Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network anomaly detection method and system, terminal and storage medium

A network anomaly and detection method technology, applied in the field of network security, can solve the problem of not being able to reflect the internal implicit relationship of data well, and achieve the effect of improving the internal implicit relationship, increasing the upper limit, and improving the classification effect.

Active Publication Date: 2020-11-03
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the research work is based on artificially set traffic feature data sets, which obviously cannot determine the upper limit of the classifier if the feature design is good or bad.
There are also some works that try to use raw data modeling, but the traffic embedding method used is mostly byte-level one-hot encoding, which has certain defects and cannot well reflect the internal implicit relationship of the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network anomaly detection method and system, terminal and storage medium
  • Network anomaly detection method and system, terminal and storage medium
  • Network anomaly detection method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0063] In order to solve the deficiencies of the prior art, the embodiment of the present application uses the n-gram model to establish a combination table of network traffic, and learns a vector representation in a low-dimensional space for each combination, and each network data packet is processed through the n-gram model After splitting and vector conversion, it is sent to a deep neural network to learn the vector space representation of network traffic and extract spatiotemporal features. At the same time, in order to complement the hidden features that may not be learned by the neur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network anomaly detection method and system, a terminal and a storage medium. The method comprises the following steps: carrying out vector conversion on network traffic byadopting an ngram model to obtain a vector matrix of the network traffic; performing spatial-temporal feature extraction on the vector matrix of the network traffic by adopting a long-short-term memory network and a bidirectional gating cycle unit to obtain an implicit state of the network traffic; extracting an artificial feature of the network traffic through an artificial feature extractor, andperforming spatial-temporal feature extraction on the artificial feature to obtain an implicit state of the artificial feature; and splicing the hidden state of the network flow and the hidden stateof the artificial feature, inputting the spliced state into a deep neural network to perform classification prediction on the network flow, and judging whether the network flow is abnormal according to a prediction result. Modeling of the model is performed by using the fused features so that the network flow can be better expressed, the upper limit of the model prediction effect can be increasedand the better classification effect can be achieved.

Description

technical field [0001] The present application belongs to the technical field of network security, and in particular relates to a network anomaly detection method, system, terminal and storage medium. Background technique [0002] According to the 45th Statistical Report on Internet Development in China by China Internet Network Information Center (CNNIC), as of March 2020, the number of Internet users in my country has exceeded 900 million, and the Internet penetration rate has reached 64.5%. However, with the vigorous development of network technology, network security incidents also emerge in endlessly. According to the report of Sangfor Technology, malware was very active in 2019, and malicious behaviors such as virus infection, ransomware, and network attacks emerged in an endless stream. The current network security threats are very serious. If these abnormal network traffic can be found in the early stage of network intrusion and intercepted, it can effectively reduc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416
Inventor 叶可江林鹏须成忠
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products