Supercharge Your Innovation With Domain-Expert AI Agents!

Malicious data flow detection method and system for adversarial network

A malicious data and data flow technology, applied in the field of network security, can solve the problems of unbalanced detection model, insufficient malicious data, and the inability of the model to detect malicious data, etc., to achieve the effect of improving the detection ability

Active Publication Date: 2021-03-19
武汉思普崚技术有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Although the existing statistical analysis and machine learning can detect malware, malicious code, malicious behavior, etc., there are still two shortcomings: first, the malicious data in the training process is insufficient, which is far less than normal data, and the lack of data and the lack of The balance will cause the detection model to be unbalanced, resulting in poor detection stability; second, with the development of technology, the means of malicious data of malicious attackers are constantly changing, but they cannot be used for model training in advance, resulting in the model being unable to detect unknown malicious data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious data flow detection method and system for adversarial network
  • Malicious data flow detection method and system for adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0037] figure 1 A flow chart of the malicious data flow detection method of the adversarial network provided by this application, the method includes:

[0038] Obtain historical access data, analyze and extract feature vectors of malicious data in historical access data according to the characteristics of known network malicious data types;

[0039] Among them, before extracting the feature vector of the malicious data in the historical access data, preprocessing is performed to unify the length to the specified length, and each bit of data is normalized to [0,1], and then the sample is converted into a 64*64 two-dimensional vector;

[0040] Ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious data flow detection method and system for an adversarial network, which can analyze and construct a noise simulation network malicious data model based on historicalaccess data. The method comprises the following steps that the noise simulation network malicious data model is trained by using real network malicious data flow, wherein the model has the capabilityof continuously compounding and mutating network malicious data; meanwhile, the weak correlation bit of the network malicious data to the resistance sample is modified, so that the executability andaggressivity of the resistance sample are reserved, and the method is better used for deep learning training; after the noise simulation network malicious data model is trained, the noise simulation network malicious data model is accessed to the machine learning module to serve as a simulation malicious data source of the machine learning module, the machine learning module is trained by malicious data uninterruptedly, and the detection capability of the machine learning module is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and system for detecting malicious data flow in an adversarial network. Background technique [0002] Although the existing statistical analysis and machine learning can detect malware, malicious code, malicious behavior, etc., there are still two shortcomings: first, the malicious data in the training process is insufficient, which is far less than normal data, and the lack of data and the lack of The balance will cause the detection model to be unbalanced, resulting in poor detection stability; second, with the development of technology, the means of malicious data of malicious attackers are constantly changing, but they cannot be used for model training in advance, resulting in the model being unable to detect unknown malicious data. Therefore, there is an urgent need for a method and system that can self-generate usable malicious data, enhance tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62G06N3/08
CPCH04L63/1416H04L63/1425G06N3/08G06F18/214
Inventor 段彬
Owner 武汉思普崚技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More