Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security authentication system

A verification system and security technology, applied in the field of network security verification system, can solve the problems of false negatives and false positives, intrusion detection technology can not effectively detect unknown types of attacks, can not prevent attacks and other problems, to achieve a low false positive rate , avoid chance, improve the effect of accuracy

Inactive Publication Date: 2016-09-21
吴本刚
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Firewall technology only filters static data and cannot prevent attacks from inside the network; intrusion detection technology not only cannot effectively detect unknown types of attacks, but also may cause false negatives and false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security authentication system
  • Network security authentication system
  • Network security authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 1 , figure 2 , the network security verification system of this embodiment includes a data capture module 1, a data preprocessing module 2, and a behavior analysis module 3; the data capture module 1 is used to capture suspicious traffic and abnormal behavior entering and leaving the system to form a sample Data; the data preprocessing module 2 is used to filter and preprocess the sample data, remove the noise data in the sample data, and then perform dimensionality reduction processing on the sample data; the behavior analysis module 3 is used to adopt the improved K The -means clustering method performs cluster analysis on the preprocessed sample data, and detects attack behaviors based on the artificial neural network algorithm to identify potential unknown attacks in the network.

[0031] Wherein, the data capture module 1 uses a firewall to collect suspicious traffic entering and exiting the system.

[0032] Wherein, the data capture module 1 captures...

Embodiment 2

[0046] see figure 1 , figure 2 , the network security verification system of this embodiment includes a data capture module 1, a data preprocessing module 2, and a behavior analysis module 3; the data capture module 1 is used to capture suspicious traffic and abnormal behavior entering and leaving the system to form a sample Data; the data preprocessing module 2 is used to filter and preprocess the sample data, remove the noise data in the sample data, and then perform dimensionality reduction processing on the sample data; the behavior analysis module 3 is used to adopt the improved K The -means clustering method performs cluster analysis on the preprocessed sample data, and detects attack behaviors based on the artificial neural network algorithm to identify potential unknown attacks in the network.

[0047] Wherein, the data capture module 1 uses a firewall to collect suspicious traffic entering and exiting the system.

[0048] Wherein, the data capture module 1 captures...

Embodiment 3

[0062] see figure 1 , figure 2 , the network security verification system of this embodiment includes a data capture module 1, a data preprocessing module 2, and a behavior analysis module 3; the data capture module 1 is used to capture suspicious traffic and abnormal behavior entering and leaving the system to form a sample Data; the data preprocessing module 2 is used to filter and preprocess the sample data, remove the noise data in the sample data, and then perform dimensionality reduction processing on the sample data; the behavior analysis module 3 is used to adopt the improved K The -means clustering method performs cluster analysis on the preprocessed sample data, and detects attack behaviors based on the artificial neural network algorithm to identify potential unknown attacks in the network.

[0063] Wherein, the data capture module 1 uses a firewall to collect suspicious traffic entering and exiting the system.

[0064] Wherein, the data capture module 1 captures...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security authentication system, comprising a data capturing module, used for capturing suspicious traffic and abnormal behaviors of an import and export system to form sample data; a data preprocessing module, used for carrying out screening preprocessing on the sample data, removing the noise data in the sample data and carrying out dimensionality reduction processing on the sample data; and a behavior analysis module, used for carrying out clustering analysis on the preprocessed sample data by adopting an improved K-Means clustering method, and carrying out aggressive behavior detection based on an artificial neural network algorithm to identify potential unknown attacks in the network. The network security authentication system disclosed by the invention can detect known and unknown network attacks, carry out clustering analysis on the preprocessed suspicious traffic and the abnormal behaviors of the import and export system by adopting the improved K-Means clustering method and can accurately separate the network attacks of various types, so as to achieve very high accuracy and a very low false alarm rate.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a network safety verification system. Background technique [0002] In related technologies, most of the network security detection systems adopt passive defense technologies, such as firewall technology and intrusion detection technology and so on. Firewall technology only filters static data, and cannot prevent attacks from inside the network; intrusion detection technology not only cannot effectively detect unknown types of attacks, but also may cause false negatives and false positives. Contents of the invention [0003] In view of the above problems, the present invention provides a network security verification system. [0004] The object of the present invention adopts following technical scheme to realize: [0005] The network security verification system includes a data capture module, a data preprocessing module, and a behavior analysis module; the data capture...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 不公告发明人
Owner 吴本刚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products