Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-Stage Intrusion Detection Method Combining Gaussian Mixture Model and Ranking Learning

A technology of Gaussian mixture model and sorting learning, which is applied in neural learning methods, biological neural network models, character and pattern recognition, etc., can solve problems such as the same characteristic value of intrusion data, large degree of confusion of intrusion types, and overlapping ranges, etc., to achieve improved The comprehensive performance of the model and the effect of improving the classification effect

Active Publication Date: 2022-06-17
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The following two situations exist in the intrusion scenario: 1) Most of the network intrusion data are packet-based or flow-based, resulting in a low feature dimension extracted, so that intrusion types with similar characteristics will get the same characteristics, resulting in intrusion Samples with the same eigenvalues ​​but different labels appear in the data
2) The scope of various intrusion types in the network intrusion data is relatively vague, which leads to the overlap between the intrusion types with broad concepts, resulting in a large degree of confusion between the intrusion types with overlapping ranges, and it is difficult to classify them correctly
And when a sample of a certain feature combination is not correctly classified, all corresponding samples with the same feature will be misclassified, which will greatly affect the performance of the intrusion detection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-Stage Intrusion Detection Method Combining Gaussian Mixture Model and Ranking Learning
  • Multi-Stage Intrusion Detection Method Combining Gaussian Mixture Model and Ranking Learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0042] like figure 1 , a multi-stage intrusion detection method combining Gaussian mixture model and ranking learning, including the following steps:

[0043] S1: Obtain malicious intrusion traffic data and perform feature extraction and preprocessing to obtain a network traffic feature dataset; use the open source tool TCPDump to capture the original network traffic data containing malicious intrusion information, and discard the ori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Combining the multi-stage intrusion detection method of Gaussian mixture model and ranking learning, S1 obtains the malicious intrusion traffic data to obtain the network traffic feature data set; S2 divides the network traffic feature data set and extracts the optimal features; S3 predicts the prior information set Obtain the distribution of wrongly classified samples and overlapping samples; S4 matches the eigenvalues ​​of the wrong samples with the optimal feature test set, and obtains the first-stage prediction results through model prediction; S5 combines the distribution of wrong samples to obtain overlapping samples and non-overlapping samples, Use the prior information of the overlapping samples to formulate prediction labels for the overlapping samples to obtain the second-stage prediction results; S6 classify and predict the non-overlapping samples to obtain the first splicing vector; S7 predict the first splicing vector through the ranking learning model to obtain the second Three-stage prediction results; combining Gaussian mixture model and ranking learning to solve the problem of poor classification effect of samples with the same characteristics and different labels and samples with confusing categories.

Description

technical field [0001] The invention belongs to the technical field of learning intrusion detection, and more particularly relates to a multi-stage intrusion detection method combining Gaussian mixture model and sorting learning. Background technique [0002] Intrusion detection refers to the process that the system learns the existing network traffic data and captures the difference between normal traffic data and malicious traffic data, so as to identify malicious traffic data. [0003] There are two situations in the intrusion scenario: 1) Most of the network intrusion data are packet-based or flow-based, resulting in a low dimension of the extracted features, so that intrusion types with similar characteristics will get the same characteristics, thus causing intrusion Samples with the same feature value but different labels appear in the data. 2) The scope of various intrusion types in network intrusion data is relatively vague, resulting in the overlapping of scopes be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/56G06V10/764G06V10/77G06V10/82G06N3/04G06N3/08
CPCH04L63/1416H04L63/1408G06F21/566G06N3/08G06N3/044G06N3/045G06F18/2135G06F18/23G06F18/241
Inventor 金福生陈梦楠袁野王树良王国仁
Owner BEIJING INSTITUTE OF TECHNOLOGYGY