Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Detection method of abnormal data of embedded intelligent terminal, and embedded intelligent terminal

An abnormal data and intelligent terminal technology, applied in the field of network security, can solve the problems of low detection and detection efficiency of abnormal data, achieve the effect of improving the accuracy of abnormal data, improving the quality of clustering, and reducing the false positive rate

Inactive Publication Date: 2018-07-27
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an embedded intelligent terminal abnormal data detection method and an embedded intelligent terminal, which solves the problem of low efficiency of abnormal data detection under the environment of limited computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method of abnormal data of embedded intelligent terminal, and embedded intelligent terminal
  • Detection method of abnormal data of embedded intelligent terminal, and embedded intelligent terminal
  • Detection method of abnormal data of embedded intelligent terminal, and embedded intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The embodiment of the present invention provides a method for detecting abnormal data of an embedded smart terminal and an embedded smart terminal, which can use the cloud-assisted method and use the graph clustering method to analyze the embedded smart terminal environment when the computing resources of the terminal device are limited. For small-scale abnormal data mining, the detection rate is high; the embedded smart terminal data has fewer attribute types, and the operating algorithm efficiency is higher. At the same time, the cloud collaboration method is used to assist the embedded smart terminal to perform secondary marking, which reduces the computing burden of the embedded smart terminal and improves the computing efficiency of the embedded smart terminal. In addition, the adoption of the technical solution of the present invention improves the problem that the traditional K-Means-based anomaly detection algorithm needs to preset the number of clusters, improve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method of abnormal data of an embedded intelligent terminal, and the embedded intelligent terminal. The detection method comprises: receiving data to be tested, wherein the data to be tested comprises the abnormal data; determining an object in the data to be tested, a k neighbor of each object and a k neighbor relationship between the objects; constructing a k neighbor directed graph according to the k neighbor relationship between the objects; constructing a k-clustering graph according to the k neighbor directed graph, and marking a clustering cluster in the k-clustering graph; and when a part of clustering clusters in the clustering cluster is meet preset conditions, outputting the data to be tested in the part of clustering clusters as the abnormal data. By adoption of the method, small-scale abnormal data mining can be performed in the environment of the embedded intelligent terminal by using a graph clustering method in the case that the computing resources of a terminal device are limited, the detection efficiency is high, the operation efficiency is high, and meanwhile the false alarm rate is reduced.

Description

technical field [0001] The present invention relates to the field of network security, and in particular to an embedded intelligent terminal abnormal data detection method and an embedded intelligent terminal. Background technique [0002] With the continuous development of Internet technology, network security has gradually become a hot topic, and new security threats are generated almost every day. Faced with such increasingly large-scale and varied types of attacks, it has gradually become a mainstream trend to apply machine learning or data mining technology to train and identify tens of thousands of new types of security threats. [0003] In the embedded environment, it is necessary to perform anomaly detection on some collected data, and many methods in the field of data mining can only show advantages when the data scale is large, such as neural networks, for environments with limited computing resources, The methods in the field of data mining appear to be more comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCG06F16/26G06F16/285G06F16/35G06F16/358H04L63/1425H04L67/10
Inventor 胡琳琳耿筱林郭志川
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products