Unlock instant, AI-driven research and patent intelligence for your innovation.

Network intrusion detection method and device, equipment and storage medium

A technology of network intrusion detection and network data, which is applied in the field of abnormal network intrusion, can solve the problems of identifying new attacks, poor detection effect, and identifying specific attack types of attack data, so as to improve network security and timeliness Effect

Pending Publication Date: 2022-02-18
PURPLE MOUNTAIN LAB
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Technical purpose: Aiming at the defects in the prior art, the present invention discloses a network intrusion detection method, device, equipment and storage medium, which solves the problem of not only being able to identify the specific attack type of attack data but also identifying new attacks at present. Problems that lead to poor detection performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method and device, equipment and storage medium
  • Network intrusion detection method and device, equipment and storage medium
  • Network intrusion detection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] A network intrusion detection method, device, device and storage medium of the present invention will be further described and explained below in conjunction with the drawings and embodiments.

[0048] Such as figure 1 and 2 As shown, the embodiment of the present application provides a network intrusion detection method, including steps:

[0049] Step S01, obtaining network data and extracting features, inputting the network data features into the pre-built first misuse detection model, and obtaining the network data is normal data or attack data; if it is normal data, the result of this network intrusion detection is: If the network data is normal data, the method ends; otherwise, enter step S02;

[0050] Step S02, input the characteristics of the attack data into the pre-built first anomaly detection model, obtain the cluster category to which the attack data belongs, and calculate the first class between the attack data and the cluster center of the cluster catego...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network intrusion detection method and device, equipment and a storage medium. The method comprises the steps of: inputting the features of network data into a first misuse detection model, and obtaining normal data or attack data; inputting the features of the attack data into a first anomaly detection model to obtain a clustering class, and calculating a first class distance between the attack data and the class center of the clustering class to which the attack data belongs; in response to the fact that the first class distance is not greater than a predetermined first class distance threshold of the clustering class, inputting the attack data as deterministic attack data into a second misuse detection model to obtain a specific attack type; and in response to the fact that the first class distance is greater than the predetermined first class distance threshold of the clustering class, storing the attack data as to-be-determined attack data in a to-be-determined attack data set, and judging whether a to-be-determined attack data type has occurred or not. According to the method, the specific type of the network data is accurately detected, whether a new attack occurs or not can be detected, and the network security and timeliness are greatly improved.

Description

technical field [0001] The invention relates to the technical field of abnormal network intrusion, in particular to a network intrusion detection method, device, equipment and storage medium. Background technique [0002] With the development of computer network and communication technology, computer network has become popular rapidly and has become an important tool for information sharing and exchange in the whole society. While network applications bring infinite convenience to people, network security issues are becoming increasingly prominent. Computer networks in today's society are facing the following problems: citizens' personal information is leaked, corporate data information is stolen, and important state agencies are attacked. The problem of maintaining network security is fundamentally a problem of protecting the economy. From the perspective of protecting network security and resisting intrusion, many technologies and equipment have emerged as the times requi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/1416H04L63/1441G06F18/23213
Inventor 陈苗苗祁学豪陈刚
Owner PURPLE MOUNTAIN LAB