Supercharge Your Innovation With Domain-Expert AI Agents!

Mining Trojan horse detection method based on depth canonical correlation analysis

A typical correlation analysis and detection method technology, applied in the field of cloud computing, can solve the problems of affecting judgment, wrong judgment, and difficult to find, and achieve the effect of reducing resource occupation, improving accuracy, and improving stability

Pending Publication Date: 2022-07-01
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. The characteristics of the method of monitoring resource usage are not clear enough, high resource usage is not necessarily occupied by mining Trojan horses, and misjudgments are likely to occur;
[0010] 2. Some mining Trojans can hide the process and are not easy to be found, which affects judgment;
[0011] 3. Judging through traffic analysis requires real-time monitoring of dynamic traffic data and analysis. If the analysis method is complicated, it will affect the efficiency of normal services;
[0012] 4. Part of the traffic is disguised. If only the existing keyword matching rules are used, it cannot be effectively analyzed whether it is mining traffic;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining Trojan horse detection method based on depth canonical correlation analysis
  • Mining Trojan horse detection method based on depth canonical correlation analysis
  • Mining Trojan horse detection method based on depth canonical correlation analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work, all belong to the protection scope of the present invention.

[0051] see Figure 1 to Figure 2 , the present invention provides a kind of technical scheme:

[0052] The present invention proposes a mining Trojan detection method based on deep canonical correlation analysis:

[0053] Find suspected abnormal nodes by monitoring hardware resource usage;

[0054] Through hardware configuration, usage and process analysis, a batch of mining nodes are screened out;

[0055] The remaining abnormal nodes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing, in particular to a mining Trojan horse detection method based on depth canonical correlation analysis, and has the beneficial effects that the mining Trojan horse detection method based on depth canonical correlation analysis can effectively detect nodes attacked by mining Trojan horses, is beneficial to improving the stability of cloud services, and reduces energy waste at the same time. According to the method, the suspected abnormal node is searched by monitoring the hardware resource use condition and process, and resource occupation under the normal condition can be reduced. Features are extracted by using the neural network in the process of mining Trojan flow detection in flow analysis, so that the situation of flow camouflage can be effectively handled; communication features and behavior features are fused through deep canonical correlation analysis, mutual complementary information is mined from single and one-sided features, and the detection accuracy is improved.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a mining Trojan detection method based on deep canonical correlation analysis. Background technique [0002] With the continuous advancement of network technology, cloud computing has played an important role in more and more scenarios. Cloud computing provides services through unified scheduling of server resources, and users can access services remotely through the network. [0003] A large number of services run in the cloud service platform. Therefore, the safe and stable operation of the cloud service platform is related to the service quality and user experience. [0004] Aggressive behaviors can affect the operation of cloud service platforms, and mining Trojans are one of them. Mining behavior will greatly increase the resource pressure of the server, resulting in abnormal service; at the same time, it is also an unnecessary waste of energy. In order to reduce t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/145H04L63/1416H04L63/1425
Inventor 楼哲伟蔡卫卫高传集张勇石光银
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More