Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for constructing pu learning-based malicious traffic detection model

A malicious traffic and detection model technology, applied in the network field, achieves the effect of solving artificial dependence and good accuracy

Active Publication Date: 2020-04-28
THE FOURTH PARADIGM BEIJING TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, based on the existing detection methods, it is difficult to meet the current needs of malicious traffic detection. How to realize a detection of malicious traffic based on machine learning has become an urgent problem to be solved in the industry.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for constructing pu learning-based malicious traffic detection model
  • Method and device for constructing pu learning-based malicious traffic detection model
  • Method and device for constructing pu learning-based malicious traffic detection model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Hereinafter, exemplary embodiments of the present invention will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the present invention can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0068] The embodiment of the present invention provides a method for constructing a malicious traffic detection model based on PU learning. The method is used to detect traffic data that needs to be detected, and its purpose is to construct a PU learning model for detecting malicious traffic to be detected. The flow data is detected, so as to realize the malicious traffic detection function based on machine learni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for constructing a malicious flow detection model based on PU learning, relates to the technical field of networks, and mainly aims to construct a maliciousflow detection model based on machine learning. According to the main technical scheme, the method comprises the steps of obtaining flow data as a sample data set; training based on the sample data set to obtain a plurality of candidate models; Constructing an evaluation set based on the sample data set; Evaluating each candidate model according to the evaluation set and a preset evaluation condition to obtain an evaluation result corresponding to each candidate model; Selecting a candidate model with an evaluation result meeting a preset condition; And integrating the selected model according to a preset integration method to obtain a malicious flow detection model. The method and the device are used for realizing the process of constructing the malicious flow detection model in the malicious flow detection process.

Description

Technical field [0001] The invention relates to the field of network technology, in particular to a method and device for constructing a malicious flow detection model based on PU learning, and a method and device for malicious flow detection. Background technique [0002] With the continuous development of network technology and people's work and life are more and more closely related to the network, the traffic on the network has gradually increased. Among them, malicious traffic often exists in the network, which will affect the normal operation of the website database or system, such as the network. Attacks, traffic fraud, malicious crawlers and other network traffic are common malicious traffic. Such malicious traffic usually invades, interferes with, or captures unauthorized business data or information through unauthorized methods. Based on the harmfulness of malicious traffic, experts in the domain have paid more and more attention to the detection of malicious traffic. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
Inventor 王海涂威威
Owner THE FOURTH PARADIGM BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products