Network traffic abnormality detection method based on SVM (Support Vector Machine)

A network traffic and anomaly detection technology, applied in the field of network security, can solve problems such as large dimension and hacker attack

Inactive Publication Date: 2016-08-24
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularization of mobile communication networks and the opening of the era, my country's mobile Internet has entered a stage of vigorous development. However, with the maturity of Internet technology and the continuous expansion of the market, a large amount of network traffic data has been generated. This data has high value and high dimensionality. Large numbers and other characteristics, in the process of use and storage, it is very easy to become the target of hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic abnormality detection method based on SVM (Support Vector Machine)
  • Network traffic abnormality detection method based on SVM (Support Vector Machine)
  • Network traffic abnormality detection method based on SVM (Support Vector Machine)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to further understand the technical content of the present invention, the present invention will be further described below in conjunction with the accompanying drawings.

[0055] Such as figure 1 As shown, it is a flow chart of a method for detecting network traffic anomalies based on SVM provided by the present invention, and the method includes the following steps:

[0056] Step S1, reading historical network traffic data.

[0057] Step S2, extracting network traffic characteristics of the historical network traffic data.

[0058] Network traffic features are mainly statistical features, including the attributes of packets and flows. These statistical features are represented by feature vectors, such as a piece of network flow data X. The feature description based on this flow can be expressed as X=(x 1 ,x 2 ,...,x n ), where x i represents the i-th feature.

[0059] Step S3, performing data standardization on the network traffic characteristics. It i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic abnormality detection method based on an SVM (Support Vector Machine), which comprises the steps of reading historical network traffic data; extracting network traffic features of the historical network traffic data; carrying out data standardization on the network traffic features; carrying out reduction on the network traffic features to obtain simplified and optimized feature subsets; and training the optimal feature subset by utilizing the SVM to obtain an SVM classifier; adding processed online test network traffic data into the SVM classifier, carrying out calculation by the SVM classifier to obtain a final classification result, and determining whether the processed online test network traffic data is abnormal network traffic data. Compared with the prior art, according to the network traffic abnormality detection method disclosed by the invention, network traffic feature data is subjected to feature reduction and dimensionality reduction by a PCA-TS (Principal Component Analysis-Tabu Search) method, and the optimal feature subset is selected. The problems of long classification detection time, low efficiency and occupation for a larger storage space, which are brought by the curse of dimensionality, are avoided; and moreover, processing time is reduced for subsequent processing, and classification accuracy of the classifier is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an SVM-based network traffic anomaly detection method. Background technique [0002] With the popularization of mobile communication networks and the opening of the era, my country's mobile Internet has entered a stage of vigorous development. However, with the maturity of Internet technology and the continuous expansion of the market, a large amount of network traffic data has been generated. This data has high value and high dimensionality. Large numbers and other characteristics, in the process of use and storage, it is very easy to become the target of hackers. In recent years, various attacks on the Internet have occurred extremely frequently, seriously threatening the normal use of the network, and the importance of Internet security has become increasingly prominent. Therefore, how to timely and effectively detect network anomalies and ensure a safe network enviro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04W24/06H04W24/08
CPCH04W24/06H04L43/08H04L63/1408H04W24/08
Inventor 彭泽武黄剑文冯歆尧江疆杨秋勇伍江瑶
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products