LDoS attack detection method based on MF-Ada algorithm
An attack detection and algorithm technology, applied to electrical components, transmission systems, etc., can solve problems such as high false alarm rate, poor adaptive ability, and high false alarm rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present invention will be further described below in conjunction with the accompanying drawings.
[0034] Such as figure 1 As shown, the LDoS attack detection method mainly includes four steps: data sampling, data processing, model training, and judgment detection. Among them, data sampling refers to sampling network traffic at fixed time intervals to form a training set and a feature set. Data processing includes two parts: network traffic feature extraction and feature selection. Model training refers to the ability of the Adaboost classification model to acquire the ability to detect LDoS attacks through training data. Judgment detection means that the detection model detects LDoS attacks on the test set based on the judgment criteria.
[0035] figure 2 Score the correlation between the sample feature data and the corresponding true category of the data piece. This process includes two steps, specifically: 1) Based on the chi-square test algorithm, the P valu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com