Entropy operation-based network intrusion detection method and device

A network intrusion detection and network node technology, applied in the field of computer network security, can solve problems such as high false alarm rate, large amount of calculation, and complicated calculation process

Inactive Publication Date: 2012-07-25
SOUTHWEST JIAOTONG UNIV
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In view of the increasingly complex network environment and the existing intrusion detection technology with large amount of calculation, complex calculation process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entropy operation-based network intrusion detection method and device
  • Entropy operation-based network intrusion detection method and device
  • Entropy operation-based network intrusion detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some but not all embodiments of the present invention. It should be understood that the described specific implementation modes or examples are only used to explain the present invention, not to limit the present invention, and based on the examples in the present invention, those skilled in the art can obtain All other embodiments of the present invention belong to the protection scope of the present invention.

[0055] For the convenience of understanding the present invention, as a special case, construct a network environment, such as image 3 As shown, the figure includes three PCs (PC 1 , PC 2 and PC 3 ), three routers (L 1 , L 2 and L 3 ) and five servers (S 1 , S 2 , S 3 , S 4 , and S 5 ). (The netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an entropy operation-based network intrusion detection method, which comprises the following steps of: capturing a network node data packet, and preprocessing the network node data packet to obtain target data; constructing a relational graph by utilizing the target data; calculating cross entropies of all network nodes; and sorting the cross entropies of all the network nodes, and finding out key network nodes with high activity. The embodiment of the invention also discloses an entropy operation-based network intrusion detection device. According to the entropy operation-based network intrusion detection method and the entropy operation-based network intrusion detection device disclosed by the invention, a network structure is converted into a graph structure, and the influences of the network nodes in the graph structure are found out according to the attributive characters of the network nodes in the graph by utilizing the entropy theory of the graph, and sorting is performed by the influences, and thus, the key network nodes with the highest activity can be easily obtained, and thereby, the information of the network nodes can be conveniently further analyzed so as to determine whether a network intrusion action occurs or not or adopt corresponding measure.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a network intrusion detection method based on entropy calculation. Background technique [0002] With the expansion of the openness, sharing and interconnection of the network, especially the emergence of the Internet, the importance of the network and its influence on society are also increasing. Internet The Internet is an open technology for all users. Resource sharing and information security are a pair of contradictions. While the Internet provides information sharing and brings us great convenience, its own security issues are also becoming increasingly prominent. According to the statistics of the Computer Emergency Response Teen (CERT), the number of security incidents continues to increase with the development of the Internet. Especially in the past two or three years, there has been a sharp upward trend of exponential growth. According to rough stat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26H04L12/24
Inventor 朱振国徐毅王勇米波
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products