Method for detecting network abnormality based on secondary negative selection

A technology that negates selection and detection methods, applied in the field of information security

Inactive Publication Date: 2012-07-11
SICHUAN UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention mainly solves the shortcomings of too many detectors, too low detector generation efficiency and too high detection false alarm rate in the artificial immune anomaly detection method in the prior art, effectively reduces the number of mature detectors generated, and improves the maturity of mature detectors. The generation efficiency is high, and while the detection rate is kept stable, the detection false positive rate is further reduced, ensuring network security, and has broad application prospects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting network abnormality based on secondary negative selection
  • Method for detecting network abnormality based on secondary negative selection
  • Method for detecting network abnormality based on secondary negative selection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] figure 1 It is a working principle diagram of the present invention.

[0030] figure 1 It is a working principle diagram of the present invention. A network anomaly detection method based on secondary negative selection proposed by the present invention first selects normal network connection data as the self-set for training, then generates a mature detection set through the secondary negative selection process to perform abnormal detection on the network connection data to be detected, and finally The detection results are confirmed by the authentication detector generated by self-set clustering. The present invention is divided into two relatively independent stages. The first stage is the process of generating mature detector sets and authenticating detectors according to the self-set, including the step of reading into the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting network abnormality based on secondary negative selection, belonging to the technical field of information security. The method comprises: selecting normal network connection data as an autologous set by simulating the immune tolerance process of a biological immune system, using a secondary negative selection algorithm to perform tolerance training on a randomly-generated candidate detector, removing the candidate detectors with unsuccessful tolerance and autologous tolerance of the detector set to generate a mature detector set, utilizing autologous clustering to generate an authentication detector, detecting network connection data to be detected by utilizing the mature detector set, and finally using the authentication detector to confirm the detection result. The method mainly overcomes the defects of redundant detectors, low generation efficiency and high false alarm ratio, effectively reduces the size of the generated mature detector sets, improves the generation efficiency of the mature detector, maintains the stability of the detection rate, reduces the false alarm ratio and guarantees the network security, thereby having a wide application prospect.

Description

Technical field: [0001] The invention relates to a network anomaly detection technology, which belongs to the technical field of information security. Background technique: [0002] With the popularization and development of computer networks, the Internet has become one of the indispensable tools for people to study, work and live, but at the same time, the openness of the Internet also makes viruses and network attacks a disaster on the Internet. Network attacks affect the network from many aspects and bring harm to the network. These harms mainly include: harm to computer resources and network resources, harm to normal services, harm to economy, politics, society and culture, etc. At present, my country's network infrastructure is relatively backward, the demand for network security is more stringent and urgent, and the security line of defense against network attacks such as virus spread and hacker attacks is also more fragile. Against this demand background, there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 刘晓洁李涛陈文赵辉胡晓勤
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products