CN114330544A - Method for establishing business flow abnormity detection model and abnormity detection method - Google Patents
Method for establishing business flow abnormity detection model and abnormity detection method Download PDFInfo
- Publication number
- CN114330544A CN114330544A CN202111627392.0A CN202111627392A CN114330544A CN 114330544 A CN114330544 A CN 114330544A CN 202111627392 A CN202111627392 A CN 202111627392A CN 114330544 A CN114330544 A CN 114330544A
- Authority
- CN
- China
- Prior art keywords
- coding block
- flow data
- detection model
- anomaly detection
- power grid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 100
- 238000000034 method Methods 0.000 title claims abstract description 81
- 239000013598 vector Substances 0.000 claims abstract description 156
- 238000012549 training Methods 0.000 claims abstract description 32
- 238000012545 processing Methods 0.000 claims abstract description 25
- 230000009466 transformation Effects 0.000 claims description 51
- 239000011159 matrix material Substances 0.000 claims description 29
- 230000015654 memory Effects 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 11
- 238000013528 artificial neural network Methods 0.000 claims description 10
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 238000003860 storage Methods 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 7
- 230000011218 segmentation Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 description 16
- 230000007246 mechanism Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 239000000284 extract Substances 0.000 description 5
- 239000000126 substance Substances 0.000 description 5
- 238000013135 deep learning Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000011897 real-time detection Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 230000001131 transforming effect Effects 0.000 description 2
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical compound C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000003709 image segmentation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 210000005036 nerve Anatomy 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 230000006403 short-term memory Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Abstract
The invention provides a method for establishing a service flow abnormity detection model and an abnormity detection method, wherein the method comprises the following steps: acquiring historical power grid flow data with classification marks; encoding historical power grid flow data to obtain a first characteristic vector set; inputting the first feature vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second feature vector set, and then inputting the second feature vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result; according to the prediction result and the classification marks of the historical power grid flow data, the initial anomaly detection model is trained to obtain a trained anomaly detection model, and the key information of the power grid flow data is extracted and the interdependence relation between the information is established, so that the reliability and the accuracy of the training of the anomaly detection model are improved, and the accuracy of the anomaly prediction of the power grid flow data is improved.
Description
Technical Field
The text belongs to the technical field of energy Internet, and particularly relates to a business flow abnormity detection model establishing method and an abnormity detection method.
Background
The energy internet and the intelligent terminal thereof are nerve centers of social operation and economic production, and the safety of the energy network and the terminal thereof is an important guarantee for social safety, production safety and energy safety. The electric power service flow can comprise professional control type and non-control type service flow such as scheduling, power utilization, power distribution and the like. At present, however, energy networks encounter more and more frequent network attacks, more and more attack sections, and increasingly serious threats and consequences are faced.
The traditional method for identifying abnormal and invasive behaviors by means of expert knowledge and experience is difficult to effectively detect and prevent network attacks in new situations. In the prior art, network data are detected and classified by a machine learning method, and the technology needs to use a feature engineering and requires that the data have good features, but as the network environment is more and more complex, the attacking sections are more and more flexible, so that the feature extraction becomes more difficult. The method also comprises an anomaly and intrusion detection technology based on deep learning, uses deep learning technologies such as a neural network and the like, automatically learns and extracts attack characteristics and flow characteristics by training on original network flow, and although the deep method can learn and extract abundant intrusion characteristics, information for extracting characteristics is treated equally no matter whether the information is related to the anomaly or the intrusion, in fact, not all information is important for constructing the characteristics and detecting the flow, so that the lower anomaly detection accuracy of the power grid service data is caused, and therefore a scheme capable of improving the anomaly detection accuracy of the energy Internet service flow is urgently needed.
Disclosure of Invention
In view of the foregoing problems in the prior art, an object of the present invention is to provide a method for establishing a traffic anomaly detection model and an anomaly detection method, which can improve the accuracy of detecting traffic anomalies in an energy internet service.
In order to solve the technical problems, the specific technical scheme is as follows:
in one aspect, a method for establishing a service traffic anomaly detection model is provided herein, where the method includes:
acquiring historical power grid flow data with classification marks;
encoding the historical power grid flow data to obtain a first characteristic vector set;
inputting the first characteristic vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second characteristic vector set, and then inputting the second characteristic vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result;
and training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data to obtain a trained anomaly detection model.
Further, the obtaining of historical grid flow data with the classification mark includes:
according to the energy Internet intelligent terminal topological structure, an intelligent terminal on the topological structure is determined, and an initial service message which is related to the intelligent terminal and is provided with a classification mark is collected;
and according to the attribute characteristics of the preset service message, carrying out segmentation processing on the initial service message to obtain historical power grid flow data with the same data source and destination.
Further, the encoding the historical grid flow data to obtain a first feature vector includes:
performing first coding processing on each byte in historical power grid flow data to obtain a word vector set consisting of a plurality of multi-dimensional word vectors;
performing second coding processing on each word vector in the word vector set to obtain an initial characteristic vector set;
and adding a learnable classification mark in each initial feature vector of the initial feature vector set to obtain a first feature vector set.
Further, the coding block comprises a transformation matrix layer, an attention weight calculation layer, a weighting layer and a feedforward neural network layer;
the transformation matrix layer in any coding block M is used for calculating a transformation vector of each eigenvector N in any coding block M according to the output result of each eigenvector N in the coding block M-1 at the upper layer and the transformation matrix in any coding block M;
the attention weight calculation layer in any coding block M is used for calculating and obtaining the attention weight of each eigenvector N in any coding block M according to the conversion vector of each eigenvector N in any coding block M and the conversion vector of the eigenvector corresponding to all historical power grid flow data in any coding block M;
the weighting layer in any coding block M is used for calculating and obtaining a weighting value corresponding to the feature vector N in any coding M block according to the attention weight of the feature vector N in any coding block M and the transformation vector of the feature vector corresponding to all historical power grid flow data in any coding block M;
and the feedforward neural network layer in any coding block M is used for calculating and obtaining the output result of the eigenvector N in any coding block M according to the weighted value corresponding to the eigenvector N in any coding block M and the linear transformation matrix in any coding block M, wherein the output result of the last layer of coding block is the second eigenvector output by the eigenvector N in the multilayer coding block.
Further, the transformation matrix comprises a query transformation matrix, a key transformation matrix, and a value transformation matrix;
the transformation vectors include a query transformation vector, a key transformation vector, and a value transformation vector.
Further, the transform matrix layer in the first layer coding block is configured to calculate a transform vector of each eigenvector in the first layer coding block according to each eigenvector in the first eigenvector set and the transform matrix of the first layer coding block.
In another aspect, a method for detecting traffic flow anomaly is further provided, where the method includes:
acquiring service flow data to be detected;
coding the to-be-detected service flow data to obtain a first characteristic vector set;
and inputting the first characteristic vector set into the anomaly detection model established by the method to obtain a classification result of the to-be-detected service flow data.
In another aspect, this document also provides a device for establishing a service traffic anomaly detection model, where the device includes:
the historical power grid flow data acquisition module is used for acquiring historical power grid flow data with classification marks;
the encoding module is used for encoding the historical power grid flow data to obtain a first characteristic vector set;
a prediction result obtaining module, configured to input the first feature vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second feature vector set, and then input the second feature vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result;
and the training module is used for training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data so as to obtain a trained anomaly detection model.
In another aspect, a computer device is also provided herein, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the method as described above when executing the computer program.
Finally, a computer-readable storage medium is also provided herein, which stores a computer program that, when executed by a processor, implements the method as described above.
By adopting the technical scheme, the method for establishing the service flow anomaly detection model and the anomaly detection method are disclosed, wherein the anomaly detection model establishment method obtains historical power grid flow data with classification marks, then codes the historical power grid flow data to obtain a first characteristic vector, inputs the first characteristic vector into a multilayer coding block of an initial anomaly detection model for processing to obtain a second characteristic vector set, then inputs the second characteristic vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result, trains the initial anomaly detection model based on the prediction result and the classification marks of the historical power grid flow data to obtain the trained anomaly detection model, and then can realize the prediction of the anomaly type of the power grid flow data through the trained model, the method extracts the key information of the power grid flow data and establishes the interdependency relation among the information, so that the service understanding is more accurate, the reliability and the accuracy of the training of the anomaly detection model are improved, and the accuracy of the anomaly prediction of the power grid flow data is improved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 shows a schematic representation of an implementation environment for a method provided by embodiments herein;
fig. 2 is a schematic diagram illustrating steps of a service traffic anomaly detection model establishing method provided in an embodiment of the present disclosure;
FIG. 3 is a schematic diagram illustrating a first feature vector set obtaining step in an embodiment herein;
FIG. 4 is a diagram illustrating the structure of a coding block in an embodiment herein;
fig. 5 is a schematic structural diagram illustrating a service traffic anomaly detection model building apparatus according to an embodiment of the present disclosure;
fig. 6 is a schematic diagram illustrating steps of a method for detecting traffic flow anomaly provided in an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram illustrating a traffic flow anomaly detection apparatus provided in an embodiment of the present disclosure;
fig. 8 shows a schematic structural diagram of a computer device provided in an embodiment herein.
Description of the symbols of the drawings:
10. a client;
20. a network;
30. a server;
110. a historical power grid flow data acquisition module;
120. an encoding module;
130. a prediction result obtaining module;
140. a training module;
210. a module for acquiring data to be detected;
220. a to-be-detected data encoding module;
230. a prediction module;
802. a computer device;
804. a processor;
806. a memory;
808. a drive mechanism;
810. an input/output module;
812. an input device;
814. an output device;
816. a presentation device;
818. a graphical user interface;
820. a network interface;
822. a communication link;
824. a communication bus.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments herein without making any creative effort, shall fall within the scope of protection.
It should be noted that the terms "first," "second," and the like in the description and claims herein and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments herein described are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
In the prior art, network data are generally detected and classified by a machine learning method for flow data detection in an energy internet and an intelligent terminal thereof, and the technology needs to use a feature engineering and requires that the data have good features. The method also comprises an anomaly and intrusion detection technology based on deep learning, uses deep learning technologies such as a neural network and the like, automatically learns and extracts attack characteristics and flow characteristics by training on original network flow, and although the deep method can learn and extract abundant intrusion characteristics, information for extracting the characteristics is treated equally no matter whether the information is related to the anomaly or the intrusion, in fact, not all the information is equally important for constructing the characteristics and detecting the flow, thereby resulting in lower power grid service data anomaly detection accuracy.
In order to solve the above problems, embodiments of the present specification provide a method for establishing a service traffic anomaly detection model, where the anomaly detection model established by the method can establish a mutual dependency relationship between data traffic on the basis of paying attention to key information of the data traffic, so as to improve service understanding capability and further improve accuracy of prediction of the anomaly detection model. As shown in fig. 1, the implementation environment of the method is schematically illustrated, and the method may include a client 10 and a server 30, where the client 10 and the server 30 are connected through a network 20, and may implement data interaction through the network 20.
The client 10 may establish a connection with a background server corresponding to an energy internet, and acquire historical grid flow data stored in the background server, where the historical grid flow data is already marked with a classification flag, that is, an abnormal label; the client 10 sends the collected historical grid flow data to the server 30.
The server 30 is preconfigured with corresponding model training logic, and performs training of the anomaly detection model according to the received historical grid flow data, so as to obtain an anomaly detection model for predicting an anomaly condition of the grid flow data, specifically, the training process of the server 30 may be: encoding the historical power grid flow data to obtain a first characteristic vector set; inputting the first characteristic vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second characteristic vector set, and then inputting the second characteristic vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result; and training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data to obtain a trained anomaly detection model.
In an optional embodiment, the server 30 may be an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform, and the like.
In an alternative embodiment, the client 10 may perform the anomaly prediction of the grid data traffic in combination with the anomaly detection model trained by the server 30. Specifically, the client 10 may include, but is not limited to, a smart phone, a desktop computer, a tablet computer, a notebook computer, a smart speaker, a digital assistant, an Augmented Reality (AR)/Virtual Reality (VR) device, a smart wearable device, and other types of electronic devices. Optionally, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, Linux, Windows, and the like.
In addition, it should be noted that fig. 1 shows only one application environment provided by the present disclosure, and in practical applications, other application environments may also be included, for example, training of a target image segmentation model may also be implemented on the client 10.
It should be noted again that the client 10 may also be an intelligent terminal of the energy internet, and the intelligent terminal may be an intelligent electric meter, an exchanger, or other equipment, and by acquiring historical grid flow data of the intelligent terminal and sending the data to the server 30 for training the anomaly detection model, and finally deploying the trained anomaly detection model in the client 10 or other key nodes, real-time detection and classification of the grid flow data are achieved, and real-time alarm is further achieved.
Specifically, embodiments herein provide a method for establishing a service traffic anomaly detection model, where the anomaly detection model established by the method can establish a mutual dependency relationship between data traffic on the basis of focusing attention on key information of the data traffic, thereby improving service understanding capability and further improving accuracy of prediction of the anomaly detection model. Fig. 2 is a schematic step diagram of a method for establishing a traffic flow anomaly detection model provided in an embodiment herein, and the present specification provides the method operation steps as described in the embodiment or the flowchart, but more or less operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. Specifically, as shown in fig. 2, the method may include:
s101: acquiring historical power grid flow data with classification marks;
s102: encoding the historical power grid flow data to obtain a first characteristic vector set;
s103: inputting the first characteristic vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second characteristic vector set, and then inputting the second characteristic vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result;
s104: and training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data to obtain a trained anomaly detection model.
It can be understood that, in the embodiments of the present description, a first feature vector set is obtained by encoding historical grid flow data with a classification flag, then a prediction result is obtained by processing in an initial anomaly detection model provided with a multilayer encoding block and a multilayer sensor, where the prediction result may be a prediction result of an anomaly type of the historical grid flow data, and finally the initial anomaly detection model is trained on the classification flag determined in advance according to the prediction result and the historical grid flow data, so as to obtain an anomaly detection model capable of accurately predicting the anomaly type of the grid flow data.
The classification flag may be a tag of an abnormal condition of the grid traffic data, for example, the classification flag may be normal traffic and abnormal traffic, and further, the abnormal traffic may be classified into grid attack abnormal traffic such as Denial of Service attack (DoS), Port scan (Port Scans), backdoor attack (Backdoors), vulnerability exploitation (explorers), vulnerability mining (Fuzzers), worm attack (Worms), and the like. And the output result of the anomaly detection model is the classification mark of the input power grid flow data.
In this embodiment of the present disclosure, the initial anomaly detection model may be a pre-training model, where the pre-training model may be obtained through training a public data set, and then fine-tuning (finetune) the pre-training model according to the historical grid flow data, so that the efficiency of model training may be improved by using the pre-training model as the initial anomaly detection model, and it is further ensured that the trained anomaly detection model is more suitable for detecting anomalies and intrusions associated with the energy internet. The common data set may be an intrusion detection data set, such as NSL-KDD and UNSW-NB15, and the specific common data set is not limited in the embodiments of the present specification.
In an embodiment of the present specification, the obtaining historical grid flow data with a classification flag includes:
according to the energy Internet intelligent terminal topological structure, an intelligent terminal on the topological structure is determined, and an initial service message which is related to the intelligent terminal and is provided with a classification mark is collected;
and according to the attribute characteristics of the preset service message, carrying out segmentation processing on the initial service message to obtain historical power grid flow data with the same data source and destination.
It can be understood that, in the embodiment of the present specification, by determining a topology structure of an energy internet intelligent terminal in a designated area or a designated system, the number and connection relationship of the intelligent terminals in the designated area or the designated system can be quickly determined, so that an initial service packet related to each intelligent terminal can be obtained, and the initial service packet can be understood as a packet that has been subjected to historical abnormal verification, so that a classification flag of each initial service packet can be determined. And then according to the attribute characteristics of the preset service part, the initial service message is segmented to obtain historical power grid flow data with the same data source and the same target, so that training is performed through the data of the same source and the target, and the reliability of model training is improved.
The network traffic (or the grid service packet) generally includes traffic from a plurality of source IPs or source ports, traffic to a plurality of destination IPs or destination ports, and traffic of different protocols, and it is necessary to segment the traffic within a period of time according to the source IP, the source port, the destination IP, the destination port, and the protocol, and each segmented packet traffic is from the same IP, or from different ports and protocols to the same IP, or the same IP. After the segmentation, whether an independent data packet contains intrusion behavior can be analyzed, and whether intrusion or abnormality occurs can be judged by analyzing the flow statistical characteristics within a period of time.
The attribute characteristics of the preset service message can be a message format setting mode, different position fields in the message represent different attributes, for example, a data source and a data destination are in different positions, the attribute of the initial service message can be determined by extracting the different position fields, and the segmentation processing is performed at different positions to obtain the power grid flow data, for example, the message with the same data source and destination is segmented to obtain a corresponding flow data packet, the model is trained by using the flow data packet, the training process can be participated by using the dependency relationship between different flow data in the flow data packet, and the training reliability is improved.
After the initial service message is switched, the discrete message with the same data source and destination can be obtained, in order to improve the validity of the data, the effective data in the discrete message can be extracted, useless data such as an IP header and the like can be discarded, repeated data can be reduced, invalid data with the length of zero can be deleted, for example, effective data above a service transmission layer can be extracted, and the understanding efficiency and accuracy of the service can be improved.
In actual work, discrete messages obtained by segmentation all exist in a traditional hexadecimal form, so that data processing is facilitated, data identification difficulty is reduced, the discrete messages need to be converted to obtain text data, the text data are power grid flow data, and the data conversion mode is not limited in the embodiment of the specification.
In this embodiment of the present specification, as shown in fig. 3, the encoding the historical grid flow data to obtain a first feature vector includes:
s201: performing first coding processing on each byte in historical power grid flow data to obtain a word vector set consisting of a plurality of multi-dimensional word vectors;
s202: performing second coding processing on each word vector in the word vector set to obtain an initial characteristic vector set;
s203: and adding a learnable classification mark in each initial feature vector of the initial feature vector set to obtain a first feature vector set.
It can be understood that the historical grid flow data exists in the form of text data, where each text data includes a plurality of service bytes, that is, each historical grid flow data is composed of a sequence of service bytes, and a multidimensional (i.e., d-dimensional) word vector can be obtained by performing a first encoding process on each byte, where a set of word vectors obtained by encoding each byte in the historical grid flow data having the same data source and destination can be represented as:wherein P represents the number (i.e. number) of historical grid flow data with the same data source and destination, K represents the length (i.e. number of bytes) of each historical grid flow data, d represents the length of byte encoding, and each word vector (i.e. each byte encoding) in the word vector set is represented as: x ═ X(p,k)Wherein p represents the p-th historical grid flow data and k represents the k-th byte.
In this embodiment of the present specification, the first Encoding process may be One-Hot Encoding (One-Hot Encoding), or may have other Encoding manners, which is not limited in this embodiment of the present specification.
The second encoding process may be understood as assigning a unique position code to each byte code (i.e., word vector), so that the interdependence between bytes can be learned, and important information inside the service can be focused. Alternatively, the initial feature vector is represented by the following manner (1):
wherein the content of the first and second substances,the initial characteristic vector of the kth byte in the pth historical power grid flow data is obtained; w is a learnable parameter matrix;is a learnable position code.
In a further embodiment, a learnable classifier needs to be added to each initial feature vector to obtain the first feature vector, and preferably, the learnable classifier (classification token) can be added to the head of the sequence of the initial feature vector optionallyThe learnable class flag ultimately classifies grid flow data and, therefore,bonding ofCan be used as input for subsequent training of the model.
In the embodiment of the present specification, as shown in fig. 4, the coding Block (Encoding Block) may include a transform matrix layer, an attention weight calculation layer, a weighting layer, and a feedforward neural network layer;
the transformation matrix layer in any coding block M is used for calculating a transformation vector of each eigenvector N in any coding block M according to the output result of each eigenvector N in the coding block M-1 at the upper layer and the transformation matrix in any coding block M;
the attention weight calculation layer in any coding block M is used for calculating and obtaining the attention weight of each eigenvector N in any coding block M according to the conversion vector of each eigenvector N in any coding block M and the conversion vector of the eigenvector corresponding to all historical power grid flow data in any coding block M;
the weighting layer in any coding block M is used for calculating and obtaining a weighting value corresponding to the feature vector N in any coding M block according to the attention weight of the feature vector N in any coding block M and the transformation vector of the feature vector corresponding to all historical power grid flow data in any coding block M;
and the feedforward neural network layer in any coding block M is used for calculating and obtaining the output result of the eigenvector N in any coding block M according to the weighted value corresponding to the eigenvector N in any coding block M and the linear transformation matrix in any coding block M, wherein the output result of the last layer of coding block is the second eigenvector output by the eigenvector N in the multilayer coding block.
The number of layers L of the coding blocks determines the complexity, the number of parameters and the calculation amount of the model. In general, a larger L may lead to better detection accuracy, but also introduces more training parameters and more consumption of computational resources. Therefore, the decision can be balanced according to the hardware resource environment deployed by the model and the expected detection accuracy, the hardware configuration is high, a larger L can be used, the configuration is low, and a smaller L is considered. In the early experiments, the value of L is not more than 10, so that a better result can be obtained, and a lot of computing resources are not consumed, and the specific value of L is not limited in the embodiment of the specification.
In this embodiment, the feature vector N is actually a feature vector corresponding to each byte, and may be a first feature vector.
In the embodiment of the description, a Transformer method framework is integrally constructed, and the Transformer method is used for calculating the correlation between byte characteristics in each historical power grid flow data or between historical power grid flow data (namely messages) and establishing the attention degree between the characteristics or between services in a service byte sequence, because the correlation and the attention degree are the direct establishment of the relation between the characteristics or between the services and do not have too many transformations which cause information loss, a direct dependency relationship can be obtained no matter how long the characteristics are, so that the understanding capability of service data can be improved, and the reliability and the accuracy of model prediction are improved.
It can be understood that the attention-based energy internet traffic data anomaly detection Transformer model can be realized by arranging a plurality of layers of coding blocks, wherein inside each coding block, each service byte (i.e. a feature vector corresponding to a byte) coded by a lower layer coding block is transformed to obtain a corresponding transformation vector, and the transformation vector comprises a query transformation vector (query), a key transformation vector (key) and a value transformation vector (value). Accordingly, different strolling transformation vectors correspond to different transformation matrices. Alternatively, the above three transformation vectors may be represented by the following equations (2) to (4):
wherein the content of the first and second substances,query transformation vectors corresponding to the a-th index of the coding block at the l-th layer of the characteristic vectors corresponding to the k-th byte in the p pieces of historical power grid flow data;a key transformation vector corresponding to the a-th index of the coding block at the l-th layer is used as the characteristic vector corresponding to the k-th byte in the p pieces of historical power grid flow data;converting a vector for a value corresponding to the a-th index of a characteristic vector corresponding to the k-th byte in the p historical power grid flow data in the l-th layer coding block; LN () represents the normalization process (LayerNorm), a ∈ { 1., A } represents the multi-head index of the multi-head attention (multi-head attention heads), DhD is the vector dimension;transforming the vector for the query of the a-th index of the l-th layer coding block;a key transformation vector of the a index of the l layer coding block;transforming a vector for the value of the a-th index of the l-th layer coding block;and outputting the output result of the characteristic vector corresponding to the kth byte in the pth historical power grid flow data in an l-1 layer coding block.
Among them, the self-attention mechanism generally uses a multi-head (head) attention method, where a is the number of heads. The multi-head aims to split the input of the encoder block into A parts, and each part is a head (head), so that the model learns more characteristic patterns, and the service understanding capability is enhanced.
It should be noted that the transform matrix layer in the first-layer coding block is configured to calculate a transform vector of each eigenvector in the first-layer coding block according to each eigenvector in the first eigenvector set and the transform matrix of the first-layer coding block. That is to say, the linkage work of the multilayer coding blocks can be realized by inputting the first eigenvector obtained by coding the historical power grid flow data into the first layer coding block, and then the final second eigenvector is output.
In this embodiment of the present specification, the attention weight may be a correlation or attention degree between bytes in historical grid flow data (i.e. service packets) and a relationship between historical grid flow data, and is obtained by features between services and between bytes inside a service when calculating, and optionally, the attention weight of the feature vector in any coding block is represented by the following formula (5):
wherein the content of the first and second substances,an attention weight value of a feature vector corresponding to a kth byte in the pth historical power grid flow data in a coding block at the l layer is represented, a is an index of multiple heads attention, and DhD is the dimension of the feature vector, a is the amount of attention of the multiple head,a query transformation vector of a characteristic vector corresponding to the kth byte in the pth historical power grid flow data in a l layer coding block,for coding a classification token (i.e. a flag) in the l-th layer) Key transformation after transformation by formula (3)The amount of the compound (A) is,and the key transformation vector of the l layer coding block is the characteristic vector corresponding to the k 'th byte in the p' th historical power grid flow data.
It should be noted that, when the model is designed, the user hardware configuration environment needs to be considered, and although relatively high accuracy can be obtained through formula (5), a relatively large amount of calculation is required when the attention weight is calculated, so that the requirement on the configuration environment is relatively high, and smooth operation is difficult in some devices with relatively low configuration environments. Alternatively, the attention weight value may also be represented by the following formula (6):
the parameter definition in the formula (6) can refer to the formula (5), and the attention weight between the bytes in the service can be obtained through the formula (6), so that the device with a lower configuration environment can be adapted. In actual calculation, an appropriate attention weight calculation formula is selected according to the deployment situation of the hardware resource, and a specific selection process is not limited in the embodiment of the present specification.
In this embodiment of the present specification, when the attention weight is calculated by equation (5), the corresponding weight of the feature vector in any one coding block is expressed by equation (7) as follows:
wherein the content of the first and second substances,the weighting value of the characteristic vector corresponding to the kth byte in the pth historical grid flow data in the l layer coding block,the attention weight value of a feature vector corresponding to the kth byte in the pth historical grid flow data in a l layer coding block,for class flags (i.e. for layer I code blocks)) The value after the transformation of equation (4) transforms the vector,and converting a vector for the value of a characteristic vector corresponding to the kth byte in the pth historical power grid flow data in a coding block at the l layer, wherein P is the number of the historical power grid flow data, and K is the number of bytes in each historical power grid flow data.
Accordingly, when the intention weight is calculated by equation (6), the corresponding weight of the feature vector in any coding block is expressed by equation (8) as follows:
the parameter definition in the formula (8) may refer to the formula (7), which is not described in detail in this embodiment of the present specification.
In the embodiment of the present specification, the output result of the feature vector in any one coding block is expressed by the following formula (9) to formula (10):
wherein the content of the first and second substances,a middle vector of a coding block at the l layer of a characteristic vector corresponding to the kth byte in the pth historical power grid flow data; wo [ 2 ]]In the form of a linear transformation matrix, the transformation matrix,outputting a result of a feature vector corresponding to the kth byte in the pth historical power grid flow data in an l layer coding block; LN () is a normalization process; MLP () is a feed-forward neural network.
In this embodiment, the multi-layer perceptron processes the second feature vector set to obtain a prediction result according to the following formula (11):
wherein, y is the result of the prediction,the final value of the classification token (classification token) can be learned in the second feature vector output by the last layer of coding blocks.
Therefore, the anomaly detection model establishing method provided by the invention adopts a self-attention mechanism, not only can focus on key information, but also can establish the interdependence relationship among information, and is more accurate for service understanding. The attention mechanism is combined between the interior of the business and the business, so that the attention information is more comprehensive, and the obtained dependency relationship is more comprehensive. Therefore, the use of the self-attention mechanism enables the energy internet service traffic anomaly detection to be more accurate. Moreover, the self-attention mechanism can establish the dependency relationship between Long-distance service information, and the calculation cannot be increased along with the increase of the distance, so that the problems that a Recurrent Neural Network (RNN) and a Long Short-Term Memory Network (LSTM) cannot be trained and operated in parallel and the dependency relationship between Long-distance information is difficult to establish are solved.
Based on the same inventive concept, an embodiment of the present specification further provides a device for establishing a service traffic anomaly detection model, as shown in fig. 5, where the device includes:
a historical grid flow data acquiring module 110, configured to acquire historical grid flow data with a classification flag;
the encoding module 120 is configured to perform encoding processing on the historical grid flow data to obtain a first characteristic vector set;
a prediction result obtaining module 130, configured to input the first feature vector set into a multilayer coding block of an initial anomaly detection model for processing, so as to obtain a second feature vector set, and then input the second feature vector set into a multilayer perceptron of the initial anomaly detection model, so as to obtain a prediction result;
and the training module 140 is configured to train the initial anomaly detection model according to the prediction result and the classification flag of the historical grid flow data, so as to obtain a trained anomaly detection model.
The beneficial effects obtained by the above device are consistent with those obtained by the above scheme, and the embodiments of the present description are not repeated.
On the basis of the above-mentioned method for establishing an anomaly detection model, an embodiment of the present specification further provides a method for detecting an anomaly in a service flow, as shown in fig. 6, where the method includes:
s301: acquiring service flow data to be detected;
s302: coding the to-be-detected service flow data to obtain a first characteristic vector set;
s303: and inputting the first characteristic vector set into the anomaly detection model established by the method to obtain a classification result of the to-be-detected service flow data.
It can be understood that, in the embodiment of the present specification, the anomaly detection model established by the method is used for performing real-time detection on the energy internet service traffic, a suitable anomaly detection model is selected according to the operational capability that can be provided by the intelligent terminal or other nodes to be detected, and the anomaly detection model is deployed on the intelligent terminal or other nodes to be detected, so as to perform real-time detection and classification on the service traffic, thereby realizing efficient and reliable monitoring and alarm.
It should be noted that the encoding of the service flow data to be detected is consistent with the encoding of the historical power grid flow data during model training, and no further description is provided in the embodiments of the description.
The service traffic data to be detected may include one piece of data, or may be multiple pieces of data collected in a specified time period, where the multiple pieces of data may be service traffic data having the same data source and destination.
Correspondingly, an embodiment of the present specification further provides a device for detecting traffic flow anomaly, as shown in fig. 7, where the device includes:
a to-be-detected data acquisition module 210, configured to acquire to-be-detected service traffic data;
a to-be-detected data encoding module 220, configured to perform encoding processing on the to-be-detected traffic data to obtain a first characteristic vector set;
the predicting module 230 is configured to input the first feature vector set into the anomaly detection model established by the method, and obtain a classification result of the traffic data to be detected.
The beneficial effects obtained by the service traffic anomaly detection device are consistent with those obtained by the service traffic anomaly detection method, and the embodiments of the present specification are not described in detail.
As shown in fig. 8, for a computer device provided in this embodiment, an apparatus herein may be a computer device in this embodiment, and perform the method herein, the computer device 802 may include one or more processors 804, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 802 may also include any memory 806 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, memory 806 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any memory may use any technology to store information. Further, any memory may provide volatile or non-volatile retention of information. Further, any memory may represent fixed or removable components of computer device 802. In one case, when the processor 804 executes the associated instructions, which are stored in any memory or combination of memories, the computer device 802 can perform any of the operations of the associated instructions. The computer device 802 also includes one or more drive mechanisms 808, such as a hard disk drive mechanism, an optical disk drive mechanism, etc., for interacting with any memory.
Corresponding to the methods in fig. 2-3 or fig. 6, the embodiments herein also provide a computer-readable storage medium having stored thereon a computer program, which, when executed by a processor, performs the steps of the above-described method.
Embodiments herein also provide computer readable instructions, wherein a program therein causes a processor to perform the method as shown in fig. 2-3 or fig. 6 when the instructions are executed by the processor.
It should be understood that, in various embodiments herein, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments herein.
It should also be understood that, in the embodiments herein, the term "and/or" is only one kind of association relation describing an associated object, meaning that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided herein, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purposes of the embodiments herein.
In addition, functional units in the embodiments herein may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present invention may be implemented in a form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The principles and embodiments of this document are explained herein using specific examples, which are presented only to aid in understanding the methods and their core concepts; meanwhile, for the general technical personnel in the field, according to the idea of this document, there may be changes in the concrete implementation and the application scope, in summary, this description should not be understood as the limitation of this document.
Claims (10)
1. A method for establishing a service flow anomaly detection model is characterized by comprising the following steps:
acquiring historical power grid flow data with classification marks;
encoding the historical power grid flow data to obtain a first characteristic vector set;
inputting the first characteristic vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second characteristic vector set, and then inputting the second characteristic vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result;
and training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data to obtain a trained anomaly detection model.
2. The method of claim 1, wherein obtaining historical grid flow data with a signature comprises:
according to the energy Internet intelligent terminal topological structure, an intelligent terminal on the topological structure is determined, and an initial service message which is related to the intelligent terminal and is provided with a classification mark is collected;
and according to the attribute characteristics of the preset service message, carrying out segmentation processing on the initial service message to obtain historical power grid flow data with the same data source and destination.
3. The method of claim 1, wherein the encoding the historical grid flow data to obtain a first eigenvector comprises:
performing first coding processing on each byte in historical power grid flow data to obtain a word vector set consisting of a plurality of multi-dimensional word vectors;
performing second coding processing on each word vector in the word vector set to obtain an initial characteristic vector set;
and adding a learnable classification mark in each initial feature vector of the initial feature vector set to obtain a first feature vector set.
4. The method of claim 1, wherein the coding block comprises a transform matrix layer, an attention weight calculation layer, a weighting layer, and a feedforward neural network layer;
the transformation matrix layer in any coding block M is used for calculating a transformation vector of each eigenvector N in any coding block M according to the output result of each eigenvector N in the coding block M-1 at the upper layer and the transformation matrix in any coding block M;
the attention weight calculation layer in any coding block M is used for calculating and obtaining the attention weight of each eigenvector N in any coding block M according to the conversion vector of each eigenvector N in any coding block M and the conversion vector of the eigenvector corresponding to all historical power grid flow data in any coding block M;
the weighting layer in any coding block M is used for calculating and obtaining a weighting value corresponding to the feature vector N in any coding M block according to the attention weight of the feature vector N in any coding block M and the transformation vector of the feature vector corresponding to all historical power grid flow data in any coding block M;
and the feedforward neural network layer in any coding block M is used for calculating and obtaining the output result of the eigenvector N in any coding block M according to the weighted value corresponding to the eigenvector N in any coding block M and the linear transformation matrix in any coding block M, wherein the output result of the last layer of coding block is the second eigenvector output by the eigenvector N in the multilayer coding block.
5. The method of claim 4,
the transformation matrix comprises an inquiry transformation matrix, a key transformation matrix and a value transformation matrix;
the transformation vectors include a query transformation vector, a key transformation vector, and a value transformation vector.
6. The method of claim 4, wherein the transform matrix layer in the first layer coding block is configured to compute a transform vector of each eigenvector in the first layer coding block according to each eigenvector in the first set of eigenvectors and the transform matrix of the first layer coding block.
7. A method for detecting abnormal service flow is characterized in that the method comprises the following steps:
acquiring service flow data to be detected;
coding the to-be-detected service flow data to obtain a first characteristic vector set;
inputting the first feature vector set into an anomaly detection model established by the method of any one of claims 1 to 6, and obtaining a classification result of the traffic data to be detected.
8. A device for establishing a service traffic anomaly detection model, the device comprising:
the historical power grid flow data acquisition module is used for acquiring historical power grid flow data with classification marks;
the encoding module is used for encoding the historical power grid flow data to obtain a first characteristic vector set;
a prediction result obtaining module, configured to input the first feature vector set into a multilayer coding block of an initial anomaly detection model for processing to obtain a second feature vector set, and then input the second feature vector set into a multilayer perceptron of the initial anomaly detection model to obtain a prediction result;
and the training module is used for training the initial anomaly detection model according to the prediction result and the classification mark of the historical power grid flow data so as to obtain a trained anomaly detection model.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111627392.0A CN114330544A (en) | 2021-12-28 | 2021-12-28 | Method for establishing business flow abnormity detection model and abnormity detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111627392.0A CN114330544A (en) | 2021-12-28 | 2021-12-28 | Method for establishing business flow abnormity detection model and abnormity detection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114330544A true CN114330544A (en) | 2022-04-12 |
Family
ID=81015179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111627392.0A Pending CN114330544A (en) | 2021-12-28 | 2021-12-28 | Method for establishing business flow abnormity detection model and abnormity detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114330544A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114615088A (en) * | 2022-04-25 | 2022-06-10 | 国网冀北电力有限公司信息通信分公司 | Terminal service flow abnormity detection model establishing method and abnormity detection method |
CN115062721A (en) * | 2022-07-01 | 2022-09-16 | 中国电信股份有限公司 | Network intrusion detection method and device, computer readable medium and electronic equipment |
CN115102871A (en) * | 2022-05-20 | 2022-09-23 | 浙江大学 | Energy internet control terminal service processing method based on service feature vector |
CN115470936A (en) * | 2022-09-23 | 2022-12-13 | 广州爱浦路网络技术有限公司 | NWDAF-based machine learning model updating method and device |
CN117479219A (en) * | 2023-11-07 | 2024-01-30 | 广州方舟文化科技有限公司 | Method and system for monitoring mobile phone flow card package |
-
2021
- 2021-12-28 CN CN202111627392.0A patent/CN114330544A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114615088A (en) * | 2022-04-25 | 2022-06-10 | 国网冀北电力有限公司信息通信分公司 | Terminal service flow abnormity detection model establishing method and abnormity detection method |
CN115102871A (en) * | 2022-05-20 | 2022-09-23 | 浙江大学 | Energy internet control terminal service processing method based on service feature vector |
CN115102871B (en) * | 2022-05-20 | 2023-10-03 | 浙江大学 | Service feature vector-based energy internet control terminal service processing method |
CN115062721A (en) * | 2022-07-01 | 2022-09-16 | 中国电信股份有限公司 | Network intrusion detection method and device, computer readable medium and electronic equipment |
CN115062721B (en) * | 2022-07-01 | 2023-10-31 | 中国电信股份有限公司 | Network intrusion detection method and device, computer readable medium and electronic equipment |
CN115470936A (en) * | 2022-09-23 | 2022-12-13 | 广州爱浦路网络技术有限公司 | NWDAF-based machine learning model updating method and device |
CN115470936B (en) * | 2022-09-23 | 2023-06-06 | 广州爱浦路网络技术有限公司 | NWDAF-based machine learning model updating method and device |
CN117479219A (en) * | 2023-11-07 | 2024-01-30 | 广州方舟文化科技有限公司 | Method and system for monitoring mobile phone flow card package |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114330544A (en) | Method for establishing business flow abnormity detection model and abnormity detection method | |
Qu et al. | A survey on the development of self-organizing maps for unsupervised intrusion detection | |
US10187401B2 (en) | Hierarchical feature extraction for malware classification in network traffic | |
CN107360145B (en) | Multi-node honeypot system and data analysis method thereof | |
Lee et al. | Detection of DDoS attacks using optimized traffic matrix | |
Tsogbaatar et al. | DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT | |
CN115606162A (en) | Abnormal flow detection method and system, and computer storage medium | |
Shen et al. | Machine learning-powered encrypted network traffic analysis: a comprehensive survey | |
CN107667505A (en) | System for monitoring and managing data center | |
US11113397B2 (en) | Detection of malicious executable files using hierarchical models | |
CN114615088A (en) | Terminal service flow abnormity detection model establishing method and abnormity detection method | |
Pathak et al. | Anomaly detection using machine learning to discover sensor tampering in IoT systems | |
KR102168496B1 (en) | Environmental Analysis and Correction System for Transfer Learning and Its Method | |
Vinayakumar et al. | Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks | |
US20240106836A1 (en) | Learning of malicious behavior vocabulary and threat detection | |
Atli | Anomaly-based intrusion detection by modeling probability distributions of flow characteristics | |
CN115396204A (en) | Industrial control network flow abnormity detection method and device based on sequence prediction | |
CN117113262A (en) | Network traffic identification method and system | |
Wang et al. | An unknown protocol syntax analysis method based on convolutional neural network | |
Rajesh et al. | Evaluation of machine learning algorithms for detection of malicious traffic in scada network | |
CN114866310A (en) | Malicious encrypted flow detection method, terminal equipment and storage medium | |
Mubarak et al. | Ics cyber attack detection with ensemble machine learning and dpi using cyber-kit datasets | |
Obeidat | Hybrid approach for botnet detection using k-means and k-medoids with Hopfield neural network | |
Nie et al. | M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system | |
Wan et al. | DevTag: A benchmark for fingerprinting IoT devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |