Training method and device for anomaly detection model based on differential privacy

An anomaly detection and differential privacy technology, applied in the computer field, can solve the problems of leaking training samples, insufficient generalization ability, insufficient robustness, etc., and achieve the effect of improving robustness and predictive performance

Pending Publication Date: 2020-08-14
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing unsupervised anomaly detection models often have the risk of leaking training samples,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Training method and device for anomaly detection model based on differential privacy
  • Training method and device for anomaly detection model based on differential privacy
  • Training method and device for anomaly detection model based on differential privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0051] figure 1 A schematic diagram of the architecture of the anomaly detection model according to the technical conception of this specification is shown. Such as figure 1 As shown, the anomaly detection model generally includes an autoencoder network 100 and an evaluation network 200 , and the autoencoder network 100 includes an encoder 110 and a decoder 120 . The encoder 110 is used to encode the high-dimensional feature vector x of the input service sample into a low-dimensional vector z c , the decoder 120 is based on the low-dimensional vector z c , output the decoded vector x' for restoring the high-dimensional feature vector x. The trained self-encoder network, the low-dimensional vector z obtained by the encoder c It can well characterize the core features of the original high-dimensional feature vector x and play a role in vector dimensio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a training method for an anomaly detection model based on differential privacy. The method comprises the following steps: inputting a first vector of any sample in a training set into an auto-encoding network, outputting a dimension-reduced second vector through an encoder, and outputting a restored third vector through a decoder. Then, constructing an evaluation vector based on the second vector, inputting the evaluation vector into an evaluation network, and obtaining the sub-distribution probability that the sample output by the evaluation network belongs to K sub-Gaussian distributions in the Gaussian mixture distribution; then, according to the evaluation vector and the sub-distribution probability corresponding to each sample in the training set, obtaining a first probability of any sample in Gaussian mixture distribution; and determining the prediction loss which is negatively correlated with the first probability corresponding to each sample and is negatively correlated with the similarity between the first vector and the third vector. Furthermore, noise is added to an original gradient obtained on the basis of prediction loss in a differential privacy mode, and model parameters of the anomaly detection model are adjusted by using a gradient containing the noise.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a method and device for training an anomaly detection model based on differential privacy executed by a computer. Background technique [0002] With the development of computer technology, security has become a growing concern, such as computer data security, electronic payment transaction security, network access security, and so on. Therefore, in many scenarios, it is necessary to find abnormal samples that may affect security from a large number of samples, and take measures against these abnormal samples. [0003] For example, it is hoped to discover abnormal transaction operations from a large number of transaction operation samples, so as to prevent fraudulent transactions in advance; it is hoped to detect abnormal access from network access samples, so as to discover unsafe access, such as hacker attacks; it is hoped that users who per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/02G06K9/62
CPCG06Q30/0225G06F18/2415G06F18/214
Inventor 熊涛
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products