CN110535874A - A kind of network attack detecting method and system of antagonism network - Google Patents

A kind of network attack detecting method and system of antagonism network Download PDF

Info

Publication number
CN110535874A
CN110535874A CN201910874123.0A CN201910874123A CN110535874A CN 110535874 A CN110535874 A CN 110535874A CN 201910874123 A CN201910874123 A CN 201910874123A CN 110535874 A CN110535874 A CN 110535874A
Authority
CN
China
Prior art keywords
network attack
noise simulation
model
generator
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910874123.0A
Other languages
Chinese (zh)
Inventor
段彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuleng Technology Co Ltd
Original Assignee
Wuhan Sipuleng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuleng Technology Co Ltd filed Critical Wuhan Sipuleng Technology Co Ltd
Priority to CN201910874123.0A priority Critical patent/CN110535874A/en
Publication of CN110535874A publication Critical patent/CN110535874A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides the network attack detecting method and system of a kind of antagonism network, data can be accessed based on history, analysis one noise simulation network attack model of building, first using the live network attack traffic training noise simulation network attack model, there are also the abilities of constantly compound variation network attack for model itself, after noise simulation network attack model training, in access machine learning module, simulation attack source as machine learning module, training machine study module is attacked incessantly, helps the ability of hoisting machine study module detection.

Description

A kind of network attack detecting method and system of antagonism network
Technical field
This application involves the network attack detecting method of technical field of network security more particularly to a kind of antagonism network and System.
Background technique
Although existing statistical analysis and machine learning can detect Malware, malicious code, malicious act etc., also deposit In two deficiencies: first is that, data deficiencies is attacked in training process, is far less than normal data, the deficiency of data and uneven meeting Cause detection model unbalance, can not correctly detect attack data or behavior;Second is that with the development of technology, attacker's attacks Hitter's section is also constantly changing, however these attack data will not disclose in advance, they can not be used for model training, lead to mould Type can not detect unknown attack data.So workable attack data can be generated with self by being badly in need of one kind, enhance training number According to the method and system of promotion detection model performance.
Summary of the invention
The purpose of the present invention is to provide the network attack detecting method and system of a kind of antagonism network, can be based on going through History accesses data, analysis one noise simulation network attack model of building, first using described in the training of live network attack traffic Noise simulation network attack model, there are also the abilities of constantly compound variation network attack for model itself, when noise simulation network is attacked After hitting model training, attacked incessantly in access machine learning module as the simulation attack source of machine learning module Training machine study module helps the ability of hoisting machine study module detection.
In a first aspect, the application provides a kind of network attack detecting method of antagonism network, which comprises
It obtains history and accesses data, according to the feature of known network attack type, analysis is extracted in history access data Attack the feature vector of data;
Based on the feature vector of the attack data, noise simulation network attack model is constructed, it can be random using the model It generates known various types of network attacks and multiple network attack is compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several Kind network attack or variation network attack signature;
Using the noise simulation network attack model as the generator of antagonism network, the output flow of the generator It is sent into arbiter together with live network attack traffic incessantly;
The generator output flow and live network attack traffic that the arbiter is inputted according to both ends obtain differentiation knot Fruit;If differentiate that result is true, show that generator output flow connects in feature vector very much with live network attack traffic Closely, similarity information is fed back to generator by arbiter;If differentiation result is fictitious time, show generator output flow and true Network Attack difference in feature vector is very big, arbiter by difference degree information, the feature of live network attack traffic to Amount feeds back to generator together;
Generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates again newly Output flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation Network attack model training finishes;
The noise simulation network attack model is accessed into machine learning module, by the noise simulation network attack model Uninterrupted random generation Network Attack, for machine learning module self-teaching;
It is special uninterruptedly to enrich various network attacks by the noise simulation network attack model for the machine learning module Vector sample is levied, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can be with Timing adjusts the parameter of the noise simulation network attack model according to testing result, starts the noise simulation network attack mould The update mechanism of type.
With reference to first aspect, in a first possible implementation of that first aspect, the variation network attack signature packet It includes to do known network attack characteristic vector and extend, and the field of several attacks of modification.
With reference to first aspect, in a second possible implementation of that first aspect, the arbiter can also be by differentiation As a result administrator is fed back to, adjusts the parameter of the noise simulation network attack model in real time for administrator.
With reference to first aspect, in first aspect in the third possible implementation, the noise simulation network attack mould The update mechanism of type refers to again using the noise simulation network attack model as generator, by the output flow of generator It is sent into the arbiter.
Second aspect, the application provide a kind of network attack detection system of antagonism network, the system comprises:
Acquiring unit, for obtaining history access data, according to the feature of known network attack type, analysis is extracted and is gone through History accesses the feature vector that data are attacked in data;
Construction unit constructs noise simulation network attack model, application for the feature vector based on the attack data The model can generate known various types of network attacks at random and multiple network attack is compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several Kind network attack or variation network attack signature;
Generator, for using the noise simulation network attack model as the generator of antagonism network, the generation The output flow of device is sent into arbiter with live network attack traffic incessantly together;
Arbiter, generator output flow and live network attack traffic for being inputted according to both ends obtain differentiation knot Fruit;If differentiate that result is true, show that generator output flow connects in feature vector very much with live network attack traffic Closely, similarity information is fed back to generator by arbiter;If differentiation result is fictitious time, show generator output flow and true Network Attack difference in feature vector is very big, arbiter by difference degree information, the feature of live network attack traffic to Amount feeds back to generator together;
The generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates again New output flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation Network attack model training finishes;
Machine learning module, for accessing the noise simulation network attack model, by the noise simulation network attack Model uninterruptedly generates Network Attack at random, for machine learning module self-teaching;
It is special uninterruptedly to enrich various network attacks by the noise simulation network attack model for the machine learning module Vector sample is levied, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can be with Timing adjusts the parameter of the noise simulation network attack model according to testing result, starts the noise simulation network attack mould The update mechanism of type.
In conjunction with second aspect, in second aspect in the first possible implementation, the variation network attack signature packet It includes to do known network attack characteristic vector and extend, and the field of several attacks of modification.
In conjunction with second aspect, in second of second aspect possible implementation, the arbiter can also be by differentiation As a result administrator is fed back to, adjusts the parameter of the noise simulation network attack model in real time for administrator.
In conjunction with second aspect, in second aspect in the third possible implementation, the noise simulation network attack mould The update mechanism of type refers to again using the noise simulation network attack model as generator, by the output flow of generator It is sent into the arbiter.
The present invention provides the network attack detecting method and system of a kind of antagonism network, can be based on history access number According to analysis one noise simulation network attack model of building, first using the live network attack traffic training noise simulation Network attack model, there are also the abilities of constantly compound variation network attack for model itself, when noise simulation network attack model is instructed After white silk, training machine is attacked incessantly as the simulation attack source of machine learning module in access machine learning module Study module helps the ability of hoisting machine study module detection.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, for those of ordinary skills, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of the network attack detecting method of antagonism network of the present invention;
Fig. 2 is the architecture diagram of the network attack detection system of antagonism network of the present invention.
Specific embodiment
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing, so that advantages and features of the invention energy It is easier to be readily appreciated by one skilled in the art, so as to make a clearer definition of the protection scope of the present invention.
Fig. 1 is the flow chart of the network attack detecting method of antagonism network provided by the present application, which comprises
It obtains history and accesses data, according to the feature of known network attack type, analysis is extracted in history access data Attack the feature vector of data;
Based on the feature vector of the attack data, noise simulation network attack model is constructed, it can be random using the model It generates known various types of network attacks and multiple network attack is compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several Kind network attack or variation network attack signature;
Using the noise simulation network attack model as the generator of antagonism network, the output flow of the generator It is sent into arbiter together with live network attack traffic incessantly;
The generator output flow and live network attack traffic that the arbiter is inputted according to both ends obtain differentiation knot Fruit;If differentiate that result is true, show that generator output flow connects in feature vector very much with live network attack traffic Closely, similarity information is fed back to generator by arbiter;If differentiation result is fictitious time, show generator output flow and true Network Attack difference in feature vector is very big, arbiter by difference degree information, the feature of live network attack traffic to Amount feeds back to generator together;
Generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates again newly Output flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation Network attack model training finishes;
The noise simulation network attack model is accessed into machine learning module, by the noise simulation network attack model Uninterrupted random generation Network Attack, for machine learning module self-teaching;
It is special uninterruptedly to enrich various network attacks by the noise simulation network attack model for the machine learning module Vector sample is levied, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can be with Timing adjusts the parameter of the noise simulation network attack model according to testing result, starts the noise simulation network attack mould The update mechanism of type.
In some preferred embodiments, the variation network attack signature includes doing to known network attack characteristic vector Extension, and the field of several attacks of modification.
In some preferred embodiments, the result of differentiation can also be fed back to administrator by the arbiter, for administrator's reality When adjust the parameter of the noise simulation network attack model.
In some preferred embodiments, the update mechanism of the noise simulation network attack model, referring to again will be described Noise simulation network attack model is sent into the arbiter as generator, by the output flow of generator.
Fig. 2 is the architecture diagram of the network attack detection system of antagonism network provided by the present application, the system comprises:
Acquiring unit, for obtaining history access data, according to the feature of known network attack type, analysis is extracted and is gone through History accesses the feature vector that data are attacked in data;
Construction unit constructs noise simulation network attack model, application for the feature vector based on the attack data The model can generate known various types of network attacks at random and multiple network attack is compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several Kind network attack or variation network attack signature;
Generator, for using the noise simulation network attack model as the generator of antagonism network, the generation The output flow of device is sent into arbiter with live network attack traffic incessantly together;
Arbiter, generator output flow and live network attack traffic for being inputted according to both ends obtain differentiation knot Fruit;If differentiate that result is true, show that generator output flow connects in feature vector very much with live network attack traffic Closely, similarity information is fed back to generator by arbiter;If differentiation result is fictitious time, show generator output flow and true Network Attack difference in feature vector is very big, arbiter by difference degree information, the feature of live network attack traffic to Amount feeds back to generator together;
The generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates again New output flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation Network attack model training finishes;
Machine learning module, for accessing the noise simulation network attack model, by the noise simulation network attack Model uninterruptedly generates Network Attack at random, for machine learning module self-teaching;
It is special uninterruptedly to enrich various network attacks by the noise simulation network attack model for the machine learning module Vector sample is levied, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can be with Timing adjusts the parameter of the noise simulation network attack model according to testing result, starts the noise simulation network attack mould The update mechanism of type.
In some preferred embodiments, the variation network attack signature includes doing to known network attack characteristic vector Extension, and the field of several attacks of modification.
In some preferred embodiments, the result of differentiation can also be fed back to administrator by the arbiter, for administrator's reality When adjust the parameter of the noise simulation network attack model.
In some preferred embodiments, the update mechanism of the noise simulation network attack model, referring to again will be described Noise simulation network attack model is sent into the arbiter as generator, by the output flow of generator.
In the specific implementation, the present invention also provides a kind of computer storage mediums, wherein the computer storage medium can deposit Program is contained, which may include step some or all of in each embodiment of the present invention when executing.The storage medium It can be magnetic disk, CD, read-only memory (referred to as: ROM) or random access memory (referred to as: RAM) etc..
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or The part that contributes to existing technology can be embodied in the form of software products, which can store In storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions use is so that a computer equipment (can be Personal computer, server or network equipment etc.) it executes described in certain parts of each embodiment of the present invention or embodiment Method.
The same or similar parts between the embodiments can be referred to each other for this specification.For embodiment, Since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to the explanation in embodiment of the method .
Invention described above embodiment is not intended to limit the scope of the present invention..

Claims (8)

1. a kind of network attack detecting method of antagonism network, which is characterized in that the described method includes:
It obtains history and accesses data, according to the feature of known network attack type, analysis is extracted attacks in history access data The feature vector of data;
Based on the feature vector of the attack data, noise simulation network attack model is constructed, can be generated at random using the model Known various types of network attacks and multiple network attack are compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several net Network attack or variation network attack signature;
Using the noise simulation network attack model as the generator of antagonism network, the output flow of the generator not between It disconnectedly is sent into arbiter together with live network attack traffic;
The generator output flow and live network attack traffic that the arbiter is inputted according to both ends, obtain differentiation result;Such as When fruit differentiates that result is true, shows that generator output flow and live network attack traffic are very close in feature vector, sentence Similarity information is fed back to generator by other device;If differentiation result is fictitious time, show generator output flow and live network Attack traffic difference in feature vector is very big, and arbiter is by difference degree information, the feature vector one of live network attack traffic And feed back to generator;
Generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates new output again Flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation network Challenge model training finishes;
By the noise simulation network attack model access machine learning module, by the noise simulation network attack model not between Disconnected random generation Network Attack, for machine learning module self-teaching;
The machine learning module by the noise simulation network attack model, uninterruptedly enrich various network attack characteristics to Sample is measured, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can timing The parameter for adjusting the noise simulation network attack model according to testing result starts the noise simulation network attack model Update mechanism.
2. the method according to claim 1, wherein the variation network attack signature includes to known network Attack signature vector, which is done, to be extended, and the field of several attacks of modification.
3. -2 described in any item methods according to claim 1, which is characterized in that the arbiter can also be anti-by the result of differentiation Feed administrator, adjusts the parameter of the noise simulation network attack model in real time for administrator.
4. method according to claim 1-3, which is characterized in that the noise simulation network attack model is more New mechanism refers to again using the noise simulation network attack model as generator, the output flow of generator is sent into institute State arbiter.
5. a kind of network attack detection system of antagonism network, which is characterized in that the system comprises:
Acquiring unit, for obtaining history access data, according to the feature of known network attack type, analysis is extracted history and is visited Ask the feature vector that data are attacked in data;
Construction unit constructs noise simulation network attack model, using the mould for the feature vector based on the attack data Type can generate known various types of network attacks at random and multiple network attack is compound;
It includes the feature for being provided simultaneously with several network attack that the multiple network, which is attacked compound, or is carried out continuously several net Network attack or variation network attack signature;
Generator, for using the noise simulation network attack model as the generator of antagonism network, the generator Output flow is sent into arbiter with live network attack traffic incessantly together;
Arbiter, generator output flow and live network attack traffic for being inputted according to both ends, obtains differentiation result;Such as When fruit differentiates that result is true, shows that generator output flow and live network attack traffic are very close in feature vector, sentence Similarity information is fed back to generator by other device;If differentiation result is fictitious time, show generator output flow and live network Attack traffic difference in feature vector is very big, and arbiter is by difference degree information, the feature vector one of live network attack traffic And feed back to generator;
The generator adjusts the parameter of noise simulation network attack model according to the feedback result of arbiter, generates again newly Output flow;
When the differentiation result that arbiter obtains is that genuine ratio is greater than pre-set threshold value, show the noise simulation network Challenge model training finishes;
Machine learning module, for accessing the noise simulation network attack model, by the noise simulation network attack model Uninterrupted random generation Network Attack, for machine learning module self-teaching;
The machine learning module by the noise simulation network attack model, uninterruptedly enrich various network attack characteristics to Sample is measured, network attack detection is carried out to live network flow, and will test result and feed back to administrator, administrator can timing The parameter for adjusting the noise simulation network attack model according to testing result starts the noise simulation network attack model Update mechanism.
6. system according to claim 5, which is characterized in that the variation network attack signature includes to known network Attack signature vector, which is done, to be extended, and the field of several attacks of modification.
7. according to the described in any item systems of claim 5-6, which is characterized in that the arbiter can also be anti-by the result of differentiation Feed administrator, adjusts the parameter of the noise simulation network attack model in real time for administrator.
8. according to the described in any item systems of claim 5-7, which is characterized in that the noise simulation network attack model is more New mechanism refers to again using the noise simulation network attack model as generator, the output flow of generator is sent into institute State arbiter.
CN201910874123.0A 2019-09-17 2019-09-17 A kind of network attack detecting method and system of antagonism network Pending CN110535874A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910874123.0A CN110535874A (en) 2019-09-17 2019-09-17 A kind of network attack detecting method and system of antagonism network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910874123.0A CN110535874A (en) 2019-09-17 2019-09-17 A kind of network attack detecting method and system of antagonism network

Publications (1)

Publication Number Publication Date
CN110535874A true CN110535874A (en) 2019-12-03

Family

ID=68668817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910874123.0A Pending CN110535874A (en) 2019-09-17 2019-09-17 A kind of network attack detecting method and system of antagonism network

Country Status (1)

Country Link
CN (1) CN110535874A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787002A (en) * 2020-06-30 2020-10-16 北京赋云安运营科技有限公司 Method and system for analyzing service data network security
CN111866882A (en) * 2019-12-17 2020-10-30 南京理工大学 Mobile application traffic generation method based on generation countermeasure network
CN112261045A (en) * 2020-10-22 2021-01-22 广州大学 Network attack data automatic generation method and system based on attack principle
CN114189354A (en) * 2021-11-10 2022-03-15 西安理工大学 SYN Flooding network attack scene reproduction method
CN114499923A (en) * 2021-11-30 2022-05-13 北京天融信网络安全技术有限公司 ICMP (Internet control message protocol) simulation message generation method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107392019A (en) * 2017-07-05 2017-11-24 北京金睛云华科技有限公司 A kind of training of malicious code family and detection method and device
US20180314716A1 (en) * 2017-04-27 2018-11-01 Sk Telecom Co., Ltd. Method for learning cross-domain relations based on generative adversarial networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180314716A1 (en) * 2017-04-27 2018-11-01 Sk Telecom Co., Ltd. Method for learning cross-domain relations based on generative adversarial networks
CN107392019A (en) * 2017-07-05 2017-11-24 北京金睛云华科技有限公司 A kind of training of malicious code family and detection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
傅建明等: "基于GAN的网络攻击检测研究综述", 《信息网络安全》 *
柴梦婷: "生成式对抗网络研究与应用进", 《计算机工程》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866882A (en) * 2019-12-17 2020-10-30 南京理工大学 Mobile application traffic generation method based on generation countermeasure network
CN111787002A (en) * 2020-06-30 2020-10-16 北京赋云安运营科技有限公司 Method and system for analyzing service data network security
CN111787002B (en) * 2020-06-30 2022-05-20 安全能力生态聚合(北京)运营科技有限公司 Method and system for analyzing safety of service data network
CN112261045A (en) * 2020-10-22 2021-01-22 广州大学 Network attack data automatic generation method and system based on attack principle
CN114189354A (en) * 2021-11-10 2022-03-15 西安理工大学 SYN Flooding network attack scene reproduction method
CN114499923A (en) * 2021-11-30 2022-05-13 北京天融信网络安全技术有限公司 ICMP (Internet control message protocol) simulation message generation method and device
CN114499923B (en) * 2021-11-30 2023-11-10 北京天融信网络安全技术有限公司 ICMP simulation message generation method and device

Similar Documents

Publication Publication Date Title
CN110535874A (en) A kind of network attack detecting method and system of antagonism network
CN110505241A (en) A kind of network attack face detection method and system
US11991203B2 (en) Method and system for generating stateful attacks
Maeda et al. Automating post-exploitation with deep reinforcement learning
Bowen et al. Botswindler: Tamper resistant injection of believable decoys in vm-based hosts for crimeware detection
CN106209861B (en) One kind being based on broad sense Jie Kade similarity factor Web application layer ddos attack detection method and device
US20140157415A1 (en) Information security analysis using game theory and simulation
CN110493262A (en) It is a kind of to improve the network attack detecting method classified and system
Childers et al. Organizing large scale hacking competitions
CN107395553A (en) A kind of detection method and device of network attack
CN110619216B (en) Malicious software detection method and system for adversarial network
CN106973051B (en) Establish the method, apparatus and storage medium of detection Cyberthreat model
KR20190028880A (en) Method and appratus for generating machine learning data for botnet detection system
CN110598794A (en) Classified countermeasure network attack detection method and system
Zhang Zhang's CAPTCHA architecture based on intelligent interaction via RIA
Berger et al. Does my bft protocol implementation scale?
Sahin et al. Lessons learned from SunDEW: a self defense environment for web applications
Clausen et al. Evading stepping-stone detection with enough chaff
Song et al. A comprehensive approach to detect unknown attacks via intrusion detection alerts
CN106101086A (en) The cloud detection method of optic of program file and system, client, cloud server
CN112532562B (en) Malicious data flow detection method and system for adversarial network
Kintana et al. The goals and challenges of click fraud penetration testing systems
Burke et al. Automating cyber offensive operations for cyber challenges
Wei et al. Information dissemination model based on clustering analysis of information network development
Kukiełka et al. Analysis of neural networks usage for detection of a new attack in IDS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191203

RJ01 Rejection of invention patent application after publication