Two-way intrusion detection method and system based on cloud computing

An intrusion detection and cloud computing technology, applied in transmission systems, wireless communications, electrical components, etc., can solve problems such as cognitive wireless network threats, inability to guarantee cognitive wireless network security, etc., to achieve the effect of simplifying functions

Active Publication Date: 2021-01-19
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems existing in the existing technology are: the existing technology cannot guarantee the security of the entire cognitive wireless network relying on the detection of specific attacks; the malicious behavior of internal users will also pose a serious threat to the cognitive wireless network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way intrusion detection method and system based on cloud computing
  • Two-way intrusion detection method and system based on cloud computing
  • Two-way intrusion detection method and system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0065] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0066] Such as figure 1 As shown, the two-way intrusion detection method based on cloud computing provided by the embodiment of the present invention includes the following steps:

[0067] S101: The cloud database updates the intrusion detection method set in real time, and when the intrusion detection method set changes, the updated intrusion detection method set is synchronized to the local database of each intelligent agent; the local database of the intelligent agent stores the in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cognitive radio networks, and discloses a two-way intrusion detection system and method based on cloud computing, and a cognitive radio network, including: initialization, data acquisition, data transmission, data processing, malicious behavior determination, and internal attack determination , attack alerts, malicious user handling. The present invention combines ultra-large-scale cloud computing, dynamic expansion of resources, and massive information processing, and utilizes cloud computing to save the time for agents to traverse the intrusion detection method in a distributed network; according to different attack targets, intelligent agents and cloud servers detect attacks on channels , the secondary node detects attacks against the terminal, simplifies the functions of secondary users and intelligent agents, and saves a lot of communication costs for reporting data to cloud servers; intelligent agents and cloud servers detect the behavior of internal secondary users, which solves the problem of cognitive radio network The problem of possible insider attacks in the

Description

technical field [0001] The invention belongs to the technical field of cognitive radio networks, and in particular relates to a cloud computing-based two-way intrusion detection system and method, and a cognitive radio network. Background technique [0002] Cognitive wireless networks provide an effective solution to the spectrum shortage problem by sensing and utilizing idle spectrum. The new characteristics of cognitive wireless networks also bring new security threats to it, and the existing security mechanisms cannot be directly applied to cognitive wireless networks. Currently, the research on the security of cognitive wireless networks is in its infancy, and research on the intrusion detection mechanism of cognitive wireless networks is an important direction of cognitive wireless network security research. The intrusion detection mechanism can defend the cognitive wireless network from serious security attacks from the perspective of the whole network, and ensure the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/12H04W12/122
CPCH04L63/0281H04L63/1416H04L63/1458H04L67/10H04W12/12
Inventor 裴庆祺宋泊为李子李红宁刘雪峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products