Anti-obfuscation network intrusion detection method based on generative adversarial network
An intrusion detection and anti-obfuscation technology, applied in biological neural network models, neural learning methods, instruments, etc., can solve problems such as unreasonable discriminator training target setting, difficult framework training, and lack of effectiveness of examples
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0063] figure 2 This is the specific implementation flow chart of the anti-obfuscation network intrusion detection method based on the generative confrontation network of the present invention. like figure 2 As shown, the specific steps of the anti-obfuscation network intrusion detection method based on the generative adversarial network of the present invention include:
[0064] S201: Collection instance:
[0065] Collect several normal instances to form a normal instance set X_n, and collect several attack instances to form an attack instance set X_a. After determining the type of attack to be detected, each instance is divided into functional features and non-functional features. The functional features are: Those features that are closely related to the basic functions of the instance and if modified will destroy the effectiveness of the instance, these features are often strongly related to the type of attack to be detected, so such functional features cannot be modif...
example
[0111] Randomly select a set of instances from the instance set X to form the instance set collection of instances Each instance in is input to the intrusion detection model C for detection and input to the discriminator of the generative adversarial network for identification.
[0112] S506: Update the parameters of the intrusion detection model:
[0113] Use the following formula to calculate the objective function value of the intrusion detection model C, and update the parameters of the intrusion detection model C with the goal of maximizing the training objective function value:
[0114]
[0115] in, Represents a collection of instances the number of instances in Represents a collection of instances B an instance, Represents an instance 's true label, represents the intrusion detection model C for the instance detection score.
[0116] S507: Generator parameter update:
[0117] Use the following formula to calculate the objective function value o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



