Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious traffic detection method integrating deep neural network and hierarchical attention mechanism

A technology of deep neural network and malicious traffic, applied in the field of malicious traffic detection that integrates deep neural network and hierarchical attention mechanism

Active Publication Date: 2020-09-15
芽米科技(广州)有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But because the machine learning algorithm can only be used as a classifier, it has many limitations, and when the intrusion becomes more and more complex and diverse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious traffic detection method integrating deep neural network and hierarchical attention mechanism
  • Malicious traffic detection method integrating deep neural network and hierarchical attention mechanism
  • Malicious traffic detection method integrating deep neural network and hierarchical attention mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0115] The present invention proposes a hierarchical attention model (HAGRU) for malicious flow detection, and the model is based on the current effective and reliable deep cycle neural network. Compared with the previously proposed neural network for malicious traffic detection, the hierarchical attention model has higher detection accuracy, lower false positive rate and relatively better real-time performance. The schematic diagram of the hierarchical attention model proposed by malicious traffic detection is as follows: figure 1 show...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious traffic detection method integrating a deep neural network and a hierarchical attention mechanism, which comprises the following steps: S1, acquiring original traffic data, and storing the acquired original traffic data as traffic data in a recognizable file format; S2, performing feature conversion on the traffic data stored in the step S1; S3, performing data packet segmentation on the traffic data converted in the step S2 to obtain data packet segments; S4, capturing feature information between the data packet segments through a time sequence processing feature vector; S5, performing allocation to obtain an attention vector; S6, performing feature fusion on the traffic data; S7, performing linear transformation on the features fused in the step S6; andS8, classifying the traffic data. According to the invention, malicious traffic can be detected, and the performance is enhanced.

Description

technical field [0001] The invention relates to the technical field of malicious traffic detection, in particular to a malicious traffic detection method that integrates a deep neural network and a hierarchical attention mechanism. Background technique [0002] With the continuous development of computer network, it is constantly changing the way of people's life, study and work, but it is facing various security threats, and this threat is becoming more and more serious. This led to network security, which includes policies and practices for preventing and monitoring computer networks and the resources that can be accessed through the network for unauthorized access, misuse, modification or denial. Network security mainly includes the confidentiality, integrity and availability (Confidentiality Integrity Availability, CIA) of its bearer information. Any kind of activity that attempts to undermine the CIA or bypass established network security mechanisms can be considered a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62G06N3/04G06N3/08
CPCH04L63/1416H04L63/1425G06N3/084G06N3/045G06F18/2415G06F18/253
Inventor 刘小洋刘加苗丁楠
Owner 芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products