Host Intrusion Detection Method Based on Relational Network

A relational network and intrusion detection technology, applied in the field of cyberspace security, can solve problems such as low detection rate, high false alarm rate, and unrecognizable models

Active Publication Date: 2021-04-27
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Due to the high cost of labeling samples, for the model trained with a small number of samples, the detection rate is low and the false positive rate is high;
[0004] 2. For new intrusion viruses and intrusion behaviors, the original model cannot recognize them, and the model needs to be retrained
But FSL is currently only applied in the field of image and natural language processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host Intrusion Detection Method Based on Relational Network
  • Host Intrusion Detection Method Based on Relational Network
  • Host Intrusion Detection Method Based on Relational Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a host intrusion detection method based on a relational network, comprising: step 1, characterizing the host system call sequence sample set; step 2, dividing the data set processed in step 1 into training sets, supporting Set and test set; Divide the training set into sample set and query set again; Step 3, construct relational network model; Described relational network model includes embedding module, connection module and relational module; Step 4, define the target of relational network model Function; step 5, train the constructed relational network model to obtain the host intrusion detection model; step 6, input the trained host intrusion detection model into the host intrusion detection model after step 1 to detect the host system call sequence to be detected. The invention proposes a host intrusion detection method based on a relational network, which can realize host intrusion detection of existing intrusion modes and host intrusion detection of unknown intrusion modes under the condition of small samples.

Description

technical field [0001] The invention relates to the field of network space security, in particular to a host intrusion detection method based on a relational network. Background technique [0002] With the rapid development of the Internet, while bringing convenience to people's lives, it also makes the cyberspace security environment increasingly complex. Many hackers use the host as the attack target to carry out large-scale intrusions, and with the diversification, complexity, intelligence, and concealment of intrusion viruses and intrusion behaviors, the host intrusion detection faces great challenges. In order to deal with the above problems, the deep neural network method is widely used for host intrusion detection. Deep neural networks have achieved good results in supervised recognition tasks, but deep neural networks require sufficient and fully labeled data for each class. At the same time, in the face of new intrusion viruses and intrusion behaviors, deep neural ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/55G06N3/04G06N3/08
CPCH04L63/1416G06F21/552G06N3/08G06N3/048G06N3/045
Inventor 周世杰杨晓庆刘启和程红蓉
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products