Network attack detection method and device

A network attack and detection method technology, applied in the field of information security, can solve the problems of relying on manual experience, low analysis efficiency, time-consuming and laborious, etc.

Active Publication Date: 2017-08-18
NEUSOFT CORP
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the first purpose of the present invention is to propose a network attack detection method to solve the problem of extracting features from sample data in the prior art, which not only needs to rely on manual experience, but also takes time and effort and has low analysis efficiency. technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device
  • Network attack detection method and device
  • Network attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0091] The method and device of the embodiments of the present invention are described below with reference to the accompanying drawings.

[0092] figure 1 It is a schematic flowchart of a network attack detection method provided by an embodiment of the present invention. The method provided by this embodiment is used to identify whether a network session sample is a network attack or to further identify the type of network attack, such as figure 1 As shown, the method includes the following steps:

[0093] Step 101: Perform ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack detection method and device. The method comprises the following steps: according to a preset keyword set, a feature module carries out keyword matching on a network session sample, so that features of the network session sample are obtained; a tagging module carries out part-of-speech tagging on the features of the network session sample in a hidden state through a pre-trained hidden Markov model, so that an analysis function is achieved; and a processing module inputs the network session sample, which has undergone the part-of-speech tagging, into a pre-trained classification model for classified processing, so that whether a network attack exists in the network session sample or not is determined. The method and device provided by the invention has the advantages that manual protocol analysis is not needed, so that the technical problems in the prior art that feature extraction from sample data needs to rely on artificial experience and the analysis efficiency is low are solved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a network attack detection method and device. Background technique [0002] In the development of Internet technology, network attack is a major problem affecting Internet security. Traditional intrusion detection systems usually use manual coding to generate decision rules. This traditional method has a relatively low false positive rate, but it cannot complete the detection task of detecting this new type of attack when network attacks become more and more complex. [0003] Therefore, in the prior art, machine learning is used to identify whether it is an attack, and machine learning can even be used to perform multi-classification of attack types. However, in the process of machine learning, it is necessary to extract features from the sample data, that is, the step of analysis, and then the classification step of machine learning can be performed according to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 侯智瀚
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products