CN117236701B - Robust risk identification method based on game analysis - Google Patents

Robust risk identification method based on game analysis Download PDF

Info

Publication number
CN117236701B
CN117236701B CN202311500085.5A CN202311500085A CN117236701B CN 117236701 B CN117236701 B CN 117236701B CN 202311500085 A CN202311500085 A CN 202311500085A CN 117236701 B CN117236701 B CN 117236701B
Authority
CN
China
Prior art keywords
model
probability
data
attribute
cost benefit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311500085.5A
Other languages
Chinese (zh)
Other versions
CN117236701A (en
Inventor
徐恪
谭崎
赵乙
王维强
赵闻飙
金宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Technology Group Co ltd
Tsinghua University
Original Assignee
Ant Technology Group Co ltd
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Technology Group Co ltd, Tsinghua University filed Critical Ant Technology Group Co ltd
Priority to CN202311500085.5A priority Critical patent/CN117236701B/en
Publication of CN117236701A publication Critical patent/CN117236701A/en
Application granted granted Critical
Publication of CN117236701B publication Critical patent/CN117236701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/40Engine management systems

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a robust risk identification method based on game analysis, which is used for obtaining cost benefit information of a risk identification model relative to the attribute of original data based on expert experience; constructing a cost benefit matrix based on the attribute according to the cost benefit information; obtaining a mixing strategy balancing probability based on the cost benefit matrix, and determining a Bernoulli random variable by utilizing the mixing strategy balancing probability and the Bernoulli distribution; and sampling the Bernoulli random variable by using a preset algorithm to process the original data to obtain processed data, and training the risk identification model by using the processed data to obtain a robust risk identification model. According to the invention, through analyzing the attack benefits and the cost of the data attributes, the information use probability in the artificial intelligence algorithm is dynamically adjusted so as to reduce the attack benefits of potential attackers, thereby reducing the probability of attack success and providing a robust risk identification model.

Description

Robust risk identification method based on game analysis
Technical Field
The invention relates to the technical field of next-generation Internet application safety, network space safety and artificial intelligence safety research, in particular to a robust risk identification method based on game analysis.
Background
The basis of artificial intelligence techniques is optimization techniques (e.g., gradient-based random gradient descent algorithms) that aim at searching a model in a selected model space that minimizes or maximizes the objective function (as determined by the specific task), thereby achieving model training optimization. The technique generally uses a back-propagation algorithm to find the gradient of the smart model, followed by a random gradient descent algorithm to refine the model. In the process, data information continuously enters the model to become an information basis for model judgment. However, due to the limitations of using a stochastic gradient descent algorithm alone, it is difficult for the smart model to distinguish between correlations and causal relationships present in the data (where causal relationships are part of correlations representing direct causal effects of both, and in addition to causal relationships, correlations include confusion bias due to the existence of common causes and selection bias due to the existence of common results, these non-causal correlations can lead to instability in risk identification), resulting in failure to overcome the limitations of the data collection phase (e.g., selection bias exists for data generated by only a single enterprise, and cannot cover all details of the attack faced). Therefore, this simple random gradient descent algorithm may cause the smart model to learn some abnormal correlations, resulting in erroneous decisions. This non-causal correlation is the goal that potential attackers may utilize. Game theory is a mathematical tool for analyzing interactions among different behavior subjects, judging the behaviors of the different behavior subjects under the assumption of a physical person through formalizing the economic attribute of the interactions, and making optimal decisions according to expected behaviors to cope with the behaviors. In game theory, the cost benefit matrix is a basic analysis element, and each behavior body selects a strategy with higher benefit to be executed due to the existence of rational person assumption, so that reasonable simplification makes it possible to predict opponent behaviors. In practice, costs and benefits can be observed and collected in long-term social practice, while gambling helps specific behavioral principals translate costs and benefits into expectations for opponent behavior, thereby objectively characterizing opponent behavior.
With the application and popularization of internet technology, countries and enterprises are frequently contacted with the internet to bring long-tail effect, so that the traditional method of manually performing risk identification cannot cope with mass service data in the internet age. For this reason, countries and enterprises begin to introduce artificial intelligence technology to perform intelligent risk recognition, such as network gambling risk recognition based on a multi-layer perceptron technology and money laundering risk recognition based on an integrated tree model. However, smart risk identification technologies also face potential attack challenges: potential attackers can adjust their own patterns of behavior to bypass the risk identification system, thereby gaining tremendous economic benefits. This hidden potential attack behavior brings risks and economic losses to the enterprise on the one hand; on the other hand, the method also brings difficulty to the supervision and protection of the country. Therefore, how to increase the robustness of the recognition risk becomes an important component of the economic and social development.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems in the related art to some extent.
The object of the present invention is to solve the problem of resistant attacks in risk identification systems. Therefore, the invention provides a robust risk recognition method based on game analysis, and the method constructs a model training method with random strategies by means of a game model, so that the uncertainty of training reduces the attack income of potential attackers, improves the attack cost, and further reduces the occurrence of the attack.
It is another object of the present invention to provide a robust risk identification device based on game analysis.
To achieve the above objective, in one aspect, the present invention provides a robust risk identification method based on game analysis, including:
obtaining cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience;
constructing a cost benefit matrix based on attributes according to the cost benefit information;
obtaining a mixing strategy balancing probability based on the cost benefit matrix, and determining a Bernoulli random variable by utilizing the mixing strategy balancing probability and the Bernoulli distribution;
and sampling the Bernoulli random variable by using a preset algorithm to process the original data to obtain processed data, and training the risk identification model by using the processed data to obtain a robust risk identification model.
The robust risk identification method based on game analysis of the embodiment of the invention can also have the following additional technical characteristics:
in one embodiment of the invention, the cost benefit information includes cost required for the attack, benefit when the model is trained using the attribute for the attack, benefit when the model is not trained using the attribute for the attack, and benefit when the model is not trained using the attribute for the attack.
In one embodiment of the present invention, obtaining a mixing policy equalization probability according to the cost benefit matrix includes:
determining a use probability expression and an unused probability expression of the attribute;
constructing an equilibrium equation according to the used probability expression and the unused probability expression;
and solving the balance equation to obtain a mixed strategy balance probability, so as to determine the use probability of the attribute according to the mixed strategy balance probability.
In one embodiment of the present invention, sampling the bernoulli random variable using a preset algorithm to process the raw data to obtain processed data includes:
independently and uniformly sampling the Bernoulli random variable through a Monte Carlo algorithm to obtain a sampling value of the Bernoulli random variable;
and carrying out data processing on the original data by using the sampling value to obtain the processed data.
In one embodiment of the present invention, after obtaining the processed data, the method further comprises:
presetting model optimization stop conditions;
performing model training optimization by using the processed data, judging whether the optimized model meets the model optimization stopping condition, if not, continuing to sample the data and adopting the method to process the data for training; if yes, judging whether the expert experience is updated.
To achieve the above object, another aspect of the present invention provides a robust risk recognition apparatus based on game analysis, including:
the cost benefit information acquisition module is used for acquiring cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience;
the cost benefit matrix construction module is used for constructing a cost benefit matrix based on the attribute according to the cost benefit information;
the probability calculation variable determining module is used for obtaining a mixed strategy balancing probability based on the cost benefit matrix and determining a Bernoulli random variable by utilizing the mixed strategy balancing probability and the Bernoulli distribution;
the data optimization model training module is used for sampling the Bernoulli random variables by using a preset algorithm to process the original data to obtain processed data, and training the risk recognition model by using the processed data to obtain a robust risk recognition model.
According to the robust risk identification method and device based on game analysis, through analysis of the attack benefits and the cost of the data attributes, the information use probability in the artificial intelligent algorithm is dynamically adjusted, so that the attack benefits of potential attackers are reduced, the probability of attack success is reduced, and a robust risk identification model is provided. Meanwhile, the limitation of the data collection stage can be effectively limited, so that the causal relation between the input and the output is enhanced by using the cost benefit knowledge, and support is provided for robust identification.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a robust risk identification method based on gaming analysis in accordance with an embodiment of the present invention;
FIG. 2 is a logic diagram of robust risk identification based on gaming analysis in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a business scenario according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a robust risk identification device based on game analysis according to an embodiment of the present invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The invention will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
The following describes a robust risk identification method and device based on game analysis according to an embodiment of the present invention with reference to the accompanying drawings.
It can be understood that the robust risk recognition method based on game analysis of the present invention mainly relates to a risk recognition scenario, as shown in fig. 3, for example, in a risk recognition task, an defender can perform risk recognition by using technical means such as artificial intelligence; and an attacker can modify the corresponding attribute of the attacker by observing the identification result of the defender on different data, so that risk identification is avoided, and further illegal risk behaviors are implemented. The basic idea of the invention is to obtain the optimal probability distribution used or discarded by the input attribute by introducing game analysis, and use the input attribute according to the corresponding probability distribution, thereby controlling the influence of the attribute on model decision. Since the amount of information flowing into the model from different attributes is strongly correlated with the frequency of use of that attribute in the optimization process of machine learning. When the frequency of use of the attribute in gradient descent is reduced, the importance of the attribute in the model decision stage can be correspondingly reduced, so that the decision result is affected. Meanwhile, the probability distribution of the original data is changed when the attack occurs, so that the model is induced to make an erroneous decision. Thus, by reducing the importance of vulnerable attributes, the robustness of risk identification may be increased. Because the interaction of the attack and defense parties can be modeled as a two-person game process, the probability of the attacker attacking the specific attribute is described by introducing priori knowledge of cost benefits, and the probability distribution is used for guiding model training, so that a robust risk identification model can be obtained. Based on the idea, the invention provides a robust risk recognition model training method based on game analysis, which can introduce cost benefits as priori knowledge into the training process of the model, thereby improving the capability of the model to extract causal relations and being a safer and more robust model for risk recognition training in the Internet age.
Fig. 1 is a flowchart of a robust risk identification method based on game analysis according to an embodiment of the present invention, and fig. 2 is a logic flow diagram of a method according to an embodiment of the present invention.
As shown in fig. 1 and 2, the method includes, but is not limited to, the steps of:
s1, obtaining cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience.
Specifically, according to historical information and priori knowledge, the cost and the benefit of the attack attribute are obtained, and data support is provided for subsequent game analysis.
In one embodiment of the invention, for any attribute in D-dimension D,/>The cost and benefit variables are obtained through expert experience: including the cost required for the attack->Attack modelBenefit +.>Challenge without model training +.>Inlet ∈A, model training without attack ∈A>And +.A model training without attack ∈ ->
S2, constructing a cost benefit matrix based on the attribute according to the cost benefit information.
Specifically, a cost benefit matrix is constructed from the cost benefit information. Such structured cost benefit information is a solution process that can simplify the equalization.
In one embodiment of the invention, for any attributeConstructing a cost benefit matrix by using the information acquired in step S1, as shown in table 1:
TABLE 1
And S3, obtaining a mixing strategy equalization probability based on the cost benefit matrix, and determining a Bernoulli random variable by utilizing the mixing strategy equalization probability and the Bernoulli distribution.
Specifically, the cost benefit matrix obtained in step S2 is used to find the equalization probability, thereby obtaining the usage attributeIs a probability of (2). Comprising the following steps:
assume use ofThe probability of (2) is +.>Then do not use->The probability of (2) is +.>
Listing aboutIs the equilibrium equation of (2):
∙(/>) +(/>)∙(/>) =/>∙/>+(/>∙/>
solving the equalization probability:
s4, sampling Bernoulli random variables by using a preset algorithm to process the original data to obtain processed data, and training the risk identification model by using the processed data to obtain a robust risk identification model.
In particular, utilizeTo construct a distribution of mask random variables using probabilities such that information into the model can be adjusted using the mask, including:
using the probabilities determined in step S3The mask is constructed. Wherein->For the sake of +>Obeying bernoulli distribution as shown in table 2:
TABLE 2
When (when)Property +.>May be used for model training; on the contrary, attribute ++>Is not available for model training.
Obtain%) Wherein->Is the Bernoulli random variable of the last step.
In one embodiment of the invention, the mask is sampled using Monte Carlo algorithm and acts on the raw data to filter the data information, including:
according to the d Bernoulli distributions constructed in the previous step (i.e) Independent and equidistributed sampling is respectively carried out to obtain sampling values of mask variables +.>
Sampling valueThe original data is acted on according to the following equationDTo adjust the information in the data:
wherein the method comprises the steps ofRepresenting the hadamard product.
Further, the processed data is utilizedReplace original dataDRandom gradient descent is performed to train a robust risk identification model.
Further, if the condition of training end is not reached, returning to step S4 to sample and re-perform the next training round.
Further, if the priori knowledge and the historical information change, returning to the step S1 to acquire the information again, and calculating the corresponding use probability.
In summary, the invention dynamically adjusts the information use probability in the artificial intelligent algorithm through the attack income and cost analysis of the data attribute so as to reduce the attack income of potential attackers, thereby reducing the probability of attack success and providing a robust risk identification model. Meanwhile, the method is a data-independent method, and can effectively limit the limitation of a data collection stage, so that the causal relation between input and output is enhanced by using cost benefit knowledge, and support is provided for robust identification.
According to the robust risk recognition method based on game analysis, the problem of attack resistance in risk recognition is modeled by utilizing game analysis, and the training process of the model is improved in a data-independent and model-independent mode through the introduction of expert experience and knowledge, so that the capability of the model for extracting causality is greatly improved. Meanwhile, the training method for limiting information entering the model by using the mask theoretically increases uncertainty and required attack cost faced by an attacker, reduces the probability of being attacked, and improves the robustness of risk identification.
In order to implement the above embodiment, as shown in fig. 4, a robust risk recognition apparatus 10 based on game analysis is further provided in this embodiment, where the apparatus 10 includes a cost benefit information acquisition module 100, a cost benefit matrix construction module 200, a probability calculation variable determination module 300, and a data optimization model training module 400;
a cost benefit information obtaining module 100, configured to obtain cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience;
a cost benefit matrix construction module 200 for constructing a cost benefit matrix based on the attribute according to the cost benefit information;
the probability calculation variable determining module 300 is configured to obtain a mixed policy equalization probability based on the cost benefit matrix, and determine a bernoulli random variable by using the mixed policy equalization probability and the bernoulli distribution;
the data optimization model training module 400 is configured to sample the bernoulli random variable by using a preset algorithm to process the original data to obtain processed data, and train the risk recognition model by using the processed data to obtain a robust risk recognition model.
Further, cost benefit information includes costs required for the attack, benefits when the model is trained using the attributes for the attack, benefits when the model is not trained using the attributes for the attack, and benefits when the model is not trained using the attributes for the attack.
Further, the probability calculation variable determining module 300 is further configured to:
determining a use probability expression and an unused probability expression of the attribute;
constructing an equilibrium equation according to the used probability expression and the unused probability expression;
and solving the balance equation to obtain a mixed strategy balance probability, so as to determine the use probability of the attribute according to the mixed strategy balance probability.
Further, the data optimization model training module 400 is further configured to:
independently and uniformly sampling the Bernoulli random variable through a Monte Carlo algorithm to obtain a sampling value of the Bernoulli random variable;
and carrying out data processing on the original data by using the sampling value to obtain the processed data.
Further, after the data optimization model training module 400, further includes: the data updating judging module is used for:
presetting model optimization stop conditions;
model training optimization is carried out by using the processed data, whether the optimized model meets the model optimization stopping condition is judged, if not, the data is continuously sampled and the data is processed by adopting the method for training; if yes, judging whether the expert experience is updated.
According to the robust risk recognition device based on game analysis, the problem of attack resistance in risk recognition is modeled by utilizing game analysis, and the training process of the model is improved in a data-independent and model-independent mode through the introduction of expert experience and knowledge, so that the capability of extracting causality of the model is greatly improved. Meanwhile, uncertainty faced by an attacker and required attack cost are increased, probability of being attacked is reduced, and robustness of risk identification is improved.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.

Claims (2)

1. A robust risk identification method based on gaming analysis, the method comprising:
obtaining cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience;
constructing a cost benefit matrix based on attributes according to the cost benefit information;
obtaining a mixing strategy balancing probability based on the cost benefit matrix, and determining a Bernoulli random variable by utilizing the mixing strategy balancing probability and the Bernoulli distribution;
sampling the Bernoulli random variable by using a preset algorithm to process the original data to obtain processed data, and training the risk identification model by using the processed data to obtain a robust risk identification model;
the cost benefit information comprises cost required by the attack, benefit when the model is trained by using the attribute, benefit when the model is attacked and not trained by using the attribute, benefit when the model is not attacked and not trained by using the attribute and benefit when the model is not attacked and not trained by using the attribute;
obtaining a mixing strategy equalization probability according to the cost benefit matrix, wherein the mixing strategy equalization probability comprises the following steps:
determining a use probability expression and an unused probability expression of the attribute;
constructing an equilibrium equation according to the used probability expression and the unused probability expression;
solving the equilibrium equation to obtain a mixed strategy equilibrium probability, and determining the use probability of the attribute according to the mixed strategy equilibrium probability;
sampling the Bernoulli random variable by using a preset algorithm to process the original data to obtain processed data, wherein the method comprises the following steps:
independently and uniformly sampling the Bernoulli random variable through a Monte Carlo algorithm to obtain a sampling value of the Bernoulli random variable;
carrying out data processing on the original data by utilizing the sampling value to obtain processed data;
after obtaining the processed data, the method further comprises:
presetting model optimization stop conditions;
performing model training optimization by using the processed data, judging whether the optimized model meets the model optimization stopping condition, if not, continuing to sample the data and processing the data for training; if yes, judging whether the expert experience is updated.
2. A robust risk identification device based on gaming analysis, comprising:
the cost benefit information acquisition module is used for acquiring cost benefit information of the attribute of the risk identification model relative to the original data based on expert experience;
the cost benefit matrix construction module is used for constructing a cost benefit matrix based on the attribute according to the cost benefit information;
the probability calculation variable determining module is used for obtaining a mixed strategy balancing probability based on the cost benefit matrix and determining a Bernoulli random variable by utilizing the mixed strategy balancing probability and the Bernoulli distribution;
the data optimization model training module is used for sampling the Bernoulli random variables by using a preset algorithm to process the original data to obtain processed data, and training the risk recognition model by using the processed data to obtain a robust risk recognition model;
the cost benefit information comprises cost required by the attack, benefit when the model is trained by using the attribute, benefit when the model is attacked and not trained by using the attribute, benefit when the model is not attacked and not trained by using the attribute and benefit when the model is not attacked and not trained by using the attribute;
the probability calculation variable determining module is further configured to:
determining a use probability expression and an unused probability expression of the attribute;
constructing an equilibrium equation according to the used probability expression and the unused probability expression;
solving the equilibrium equation to obtain a mixed strategy equilibrium probability, and determining the use probability of the attribute according to the mixed strategy equilibrium probability;
the data optimization model training module is further used for:
independently and uniformly sampling the Bernoulli random variable through a Monte Carlo algorithm to obtain a sampling value of the Bernoulli random variable;
carrying out data processing on the original data by utilizing the sampling value to obtain processed data;
after the data optimization model training module, further comprising: the data updating judging module is used for:
presetting model optimization stop conditions;
performing model training optimization by using the processed data, judging whether the optimized model meets the model optimization stopping condition, if not, continuing to sample the data and processing the data for training; if yes, judging whether the expert experience is updated.
CN202311500085.5A 2023-11-13 2023-11-13 Robust risk identification method based on game analysis Active CN117236701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311500085.5A CN117236701B (en) 2023-11-13 2023-11-13 Robust risk identification method based on game analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311500085.5A CN117236701B (en) 2023-11-13 2023-11-13 Robust risk identification method based on game analysis

Publications (2)

Publication Number Publication Date
CN117236701A CN117236701A (en) 2023-12-15
CN117236701B true CN117236701B (en) 2024-02-09

Family

ID=89095208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311500085.5A Active CN117236701B (en) 2023-11-13 2023-11-13 Robust risk identification method based on game analysis

Country Status (1)

Country Link
CN (1) CN117236701B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115018656A (en) * 2022-08-08 2022-09-06 太平金融科技服务(上海)有限公司深圳分公司 Risk identification method, and training method, device and equipment of risk identification model
CN116248519A (en) * 2023-03-09 2023-06-09 南京理工大学 Network traffic anomaly detection method based on interactive game
CN116562362A (en) * 2023-05-06 2023-08-08 杭州电子科技大学 Countermeasure training fine tuning method based on hybrid strategy game

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009174B (en) * 2018-12-13 2020-11-06 创新先进技术有限公司 Risk recognition model training method and device and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115018656A (en) * 2022-08-08 2022-09-06 太平金融科技服务(上海)有限公司深圳分公司 Risk identification method, and training method, device and equipment of risk identification model
CN116248519A (en) * 2023-03-09 2023-06-09 南京理工大学 Network traffic anomaly detection method based on interactive game
CN116562362A (en) * 2023-05-06 2023-08-08 杭州电子科技大学 Countermeasure training fine tuning method based on hybrid strategy game

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
静态贝叶斯博弈在信息系统风险分析中的应用;张健 等;计算机工程与应用;第51卷(第11期);第76-82页 *

Also Published As

Publication number Publication date
CN117236701A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
Aamir et al. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
Ho et al. A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network
Khammassi et al. A NSGA2-LR wrapper approach for feature selection in network intrusion detection
Hu et al. Optimal decision making approach for cyber security defense using evolutionary game
Dias et al. Using artificial neural network in intrusion detection systems to computer networks
Blowers et al. Machine learning applied to cyber operations
Chandy et al. Cyberattack detection using deep generative models with variational inference
CN108898010A (en) A method of establishing the attacking and defending Stochastic Game Model towards malicious code defending
Masarat et al. A novel framework, based on fuzzy ensemble of classifiers for intrusion detection systems
Natarajan Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms
Zhu et al. Binarizedattack: Structural poisoning attacks to graph-based anomaly detection
CN110084468A (en) A kind of Risk Identification Method and device
Garcia et al. A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks
Jagadeesan et al. An efficient botnet detection with the enhanced support vector neural network
Jayalaxmi et al. Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things
Milosevic et al. Extreme minority class detection in imbalanced data for network intrusion
CN117236701B (en) Robust risk identification method based on game analysis
CN114024738A (en) Network defense method based on multi-stage attack and defense signals
Li et al. Twisted by the pools: Detection of selfish anomalies in proof-of-work mining
Pradeep et al. Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems
Chou et al. Classification of malicious traffic using tensorflow machine learning
CN115277065B (en) Anti-attack method and device in abnormal traffic detection of Internet of things
Suthaharan et al. An approach for automatic selection of relevance features in intrusion detection systems
Sarkar et al. A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network
Yan et al. Towards defending against Byzantine LDP amplified gain attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant