Malicious traffic detection method based on smote algorithm and integrated learning
A malicious traffic, integrated learning technology, applied in machine learning, computing, computing models, etc., can solve problems such as low malicious traffic detection recall rate and unbalanced malicious traffic.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:
[0039] refer to figure 1 , this embodiment includes the following steps:
[0040] Step 1) Obtain training set A and test set T:
[0041] Step 1a) In an environment that can communicate with the network, run the collected 5000 malware samples in sequence in the virtual machine, open wireshark to collect the traffic generated by the interaction between itself and the network during the running of the malware samples, and terminate the current malware every 5 minutes Run the sample, save the data packets collected by wireshark for 5 minutes, and finally collect 5,000 malicious traffic collection packets, use wireshark to collect the traffic generated by the interaction between mobile phones, computers and the network that are not infected with viruses, and stop wireshark to collect traffic every 5 minutes. Repeat 5,000 times, and finally collect...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


