Adaptive boundary abnormity detection method based on multistage strategies

An anomaly detection and self-adaptive technology, applied in the field of information network security, can solve the problems of high false negative rate and false positive rate, failure to identify the actual attack type, and judgment of abnormalities, etc., to reduce the false positive rate and false positive rate, Realize the effect of construction and dynamic maintenance

Active Publication Date: 2016-04-06
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The detection based on traffic size generally adopts the threshold-based detection method, which needs to manually set the threshold, and cannot adjust the threshold according to the peak and trough of network traffic, lacks intelligent dynamic update, and only monitors traffic; Detection, to find out the data packets that meet the characteristics. This method needs to know the characteristics of each abnormal traffic in advance, and the characteristics of new abnormal data packets cannot be detected; the detection of network bandwidth contours is performed by analyzing the data packets during network operation. Analyze traffic, ports, and number of connections to establish a reference range of parameters under normal conditions or ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive boundary abnormity detection method based on multistage strategies
  • Adaptive boundary abnormity detection method based on multistage strategies
  • Adaptive boundary abnormity detection method based on multistage strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The present invention provides an adaptive boundary anomaly detection method based on a multi-level strategy, such as figure 1 shown, including:

[0050](1) Based on the peak v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an adaptive boundary abnormity detection method based on multistage strategies. The method comprises steps that, a peak value and a valley value of a network flow at each time segment in a normal operation state are taken as acquisition bases, log information and network flow data of equipment are acquired; according to the message type of the network flow data, a datum line of the network flow data in the normal index operation state is established, and whether the network flow data is abnormal is determined; the abnormal network flow data and the log information corresponding to the abnormal network flow data are stored by employing an HASH algorithm; a normal network behavior database and an abnormal network behavior database are established, and matching for the abnormal network flow data is carried out; the network flow data which can not be matched is analyzed by employing a BP nerve network method, and network behaviors of the network flow data are determined and are stored to the corresponding behavior database. Through the method, a step-by-step progressive discrimination mode is employed to realize detection on abnormal boundary behaviors, and thereby the error reporting rate and the report missing rate of abnormality detection are reduced.

Description

technical field [0001] The invention relates to the field of information network security, in particular to an adaptive boundary anomaly detection method based on multi-level strategies. Background technique [0002] With the rapid development of technologies such as computers, the Internet, information communication and control, the innovation of industrial chains such as mobile applications and smart terminals, and the continuous emergence of new technologies such as cloud computing, the Internet of Things and big data, network security threats and security issues are constantly increasing. Come on. Aiming at the vulnerability of basic network equipment in the network environment, malicious attacks by hackers and the wanton proliferation of viruses and Trojan horses, network equipment has become a springboard for attacks, paralyzing important information systems and stealing data. All kinds of security incidents are common, the security situation is worrying, and informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 管小娟张涛马媛媛何高峰张波陈璐黄秀丽华晔
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products