Composite attack prediction method and device based on improved hidden Markov model

A technology of hidden Markov and predictive methods, applied in character and pattern recognition, instruments, electrical components, etc., can solve the problem of flooding attack intentions and achieve accurate risk effects

Pending Publication Date: 2021-12-21
NORTH CHINA ELECTRICAL POWER RES INST +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some current intrusion detection systems can only generate different alarm information for various single-step attack behaviors, but the attack intention of the attacker's compound attack is submerged in a large number of alarm information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Composite attack prediction method and device based on improved hidden Markov model
  • Composite attack prediction method and device based on improved hidden Markov model
  • Composite attack prediction method and device based on improved hidden Markov model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0035] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a composite attack prediction method and device based on an improved hidden Markov model. The method comprises the following steps: acquiring a single-step attack sequence; inputting the single-step attack sequence into a trained hidden Markov model to obtain the probability of occurrence of a composite attack, wherein the hidden Markov model determines a corresponding composite attack according to the single-step attack sequence and then determines the probability of occurrence of the corresponding composite attack; when the hidden Markov model is trained, a Forward-Backward algorithm and a Baum-Welch algorithm are adopted to carry out parameter optimization. According to the method and the device, the beneficial effect of accurately predicting risks of composite attacks is realized.

Description

technical field [0001] The invention relates to the technical field of early warning of network attacks, in particular to a compound attack prediction method and device based on an improved hidden Markov model. Background technique [0002] At present, compound attack has become the most threatening form of network attack. For compound attack behaviors, attackers use different attack methods to achieve attack intentions, but their attack intentions are often hidden in various simple single-step attack behaviors and are invisible. Some current intrusion detection systems can only generate different alarm information for various single-step attack behaviors, but the attack intention of the attacker's compound attack is submerged in a large number of alarm information. A compound attack includes several single-step attack steps, and each single-step attack is reflected by the alarm information corresponding to the step. Therefore, how to predict the risk of complex attacks ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62H04L29/06
CPCH04L63/1416G06F18/295
Inventor 景森陈威徐小天高冉馨司冠林张月李敏孙跃董彬石磊韩哲陈乐然
Owner NORTH CHINA ELECTRICAL POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products