Distributed intrusion detection method based on multilayer extreme learning machine in Internet of Things environment

An extreme learning machine and intrusion detection technology, applied in the field of intrusion detection and deep learning, can solve problems such as inability to process training data

Active Publication Date: 2021-04-13
HANGZHOU DIANZI UNIV +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem in the prior art that the border devices of distributed intrusion detection in the Internet of Things environment cannot handle too large training data, the present invention provides a distributed intrusion detection method based on multi-layer extreme learning machines in the Internet of Things environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed intrusion detection method based on multilayer extreme learning machine in Internet of Things environment
  • Distributed intrusion detection method based on multilayer extreme learning machine in Internet of Things environment
  • Distributed intrusion detection method based on multilayer extreme learning machine in Internet of Things environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present invention will be further described below in conjunction with embodiment, detailed description is as follows:

[0073] The overall structure of the intrusion detection of the present invention is shown in the accompanying drawings figure 1 As shown, the architecture is divided into two parts, the edge device and the cloud server. The border device is preset with a model trained by the cloud server. Its function is to preprocess and classify the original network data. If the classification result is abnormal, the administrator will be notified; the cloud server accepts the network data transmitted by the border device and uses the data to perform Model training, and then distribute the newly trained model to the border devices to update the model. The following is a detailed description of the experimental part, and the experimental flow chart can refer to the attached figure figure 2 .

[0074] Step 1, preprocessing the network traffic data.

[0075] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed intrusion detection method based on a multi-layer extreme learning machine in an Internet of Things environment, and aims to move tasks with heavier calculation for realizing automatic attack detection to boundary equipment due to the characteristic that resources of related equipment are constrained, so as to enable a processing function to be close to a data source. The boundary devices can operate a preset classification model. However, when facing a large amount of training data, there is no sufficient storage and processing capabilities to construct and upgrade such models. In order to solve the problem, training operation with dense calculation and large storage capacity is moved to a cloud server to be carried out, and a single-hidden-layer extreme learning machine model and a multi-hidden-layer extreme learning machine model are constructed and trained in the cloud server, so that boundary equipment executes flow classification based on a deep learning model preset in the cloud server; therefore, whether the traffic is normal traffic or network attack is classified, and experimental analysis shows that the multi-hidden-layer extreme learning machine has better performance.

Description

technical field [0001] The invention belongs to the field of intrusion detection and deep learning, and in particular relates to a distributed intrusion detection method based on a multi-layer extreme learning machine under the Internet of Things environment. Background technique [0002] The rapid development of Internet of Things technology is rapidly bridging the gap between traditional information services and the surrounding physical environment through the connection of increasingly complex sensing devices and Internet-based remote control devices. Many potential IoT application services have emerged, such as environmental monitoring, traffic monitoring, health care monitoring, etc. These applications have greatly improved the interaction between humans and computing devices. The growing Internet of Things applications and physical information services have increasingly high requirements for network security. Intrusion detection under the Internet of Things has become ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L12/24G06N3/04G06N3/08
CPCH04L67/12H04L63/1416H04L41/145G06N3/08G06N3/045
Inventor 付兴兵吴炳金焦利彬索宏泽章坚武唐向宏
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products