Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unmanned aerial vehicle attack prediction method and system based on bidirectional long-short-term memory model

A technology of long short-term memory and prediction method, applied in the field of network security, can solve the problems of data confidentiality, sensitivity and volatility, and protection difficulties, and achieve the effects of good performance, improved prediction accuracy, and privacy protection.

Pending Publication Date: 2022-07-05
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a system based on the confidentiality, sensitivity, volatility, and difficulty of protection of UAV system data, the extremely high importance of its information and the urgent need for information security of UAV system A UAV attack prediction method based on a two-way long-short-term memory model to solve the above-mentioned deficiencies in existing technologies and ensure the security of verification information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unmanned aerial vehicle attack prediction method and system based on bidirectional long-short-term memory model
  • Unmanned aerial vehicle attack prediction method and system based on bidirectional long-short-term memory model
  • Unmanned aerial vehicle attack prediction method and system based on bidirectional long-short-term memory model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described in detail below in conjunction with the accompanying drawings, which are to explain rather than limit the present invention.

[0037] see Figure 1-3 , a UAV attack prediction method based on a bidirectional long short-term memory model, including the following steps:

[0038] Step 1: Train the encoder module of the Transformer model according to the constructed log semantic vector, and the trained encoder module is used to convert the log semantic vector into a log sequence vector output.

[0039] The encoder module in the Transformer model includes a multi-head attention layer and a feed-forward network layer (FFN). The feed-forward network layer consists of two ReLU activation layers. The training method of the encoder module is as follows:

[0040] S1.1. Obtain the UAV system log, delete the variables in the UAV system log and extract the log constant field, that is, the log template, and then vectorize the log templa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unmanned aerial vehicle attack prediction method and system based on a bidirectional long-short-term memory model, and the method comprises the steps: constructing the bidirectional long-short-term memory model which comprises a forward memory model and a backward memory model, and carrying out the bidirectional training of the bidirectional long-short-term memory model through employing a log index; predicting a log index of the attack sequence vector according to the trained bidirectional long-short-term memory model, respectively outputting a forward prediction result and a backward prediction result of h time steps by the forward memory model and the backward memory model, and calculating an average probability of each output label in the forward prediction result and the backward prediction result, and sorting the probabilities according to a descending order, and taking the log index with the maximum probability as an abnormal point positioning prediction result.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method and system for predicting an unmanned aerial vehicle attack based on a bidirectional long short-term memory model, which can be used in the safety protection of an unmanned aerial vehicle system. Background technique [0002] UAVs have entered people's lives from the military field to the industrial field, and have also played an important role in the civilian field. They have brought a lot to production and life in the fields of cruise, monitoring, aerial photography, agriculture, express delivery, power inspection and emergency rescue. Come convenient. Due to these mission requirements, drones need to collect, process, and transmit large amounts of sensitive data, making drones an interesting target for attackers. UAVs are widely used in occasions involving national security, important property, etc., and contain important national secrets. In recent years,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/122G06N3/04G06N3/08
CPCH04W12/122G06N3/08G06N3/044G06N3/045
Inventor 李腾贺紫怡王申奥江娅马卓沈玉龙马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products