A network attack intrusion detection method using full-text indexing
A network attack and intrusion detection technology, which is applied in the field of information security, can solve the problems of insufficient ability to extract potential attack features of abnormal traffic, and achieve the effects of improved detection rate, good data versatility, and high execution efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0049] like figure 1 As shown, the present invention provides a network attack intrusion detection method using full-text indexing, comprising the following steps:
[0050] 1) Establish a simulated network environment E, and generate normal network traffic and known attack abnormal traffic;
[0051] 2) Obtain the literal value of each data packet in normal network traffic and known attack abnormal traffic respectively;
[0052] 3) Construct the generalized suffix array SA and the generalized longest common prefix array LCPA according to the obtained literal value;
[0053] 4) Use the generalized suffix array SA and the generalized longest public prefix array LCPA to search for all the common literal values in the known attack abnormal traffic as potential attack characteristics;
[0054] 5) Use the potential attack feature as a training set to train a two-class judgment model;
[0055] 6) Use the trained two-class judgment model to judge whether the detected traffic is ab...
specific example
[0082] Step S4: Since the length of the substring is the same as the length of the character string, each character string itself is a substring, and the obtained four substrings are: E 0 =abaa, E 1 =abca, E 2 =caab. Divide each substring into 2 segments to get: F 0 =ab,F 1 =aa,F 2 =ab,F 3 =ca,F 4 =ca,F 5 =ab.
[0083] Step S5: From the previous step, a segment set F={ab, aa, ab, ca, ca, ab} is obtained, and then a segment string F'=abHaaHabHcaHcaHabH is constructed according to the segment set F. Among them, the construction results of the generalized suffix array SA and the generalized longest common prefix array LCPA of the segment set F are as follows:
[0084] Generalized Suffix Array and Generalized Longest Common Prefix Array of Table F
[0085]
[0086] Step S601: Set the integer K=3, access the generalized longest common prefix array LCPA from left to right, and obtain an interval LCPA[14, 15] that satisfies the requirements.
[0087] Step S602: For the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


