A method of network intrusion anomaly detection based on machine learning
A network intrusion and anomaly detection technology, applied in the field of network security, can solve problems such as incomplete logic, artificial attacks, and low efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The present invention will be further described below in conjunction with accompanying drawing.
[0038] Such as figure 1 As shown, a machine learning-based network intrusion anomaly detection method includes the following steps:
[0039] Step 1. Classify the data feature attributes, specifically including the following sub-steps:
[0040] (a) Given an original data set D={(x 1 ,y 1 ),(x 2 ,y2 ),...,(x m ,y m )}, y i ∈{t 1 ,t 2 ,...,t n}, where t i Represents the target attribute of the sample, the target attribute of each sample is one of the n target attributes, and each sample x i It is composed of n features, namely x i ={X 1 ,X 2 ,...,X n};
[0041] (b) The sample features in the original data set D {X 1 ,X 2 ,...,X n} to classify and identify the categorical data features Discrete={d 1 , d 2 ,...,d n}, where d i ∈{X 1 ,X 2 ,...,X n} and continuous data feature Continuous={c 1 ,c 2 ,...,c n}, where c i ∈{X 1 ,X 2 ,...,X n};
[0042...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


