Network intrusion detection method

A detection method and network intrusion technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of no solution, decreased detection accuracy, poor adaptability, etc., to achieve low computational cost, strong adaptability, Good real-time effect

Inactive Publication Date: 2006-07-26
成都三零盛安信息系统有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the correct establishment of the model is affected by many factors. If the detection model deviates too much from the actual environment, the detection accuracy will drop.
[0003] At present, in practical intrusion detection systems, the most widely used anomaly detection method relies on statistical methods, which are mature in theory and simple in principle, but poor in adaptability
Many other anomaly detection technologies are still in the research stage, among which neural network technology and data mining technology are relatively mature, but there is no complete solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method
  • Network intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] Embodiment: the network intrusion detection method is made up of data capture step, decoding step, data preprocessing step, learning step, detection step and abnormal alarm step, as figure 1 As shown, the data capture step collects the original data of the network; the decoding step analyzes the data network protocol; the data preprocessing step extracts the traffic characteristics of the data; the learning step collects enough traffic characteristic data to generate a new detection model to replace the original There is a detection model; the detection step uses the detection model generated by the learning step to detect network data; the abnormal alarm step obtains the message of the detection step and generates an abnormal alarm.

[0029] A complete detection process is as follows:

[0030] After the data packet capture step captures network data, it is sent to the decoding step to analyze the network protocol of the data packet; after decoding, it is sent to the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses one network intruding testing method and to one safety test method and to the test method to judge whether the network data flow to be tested is intruding, wherein the method comprises the following steps: pre-processing; studying step, testing step data process structure, wherein, the studying and testing steps adopts BP network as module for data processing and for studying or testing steps according to different system status.

Description

technical field [0001] The invention relates to a safety detection method of the Internet, in particular to a detection method for judging whether the network is intruded by detecting network data flow. Background technique [0002] In the network intrusion detection system, the most critical is the intrusion detection method. Most detection methods use feature matching judgment and anomaly detection judgment. Feature matching judgment is mainly to detect keywords in network attack data, so hackers can easily avoid detection by modifying keywords; anomaly detection judgment distinguishes normal behavior from abnormal behavior through various anomaly detection methods to identify network attacks. Anomaly detection is not restricted by keywords. Once the detection model is established correctly, it can detect a certain type of attack with similar behavioral characteristics. However, the correct establishment of the model is affected by many factors. If the detection model de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 廖竣锴
Owner 成都三零盛安信息系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products