Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of network intrusion anomaly detection based on machine learning

A network intrusion and anomaly detection technology, applied in the field of network security, can solve problems such as incomplete logic, artificial attacks, and low efficiency

Active Publication Date: 2021-05-14
DALIAN UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of people's understanding of IT logic, they can only design IT systems by completing computing tasks, and there must be flaws in logic, making it difficult to deal with attacks by humans using flaws
Therefore, the traditional detection technology of changing the rule set through manual maintenance is not only inefficient, but also has a large maintenance cost, which has great defects.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of network intrusion anomaly detection based on machine learning
  • A method of network intrusion anomaly detection based on machine learning
  • A method of network intrusion anomaly detection based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with accompanying drawing.

[0038] Such as figure 1 As shown, a machine learning-based network intrusion anomaly detection method includes the following steps:

[0039] Step 1. Classify the data feature attributes, specifically including the following sub-steps:

[0040] (a) Given an original data set D={(x 1 ,y 1 ),(x 2 ,y2 ),...,(x m ,y m )}, y i ∈{t 1 ,t 2 ,...,t n}, where t i Represents the target attribute of the sample, the target attribute of each sample is one of the n target attributes, and each sample x i It is composed of n features, namely x i ={X 1 ,X 2 ,...,X n};

[0041] (b) The sample features in the original data set D {X 1 ,X 2 ,...,X n} to classify and identify the categorical data features Discrete={d 1 , d 2 ,...,d n}, where d i ∈{X 1 ,X 2 ,...,X n} and continuous data feature Continuous={c 1 ,c 2 ,...,c n}, where c i ∈{X 1 ,X 2 ,...,X n};

[0042...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and relates to a machine learning-based network intrusion anomaly detection method, comprising the following steps: (1) classifying data feature attributes, (2) classifying target attributes in a data set according to traditional network intrusion categories Mapping, (3) reducing the dimensionality of the sample features in the data, (4) using the processed data set to train a multi-classification model for network requests, (5) using the test set data to evaluate the trained classification model. A network intrusion anomaly detection method based on machine learning of the present invention cooperates with feature processing and normalization technology to preprocess data, constructs an SVM model to realize efficient detection of network anomaly attacks, and solves traditional rule-based detection The method faces the problems of high maintenance cost and the need to update filtering rules in real time.

Description

technical field [0001] The invention relates to a machine learning-based network intrusion anomaly detection method, which belongs to the technical field of network security. Background technique [0002] With the deepening and promotion of wireless and mobile networks, more and more smart devices (mobile phones, TVs and other devices) rely on computer systems and the Internet, wireless networks (such as Bluetooth and Wi-Fi) and the Internet of Things, information The security situation is getting tougher by the day. Recently, network security incidents have occurred frequently, and network attacks have intensified. However, the network security defense technology is relatively traditional, the development of intelligent equipment lags behind, the real integration of network security and big data has not been fully realized, and the protection of key information infrastructure is also waiting to solve a series of bottleneck problems. Network intrusion detection refers to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L63/1425H04L63/1466G06F18/2411
Inventor 连捷张晖王东王宏伟
Owner DALIAN UNIV OF TECH