Supercharge Your Innovation With Domain-Expert AI Agents!

A Network Intrusion Detection Method Based on Dynamic Adaptive Clustering Using Inflection Point Radius

A technology of network intrusion detection and dynamic self-adaptation, applied in the field of network security, can solve problems such as low detection accuracy and inability to accurately train intrusion detection models, achieve excellent detection ability and stability, ensure full coverage, and full inspection capabilities high effect

Active Publication Date: 2021-07-09
CHINA CRIMINAL POLICE UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing research belongs to the detection algorithm of the supervised type. For network access connections without category labels and data identification features, the intrusion detection model cannot be accurately trained, resulting in low detection accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Network Intrusion Detection Method Based on Dynamic Adaptive Clustering Using Inflection Point Radius
  • A Network Intrusion Detection Method Based on Dynamic Adaptive Clustering Using Inflection Point Radius
  • A Network Intrusion Detection Method Based on Dynamic Adaptive Clustering Using Inflection Point Radius

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] With the increasing frequency of network attacks, there are loopholes in traditional security protection products. Network intrusion detection, as an important protection method for information network security, can make up for the lack of firewalls and provide effective network security protection measures.

[0048]For the supervised algorithm, which relies heavily on the training data set, it has a strong ability to detect known intrusion behaviors, but it has a poor ability to detect unknown intrusion behaviors. Its application ability in actual intrusion detection is not comprehensive enough, and its applicability is not strong. For unsupervised algorithms, when they are applied to intrusion detection, in order to improve the detection rate and clustering accuracy, it is often necessary to remove outliers before performing empirical tuning (such as Kmeans algorithm and DBSCAN algorithm). It consumes a lot of cost in the optimization process of the clustering model, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The network intrusion detection method for realizing dynamic self-adaptive clustering by utilizing the inflection point radius of the present invention is characterized in that it comprises the following steps: performing dimensionality reduction operations on multi-dimensional data records; performing standardized changes on feature vectors of data records after dimensionality reduction; The standardized data record is regarded as a node, and the distance between nodes is calculated by the Euclidean algorithm to represent the degree of correlation between nodes, and the initial clustering is performed according to the degree of correlation between nodes, and the centers of all clusters in the initial clustering are taken as Abstract nodes, repeat the clustering process, and complete the final clustering; judge whether the nodes in each cluster are normal, if the proportion of normal nodes in the cluster is greater than the proportion of abnormal nodes, then classify all nodes in this cluster as normal; All nodes of the cluster are classified as exception class. The method of the invention can realize automatic clustering and optimization of network behavior data, and has obvious advantages in detection rate and stability.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a network intrusion detection method for realizing dynamic self-adaptive clustering by utilizing the radius of an inflection point. Background technique [0002] The rapid development of Internet technology has profoundly affected human production and lifestyle, and Internet activities have become an important part of human daily life. However, this high global network penetration also raises a series of security issues. The openness and flexibility of computer network protocols make information systems more vulnerable to intruder attacks, so continuous monitoring and protection of computer networks is required. User authentication, data encryption, and firewalls are some of the traditional techniques used to secure computers. Intrusion Detection Systems (IDS), which emerged later, used specific analysis techniques to detect attacks, identify the source of the attack, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 罗文华许彩滇
Owner CHINA CRIMINAL POLICE UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More