Invasion detection method and device
An intrusion detection and data point technology, applied in the field of information security, can solve problems such as high computational overhead and affect clustering results, achieve good clustering effect, reduce computational overhead, and enhance ease of use and practicability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0032] Example one:
[0033] figure 1 The implementation process of the intrusion detection method provided in the first embodiment of the present invention is shown, and the process of the method is described in detail as follows:
[0034] In step S101, the original data set is preprocessed, and the original data set includes a plurality of data points.
[0035] In the embodiment of the present invention, the original data set includes multiple data records (for example, heterogeneous data records), and each data record may include continuous data points and / or non-numerical data points. Perform data standardization processing, specifically:
[0036] For continuous data points in the original data set, map their data values from [min, max] to an interval whose range is less than the preset value (for example, the interval [0, 1]);
[0037] After discretizing the non-numerical data in the original data set, it is mapped into a numerical value through coding, or directly compared in ...
Example Embodiment
[0063] Embodiment two:
[0064] figure 2 The composition structure of the intrusion detection apparatus provided in the second embodiment of the present invention is shown. For ease of description, only the parts related to the embodiment of the present invention are shown.
[0065] The intrusion detection device can be a software unit, a hardware unit, or a combination of software and hardware running in each terminal device (such as a mobile phone, a tablet computer, etc.), or it can be integrated into the terminal device as an independent pendant or run on In the application system of the terminal device.
[0066] The intrusion detection device includes:
[0067] The preprocessing unit 21 is configured to preprocess an original data set, the original data set includes a plurality of data records, and each data record includes continuous data points and / or non-numeric data points;
[0068] The distance measurement unit 22 is used to measure the distance of each data point in the p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap