Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network anomaly detection method, system, terminal and storage medium

A network anomaly and detection method technology, applied in the field of network security, can solve problems such as not being able to reflect the implicit relationship within the data well, and achieve the effect of good internal implicit relationship and good classification effect

Active Publication Date: 2022-02-22
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the research work is based on artificially set traffic feature data sets, which obviously cannot determine the upper limit of the classifier if the feature design is good or bad.
There are also some works that try to use raw data modeling, but the traffic embedding method used is mostly byte-level one-hot encoding, which has certain defects and cannot well reflect the internal implicit relationship of the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network anomaly detection method, system, terminal and storage medium
  • A network anomaly detection method, system, terminal and storage medium
  • A network anomaly detection method, system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0063] In order to solve the deficiencies of the prior art, the embodiment of the present application uses the n-gram model to establish a combination table of network traffic, and learns a vector representation in a low-dimensional space for each combination, and each network data packet is processed through the n-gram model After splitting and vector conversion, it is sent to a deep neural network to learn the vector space representation of network traffic and extract spatiotemporal features. At the same time, in order to complement the hidden features that may not be learned by the neur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a network anomaly detection method, system, terminal and storage medium. Including: using the n-gram model to perform vector conversion on the network traffic to obtain the vector matrix of the network traffic; using a long-short-term memory network and a bidirectional gating cycle unit to extract the spatio-temporal features of the vector matrix of the network traffic to obtain the The hidden state of the network traffic; the artificial feature of the network traffic is extracted by the artificial feature extractor, and the spatio-temporal feature is extracted to the artificial feature to obtain the hidden state of the artificial feature; the hidden state of the network traffic is combined with the After splicing the hidden states of the artificial features, input the deep neural network to classify and predict the network traffic, and determine whether the network traffic is abnormal according to the prediction results. This application uses the fused features to model the model, which can better represent the network traffic, increase the upper limit of the prediction effect of the model, and achieve a better classification effect.

Description

technical field [0001] The present application belongs to the technical field of network security, and in particular relates to a network anomaly detection method, system, terminal and storage medium. Background technique [0002] According to the 45th Statistical Report on Internet Development in China by China Internet Network Information Center (CNNIC), as of March 2020, the number of Internet users in my country has exceeded 900 million, and the Internet penetration rate has reached 64.5%. However, with the vigorous development of network technology, network security incidents also emerge in endlessly. According to the report of Sangfor Technology, malware was very active in 2019, and malicious behaviors such as virus infection, ransomware, and network attacks emerged in an endless stream. The current network security threats are very serious. If these abnormal network traffic can be found in the early stage of network intrusion and intercepted, it can effectively reduc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1425H04L63/1416
Inventor 叶可江林鹏须成忠
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products