Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-stage intrusion detection method combining Gaussian mixture model and sort learning

A technology of Gaussian mixture model and ranking learning, applied in neural learning methods, biological neural network models, character and pattern recognition, etc., can solve the problems of the same feature value, low feature dimension, and different labels of intrusion data, and improve the classification effect , Improve the overall performance of the model

Active Publication Date: 2022-01-07
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The following two situations exist in the intrusion scenario: 1) Most of the network intrusion data are packet-based or flow-based, resulting in a low feature dimension extracted, so that intrusion types with similar characteristics will get the same characteristics, resulting in intrusion Samples with the same eigenvalues ​​but different labels appear in the data
2) The scope of various intrusion types in the network intrusion data is relatively vague, which leads to the overlap between the intrusion types with broad concepts, resulting in a large degree of confusion between the intrusion types with overlapping ranges, and it is difficult to classify them correctly
And when a sample of a certain feature combination is not correctly classified, all corresponding samples with the same feature will be misclassified, which will greatly affect the performance of the intrusion detection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-stage intrusion detection method combining Gaussian mixture model and sort learning
  • Multi-stage intrusion detection method combining Gaussian mixture model and sort learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] Such as figure 1 , a multi-stage intrusion detection method combining Gaussian mixture model and ranking learning, including the following steps:

[0043] S1: Obtain malicious intrusion traffic data and perform feature extraction and preprocessing to obtain a network traffic feature data set; use the open source tool TCPDump to capture the original network traffic data containing malicious intrusion information, and discard the original network traffic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-stage intrusion detection method combining a Gaussian mixture model and rank learning. The method comprises the following steps: S1, acquiring malicious intrusion traffic data to obtain a network traffic feature data set; S2, dividing the network traffic feature data set and extracting optimal features; S3, predicting the prior information set to obtain distribution conditions of misclassification samples and overlapped samples; S4, carrying out feature value matching on the error sample and the optimal feature test set, and obtaining a first-stage prediction result through model prediction; S5, obtaining the overlapped samples and non-overlapped samples in combination with the error sample distribution condition, making a prediction label for the overlapped samples according to the prior information of the overlapped samples, and obtaining a second-stage prediction result; S6, performing classification prediction on the non-overlapped samples to obtain a first splicing vector; S7, predicting the first splicing vector through a sorting learning model to obtain a third-stage prediction result; A Gaussian mixture model and sorting learning are combined to solve the problem that the classification effect of samples with the same features and different labels and samples with easy-to-confuse categories is poor.

Description

technical field [0001] The invention belongs to the technical field of learning intrusion detection, and more specifically relates to a multi-stage intrusion detection method combining Gaussian mixture model and ranking learning. Background technique [0002] Intrusion detection refers to the process in which the system learns the existing network traffic data to capture the difference between normal traffic data and malicious traffic data, so as to identify malicious traffic data. [0003] The following two situations exist in the intrusion scenario: 1) Most of the network intrusion data are packet-based or flow-based, resulting in a low feature dimension extracted, so that intrusion types with similar characteristics will get the same characteristics, resulting in intrusion Samples with the same eigenvalues ​​but different labels appear in the data. 2) The scope of various types of intrusion in the network intrusion data is relatively vague, which results in the crossing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06F21/56G06V10/764G06V10/77G06V10/82G06N3/04G06N3/08
CPCH04L63/1416H04L63/1408G06F21/566G06N3/08G06N3/044G06N3/045G06F18/2135G06F18/23G06F18/241
Inventor 金福生陈梦楠袁野王树良王国仁
Owner BEIJING INSTITUTE OF TECHNOLOGYGY