Duplex enabled network attack and defense method and system based on distributed and artificial intelligence

A distributed network and artificial intelligence technology, applied in transmission systems, electrical components, etc., can solve the problems of low intelligence, low efficiency, and low security of network equipment, and achieve high intelligence, high security, and high sharing. Effect

Active Publication Date: 2019-04-02
湖北元村科技有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of low efficiency, low intelligence and low security of network equipment existing in the existing network performance, the present invention provides a method and system for duplex enabling network attack and defense based on distributed and artificial intelligence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Duplex enabled network attack and defense method and system based on distributed and artificial intelligence
  • Duplex enabled network attack and defense method and system based on distributed and artificial intelligence
  • Duplex enabled network attack and defense method and system based on distributed and artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the technical solution of the present invention clearer, below in conjunction with the embodiment, the Ip address of the content of the invention, the open port of sending and receiving are described in more detail, but the scope of protection of the invention is not limited to the following examples, this description All features disclosed in, or steps in all methods or processes disclosed, may be combined in any way, except for mutually exclusive features and / or steps.

[0057] The principle will be further described below in conjunction with the accompanying drawings.

[0058] Such as figure 1 As shown, the method and system for duplex enabling network attack and defense based on distributed and artificial intelligence provided by the embodiment of the present invention includes the following steps:

[0059] It can be divided into two parts, the first part is to establish the initial local expert system; the second part is to learn and strengthen t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a duplex enabled network attack and defense method and system based on distributed and artificial intelligence. The method comprises the steps of S101, collecting network stateinformation data, extracting and recognizing features, and giving priority to recognizing the network attack state; S102, if the recognition is successful, taking the optimal solution, and calling distributed network computing according to the solution so as to solve the network state problem; S103, if the recognition fails, regarding the current network state as a new network state, and relatively solving the network state problem by using a method similar to the step S102; S104, repeating the steps S101-S103 to obtain combination data of i groups of network state information and solutions thereof, and forming a data set 1; S105, then learning the data set 1 through an adversarial network to obtain a larger data set 3; S106, further learning by using a reinforcement learning method to obtain multiple optimal combinations of the network state information and solution thereof; and S107, respectively packaging each obtained group of combinations by using a blockchain technology, and then transferring to a local expert system library.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically, the present invention relates to a method and system for duplex enabling network attack and defense based on distributed and artificial intelligence. Background technique [0002] With the development of the Internet, the Internet of Things is speeding up its integration into people's production and life. At present, many manufacturers of Internet of Things equipment focus on pursuing new functions, and do not pay enough attention to security. The current mainstream Internet of Things management models include direct connection mode, gateway mode and cloud pattern. The direct connection mode refers to the direct connection between the management terminal and the terminal without passing through other nodes. This mode is generally used for short-distance communication, such as wireless Bluetooth, WiFi hotspots, etc.; Remote management of multiple terminals; cloud mod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L63/1416H04L63/1458H04L67/1097
Inventor 葛睿刘复昌孟凡胜袁浩王世超
Owner 湖北元村科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products