CN117675363A - 一种基于机器学习的动态网络攻击识别方法 - Google Patents
一种基于机器学习的动态网络攻击识别方法 Download PDFInfo
- Publication number
- CN117675363A CN117675363A CN202311671621.8A CN202311671621A CN117675363A CN 117675363 A CN117675363 A CN 117675363A CN 202311671621 A CN202311671621 A CN 202311671621A CN 117675363 A CN117675363 A CN 117675363A
- Authority
- CN
- China
- Prior art keywords
- sample set
- flow
- dynamic network
- attack
- machine learning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000010801 machine learning Methods 0.000 title claims abstract description 17
- 230000002159 abnormal effect Effects 0.000 claims abstract description 33
- 238000012545 processing Methods 0.000 claims abstract description 18
- 230000008030 elimination Effects 0.000 claims abstract description 8
- 238000003379 elimination reaction Methods 0.000 claims abstract description 8
- 238000012706 support-vector machine Methods 0.000 claims description 19
- 238000001914 filtration Methods 0.000 claims description 12
- 230000002457 bidirectional effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims 1
- 238000010606 normalization Methods 0.000 claims 1
- 238000001514 detection method Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000005206 flow analysis Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/16—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Evolutionary Computation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311671621.8A CN117675363A (zh) | 2023-12-07 | 2023-12-07 | 一种基于机器学习的动态网络攻击识别方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311671621.8A CN117675363A (zh) | 2023-12-07 | 2023-12-07 | 一种基于机器学习的动态网络攻击识别方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117675363A true CN117675363A (zh) | 2024-03-08 |
Family
ID=90082234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311671621.8A Pending CN117675363A (zh) | 2023-12-07 | 2023-12-07 | 一种基于机器学习的动态网络攻击识别方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117675363A (zh) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101623071B1 (ko) * | 2015-01-28 | 2016-05-31 | 한국인터넷진흥원 | 공격의심 이상징후 탐지 시스템 |
CN106850460A (zh) * | 2017-02-10 | 2017-06-13 | 北京邮电大学 | 一种业务流聚合方法及装置 |
CN107426199A (zh) * | 2017-07-05 | 2017-12-01 | 浙江鹏信信息科技股份有限公司 | 一种网络异常行为检测与分析的方法及系统 |
CN110213227A (zh) * | 2019-04-24 | 2019-09-06 | 华为技术有限公司 | 一种网络数据流检测方法及装置 |
CN110691100A (zh) * | 2019-10-28 | 2020-01-14 | 中国科学技术大学 | 基于深度学习的分层网络攻击识别与未知攻击检测方法 |
KR20220022322A (ko) * | 2020-08-18 | 2022-02-25 | 세종대학교산학협력단 | 네트워크 공격 탐지 장치 및 방법 |
CN116226700A (zh) * | 2023-03-15 | 2023-06-06 | 重庆邮电大学 | 一种基于时间序列聚类的流量异常检测方法 |
-
2023
- 2023-12-07 CN CN202311671621.8A patent/CN117675363A/zh active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101623071B1 (ko) * | 2015-01-28 | 2016-05-31 | 한국인터넷진흥원 | 공격의심 이상징후 탐지 시스템 |
CN106850460A (zh) * | 2017-02-10 | 2017-06-13 | 北京邮电大学 | 一种业务流聚合方法及装置 |
CN107426199A (zh) * | 2017-07-05 | 2017-12-01 | 浙江鹏信信息科技股份有限公司 | 一种网络异常行为检测与分析的方法及系统 |
CN110213227A (zh) * | 2019-04-24 | 2019-09-06 | 华为技术有限公司 | 一种网络数据流检测方法及装置 |
CN110691100A (zh) * | 2019-10-28 | 2020-01-14 | 中国科学技术大学 | 基于深度学习的分层网络攻击识别与未知攻击检测方法 |
KR20220022322A (ko) * | 2020-08-18 | 2022-02-25 | 세종대학교산학협력단 | 네트워크 공격 탐지 장치 및 방법 |
CN116226700A (zh) * | 2023-03-15 | 2023-06-06 | 重庆邮电大学 | 一种基于时间序列聚类的流量异常检测方法 |
Non-Patent Citations (2)
Title |
---|
王婷;王娜;崔运鹏;李欢;: "基于半监督学习的无线网络攻击行为检测优化方法", 计算机研究与发展, no. 04, 13 April 2020 (2020-04-13) * |
赵尔敦;刘威;李冲;唐培和;: "移动传感器网络中能量均衡分簇及移动策略", 计算机工程与应用, no. 19, 1 July 2010 (2010-07-01) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108289088B (zh) | 基于业务模型的异常流量检测系统及方法 | |
US7835390B2 (en) | Network traffic identification by waveform analysis | |
Robinson et al. | Ranking of machine learning algorithms based on the performance in classifying DDoS attacks | |
Gautam et al. | An ensemble approach for intrusion detection system using machine learning algorithms | |
Gadal et al. | Anomaly detection approach using hybrid algorithm of data mining technique | |
CN112738015A (zh) | 一种基于可解释卷积神经网络cnn与图检测的多步攻击检测方法 | |
WO2007055222A1 (ja) | ネットワーク異常検知方法およびネットワーク異常検知システム | |
US11544575B2 (en) | Machine-learning based approach for malware sample clustering | |
CN111800430B (zh) | 一种攻击团伙识别方法、装置、设备及介质 | |
CN113225358B (zh) | 网络安全风险评估系统 | |
Pathak et al. | Study on decision tree and KNN algorithm for intrusion detection system | |
CN106960153B (zh) | 病毒的类型识别方法及装置 | |
Kong et al. | Identification of abnormal network traffic using support vector machine | |
Naik et al. | Lockout-Tagout Ransomware: A detection method for ransomware using fuzzy hashing and clustering | |
CN106911665B (zh) | 一种识别恶意代码弱口令入侵行为的方法及系统 | |
WO2020168718A1 (zh) | 分类器鲁棒性的测试方法、装置、终端及存储介质 | |
Siraj et al. | Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems. | |
CN117834311B (zh) | 一种用于网络安全的恶意行为识别系统 | |
CN114462032A (zh) | 一种本地化差分隐私下键值对数据收集受投毒攻击的检测方法 | |
CN117675363A (zh) | 一种基于机器学习的动态网络攻击识别方法 | |
Xue et al. | A stacking-based classification approach to android malware using host-level encrypted traffic | |
CN109889527B (zh) | 一种基于大数据的网络安全防护系统及其防护方法 | |
CN115277178B (zh) | 基于企业网网络流量的异常监测方法、装置及存储介质 | |
CN109327464A (zh) | 一种网络入侵检测中类别不平衡处理方法及装置 | |
Çimen et al. | Performance Analysis of Machine Learning Algorithms in Intrusion Detection Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20240731 Address after: 308, Building 47, Dayun Software Town, No. 8288 Longgang Avenue, He'ao Community, Yuanshan Street, Longgang District, Shenzhen City, Guangdong Province, 518000 Applicant after: Shenzhen Zhihui Huasheng Technology Co.,Ltd. Country or region after: China Address before: Room 1206, Building A, No. 3 Juquan Road, Science City, Huangpu District, Guangzhou City, Guangdong Province, 510700 Applicant before: Guangzhou Rongfu Information Technology Co.,Ltd. Country or region before: China |