Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security threat analysis method and system based on LDA machine learning

A machine learning and threat analysis technology, applied in the field of network security, can solve problems such as sensitivity and unrealistic estimation of the number of topics, and achieve the effect of simplifying the model training process and improving the accuracy

Inactive Publication Date: 2019-10-25
杉树岭网络科技有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the accuracy of these methods is sensitive to the number of topics, it may be easier to estimate the number of topics for a small corpus, but it is impractical to estimate the number of topics when the size of the corpus becomes large.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security threat analysis method and system based on LDA machine learning
  • Network security threat analysis method and system based on LDA machine learning
  • Network security threat analysis method and system based on LDA machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0055] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0056] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a network security threat analysis method and system based on LDA machine learning.

[0057] The explanation for LDA in the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security threat analysis method and system based on document topic generation model (LDA) machine learning, and the method comprises the following steps: step 1, carrying out the data collection of different types of network flows in a data collection module according to a specific application scene; and step 2, in a machine learning calculation module, calculating the abnormal probability of network connection by using an LDA topic model machine learning algorithm; and step 3, in the operation analysis module, in combination with a threat intelligence database, detecting the attack type of the suspicious network connection by using a credibility detection-based method. Suspicious connection, abnormal flow and unknown attacks can be effectively detected.

Description

technical field [0001] The present invention relates to the field of network security, more specifically, to a network security threat analysis method and system based on machine learning of Document Topic Generation Model (LDA). Background technique [0002] Due to the rapid development of information technology, the Internet has become an indispensable tool in people's daily life and work. But the ensuing problem is that the widespread vulnerability of cyberspace will make it face a cybersecurity threat situation. [0003] Existing network security technologies center on vulnerabilities and perform network security detection based on signatures. By comparing network traffic with signatures, known vulnerabilities or known network attacks can be effectively detected. [0004] However, this method relies on the feature rule library, which needs to be continuously updated, and this detection cannot effectively prevent unknown threats or attacks. However, new attack methods a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06G06F16/33G06F17/16G06N20/00
CPCG06F16/3347G06F17/16G06F21/57G06N20/00H04L63/1425
Inventor 陈庶樵李伟吴玲花刘鹏
Owner 杉树岭网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products