Supercharge Your Innovation With Domain-Expert AI Agents!

Intrusion detection method based on partial deep learning theory

A technology of deep learning and intrusion detection, applied in neural learning methods, computer systems based on knowledge-based models, branch and bound, etc., can solve problems such as poor real-time model performance and no specific evaluation of model prediction time

Inactive Publication Date: 2020-12-11
TIANJIN UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Liu Jinghao [3] proposed an intrusion detection model ICA-DNN based on independent component analysis ICA and deep neural network DNN. The combination of intrusion detection and deep learning methods endows the model with better feature learning ability and more accurate classification ability, but The prediction time of the model has not been specifically evaluated, and the real-time performance of the model is poor
[0003] Considering the incompatibility between detection accuracy and detection speed in the above method, the present invention proposes an intrusion detection method combining multiple deep learning theories, which can achieve a relatively high detection rate and have faster detection Speed, effectively solving the real-time problem of intrusion detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method based on partial deep learning theory
  • Intrusion detection method based on partial deep learning theory
  • Intrusion detection method based on partial deep learning theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the technical solution of the present invention clearer, the present invention will be further elaborated below in conjunction with the accompanying drawings.

[0021] The invention provides an intrusion detection method for detecting network data by using part of deep learning theory. The specific implementation steps are as follows:

[0022] The first step is to prepare the dataset:

[0023] (1) Prepare the data required for training and testing. The data set used in the present invention is an NSL-KDD data set used for intrusion detection without preprocessing. The data set has a total of 125,937 pieces of data in the training set and 22,544 pieces of data in the test set. There are 41 types of features, which are divided into four major feature categories: basic features of TCP connections, operating features on hosts, time-based network traffic statistics features, and host-based network traffic statistics features. Firstly, it is calibrated as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intrusion detection method for detecting network data by using a partial deep learning theory. The intrusion detection method comprises the following steps: preparing a data set: selecting a preprocessed training data set and a preprocessed test data set; establishing a CNN and training the CNN, and training the CNN by using the preprocessed training data set; establishing a decision tree DT, and training the DT by using the preprocessed training data set in the first step so as to realize the first binary classification of the test data; performing PCA dimension reduction processing: introducing PCA to perform dimension reduction processing on test data of which the result is normal data after DT classification; and carrying out secondary dichotomy on the testdata of the normal data subjected to PCA dimension reduction processing by utilizing the trained DNN.

Description

technical field [0001] The invention belongs to the field of deep learning and network security, in particular to an intrusion detection method for detecting network data by using part of deep learning theory. Background technique [0002] With the continuous progress of the times, the interconnected network has made people's lives more convenient, and all that is needed for shopping and travel is a mobile phone that can be connected to the Internet. The price of this convenience is that almost everyone’s identity information, social relationship, and personal property are firmly bound to the network. When using the network as a bridge for social interaction, one of the issues that needs to be considered is the "bridge" The stability of the network, that is, the security of the network. Communication systems and network entrances are always facing network attacks from the outside or even within the system, and unlike the single attack in the immature period of the network, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06N3/04G06N3/08G06N5/00
CPCG06N3/084G06N5/01G06N3/045G06F18/2135G06F18/24
Inventor 武晓栋刘敬浩
Owner TIANJIN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More