An Adaptive Boundary Anomaly Detection Method Based on Multi-level Strategies

An anomaly detection and self-adaptive technology, applied in the field of information network security, can solve the problems of inability to identify the actual attack category, high false negative rate and false positive rate, and judgment of abnormality, so as to achieve construction and dynamic maintenance, and reduce false positives The effect of rate and false negative rate

Active Publication Date: 2019-06-28
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The detection based on traffic size generally adopts the threshold-based detection method, which needs to manually set the threshold, and cannot adjust the threshold according to the peak and trough of network traffic, lacks intelligent dynamic update, and only monitors traffic; Detection, to find out the data packets that meet the characteristics. This method needs to know the characteristics of each abnormal traffic in advance, and the characteristics of new abnormal data packets cannot be detected; the detection of network bandwidth contours is performed by analyzing the data packets during network operation. Analyze traffic, ports, and number of connections to establish a reference range of parameters under normal conditions or construct a normal operating curve in units of cycles. For behaviors that exceed the set threshold or are not within the range of the normal curve, it is judged that there is an abnormality. Abnormal behaviors at this identified boundary, this method lacks a scientific and comprehensive warning mechanism, and cannot identify the actual attack category
Existing boundary anomaly detection methods mainly focus on the analysis of network abnormal flow, the determination of the threshold benchmark is subjectivity, the data analysis source and the extracted feature value are relatively one-sided, the false negative rate and false positive rate are high, and they cannot be comprehensive and accurate. Accurate detection of boundary state anomalies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Adaptive Boundary Anomaly Detection Method Based on Multi-level Strategies
  • An Adaptive Boundary Anomaly Detection Method Based on Multi-level Strategies
  • An Adaptive Boundary Anomaly Detection Method Based on Multi-level Strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The present invention provides an adaptive boundary anomaly detection method based on a multi-level strategy, such as figure 1 shown, including:

[0050](1) Based on the peak v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an adaptive boundary abnormity detection method based on multistage strategies. The method comprises steps that, a peak value and a valley value of a network flow at each time segment in a normal operation state are taken as acquisition bases, log information and network flow data of equipment are acquired; according to the message type of the network flow data, a datum line of the network flow data in the normal index operation state is established, and whether the network flow data is abnormal is determined; the abnormal network flow data and the log information corresponding to the abnormal network flow data are stored by employing an HASH algorithm; a normal network behavior database and an abnormal network behavior database are established, and matching for the abnormal network flow data is carried out; the network flow data which can not be matched is analyzed by employing a BP nerve network method, and network behaviors of the network flow data are determined and are stored to the corresponding behavior database. Through the method, a step-by-step progressive discrimination mode is employed to realize detection on abnormal boundary behaviors, and thereby the error reporting rate and the report missing rate of abnormality detection are reduced.

Description

technical field [0001] The invention relates to the field of information network security, in particular to an adaptive boundary anomaly detection method based on multi-level strategies. Background technique [0002] With the rapid development of technologies such as computers, the Internet, information communication and control, the innovation of industrial chains such as mobile applications and smart terminals, and the continuous emergence of new technologies such as cloud computing, the Internet of Things and big data, network security threats and security issues are constantly increasing. Come on. Aiming at the vulnerability of basic network equipment in the network environment, malicious attacks by hackers and the wanton proliferation of viruses and Trojan horses, network equipment has become a springboard for attacks, paralyzing important information systems and stealing data. All kinds of security incidents are common, the security situation is worrying, and informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 管小娟张涛马媛媛何高峰张波陈璐黄秀丽华晔
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products