Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intranet attack detection model construction method based on machine learning

An attack detection and machine learning technology, applied to electrical components, transmission systems, etc., can solve problems such as the lack of organic combination of attack classification and attack model, and the lack of comprehensiveness and hierarchy of attack modeling, so as to expand the coverage of time and space, The effect of reducing decision-making risk and improving accuracy

Inactive Publication Date: 2019-05-14
STATE GRID HEBEI ELECTRIC POWER RES INST
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In general, the existing attack modeling is not based on the attack classification, and the attack classification and the attack model lack an organic combination, which makes the attack modeling not comprehensive and hierarchical.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intranet attack detection model construction method based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but should not be used to limit the scope of the present invention.

[0022] In the description of the present invention, it should be noted that the orientations or positional relationships indicated by the terms "center", "upper", "lower", "inner", "outer" and the like are based on the orientations or positional relationships shown in the accompanying drawings , is only for the convenience of describing the present invention and simplifying the description, but does not indicate or imply that the referred device or element must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention. The terms "first" and "second" are used for descriptive purposes only, and should not be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intranet attack detection model construction method based on machine learning, and the method comprises the steps: carrying out the analysis of collected log records, carrying out the different traceability analysis of the log records according to different corresponding scenes, and determining an attack path and an attack behavior; The method comprises the steps of 1, log collection; step 2, defining an attack scene; step 3, defining behavior actions of each scene; and step 4, newly establishing an attack traceability analysis trigger point. The method has the advantages of high accuracy, decision risk reduction and the like.

Description

technical field [0001] The invention relates to the field of intelligent model construction, in particular to a method for constructing an intranet attack detection model. Background technique [0002] With the development of the modern Internet, network security issues are becoming more and more prominent, and there are more and more potential security attacks on the network. With the release of a large number of attack tools, attackers can use simple attack tools to cause harm to the target network. Skilled attackers use system vulnerabilities to carry out in-depth attacks on information systems, which has brought a lot of impact on people's lives. [0003] Attack detection on the intranet can effectively discover the intrusion behavior of attackers, and improving the accuracy of attack behavior detection is a key step in discovering attack behavior. The attack model is an important source of knowledge requirements for the development of attack technology, it helps to und...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 左晓军董立勉侯波涛卢宁陈泽常杰郗波
Owner STATE GRID HEBEI ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products