Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network invasion abnormity detection method

A network intrusion and intrusion detection technology, applied in the field of network security, can solve problems such as the inability to guarantee universal approximation capabilities

Inactive Publication Date: 2016-10-26
中国人民解放军61599部队计算所 +1
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it cannot guarantee that the constructed random weight neural network (RWNN) model has universal approximation ability (in the sense of probability 1), which is mainly due to the way in which the input weights and biases are randomly given (see "Cao, F.L, Wang, D.H, Zhu, H.: An iterative learning algorithm forfeedforward neural networks with random weights. Information Sciences1(9), 546-557(2016).”)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network invasion abnormity detection method
  • Network invasion abnormity detection method
  • Network invasion abnormity detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The present invention is described below based on examples, but the present invention is not limited to these examples only. In the following detailed description of the invention, some specific details are described in detail. The present invention can be fully understood by those skilled in the art without the description of these detailed parts. Well-known methods, procedures, procedures, components and circuits have not been described in detail in order to avoid obscuring the essence of the present invention.

[0065] Furthermore, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.

[0066] Unless clearly required by the context, words such as "including", "comprising" and the like throughout the specification and claims should be construed in an inclusive rather than an exclusive or exhaustive sense; that is, "including but not limited to" meaning.

[0067] In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

For an invasion detection model construction problem, the present invention provides a new network invasion abnormity detection method of supervising the non-linear feature extraction and a regularization random weight neural network (RRWNN). A kernel partial least square (KPLS) algorithm is used to process the colinearity of the input features and the complicated nonlinear mapping. The extracted potential features are inputted to an RRWNN algorithm to construct an invasion detection model possessing a higher learning speed and a better generalization performance. A global optimization strategy is adopted to select the modeling parameters of a KPLS-RRWNN-based invasion detection model, and the simulation based on the KDD99 data indicates the validity of the method.

Description

technical field [0001] The invention relates to network security technology, in particular to a network intrusion abnormality detection method. Background technique [0002] With the wireless and mobile network, and the gradual deepening and promotion of Industry 4.0, the information security situation is becoming more and more serious, and the security protection of key infrastructure related to national security needs to be paid more attention. Network intrusion detection refers to discovering behaviors that violate security policies or endanger system security in the system by collecting information such as operating systems, system programs, applications, and network packets. Existing network intrusion anomaly detection techniques include statistical analysis, pattern prediction, neural networks, genetic algorithms, sequence matching and learning, immune systems, norm-based, data mining, integrity checking, and Bayesian techniques. [0003] In this context, it is very i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 汤健孙春来张健贾美英李东
Owner 中国人民解放军61599部队计算所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products