CN102158486A - Method for rapidly detecting network invasion - Google Patents

Method for rapidly detecting network invasion Download PDF

Info

Publication number
CN102158486A
CN102158486A CN2011100842307A CN201110084230A CN102158486A CN 102158486 A CN102158486 A CN 102158486A CN 2011100842307 A CN2011100842307 A CN 2011100842307A CN 201110084230 A CN201110084230 A CN 201110084230A CN 102158486 A CN102158486 A CN 102158486A
Authority
CN
China
Prior art keywords
sample
characteristic
training
characteristic attribute
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100842307A
Other languages
Chinese (zh)
Inventor
李元诚
李盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China Electric Power University
Original Assignee
North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China Electric Power University filed Critical North China Electric Power University
Priority to CN2011100842307A priority Critical patent/CN102158486A/en
Publication of CN102158486A publication Critical patent/CN102158486A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for rapidly detecting network invasion in the technical field of information safety, which is used for solving the problems of low computing speed and poor detection instantaneity of the traditional method for detecting the network invasion. The method disclosed by the invention comprises the following steps: preprocessing the characteristic attributes of each sample with concentrated training; selecting the characteristic attributes of the samples with concentrated training to realize characteristic dimensionality reduction; using the characteristic attributes after the dimensionality reduction to form a first characteristic vector and using the first characteristic vector as the input of a ball vector machine learning algorithm to train a classifier; preprocessing the characteristic attributes of each sample with concentrated testing; selecting the characteristic attributes of the sample with concentrated testing to realize the characteristic dimensionality reduction; using the characteristic attributes after the dimensionality reduction to form a second characteristic vector, using the second characteristic vector as the input of the classifier after training to test the classifier; and judging whether a network is invaded or not according to the testing result. The method disclosed by the invention reduces the complexity of network invasion detecting computation and enhances the instantaneity and accuracy of detection.

Description

A kind of network intrusions method for quick
Technical field
The invention belongs to field of information security technology, relate in particular to a kind of network intrusions method for quick.
Background technology
Along with popularizing and development of information technology, human society has moved towards the networked epoch.Yet the Internet be one towards masses, open network, present Internet protocol for information maintain secrecy and the security consideration of system gets and incomplete, be difficult to safeguard for safety problems such as illegal invasion, assault, confidentiality information leakage.Computer network constantly suffers illegal invasion, and the valuable information data constantly is stolen, thereby makes network invasion monitoring work be faced with great challenge.Existing network inbreak detection method all adopts usually based on the method for machine learning and carries out modeling, and its process is at first to grasp initial data from network, and data are quantized and normalized; Next adopts machine learning algorithm, imports training classifier with the data of handling well as it.
In network invasion monitoring, primary network is connected as a sample, each sample data comprises tens features usually, during modeling all features are carried out quantification treatment and normalized, promptly each raw sample data is represented with the form of vector, thereby with the training set of all vectorial set of forming as grader; Adopt machine learning algorithm then, and import training classifier as it with training set.With the grader that trains the test sample book of input is handled, just can be obtained predicting output valve, belong to the still unusual connection of normal connection to determine it.
Said process is a typical network inbreak detection method of present stage, and the topmost shortcoming of this detection technique is: the initial data of intrusion detection comprises tens features usually, and these data apply in some sorting algorithms, will make classification speed very slow; Not all feature all produces active influence to testing result in tens features that comprise in the initial data in addition, some feature even can produce passive influence.Have, above method considers that the scale of the training data that the classification speed problem adopts usually is less, thereby causes accuracy of detection not high again, and rate of false alarm and rate of failing to report are very high.
Deficiency at the above-mentioned detection technique of mentioning, the present invention proposes a kind of based on LLE (the local linear algorithm that embeds in the manifold learning arithmetic, Locally Linear Embedding) BVM of feature extraction (ball vector machine, Ball Vector Machine) network intrusions method for quick.To comprise normal connection and the sample set that unusually is connected simultaneously as training set, each sample in the training set is quantized and normalized, and the key feature that extracts each sample is to reduce the dimension of intrusion detection data, utilize the classification algorithm training grader then, utilizing the grader that trains that the unknown is connected at last and classify, is normal the connection or unusual the connection to determine it.In the process of sample data being carried out dimensionality reduction, introduce manifold learning arithmetic, the characteristic attribute of great amount of samples is carried out analyzing and processing, finding being hidden in significant low dimensional structures in the high dimensional data, thereby reach the purpose of the high dimensional feature attribute being carried out dimension-reduction treatment.The classification learning algorithm is introduced ball vector machine algorithm, and this algorithm has been introduced the notion of core set, the problem of finding the solution support vector in the SVMs is converted into the problem of finding the solution the smallest sphere (MEB) that comprises training sample set.Because the scale of core set is far smaller than original training sample set, so reduced the cost of solving-optimizing problem greatly.The BVM algorithm can effectively reduce the training time of sample, thereby can effectively improve the real-time of detection under the situation that guarantees verification and measurement ratio.
Summary of the invention
The objective of the invention is to, propose a kind of network intrusions method for quick, it is slow and detect the problem that lacks real-time and accuracy rate to calculate arithmetic speed that the dimension height causes in order to the network inbreak detection method that solves present use.
For achieving the above object, technical scheme provided by the invention is that a kind of network intrusions method for quick is characterized in that described method comprises:
Step 1: comprising normal connection and the sample set that unusually is connected simultaneously, the characteristic attribute of each sample in the training set is carried out preliminary treatment as training set;
Step 2: adopt the local linear algorithm that embeds in the manifold learning arithmetic that the characteristic attribute of sample in the sample set is selected, realize the feature dimensionality reduction;
Step 3: will form first characteristic vector through the characteristic attribute behind step 2 dimensionality reduction, and come training classifier as the input of ball vector machine learning algorithm with described first characteristic vector;
Step 4: the characteristic attribute to each sample in the test set carries out preliminary treatment;
Step 5: adopt the local linear algorithm that embeds in the manifold learning arithmetic that the characteristic attribute of sample in the test set is selected, realize the feature dimensionality reduction;
Step 6: will form second characteristic vector through the characteristic attribute behind step 5 dimensionality reduction, the input of the grader after training as step 3 with described second characteristic vector is tested grader;
Step 7: whether invaded according to the test result decision network.
Described characteristic attribute to each sample in the training set carries out preliminary treatment and specifically comprises:
Step 11: find out the character feature in each sample;
Step 12:, character feature is replaced with the corresponding digital characteristic value according to the antistop list that presets;
Step 13:, and the characteristic attribute in each sample carried out normalized with the characteristic attribute of the numerical characteristic value in each sample as this sample.
Described normalized is used the maximum method for normalizing, specifically adopts formula
Figure BDA0000053697290000031
Carry out normalization
Handle; Wherein Xi is the characteristic attribute of sample, and N is a number of samples.
Described step 2 comprises:
Step 21: utilize the k nearest neighbor method to seek K neighbour's point of each sample, wherein K is a specified value;
Step 22: utilize K the neighbour's point that obtains in the step 21 to construct the partial reconstruction weight matrix of each sample;
Step 23: partial reconstruction weight matrix and K neighbour thereof by each sample put its low-dimensional output valve of calculating.
Described partial reconstruction weight matrix utilizes error function Construct, wherein
Figure BDA0000053697290000042
Described low-dimensional output valve y iSatisfy mapping condition:
Figure BDA0000053697290000043
And
Figure BDA0000053697290000045
Wherein I is the unit matrix on m * m rank.
Described step 3 comprises:
Step 31: given radius r and l=0, and any 1 z in the selection training set makes initial cores collection S as the initial cores collection 0=z}, and according to S 0Calculate the initial center c of spheroid 0
Step 32: carry out interative computation, in the l time iteration, if core set S lComprised the sample in all training sets, promptly all samples all drop on spheroid B (c l, (1+ ε) r) within, then iteration finishes; Otherwise, forward step 33 to; Wherein ε is a set point, and ε>0;
Step 33: in the nuclear feature space, find spheroid B (c l, (1+ ε) r) and outer any sample point φ (x), and generate core set S L+1=S l∪ { x}; Wherein, φ (*) is the nuclear mapping function;
Step 34: by core set S L+1, find the solution S L+1Center c L+1Wherein, c L+1More new formula be: c L+1=φ (x)+β l(c l-φ (x)), β l=r/ ‖ c l-φ (x) ‖.
Step 35: make l=l+1, turn back to step 32.
The present invention has reduced the network invasion monitoring computational complexity, has improved detection real-time and accuracy.
Description of drawings
Fig. 1 is a network intrusions method for quick flow chart;
Fig. 2 adopts the local linearity in the manifold learning arithmetic to embed algorithm carries out the feature dimensionality reduction to sample in the sample set schematic diagram;
Fig. 3 is the flow chart that comes training classifier with characteristic vector as the input of ball vector machine learning algorithm.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.Should be emphasized that following explanation only is exemplary, rather than in order to limit the scope of the invention and to use.
Network intrusions method for quick provided by the invention is based on the BVM network intrusions method for quick of LLE feature extraction, this method helps to solve in the detection method in the past can not be well carries out dimensionality reduction to the characteristic attribute of intrusion detection data, and detects real-time difference and the not high problem of verification and measurement ratio.For this reason, solution of the present invention is: to comprise normal connection and the sample set that unusually is connected simultaneously as training set, each sample in the training set is quantized and normalized, and the LLE algorithm in the employing manifold learning arithmetic extracts the key feature of each sample to reduce the dimension of intrusion detection data, utilize ball vector machine algorithm training classifier then, utilize the grader that trains that the unknown is connected at last and classify, belong to normal connection and still connect unusually to determine it.
Fig. 1 is a network intrusions method for quick flow chart.Among Fig. 1, a kind of network intrusions method for quick provided by the invention comprises the following steps:
Step 1: comprising normal connection and the sample set that unusually is connected simultaneously, the characteristic attribute of each sample in the training set is carried out preliminary treatment as training set.
Training set can be directly from network download.The data set that carries out network invasion monitoring assessment usefulness is specially arranged on the net, be called KDDCUP ' 99 data sets.Sample in the training set is network and connects, and for the grader that training is come out detects test set more exactly, the sample in the training set will comprise normal connection simultaneously and be connected unusually herein.
The attribute of each sample in the training set is carried out preliminary treatment specifically to be comprised:
Step 11: find out the character feature in each sample.Each sample is each connection, comprises numerical characteristic and/or character feature, can be with numerical characteristic (in fact being exactly a numeral) directly as numerical characteristic value.
Step 12:, character feature is replaced with the corresponding digital characteristic value according to the antistop list that presets.
Antistop list comprises two fields at least, is respectively character feature and corresponding numerical characteristic value.Like this, the character feature (in fact being exactly character) of each sample can be converted to numerical value, i.e. numerical characteristic value.
Step 12 is actual to be the quantification treatment process.
Step 13:, and the characteristic attribute in each sample carried out normalized with the characteristic attribute of the numerical characteristic value in each sample as this sample.
Described normalized is used the maximum method for normalizing, specifically adopts formula
Figure BDA0000053697290000061
Carry out normalized; Wherein
Figure BDA0000053697290000062
x iBe the characteristic attribute of sample, N is a number of samples.
Step 2: adopt the local linear algorithm that embeds in the manifold learning arithmetic that the characteristic attribute of sample in the sample set is selected, realize the feature dimensionality reduction.
Fig. 2 adopts local linear in the manifold learning arithmetic to embed algorithm sample in the sample set is carried out the schematic diagram of feature dimensionality reduction, and among Fig. 2, step 2 specifically comprises:
Step 21: utilize the k nearest neighbor method to seek K neighbour's point of each sample, wherein, K is a specified value.
K the sample point nearest with respect to asking sample point is defined as K neighbour's point of the sample point of asking, and wherein, K is a value given in advance.The calculating of distance can be adopted the Euclidean distance computational methods, and the Euclidean distance algorithm is as follows: establish x, y ∈ R N, x then, the Euclidean distance of y can be tried to achieve by following formula:
( Σ i = 1 N ( x i - y j ) 2 ) 1 2
Step 22: utilize K the neighbour's point that obtains in the step 21 to construct the partial reconstruction weight matrix of each sample.
Partial reconstruction weight matrix W=(w Ij) ∈ M N, nBe such weight matrix, if x iWith x jNon-conterminous, w then Ij=0, establish x iWith x Jk(k=1,2 ..., be adjacent K), constraint is then arranged
Figure BDA0000053697290000071
Use XW approximate representation X, can have certain error, the Frobenius norm that defines matrix here is as follows: A=(a I, j) ∈ M M, n, then
Figure BDA0000053697290000072
Seek W by the following formula constraint:
Figure BDA0000053697290000073
Promptly
Figure BDA0000053697290000074
Wherein, x Jk, iRepresent x iK neighbour's point.This is equivalent to ask separating of a series of least square problems.As to x i, can obtain by following equation group
w jk , i : Σ k = 1 K w jk , i = 1 Xw i = x i
Step 23: partial reconstruction weight matrix and K neighbour thereof by each sample put its low-dimensional output valve of calculating.
By weight matrix W, can in lower dimensional space, find suitable y iFinish by following constraint:
Figure BDA0000053697290000076
Y wherein iBe x iOutput vector, y Jk, i(k=1,2 ..., K) be y iNeighbour's point, and to satisfy two conditions: With Wherein I is the unit matrix of m * m.Thus, loss function can be rewritten as:
Figure BDA0000053697290000079
Wherein M is the symmetrical matrix of N * N: M=(I-W) T(I-W).
Make the loss function value reach minimum, then getting Y is minimum m the pairing characteristic vector of nonzero eigenvalue of M.In processing procedure, the characteristic value of M to be arranged from small to large, first characteristic value almost approaches zero, casts out first characteristic value so.Usually get between the 2nd to m+1 the pairing characteristic vector of characteristic value as output the result.
Step 3: will form first characteristic vector through the characteristic attribute behind step 2 dimensionality reduction, and come training classifier as the input of ball vector machine learning algorithm with described first characteristic vector.
Fig. 3 is the flow chart that comes training classifier with characteristic vector as the input of ball vector machine learning algorithm.
Among Fig. 3, step 3 specifically comprises:
Step 31: given radius r, and any 1 the z ∈ S among the selection training set S is as initial cores collection S 0={ z} and according to S 0Calculate the initial center c of spheroid 0Z is actually a sample.
Step 32: carry out interative computation, in the l time iteration, if core set S lComprised the sample in all training sets, promptly all samples all drop on spheroid B (c l, (1+ ε) r) within (ε is a set point, and ε>0), then iteration finishes; Otherwise, forward step 33 to.
Step 33: in the nuclear feature space, find spheroid B (c l, (1+ ε) r) and outer any sample point φ (x), and generate core set S L+1=S l∪ { x}; Wherein, φ (*) is the nuclear mapping function.
Step 34: by core set S L+1, find the solution S L+1Center c L+1Wherein, c L+1More new formula be: c L+1=φ (x)+β l(c l-φ (x)), β l=r/ ‖ c l-φ (x) ‖.
Step 35: make l=l+1, turn back to step 32.
Step 4: the characteristic attribute to each sample in the test set carries out preliminary treatment.
Test set can also can carry out packet capturing to the network connection data in the artificial network by the network true environment is carried out emulation from network download, analyzes acquisition then.
Step 5: adopt the local linear test of heuristics that embeds in the manifold learning arithmetic to concentrate the characteristic attribute of sample to select, realize the feature dimensionality reduction.
The concrete implementation such as the step 2 of step 5, the object that only carries out the feature dimensionality reduction has made test set into by training set.
Step 6: will form second characteristic vector through the characteristic attribute behind step 5 dimensionality reduction, the input of the grader after training as step 3 with described second characteristic vector is tested grader.
The detailed process and the step 3 of this step are similar, only are input as second characteristic vector, and the output result is normal the connection or unusual the connection.
Step 7: whether invaded according to the test result decision network.
According to the output result of step 6, if be normal the connection, then network is invaded; If do not connect unusually, then the decidable network is invaded.
The manifold learning arithmetic that the present invention uses has stronger dimensionality reduction ability, can find the useful feature of data; Ball vector machine learning algorithm is by finding the solution the core set that the minimal closure spheroid obtains sample, because the scale of core set is far smaller than original training sample set, so calculating consuming time and memory headroom that take all reduces greatly, the time of finding the solution of support vector and the cost of solving-optimizing problem have also been reduced simultaneously, both realize the detection of network intrusions behavior, guaranteed the accuracy rate and the real-time that detect again.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (7)

1. network intrusions method for quick is characterized in that described method comprises:
Step 1: comprising normal connection and the sample set that unusually is connected simultaneously, the characteristic attribute of each sample in the training set is carried out preliminary treatment as training set;
Step 2: adopt the local linear algorithm that embeds in the manifold learning arithmetic that the characteristic attribute of sample in the sample set is selected, realize the feature dimensionality reduction;
Step 3: will form first characteristic vector through the characteristic attribute behind step 2 dimensionality reduction, and come training classifier as the input of ball vector machine learning algorithm with described first characteristic vector;
Step 4: the characteristic attribute to each sample in the test set carries out preliminary treatment;
Step 5: adopt the local linear algorithm that embeds in the manifold learning arithmetic that the characteristic attribute of sample in the test set is selected, realize the feature dimensionality reduction;
Step 6: will form second characteristic vector through the characteristic attribute behind step 5 dimensionality reduction, the input of the grader after training as step 3 with described second characteristic vector is tested grader;
Step 7: whether invaded according to the test result decision network.
2. a kind of network intrusions method for quick according to claim 1 is characterized in that described characteristic attribute to each sample in the training set carries out preliminary treatment and specifically comprises:
Step 11: find out the character feature in each sample;
Step 12:, character feature is replaced with the corresponding digital characteristic value according to the antistop list that presets;
Step 13:, and the characteristic attribute in each sample carried out normalized with the characteristic attribute of the numerical characteristic value in each sample as this sample.
3. a kind of network intrusions method for quick according to claim 2 is characterized in that described normalized use maximum method for normalizing, specifically adopts formula Carry out normalized; Wherein Xi is the characteristic attribute of sample, and N is a number of samples.
4. a kind of network intrusions method for quick according to claim 1 is characterized in that described step 2 comprises:
Step 21: utilize the k nearest neighbor method to seek K neighbour's point of each sample, wherein K is a specified value;
Step 22: utilize K the neighbour's point that obtains in the step 21 to construct the partial reconstruction weight matrix of each sample;
Step 23: partial reconstruction weight matrix and K neighbour thereof by each sample put its low-dimensional output valve of calculating.
5. a kind of network intrusions method for quick according to claim 4 is characterized in that described partial reconstruction weight matrix utilizes error function
Figure FDA0000053697280000021
Construct, wherein
6. a kind of network intrusions method for quick according to claim 4 is characterized in that described low-dimensional output valve yi satisfies mapping condition:
Figure FDA0000053697280000023
And
Figure FDA0000053697280000024
Figure FDA0000053697280000025
Wherein I is the unit matrix on m * m rank.
7. a kind of network intrusions method for quick according to claim 1 is characterized in that described step 3 comprises:
Step 31: given radius r and l=0, and any 1 z in the selection training set makes initial cores collection S as the initial cores collection 0=z}, and according to S 0Calculate the initial center c of spheroid 0
Step 32: carry out interative computation, in the l time iteration, if core set S lComprised the sample in all training sets, promptly all samples all drop on spheroid B (c l, (1+ ε) r) within, then iteration finishes; Otherwise, forward step 33 to; Wherein ε is a set point, and ε>0;
Step 33: in the nuclear feature space, find spheroid B (c l, (1+ ε) r) and outer any sample point φ (x), and generate core set S L+1=S l∪ { x}; Wherein, φ (*) is the nuclear mapping function;
Step 34: by core set S L+1, find the solution S L+1Center c L+1Wherein, c L+1More new formula be: c L+1=φ (x)+β l(c l-φ (x)), β l=r/ ‖ c l-φ (x) ‖.
Step 35: make l=l+1, turn back to step 32.
CN2011100842307A 2011-04-02 2011-04-02 Method for rapidly detecting network invasion Pending CN102158486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100842307A CN102158486A (en) 2011-04-02 2011-04-02 Method for rapidly detecting network invasion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100842307A CN102158486A (en) 2011-04-02 2011-04-02 Method for rapidly detecting network invasion

Publications (1)

Publication Number Publication Date
CN102158486A true CN102158486A (en) 2011-08-17

Family

ID=44439669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100842307A Pending CN102158486A (en) 2011-04-02 2011-04-02 Method for rapidly detecting network invasion

Country Status (1)

Country Link
CN (1) CN102158486A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072115A (en) * 2015-08-12 2015-11-18 国家电网公司 Information system invasion detection method based on Docker virtualization
CN106951778A (en) * 2017-03-13 2017-07-14 步步高电子商务有限责任公司 A kind of intrusion detection method towards complicated flow data event analysis
CN107066881A (en) * 2016-12-14 2017-08-18 四川长虹电器股份有限公司 Intrusion detection method based on Kohonen neutral nets
CN107404471A (en) * 2017-04-05 2017-11-28 青海民族大学 One kind is based on ADMM algorithm network flow abnormal detecting methods
CN109962909A (en) * 2019-01-30 2019-07-02 大连理工大学 A kind of network intrusions method for detecting abnormality based on machine learning
CN110198319A (en) * 2019-06-03 2019-09-03 电子科技大学 Security protocol bug excavation method based on more counter-examples
CN110249331A (en) * 2017-01-30 2019-09-17 微软技术许可有限责任公司 For the successive learning of intrusion detection
CN110875912A (en) * 2018-09-03 2020-03-10 中移(杭州)信息技术有限公司 Network intrusion detection method, device and storage medium based on deep learning
CN111753877A (en) * 2020-05-19 2020-10-09 海克斯康制造智能技术(青岛)有限公司 Product quality detection method based on deep neural network transfer learning
CN111797997A (en) * 2020-07-08 2020-10-20 北京天融信网络安全技术有限公司 Network intrusion detection method, model construction method, device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157921A (en) * 1998-05-01 2000-12-05 Barnhill Technologies, Llc Enhancing knowledge discovery using support vector machines in a distributed network environment
CN101478534A (en) * 2008-12-02 2009-07-08 广东海洋大学 Network exception detecting method based on artificial immunity principle

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157921A (en) * 1998-05-01 2000-12-05 Barnhill Technologies, Llc Enhancing knowledge discovery using support vector machines in a distributed network environment
CN101478534A (en) * 2008-12-02 2009-07-08 广东海洋大学 Network exception detecting method based on artificial immunity principle

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李元诚等: "《An Intrusion Detection Method Based on LLE and BVM》", 《INFORMATION NETWORKING AND AUTOMATION(ICINA)》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072115B (en) * 2015-08-12 2018-06-08 国家电网公司 A kind of information system intrusion detection method based on Docker virtualizations
CN105072115A (en) * 2015-08-12 2015-11-18 国家电网公司 Information system invasion detection method based on Docker virtualization
CN107066881A (en) * 2016-12-14 2017-08-18 四川长虹电器股份有限公司 Intrusion detection method based on Kohonen neutral nets
CN110249331A (en) * 2017-01-30 2019-09-17 微软技术许可有限责任公司 For the successive learning of intrusion detection
US11689549B2 (en) 2017-01-30 2023-06-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection
CN106951778A (en) * 2017-03-13 2017-07-14 步步高电子商务有限责任公司 A kind of intrusion detection method towards complicated flow data event analysis
CN107404471A (en) * 2017-04-05 2017-11-28 青海民族大学 One kind is based on ADMM algorithm network flow abnormal detecting methods
CN110875912A (en) * 2018-09-03 2020-03-10 中移(杭州)信息技术有限公司 Network intrusion detection method, device and storage medium based on deep learning
CN109962909B (en) * 2019-01-30 2021-05-14 大连理工大学 Network intrusion anomaly detection method based on machine learning
CN109962909A (en) * 2019-01-30 2019-07-02 大连理工大学 A kind of network intrusions method for detecting abnormality based on machine learning
CN110198319A (en) * 2019-06-03 2019-09-03 电子科技大学 Security protocol bug excavation method based on more counter-examples
CN111753877A (en) * 2020-05-19 2020-10-09 海克斯康制造智能技术(青岛)有限公司 Product quality detection method based on deep neural network transfer learning
CN111753877B (en) * 2020-05-19 2024-03-05 海克斯康制造智能技术(青岛)有限公司 Product quality detection method based on deep neural network migration learning
CN111797997A (en) * 2020-07-08 2020-10-20 北京天融信网络安全技术有限公司 Network intrusion detection method, model construction method, device and electronic equipment

Similar Documents

Publication Publication Date Title
CN102158486A (en) Method for rapidly detecting network invasion
Liu et al. Data anomaly detection for structural health monitoring using a combination network of GANomaly and CNN
CN109858509A (en) Based on multilayer stochastic neural net single classifier method for detecting abnormality
CN112491796A (en) Intrusion detection and semantic decision tree quantitative interpretation method based on convolutional neural network
CN103198251B (en) Hardware Trojan horse recognition method based on neural network
CN108932527A (en) Using cross-training model inspection to the method for resisting sample
CN111562612B (en) Deep learning microseismic event identification method and system based on attention mechanism
CN114429152A (en) Rolling bearing fault diagnosis method based on dynamic index antagonism self-adaption
CN113887136A (en) Improved GAN and ResNet based electric vehicle motor bearing fault diagnosis method
CN114492768A (en) Twin capsule network intrusion detection method based on small sample learning
CN107390259A (en) A kind of nuclide identification method based on SVD and SVM
Xu et al. Rail defect detection method based on recurrent neural network
CN115277189B (en) Unsupervised intrusion flow detection and identification method based on generation type countermeasure network
Potluri et al. Deep feature extraction for multi-class intrusion detection in industrial control systems
CN110677437A (en) User disguised attack detection method and system based on potential space countermeasure clustering
CN111310719B (en) Unknown radiation source individual identification and detection method
CN111458145A (en) Cable car rolling bearing fault diagnosis method based on road map characteristics
He et al. Wood species identification based on an ensemble of deep convolution neural networks
CN112836274B (en) Data fusion method for tracing and auditing hidden engineering
Wei et al. Distributed sparse approximation for frog sound classification
AU2021104460A4 (en) an electromagnetic attack method of AES cryptographic chip based on neural network
CN112528849B (en) Structure health monitoring method based on inner product matrix and deep learning
CN106530199A (en) Multimedia integrated steganography analysis method based on window hypothesis testing
Liu et al. Automatic terahertz recognition of hidden defects in layered polymer composites based on a deep residual network with transfer learning
CN110807399A (en) Single-category support vector machine-based collapse and slide hidden danger point detection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110817