Combined type intrusion detecting method on basis of data fusion of improved core vector machine

A core vector machine and intrusion detection technology, which is applied in the field of network information security, can solve the problems of high false negative rate and false positive rate, low intrusion detection precision, and poor generalization ability, so as to achieve improved real-time performance, high discrimination accuracy, The effect of high recognition accuracy

Active Publication Date: 2013-05-01
CHINA ELECTRIC POWER RES INST +2
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] For the current intrusion detection technology based on a single classifier mentioned in the above background technology, the intrusion detection implementation schemes that only rely on misuse technology or abnormal technology generally have low intrusion detection accuracy, poor real-time type, false negative rate and false positive High rate, poor generalization ability and other defects, the present invention proposes a composite intrusion detection method based on improved core vector machine data fusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined type intrusion detecting method on basis of data fusion of improved core vector machine
  • Combined type intrusion detecting method on basis of data fusion of improved core vector machine
  • Combined type intrusion detecting method on basis of data fusion of improved core vector machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The implementation process of the method of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0048] Intrusion detection is the detection of intrusion behavior. The intrusion detection system collects information of all key nodes in the network and computer system to check whether there are violations of security policies and signs of being attacked in the network or system. The data source of intrusion detection is the logs of various network security devices (such as firewalls, IDS, IPS, etc.), and these devices will record the activities of the target network at each monitoring point in real time to analyze the operation of the target network. However, network security devices of various brands are often used in the target network at the same time, and their functions ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a combined type intrusion detecting method on the basis of data fusion of an improved core vector machine, which belongs to the technical field of network safety. The method comprises the following steps: extracting characteristic data of all time monitoring points required by misuse intrusion detection and abnormal intrusion detection from a network safety equipment log of a target network; respectively constructing the characteristic data into black and white list data sample subsets; training the black and white list data sample subsets, thereby respectively obtaining a primary misuse intrusion detection model and a primary abnormal intrusion detection model; realizing the data fusion of the primary misuse intrusion detection model and the primary abnormal intrusion detection model through a D-S evidence theory, thereby obtaining a combined intrusion detection model and a combined confidence interval of the combined intrusion detection model; and obtaining a final detecting result. The method provided by the invention has excellent properties at the aspects of increasing the instantaneity of an intrusion detecting system, reducing the missing report rate and false report rate of the intrusion detecting system and increasing the generalization of the intrusion detecting system.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a composite intrusion detection method based on data fusion of an improved core vector machine. Background technique [0002] As network intrusions and attacks are developing toward distribution, scale, complexity, and indirection, higher requirements are placed on security product technology, and an efficient network security alarm technology is urgently needed to improve the security of security products. performance. [0003] Intrusion detection is the detection of intrusion behavior. The intrusion detection system collects information of all key nodes in the network and computer system to check whether there are violations of security policies and signs of being attacked in the network or system. The data source of intrusion detection is the logs of various network security devices (such as firewalls, IDS, IPS, etc.), and these devices will r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
Inventor 王宇飞郑晓崑徐志博梁潇王志皓白云
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products