Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data intrusion detection method, system, terminal and storage medium

A network data and intrusion detection technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as the reduction of classification accuracy and the inapplicability of feature subsets, and achieve the effect of reducing overfitting, reliable design principle, and simple structure.

Active Publication Date: 2022-06-17
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the feature subset obtained in this way is prone to overfitting. Once the sample set changes, the feature subset will not be applicable to the new sample set. Using the original feature subset for classification will lead to a decrease in classification accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data intrusion detection method, system, terminal and storage medium
  • Network data intrusion detection method, system, terminal and storage medium
  • Network data intrusion detection method, system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0059] figure 1 is a schematic flow chart of a method according to an embodiment of the present invention. in, figure 1 The execution subject may be a network data intrusion detection system.

[0060] like figure 1 As shown, the method 100 includes:

[0061] Step 110, collecting network transmission data as sample data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network data intrusion detection method, system, terminal and storage medium, comprising: collecting network transmission data as sample data and dividing the sample data into multiple groups, the network transmission data including normal data and intrusion data; Use the FCBF algorithm to remove redundant features that are not related to the preset target category in each group, and use the data group that removes redundant features as a kinship set; perform single-point genetic crossover processing on the kinship set, from the kinship set and the genetic Screen out the initial set with the highest correlation with the target category from the subset set; use the genetic variation algorithm to calculate the variation set of the initial set, and compare the correlation between the initial set and the target category and the correlation between the variation set and the target category , iteratively filtering out the data set with the highest correlation with the target category; using the data set with the highest correlation with the target category as a feature subset, and performing feature extraction and feature detection on the network transmission data according to the feature subset.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection, in particular to a network data intrusion detection method, system, terminal and storage medium. Background technique [0002] With the rapid development of big data and cloud computing, network intrusion methods have the characteristics of concealment and silence, and people's demand for network security is increasing day by day. However, with the increase of the amount of data, the mainstream network intrusion models are becoming more and more inefficient in intrusion identification. Because these data are not only large in scale, but also high in dimension, there is a lot of redundant information, and these irrelevant information will greatly reduce the effect of intrusion detection. Feature selection is an effective method to solve this problem. A good feature selection algorithm can effectively eliminate redundant features or noise data in classified data, and improve th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 闫利华
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products