Message anomaly detection method based on deep learning

An anomaly detection and deep learning technology, which is applied in unstructured text data retrieval, text database clustering/classification, special data processing applications, etc., can solve problems such as low detection efficiency and poor model detection effect, and achieve accuracy Improvement, learning and detection speed, good convergence effect

Inactive Publication Date: 2019-12-27
BEIJING UNIV OF TECH
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology uses advanced techniques such as Deep Learning (DL) or Support Vector Machine(SVM). These methods can efficiently learn complex patterns from massive amounts of data without being affected by any factors like noise levels or spikes during training time. They also have excellent performance even at very fast speeds compared to traditional algorithms due to their ability to handle both regular and irregular signals simultaneously.

Problems solved by technology

Technological Problem addressed in this patents relates to improving the accuracy and efficiency of identifying novel cyberattacks by analyzing messages that contain different characteristics or patterns associated with them.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message anomaly detection method based on deep learning
  • Message anomaly detection method based on deep learning
  • Message anomaly detection method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings. figure 1 It is an overall architecture diagram of the method involved in the present invention.

[0017] Step 1, dataset preprocessing

[0018] The network traffic data of the well-known Kyoto University honeypot system is used in the implementation process of the present invention. It contains 24 statistical features, (1) 14 features from the KDD CUP data set in 1999; and (2) 10 additional features, on this basis in order to adapt to the algorithm model CNN-SVM of the present invention, the data set is processed as follows:

[0019] 1) Data processing. In order to make experimental comparison with the existing model and adapt to the algorithm model of this paper, this paper supplements the features on the basis of the original data set, but does not affect the original data set. The data is processed into a 5*5 two-dimensional matrix;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message anomaly detection method based on deep learning. According to the method, firstly, data is preprocessed into a two-dimensional matrix form, and in order to reduce anoverfitting phenomenon easily occurring in a general algorithm model, a shuffle function is used for randomly disturbing the data to prevent local optimum, so that the model is easier to converge; then effective features are learned from the preprocessed data by using a convolutional neural network (CNN), and finally classification processing is performed on the obtained vectors through a supportvector machine (SVM) classifier. According to the method, the advantage of high-dimensional learning of the convolutional neural network of deep learning is utilized to learn the effective features ofthe network transmission message; the model provided by the invention is subjected to experimental verification on a Beijing University data set and is subjected to experimental comparison with othertwo models with better effects verified on the data set, experiments prove that the accuracy and the stability are greatly improved, and the training and testing time consumption is obviously reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products