A network attack detection method and device based on deep k-nearest neighbors

A deep network and network attack technology, applied in secure communication devices, neural learning methods, biological neural network models, etc., can solve the problems of low model robustness and poor performance, and achieve good robustness, accuracy and credibility. Effect

Active Publication Date: 2022-04-19
HANGZHOU DIANZI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: the reliability of the prediction of the intrusion detection output model based on the traditional neural network is generally high, and the robustness of the model is low, and the performance is poor when faced with adversarial examples

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network attack detection method and device based on deep k-nearest neighbors
  • A network attack detection method and device based on deep k-nearest neighbors
  • A network attack detection method and device based on deep k-nearest neighbors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0055] The overall intrusion detection process of this application includes data preprocessing, model building and compilation, model training, and DkNN analysis, such as figure 1 As shown, a network attack detection method based on deep k-nearest neighbors, including:

[0056] Step S1 , preprocessing the sample data, and dividing the preprocessed sample data into training sample data and calibration sample data.

[0057] In an example, the preprocessing of the sample data includes:

[0058] Delete meaningless fields in the sample data, and map the IP addresses in the source IP address a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack detection method and device based on depth k nearest neighbors, constructs a deep network model for network attack detection, uses training sample data to train the deep network model, obtains the trained deep network model, and uses the training sample data Input it into the trained deep network model, obtain the output of the training sample data in each layer of the deep network model, and input the corrected sample data into the trained deep network model, and calculate the sum of the distance features corresponding to the corrected sample data. Data set, and then input the data to be detected into the trained deep network model, combined with DkNN analysis, to obtain the prediction result. The technical scheme of the invention has good robustness, and obtains more accurate credibility of the predicted classification results.

Description

technical field [0001] The invention belongs to the field of network attack defense and deep learning, and specifically relates to a network attack detection method and device based on deep k-nearest neighbors, which are used for intrusion detection in vulnerable network environments. Background technique [0002] With the development and maturity of the Internet, the Internet has gradually become a highly shared and free environment. The networking and intelligence of all walks of life have begun to flourish. But at the same time, various malicious network activities and cyber crimes occur frequently, and the information security of network users is seriously threatened. [0003] In order to solve the above problems, the intrusion detection system, as a representative network defense technology, has become popular again in recent years. The intrusion detection system obtains the characteristics of the attack activity by analyzing the attack activity after the event, and w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06N3/08G06N3/04G06K9/62
CPCH04L63/1416G06N3/08G06N3/045G06F18/24147G06F18/214
Inventor 付兴兵史浩然吴炳金章坚武
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products