Cloud-computing oriented network intrusion detect method and system

A network intrusion detection and network intrusion technology, which is applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of low computing speed and high misjudgment rate of intrusion detection technology, achieve high discrimination accuracy, and improve dynamic update operations Speed, increase the effect of real-time and accuracy

Active Publication Date: 2017-06-27
SUZHOU UNIV
View PDF10 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a network intrusion detection method and system to solve the problems of high misjudgment rate and low operation speed in the existing intrusion detection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-computing oriented network intrusion detect method and system
  • Cloud-computing oriented network intrusion detect method and system
  • Cloud-computing oriented network intrusion detect method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] A flow chart of a specific embodiment of the network intrusion detection method provided by the present invention is as follows figure 1 As shown, the method includes:

[0059] Step S101: Generate a set of pseudo-gradient boosting decision trees for identifying network intrusion behavior;

[0060] Specifically, a pseudo-gradient boosting decision tree set G used for discriminating network intrusion be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud-computing oriented network intrusion detect method. The method comprises the steps of generating a pseudo-gradient promotion decision-making tree set for judging network intrusion behaviors; determining weight information of pseudo-gradient promotion decision-making trees according to classification features of non-leaf nodes corresponding to the pseudo-gradient promotion decision-making trees; carrying out parallel judgment on received network behavior records through adoption of the pseudo-gradient promotion decision-making trees, thereby obtaining independent judgment results; and multiplying the independent judgment results by the corresponding weight information, thereby generating final result information for judging whether the network behavior records are network attacks or not. The method and the system are characterized in simplicity, legibility, high distinguishing precision and high smart comprehensive processing capability. The pseudo-gradient promotion decision-making tree can be generated in a distributed parallel mode under a cloud computing environment. The dynamic update operation speed of the decision-making threes is improved, and the timeliness and accuracy of detecting new-type intrusion events by an IDS are improved.

Description

technical field [0001] The invention relates to the technical fields of network security and cloud computing, in particular to a cloud computing-oriented network intrusion detection method and system. Background technique [0002] In recent years, information security incidents represented by network intrusions have emerged in an endless stream. Intruders use the Internet as a tool to steal information, spread Trojan horses and viruses, and maliciously consume resources, causing huge losses to users and greatly affecting and destroying the Internet. further promotion and use. Designing and using Intrusion Detection (IDS) methods to monitor network applications, discover and control malicious network intrusions in time, has become an important barrier of network security. [0003] In the current network intrusion detection technology, the IDS based on the decision tree classification algorithm has been widely concerned because of its advantages of simple structure, easy-to-u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L63/1416H04L63/1441
Inventor 李领治厉柏伸朱艳琴孙涌杨哲
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products