878
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Network security situation assessment based on dual attention mechanism and HHO-ResNeXt

, &
Article: 2174080 | Received 24 Nov 2022, Accepted 25 Jan 2023, Published online: 20 Feb 2023

Figures & data

Figure 1. The equivalent blocks of ResNeXt.

Figure 1. The equivalent blocks of ResNeXt.

Figure 2. The efficient channel attention module.

Figure 2. The efficient channel attention module.

Figure 3. The contextual transformer (CoT) block.

Figure 3. The contextual transformer (CoT) block.

Figure 4. The ECA-ResNeXt block.

Figure 4. The ECA-ResNeXt block.

Figure 5. The CoTNeXt block.

Figure 5. The CoTNeXt block.

Figure 6. The complete structure of our model.

Figure 6. The complete structure of our model.

Table 1. Details of this model.

Figure 7. The flow chart of the network security situation assessment model.

Figure 7. The flow chart of the network security situation assessment model.

Table 2. Impact of attacks in the NSL-KDD dataset.

Table 3. Impact of attacks in the UNSW-NB15 dataset.

Figure 8. Actual network security situation values for NSL-KDD dataset.

Figure 8. Actual network security situation values for NSL-KDD dataset.

Figure 9. Actual network security situation values for UNSW-NB15 dataset.

Figure 9. Actual network security situation values for UNSW-NB15 dataset.

Table 4. Experiment results of different models.

Figure 10. Situation assessment results on the NSL-KDD dataset.

Figure 10. Situation assessment results on the NSL-KDD dataset.

Figure 11. Situation assessment results on the UNSW-NB15 dataset.

Figure 11. Situation assessment results on the UNSW-NB15 dataset.

Table 5. Network security situation assessment results of each model.