Network traffic abnormal behavior identification method based on autocoder

An auto-encoder, network traffic technology, applied in probabilistic networks, character and pattern recognition, based on specific mathematical patterns, etc., can solve problems such as poor detection performance, class imbalance, high-dimensional data processing, etc.

Active Publication Date: 2020-08-18
INST OF INFORMATION ENG CAS
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these deep learning methods for intrusion detection still have some problems
[0005] For example, due to the problem of class imbalance, many studies have not considered the overall distribution of traffic data, the decision function is biased towards the majority of samples, and low-frequency attack samples are regarded as noise and ignored, making it difficult for the model to capture effective features and detect low-frequency attacks. attack
On the other hand, some studies did not process high-dimensional data when converting symbolic data to numerical data, resulting in low training efficiency, consuming storage space, and poor detection performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic abnormal behavior identification method based on autocoder
  • Network traffic abnormal behavior identification method based on autocoder
  • Network traffic abnormal behavior identification method based on autocoder

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings . It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0031] This embodiment provides an effective method for identifying abnormal behaviors of network traffic. The general idea of ​​this method is to preprocess the network traffic data first, including symbolic data numericalization and numerical data normalization, and then use the comprehensive minority oversampling method to change the distribution of network traffic data, combined with the autoencoder method To build a model to be able to detect a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network traffic abnormal behavior identification method based on an autocoder. The invention belongs to the crossing technical field of machine learning and information security combination. The category distribution of normal traffic data and abnormal traffic data in traffic data is balanced by using a comprehensive minority oversampling method, and an autocoder is combined, so that nonlinear structure information can be effectively extracted from mass data, and abnormal behaviors in network traffic can be identified.

Description

technical field [0001] The invention proposes an effective method for identifying abnormal behaviors of network traffic. The method combines the comprehensive minority oversampling method and the autoencoder classification algorithm, and belongs to the cross-technical field of combining machine learning and information security. Background technique [0002] With the rapid development of the information age, the Internet has become an indispensable part of people's lives. However, the frequency and scale of attacks in the network are also increasing. These attacks will not only cause huge economic losses, but also pose a serious threat to social stability and national security. Maintaining the security of cyberspace has become an urgent problem to be solved. The problem. In order to better maintain cyberspace security, ensure the availability of various network resources, and prevent various attacks, intrusion detection technology as an active defense method has become a h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62G06N7/00G06N20/00
CPCH04L63/1416G06N20/00G06N7/01G06F18/24323
Inventor 蹇诗婕姜波卢志刚刘玉岭杜丹刘宝旭
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products