Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion detection method based on information entropy and confidence down-sampling

A network intrusion detection and information entropy technology, applied in the field of unbalanced network intrusion detection and identification, can solve the problem that the sampling integration algorithm cannot effectively solve unbalanced network intrusions, and achieve the goal of improving generalization performance, reducing dependence, and suppressing information loss Effect

Active Publication Date: 2019-09-20
EAST CHINA UNIV OF SCI & TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the fact that the existing sampling integration algorithm cannot effectively solve the problem of unbalanced network intrusion, the present invention also uses self-defined information entropy and algorithm confidence as the sampling benchmark for down-sampling to replace the traditional random down-sampling strategy for most classes; secondly , through the integration idea of ​​Boosting, the method of dynamic downsampling is extended to any algorithm; and the information entropy used in the present invention includes the sample fuzzy membership and structural information at the same time, so it can effectively suppress the information loss of the majority class

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method based on information entropy and confidence down-sampling
  • Network intrusion detection method based on information entropy and confidence down-sampling
  • Network intrusion detection method based on information entropy and confidence down-sampling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Below in conjunction with accompanying drawing and example the present invention will be further introduced: the system designed by the present invention is divided into four modules altogether.

[0015] Part I: Data Acquisition

[0016] The process of data collection is to convert real samples into data, and generate a data set represented by vectors for subsequent modules to process. In this step, the collected samples are divided into training samples and testing samples. The training samples are processed first. A training sample generates a vector Among them, i indicates that the sample is the i-th of the total training samples, and c indicates that the sample belongs to the c-th class. Each element of the vector corresponds to an attribute of the sample, and the dimension d of the vector is the number of attributes of the sample. For the convenience of subsequent calculations, all training samples are combined into a training matrix D, in which each row is a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network intrusion detection method based on information entropy and confidence coefficient downsampling. According to the invention, the information entropy and the algorithm confidence are simultaneously adopted as down-sampling references to replace a traditional random down-sampling strategy for a plurality of classes; secondly, through the integration idea of Boosting, the dynamic downsampling method is popularized to any algorithm; in addition, the information entropy used in the method comprises the sample fuzzy membership degree and the structure information at the same time, and therefore information loss of multiple classes can be effectively restrained. Compared with a traditional unbalanced classification integration method, the dynamic downsampling is combined with the information entropy and the confidence coefficient for the first time, an integrated model can adapt to more base algorithms, and the detection performance of the model on unbalanced network intrusion is more effectively improved.

Description

technical field [0001] The invention relates to an unbalanced network intrusion detection and recognition method, which belongs to the field of network information security Background technique [0002] In the past ten years of rapid development of network technology, network security issues have gradually been paid attention to by the public. Among them, the related research on network intrusion identification method is a hot research field nowadays. Preliminary classification of existing network attacks, basic attack types include denial of service (Denial of Service, DoS), unauthorized remote host access (Remote-to-Login, R2L), unauthorized access to superuser access (User -to-Root, U2R), listening detection (Probing), etc. The above-mentioned network attack methods also have some subtype variants, so identifying these network intrusion methods has great practical application value. [0003] The existing commonly used network attack detection methods can be briefly sum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416
Inventor 李冬冬王喆曹晨杰杨孟平杜文莉张静
Owner EAST CHINA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products