Neural network-based intrusion detection method

A neural network algorithm and neural network technology, applied to biological neural network models, electrical components, transmission systems, etc., can solve problems such as false alarms and blurred boundaries

Active Publication Date: 2018-09-21
NAT UNIV OF DEFENSE TECH +1
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of system needs to correctly distinguish between normal behavior and abnormal behavior. The boundary between them is relatively vague and difficult to accurately describe, so this kind of system often generates some false alarms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Neural network-based intrusion detection method
  • Neural network-based intrusion detection method
  • Neural network-based intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0018] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0019] The purpose of the present invention is to overcome the shortcomings ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a neural network-based intrusion detection method, comprising the following steps: step 1), a detecting step which comprises the following steps: sniffing to capture traffic information of a connected host, determining which ports are open or closed and which programs are running, and judging whether the system has received an attack or is about to receive an attack according to the information; step 2), a data preprocessing step which comprises the following steps: giving a large number of training samples, selecting features, performing data preprocessing, and identifying anomalies; step 3), an attack classification step which comprises the following steps: using a decision tree model, a support vector machine or a neural network model to classify various attacksby using a neural network algorithm; and step 4), an alerting step which comprises the following steps: notifying the detected attack event, so that a network administrator can make decisions in timeand the damage caused by attacks is reduced.

Description

technical field [0001] The invention belongs to an intrusion detection method based on a neural network. Background technique [0002] With the development of the Internet, the Internet has greatly facilitated people's lives, and more and more individuals, corporate groups, or government agencies rely on the Internet to conduct business, some of which are information or secrets that are not willing to be disclosed. An insecure system can often cause losses to individuals, companies, or government agencies due to the means by which our enemies or competitors can obtain unauthorized and unauthorized information. Network intrusions have greatly threatened safe surfing the Internet and privacy protection. Due to the complexity of the network, the diversity of attack methods, and the purpose of the attacker, all of these aggravate the difficulty of network intrusion detection. At present, there are many ways to ensure system security in the market, such as installing firewall, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/02
CPCG06N3/02H04L63/1416H04L63/1425
Inventor 马凯江荣贾焰周斌李爱平杨树强韩伟红李润恒徐镜湖安伦亓玉璐杨行王伟林佳尚怀军
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products