CN115086070B - 工业互联网入侵检测方法及系统 - Google Patents
工业互联网入侵检测方法及系统 Download PDFInfo
- Publication number
- CN115086070B CN115086070B CN202210849921.XA CN202210849921A CN115086070B CN 115086070 B CN115086070 B CN 115086070B CN 202210849921 A CN202210849921 A CN 202210849921A CN 115086070 B CN115086070 B CN 115086070B
- Authority
- CN
- China
- Prior art keywords
- data
- sphere
- training
- network data
- intrusion detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 65
- 238000004364 calculation method Methods 0.000 claims abstract description 3
- 238000012549 training Methods 0.000 claims description 74
- 238000012360 testing method Methods 0.000 claims description 34
- 238000000034 method Methods 0.000 claims description 24
- 238000005457 optimization Methods 0.000 claims description 14
- 230000009977 dual effect Effects 0.000 claims description 11
- 238000013507 mapping Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 3
- 230000009471 action Effects 0.000 claims description 2
- 238000002474 experimental method Methods 0.000 claims description 2
- 238000004422 calculation algorithm Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 11
- 230000002159 abnormal effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000011160 research Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 239000002245 particle Substances 0.000 description 2
- 238000013179 statistical model Methods 0.000 description 2
- 238000012706 support-vector machine Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000007635 classification algorithm Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Biomedical Technology (AREA)
- Molecular Biology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biophysics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210849921.XA CN115086070B (zh) | 2022-07-20 | 2022-07-20 | 工业互联网入侵检测方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210849921.XA CN115086070B (zh) | 2022-07-20 | 2022-07-20 | 工业互联网入侵检测方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115086070A CN115086070A (zh) | 2022-09-20 |
CN115086070B true CN115086070B (zh) | 2022-11-15 |
Family
ID=83259809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210849921.XA Active CN115086070B (zh) | 2022-07-20 | 2022-07-20 | 工业互联网入侵检测方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115086070B (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116611746B (zh) * | 2023-07-20 | 2024-01-09 | 深圳华龙讯达信息技术股份有限公司 | 一种基于工业互联网的产品质量管理方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110868414A (zh) * | 2019-11-14 | 2020-03-06 | 北京理工大学 | 一种基于多投票技术的工控网络入侵检测方法及系统 |
WO2022012144A1 (zh) * | 2020-07-17 | 2022-01-20 | 湖南大学 | 基于不平衡数据深度信念网络的并行入侵检测方法和系统 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101980480B (zh) * | 2010-11-04 | 2012-12-05 | 西安电子科技大学 | 半监督异常入侵检测方法 |
KR20160095856A (ko) * | 2015-02-04 | 2016-08-12 | 한국전자통신연구원 | 새로운 공격 유형의 자동 탐지 및 공격 유형 모델 갱신을 통한 지능형 침입 탐지 시스템 및 방법 |
CN110719250B (zh) * | 2018-07-13 | 2021-07-06 | 中国科学院沈阳自动化研究所 | 基于PSO-SVDD的Powerlink工控协议异常检测方法 |
CN110837872B (zh) * | 2019-11-14 | 2022-05-27 | 北京理工大学 | 一种工控网络入侵检测方法及系统 |
CN113114673A (zh) * | 2021-04-12 | 2021-07-13 | 西北工业大学 | 一种基于生成对抗网络的网络入侵检测方法及系统 |
CN113382003B (zh) * | 2021-06-10 | 2022-04-29 | 东南大学 | 一种基于两级过滤器的rtsp混合入侵检测方法 |
-
2022
- 2022-07-20 CN CN202210849921.XA patent/CN115086070B/zh active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110868414A (zh) * | 2019-11-14 | 2020-03-06 | 北京理工大学 | 一种基于多投票技术的工控网络入侵检测方法及系统 |
WO2022012144A1 (zh) * | 2020-07-17 | 2022-01-20 | 湖南大学 | 基于不平衡数据深度信念网络的并行入侵检测方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN115086070A (zh) | 2022-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108023876B (zh) | 基于可持续性集成学习的入侵检测方法及入侵检测系统 | |
Alghanam et al. | An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning | |
CN104601565B (zh) | 一种智能优化规则的网络入侵检测分类方法 | |
CN111092862A (zh) | 一种用于对电网终端通信流量异常进行检测的方法及系统 | |
CN112348080A (zh) | 基于工控异常检测的rbf改进方法、装置和设备 | |
Jaszcz et al. | AIMM: Artificial intelligence merged methods for flood DDoS attacks detection | |
CN115086070B (zh) | 工业互联网入侵检测方法及系统 | |
CN111767538A (zh) | 一种基于相关信息熵的工控入侵检测系统特征选择方法 | |
CN116318928A (zh) | 一种基于数据增强和特征融合的恶意流量识别方法及系统 | |
CN116527346A (zh) | 基于深度学习图神经网络理论的威胁节点感知方法 | |
Zhang et al. | An improved LSTM network intrusion detection method | |
Aziz et al. | Cluster Analysis-Based Approach Features Selection on Machine Learning for Detecting Intrusion. | |
de Araujo et al. | Impact of feature selection methods on the classification of DDoS attacks using XGBoost | |
CN115842636A (zh) | 一种基于时序特征的网络异常行为监测方法以及装置 | |
Singh et al. | Lightweight convolutional neural network architecture design for music genre classification using evolutionary stochastic hyperparameter selection | |
CN114124437B (zh) | 基于原型卷积网络的加密流量识别方法 | |
Li et al. | A supervised clustering algorithm for computer intrusion detection | |
CN112613231A (zh) | 一种机器学习中隐私可用均衡的轨迹训练数据扰动机制 | |
Zhao et al. | Unbalanced Data Oversampling Method for Traffic Multi-classification in Convergence Network | |
Vrachimis et al. | Resilient edge machine learning in smart city environments | |
Li et al. | Intrusion detection based on PCA and fuzzy clustering optimized by CS | |
CN114615026B (zh) | 异常流量检测方法、装置及电子设备 | |
US20220405632A1 (en) | Machine learning replacements for legacy cyber security | |
Shi et al. | Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace | |
Wang et al. | Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 250014 No. 19, ASTRI Road, Lixia District, Shandong, Ji'nan Patentee after: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN) Country or region after: China Patentee after: Qilu University of Technology (Shandong Academy of Sciences) Address before: 250014 No. 19, ASTRI Road, Lixia District, Shandong, Ji'nan Patentee before: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN) Country or region before: China Patentee before: Qilu University of Technology |