A method and device for masquerading intrusion detection based on deep neural network

A technology of deep neural network and intrusion detection, which is applied to biological neural network models, neural architectures, computer security devices, etc. It can solve the problems of low accuracy of intrusion detection and the inability to accurately capture the timing of behavior sequences, so as to improve accuracy Effect

Active Publication Date: 2021-06-01
STATE GRID CORP OF CHINA +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned anomaly detection methods cannot accurately capture the timing of the entire behavior sequence, resulting in low accuracy of intrusion detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for masquerading intrusion detection based on deep neural network
  • A method and device for masquerading intrusion detection based on deep neural network
  • A method and device for masquerading intrusion detection based on deep neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0036] Embodiments of the present invention provide a method for detecting masquerading intrusions based on a deep neural network, such as figure 1 As shown, the method includes:

[0037] S100. Obtain behavior flow data of at least two users within a preset time period;

[0038] Among them, the behavior flow data of all legal users in the enterprise in a few months or a year can be obtained, where the data source of the behavior flow data can be the system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a masquerade intrusion detection method based on a deep neural network, including: obtaining behavior flow data of at least two users; initializing a hyperparameter set and a parameter set; for each user, collecting positive samples and negative samples to form a training data set; Use the training data set, loss function and optimization algorithm to calculate the parameter value of each parameter in turn; query the behavior data corresponding to the user's behavior sequence to be detected from the behavior embedding representation query table corresponding to the user, and add it to the behavior embedding representation sequence ; Perform convolution operation, pooling operation, and long-short-term memory artificial neural network corresponding operations on the behavior embedding representation sequence to obtain a second behavior sequence; calculate the probability that the second behavior sequence is a normal behavior sequence; and according to the size of the probability To determine whether the user's behavior is a masquerading intrusion behavior, the method can simultaneously take into account the local strong correlation, long-range dependence and timing of the behavior, and improves the accuracy of masquerading intrusion detection.

Description

technical field [0001] The present application relates to the technical field of information data processing, and more specifically, to a detection method and device for masquerading and intrusion. Background technique [0002] Masquerade intrusion refers to the intrusion behavior that unauthorized users enter a certain system by pretending to be legitimate users, access and modify key data or perform other illegal operations. This intrusion has become one of the most serious security threats to computer and network infrastructure. [0003] The current masquerade intrusion detection methods mostly use the anomaly detection method. The anomaly detection method is based on the masquerading intrusion detection based on the relevant information of user behavior. This type of method considers the relevant information between adjacent behaviors through the n-gram model, and at the same time considers adjacent behaviors. The two types of related information, such as non-adjacent be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56H04L29/06G06N3/04
CPCG06F21/566G06N3/04G06N3/049H04L63/1416
Inventor 刘俊恺夏飞王毅张立强余伟吴立斌张明明李鹏季晓凯蒋铮王艳青彭轼魏桂臣丁一新张利李萌黄高攀汤雷
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products