cvMTFycHJ3YnhoeA%3D%3D. 2019."},{"key":"2024050617104551389_j_comp-2023-0104_ref_033","unstructured":"https:\/\/www.kaggle.com\/datasets\/shenba\/time-series-datasets. 2017."}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0104\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0104\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T03:22:41Z","timestamp":1731900161000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0104\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,5,6]]},"published-print":{"date-parts":[[2024,5,6]]}},"alternative-id":["10.1515\/comp-2023-0104"],"URL":"https:\/\/doi.org\/10.1515\/comp-2023-0104","relation":{},"ISSN":["2299-1093"],"issn-type":[{"type":"electronic","value":"2299-1093"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20230104"}}