Unsupervised autonomous attack detection method in endogenous security system

A security system and attack detection technology, applied in transmission systems, neural learning methods, biological neural network models, etc., can solve the problems of unsupervised attack recognition and localization, low recognition rate, and lack of reliable pre-annotated data based on machine learning methods.

Active Publication Date: 2021-05-18
PURPLE MOUNTAIN LAB
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an unsupervised autonomous attack detection method in an endogenous security system, which overcomes the deficiencies of the prior art, and solves the problem of low recognition rate of traditional feature-based matching methods and lack of reliable pre-annotated data based on machine learning methods. To deal with the problem of unknown attacks, the autonomous attack detection method of the present invention realizes unsupervised attack identification and location functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unsupervised autonomous attack detection method in endogenous security system
  • Unsupervised autonomous attack detection method in endogenous security system
  • Unsupervised autonomous attack detection method in endogenous security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] An approach for unsupervised autonomous attack detection in endogenously secure systems such as figure 1 As shown, the attack on the target node is to change some attributes of the node by perturbing a certain node on the graph.

[0039] Such as figure 1 As shown, the change to the system structure is to change the overall structure of the graph by applying disturbance to the overall structure of the graph. The disturbance to the graph structure includes ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an unsupervised autonomous attack detection method in an endogenous security system, which comprises the following steps of: constructing a dynamic graph model of nodes and a logical relationship in a target network, coding the graph model into an implicit vector, initializing a sub-graph and each node based on the implicit vector, generating edges between the nodes through two strategies of node selection and node expansion, carrying out attack detection on the edges between the nodes, and continuously repeating the steps until decoding reconstruction is finished; finally, calculating a reconstruction accuracy rate, and if the reconstruction accuracy rate is smaller than a threshold value, judging that the target network is attacked, and for the condition that the target network is judged to be attacked, positioning an attacked area in a graph matching mode, and returning a judgment result.

Description

technical field [0001] The invention relates to the technical field of computer network communication, in particular to an unsupervised autonomous attack detection method in an endogenous security system. Background technique [0002] Traditional security defenses are usually carried out in isolation in specific areas such as anti-malware, network traffic anomaly detection, network security operations, and system security assessment. Endogenous security system From the perspective of bionics, build an information system endogenous security system based on the biological nervous system. The difference from the existing intelligent security research is that "endogenous security" integrates the human bionic system, immunity, artificial intelligence and mobile communication network, and arranges a huge number of sensors with reference to the characteristics of distributed perception of the human nervous system, real-time monitoring system Each part changes, using the method of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1408H04L63/1416G06N3/08G06N3/045
Inventor 方兰婷胡爱群李涛
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products