Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network intrusion detection method based on deep learning

A technology of network intrusion detection and deep learning, which is applied in the field of network intrusion detection based on deep learning, can solve the problems of low detection rate of attack types, affecting detection results, affecting detection rate, etc., to meet the actual requirements of the project, reduce the cost of use, The effect of reducing the false positive rate

Active Publication Date: 2021-10-29
YANSHAN UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the existing network intrusion detection technology has improved the accuracy, when faced with high-dimensional data sets such as KDD99, due to the influence of data dimensions, the detection rate of attack categories is often low when training models, which affects overall detection rate
When traditional machine learning intrusion detection technology detects high-dimensional data, it often needs to artificially select some features based on a large amount of experience and professional knowledge. This process of feature selection often directly affects the final detection result, and the efficiency is low.
Traditional machine learning intrusion detection often uses a single classifier when predicting network attack categories, which leads to low accuracy and high false alarm rates when the attack type has multiple labels

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method based on deep learning
  • Network intrusion detection method based on deep learning
  • Network intrusion detection method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Therefore, the following detailed description of the embodiments of the present invention provided in the accompanying drawings is not intended to limit the scope of the present invention as claimed, but merely represents selected embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0025] The har...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network intrusion detection method based on deep learning, and the training process of the method comprises the steps: inputting an obtained data set into a to-be-trained convolutional neural network model, and extracting network traffic features through the to-be-trained convolutional neural network model; repeatedly extracting features with richer network traffic through a spatial pyramid model including a convolutional layer, an upper sampling layer and a lower sampling layer, and obtaining a multi-scale effective feature layer; and finally, predicting network intrusion classification confidence through logistic regression, predicting categories by using a logic classification model, and calculating loss errors of a real frame and a prediction frame through an error model. Then, repeated iterative optimization is carried out through reverse gradient, and the to-be-trained network intrusion detection model with the minimum loss error is used as a trained network intrusion detection model; according to the method, the detection precision and speed of network intrusion are further improved, the detection capability of unknown attacks is improved, and the false alarm rate is reduced.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a network intrusion detection method based on deep learning. Background technique [0002] With the increasing development of science and technology, the network has become one of the tools widely used by people. When people enjoy convenient Internet services, Internet security issues have gradually attracted widespread attention. Especially in the era of widespread use of social networking, e-commerce, and big data, problems such as network intrusion and data theft are also emerging, so network security has become an issue that cannot be ignored. [0003] Although the existing network intrusion detection technology has improved the accuracy, when faced with high-dimensional data sets such as KDD99, due to the influence of data dimensions, the detection rate of attack categories is often low when training models, which affects overall detection rate. When traditional machine l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/08G06N3/04
CPCH04L63/1416G06N3/08G06N3/045
Inventor 金梅薛静芳张立国李佳庆秦芊王磊申前孟子杰耿星硕
Owner YANSHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products