Network attack data automatic generation method and system based on attack principle

A network attack and automatic generation technology, applied in the field of network security, can solve the problems of shortage of available data and insufficient completeness, and achieve the effect of solving the shortage of available data, ensuring easy verification, and ensuring validity

Pending Publication Date: 2021-01-22
GUANGZHOU UNIVERSITY
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and system for automatically generating network attack data based on attack principles. The method can customize and generate a large amount of realistic network attack data with controllable and adjustable completeness according to the needs of AI model users. These data are used to meet The AI ​​model needs the quality and quantity of training and testing data; finally, the real and available attack data is used as the verification data of the trained model, so as to solve the shortage of available data and insufficient completeness in the current AI model training process. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack data automatic generation method and system based on attack principle
  • Network attack data automatic generation method and system based on attack principle
  • Network attack data automatic generation method and system based on attack principle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] It should be understood that the step numbers used herein are only for convenience of description, and are not intended to limit the execution order of the steps.

[0044] It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to limit the present invention. As used in this specification and the appended claims, the singular forms "a", "an"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack data automatic generation method and system based on an attack principle, and the method comprises the steps: building an attack principle model according to the public information of a network attack, wherein the network attack public information comprises network attack analysis code data and a network attack public report; establishing a data generation system based on an attack principle according to the attack principle model; and training a network security defense model through the data generated by the data generation system based on the attack principle. According to the invention, vivid and effective target data can be generated in a large-batch and customized mode through editing of the configuration file, the data requirements of the network security defense AI model in the training and testing stages can be met, and according to the generation system designed and achieved through the method, a network security defense AI model user can edit the configuration file simply, and therefore, a large amount of target attack data can be generated in a customized manner for model training and testing.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for automatically generating network attack data based on attack principles. Background technique [0002] In recent years, the rapid development of artificial intelligence technology has been widely used in various fields. Similarly, artificial intelligence technology can help network security defense, which can effectively enhance the defense's potential. At present, there are already some network security products that apply artificial intelligence technology, and their security defense capabilities and industry competitiveness have been significantly improved. As we all know, traditional artificial intelligence models (AI models) such as machine learning, neural network, and deep learning not only require relevant theoretical foundations, but also cannot do without the support of data sets. It is worth noting that the prerequisite for the AI ​​m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N20/00
CPCH04L63/1416H04L63/12G06N20/00
Inventor 冯林崔翔田志宏孙彦斌谭庆丰
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products