An intrusion detection method based on traffic visualization and machine learning algorithm

An intrusion detection and machine learning technology, applied in the Internet field, can solve problems such as complex feature extraction, inability to accurately detect every attack, and high cost of resource occupancy

Active Publication Date: 2020-06-23
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the above-mentioned deficiencies in the prior art, the present invention proposes an intrusion detection method based on traffic visualization and machine learning algorithms, which is used to solve the existing problems in the prior art that cannot accurately detect each attack, cannot detect network attacks in real time, and establish intrusion detection methods. The problems of slow system speed, complex feature extraction and high cost of resource occupancy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An intrusion detection method based on traffic visualization and machine learning algorithm
  • An intrusion detection method based on traffic visualization and machine learning algorithm
  • An intrusion detection method based on traffic visualization and machine learning algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The specific embodiments of the present invention are described below to facilitate those skilled in the art to understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Such changes are obvious within the spirit and scope of the present invention as defined and determined by the appended claims, and all inventions and creations utilizing the inventive concept are within the scope of protection.

[0088] like figure 1 As shown, an intrusion detection method based on traffic visualization and machine learning algorithm includes the following steps:

[0089] S1: Use high-speed capture device RF_RING or TNAPI to capture traffic;

[0090] S2: Analyze and filter the traffic identified by the intruder database in the captured traffic, and send the unidentified traffic and its required header information to the data processing l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An intrusion detection method based on traffic visualization and machine learning algorithms, including the following steps: S1: use high-speed capture equipment to capture traffic; S2: send the traffic that cannot be identified by the intruder database and the required packet header information to the data processing layer for processing Data processing; S3: Convert the received traffic for data processing into a grayscale image; S4: Based on semi-supervised learning, use the K-means algorithm to cluster the grayscale image, and use CNN for each cluster after clustering Carry out grayscale image classification, and judge whether an unknown intrusion occurs based on the entropy theory and classification results; S5: According to the classification results, based on the antibody theory in the AIS algorithm, use the decision tree algorithm to purify the specific attack and obtain the detection results; the present invention solves the problem of Existing technologies have the problems of being unable to accurately detect every type of attack, unable to detect network attacks in real time, slow in building an intrusion system, complex feature extraction, and high cost of resource usage.

Description

technical field [0001] The invention belongs to the field of Internet technology, and in particular relates to an intrusion detection method based on traffic visualization and machine learning algorithms. Background technique [0002] In recent years, with the continuous development of Internet technology, people's application of the Internet has become more and more extensive, the frequency and intensity of attacks in the network have continued to increase, and the network environment has also deteriorated. A network attack is an attack on the hardware, software and data of a network system by exploiting network vulnerabilities and security flaws. From the destructive point of view of information, the types of attacks can be divided into passive attacks and active attacks. Active attacks can lead to the tampering of some data streams and the creation of fake data streams. Such attacks can be divided into tampering, forgery of message data, and termination (denial of servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62G06N3/04
Inventor 廖丹章苇杭金海陆张明
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products