Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion detection method based on traffic visualization and machine learning algorithm

A technology of intrusion detection and machine learning, applied in the Internet field, can solve problems such as complex feature extraction, high cost of resource occupancy, and inability to detect network attacks in real time

Active Publication Date: 2019-05-17
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF6 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the above-mentioned deficiencies in the prior art, the present invention proposes an intrusion detection method based on traffic visualization and machine learning algorithms, which is used to solve the existing problems in the prior art that cannot accurately detect each attack, cannot detect network attacks in real time, and establish intrusion detection methods. The problems of slow system speed, complex feature extraction and high cost of resource occupancy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method based on traffic visualization and machine learning algorithm
  • Intrusion detection method based on traffic visualization and machine learning algorithm
  • Intrusion detection method based on traffic visualization and machine learning algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0088] Such as figure 1 As shown, an intrusion detection method based on traffic visualization and machine learning algorithm includes the following steps:

[0089] S1: Use high-speed capture device RF_RING or TNAPI to capture traffic;

[0090] S2: Analyze and filter the traffic identified by the intruder database in the captured traffic, and send the unrecognized traffic and its required header information to the data pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection method based on traffic visualization and a machine learning algorithm. The intrusion detection method comprises the following steps: S1, capturing traffic by using high-speed capture equipment; s2, sending the flow which cannot be identified by the intruder database and the packet header information required by the intruder database to a data processing layer for data processing; s3, converting the received flow subjected to data processing into a grey-scale map; s4, based on semi-supervised learning, clustering the grey-scale map by using a K-means algorithm and classifying the gray-scale images of each cluster after clustering by using a CNN, and judging whether unknown invasion occurs or not based on an entropy theory and a classificationresult; s5, according to a classification result, based on an antibody theory in an AIS algorithm, purifying the specific attack by adopting a decision tree algorithm to obtain a detection result; themethod solves the problems that in the prior art, each attack cannot be accurately detected, the network attack cannot be detected in real time, the intrusion system establishment speed is low, feature extraction is complex, and the resource occupancy rate cost is high.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to an intrusion detection method based on traffic visualization and machine learning algorithms. Background technique [0002] In recent years, with the continuous development of Internet technology, people use the Internet more and more widely, the frequency and intensity of attacks in the network have been increasing, and the network environment has also deteriorated. Network attack refers to the attack on the hardware, software and data of the network system by using network loopholes and security defects. From the perspective of destructiveness to information, attack types can be divided into passive attack and active attack. Active attacks can lead to the tampering of certain data streams and the generation of false data streams. Such attacks can be divided into tampering, falsification of message data and termination (denial of service). In a passive attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62G06N3/04
Inventor 廖丹章苇杭金海陆张明
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products