CN117425898B - 攻击检测装置、对抗样本补丁检测系统、攻击检测方法以及计算机能读取的记录介质 - Google Patents

攻击检测装置、对抗样本补丁检测系统、攻击检测方法以及计算机能读取的记录介质

Info

Publication number
CN117425898B
CN117425898B CN202180099131.8A CN202180099131A CN117425898B CN 117425898 B CN117425898 B CN 117425898B CN 202180099131 A CN202180099131 A CN 202180099131A CN 117425898 B CN117425898 B CN 117425898B
Authority
CN
China
Prior art keywords
time
image data
attack
abnormal pattern
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202180099131.8A
Other languages
English (en)
Chinese (zh)
Other versions
CN117425898A (zh
Inventor
小关义博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of CN117425898A publication Critical patent/CN117425898A/zh
Application granted granted Critical
Publication of CN117425898B publication Critical patent/CN117425898B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/776Validation; Performance evaluation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Molecular Biology (AREA)
  • Mathematical Physics (AREA)
  • Image Analysis (AREA)
  • Burglar Alarm Systems (AREA)
CN202180099131.8A 2021-06-16 2021-06-16 攻击检测装置、对抗样本补丁检测系统、攻击检测方法以及计算机能读取的记录介质 Active CN117425898B (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2021/022916 WO2022264331A1 (ja) 2021-06-16 2021-06-16 攻撃検知装置、敵対的サンプルパッチ検知システム、攻撃検知方法、及び、攻撃検知プログラム

Publications (2)

Publication Number Publication Date
CN117425898A CN117425898A (zh) 2024-01-19
CN117425898B true CN117425898B (zh) 2026-04-17

Family

ID=84526462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180099131.8A Active CN117425898B (zh) 2021-06-16 2021-06-16 攻击检测装置、对抗样本补丁检测系统、攻击检测方法以及计算机能读取的记录介质

Country Status (5)

Country Link
US (1) US12537826B2 (https=)
JP (1) JP7309101B2 (https=)
CN (1) CN117425898B (https=)
DE (1) DE112021007504T5 (https=)
WO (1) WO2022264331A1 (https=)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12464018B2 (en) * 2023-12-29 2025-11-04 Robert Bosch Gmbh System and method for high-resolution blackbox patch attack with Bayesian optimization
US12536300B2 (en) 2023-12-29 2026-01-27 Robert Bosch Gmbh System and method for query efficient blackbox physically realizable attack with bayesian optimization
IL310277A (en) 2024-01-21 2025-08-01 Fujitsu Ltd Computer-readable recording medium, information processing method, and information processing device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108369739A (zh) * 2015-12-02 2018-08-03 三菱电机株式会社 物体检测装置和物体检测方法
CN111340008A (zh) * 2020-05-15 2020-06-26 支付宝(杭州)信息技术有限公司 对抗补丁生成、检测模型训练、对抗补丁防御方法及系统

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103703487B (zh) 2011-07-25 2016-11-02 国际商业机器公司 信息识别方法以及系统
US9779361B2 (en) * 2014-06-05 2017-10-03 Mitsubishi Electric Research Laboratories, Inc. Method for learning exemplars for anomaly detection
JP6822328B2 (ja) 2017-06-27 2021-01-27 オムロン株式会社 見守り支援システム及びその制御方法
JP2019061577A (ja) * 2017-09-27 2019-04-18 パナソニックIpマネジメント株式会社 異常判定方法及びプログラム
DE102017217733A1 (de) * 2017-10-05 2019-04-11 Conti Temic Microelectronic Gmbh Prüfen eines neuronalen Netzes
JP7047372B2 (ja) 2017-12-21 2022-04-05 東レ株式会社 データ識別装置およびデータ識別方法
US10915631B2 (en) * 2017-12-28 2021-02-09 Intel Corporation Deep learning on execution trace data for exploit detection
JP6964274B2 (ja) * 2018-01-12 2021-11-10 パナソニックIpマネジメント株式会社 監視装置、監視システム及び監視方法
US10944767B2 (en) * 2018-02-01 2021-03-09 International Business Machines Corporation Identifying artificial artifacts in input data to detect adversarial attacks
JP7183904B2 (ja) 2019-03-26 2022-12-06 日本電信電話株式会社 評価装置、評価方法、および、評価プログラム
US11681796B2 (en) * 2019-09-10 2023-06-20 International Business Machines Corporation Learning input preprocessing to harden machine learning models
US11727109B2 (en) * 2020-01-24 2023-08-15 International Business Machines Corporation Identifying adversarial attacks with advanced subset scanning
US12019747B2 (en) * 2020-10-13 2024-06-25 International Business Machines Corporation Adversarial interpolation backdoor detection
CN116109521B (zh) * 2023-04-07 2023-07-14 北京建筑大学 局部对抗性攻击启发式防御方法和装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108369739A (zh) * 2015-12-02 2018-08-03 三菱电机株式会社 物体检测装置和物体检测方法
CN111340008A (zh) * 2020-05-15 2020-06-26 支付宝(杭州)信息技术有限公司 对抗补丁生成、检测模型训练、对抗补丁防御方法及系统

Also Published As

Publication number Publication date
WO2022264331A1 (ja) 2022-12-22
JP7309101B2 (ja) 2023-07-14
US20240064157A1 (en) 2024-02-22
DE112021007504T5 (de) 2024-02-29
CN117425898A (zh) 2024-01-19
JPWO2022264331A1 (https=) 2022-12-22
US12537826B2 (en) 2026-01-27

Similar Documents

Publication Publication Date Title
US12443714B2 (en) Coordinate-system-based data protection techniques
CN117425898B (zh) 攻击检测装置、对抗样本补丁检测系统、攻击检测方法以及计算机能读取的记录介质
JP6099793B2 (ja) 1つ以上の画像処理アルゴリズムの自動選択のための方法およびシステム
CN107408181B (zh) 恶意软件感染终端的检测装置、恶意软件感染终端的检测系统、恶意软件感染终端的检测方法以及记录介质
CN113935033B (zh) 特征融合的恶意代码家族分类方法、装置和存储介质
WO2019109743A1 (zh) Url攻击检测方法、装置以及电子设备
WO2019128529A1 (zh) Url攻击检测方法、装置以及电子设备
US10528844B2 (en) Method and apparatus for distance measurement
US20190180032A1 (en) Classification apparatus, classification method, and classification program
US12367282B2 (en) Bit-level data extraction and threat detection
US20180341769A1 (en) Threat detection method and threat detection device
CN110751116B (zh) 一种目标识别的方法及装置
JP6834126B2 (ja) 情報処理装置、欠陥検出方法およびプログラム
US10140548B2 (en) Statistical noise analysis for motion detection
WO2017187651A1 (ja) 静観候補特定装置、静観候補特定方法及び静観候補特定プログラム
US11941118B2 (en) System and method to build robust classifiers against evasion attacks
CN117710765A (zh) 目标识别方法、装置、电子设备及计算机可读存储介质
AU2021448087B2 (en) Detection device, detection method, and detection program
CN115220645B (zh) 用于训练模型的方法、电子设备和计算机程序产品
KR101823792B1 (ko) 컨텍스트 기반 다중 객체 검출 방법 및 시스템
US20250131087A1 (en) Metadata processing techniques and architectures for data protection
CN115525894A (zh) 一种家族判定方法、装置、设备及存储介质
WO2021193352A1 (ja) 画像追跡装置、画像追跡方法、及びコンピュータ読み取り可能な記録媒体
EP2889839A1 (en) System and method for movement detection in images sequence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant