Network attack detection method and device based on deep k-nearest neighbor

A deep network and network attack technology, applied in the field of network attack defense and deep learning, can solve the problems of low model robustness and poor performance, and achieve the effect of good robustness and accuracy and credibility

Active Publication Date: 2021-09-24
HANGZHOU DIANZI UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: the reliability of the prediction of the intrusion detection output model based on the traditional neural network is generally high, and the robustness of the model is low, and the performance is poor when faced with adversarial examples

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device based on deep k-nearest neighbor
  • Network attack detection method and device based on deep k-nearest neighbor
  • Network attack detection method and device based on deep k-nearest neighbor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0055] The overall intrusion detection process of this application includes data preprocessing, model building and compilation, model training, and DkNN analysis, such as figure 1 As shown, a network attack detection method based on deep k-nearest neighbors, including:

[0056] Step S1 , preprocessing the sample data, and dividing the preprocessed sample data into training sample data and calibration sample data.

[0057] In an example, the preprocessing of the sample data includes:

[0058] Delete meaningless fields in the sample data, and map the IP addresses in the source IP address a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack detection method and device based on deep k-nearest neighbor. The method comprises the steps: constructing a deep network model for network attack detection, training the deep network model through employing training sample data, obtaining a trained deep network model, inputting the training sample data into the trained deep network model, and obtaining a network attack detection result. Obtaining the output of training sample data in each layer of the deep network model, inputting correction sample data into the trained deep network model, calculating to obtain the sum of distance features corresponding to the correction sample data to form a data set, then inputting to-be-detected data into the trained deep network model, and combining DkNN analysis to obtain a to-be-detected data set; and obtaining a prediction result. The technical scheme of the invention has good robustness, and more accurate credibility of the prediction classification result is obtained.

Description

technical field [0001] The invention belongs to the field of network attack defense and deep learning, and specifically relates to a network attack detection method and device based on deep k-nearest neighbors, which are used for intrusion detection in vulnerable network environments. Background technique [0002] With the development and maturity of the Internet, the Internet has gradually become a highly shared and free environment. The networking and intelligence of all walks of life have begun to flourish. But at the same time, various malicious network activities and cyber crimes occur frequently, and the information security of network users is seriously threatened. [0003] In order to solve the above problems, the intrusion detection system, as a representative network defense technology, has become popular again in recent years. The intrusion detection system obtains the characteristics of the attack activity by analyzing the attack activity after the event, and w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/08G06N3/04G06K9/62
CPCH04L63/1416G06N3/08G06N3/045G06F18/24147G06F18/214
Inventor 付兴兵史浩然吴炳金章坚武
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products