Design method of intrusion detection system based on Bayesian neural network

An intrusion detection system and neural network technology, applied in the field of intrusion detection system design, can solve the problems of poor interval and delay, dependence, etc.

Pending Publication Date: 2021-10-22
浙江网安信创电子技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the host-based intrusion detection system is that it depends on the specific system platform
[0006] From the perspective of machine learning, hidden Markov models (HMM) or long-term short-term memory (LSTM) models are often used to process time series data, but hidden Markov models are models based on homogeneous Markov assumptions. The state of LSTM only depends on the state of the previous moment, so it is not very good at processing and predicting important events with long intervals and delays in time series, and the LSTM model is mainly used for time series data with long intervals and delays, but generally for a supervised learning model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of intrusion detection system based on Bayesian neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] Such as figure 1 As shown, a design method of intrusion detection system based on Bayesian neural network, including the following steps:

[0040] S1. Read the normal traffic analysis data and the Mirai zombie traffic analysis data respectively, and merge them. In this embodiment, there are 1,098,677 pieces of traffic analysis data, and each piece of data has 115 analysis fields;

[0041] S2. Preprocessing the data, the preprocessing includes the following steps:

[0042] S201: Perform a shuffle operation on the original data, with the purpose of disrupting the arrangement order;

[0043] S202: Divide the data after the shuffle operation into a training set, a verification set, and a test set;

[0044] S203: Perform mean / variance normalization processing on the training set, in order to prevent data leakage, perform normalizat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a design method of an intrusion detection system based on a Bayesian neural network. According to the method, the intrusion detection system builds, trains, verifies and tests a Bayesian neural network model after carrying out related preliminary preprocessing of ETL, feature engineering and the like on data, and carries out related parameter tuning work. The intrusion detection system adopts an unsupervised learning model, not only does not need label data, but also can detect unknown network attacks, and plays a particularly important role in a network attack defense system.

Description

technical field [0001] The invention belongs to the technical field of intrusion detection, in particular to a design method of an intrusion detection system based on a Bayesian neural network. Background technique [0002] The proportion of attack incidents in the data of the Internet of Vehicles and the Internet of Things is very small, reflecting obvious data imbalance, and some attack data are related before and after, which may be short-term or long-term, and the actual attack methods are various. , lack of labeled data, so the intrusion detection and classification prediction of this type of data is a difficult point. [0003] Intrusion detection, as its name implies, is the detection of intrusions. It collects and analyzes information from several key points in the computer network or computer system, and finds out whether there are signs of violations of security policies and attacks in the network or system. The combination of software and hardware for intrusion d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06K9/62G06N3/04G06N3/08
CPCG06F21/554G06N3/084G06N3/045G06F18/29
Inventor 刘晶
Owner 浙江网安信创电子技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products