Network threat detection system based on auto-encoder integration

An autoencoder and threat detection technology, which is applied in the field of network threat detection based on autoencoder integration, can solve the problems of unsatisfactory detection effects of unknown threats, achieve the effect of enhancing generalization performance, simple implementation method, and flexible means

Active Publication Date: 2021-03-02
ZHEJIANG UNIV +1
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most traditional network threat detection methods are based on signatures. This type of algorithm has a good detection effect on known threats, but the detection effect on unknown threats is often unsatisfactory.
However, the update speed of network threats is extremely fast, how to quickly discover new network threats is the problem that network threat detection systems are now facing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network threat detection system based on auto-encoder integration
  • Network threat detection system based on auto-encoder integration
  • Network threat detection system based on auto-encoder integration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below according to the accompanying drawings.

[0035] like figure 1 As shown, the present invention is based on a network threat detection system integrated with an autoencoder, including a network data acquisition module, a feature extraction module, a feature clustering module, and a threat detection module; when the system detects, it specifically includes the following steps:

[0036] Step 1: The network traffic data is saved in the form of a PCAP file through the network data acquisition module.

[0037] Step 2: The feature extraction module performs feature extraction on each session in the original network traffic data, and performs data cleaning and normalization processing; specifically, use the feature extraction module to convert each session in the original network traffic data into five-element Groups are indexed in feature vector form containing 51 features. Wherein, the five-tuple includes source IP ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network threat detection system based on auto-encoder integration, and the system comprises: a network data obtaining module which is used for obtaining a network flow data feature extraction module from the Internet or a local file, and is used for extracting a flow feature to generate a feature vector; a feature clustering module which is used for grouping the featuresaccording to the correlation; a threat detection module which is used for detecting traffic abnormality by using an integrated model based on an auto-encoder; and a threat judgment module which is used for judging the network threat. According to the system, an unsupervised deep learning algorithm is used, network threat detection is carried out by improving an existing auto-encoder algorithm, detection of unknown threats is achieved, the time complexity of neural network algorithms such as an auto-encoder is reduced while the detection accuracy of the model and the real-time performance of the model are improved, and the system is simple in implementation method and flexible in means and high in practicability, can effectively detect network threats, and is irrelevant to specific hardware.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a network threat detection method based on autoencoder integration. Background technique [0002] The rapid development of the Internet has brought convenience to people's lives and brought opportunities for the development of enterprises, but at the same time the Internet has also brought new threats to modern society. Network threats at various levels emerge in an endless stream, such as viruses, Trojan horses, and DDoS attacks, which seriously threaten the security and interests of individuals and enterprises. It is an important research topic in the field of network security to discover and successfully prevent the losses caused by network threats in time. [0003] Traditional network threat detection methods are mostly based on signatures. This type of algorithm has a good detection effect on known threats, but the detection effect on unknown threats is of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/04G06N3/08G06F17/18
CPCG06F21/566G06N3/084G06F17/18G06N3/045G06F18/231
Inventor 林峰张斌赵子鸣张帆任奎赵俊单夏烨任新新段吉瑞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products