Supercharge Your Innovation With Domain-Expert AI Agents!

Network intrusion detection method based on dual subspace sampling and confidence offset

A network intrusion detection and subspace technology, which is applied in the field of network information security, can solve the problems that the integration scale cannot be well determined, and the integration algorithm cannot effectively solve the problem of unbalanced network intrusion detection, so as to achieve the effect of solving the classification problem.

Active Publication Date: 2019-08-27
EAST CHINA UNIV OF SCI & TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the fact that the existing integration algorithm cannot effectively solve the problem of unbalanced network intrusion detection, and the integration scale cannot be well determined, and modeling can only be done by experience, the present invention proposes a method based on dual subspace sampling and Network Intrusion Detection Method Based on Confidence Bias

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method based on dual subspace sampling and confidence offset
  • Network intrusion detection method based on dual subspace sampling and confidence offset
  • Network intrusion detection method based on dual subspace sampling and confidence offset

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Below in conjunction with accompanying drawing and example the present invention will be further introduced: the system designed by the present invention is divided into four modules altogether.

[0013] Part I: Data Acquisition

[0014] The process of data collection is to convert real samples into data, and generate a data set represented by vectors for subsequent modules to process. In this step, the collected samples are divided into training samples and testing samples. The training samples are processed first. A training sample generates a vector Among them, i indicates that the sample is the i-th of the total training samples, and c indicates that the sample belongs to the c-th class. Each element of the vector corresponds to an attribute of the sample, and the dimension d of the vector is the number of attributes of the sample. For the convenience of subsequent calculations, all training samples are combined into a training matrix X 0 , in this matrix, eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network intrusion detection method based on dual subspace sampling and confidence offset. The network intrusion detection method comprises the following steps: firstly, carrying out down-sampling preprocessing on a base classifier of each layer in sample and feature dual-layer level; secondly, mixing the confidence of each layer with the original features through an interpolation method to serve as new features to be input into the next layer of the model; then, distributing the confidence coefficient of interpolation layer by layer through a cascade model. The disturbance of the confidence coefficient will not participate in the test step. Compared with a traditional imbalance classification integration method, the method has the advantages that the depth forest is expanded to solve the imbalance problem, and the threshold problem in imbalance classification is further solved through the cascade structure; a model capable of selecting disturbance amplitude isgenerated through the system to train a sample, and the detection performance of the model for unbalanced network intrusion can be effectively improved; meanwhile, the integrated model stacked layer by layer can obtain more excellent generalization performance in the detection process.

Description

technical field [0001] The invention relates to an unbalanced network intrusion detection and identification method, which belongs to the field of network information security Background technique [0002] With the rapid development of network technology and the gradual expansion of the scale of the Internet, network security issues have gradually come into the public eye. The research on network intrusion identification methods is also a hot field this year. The main types of basic network attacks include denial of service (Denial of Service, DoS), unauthorized remote host access (Remote-to-Login, R2L), unauthorized access to superusers (User-to-Root, U2R), Monitoring detection (Probing), etc., the above-mentioned attack methods can further derive numerous sub-attack methods. Therefore, it is urgent to construct a targeted detection scheme for these network attacks. [0003] The existing commonly used network attack detection methods are: 1) rule-based detection methods,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416
Inventor 王喆陈立龙曹晨杰李冬冬杜文莉杨海
Owner EAST CHINA UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More