Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting and analyzing abnormal network behavior

A network abnormality and behavior technology, applied in the field of computer network, can solve the problems of unbalanced training data, inability to attack behavior in training effect, and exhaustion of attack methods.

Active Publication Date: 2020-10-30
ZHEJIANG PONSHINE INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method and system for network abnormal behavior detection and analysis, which is used to solve the problem that the unbalanced training data in the prior art affects the training effect and cannot exhaustively analyze all kinds of attack behaviors and attack means. raised question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting and analyzing abnormal network behavior
  • Method and system for detecting and analyzing abnormal network behavior
  • Method and system for detecting and analyzing abnormal network behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] This embodiment provides a method for detecting and analyzing abnormal network behaviors, such as figure 1 shown, including steps:

[0053] S11: Statistical data on access behavior characteristics of security users;

[0054] S12: Construct a type of support vector machine model according to the feature data;

[0055] S13: Use a type of support vector machine model to predict and analyze the access behavior characteristics of users on the entire network to identify abnormal access behaviors.

[0056] In this embodiment, first, the web access log of the security user is extracted to extract the user features, and the feature data is preprocessed into a feature vector, and then a type of support vector machine learning is performed on the data to find the boundary of the behavior feature of the security user, which is The boundary between safe user behavior and abnormal user behavior, the safe user is inside the boundary, and the abnormal user is outside the boundary. T...

Embodiment 2

[0112] This embodiment provides a method for detecting and analyzing abnormal network behaviors, such as image 3 shown, including steps:

[0113] S31: Statistical data on access behavior characteristics of security users;

[0114] S32: Construct a type of support vector machine model according to the characteristic data;

[0115] S33: Use a type of support vector machine model to predict and analyze the access behavior characteristics of users on the entire network to identify abnormal access behaviors;

[0116] S34: Determine whether the behavior characteristics of the abnormal access behavior are known, and if so, perform corresponding processing; otherwise, study the abnormal access behavior and formulate corresponding measures.

[0117] The difference from the first embodiment is that step S34 is also included.

[0118]Specifically, after identifying the abnormal access behavior and the abnormal IP, further, the abnormal access behavior is divided into common attack be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network abnormal behavior detection and analysis method and system for solving the problems that the imbalance of training data affects the training effect and that all kinds of attack behaviors and attack means cannot be exhausted in the prior art. The method comprises the following steps: S1, counting the access behavior feature data of secure users; S2, constructing a type of support vector machine models of the feature data; and S3, using the type of support vector machine models to perform predictive analysis on the access behavior features of whole network users to identify abnormal access behaviors. The network abnormal behavior detection and analysis method and system are based on machine learning, are used for better detecting network abnormal behaviors, discovering different types of attacks, and analyzing and detecting online network abnormal behaviors according to the properties of data mining, so as to make effective decision making response and improve the network security and resource utilization rate.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a method and system for detecting and analyzing abnormal network behaviors. Background technique [0002] With the continuous development of Internet technology, the problem of network security has become increasingly serious. Network attack has gradually become a low-cost and high-yield industry. The attack methods of hacker organizations are becoming more and more advanced, making traditional attack detection technology and defense equipment Caught off guard and unable to adapt to changes in attack technology in a timely manner, it will bring huge losses to individuals and enterprises. Therefore, how to better detect abnormal behaviors on the network, discover attacks or even new attacks in time, and take effective measures to enhance network security is an important issue facing modern enterprises. [0003] The detection and analysis of network abnormal behavior is an importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCG06F2216/03G06F16/951H04L63/1416H04L63/1425H04L63/1433
Inventor 陈晓莉徐菁丁一帆刘亭林建洪
Owner ZHEJIANG PONSHINE INFORMATION TECH CO LTD