Anti-confusion network intrusion detection method based on generative adversarial network
An intrusion detection and anti-aliasing technology, applied in biological neural network models, neural learning methods, instruments, etc., can solve problems such as unreasonable setting of discriminator training targets, lack of effectiveness of examples, difficulty in framework training, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0063] figure 2 This is the specific implementation flow chart of the anti-obfuscation network intrusion detection method based on the generative confrontation network of the present invention. like figure 2 As shown, the specific steps of the anti-obfuscation network intrusion detection method based on the generative adversarial network of the present invention include:
[0064] S201: Collection instance:
[0065] Collect several normal instances to form a normal instance set X_n, and collect several attack instances to form an attack instance set X_a. After determining the type of attack to be detected, each instance is divided into functional features and non-functional features. The functional features are: Those features that are closely related to the basic functions of the instance and if modified will destroy the effectiveness of the instance, these features are often strongly related to the type of attack to be detected, so such functional features cannot be modif...
example
[0111] Randomly select a set of instances from the instance set X to form the instance set collection of instances Each instance in is input to the intrusion detection model C for detection and input to the discriminator of the generative adversarial network for identification.
[0112] S506: Update the parameters of the intrusion detection model:
[0113] Use the following formula to calculate the objective function value of the intrusion detection model C, and update the parameters of the intrusion detection model C with the goal of maximizing the training objective function value:
[0114]
[0115] in, Represents a collection of instances the number of instances in Represents a collection of instances B an instance, Represents an instance 's true label, represents the intrusion detection model C for the instance detection score.
[0116] S507: Generator parameter update:
[0117] Use the following formula to calculate the objective function value o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


