CN109510805B - 一种基于安全基线模型的网络数据安全检测方法及系统 - Google Patents
一种基于安全基线模型的网络数据安全检测方法及系统 Download PDFInfo
- Publication number
- CN109510805B CN109510805B CN201710834724.XA CN201710834724A CN109510805B CN 109510805 B CN109510805 B CN 109510805B CN 201710834724 A CN201710834724 A CN 201710834724A CN 109510805 B CN109510805 B CN 109510805B
- Authority
- CN
- China
- Prior art keywords
- rbm
- model
- data
- baseline
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/047—Probabilistic or stochastic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Biophysics (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Probability & Statistics with Applications (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710834724.XA CN109510805B (zh) | 2017-09-15 | 2017-09-15 | 一种基于安全基线模型的网络数据安全检测方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710834724.XA CN109510805B (zh) | 2017-09-15 | 2017-09-15 | 一种基于安全基线模型的网络数据安全检测方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109510805A CN109510805A (zh) | 2019-03-22 |
CN109510805B true CN109510805B (zh) | 2020-06-16 |
Family
ID=65745110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710834724.XA Active CN109510805B (zh) | 2017-09-15 | 2017-09-15 | 一种基于安全基线模型的网络数据安全检测方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109510805B (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112910825B (zh) * | 2019-11-19 | 2022-06-14 | 华为技术有限公司 | 一种蠕虫检测方法及网络设备 |
CN112116078A (zh) * | 2020-09-22 | 2020-12-22 | 工业互联网创新中心(上海)有限公司 | 一种基于人工智能的信息安全基线学习方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268626A (zh) * | 2014-10-21 | 2015-01-07 | 国家电网公司 | 电力电缆寿命估计的方法及系统 |
US9405743B1 (en) * | 2015-05-13 | 2016-08-02 | International Business Machines Corporation | Dynamic modeling of geospatial words in social media |
CN106291701A (zh) * | 2016-10-13 | 2017-01-04 | 成都理工大学 | 储层检测方法及装置 |
CN106405640A (zh) * | 2016-08-26 | 2017-02-15 | 中国矿业大学(北京) | 基于深度信念神经网络的微震信号到时自动拾取方法 |
CN106411597A (zh) * | 2016-10-14 | 2017-02-15 | 广东工业大学 | 一种网络流量异常检测方法及系统 |
CN106934495A (zh) * | 2017-02-28 | 2017-07-07 | 东南大学 | 基于分布估计和限制玻尔兹曼机结合的自适应服务组合方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140067342A1 (en) * | 2012-08-28 | 2014-03-06 | Numerica Corporation | Particle tracking in biological systems |
KR20160112186A (ko) * | 2015-03-18 | 2016-09-28 | 삼성전자주식회사 | 뉴럴 네트워크에서 이벤트에 기반한 학습 방법 및 장치 |
-
2017
- 2017-09-15 CN CN201710834724.XA patent/CN109510805B/zh active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268626A (zh) * | 2014-10-21 | 2015-01-07 | 国家电网公司 | 电力电缆寿命估计的方法及系统 |
US9405743B1 (en) * | 2015-05-13 | 2016-08-02 | International Business Machines Corporation | Dynamic modeling of geospatial words in social media |
CN106405640A (zh) * | 2016-08-26 | 2017-02-15 | 中国矿业大学(北京) | 基于深度信念神经网络的微震信号到时自动拾取方法 |
CN106291701A (zh) * | 2016-10-13 | 2017-01-04 | 成都理工大学 | 储层检测方法及装置 |
CN106411597A (zh) * | 2016-10-14 | 2017-02-15 | 广东工业大学 | 一种网络流量异常检测方法及系统 |
CN106934495A (zh) * | 2017-02-28 | 2017-07-07 | 东南大学 | 基于分布估计和限制玻尔兹曼机结合的自适应服务组合方法 |
Also Published As
Publication number | Publication date |
---|---|
CN109510805A (zh) | 2019-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016082284A1 (zh) | 基于OCSVM双轮廓模型的Modbus TCP通信行为异常检测方法 | |
US9231964B2 (en) | Vulnerability detection based on aggregated primitives | |
Peng et al. | Network intrusion detection based on deep learning | |
CN110213226B (zh) | 基于风险全要素辨识关联的网络攻击场景重建方法及系统 | |
TW202019140A (zh) | 可疑封包偵測裝置及其可疑封包偵測方法 | |
CN110719250B (zh) | 基于PSO-SVDD的Powerlink工控协议异常检测方法 | |
CN110336806B (zh) | 一种结合会话行为和通信关系的隐蔽通信检测方法 | |
CN109510805B (zh) | 一种基于安全基线模型的网络数据安全检测方法及系统 | |
Lu et al. | Integrating traffics with network device logs for anomaly detection | |
CN113965393B (zh) | 一种基于复杂网络和图神经网络的僵尸网络检测方法 | |
CN111131309A (zh) | 分布式拒绝服务检测方法、装置及模型创建方法、装置 | |
Mondal et al. | Review Study on Different Attack Strategies of Worm in a Network. | |
Gangula et al. | A comprehence study of DDoS attack detecting algorithm using GRU-BWFA classifier | |
Lu et al. | Network security situation awareness based on network simulation | |
Yin et al. | Optimal remote access Trojans detection based on network behavior. | |
Fei et al. | A survey of internet worm propagation models | |
Chen et al. | A novel ensemble anomaly based approach for command and control channel detection | |
Mishra et al. | Dynamic model on the transmission of malicious codes in network | |
Japertas et al. | Method of early staged cyber attacks detection in IT and telecommunication networks | |
Sun et al. | Impulsive artificial defense against advanced persistent threat | |
Chapman | {SAD}{THUG}: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics | |
Wei et al. | Protecting Machine Learning Integrity in Distributed Big Data Networking | |
Chen et al. | Artificial intelligence hybrid learning architecture for malware families classification | |
Zhang et al. | Analysis of payload based application level network anomaly detection | |
CN115499251B (zh) | 一种边缘IoT设备的异常流量及攻击检测方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210816 Address after: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District Patentee after: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES Patentee before: BEIJING INTELLIX TECHNOLOGIES Co.,Ltd. Effective date of registration: 20210816 Address after: Room 1601, 16th floor, East Tower, Ximei building, No. 6, Changchun Road, high tech Industrial Development Zone, Zhengzhou, Henan 450001 Patentee after: Zhengzhou xinrand Network Technology Co.,Ltd. Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES |
|
TR01 | Transfer of patent right |