CN112632532A - 边缘计算中基于深度森林的用户异常行为检测方法 - Google Patents
边缘计算中基于深度森林的用户异常行为检测方法 Download PDFInfo
- Publication number
- CN112632532A CN112632532A CN202011577709.XA CN202011577709A CN112632532A CN 112632532 A CN112632532 A CN 112632532A CN 202011577709 A CN202011577709 A CN 202011577709A CN 112632532 A CN112632532 A CN 112632532A
- Authority
- CN
- China
- Prior art keywords
- training
- forest
- mec
- sub
- cloud center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 206010000117 Abnormal behaviour Diseases 0.000 title claims abstract description 33
- 238000001514 detection method Methods 0.000 title claims abstract description 26
- 238000004364 calculation method Methods 0.000 title claims abstract description 21
- 238000012549 training Methods 0.000 claims abstract description 92
- 238000000034 method Methods 0.000 claims abstract description 29
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 12
- 238000007781 pre-processing Methods 0.000 claims abstract description 6
- 239000010410 layer Substances 0.000 claims description 26
- 238000007637 random forest analysis Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 8
- 230000002159 abnormal effect Effects 0.000 claims description 6
- 230000006399 behavior Effects 0.000 claims description 6
- 238000002790 cross-validation Methods 0.000 claims description 3
- 239000011229 interlayer Substances 0.000 claims description 2
- 238000005457 optimization Methods 0.000 claims description 2
- 230000009467 reduction Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 description 4
- 230000010354 integration Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/243—Classification techniques relating to the number of classes
- G06F18/24323—Tree-organised classifiers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/008—Artificial life, i.e. computing arrangements simulating life based on physical entities controlled by simulated intelligence so as to replicate intelligent life forms, e.g. based on robots replicating pets or humans in their appearance or behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Computing Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Biology (AREA)
- Robotics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Mathematical Physics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011577709.XA CN112632532B (zh) | 2020-12-28 | 2020-12-28 | 边缘计算中基于深度森林的用户异常行为检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011577709.XA CN112632532B (zh) | 2020-12-28 | 2020-12-28 | 边缘计算中基于深度森林的用户异常行为检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112632532A true CN112632532A (zh) | 2021-04-09 |
CN112632532B CN112632532B (zh) | 2022-08-23 |
Family
ID=75326081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011577709.XA Active CN112632532B (zh) | 2020-12-28 | 2020-12-28 | 边缘计算中基于深度森林的用户异常行为检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112632532B (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113177442A (zh) * | 2021-04-12 | 2021-07-27 | 广东省科学院智能制造研究所 | 一种基于边缘计算的人体行为检测方法及装置 |
CN113409166A (zh) * | 2021-08-19 | 2021-09-17 | 国网江西综合能源服务有限公司 | 基于XGBoost模型的用户异常用电行为检测方法及装置 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130132311A1 (en) * | 2011-11-18 | 2013-05-23 | Honeywell International Inc. | Score fusion and training data recycling for video classification |
CN108874927A (zh) * | 2018-05-31 | 2018-11-23 | 桂林电子科技大学 | 基于超图和随机森林的入侵检测方法 |
CN110807488A (zh) * | 2019-11-01 | 2020-02-18 | 北京芯盾时代科技有限公司 | 一种基于用户对等组的异常检测方法及装置 |
CN110826618A (zh) * | 2019-11-01 | 2020-02-21 | 南京信息工程大学 | 一种基于随机森林的个人信用风险评估方法 |
CN111290831A (zh) * | 2020-01-18 | 2020-06-16 | 重庆邮电大学 | 一种云计算基于强化学习的虚拟机迁移方法 |
CN111414961A (zh) * | 2020-03-18 | 2020-07-14 | 江苏鸿程大数据技术与应用研究院有限公司 | 一种基于任务并行的细粒度分布式深度森林训练方法 |
CN111833172A (zh) * | 2020-05-25 | 2020-10-27 | 百维金科(上海)信息科技有限公司 | 一种基于孤立森林的消费信贷欺诈行为检测方法及其系统 |
CN111950660A (zh) * | 2020-09-18 | 2020-11-17 | 苏州浪潮智能科技有限公司 | 一种人工智能训练平台的告警预测方法及装置 |
CN111984419A (zh) * | 2020-08-28 | 2020-11-24 | 华侨大学 | 一种边缘环境可靠性约束的复杂任务计算迁移方法 |
-
2020
- 2020-12-28 CN CN202011577709.XA patent/CN112632532B/zh active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130132311A1 (en) * | 2011-11-18 | 2013-05-23 | Honeywell International Inc. | Score fusion and training data recycling for video classification |
CN108874927A (zh) * | 2018-05-31 | 2018-11-23 | 桂林电子科技大学 | 基于超图和随机森林的入侵检测方法 |
CN110807488A (zh) * | 2019-11-01 | 2020-02-18 | 北京芯盾时代科技有限公司 | 一种基于用户对等组的异常检测方法及装置 |
CN110826618A (zh) * | 2019-11-01 | 2020-02-21 | 南京信息工程大学 | 一种基于随机森林的个人信用风险评估方法 |
CN111290831A (zh) * | 2020-01-18 | 2020-06-16 | 重庆邮电大学 | 一种云计算基于强化学习的虚拟机迁移方法 |
CN111414961A (zh) * | 2020-03-18 | 2020-07-14 | 江苏鸿程大数据技术与应用研究院有限公司 | 一种基于任务并行的细粒度分布式深度森林训练方法 |
CN111833172A (zh) * | 2020-05-25 | 2020-10-27 | 百维金科(上海)信息科技有限公司 | 一种基于孤立森林的消费信贷欺诈行为检测方法及其系统 |
CN111984419A (zh) * | 2020-08-28 | 2020-11-24 | 华侨大学 | 一种边缘环境可靠性约束的复杂任务计算迁移方法 |
CN111950660A (zh) * | 2020-09-18 | 2020-11-17 | 苏州浪潮智能科技有限公司 | 一种人工智能训练平台的告警预测方法及装置 |
Non-Patent Citations (3)
Title |
---|
WANG XUENING: "A Research of GcForest Methods for Network Abnormal Behavior Detection", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=9103834》 * |
何利等: "基于用户多维度信任的冷启动推荐模型", 《重庆邮电大学学报(自然科学版)》 * |
周先亭等: "融合异常检测与随机森林的微博转发行为预测方法", 《计算机科学》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113177442A (zh) * | 2021-04-12 | 2021-07-27 | 广东省科学院智能制造研究所 | 一种基于边缘计算的人体行为检测方法及装置 |
CN113177442B (zh) * | 2021-04-12 | 2024-01-30 | 广东省科学院智能制造研究所 | 一种基于边缘计算的人体行为检测方法及装置 |
CN113409166A (zh) * | 2021-08-19 | 2021-09-17 | 国网江西综合能源服务有限公司 | 基于XGBoost模型的用户异常用电行为检测方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN112632532B (zh) | 2022-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A hybrid intrusion detection system based on scalable K-means+ random forest and deep learning | |
Tong et al. | A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network | |
CN112365171B (zh) | 基于知识图谱的风险预测方法、装置、设备及存储介质 | |
CN110602120B (zh) | 一种面向网络的入侵数据检测方法 | |
CN112632532B (zh) | 边缘计算中基于深度森林的用户异常行为检测方法 | |
CN111914253B (zh) | 一种入侵检测的方法、系统、设备及可读存储介质 | |
CN111523831B (zh) | 风险团伙的识别方法、装置、存储介质和计算机设备 | |
Canbay et al. | A hybrid method for intrusion detection | |
Wang et al. | Filter pruning with a feature map entropy importance criterion for convolution neural networks compressing | |
CN112464232B (zh) | 一种基于混合特征组合分类的Android系统恶意软件检测方法 | |
CN112995414B (zh) | 基于语音通话的行为质检方法、装置、设备及存储介质 | |
CN112464233A (zh) | 一种云平台上基于rnn的恶意软件检测方法 | |
CN115438102A (zh) | 时空数据异常识别方法、装置和电子设备 | |
Bhattacharya et al. | Application of machine learning techniques in detecting fake profiles on social media | |
CN113268589B (zh) | 关键用户识别方法、装置、可读存储介质和计算机设备 | |
Tirumala et al. | Evaluation of feature and signature based training approaches for malware classification using autoencoders | |
CN116633589A (zh) | 社交网络中恶意账户检测方法、设备及存储介质 | |
CN111444362A (zh) | 恶意图片拦截方法、装置、设备和存储介质 | |
CN111310838A (zh) | 一种基于深度Gabor网络的药效图像分类识别方法 | |
CN116029760A (zh) | 消息推送方法、装置、计算机设备和存储介质 | |
CN113609480B (zh) | 基于大规模网络流的多路学习入侵检测方法 | |
Anum et al. | Enhancing rumor detection on social media using machine learning and empath features | |
CN114265954A (zh) | 基于位置与结构信息的图表示学习方法 | |
Ince | A novel approach for intrusion detection systems: V-IDS | |
Jotikabukkana et al. | The holistic framework of using machine learning for an effective incoming cyber threats detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240325 Address after: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province Patentee after: Shenzhen Hongyue Information Technology Co.,Ltd. Country or region after: China Address before: 400065 Chongwen Road, Nanshan Street, Nanan District, Chongqing Patentee before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS Country or region before: China |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240401 Address after: Room 3-301, Zone C, Financial Center, No. 158 West Third Road, Tianjin Pilot Free Trade Zone (Airport Economic Zone), Binhai New Area, Tianjin, 300000 RMB Patentee after: Tianjin Pickup Selling Technology Group Co.,Ltd. Country or region after: China Address before: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province Patentee before: Shenzhen Hongyue Information Technology Co.,Ltd. Country or region before: China |