CN107241358A - A kind of smart home intrusion detection method based on deep learning - Google Patents

A kind of smart home intrusion detection method based on deep learning Download PDF

Info

Publication number
CN107241358A
CN107241358A CN201710651758.5A CN201710651758A CN107241358A CN 107241358 A CN107241358 A CN 107241358A CN 201710651758 A CN201710651758 A CN 201710651758A CN 107241358 A CN107241358 A CN 107241358A
Authority
CN
China
Prior art keywords
data
neural network
network
deep learning
smart home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710651758.5A
Other languages
Chinese (zh)
Other versions
CN107241358B (en
Inventor
胡向东
杨柳
胡蓉
程占喻
唐贤伦
白银
邢有权
李秋实
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201710651758.5A priority Critical patent/CN107241358B/en
Publication of CN107241358A publication Critical patent/CN107241358A/en
Application granted granted Critical
Publication of CN107241358B publication Critical patent/CN107241358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Abstract

The invention discloses a kind of smart home intrusion detection method based on deep learning, it is related to on-line system and is related to a kind of method that fuzzy neural network and deep learning be combined to judge that network whether there is intrusion behavior.This method organically combines deep learning and fuzzy neural network, and solution existing smart home Intrusion Detection Technique is difficult to handle the problem of a large amount of high dimensional datas, rate of false alarm are high, rate of failing to report is high, verification and measurement ratio is low.The present invention determines the operational factor of on-line system using off-line system, on-line system carries out real-time intrusion detection, compared with prior art, this is an actively monitoring model for being directed to intelligent home network attack, with higher verification and measurement ratio, relatively low rate of failing to report and rate of false alarm, and it is real-time the features such as.

Description

A kind of smart home intrusion detection method based on deep learning
Technical field
The present invention relates to smart home security fields, more particularly to a kind of multilayer neural network invasion based on deep learning Behavioral value method.
Background technology
With the fast development of technology of Internet of things, the Internet of product such as smart home is gradually gained popularity, however, intelligence at present The security protection ability of energy equipment is universal more weak, and upgrade maintenance mechanism is unsound, smart machine security configuration is unreasonable etc. Problem causes smart machine to there is more potential safety hazard.As country proposes and implements " internet+" action plan in recent years, " plan of made in China 2025 ", smart city construction etc., substantial amounts of smart machine is continued to bring out, but corresponding safety precautions Perfect not enough, smart home is moving towards increasing family, smart home system as a kind of emerging Internet of Things application System includes a variety of smart machines such as camera, router, gateway, and these equipment have right and detour, refuse service, information and let out The information security leaks such as dew, attacker relatively easily can be launched a offensive using these leaks to intelligent home network, so that The privacy leakage of user, intelligent home network is caused normally to use, so that the problems such as other properties or personal safety.
Existing intelligent domestic system is perfect not enough in terms of security, and most of intelligent domestic system is using fire prevention The technologies such as wall, certification or encryption improve its security, and these technologies belong to Passive Defence, for some specific attacks Effect is preferable, it is impossible to is actively discovered attack and takes disposal or precautionary measures in time.
The content of the invention
In view of this, it is an object of the invention to provide a kind of rate of failing to report is low, verification and measurement ratio is high, detection rates are fast towards intelligence The intrusion detection method of household.
The purpose of the present invention is achieved through the following technical solutions, a kind of smart home invasion based on deep learning Detection method, specifically includes following steps:
S1 is initialized, and one content of generation is empty off-line system database, and the training that database includes tape label is tested Data, data screening link parameter, three subdata bases of multitiered network parameter based on deep learning;
S2 is encoded the data on flows with label collected, normalized formation data to be tested, will be treated In the training test data subdata base for detecting data Cun Chudao tape labels;
S3 is classified the data in the training test data subdata base of tape label according to the label of every data, shape Into normal behaviour sample data set and intrusion behavior sample data set;Asked using K-means algorithms in two class sample data sets Center value, two class sample datas of analysis concentrate the distance at each sample distance sample center and set a judgment threshold so that tool There is the sample data set of certain category feature in such threshold range, center of a sample and threshold value are saved in data screening link ginseng In number subdata base;Using in the training test data subdata base of tape label data training multilayer neural network weights and Bias, the neural network parameter trained is saved in the multilayer neural network parameter subdata base based on deep learning, Training link is completed, step S4 progress on-line systems is jumped to and monitors in real time;
S4, the data on flows without label collected encoded and normalized, form a testing data, meter Testing data is calculated to the distance at two class sample data set centers in step S3, institute is right if the distance is less than the sample data set The threshold value answered, then belong to the class behavior, otherwise jumps to step S5;
S5, by step S4 can not certain type of data to be tested be input in multilayer neural network and be identified, pass through The output valve of multilayer neural network judges whether potential safety hazard, if there is potential safety hazard then drives smart home to alarm Module is alarmed.
Further, in step s3, the training data of tape label in off-line system database is determined using K-means algorithms The center of a sample of two class behaviors in storehouse, and calculate off-line system database midpoint to the Euclidean distance of center of a sample, to away from From the distance threshold that data screening link is determined using Pauta criterion.
Further, it is described by step S4 can not certain type of data to be tested be input in multilayer neural network and known Data Dimensionality Reduction Bao Kuo not be carried out using depth confidence network and fuzzy neural network is identified.
Further, described multilayer neural network includes depth confidence network and fuzzy neural network, depth confidence network Output as fuzzy neural network input, wherein deep neural network by it is multiple limitation Boltzmann machines constitute.
Further, in step s 2, the data in the training test data subdata base using tape label train multilayer In the weights and bias of neutral net, multilayer neural network is trained including the training to depth confidence network and obscured The training of neutral net.
Further, unsupervised training from bottom to top is included to the training of depth confidence network and top-down has supervision Small parameter perturbations;Training to fuzzy neural network uses gradient descent method.
Further, by the detection of reconstructed error, multilayer neural network that Boltzmann machine is limited in depth confidence network Rate and detection time etc. build the depth that an assessment models determine multilayer neural network, that is, determine in depth confidence network Limit the number of Boltzmann machine.
Further, when reconstructed error is more than 0.1, network depth increase by 1 is increasing by one in depth confidence network Limit Boltzmann machine.
Further, if the reconstructed error of depth confidence network is less than 0.1, by the verification and measurement ratio for assessing multilayer neural network And detection time, and the computing capability of combination intelligent domestic system server chooses the suitable number for limiting Boltzmann machine, Determine the network depth of IDS Framework.
By adopting the above-described technical solution, the present invention has the advantage that:
The present invention is combined using on-line detecting system and off-line system, overcomes traditional detection method speed slowly and exists The problem of larger hysteresis quality;Compared with traditional intrusion detection method, introduce deep learning and fuzzy neural network is combined Multilayer neural network, is capable of detecting when some unknown intrusion behaviors, rejects some wrong reports brought due to human operational error Behavior, i.e., have the advantage that rate of false alarm is low, verification and measurement ratio is high using such scheme.
Brief description of the drawings
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into The detailed description of one step, wherein:
Fig. 1 is the flow chart of intrusion detection of the present invention;
Fig. 2 is intelligent domestic system structure chart of the present invention;
Fig. 3 is multilayer neural network training method schematic diagram of the present invention;
Fig. 4 is limitation Boltzmann machine structure chart of the present invention;
Fig. 5 is structure chart of the invention.
Embodiment
Below with reference to accompanying drawing, the preferred embodiments of the present invention are described in detail;It should be appreciated that preferred embodiment Only for the explanation present invention, the protection domain being not intended to be limiting of the invention.
Overhaul flow chart shown in reference picture 1, smart home intrusion detection method, comprises the following steps:
101st, initialize, one content of generation is empty off-line system database, database include tape label training and Test data, data screening link parameter, three subdata bases of multitiered network parameter based on deep learning;
102nd, intelligent domestic system is made up of sensor node, routing node, server, client etc., smart home Composition is as shown in Fig. 2 using flow packet capturing software grabs smart home home server gateway with label data on flows, will adopt The data collected are encoded, normalized formation data to be tested, are added to band mark in the off-line system database in 101 In the training test database of label, step 103 is jumped to.
103rd, the data with label are classified according to the label of every data in the off-line system database in 101, Form normal behaviour sample data set and intrusion behavior sample data set.Two class sample data sets are asked using K-means algorithms Central value and distance one judgment threshold of setting for analyzing each sample distance sample center so that the sample with certain category feature Center of a sample and threshold value are saved in data screening link parameter subdata base by data set in such threshold range;Adopt The weights and bias of multilayer neural network are trained with the data in the training test data subdata base of tape label, will be trained Neural network parameter be saved in the multilayer neural network parameter subdata base based on deep learning, complete training link, jump Step 104 progress on-line system is gone to monitor in real time.
104th, captured using flow packet capturing software grabs smart home server gateway without label data on flows, to grabbing The data taken are encoded and normalized, form a testing data, are completed data screening link, that is, are calculated testing data The distance at the two class sample data set centers in 103, is the class behavior if the threshold value that the distance is less than a certain class behavior, Otherwise step 105 is jumped to.
105th, by step 104 can not certain type of data to be tested be input in multilayer neural network and be identified, its Include carrying out Data Dimensionality Reduction using depth confidence network and fuzzy neural network is identified.If multilayer neural network output exists [0,1.2], it is secure data to illustrate the data;If multitiered network be output as (1.2,2.5], illustrate the data exist safety it is hidden Suffer from, alarm module can be driven to alarm, if output data then illustrates that network can not be known to data not in [0,2.5] is interval Not, store data into off-line system, member to be managed checks and judges that the data whether there is potential safety hazard.
In step 103 in data screening link,
Parameters of the A needed for off-line system determines data screening link.In off-line system in the tranining database of tape label The determination of the center of a sample of two class behaviors is to use K-means algorithms, and the algorithm is a kind of clustering algorithm, to there is the data of label Cluster centre is asked for, and calculates offline rule base midpoint to the Euclidean distance of center of a sample Its, wherein (X1..., Xk) it is center of a sample, (x1..., xk) it is testing data, adjusting the distance, it is accurate to be also referred to as 3 σ using Pauta criterion Then it is determined the distance threshold of data screening link.
Data screening links of the B in on-line detecting system, is calculated in data to be tested and off-line system in two class samples The distance of the heart, chooses less distance and enters with this apart from the classification where corresponding center of a sample in the threshold value that off-line system is set Row compares, and then belongs to the category if less than the threshold value, the category is then not belonging to if greater than the threshold value, then carries out subsequently many Layer neutral net detection.
Multilayer neural network algorithm in step 105, including:
A to being trained in off-line system to multilayer neural network parameters, its training method as shown in figure 3, its Include the training to depth confidence network and the training of fuzzy neural network.The training of depth confidence network is included from lower On unsupervised training and the top-down small parameter perturbations for having a supervision, the training to fuzzy neural network declined using gradient Method.
B wherein depth confidence networks are made up of multiple limitation Boltzmann machines, and its model is an energy based on probability Model, its principle such as Fig. 4 approaches the probability for obtaining hidden layer V by Gibbs sampling algorithms, and likelihood function logarithm is to parameter derivation Method shows layer bias a and b to ask for the weights W and hidden layer of depth confidence network.It regard the output of depth confidence network as mould The input of paste neutral net is classified to behavior, the numeral between output one [0,2.5].Sentenced according to the numeral of output The classification broken belonging to it.
Reconstructed error, the verification and measurement ratio of multilayer neural network and inspection that C passes through limitation Boltzmann machine in depth confidence network Survey time etc. builds the depth that an assessment models determine multilayer neural network, that is, determines to limit glass in depth confidence network The number of the graceful machine of Wurz.When reconstructed error is more than 0.1, network depth increase by 1 is increasing by one in depth confidence network Limit Boltzmann machine, if depth confidence network reconfiguration error be less than 0.1, by assess multilayer neural network verification and measurement ratio and Detection time, and combine that the factors such as the computing capability of intelligent domestic system server choose suitable limitation Boltzmann machine Number, determines the network depth of IDS Framework.
The present invention is applied to the intrusion detection for intelligent home network, uses intrusion detection side disclosed in this invention Method, due to deep learning and fuzzy neural network being organically combined, can reach that rate of false alarm is low, false drop rate is low, verification and measurement ratio High effect, also has preferable detectability for unknown intrusion behavior, and with preferable adaptive ability.
In traditional method, rate of false alarm is generally higher, and method of the invention can make rate of false alarm be reduced to less than 5%, Simultaneously in terms of verification and measurement ratio, more than 95% can be reached.At the same time, for unknown new intrusion behavior, its verification and measurement ratio exists More than 60%.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, it is clear that those skilled in the art Member can carry out various changes and modification to the present invention without departing from the spirit and scope of the present invention.So, if the present invention These modifications and variations belong within the scope of the claims in the present invention and its equivalent technologies, then the present invention is also intended to include these Including change and modification.

Claims (9)

1. a kind of smart home intrusion detection method based on deep learning, it is characterised in that:Specifically include following steps:
S1 is initialized, and one content of generation is empty off-line system database, database include tape label training test data, Data screening link parameter, three subdata bases of multitiered network parameter based on deep learning;
S2 is encoded the data on flows with label collected, normalized formation data to be tested, will be to be detected In the training test data subdata base of data Cun Chudao tape labels;
S3 is classified the data in the training test data subdata base of tape label according to the label of every data, is formed just Normal behavior sample data set and intrusion behavior sample data set;The central value of two class sample data sets is sought using K-means algorithms, Analyze two class sample datas to concentrate the distance at each sample distance sample center and set a judgment threshold so that with certain class Center of a sample and threshold value are saved in data screening link parameter subnumber by the sample data set of feature in such threshold range According in storehouse;Weights and biasing using the data training multilayer neural network in the training test data subdata base of tape label Value, the neural network parameter trained is saved in the multilayer neural network parameter subdata base based on deep learning, is completed Link is trained, step S4 progress on-line systems is jumped to and monitors in real time;
S4, the data on flows without label collected encoded and normalized, form a testing data, calculating is treated Data are surveyed to the distance at two class sample data set centers in step S3, if the distance is less than corresponding to the sample data set Threshold value, then belong to the class behavior, otherwise jumps to step S5;
S5, by step S4 can not certain type of data to be tested be input in multilayer neural network and be identified, pass through multilayer The output valve of neutral net judges whether potential safety hazard, then drives smart home alarm module if there is potential safety hazard Alarm.
2. a kind of smart home intrusion detection method based on deep learning according to claim 1, it is characterised in that: In step S3, the sample of two class behaviors in the tranining database of tape label in off-line system database is determined using K-means algorithms This center, and off-line system database midpoint is calculated to the Euclidean distance of center of a sample, adjust the distance and use Pauta criterion It is determined the distance threshold of data screening link.
3. a kind of smart home intrusion detection method based on deep learning according to claim 1, it is characterised in that:Institute State by step S4 can not certain type of data to be tested be input in multilayer neural network and be identified including being put using depth Communication network carries out Data Dimensionality Reduction and fuzzy neural network is identified.
4. a kind of smart home intrusion detection method based on deep learning according to claim 1, it is characterised in that:Institute The multilayer neural network stated includes depth confidence network and fuzzy neural network, and the output of depth confidence network is used as fuzzy neural The input of network, wherein deep neural network are made up of multiple limitation Boltzmann machines.
5. a kind of smart home intrusion detection method based on deep learning according to claim 1, it is characterised in that: In step S2, weights of the data training multilayer neural network in the training test data subdata base using tape label and inclined Put in value, multilayer neural network is trained including the training and the training of fuzzy neural network to depth confidence network.
6. a kind of smart home intrusion detection method based on deep learning according to claim 5, it is characterised in that:It is right The training of depth confidence network includes unsupervised training from bottom to top and the top-down small parameter perturbations for having a supervision;To fuzzy The training of neutral net uses gradient descent method.
7. a kind of smart home intrusion detection method based on deep learning according to claim 3, it is characterised in that:It is logical Cross in depth confidence network and limit the structure such as reconstructed error, the verification and measurement ratio of multilayer neural network and detection time of Boltzmann machine One assessment models determines the depth of multilayer neural network, that is, determines of limitation Boltzmann machine in depth confidence network Number.
8. a kind of smart home intrusion detection method based on deep learning according to claim 7, it is characterised in that: When reconstructed error is more than 0.1, network depth increase by 1 is increasing a limitation Boltzmann machine in depth confidence network.
9. a kind of smart home intrusion detection method based on deep learning according to claim 7, it is characterised in that:If When the reconstructed error of depth confidence network is less than 0.1, by assessing the verification and measurement ratio and detection time of multilayer neural network, and combine The computing capability of intelligent domestic system server chooses the number of suitable limitation Boltzmann machine, determines IDS Framework Network depth.
CN201710651758.5A 2017-08-02 2017-08-02 Smart home intrusion detection method based on deep learning Active CN107241358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710651758.5A CN107241358B (en) 2017-08-02 2017-08-02 Smart home intrusion detection method based on deep learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710651758.5A CN107241358B (en) 2017-08-02 2017-08-02 Smart home intrusion detection method based on deep learning

Publications (2)

Publication Number Publication Date
CN107241358A true CN107241358A (en) 2017-10-10
CN107241358B CN107241358B (en) 2020-04-07

Family

ID=59989480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710651758.5A Active CN107241358B (en) 2017-08-02 2017-08-02 Smart home intrusion detection method based on deep learning

Country Status (1)

Country Link
CN (1) CN107241358B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895171A (en) * 2017-10-31 2018-04-10 天津大学 A kind of intrusion detection method based on K averages Yu depth confidence network
CN108234500A (en) * 2018-01-08 2018-06-29 重庆邮电大学 A kind of wireless sense network intrusion detection method based on deep learning
CN108683658A (en) * 2018-05-11 2018-10-19 上海交通大学 Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models
CN108984904A (en) * 2018-07-17 2018-12-11 北京理工大学 A kind of Home Fashion & Design Shanghai method based on deep neural network
CN110581802A (en) * 2019-08-27 2019-12-17 北京邮电大学 fully-autonomous intelligent routing method and device based on deep belief network
CN110661781A (en) * 2019-08-22 2020-01-07 中科创达软件股份有限公司 DDoS attack detection method, device, electronic equipment and storage medium
CN111131069A (en) * 2019-11-25 2020-05-08 北京理工大学 Abnormal encryption flow detection and classification method based on deep learning strategy
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN112769750A (en) * 2020-12-11 2021-05-07 广东电力通信科技有限公司 Protocol stack sending method suitable for intelligent gateway data management
CN113392403A (en) * 2021-06-11 2021-09-14 连云港微部落网络技术有限公司 Website security defense system and method with active defense function
CN113645231A (en) * 2021-08-10 2021-11-12 北京易通信联科技有限公司 Intrusion detection method, memory and processor of industrial control system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6114976A (en) * 1999-02-05 2000-09-05 The Boeing Company Vehicle emergency warning and control system
US20130116920A1 (en) * 2011-11-07 2013-05-09 International Business Machines Corporation System, method and program product for flood aware travel routing
CN103336992A (en) * 2013-06-27 2013-10-02 电子科技大学 FNN learning algorithm
CN104777418A (en) * 2015-05-11 2015-07-15 重庆大学 Analog circuit fault diagnosis method based on depth Boltzman machine
CN104935600A (en) * 2015-06-19 2015-09-23 中国电子科技集团公司第五十四研究所 Mobile ad hoc network intrusion detection method and device based on deep learning
CN106911669A (en) * 2017-01-10 2017-06-30 浙江工商大学 A kind of DDOS detection methods based on deep learning

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6114976A (en) * 1999-02-05 2000-09-05 The Boeing Company Vehicle emergency warning and control system
US20130116920A1 (en) * 2011-11-07 2013-05-09 International Business Machines Corporation System, method and program product for flood aware travel routing
CN103336992A (en) * 2013-06-27 2013-10-02 电子科技大学 FNN learning algorithm
CN104777418A (en) * 2015-05-11 2015-07-15 重庆大学 Analog circuit fault diagnosis method based on depth Boltzman machine
CN104935600A (en) * 2015-06-19 2015-09-23 中国电子科技集团公司第五十四研究所 Mobile ad hoc network intrusion detection method and device based on deep learning
CN106911669A (en) * 2017-01-10 2017-06-30 浙江工商大学 A kind of DDOS detection methods based on deep learning

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GUANGZHEN ZHAO: "《Intrusion Detection using Deep Belief Network and Probabilistic Neural Network》", 《2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC)》 *
MD. ZAHANGIR ALOM: "Intrusion Detection using Deep Belief Networks", 《2015 NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE》 *
安琪: "基于深度置信网络的入侵检测研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895171A (en) * 2017-10-31 2018-04-10 天津大学 A kind of intrusion detection method based on K averages Yu depth confidence network
CN108234500A (en) * 2018-01-08 2018-06-29 重庆邮电大学 A kind of wireless sense network intrusion detection method based on deep learning
CN108683658A (en) * 2018-05-11 2018-10-19 上海交通大学 Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models
CN108683658B (en) * 2018-05-11 2020-11-03 上海交通大学 Industrial control network flow abnormity identification method based on multi-RBM network construction reference model
CN108984904A (en) * 2018-07-17 2018-12-11 北京理工大学 A kind of Home Fashion & Design Shanghai method based on deep neural network
CN108984904B (en) * 2018-07-17 2022-09-20 北京理工大学 Home design method based on deep neural network
CN110661781B (en) * 2019-08-22 2022-05-17 中科创达软件股份有限公司 DDoS attack detection method, device, electronic equipment and storage medium
CN110661781A (en) * 2019-08-22 2020-01-07 中科创达软件股份有限公司 DDoS attack detection method, device, electronic equipment and storage medium
CN110581802A (en) * 2019-08-27 2019-12-17 北京邮电大学 fully-autonomous intelligent routing method and device based on deep belief network
CN111131069A (en) * 2019-11-25 2020-05-08 北京理工大学 Abnormal encryption flow detection and classification method based on deep learning strategy
CN111131069B (en) * 2019-11-25 2021-06-08 北京理工大学 Abnormal encryption flow detection and classification method based on deep learning strategy
CN112769750A (en) * 2020-12-11 2021-05-07 广东电力通信科技有限公司 Protocol stack sending method suitable for intelligent gateway data management
CN112689281A (en) * 2020-12-21 2021-04-20 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN112689281B (en) * 2020-12-21 2022-08-05 重庆邮电大学 Sensor network malicious node judgment method based on two-type fuzzy system
CN113392403A (en) * 2021-06-11 2021-09-14 连云港微部落网络技术有限公司 Website security defense system and method with active defense function
CN113645231A (en) * 2021-08-10 2021-11-12 北京易通信联科技有限公司 Intrusion detection method, memory and processor of industrial control system

Also Published As

Publication number Publication date
CN107241358B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN107241358A (en) A kind of smart home intrusion detection method based on deep learning
CN103581186B (en) A kind of network security situational awareness method and system
CN104486141B (en) A kind of network security situation prediction method that wrong report is adaptive
CN108566364B (en) Intrusion detection method based on neural network
CN104935600A (en) Mobile ad hoc network intrusion detection method and device based on deep learning
Aziz et al. Genetic algorithm with different feature selection techniques for anomaly detectors generation
CN107241226A (en) Fuzz testing method based on industry control proprietary protocol
CN109818798A (en) A kind of wireless sensor network intruding detection system and method merging KPCA and ELM
TW200849917A (en) Detecting method of network invasion
CN106789904A (en) Internet of things intrusion detection method and device
CN108322445A (en) A kind of network inbreak detection method based on transfer learning and integrated study
CN108632269A (en) Detecting method of distributed denial of service attacking based on C4.5 decision Tree algorithms
CN112565270A (en) HTTP session abnormity detection method and detection system
CN110445766A (en) Ddos attack method for situation assessment and device
CN110493142A (en) Mobile applications Activity recognition method based on spectral clustering and random forests algorithm
Chen et al. An effective metaheuristic algorithm for intrusion detection system
CN102195975A (en) Intelligent NIPS (Network Intrusion Prevention System) framework for quantifying neural network based on mobile agent (MA) and learning vector
CN112685272B (en) Interpretable user behavior abnormity detection method
Tran Network anomaly detection
Petrovic et al. Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques
Devaraju et al. Performance comparison of intrusion detection system using various techniques–A review
Salazar et al. Monitoring approaches for security and safety analysis: application to a load position system
Bahrepour et al. Fire data analysis and feature reduction using computational intelligence methods
Palomo et al. An intrusion detection system based on hierarchical self-organization
Manandhar A practical approach to anomaly-based intrusion detection system by outlier mining in network traffic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant