A network-oriented intrusion data detection method

A data detection and data technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of difficult classification of data sets, low classification efficiency, etc., to eliminate irrelevant features, reduce dimensionality, and improve classification efficiency effect

Active Publication Date: 2022-04-05
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the purpose of the present invention is to provide a network-oriented intrusion data detection method to solve the problems of difficult classification of data sets and low classification efficiency in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network-oriented intrusion data detection method
  • A network-oriented intrusion data detection method
  • A network-oriented intrusion data detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The working principle and technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation.

[0047] Dimensionality reduction technology, as a means to improve computing performance, can be used as a preprocessing step in machine learning algorithms to eliminate irrelevant features and retain the most relevant features. In practice, there are two ways to re-determine the number of attributes in a dataset. The first approach is feature selection, which retrieves a subset of the original features without modifying data attributes. Feature selection can be divided into three categories by type: filters, wrappers, and embedding methods. Filter methods select features based on their intrinsic properties, i.e. regardless of classifier performance. In the second feature extraction method new features are created by generating new combinations of original features.

[0048] Such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network-oriented intrusion data detection method. The method includes the following steps: firstly reducing the attribute dimension of network traffic data, and then inputting the data into a data detection model; Network traffic data is processed and intrusion data is detected. The invention helps to realize intrusion detection with high efficiency, high precision and low false alarm, and improves detection efficiency.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection and feature dimension reduction, in particular to a network-oriented intrusion data detection method. Background technique [0002] Firewalls, malware prevention, data encryption, and user authentication, which still do not provide complete protection against contemporary cyber attacks, make up a necessary but incomplete set of system tools to protect computers and networks from today's attacks. Intrusion detection systems and other security systems can complement each other. In general, an intrusion detection system is a proactive system that constantly monitors and analyzes network traffic to determine if there are deviations from expected behavior. The first approach to intrusion detection systems is signature-based intrusion detection, which classifies pre-defined attack signatures by analyzing network packets. Therefore, this method cannot identify new attacks. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/14H04L41/142H04L41/147
CPCH04L63/1425H04L63/1416H04L41/145H04L41/142H04L41/147
Inventor 赵然张明明赵俊峰夏飞李萌夏元轶冒佳明
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products