Intrusion detection method, electronic equipment and computer storage medium

An intrusion detection and detection technology, applied in computer security devices, computing, electrical digital data processing, etc., can solve problems such as capture of suspicious activities, false alarms of abnormal detection triggers, excessive CPU resources, etc., to achieve hacking and intrusion The effect of accurate detection, reduction of false alarm rate and false negative rate

Inactive Publication Date: 2018-06-12
SHANGHAI GUAN AN INFORMATION TECH
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The anomaly detection system is good at detecting some peaks that suddenly exceed the standard. If the anomaly detection system knows that your network usually only has 10 session session requests a day, but a thousand session requests suddenly occur, the anomaly detection system is likely to capture suspicious activities.
[0007] Host-based intrusion detection systems can have the ability to monitor hosts and sniff network traffic. This approach is good at monitoring and reporting direct interaction at the application layer, but this approach can only s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method, electronic equipment and computer storage medium
  • Intrusion detection method, electronic equipment and computer storage medium
  • Intrusion detection method, electronic equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the technical solutions and advantages of the present application clearer, the exemplary embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only part of the embodiments of the present application, not all implementations. Exhaustive list of examples. And in the case of no conflict, the embodiments in this description and the features in the embodiments can be combined with each other.

[0067] There are two main types of hacker intrusion detection methods:

[0068] 1. Host-based intrusion detection system method, the detection system is installed on the host to achieve the purpose of detection.

[0069] 2. Anomaly detection model, through learning the normal behavior during "performance analysis" for a period of time, it can alarm all other abnormal configuration files.

[0070] Host-based intrusion detection systems can only simply tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intrusion detection method, electronic equipment and a computer storage medium, and belongs to the technical field of computer information security. The intrusion detection method includes the steps that to-be-detected logs are obtained; through a pre-trained intrusion detection model, the to-be-detected logs are subjected to intrusion detection; the intrusion detection model is obtained according to overall characteristics and personal characteristics of log samples. The intrusion detection model is pre-trained according to the overall characteristics and the personal characteristics of the log samples, the to-be-detected logs are subjected to intrusion detection through the intrusion detection model, the false positive rate and the false negative rate when hacker attack detection is carried out can be effectively reduced, and hacker-attack intrusion detection is more accurate.

Description

technical field [0001] The present application relates to the technical field of computer information security, in particular to an intrusion detection method, an electronic device and a computer storage medium. Background technique [0002] Hacking is unauthorized activity accompanied by a malicious attempt to exploit specially crafted code or techniques. Attacks include denial of service, viruses, buffer overflows, malformed requests, malformed network packets, or unauthorized program execution. [0003] Therefore, protecting against malicious intrusion attacks by hackers is very important for website application security and intranet security. [0004] There are two main types of hacker intrusion detection methods: [0005] 1. The host-based intrusion detection system method is to install the detection system on the host to achieve the purpose of detection. HIDS (Host-based Intrusion Detection System, host-based intrusion detection system) is installed as a daemon or m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 胡绍勇王小东陈一根葛胜利
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products