Supercharge Your Innovation With Domain-Expert AI Agents!

Method for detecting camouflage intrusion information

A technology of normal information and covariance matrix, applied in the field of information security, can solve problems such as complex results, loss of personnel and property, and network system attacks, so as to improve detection efficiency and ensure safe and stable operation

Active Publication Date: 2019-11-19
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] System intrusion detection is an important task when running each system, but the intrusion mechanism and the results after the intrusion are complicated. In order to better detect the intrusion behavior in the system, domestic and foreign scholars have proposed feature detection, statistical detection, expert system, file Integrity check and other detection methods, but the detection system is aimed at known attack methods. Once the form of intrusion information changes, the detection system cannot update its knowledge base for a while, which will cause problems such as missed detection and false detection. , so the current detection methods have certain limitations
[0004] As long as there is an intrusion in the network system that is not detected in time, the entire network system will be attacked, and in severe cases, it will even cause huge losses of personnel and property. How to detect intrusions in the network system in time and prevent the network system from being damaged Crash has become the key to ensure the safe operation of the network system
[0005] Therefore, intrusion detection technology is particularly important. Existing intrusion detection methods include misuse detection algorithms, anomaly detection algorithms, and artificial intelligence algorithms. Therefore, it is necessary to propose a system intrusion detection method that is robust and adaptable to various unfavorable situations to help managers quickly detect intrusion behavior and ensure the safe and stable operation of the network system.
The network intrusion detection system finds the attack behavior by matching the network data packets, but the intrusion detection tool often assumes that the attack information is transmitted in plain text, so a slight change to the information may fool its detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting camouflage intrusion information
  • Method for detecting camouflage intrusion information
  • Method for detecting camouflage intrusion information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] see Figure 1-Figure 3 , this embodiment provides a method for detecting masquerading intrusion information, including the following steps,

[0033] Step S1, grabbing network data, and filtering and formatting the data through a data preprocessor;

[0034] Step S2, reducing the dimensionality of the preprocessed data through a dimensionality reduction and deduplication device, and removing redundant attributes;

[0035] Step S3, use the masquerade information determiner to judge and detect the information that is masqueraded by disrupting the order of the intrusion characteristic data in the data packet in the data after dimensionality reduction and de-redundancy, if the similarity between the data and the known intrusion pattern is greater than the similarity tolerance , then it is determined that the information is a disguised intrusion information, and it is rejected; otherwise, the information is normal information, and it is allowed to accept.

[0036] In step S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting camouflage intrusion information. The device mainly comprises three parts, namely a first part and a second part, the system comprises a data preprocessor, a dimension reduction reducer and a camouflage information determiner. According to the method, principal component analysis (PCA) is realized by using a method based on an SVD decomposition covariance matrix; the method is used for dimension reduction of mass data. Removing redundant attributes thereof, the method comprises the following steps: firstly, filtering and formatting a collected original data packet; then, a method based on an SVD decomposition covariance matrix is used for reducing the data; unnecessary data are deleted in the reduction process; according to the intrusion detection method and system, the information disguised by disordering the data transmission sequence is processed, the similarity is used for judging the disguised information, the information is rejectedafter the disguised intrusion behavior is detected, and safe operation of the network system can be well guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for detecting masquerading intrusion information. Background technique [0002] With the rapid development of network and science and technology, our era is developing in the direction of digitization and informatization. The emergence of the network enables information transmission and information processing between all parts of the world to go beyond the limitations of time and space. Life offers convenience. The entire network information age presents the characteristics of liberalization, trans-regionality, and openness. However, while the Internet brings convenience to people, it also presents great challenges and risks. With the development of networked information, problems such as malicious information attacking network systems have emerged. In order to solve and alleviate this threat, intrusion detection systems have emerged. Correct u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 邓松袁新雅岳东付雄葛辉朱博宇
Owner NANJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More