
Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm
Background: the campus network serves as a basic communication and management platform of colleges and universities, providing convenience for campus life. However, it also faces network security issues. Aiming at the security problems brought by network threat attacks, a security situational awareness model of campus network based on Analytic Hierarchy Process (AHP) and Nadam algorithm was proposed. Methods: firstly, the improved AHP was used to build the Network Security Situation (NSS) assessment mode. Then, the Nadam algorithm and the improved Long Short-Term Memory (LSTM) network were used to build the NSS prediction model. Results: the results showed that the improved AHP had a good consistency in the Judgment Matrix (JM). The Fuzzy Neural Network (FNN) evaluation method, based on the improved Gravity Search Algorithm (GSA), began to converge around the 69th iteration, with a small output error of 0.0107. After 20 iterations, the fitness value stabilized at 0.13. The NSS assessment model, based on the improved AHP, achieved a high security situation value of 0.425. The mean square error of the Look ahead method, combined with the Nadam algorithm, flattened out after 80 iterations, which could increase the convergence speed of LSTM networks. The accuracy of the NSS prediction model using Nadam algorithm and improved LSTM network was the highest, up to 98%. The false positive rate and false negative rate were the lowest, at 2.64% and 11.03%, respectively. Additionally, the predicted NSS value was closest to the true value, with a Mean Absolute Percentage Error (MAPE) of 0.039 and a mean square error of 0.01. Conclusion: in summary, the constructed model in this study has good application effects in NSS awareness, and has certain positive significance for maintaining the campus network security.
[1] Aljadani E., Assiri F., and Alshutayri A., “Detecting Spam Reviews in Arabic by Deep Learning,” The International Arab Journal of Information Technology, vol. 21, no. 3, pp. 495- 505, 2024. https://doi.org/10.34028/iajit/21/3/12
[2] Alosaimi A. and Elloumi M., “Back Propogation Neural Network based Cybersecurity Information Retrival from Repository,” Turcomat, vol. 12, no. 10, pp. 1197-1204, 2021. https://turcomat.org/index.php/turkbilmat/article/ Campus Network Security Situation Awareness Based on AHP and Nadam Algorithm 1237 view/4312/3679
[3] Bouramdane A., “Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones that Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process,” Journal of Cybersecurity and Privacy, vol. 3, no. 4, pp. 662-705, 2023. DOI: 10.3390/jcp3040031
[4] Chen B., Qiao S., Zhao J., Liu D., and et al., “A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10248-10263, 2021. DOI: 10.1109/JIOT.2020.3041042
[5] Chen Z., “Research on Internet Security Situation Awareness Prediction Technology Based on Improved RBF Neural Network Algorithm,” Journal of Computational and Cognitive Engineering, vol. 1, no. 3, pp. 103-108, 2022. DOI: 10.47852/bonviewJCCE149145205514
[6] Dar T., Rai N., and Bhat A., “Delineation of Potential Groundwater Recharge Zones Using Analytical Hierarchy Process (AHP),” Geology, Ecology, and Landscapes, vol. 5, no. 4, pp. 292- 307, 2020. https://doi.org/10.1080/24749508.2020.1726562
[7] Darvishi H., Ciuonzo D., Eide E., and Rossi P., “Sensor-Fault Detection, Isolation and Accommodation for Digital Twins via Modular Data-Driven Architecture,” IEEE Sensors Journal, vol. 21, no. 4, pp. 4827-4838, 2021. DOI: 10.1109/JSEN.2020.3029459
[8] Dehkordi S., Nasri S., and Dami S., “Unveiling Anomalies: Transformative Insights from Transformer-based Autoencoder Models,” International Journal of Computers and Applications, vol. 47, no. 1, pp. 29-44, 2025. DOI: 10.1080/1206212X.2024.2441147
[9] Dezert J., Tchamova A., Han D., and Tacnet J., “The SPOTIS Rank Reversal Free Method for Multi-Criteria Decision-Making Support,” in Proceedings of the IEEE 23rd International Conference on Information Fusion, Rustenburg, pp. 1-8, 2020. DOI: 10.23919/FUSION45008.2020.9190347
[10] Gui Y., Li D., and Fang R., “A Fast Adaptive Algorithm for Training Deep Neural Networks,” Applied Intelligence, vol. 53, no. 4, pp. 4099- 4108, 2023. DOI: 10.1007/s10489-022-03629-7
[11] Guo H., Li J., Liu J., Tian N., and Kato N., “A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G,” IEEE Communications Surveys and Tutorials, vol. 24, no. 1, pp. 53-87, 2022. https://doi.org/10.1109/COMST.2021.3131332
[12] Iqbal I., Odesanmi G., Wang J., and Liu L., “Comparative Investigation of Learning Algorithms for Image Classification with Small Dataset,” Applied Artificial Intelligence, vol. 35, no. 10, pp. 697-716, 2021. DOI: 10.1080/08839514.2021.1922841
[13] Ishtaiwi A., Ali A., Al-Qerem A., Alsmadi Y., and et al., “Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models,” The International Arab Journal of Information Technology, vol. 21, no. 3, pp. 466- 482, 2024. https://doi.org/10.34028/iajit/21/3/10
[14] Liu Q. and Zeng M., “Network Security Situation Detection of Internet of Things for Smart City Based on Fuzzy Neural Network,” International Journal of Reasoning-based Intelligent Systems, vol. 12, no. 3, pp. 222-227, 2020. https://doi.org/10.1504/IJRIS.2020.109650
[15] Madhavi S., Santhosh N., Rajkumar R., and Praveen R., “Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based Multi-Criteria Decision-Making Model for Mitigating Resource Deletion Attacks in WSNs,” Journal of Intelligent and Fuzzy Systems: Applications in Engineering and Technology, vol. 44, no. 6, pp. 9441-9459, 2023. DOI: 10.3233/JIFS-224141
[16] Manaa M., Hussain S., Alasadi S., and Al- Khamees H., “DDoS Attacks Detection Based on Machine Learning Algorithms in IoT Environments,” Inteligencia Artificial, vol. 27, no. 74, pp. 152-165, 2024. DOI: 10.4114/intartif.vol27iss74pp152-165
[17] Munier N., “A New Approach to the Rank Reversal Phenomenon in MCDM with the SIMUS Method,” Multiple Criteria Decision Making, vol. 11, pp. 137-152, 2016. DOI: 10.22367/mcdm.2016.11.09
[18] Sałabun W. and Piegat A., “Comparative Analysis of MCDM Methods for the Assessment of Mortality in Patients with Acute Coronary Syndrome,” Artificial Intelligence Review, vol. 48, no. 4, pp. 557-571, 2017. DOI: 10.1007/s10462-016-9511-9
[19] Sonal. and Ghosh D., “Impact of Situational Awareness Attributes for Resilience Assessment of Active Distribution Networks Using Hybrid Dynamic Bayesian Multi Criteria Decision- Making Approach,” Reliability Engineering and System Safety, vol. 228, pp. 108772-108796, 2022. https://doi.org/10.1016/j.ress.2022.108772
[20] Swathi T., Kasiviswanath N., and Rao A., “An Optimal Deep Learning-based LSTM for Stock Price Prediction Using Twitter Sentiment Analysis,” Applied Intelligence, vol. 52, no. 12, pp. 13675-13688, 2022. DOI: 10.1007/s10489- 022-03175-2
[21] Tan L., Yu K., Ming F., Cheng X., and Srivastava G., “Secure and Resilient Artificial Intelligence of Things: A Honeynet Approach for Threat Detection and Situational Awareness,” IEEE 1238 The International Arab Journal of Information Technology, Vol. 22, No. 6, November 2025 Consumer Electronics Magazine, vol. 11, no. 3, pp. 69-78, 2022. DOI: 10.1109/MCE.2021.3081874
[22] Tavana M., Soltanifar M., and Santos-Arteaga F., “Analytical Hierarchy Process: Revolution and Evolution,” European Journal of Operational Research, vol. 326, no. 2, pp. 879-907, 2023. https://doi.org/10.1007/s10479-021-04432-2
[23] Wieckowski J., Kizielewicz B., Shekhovtsov A., and Sałabun W., “RANCOM: A Novel Approach to Identifying Criteria Relevance Based on Inaccuracy Expert Judgments,” Engineering Applications of Artificial Intelligence, vol. 122, pp. 106114, 2023. https://doi.org/10.1016/j.engappai.2023.106114
[24] Wozniak M., Silka J., Wieczorek M., and Alrashoud M., “Recurrent Neural Network Model for IoT and Networking Malware Threat Detection,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5583-5594, 2021. DOI: 10.1109/TII.2020.3021689
[25] Wu J., Qiu G., Jiang W., and Jin J., “Federated Learning for Network Attack Detection Using Attention-based Graph Neural Networks,” Scientific Reports, vol. 14, no. 1, pp. 1-16, 2024. DOI: 10.1038/s41598-024-70032-2
[26] Xie J., “Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention,” International Journal of Computational Intelligence Systems, vol. 17, no. 1, pp. 1-12, 2024. DOI: 10.1007/s44196-024-00492-x
[27] Xu F. and Shen T., “Look-Ahead Prediction-based Real-time Optimal Energy Management for Connected HEVs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 3, pp. 2537- 2551, 2020. DOI: 10.1109/TVT.2020.2965163
[28] Xu Y., Lu X., Cetiner B., and Taciroglu E., “Real- Time Regional Seismic Damage Assessment Framework Based on Long Short-Term Memory Neural Network,” Computer-Aided Civil and Infrastructure Engineering, vol. 36, no. 4, pp. 504- 521, 2021. https://doi.org/10.1111/mice.12628
[29] Yang H., Zhang Z., Xie L., and Zhang L., “Network Security Situation Assessment with Network Attack Behavior Classification,” International Journal of Intelligent Systems, vol. 37, no. 10, pp. 6909-6927, 2022. DOI: 10.1002/int.22867
[30] Zhang Y., Chen J., Wang D., Hu M., and Chen L., “The Bidirectional Gate Recurrent Unit Based Attention Mechanism Network for State of Charge Estimation,” Journal of the Electrochemical Society, vol. 169, no. 11, pp. 110503, 2022. DOI: 10.1149/1945-7111/ac9d09
[31] Zhu Z. and Hou Z., “Research and Application of Rectified-NAdam Optimization Algorithm in Data Classification,” American Journal of Computer Science and Technology, vol. 4, no. 4, pp. 106-110, 2021. DOI: 10.11648/j.ajcst.20210404.13