Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security information processing method and system based on causal model

An information processing method and technology of an information processing system, applied in the field of network security, can solve problems such as being unable to know network attacks, and achieve the effect of improving security

Active Publication Date: 2021-12-14
HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS +1
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method and system for processing network security information based on a causal model, to at least solve the problem in the prior art that the cause of the network attack cannot be known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security information processing method and system based on causal model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0020] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0021] The causal model is different from the traditional machine learning model. It explores and pursues the causal mechanism behind things. At least in terms of purpose and method, it is in line with the goal of this embodiment.

[0022] In this embodiment, a causal model-based network security information processing method is provided, figure 1 is a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security information processing method and system based on a causal model. The method comprises the following steps: acquiring a group of data packets received within a preset time period before the current time; judging whether a plurality of data packets conforming to a preset rule exist in the group of data packets or not, the preset rule being the rule that the data packets appear before a preset type of network attack, and the preset rule being obtained by summarizing data packets obtained before the network attack of the preset type occurs after the network attack of the same preset type occurs; under the condition that the judgment result is that the plurality of data packets conforming to the preset rule appear, obtaining the preset type corresponding to the preset rule; and sending the alarm message. According to the method and the system, the problem in the prior art that the cause of the network attack cannot be known is solved, so that support is provided for improving the security of the network.

Description

technical field [0001] The present application relates to the field of network security, in particular, to a method and system for processing network security information based on a causal model. Background technique [0002] For machine learning, whether it is logistic regression, gradient boosting model or deep learning, it is essentially a means of fitting observed numbers, which is to determine the relationship between input and output. Even if you can fit a model with an unfathomable effect, it is still difficult to explain clearly why the relationship between the input and the output occurs through the model. [0003] For example, in the field of network security, a group of data packets can be input into a machine learning model, and the machine learning model can determine whether the data packets include data packets for network attacks based on the results of previous training. [0004] The machine learning model does not know what causes the network attack, that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1441H04L63/1408H04L41/0631H04L41/147
Inventor 佟琨王红凯李博毛冬张辰陈致远
Owner HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products