Training method of network security situation model, recognition method and recognition device

A network security and model training technology, applied in electrical components, transmission systems, etc., can solve the problems of slow convergence speed, uncontrollable, pollution and other problems of neural network algorithms, and achieve avoiding over-learning problems, excellent generalization ability, and generalization powerful effect

Inactive Publication Date: 2017-08-15
XIAMEN ZHUOXUN INFORMATION TECH
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is precisely because of the above-mentioned characteristics of the Internet that many security problems have arisen: leakage, pollution, uncontrollable
[0005] The above-mentioned referenced patent documents all use neural network algorithms for the analysis and prediction of the network security situation, and the neural network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Training method of network security situation model, recognition method and recognition device
  • Training method of network security situation model, recognition method and recognition device
  • Training method of network security situation model, recognition method and recognition device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] To further illustrate the various embodiments, the present invention is provided with accompanying drawings. These drawings are a part of the disclosure of the present invention, which are mainly used to illustrate the embodiments, and can be combined with related descriptions in the specification to explain the operating principles of the embodiments. With reference to these contents, those skilled in the art should understand other possible implementations and advantages of the present invention. Components in the figures are not drawn to scale, and similar component symbols are generally used to denote similar components.

[0037] The present invention will be further described in conjunction with the accompanying drawings and specific embodiments.

[0038] refer to figure 1 Shown is a flowchart of a network security situational model training method, which includes the following steps:

[0039] S101. Obtain network data.

[0040] With the popularity of big data,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of the computer network security and machine learning, and specifically relates to a training method of a network security situation model, a recognition method and a recognition device. The training method of the network security situation model comprises the following steps: S101, acquiring network data; S102, extracting a network data sample from the network data; S103, processing the extracted network data sample, analyzing the network data to obtain an attribute value of the network data, and judging whether the attribute value of the network data is safely corresponding to the network data; S104, analyzing and processing the attribute value of the network data to obtain a feature vector of the attribute value of the network data; and S105, determining a parameter of linear classifier through the feature vector of the attribute value of the network data.

Description

technical field [0001] The invention belongs to the technical fields of computer network security and machine learning, and in particular relates to a network security situation model training method, an identification method and an identification device. Background technique [0002] In recent years, with the advent and popularization of the era of mobile Internet and smart terminals, people's online behaviors have become more frequent, and the scale of marketing has become larger and larger. Various social networks have formed a complex, heterogeneous large-scale network. However, due to the characteristics of mobility, scalability, large-scale, and ubiquity of communication networks, while the network penetrates into people's social life, it has also become the primary target of hacker attacks, resulting in a continuous and rapid increase in the number of network security vulnerabilities. Therefore, the security problem will definitely become the primary problem to be sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416
Inventor 邹培利林小淞张靠勤
Owner XIAMEN ZHUOXUN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products