Time sequence point-based network attack event prediction method, system and device and a medium

A network attack and attack event technology, applied in the network field, can solve problems such as comprehensiveness and poor data loss processing, and achieve the effect of improving accuracy

Pending Publication Date: 2021-11-16
GUANGZHOU UNIVERSITY
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, due to the complexity and variety of attack types and the increasingly advanced evasion techniques of attackers, the data that can be collected is not necessarily comprehensive
The traditional time-series point process does not handle the missing data very well, and sometimes only a part of the events can be observed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time sequence point-based network attack event prediction method, system and device and a medium
  • Time sequence point-based network attack event prediction method, system and device and a medium
  • Time sequence point-based network attack event prediction method, system and device and a medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. For the step numbers in the following embodiments, it is only set for the convenience of illustration and description, and the order between the steps is not limited in any way. The execution order of each step in the embodiments can be adapted according to the understanding of those skilled in the art sexual adjustment.

[0049] In the description of the present invention, multiple means two or more. If the first and the second are described only for the purpose of distinguishing technical features, it cannot be understood as indicating o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a time sequence point-based network attack event prediction method, system and device and a medium, and the method comprises the steps: obtaining historical attack event data, generating a first event sequence according to the historical attack event data, and determining a first event feature and event occurrence time; constructing a first event atlas according to the first event feature, and processing the first event atlas through a graph embedding algorithm to obtain a first feature vector; inputting the first feature vector and the event occurrence time into a pre-constructed recurrent neural network for model training of a depth point process to obtain a trained time sequence point process model; and predicting the occurrence time and the event type of the next network attack event according to the time sequence point process model. According to the method, the event atlas is converted into the feature vectors through graph embedding, the feature vectors and the occurrence time are trained through the depth point process, the accuracy of network attack event prediction is improved, and the method can be widely applied to the technical field of network security.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a network attack event prediction method, system, device and medium based on timing points. Background technique [0002] In the field of network security, it is crucial to accurately predict the attacker's next activity. In order to predict the persistence of attacks and predict upcoming attack events, it is usually necessary to collect the attacker's behavior and conduct attack modeling on it for later use. But ignoring the time dimension, the predicted events often cannot reflect the reality. Therefore, by modeling a series of historical events of network attacks, each event corresponds to its occurrence time and event type, based on this series of historical events, it is possible to efficiently predict the occurrence time of the next network attack and its event type. [0003] In the prior art, the most widely used method is to find network attack events by means...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/901G06N3/04G06N3/08
CPCH04L63/1425G06F16/9024G06N3/08G06N3/045
Inventor 任怡彤田志宏鲁辉孙彦斌
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products