Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed network malicious attack detection system and method based on convolutional neural network

A distributed network and neural network technology, applied in the field of malicious attack nodes, can solve the problems of complex attack detection and location threshold setting, low detection and location accuracy, and rapid decline in accuracy

Inactive Publication Date: 2020-05-19
SHENZHEN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main disadvantages of traditional methods: (1) Traditional statistical methods have large limitations for nonlinear classification problems, and cannot extract important features hidden in data; (2) The design and demonstration process of detection and localization functions are more complicated and difficult. It is difficult to design a detection and location classifier that meets the needs of the scenario; (3) In the internal attack scenario, the accuracy of detection and location is low, and with the increase of cooperative malicious nodes, the accuracy of detection and location drops more (4) The robustness of traditional statistical methods is poor, and the threshold setting for attack detection and location is relatively complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed network malicious attack detection system and method based on convolutional neural network
  • Distributed network malicious attack detection system and method based on convolutional neural network
  • Distributed network malicious attack detection system and method based on convolutional neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of the present invention. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention.

[0060] A distributed network internal malicious attack detection system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for detecting and positioning malicious attack nodes in a distributed network based on a convolutional neural network. The invention specially discloses a distributednetwork internal malicious attack detection and positioning system based on a deep convolutional neural network (DCNN). According to the system, based on a distributed Gossip consensus protocol, a distributed detection and positioning task under a malicious attack of the protocol is set, and an internal attack detection and malicious node positioning decision-making device based on the DCNN is established. According to the detection and positioning method provided by the invention, the characteristics of each node in the distributed communication network can be fully mined, the fitting of a complex nonlinear function is completed, and the accuracy of internal data injection attack detection and malicious node positioning is greatly improved.

Description

technical field [0001] The invention relates to a method for detecting and locating malicious attack nodes in a distributed network based on a convolutional neural network. Background technique [0002] In distributed communication networks, distributed consensus algorithms are very suitable for decentralized multi-task collaborative optimization problems. The algorithm has good robustness and fault tolerance in interactive computing, especially has the ability to accommodate node failures, and can complete collaborative optimization tasks in the case of a small number of node failures and slight noise. However, with the information explosion in the era of big data and the increase in network complexity, consensus-based distributed computing platforms are vulnerable to data injection attacks from internal nodes in the communication network. [0003] The status update behavior of a distributed network is defined as: each node only exchanges data status with its own neighbor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1416G06N3/08G06N3/045
Inventor 吴晓晓李刚强
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products