Method and system for intrusion detection

An intrusion detection and to-be-detected technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problem of not being able to detect new behavior categories, and achieve the effect of reducing data redundancy and improving efficiency

Active Publication Date: 2014-06-18
CHINA MOBILE GROUP SHANDONG
View PDF5 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The embodiment of the present invention provides an intrusion detection method and system to solve th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for intrusion detection
  • Method and system for intrusion detection
  • Method and system for intrusion detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to solve the problem that the intrusion detection method adopted in the prior art cannot detect new behavior categories, the embodiment of the present invention provides a novel intrusion detection scheme. The scheme uses the graph partition method to perform cluster analysis on the test sample set, and then uses the training sample set to determine the behavior category of the clusters obtained by clustering the test sample set, thus realizing the behavior category of the test sample set. Sure. Since the determination process of the behavior category of the test sample set does not completely depend on the behavior categories of the training samples included in the training sample set as in the prior art, new behavior categories can be discovered by adopting the solutions provided by the embodiments of the present invention.

[0030] The solutions provided by the embodiments of the present invention will be described in detail below in conjunction with the acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for intrusion detection. Cluster analysis is carried out on a test sample set through a graphical partition method, then the behavior type of cluster obtained through the cluster analysis on the test sample set is determined by utilizing a training sample set, and thus the determination of the behavior type of the test sample set is realized. Since the determination process of the behavior type of the test sample set does not completely depend on the training sample, contained in a training sample set, owned behavior type, a new behavior type can be found by adopting the scheme provided by the embodiment of the invention.

Description

technical field [0001] The invention relates to the technical field of intrusion detection, in particular to an intrusion detection method and system. Background technique [0002] The Internet provides an efficient and convenient new way for resource sharing and information exchange, but at the same time it is also used by intruders who occupy, steal, or even destroy other people's computer information system resources, making information resources in the network face serious threats. security threats. In order to ensure the security of the network information system, people have taken certain measures from many aspects, and these measures together constitute the network security defense system. [0003] Intrusion Detection (Intrusion Detection) technology is a core technology of network security defense system. It uses some autonomous and intelligent tools to collect and analyze several key points in the computer system or computer network, and detects whether there is a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F17/30
CPCG06F21/55
Inventor 王强鞠康展俊云
Owner CHINA MOBILE GROUP SHANDONG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products