Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37 results about "Distributed intrusion detection" patented technology

Distributed intrusion detection method and system for ad hoc network

The invention relates to a distributed intrusion detection method and system for an ad hoc network. Nodes in the ad hoc network are clustered and cluster head nodes are selected, block chain systems are configured at all the cluster head node to form a block chain network, and the method includes the following steps: a node where a log is updated sends to the cluster head node thereof a transaction request containing a log information record which is formatted locally at the node; the cluster head node broadcasts the transaction in the block chain network after verifying that the transaction is legal; each cluster head node performs consensus verification of the transaction, after passing the consensus verification, the transaction is packed to be recorded to the block chain to form a shared log data; and each cluster head node executes intrusion detection based on local information and the shared log data. Since consensus verification and recording are performed on the log informationrecord, authenticity and reliability of detection data are ensured, globally reliable shared information records and safety audit data are provided for the centerless weakly-trusted ad hoc network, so as to support global decision making and response, thereby enabling intrusion detection to be more accurate.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL

Distributed intrusion detection system and method applied to dynamic virtualization environment

InactiveCN103065086ASolve the problem of continuous monitoringSolve the problem of not being able to continuously monitor virtual machinesPlatform integrity maintainanceTransmissionDistributed intrusion detectionVirtualization
The invention provides a distributed intrusion detection system and a distributed intrusion detection method applied to dynamic virtualization environment. The system comprises a detection management center, and intrusion detection engines positioned on physical servers, wherein the detection management center is used for acquiring information of a source physical server and a target physical server to which the current virtual machine belongs before and after migration; a virtualization management server in a virtualization platform performs intrusion detection stop configuration on the intrusion detection engine on the source physical server and performs intrusion detection start configuration on the intrusion detection engine on the target physical server; and the intrusion detection engines are used for performing intrusion detection on specific virtual machines on the corresponding physical servers after an intrusion detection start safety strategy is configured, and stopping intrusion detection of the specific virtual machines on the corresponding physical servers after an intrusion detection stop safety strategy is configured. By the system and the method, the virtual machines can be continuously monitored.
Owner:BEIJING VENUS INFORMATION TECH +1

Intrusion detection and location method of distributed fiber optic fence based on φ-otdr

InactiveCN102280001AIntrusion detectionDefensiveBurglar alarmDistributed intrusion detectionFiber
The invention discloses a distributed optical fiber fence intrusion detection and location method based on a phi-OTDR (Optical Time Domain Reflectometer), and the method comprises the following steps of: firstly, subtracting an acquired ith signal by an acquired (i-1)th signal to obtain a preprocessing monitoring signal; secondly, carrying out at least four-layer wavelet decomposition on the preprocessing monitoring signal by adopting a plurality of wavelet functions; thirdly, judging whether actual intrusion exists according to the consistency of distribution positions of maximum-wavelet mode maximums in all scale signals; fourthly, judging that the actual intrusion exists if the distribution positions of the maximum-wavelet mode maximums in at least three scale signals are consistent; fifthly, corresponding multiplying the scale signals in which the intrusion exists and the distribution positions of the maximum-wavelet mode maximums are consistent to obtain a composite signal of which pseudo maximums are inhibited and mode maximums at a catastrophe point are enhanced, using a position corresponding to the maximum-mode maximum in the composite signal as a position of the determined intrusion point, determining the intrusion generation and the intrusion position by combining various composite signal judgment results of wavelet multi-scale analysis according to the majority voting criterion.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Distributed intrusion detection method based on federated learning and trust evaluation and system thereof

The invention provides a distributed vehicle-mounted intrusion detection system based on federated learning and trust evaluation and a method thereof. The method comprises the following steps: designing a distributed intrusion detection system model based on federated learning; building and pre-training of an intrusion detection model are realized based on federated learning, and broadcasting and distributing a global model by a distributed aggregator; performing edge model training based on intrusion detection data of the edge vehicle by the edge vehicle; selecting an edge representative node as a cluster head based on behavior evaluation to complete an aggregation task of an edge model; adding a mask to the model parameters and then uploading the model parameters to the RSU; performing trust evaluation on the RSU through the quality of a model aggregated by the RSU through the RSU aggregates model parameters uploaded by a cluster head, so that distributed aggregation nodes are stimulated to compete and aggregate a model with higher accuracy, and finally, storing the training model based on a block chain principle to complete model sharing. The invention further creates a defense detection system suitable for automatic driving to resist network intrusion by adopting a safety evaluation mode of information safety.
Owner:EAST CHINA NORMAL UNIV +2

Distributed intrusion detection method, device and system

The invention relates to the field of network communication, in particular to a distributed intrusion detection method, a distributed intrusion detection device and a distributed intrusion detection system. The method comprises the following steps of: acquiring own flow information and generating a flow table; calculating early warning information according to the flow table; when the flow table only comprises own flow information or when the early warning information meets neighbor communication conditions, acquiring the flow information of a neighbor node and flow information acquisition time, and updating the flow table and the early warning information; when the early warning information meets global communication conditions, acquiring the flow information of a global node and the flow information acquisition time, and updating the flow table and the early warning information; and when the early warning information meets early warning conditions, performing intrusion early-warning. In the technical scheme provided by the embodiment of the invention, only the flow information of the neighbor node needs acquiring when the early warning information meets the neighbor communication conditions, so the data traffic in distributed intrusion detection is reduced and the influence of the distributed intrusion detection on network performance is reduced.
Owner:HUAWEI TECH CO LTD +1

Element identifier distribution method and application layer routing method based on element identifier

The invention discloses an element identifier distribution method and an application layer routing method based on element identifier, which is applied in centralized-management multilayer distributedsystems. In the method, node elements and element identifier of each level of a distributed system are established layer by layer; a routing table item based on the element identifier is generated inthe process of generating and distributing the element identifier; and addressing is performed through the element identifier during communication so as to realize application layer routing based onthe element identifier, which is needed by the communication of the centralized-management distributed system. The invention also provides a plurality of default routing rules of the routing method. The application layer routing method which is generated in the invention and based on element identifier is unrelated to TCP/IP (Transmission Control Protocol/Internet Protocol) routing methods, has the characteristics of simplicity, practicability, stability, reliability and resource conservation, and can meet special needs of distributed intrusion detection systems, distributed network auditing systems and various centralized-management multilayer distributed systems.
Owner:BEIJING VENUS INFORMATION TECH

Lightweight distributed intrusion detection method

The invention proposes a lightweight distributed intrusion detection method, and the method comprises the steps of preparing local data for each client, wherein the local data is non-independent identically distributed non-IID flow data and corresponding intrusion detection classification labels; in the training stage, enabling each client to use local data to train a local lightweight gradient boosting machine LGBM, in the prediction stage, inputting test data to each trained LGBM, and obtaining an intrusion detection prediction result output by each LGBM; and after the server collects intrusion detection prediction results output by each LGBM, obtaining a final intrusion detection result aiming at the test data in a voting mode. According to the invention, a lightweight gradient lifting algorithm is introduced on the basis of a traditional decision tree method, and a large number of samples can be effectively processed on non-independent identically-distributed data by combining a decision tree trained by a user. Compared with an existing method based on federated learning, the framework achieves higher accuracy and lower overhead on independent identically distributed data and non-independent identically distributed data.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Distributed Intrusion Detection System and Method Applied to Dynamic Virtualization Environment

InactiveCN103065086BSolve the problem of continuous monitoringSolve the problem of not being able to continuously monitor virtual machinesPlatform integrity maintainanceTransmissionDistributed intrusion detectionVirtualization
The invention provides a distributed intrusion detection system and a distributed intrusion detection method applied to dynamic virtualization environment. The system comprises a detection management center, and intrusion detection engines positioned on physical servers, wherein the detection management center is used for acquiring information of a source physical server and a target physical server to which the current virtual machine belongs before and after migration; a virtualization management server in a virtualization platform performs intrusion detection stop configuration on the intrusion detection engine on the source physical server and performs intrusion detection start configuration on the intrusion detection engine on the target physical server; and the intrusion detection engines are used for performing intrusion detection on specific virtual machines on the corresponding physical servers after an intrusion detection start safety strategy is configured, and stopping intrusion detection of the specific virtual machines on the corresponding physical servers after an intrusion detection stop safety strategy is configured. By the system and the method, the virtual machines can be continuously monitored.
Owner:BEIJING VENUS INFORMATION TECH +1

Distributed intrusion detection method of vehicle ad hoc network

InactiveCN103237308BImprove analysis and detection capabilitiesAdd network transfer functionData switching networksSecurity arrangementDistributed intrusion detectionSystem structure
The invention provides a distributed intrusion detection method of a vehicle ad hoc network. Local detection is started by adopting a Naive Bayesian classification algorithm by vehicle nodes; when an abnormal condition is detected, data are marked to be abnormal and are stored into a local feature library; response measures are immediately adopted by a local response module; meanwhile, abnormal warning is sent out to adjacent nodes and abnormal features are transmitted to the adjacent nodes through an on-line response module, if the adjacent nodes are also abnormal, the abnormal features are transmitted to the local feature library, and response measures are immediately adopted by the local response module; and meanwhile, the abnormal warning is sent to other adjacent nodes and the abnormal features are transmitted to the other adjacent nodes except source nodes of abnormal warning through the on-line response module; and abnormal warning and abnormal feature transmission are continuously passed through the manner, so that distributed intrusion detection of the whole vehicle ad hoc network is realized. With the adoption of the distributed intrusion detection method of the vehicle ad hoc network, analysis and detection ability of the whole vehicle ad hoc network is improved; and the distributed intrusion detection method has the characteristic of being simple in system structure, low in complexity, strong in learning and high in intelligentization degree.
Owner:XIHUA UNIV

An abnormal intrusion detection method for Internet of Vehicles based on the difference of traffic flow density

The invention discloses a vehicle networking abnormal intrusion detection method based on traffic flow density difference, belonging to the field of vehicle networking and network intrusion detection.The invention is provided with an event analysis module in a vehicle-mounted unit and a roadside base station. Firstly, a distributed intrusion detection mechanism or a centralized intrusion detection mechanism is selected according to the difference of the actual traffic flow density in the road network. Then, the network information and traffic information in the vehicle node are obtained by the vehicle unit, and the anomaly intrusion detection in the vehicle network environment is realized by using the event analysis module of the vehicle computer or the roadbed computer and the weighted improved naive Bayesian algorithm to classify the information. The two detection mechanisms of the invention cooperate with each other so that the vehicle node can be detected under any moving speed, thus ensuring the integrity and high efficiency of the intrusion detection, and solving the problem that the traditional intrusion detection system is not adapted to the dynamic change of the vehicle networking communication and the network node moves quickly.
Owner:BEIHANG UNIV

Element identifier distribution method and application layer routing method based on element identifier

The invention discloses an element identifier distribution method and an application layer routing method based on element identifier, which is applied in centralized-management multilayer distributed systems. In the method, node elements and element identifier of each level of a distributed system are established layer by layer; a routing table item based on the element identifier is generated in the process of generating and distributing the element identifier; and addressing is performed through the element identifier during communication so as to realize application layer routing based on the element identifier, which is needed by the communication of the centralized-management distributed system. The invention also provides a plurality of default routing rules of the routing method. The application layer routing method which is generated in the invention and based on element identifier is unrelated to TCP / IP (Transmission Control Protocol / Internet Protocol) routing methods, has the characteristics of simplicity, practicability, stability, reliability and resource conservation, and can meet special needs of distributed intrusion detection systems, distributed network auditing systems and various centralized-management multilayer distributed systems.
Owner:BEIJING VENUS INFORMATION TECH

Distributed intrusion detection method, device and system

The invention relates to the field of network communication, in particular to a distributed intrusion detection method, a distributed intrusion detection device and a distributed intrusion detection system. The method comprises the following steps of: acquiring own flow information and generating a flow table; calculating early warning information according to the flow table; when the flow table only comprises own flow information or when the early warning information meets neighbor communication conditions, acquiring the flow information of a neighbor node and flow information acquisition time, and updating the flow table and the early warning information; when the early warning information meets global communication conditions, acquiring the flow information of a global node and the flow information acquisition time, and updating the flow table and the early warning information; and when the early warning information meets early warning conditions, performing intrusion early-warning. In the technical scheme provided by the embodiment of the invention, only the flow information of the neighbor node needs acquiring when the early warning information meets the neighbor communication conditions, so the data traffic in distributed intrusion detection is reduced and the influence of the distributed intrusion detection on network performance is reduced.
Owner:HUAWEI TECH CO LTD +1

Distributed intrusion detection method based on multilayer extreme learning machine in Internet of Things environment

The invention discloses a distributed intrusion detection method based on a multi-layer extreme learning machine in an Internet of Things environment, and aims to move tasks with heavier calculation for realizing automatic attack detection to boundary equipment due to the characteristic that resources of related equipment are constrained, so as to enable a processing function to be close to a data source. The boundary devices can operate a preset classification model. However, when facing a large amount of training data, there is no sufficient storage and processing capabilities to construct and upgrade such models. In order to solve the problem, training operation with dense calculation and large storage capacity is moved to a cloud server to be carried out, and a single-hidden-layer extreme learning machine model and a multi-hidden-layer extreme learning machine model are constructed and trained in the cloud server, so that boundary equipment executes flow classification based on a deep learning model preset in the cloud server; therefore, whether the traffic is normal traffic or network attack is classified, and experimental analysis shows that the multi-hidden-layer extreme learning machine has better performance.
Owner:HANGZHOU DIANZI UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products