Intrusion detection independent analysis method and system in cloud calculation environment

A cloud computing environment and intrusion detection technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as limitations of intrusion detection methods

Inactive Publication Date: 2016-05-11
ZHEJIANG OCEAN UNIV
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the unpredictability of network intrusion in cloud...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection independent analysis method and system in cloud calculation environment
  • Intrusion detection independent analysis method and system in cloud calculation environment
  • Intrusion detection independent analysis method and system in cloud calculation environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0056] Such as Figure 1 ~ Figure 3 As shown, in this embodiment, the autonomous analysis intrusion detection system in the cloud computing environment is installed in the detection service when it is in use, and the detection server is connected to the edge device of the network and set at the edge of the network, that is, deployed on each main network segment entry port.

[0057] The autonomous analysis intrusion detection system includes a data acquisition module 1 , a data preprocessing module 2 , an intrusion detector 3 , a resource scheduling module 4 , a response and alarm module 5 , a database 6 and a fault tolerance module 7 .

[0058] Wherein the data collection module 1 promptly is arranged on the network entrance end, is used for monitoring the network traffic of the network entrance end, when the network traffic is abnormal, then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intrusion detection independent analysis method in a cloud calculation environment. An intrusion detector is trained through an improved BP neural network; the intrusion detector detects preprocessed network data packages with abnormal network traffic in real time; the detected abnormal data is recognized by the intrusion detector, so that network intrusion behaviors of known types are recognized; and characteristics of network intrusion behaviors that cannot be recognized in type are extracted to be used as training samples for independent learning so as to provide sources for recognition of new types of network intrusion behaviors. The invention also relates to an intrusion detection system. The system comprises a data acquisition module, a data preprocessing module, an intrusion detector, a resource dispatching module, a response and warning module, a database and an error tolerance module. The system can perform detection and recognition on the network intrusion behaviors. According to the intrusion detection method and system, a new way for independent analysis and detection of network intrusion in the cloud calculation environment is created, the detection rate is high and the expansibility is good.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection. The invention also relates to an autonomous analysis intrusion detection system in a cloud computing environment, and also relates to an autonomous analysis intrusion detection method in a cloud computing environment. Background technique [0002] Computer network information system is the most important information exchange platform in today's society. The rapid development of network technology brings efficiency and convenience to people, while network intrusions are becoming more and more frequent, which leads to a surge in network security incidents. At the same time, with the advent of the era of big data and cloud computing, network users have grown rapidly, network security issues have become increasingly serious, and attack methods have been updated. A single passive defense method based on firewalls can no longer guarantee system security. [0003] Intrusion Detection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/142H04L63/1416H04L63/1425H04L63/1483H04L67/10
Inventor 宋广军顾沈明管林挺
Owner ZHEJIANG OCEAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products