A method and device for constructing a malicious traffic detection model based on PU learning

A malicious traffic and detection model technology, applied in the network field, achieves the effect of solving artificial dependence and good accuracy

Active Publication Date: 2019-06-25
THE FOURTH PARADIGM BEIJING TECH CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, based on the existing detection methods, it is difficult to meet the current needs of malicious traffic detection. How to realize a detection of malicious traffic based on machine learning has become an urgent problem to be solved in the industry.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for constructing a malicious traffic detection model based on PU learning
  • A method and device for constructing a malicious traffic detection model based on PU learning
  • A method and device for constructing a malicious traffic detection model based on PU learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0068] An embodiment of the present invention provides a method for constructing a malicious traffic detection model based on PU learning. The method is used to detect traffic data that needs to be detected, and its purpose is to construct a PU learning model for detecting malicious traffic to detect The traffic data is detected, so as to realize the malicious traffic detection function based on machine learning, and solve the problem of over-re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for constructing a malicious flow detection model based on PU learning, relates to the technical field of networks, and mainly aims to construct a maliciousflow detection model based on machine learning. According to the main technical scheme, the method comprises the steps of obtaining flow data as a sample data set; training based on the sample data set to obtain a plurality of candidate models; Constructing an evaluation set based on the sample data set; Evaluating each candidate model according to the evaluation set and a preset evaluation condition to obtain an evaluation result corresponding to each candidate model; Selecting a candidate model with an evaluation result meeting a preset condition; And integrating the selected model according to a preset integration method to obtain a malicious flow detection model. The method and the device are used for realizing the process of constructing the malicious flow detection model in the malicious flow detection process.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method and device for constructing a malicious traffic detection model based on PU learning, and a malicious traffic detection method and device. Background technique [0002] With the continuous development of network technology and people's work and life are more and more closely related to the network, the traffic in the network is gradually increasing. Among them, there are often malicious traffic in the network, which will affect the normal operation of the website database or system, such as network Network traffic such as attacks, traffic fraud, and malicious crawlers are common malicious traffic. Such malicious traffic usually intrudes, interferes, or grabs unauthorized business data or information through unauthorized means. Based on the harmfulness of malicious traffic, experts in the domain have paid more and more attention to the detection of malicious traf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
Inventor 王海涂威威
Owner THE FOURTH PARADIGM BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products