Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data intrusion detection method and system, terminal and storage medium

A network data and intrusion detection technology, applied in the field of systems, terminals and storage media, and network data intrusion detection methods, can solve the problems of inapplicable feature subsets and reduced classification accuracy, so as to achieve reliable design principles and reduce overfitting , the effect of a wide range of application prospects

Active Publication Date: 2020-06-16
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the feature subset obtained in this way is prone to overfitting. Once the sample set changes, the feature subset will not be applicable to the new sample set. Using the original feature subset for classification will lead to a decrease in classification accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data intrusion detection method and system, terminal and storage medium
  • Network data intrusion detection method and system, terminal and storage medium
  • Network data intrusion detection method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0059] figure 1 is a schematic flowchart of a method in one embodiment of the present invention. in, figure 1 The execution subject may be a network data intrusion detection system.

[0060] Such as figure 1 As shown, the method 100 includes:

[0061] Step 110, collecting network transmission data as sample data and dividing the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network data intrusion detection method and system, a terminal and a storage medium, and the method comprises the steps: collecting network transmission data as sample data, dividing the sample data into a plurality of groups, wherein the network transmission data comprise normal data and intrusion data; removing redundant features, irrelevant to the preset target category, in each group through an FCBF algorithm, and the data groups with the redundant features removed serving as parental line sets; carrying out single-point genetic cross processing on the parental line set, and screening out an initial set with the highest relevancy with the target category from the parental line set and the genetic sub-line set; calculating a variation set of the initial set by utilizing a genetic variation algorithm, and iteratively screening out a data set with the highest relevancy with the target category by comparing the relevancy between the initial set and the target category and the relevancy between the variation set and the target category; and taking the data set with the highest relevancy with the target category as a feature subset, and performing feature extraction and feature detection on the network transmission data according to the feature subset.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection, in particular to a network data intrusion detection method, system, terminal and storage medium. Background technique [0002] With the rapid development of big data and cloud computing, network intrusion methods are characterized by concealment and silence, and people's demand for network security is increasing. However, with the increase of data volume, the efficiency of mainstream network intrusion models for intrusion identification is getting lower and lower. Because these data are not only large in scale, but also high in dimension, there is a lot of redundant information, and these irrelevant information will greatly reduce the effect of intrusion detection. Feature selection is an effective means to solve this problem. A good feature selection algorithm can effectively eliminate redundant features or noise data in the classification data, and improve the speed and acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 闫利华
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products