Network security detection method and device, computer equipment and storage medium

A detection method and security technology, applied in neural learning methods, biological neural network models, electrical components, etc., can solve the problem of low search efficiency, low search attack image efficiency, and the inability to effectively detect loopholes in target application network attacks, etc. question

Active Publication Date: 2020-10-23
PINGAN INT SMART CITY TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Black-box-based attack techniques in the prior art include migration-based technology and score-based technology. In this regard, the inventors found that migration-based technology uses a pre-trained source network with known model parameters to generate an attack Image, as the attack image of the target application network, but the effectiveness of generating the attack image in this way is low, so the accuracy of the reliability detection of the target application network is also low, and it is impossible to effectively detect the possible attacks on the target application network Vulnerabilities of the target application network; the score-based technique approximates the gradient of the target application network by sampling the input vector of the target application network and obtaining the output score value of the target application network, and then searches for attack images based on these gradient values. For this method, when the target When the dimension of the input vector of the application network is high, the output score value of the target application network needs to be queried multiple times, and the efficiency of searching for attack images is low, so the detection of the target application network cannot be efficiently completed
[0005] Therefore, when using the existing black-box-based attack technology to generate detection target application network security, there are problems of low detection accuracy or low search efficiency, which has become a technical problem that needs to be solved urgently in this field.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security detection method and device, computer equipment and storage medium
  • Network security detection method and device, computer equipment and storage medium
  • Network security detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Embodiment 1 of the present invention provides a detection method for network security, the method is aimed at a target network that performs computer vision tasks, and the target network can perform computer vision tasks such as image classification, image recognition, image segmentation, or image generation. When enhancing the ability of the target network to defend against attacks, the method is used to detect the security of the target network, and then based on the detection results to enhance the ability of the target network to defend against attacks. Through this method, the detection of the target network security can be improved accuracy and efficiency. specifically, figure 1 It is a flow chart of the detection method for network security provided by Embodiment 1 of the present invention, such as figure 1 As shown, the detection method of the network security includes the following steps S101 to S108:

[0040] Step S101: Obtain the training set of the target...

Embodiment 2

[0086] Corresponding to Embodiment 1 above, Embodiment 2 of the present invention provides a device for detecting network security. For corresponding technical features and corresponding technical effects, reference may be made to Embodiment 1 above, which will not be repeated here. image 3 A block diagram of a detection device for network security provided in Embodiment 2 of the present invention, such as image 3 As shown, the device includes: an acquisition module 201 , a first determination module 202 , a second determination module 203 , a first processing module 204 , a first calculation module 205 , a training module 206 , a second calculation module 207 and a detection module 208 .

[0087] Wherein, the obtaining module 201 is used to obtain the training set of the target network, wherein the training set corresponds to a plurality of images, the training set includes a target input vector and a target output vector, and the target input vector includes a feature vecto...

Embodiment 3

[0105] Embodiment 3 also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server, or a cabinet server (including an independent server, Or a server cluster composed of multiple servers), etc. like image 3 As shown, the computer device 01 in this embodiment at least includes but is not limited to: a memory 011 and a processor 012 that can communicate with each other through a system bus, such as image 3 shown. It should be pointed out that, image 3 Only the computer device 01 is shown with components memory 011 and processor 012, but it should be understood that implementing all of the illustrated components is not a requirement and that more or fewer components may instead be implemented.

[0106]In this embodiment, the memory 011 (that is, the readable storage medium) includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to artificial intelligence, and provides a network security detection method and device, computer equipment and a storage medium. The method comprises the steps of obtaining a training set of a target network; determining an attack vector confronting a preset source network on the training set; determining a disturbance vector corresponding to the attack vector; constructinga generative network; training the generation network; taking an output vector of an encoder in the trained generative network as an embedded vector, and calculating the attack vector of the target network in a space where the embedded vector is located to obtain a third attack vector; and inputting the attack vector of the target network into the target network so as to detect the target network.In addition, the invention also relates to a blockchain technology, and the attack vector of the target network can be stored in the blockchain node. According to the invention, the detection accuracy and the search efficiency in the attack technology based on the black box can be improved.

Description

technical field [0001] The present invention relates to the technical fields of blockchain and artificial intelligence, in particular to a network security detection method, device, computer equipment and storage medium. Background technique [0002] The rapid development of deep neural network technology has made it widely used in various fields of artificial intelligence. However, existing research and practice have proved that deep neural networks are vulnerable to adversarial attacks. For the deep neural network model involved in computer vision tasks, small changes to image pixel values ​​that are not easy to be noticed will lead to wrong judgments in computer vision tasks such as image classification and target detection, which brings great challenges to computer vision tasks. big security risk. [0003] In order to reduce and eliminate these potential safety hazards, when defending against adversarial attacks, the attack image of the target application network is fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1416G06N3/08G06N3/045
Inventor 刘彦宏
Owner PINGAN INT SMART CITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products