Link discovery technique based network intrusion prediction method

A network intrusion and contact discovery technology, applied in data exchange networks, transmission systems, digital transmission systems, etc., can solve problems such as the inability to quickly and accurately find key network base points with high intrusion risks, and the large amount of network data, so as to improve security. The effect of protection ability, small calculation amount and fast response speed

Inactive Publication Date: 2012-07-25
CHONGQING JIAOTONG UNIVERSITY
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the large amount of network data presents a flow pattern and cannot quickly and accurately find key network base points with high intrusion risks, the present invention proposes a network intrusion prediction method based on connection discovery technology, and provides a new network intrusion behavior prediction method to Predict the network intrusion behavior in the "big data era", and predict the key network base points with high intrusion risks in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link discovery technique based network intrusion prediction method
  • Link discovery technique based network intrusion prediction method
  • Link discovery technique based network intrusion prediction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and preferred embodiments or implementations. It should be understood that the described specific embodiments or examples are only used to explain the present invention, and not to limit the present invention.

[0034] Several terms appearing in the present invention are given relevant definitions:

[0035] Entity: Represents any hardware or software process that can send or receive information in a computer. In this patent, it refers to a network object that contains one or more attributes. For example, the network base station described in the present invention is an entity, which contains IP addresses and more. Attributes.

[0036] Variable: Refers to the observable attributes of an entity.

[0037] In the embodiment of the present invention, N represents the number ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computer network security, and provides a link discovery technique based network intrusion prediction method. The method comprises the following steps: acquiring the network data of network base-points, and carrying out processing on the network data so as to generate target data; calculating correlation coefficients among the network base-points; calculating the weighted degrees of the network base-points; calculating the weighted clustering coefficients of the network base-points; calculating the weighted comprehensive feature values of the network base-points; and sequencing the weighted comprehensive feature values of the network base-points, and finding out a key network base-point. By using the method disclosed by the invention, the problem that because a network is large in data size and streamed, a key network base-point with a high intrusion risk can not be quickly and accurately found is solved; and the method disclosed by the invention is small in calculated amount, quick in response speed and high in accuracy, and can effectively improve the network security protection capability.

Description

Technical field [0001] The invention relates to the technical field of computer network security, in particular to a network intrusion prediction method based on contact discovery. Background technique [0002] Now information and network technologies have penetrated extensively and deeply into various fields of business, finance, scientific research, education, military, and people’s daily lives. According to the China Internet Network Information Center (CNNIC) and the "28th Session" issued on July 19, 2011 "Statistical Report on China's Internet Development Status", as of June 31, 2011, the number of Chinese Internet users reached 485 million, with a penetration rate of 36.2%. The number of netizens increased by 27.7 million from the end of 2010. At present, Internet applications such as online games, QQ chat, online banking, and online stock trading are becoming increasingly popular. The user’s account in these applications is directly related to the user’s property in the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
Inventor 朱振国王勇徐毅米波
Owner CHONGQING JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products