Network abnormal flow detection method, model and system

A traffic detection and network anomaly technology, applied in the Internet field, can solve the problems of increasing the amount of network parameters and training time, low detection accuracy, and poor detection performance.

Active Publication Date: 2021-05-11
BEIJING SWJTU RICHSUN TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, ordinary cyclic neural networks will become unstable due to the problems of vanishing gradient (Vanishing Gradient) and gradient explosion (Exploding Gradient), so researchers propose a long short-term memory unit (Long Short Term Memory, LSTM) neural network to improve the above question
Although LSTM is indeed effective, its complicated threshold leads to unsatisfactory detection results, and the detection performance becomes worse and worse as the number of network layers increases
Among the existing methods, the Highway-Networks method can alleviate the degradation problem of the network, but this method will increase the amount of network parameters and time-consuming training
The SRU network that has received much attention in the past two years also includes a structure similar to Highway-Networks. At the same time, SRU discards the time parameters in the recurrent unit, so it can perform deeper network training while running fast, but in complex networks When testing in the environment, the problem of gradient disappearance still occurs
Furthermore, with the intermittent arrival of the data stream, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network abnormal flow detection method, model and system
  • Network abnormal flow detection method, model and system
  • Network abnormal flow detection method, model and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0212] Embodiments of the present invention will be described in detail below in conjunction with examples, but those skilled in the art will understand that following examples are only used to illustrate the present invention, and should not be considered as limiting the scope of the present invention.

[0213] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network abnormal flow detection method, model and system based on a residual error gating circulation unit (Re-GRU) and integrated dynamic extreme learning (ELM) optimization. The method comprises the following steps: firstly, establishing a feature optimization method of Fisher Score and a maximum information coefficient; secondly, changing an original GRU candidate hidden state activation function into an unsaturated activation function, and introduing a residual structure into the GRU candidate hidden state, so that the gradient disappearance problem is avoided, the network is more sensitive to gradient change, and the purpose of relieving network degradation is achieved. Then, the model is optimized and designed into a bidirectional residual GRU structure, so that the network flow characteristic extraction performance of the model is more excellent; and finally, a two-step game integrated dynamic ELM network flow detection method is provided, and an overfitting problem is solved by using a full connection layer and a Dropout layer so as to improve the detection precision, and outputting a detection result. According to the method, the experimental simulation model is established, the validity is verified according to the comparison result of different parameters, and compared with a traditional detection method, the method has better detection effect and accuracy when detecting the abnormal traffic of the network.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and relates to a method for monitoring abnormal network traffic, a model, a method and a system for model training. Background technique [0002] With the rapid development of network technology, the network structure is becoming more and more complex, and the risk of network intrusion and abnormal traffic attacks is also increasing. How to identify various network intrusions has become a matter of great concern to people. The continuous increase and increase of network scale, network speed and intrusion types make intrusion detection technology face more and more challenges. Therefore, how to design a network intrusion detection method for complex network environments and future intelligence, while improving the detection accuracy of intrusion detection, reducing the false negative rate, and improving detection performance has become the core issue of concern in related fields. [0003] Ai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06N3/04G06N3/08G06F17/16
CPCG06N3/084G06F17/16G06N3/045G06F18/2411G06F18/214
Inventor 史增树杜怡曼杨滨茂麻文刚
Owner BEIJING SWJTU RICHSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products