Unlock instant, AI-driven research and patent intelligence for your innovation.

A network big data security protection method based on deep learning

A technology for network security and network data, which is applied in the field of network big data security protection based on deep learning, and can solve the problems of increasing, enterprise risks, and the inability of traditional security protection systems to deal with it.

Active Publication Date: 2022-01-11
马鞍山冲鸭互联网科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional protection system focuses on single-point protection, and the network attack methods and attack programs in the big data environment have increased a lot, resulting in many problems that cannot be dealt with by the traditional security protection system, and the risks faced by enterprises are constantly increasing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network big data security protection method based on deep learning
  • A network big data security protection method based on deep learning
  • A network big data security protection method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] refer to Figure 1 ~ Figure 2 , which is the first embodiment of the present invention, this embodiment provides a network big data security protection method based on deep learning, including:

[0028] S1: Preprocess the network data, and construct a data matrix based on the preprocessed network data.

[0029] specific. The steps to preprocess network data are as follows:

[0030] (1) Delete irrelevant data and duplicate data in the network data, and deal with missing values;

[0031] The correlation between the data is judged by the correlation coefficient. If the correlation between the two attributes is large (taken greater than 0.65), one attribute is removed from the two attributes, and the remaining attributes are used to replace the two highly correlated attributes. Original attributes, and then realize the deletion of irrelevant data and duplicate data, and reduce data redundancy; the correlation coefficient r is as follows:

[0032]

[0033] Among them,...

Embodiment 2

[0072] In order to verify and illustrate the technical effect adopted in this method, the present embodiment selects convolutional neural network model (CNN), support vector machine model (SVM), binary classification pair support vector machine model (TSVM) and adopts this method to carry out comparative test , to compare the test results with the means of scientific demonstration to verify the real effect of this method.

[0073] The convolutional neural network model and the support vector machine model have poor recognition effect on the bad data of the network, while the binary classification support vector machine model has a better recognition effect on the bad data of the network, but the running time is longer than that of the support vector machine model. Long running time.

[0074] In order to verify that this method has a higher recognition rate and shorter running time than the convolutional neural network model, support vector machine model, and binary classificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network big data security protection method based on deep learning, which is characterized in that it includes: preprocessing network data, constructing a data matrix based on the preprocessed network data; constructing an initial network security protection based on deep learning Model, use the initial network security protection model to train the data matrix to obtain the network security protection model; use the network security protection model to identify bad data in the data matrix, and set the protection threshold; if the bad data is greater than the protection threshold, disconnect The physical connection between the external network and the protected network; otherwise, no operation is performed; the present invention builds a network security protection model based on deep learning, which improves the security of massive network data and speeds up the processing of massive data.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a deep learning-based network big data security protection method. Background technique [0002] Massive big data in the cloud is the basis of data analysis, and the security and accuracy of the data itself has an important impact on the results of data analysis. With the advent of the era of cloud big data, traditional relational data processing technologies are no longer able to handle massive amounts of cloud big data. The existing intelligent devices still cannot carry out intelligent learning and intervention affairs like the human brain. Data is the lifeblood. How to respond and process these data with the fastest speed and how to ensure the security of these massive data have become a hot topic in current research. [0003] The traditional protection system focuses on single-point protection, and the network attack methods and attack programs in the big ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08
CPCH04L63/02H04L63/1441H04L63/1458G06N3/08G06N3/044G06N3/045
Inventor 周林
Owner 马鞍山冲鸭互联网科技有限公司