A Method of Abnormal Detection of Network Intrusion

A network intrusion and anomaly detection technology, applied in the field of network security, can solve problems such as difficult to apply retraining, fast update, multi-time solution, etc.

Inactive Publication Date: 2018-02-09
中国人民解放军61599部队计算所
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the SVM model takes a lot of time to find the optimal solution, and its online recursive model replaces the optimal solution with a suboptimal solution, so it is difficult to apply the retraining method to achieve rapid update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Abnormal Detection of Network Intrusion
  • A Method of Abnormal Detection of Network Intrusion
  • A Method of Abnormal Detection of Network Intrusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention is described below based on examples, but the present invention is not limited to these examples. In the following detailed description of the invention, some specific details are set forth in detail. The present invention can be fully understood by those skilled in the art without the description of these detailed parts. In order not to obscure the essence of the present invention, well-known methods, procedures, procedures, components and circuits have not been described in detail.

[0050] Additionally, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.

[0051] Unless the context clearly requires, throughout the specification and claims, "comprises", "comprises" and similar words should be interpreted in an inclusive sense rather than an exclusive or exhaustive meaning; that is, "including but not limited to" meaning.

[0052] In the descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion anomaly detection method. Aiming at the problem about high-dimensional colinearity of input features of a network intrusion anomaly detection model, firstly, the PCA (principal component analysis)-based feature extraction technology is adopted to extract potential features of input variables so as to eliminate the colinearity among the variables; then, the MI (mutual information)-based feature extraction technology is adopted to select the potential variables extracted through PCA so as to realize selection of mutually independent feature variables most related to the output category of the anomaly detection model; finally, the detection model is established based on the RVFL network with a higher learning rate through the feature input. With adoption of the network intrusion anomaly detection method, the defects that the extracted features of principal component analysis are uncorrelated to model output, and correlation among the variables needs to consider for mutual information based feature selection are counteracted, and the problem about high-dimensional colinearity of input features of the network intrusion anomaly detection model is effectively solved.

Description

technical field [0001] The invention relates to network security technology, in particular to a network intrusion anomaly detection method. Background technique [0002] With the wireless and mobile networks, and the gradual deepening and promotion of Industry 4.0, the information security situation is becoming increasingly severe, and the security protection of key infrastructure related to national security needs to be highly valued. Network intrusion detection refers to the discovery of behaviors that violate security policies or endanger system security in the system by collecting information such as operating systems, system programs, applications, and network packets. Existing network intrusion anomaly detection technologies include statistical analysis, pattern prediction, neural network, genetic algorithm, sequence matching and learning, immune system, norm-based, data mining, integrity checking and Bayesian techniques, etc. Aiming at the shortcoming that the curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 汤健孙春来贾美英李东毛克峰
Owner 中国人民解放军61599部队计算所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products