CN107220540A - Intrusion detection method based on intensified learning - Google Patents
Intrusion detection method based on intensified learning Download PDFInfo
- Publication number
- CN107220540A CN107220540A CN201710256845.0A CN201710256845A CN107220540A CN 107220540 A CN107220540 A CN 107220540A CN 201710256845 A CN201710256845 A CN 201710256845A CN 107220540 A CN107220540 A CN 107220540A
- Authority
- CN
- China
- Prior art keywords
- intrusion detection
- state
- intensified learning
- detection
- environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/29—Graphical models, e.g. Bayesian networks
- G06F18/295—Markov models or related models, e.g. semi-Markov models; Markov random fields; Networks embedding Markov models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Medical Informatics (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The invention discloses a kind of intrusion detection method based on intensified learning, including being modeled to intrusion detection environment, a markoff process is simulated in intrusion detection environment, among the classification and Detection environment that intensified learning model is used for intrusion detection, learn optimal classification policy by intensified learning, it regard classification accuracy rate as the reward functions in intensified learning model, set up the Bellman equations based on intrusion detection markoff process, optimal solution is calculated using the Policy evaluation algorithm awarded based on the γ accoumulation of discounts, normal behaviour and the threshold value of improper behavior in intrusion detection can be determined, be conducive to constantly so that normal behaviour sequence is supplemented, the final verification and measurement ratio for improving intrusion detection, reduce rate of false alarm and rate of failing to report, finally lift the performance of whole intruding detection system.
Description
Technical field
The invention belongs to Intrusion Detection Technique field, and in particular to a kind of intrusion detection method based on intensified learning.
Background technology
With the popularization of network and smart mobile phone, network security problem becomes increasingly conspicuous, and how to ensure the safety of network system
Become a urgent problem to be solved.Intrusion Detection Technique by collect operating system, system program, application program and
The information such as network traffics bag, find to run counter to security strategy in monitored system or network, or jeopardize the behavior of system safety, are to protect
The effective means of barrier system and network security.Machine learning is with the automatic acquisition of knowledge and is produced as goal in research, is artificial
One of key problem of intelligence.Machine learning has with many other subjects such as statistics, psychology, robotics to intersect.Its
In, the cross-synthesis of the psychology of learning and machine learning, which have directly facilitated intensified learning and have been also known as to do, strengthens study or reinforcement function reason
By the generation and development with algorithm.So-called intensified learning be it is a kind of using environmental feedback as input, it is special, adapt to environment
Machine learning method, its main thought is to realize the excellent of decision-making with environmental interaction and trial and error, the feedback signal of Utilization assessment
Change.This is also the Basic Ways of the mankind or animal learning in nature.
Intruding detection system is a kind of network safety system of Initiative Defense attack, by detection principle be divided into Misuse detection and
Abnormality detection.Misuse detection is built upon on the basis of known attack, and the unknown attack to system lacks adaptivity, rate of failing to report
It is very high.Abnormality detection is then built upon on the normal behaviour model of network and system, it is intended that it is desirable that reduction intrusion detection
Wrong report and rate of failing to report.Method based on abnormality detection is a lot, have statistical analysis, Bayesian network, neutral net, data mining,
Genetic algorithm etc., where the shoe pinches are to be difficult to determine threshold values normally with exception, and rate of false alarm and rate of failing to report are also higher.
The content of the invention
The present invention proposes a kind of intrusion detection method based on intensified learning, it is therefore an objective to improve the verification and measurement ratio of intrusion detection,
Rate of false alarm and rate of failing to report are reduced, the performance of whole intruding detection system is finally lifted.
A kind of intrusion detection method based on intensified learning, comprises the following steps:
Step 1:Set up four key elements of the intensified learning of intrusion detection:Environment, learner, Reward Program, strategy;The ring
Border is in intruding detection system, and the learner is intrusion detection classification agent, analyzes intrusion detection relevant information, including normal
State and abnormal condition, the Reward Program are intrusion detection verification and measurement ratio i.e. classification accuracy rates, and the strategy is intrusion detection
Optimal detection side;
Step 2:Set up the markoff process based on intrusion detection:One is turned to by the classification agent of intrusion detection is abstract
Learner, its state is one Ma Erke of logical relation composition of normal condition or abnormality, normal condition and abnormality
Husband's process, i.e.,:The state of subsequent time is only relevant with the state at this moment, and all unrelated with the state at conventional any moment;
Step 3:Learn the optimal classification strategy of intrusion detection:Environment is modeled, simulate it is identical with environment or
Approximate situation, obtains the Bellman equations of the recursive form of the intensified learning based on intrusion detection, the equation on this basis
Including two functions:" state value function " and " state-action value function ", represents to specify in " state " and specify " shape respectively
Accumulation award in state-action ", accumulation reward functions use γ accumulation of discounts to award;
Step 4:The solution of optimal solution is carried out to the value function of intrusion detection strategy:Determine that the Markov of intrusion detection is determined
Plan process four-tuple, accumulation award parameter γ, setting convergence threshold, are next based on the Iteration algorithm of γ accumulation of discounts award,
Obtain the optimum detection strategy of intrusion detection.
The step 1 is concretely comprised the following steps:
Step 1.1, the study key element according to intensified learning, set up the academic environment of intensified learning:In intruding detection system
It is interior;The learner of intensified learning is set:Intrusion detection classification agent;
Step 1.2, the Reward Program R for defining intensified learning:Intrusion detection verification and measurement ratio is classification accuracy rate;Definition strategy S:
The optimum detection methodology of intrusion detection;
Step 1.3, the action x, motion space X for defining intensified learning learner:Analyze various network logs, host information
Deng intrusion detection relevant information;Definition status x, state space X:It is divided into two kinds of normal condition and abnormality.
Markov decision process four-tuple described in step 4 is<X,A,P,R>;Wherein P:X × A × X → R specifies shape
State transition probability;R:X × A × X → R specifies award, and P is potential transfer function so that environment presses certain from current state
Probability is transferred to another state.
The present invention simulates a Markov mistake by being modeled to intrusion detection environment in intrusion detection environment
Journey, learns optimal classification policy by intensified learning, it may be determined that normal behaviour and improper behavior in intrusion detection
Threshold value, is conducive to constantly so that normal behaviour sequence is supplemented, the verification and measurement ratio of raising intrusion detection reduces rate of false alarm and leakage
Report rate, finally lifts the performance of whole intruding detection system.
Brief description of the drawings
Fig. 1 is the structure flow chart of the intensified learning environment based on intrusion detection;
Fig. 2 is the markoff process flow chart for defining intruding detection system;
Fig. 3 draws intrusion detection optimal detection strategic process figure to solve Bellman equations.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Step 1):Four key elements of the intensified learning of an intrusion detection are set up, i.e.,:Environment, learner, Reward Program, plan
Slightly.First, the environment of study makes in intruding detection system, and learner is intrusion detection classification agent, and Reward Program is invasion
Detect that verification and measurement ratio is classification accuracy rate, strategy is the optimal detection side of intrusion detection.Secondly, the execution of learner, which is acted, to be
The intrusion detection relevant information such as various network logs, host information is analyzed, state is divided into two kinds of normal condition and abnormality.
Step 1.1, intensified learning emphasizes how to be taken action based on environment, and to obtain maximized antedated profit, essence is
In order to solve " decision-making " problem, that is, learn automatic and carry out decision-making, be a kind of mode of learning of constantly " trial and error ".Therefore will be strong
Chemistry, which is practised, to be applied in intrusion detection, is primarily to set up the study key element of an intensified learning, that is, is set up intensified learning
Practise environment:In intruding detection system;Define the learner of intensified learning:Intrusion detection classification agent;
Step 1.2, machine to do is to learn one " strategy " by being constantly trying in the environment, according to this plan
Slightly, action in this condition with regard to that can know to perform;Definition strategy S is the optimum detection methodology of intrusion detection;Strategy has
Two kinds of method for expressing:One kind is that strategy is expressed as into function π:X → A, deterministic policy commonly uses this expression;Another is probability
Represent π:X × A → R, randomness strategy commonly uses this expression, and (x, a) acts a probability to π for selection under state x, necessary here
There is ∑aπ (x, a)=1;The quality of strategy depends on performing the accumulation award obtained after this strategy for a long time, appoints in intensified learning
In business, the destination of study, which seeks to find, can make long-term accumulated award maximized strategy, and long-term accumulated award has a variety of calculating
Mode, conventional has " T step accumulations award " and " award of γ accumulation of discounts ";Define intensified learning award Reward Program R be into
Invade detection verification and measurement ratio i.e. classification accuracy rate;
Step 1.3, the final award of intensified learning task be multistep action after just it is observed that, it is highly desirable to pass through
Attempt to find the result of each action generation, tell which action machine should do without training data;Define extensive chemical
The action x of learner is practised, motion space X is analyzes the intrusion detection relevant informations such as various network logs, host information, first,
Trapping module is collected and filtering volume of data bag from some key nodes on the different main frames and the network segment of data network system,
Secondly these packets are sent to parsing and pretreatment module by the feature extraction of packet header and coded treatment, formed specific
The sorting code number sequence (as being based on TCP port number scope and flag bit, UDP port number scope, icmp packet type etc.) of form,
Classification based training and study are carried out to the sequence of these different agreement types by the intruding detection system based on intensified learning, are allowed to
Constantly healthy and strong normal behaviour profile, then detected by the real-time analysis of detection module, such as notes abnormalities, by response processing module
Alarm and relevant treatment;Therefore the state x of intensified learning model can be defined, state space X is normal condition and abnormality
Two kinds.
Step 2):Set up a markoff process based on intrusion detection:First, by the classification agent of intrusion detection
Abstract to turn to a learner Agent, its due state only has two kinds, i.e.,:Normal condition and abnormality.Normal condition with
The logical relation of abnormality may be constructed a markoff process, i.e.,:The state of the state of subsequent time only with this moment
It is relevant, and it is all unrelated with the state at conventional any moment:
Step 2.1, intensified learning task is typically the markoff process of a standard, and markoff process refers to next
The state at moment only has the state at this moment relevant, without being influenceed by conventional any state;So having to inside machine
Environment in simulate the markoff process of an intrusion detection;A study is turned to by the classification agent of intrusion detection is abstract
Person, its due state only has two kinds, i.e.,:Normal condition and abnormality;The logical relation energy of normal condition and abnormality
Enough constitute a markoff process;
Step 2.2, the Markov model based on intrusion detection is built according to the characteristics of intensified learning;Wherein P is potential
Transfer function so that environment is transferred to another state from current state by certain probability;
Step 2.3, the Markov four-tuple of intruding detection system is set up<X,A,P,R>;Wherein P:X × A × X → R refers to
State transition probability is determined;R:X × A × X → R specifies award.
Step 3):Learn the optimal classification strategy of an intrusion detection;Intensified learning can be divided into " having model learning "
Element in " exempting from model learning ", usual " having model learning " i.e. Markov four-tuple is entirely known, in this mould
In the case of type is known, be conducive to more efficiently learning optimal policy;Therefore the intensified learning based on intrusion detection is defined
Process, which is one, has model learning, i.e. machine to be modeled to environment, can be drawn up in machine internal mode it is identical with environment or
Approximate situation.The Bellman side of the recursive form of an intensified learning based on intrusion detection can be obtained on this basis
Journey, the equation includes two functions:" state value function " and " state-action value function ", respectively represent specify " state " on
And the accumulative award in specified " state-action ".Accumulation reward functions use γ accumulation of discounts to award:
Step 3.1, the corresponding markov decision process four-tuple E=of intrusion detection task<X,A,P,R>Be, it is known that
Such situation is referred to as " known to model ", i.e., machine to environment carried out modeling can be drawn up in machine internal mode it is identical with environment
Or approximate situation, it is referred to as " having model learning " in the environment learning of known models, now, for free position x, x` and dynamic
Make a, execution action a is transferred to x` shape probability of states under x stateIt is known, the award that the transfer is brought
It is also known, based on this, it is necessary to assume that state space X and motion space A is limited.
Step 3.2, when known to model, the expectation accumulation award that the strategy is brought can be estimated to any strategy π, V is madeπ
(x) represent to award using the tactful π accumulations brought from state x;Function Qπ(x, a) is represented from state x, is performed dynamic
Make to reuse tactful π after a, definition " the accumulation award that state is brought, value function V () is defined here " defines " state-action
Value function Q () ", represents to specify in " state " and specify the accumulation award in " state-action " respectively, and this method uses γ
Accumulation of discount is used as reward functions.
Step 3.3, the definition awarded by γ accumulation of discounts, stateful value function:
Wherein x0Represent initial state, a0Represent the first element taken in initial state, wherein γ (0≤γ≤1) generations
The neighbouring award of table is more important than future award.Therefore stateful-function of movement:
Because the Markov property of markoff process, the i.e. state of system subsequent time are only by the state at current time
Determine, independent of conventional any state, then value function has very simple recursive form, therefore is awarded for γ accumulation of discounts
Have:
Therefore in the presence of tactful π, state a value function should meet Bellman equations:
Its unique solution is optimal value function.
Step 4):The solution of optimal solution is carried out to the value function of intrusion detection strategy:First, selection is that " value iteration is calculated
Method ", the algorithm is a kind of iterative calculation method based on stragetic innovation, being capable of preferably adjustable strategies, and not time-consuming.Its
It is secondary, determine that the markov decision process four-tuple of intrusion detection, accumulation award parameter γ, setting convergence threshold.Finally, it is based on
The Iteration algorithm of γ accumulation of discounts award, obtains the optimum detection strategy of intrusion detection:
Step 4.1, Policy evaluation is carried out, in the case where there is model learning, the expectation that certain strategy is brought can be estimated
Accumulation award;State value function Vπ(x) represent from state x, awarded using the tactful π accumulations brought;State-action letter
Number Qπ(x a) represents to reuse the accumulation award that tactful π is brought after state x, execution action a;
Step 4.2, it is typically complicated to solve Bellman equations, and selection " Iteration algorithm " is used as Bellman equations
The derivation algorithm of optimal solution, it is determined that accumulation award parameter γ, setting convergence threshold;
Step 4.3, the Iteration algorithm of γ accumulation of discounts award is based ultimately upon, normal behaviour is determined in intrusion detection and non-
The threshold value of normal behaviour, and then obtain the optimum detection strategy π of intrusion detection*。
Claims (3)
1. a kind of intrusion detection method based on intensified learning, it is characterised in that:Comprise the following steps:
Step 1:Set up four key elements of the intensified learning of intrusion detection:Environment, learner, Reward Program, strategy;The environment exists
In intruding detection system, the learner is intrusion detection classification agent, analyzes intrusion detection relevant information, including normal condition
With abnormal condition, the Reward Program is intrusion detection verification and measurement ratio i.e. classification accuracy rate, the strategy be intrusion detection most
Excellent detection side;
Step 2:Set up the markoff process based on intrusion detection:A study is turned to by the classification agent of intrusion detection is abstract
Person, its state is logical relation one Markov mistake of composition of normal condition or abnormality, normal condition and abnormality
Journey, i.e.,:The state of subsequent time is only relevant with the state at this moment, and all unrelated with the state at conventional any moment;
Step 3:Learn the optimal classification strategy of intrusion detection:Environment is modeled, simulated identical or approximate with environment
Situation, the Bellman equations of the recursive form of the intensified learning based on intrusion detection are obtained on this basis, the equation includes
Two functions:" state value function " and " state-action value function ", represent in specified " state " and specify respectively " state-
Accumulation award in action ", accumulation reward functions use γ accumulation of discounts to award;
Step 4:The solution of optimal solution is carried out to the value function of intrusion detection strategy:Determine the Markovian decision mistake of intrusion detection
Journey four-tuple, accumulation award parameter γ, setting convergence threshold, are next based on the Iteration algorithm of γ accumulation of discounts award, obtain
The optimum detection strategy of intrusion detection.
2. the intrusion detection method according to claim 1 based on intensified learning, it is characterised in that:The tool of the step 1
Body step is:
Step 1.1, the study key element according to intensified learning, set up the academic environment of intensified learning:In intruding detection system;If
The learner for putting intensified learning:Intrusion detection classification agent;
Step 1.2, the Reward Program R for defining intensified learning:Intrusion detection verification and measurement ratio is classification accuracy rate;Definition strategy S:Invasion
The optimum detection methodology of detection;
Step 1.3, the action x, motion space X for defining intensified learning learner:Various network logs, host information etc. is analyzed to enter
Invade detection relevant information;Definition status x, state space X:It is divided into two kinds of normal condition and abnormality.
3. the intrusion detection method according to claim 1 based on intensified learning, it is characterised in that:Horse described in step 4
Er Kefu decision process four-tuples are<X,A,P,R>;Wherein P:X × A × X → R specifies state transition probability;R:X×A×X
→ R specifies award, and P is potential transfer function so that environment is transferred to another state from current state by certain probability.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710256845.0A CN107220540A (en) | 2017-04-19 | 2017-04-19 | Intrusion detection method based on intensified learning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710256845.0A CN107220540A (en) | 2017-04-19 | 2017-04-19 | Intrusion detection method based on intensified learning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107220540A true CN107220540A (en) | 2017-09-29 |
Family
ID=59928278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710256845.0A Pending CN107220540A (en) | 2017-04-19 | 2017-04-19 | Intrusion detection method based on intensified learning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107220540A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902562A (en) * | 2019-01-16 | 2019-06-18 | 重庆邮电大学 | A kind of driver's exception attitude monitoring method based on intensified learning |
CN109975800A (en) * | 2019-04-01 | 2019-07-05 | 中国电子科技集团公司信息科学研究院 | Radar network resource management-control method and device, computer readable storage medium |
CN110874470A (en) * | 2018-12-29 | 2020-03-10 | 北京安天网络安全技术有限公司 | Method and device for predicting network space security based on network attack |
CN110971677A (en) * | 2019-11-19 | 2020-04-07 | 国网吉林省电力有限公司电力科学研究院 | Electric power internet of things terminal equipment side channel safety monitoring method based on countermeasure reinforcement learning |
CN111414549A (en) * | 2019-05-14 | 2020-07-14 | 北京大学 | Intelligent general assessment method and system for vulnerability of recommendation system |
CN112839048A (en) * | 2020-05-21 | 2021-05-25 | 西安工程大学 | DIDS task scheduling algorithm based on reinforcement learning under edge computing environment |
CN113065284A (en) * | 2021-03-31 | 2021-07-02 | 天津国科医工科技发展有限公司 | Triple quadrupole mass spectrometer parameter optimization strategy calculation method based on Q learning |
CN113392878A (en) * | 2021-05-24 | 2021-09-14 | 东南大学 | Intrusion detection method based on noise network and reinforcement learning |
CN113518090A (en) * | 2021-07-20 | 2021-10-19 | 绍兴文理学院 | Intrusion detection method and system for edge computing architecture Internet of things |
CN113783841A (en) * | 2021-08-06 | 2021-12-10 | 成都墨甲信息科技有限公司 | Industrial Internet of things intrusion detection network architecture construction method, device and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082513A1 (en) * | 2008-09-26 | 2010-04-01 | Lei Liu | System and Method for Distributed Denial of Service Identification and Prevention |
CN103391548A (en) * | 2013-07-15 | 2013-11-13 | 河海大学常州校区 | Wireless sensor network intrusion detection model based on temporal difference (TD) reinforcement learning |
CN103646008A (en) * | 2013-12-13 | 2014-03-19 | 东南大学 | Web service combination method |
CN106330949A (en) * | 2016-09-13 | 2017-01-11 | 哈尔滨工程大学 | Intrusion detection method based on Markov chains |
CN106598058A (en) * | 2016-12-20 | 2017-04-26 | 华北理工大学 | Intrinsically motivated extreme learning machine autonomous development system and operating method thereof |
-
2017
- 2017-04-19 CN CN201710256845.0A patent/CN107220540A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100082513A1 (en) * | 2008-09-26 | 2010-04-01 | Lei Liu | System and Method for Distributed Denial of Service Identification and Prevention |
CN103391548A (en) * | 2013-07-15 | 2013-11-13 | 河海大学常州校区 | Wireless sensor network intrusion detection model based on temporal difference (TD) reinforcement learning |
CN103646008A (en) * | 2013-12-13 | 2014-03-19 | 东南大学 | Web service combination method |
CN106330949A (en) * | 2016-09-13 | 2017-01-11 | 哈尔滨工程大学 | Intrusion detection method based on Markov chains |
CN106598058A (en) * | 2016-12-20 | 2017-04-26 | 华北理工大学 | Intrinsically motivated extreme learning machine autonomous development system and operating method thereof |
Non-Patent Citations (2)
Title |
---|
MARTIJN VAN OTTERLO ETAL.: ""Reinforcement Learning and Markov Decision Processes"", 《RESEARCHGATE》 * |
李帅 等: ""基于SMDP强化学习的电力信息网络入侵检测研究"", 《电力自动化设备》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110874470A (en) * | 2018-12-29 | 2020-03-10 | 北京安天网络安全技术有限公司 | Method and device for predicting network space security based on network attack |
CN109902562B (en) * | 2019-01-16 | 2022-07-01 | 重庆邮电大学 | Driver abnormal posture monitoring method based on reinforcement learning |
CN109902562A (en) * | 2019-01-16 | 2019-06-18 | 重庆邮电大学 | A kind of driver's exception attitude monitoring method based on intensified learning |
CN109975800A (en) * | 2019-04-01 | 2019-07-05 | 中国电子科技集团公司信息科学研究院 | Radar network resource management-control method and device, computer readable storage medium |
CN109975800B (en) * | 2019-04-01 | 2020-12-29 | 中国电子科技集团公司信息科学研究院 | Networking radar resource control method and device and computer readable storage medium |
CN111414549A (en) * | 2019-05-14 | 2020-07-14 | 北京大学 | Intelligent general assessment method and system for vulnerability of recommendation system |
CN110971677A (en) * | 2019-11-19 | 2020-04-07 | 国网吉林省电力有限公司电力科学研究院 | Electric power internet of things terminal equipment side channel safety monitoring method based on countermeasure reinforcement learning |
CN112839048A (en) * | 2020-05-21 | 2021-05-25 | 西安工程大学 | DIDS task scheduling algorithm based on reinforcement learning under edge computing environment |
CN113065284A (en) * | 2021-03-31 | 2021-07-02 | 天津国科医工科技发展有限公司 | Triple quadrupole mass spectrometer parameter optimization strategy calculation method based on Q learning |
CN113392878A (en) * | 2021-05-24 | 2021-09-14 | 东南大学 | Intrusion detection method based on noise network and reinforcement learning |
CN113518090A (en) * | 2021-07-20 | 2021-10-19 | 绍兴文理学院 | Intrusion detection method and system for edge computing architecture Internet of things |
CN113518090B (en) * | 2021-07-20 | 2023-08-01 | 绍兴文理学院 | Edge computing architecture Internet of things intrusion detection method and system |
CN113783841A (en) * | 2021-08-06 | 2021-12-10 | 成都墨甲信息科技有限公司 | Industrial Internet of things intrusion detection network architecture construction method, device and equipment |
CN113783841B (en) * | 2021-08-06 | 2022-11-22 | 成都墨甲信息科技有限公司 | Industrial Internet of things intrusion detection network architecture construction method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107220540A (en) | Intrusion detection method based on intensified learning | |
Gopali et al. | A comparison of TCN and LSTM models in detecting anomalies in time series data | |
CN110247910A (en) | A kind of detection method of abnormal flow, system and associated component | |
CN113079167B (en) | Internet of vehicles intrusion detection method and system based on deep reinforcement learning | |
CN112383516A (en) | Graph neural network construction method and abnormal flow detection method based on graph neural network | |
CN112433518B (en) | Industrial control system intrusion detection method based on recurrent neural network | |
CN112738014A (en) | Industrial control flow abnormity detection method and system based on convolution time sequence network | |
Gopali et al. | A comparative study of detecting anomalies in time series data using LSTM and TCN models | |
CN111753884A (en) | Depth map convolution model defense method and device based on network feature reinforcement | |
CN116582349A (en) | Attack path prediction model generation method and device based on network attack graph | |
Katar | Combining multiple techniques for intrusion detection | |
Şeker | Use of Artificial Intelligence Techniques/Applications in Cyber Defense | |
Al-Subaie et al. | Efficacy of hidden Markov models over neural networks in anomaly intrusion detection | |
CN113378178A (en) | Deep learning-based graph confidence learning software vulnerability detection method | |
CN111144243B (en) | Household pattern recognition method and device based on counterstudy | |
Gupta et al. | Genetic algorithm technique used to detect intrusion detection | |
CN117609806A (en) | Network security situation awareness method based on machine learning | |
CN115865458B (en) | Network attack behavior detection method, system and terminal based on LSTM and GAT algorithm | |
CN108761250B (en) | Industrial control equipment voltage and current-based intrusion detection method | |
CN109635008B (en) | Equipment fault detection method based on machine learning | |
CN116545679A (en) | Industrial situation security basic framework and network attack behavior feature analysis method | |
CN114579962A (en) | AI safety attack and defense test method | |
CN110796237B (en) | Method and device for detecting attack resistance of deep neural network | |
CN112884069A (en) | Method for detecting confrontation network sample | |
Geraily et al. | Fuzzy detection of malicious attacks on web applications based on hidden Markov model ensemble |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |