A p2p botnet detection method based on fractal and adaptive fusion
A detection method and self-adaptive technology, applied in transmission systems, electrical components, etc., can solve the problems of low detection efficiency and complex detection process, and achieve the effect of reducing the hypothesis set
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0034] Specific implementation mode 1. Combination figure 1 with figure 2 Describe this embodiment, the P2Pbotnet detection method based on fractal and self-adaptive fusion, the specific implementation steps are:
[0035] Step 1: Network traffic data collection.
[0036] Use tools such as Wireshark to collect network traffic as the original input data of the detection method.
[0037] Step 2: Construct two network traffic detection sensors using fractal theory to detect whether the characteristics of network traffic at different time scales are abnormal.
[0038] 1) Use the monofractal characteristic detection sensor to detect whether there is anomaly in the self-similarity of network traffic on a large time scale: estimate the Hurst exponent, input it into the Kalman filter as a system measurement value, and establish a Kalman filter model to detect The abnormality of the network traffic self-similarity feature is obtained to obtain the detection result.
[0039] 2) Use ...
specific Embodiment approach 2
[0042] Specific embodiment two, combine figure 1 with figure 2 Describe this embodiment, this embodiment is the embodiment of the P2P botnet detection method based on fractal and self-adaptive fusion described in specific embodiment one:
[0043] Step A, network traffic data collection, use tools such as Wireshark to collect network traffic, as the original input data of the detection method, calculate the network traffic in a fixed time window, and normalize it to obtain the traffic F k , assuming that the current is the kth time window;
[0044] Step B. Construct two network traffic detection sensors to detect whether the characteristics under different time scales are abnormal.
[0045] 1. Use monofractal characteristics to detect whether the sensor detects whether there is anomaly in the self-similarity of network traffic on a large time scale: use the rescaled range (R / S, Rescaled Range) method to estimate the Hurst index in the current time window to get Hurst k , wh...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com