Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network abnormality detection method based on data mining

A network anomaly and detection method technology, applied in the field of network anomaly detection based on data mining, can solve problems such as inability to prevent attacks, openness, sharing violation, and inability to provide real-time monitoring, so as to improve operating efficiency, increase detection rate, The effect of reducing the false positive rate

Inactive Publication Date: 2017-05-10
SHAANXI UNIV OF TECH
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. These technologies belong to the category of static security technology, and cannot actively track intruders. At the same time, the security strategy in static defense sacrifices some rights of users, which is contrary to the openness and sharing of the network;
[0008] 2. Unable to prevent attacks from within the system, and unable to do anything about the abuse of computers and their resources by authorized users;
[0009] 3. Due to performance limitations, real-time monitoring cannot be provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] A network anomaly detection method based on data mining, comprising:

[0042] System standard input and output: stdio;

[0043] System standard library: stdlib;

[0044] System math function library: math;

[0045] System standard input and output stream: iostream;

[0046] Specifically include the following steps:

[0047] S1. First, start the main program file detection.cpp, read in the data to be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network abnormality detection method based on data mining, which adopts a system standard input and output stdio, a system standard library stdlib and a system mathematical function library math and comprises the steps of: firstly, starting up a master program file detection.cpp, reading in data to be detected and carrying out preprocessing; calling a cluster analysis and generation module clust.cpp, using an individual obtained in the previous step as an initial center point of a cluster partitioning method, and by the module, carrying out partitioning on the data and generating a cluster; calling a data readability conversion module trap.cpp to carry out marking on the generated cluster, and determining types of normal data and abnormal data; and by an alert module alert.cpp, outputting information of the normal data and the abnormal data to a control console. According to the network abnormality detection method disclosed by the invention, a data mining technology is effectively applied to intrusion detection, and an application based on intrusion detection needs to improve an original clustering analysis algorithm, so that the algorithm can be suitable for an environment and a data type of intrusion detection, an aim of intrusion detection is fulfilled, a detection rate of intrusion detection is improved and a false alarm rate is reduced.

Description

technical field [0001] The invention belongs to the field of computer application technology, and more specifically relates to a data mining-based network anomaly detection method. Background technique [0002] Data mining is the process of mining interesting knowledge from large amounts of data stored in databases, data warehouses, or other information repositories. Data mining digs out important information and extracts valuable knowledge from a large number of fuzzy and noisy original data in the database according to certain rules. Data mining technology is an interdisciplinary subject, involving many fields such as intrusion detection, intelligent database and machine learning, and data mining has become a popular research topic. The application of data mining technology in intrusion detection can improve the detection efficiency and enhance the adaptability and expansibility of the system. The intrusion detection system based on data mining can well protect the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F17/30G06K9/62G06N3/12
CPCH04L63/1416G06F16/285G06N3/126G06F18/23
Inventor 陈涛
Owner SHAANXI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products