Intrusion detection method and device based on deep learning under hyper-fusion architecture

A deep learning and intrusion detection technology, applied in neural learning methods, neural architectures, biological models, etc., can solve problems such as inability to upgrade intrusion modules uniformly, different virtual machine protection strengths, and inability to detect malicious behaviors, so as to reduce the number of extracted features. time, feature dimension reduction, and the effect of reducing model overhead

Active Publication Date: 2021-11-16
国家电网公司东北分部 +1
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, although the Chinese patent "CN 111464510 A" improves the accuracy of detection, the feature dimension is too large and the model cost is relatively large
In addition, traditional intrusion detection modules are mostly deployed in physical hosts, while intrusion detection based on virtualization environment is transparent to the information acquisition of virtual machines, and cannot detect malicious behavior between virtual machines in the virtual environment; , installing the intrusion detection module inside each hyper-converged virtual machine will occupy virtual machine resources and generate a large overhead, and lack of unified management, it is impossible to uniformly upgrade the intrusion module of each hyper-converged virtual machine at the same time, which may cause The protection strength of each virtual machine is different, resulting in security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and device based on deep learning under hyper-fusion architecture
  • Intrusion detection method and device based on deep learning under hyper-fusion architecture
  • Intrusion detection method and device based on deep learning under hyper-fusion architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0050] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intrusion detection method and device based on deep learning under a hyper-converged architecture and a storage medium, and relates to the technical field of intrusion detection.The detection method is applied to a virtualization kernel layer of the hyper-converged architecture and comprises the steps that network traffic entering and exiting a virtual machine is captured, IP/MAC address verification is conducted on the network traffic, then related traffic features are extracted, a deep learning model trained by a CICIDS2017 data set is utilized to analyze feature values, so that low-overhead and high-precision DDoS attack detection under the hyper-fusion architecture is realized. Particularly, in order to reduce redundant information, an improved binary cuckoo algorithm is adopted to select features, and while the detection precision is ensured, the size of a deep learning model is reduced, and the extraction time of network traffic features is shortened.

Description

technical field [0001] The present invention relates to the technical field of intrusion detection, in particular to an intrusion detection method, device and storage medium based on deep learning under a hyper-converged framework. Background technique [0002] Hyper-converged architecture is an emerging cloud computing architecture, with virtualization as the core, pre-integrating computing, storage, network and other resources in a standard server (such as X86 or ARM), forming a standardized hyper-converged unit . At the same time, the virtualization of basic functions such as storage, computing, and network is realized through software definition. Multiple hyper-converged units converge into a data center through the network to form an IT infrastructure, so as to achieve the purpose of rapid deployment and simplified operation and maintenance of IT infrastructure. Compared with the traditional data center architecture, the most fundamental change in the hyper-converged ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06N3/00G06N3/04G06N3/08
CPCH04L63/1416H04L63/1458H04L63/1483H04L63/20H04L41/142G06N3/006G06N3/084H04L2463/146G06N3/044Y02D30/50
Inventor 张运厚任吉媛刘阜阳宋阳王哲尹路彭玉怀
Owner 国家电网公司东北分部
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products