Malicious data flow detection method and system for adversarial network
A malicious data and data flow technology, applied in the field of network security, can solve the problems of unbalanced detection model, insufficient malicious data, and the inability of the model to detect malicious data, etc., to achieve the effect of improving the detection ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.
[0037] figure 1 A flow chart of the malicious data flow detection method of the adversarial network provided by this application, the method includes:
[0038] Obtain historical access data, analyze and extract feature vectors of malicious data in historical access data according to the characteristics of known network malicious data types;
[0039] Among them, before extracting the feature vector of the malicious data in the historical access data, preprocessing is performed to unify the length to the specified length, and each bit of data is normalized to [0,1], and then the sample is converted into a 64*64 two-dimensional vector;
[0040] Ba...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com