[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108683658A - Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models - Google Patents

Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models Download PDF

Info

Publication number
CN108683658A
CN108683658A CN201810449297.8A CN201810449297A CN108683658A CN 108683658 A CN108683658 A CN 108683658A CN 201810449297 A CN201810449297 A CN 201810449297A CN 108683658 A CN108683658 A CN 108683658A
Authority
CN
China
Prior art keywords
data
rbm
network
models
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810449297.8A
Other languages
Chinese (zh)
Other versions
CN108683658B (en
Inventor
李怡晨
马颖华
李生红
张波
梁启联
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information And Communication Branch Of Jiangsu Electric Power Co Ltd
Shanghai Jiaotong University
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
Original Assignee
Information And Communication Branch Of Jiangsu Electric Power Co Ltd
Shanghai Jiaotong University
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information And Communication Branch Of Jiangsu Electric Power Co Ltd, Shanghai Jiaotong University, State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Global Energy Interconnection Research Institute filed Critical Information And Communication Branch Of Jiangsu Electric Power Co Ltd
Priority to CN201810449297.8A priority Critical patent/CN108683658B/en
Publication of CN108683658A publication Critical patent/CN108683658A/en
Application granted granted Critical
Publication of CN108683658B publication Critical patent/CN108683658B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A kind of industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models; feature is extracted from industry control network and generates training dataset; benchmark model is trained and obtains the abnormal data cluster that the industry control network normal baseline model comprising multiple RBM models and training data are concentrated; real-time network message assessment is carried out with industry control network normal baseline model, realizes Traffic anomaly detection;The present invention by the setting completion dimension whether dimensionality reduction and needs are reduced to of parameter and can have better robustness in inside, without the quantity for needing to cluster is set in advance, the case where being completed by the interrelated degree of model, more meet practical application.

Description

Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models
Technical field
The present invention relates to a kind of technologies of computer realm, and in particular to one kind being based on multiple RBM network structions benchmark moulds Type, and according to the abnormality recognition method of benchmark model progress network flow.
Background technology
With the continuous variation of attack means, cannot network be protected to exempt from based on known attack feature attack detecting technology It is attacked, carrying out attack detecting to network flow is highly desirable.Attacking network flow packet is made of the data on flows of magnanimity, this A little datas on flows have recorded all activities and behavior of electric network terminal.By analyzing and integrating these network flow packets, Ke Yicong Middle extraction feature, to find to attack.But due to network flow enormous amount, to reach attack recognition, must just reach real-time place Reason is very high to the efficiency requirements of detection algorithm.Traditional network learning method and most of machine learning method often exist It will appear awkward situation on the problem of handling this respect, for electricity grid network flow attacking detecting system, how efficiently, High-precision these mass datas of processing are a huge challenges.
Invention content
The present invention proposes a kind of based on more RBM for the deficiency of prior art and the special circumstances of power grid industry control environment The industry control network Traffic Anomaly recognition methods of network struction benchmark model, passes through the prison to industry control network flow quantity and time Control, and then clusters out the benchmark model of industry control network flow, and then identifies each of industrial control equipment in industry control network by benchmark model Kind working condition, therefrom finds out abnormality.
The present invention is achieved by the following technical solutions:
The present invention relates to a kind of industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models, from Feature is extracted in industry control network and generates training dataset, and benchmark model is trained and obtains including multiple RBM models Industry control network normal baseline model and training data concentrate abnormal data cluster, with industry control network normal baseline model carries out reality When network message assess, realize Traffic anomaly detection.
The training dataset, after carrying out feature extraction and merger according to the network characteristic of industry control network, with the period Mark off the training data of aggregate of data form.
The network characteristic of the industry control network includes but not limited to:Pass through the front-collection machine or network of industry control network Equipment from bypass copy packet.
The feature extraction refers to:According to industry control network data on flows transmit agreement, extract message transmissions time, The features such as quantity, type carry out feature selecting, remove the high remaining feature in data set, the message characteristic after being extracted.
The merger refers to:The merger of feature is carried out according to the quantity for merging data on flows in period Ta.
The aggregate of data carries out the period stroke according to the flow transmission time of industry control network as cluster period Tb Point, data set is divided into each aggregate of data.
The benchmark model includes at least one RBM networks, which is completed by inputting any data cluster The update of the RBM network parameters and initial parameter of benchmark model is set at random passes through and receives the aggregates of data of different rules and complete RBM The increase of the number networks.
The network parameter of the RBM networks includes but not limited to:Learning rate α, iterations n, visible layer with hide Node layer number, root-mean-square error threshold value e, merge period Ta, Temporal Clustering cluster period Tb etc., wherein:Learning rate α The range that parameter changes every time after being fed back for RBM models, learning rate is bigger, and it is faster to start convergent speed, but very Difficulty converges to exact value;Iterations n is RBM network trainings to convergent number, in order to prevent RBM models over-fitting, therefore Allow that there are certain errors;The node number of visible layer is determined that the node number of hidden layer is with drop by the feature of input data The precision that dimension and convergence after dimension need is related, generally requires experiment and obtains reasonable set value;Root-mean-square error threshold value e refers to Similarity degree between input data and existing RBM, root-mean-square error is bigger, and similarity degree is smaller, and the model after cluster is got over It is few, but error is bigger;It refers to individual data after the industry control network feature extraction quantity within the time to merge period Ta Merge, the flow transmission feature for characterizing the network segment short time;The cluster period Tb of Temporal Clustering refers in each RBM models Period, wherein have multiple data for merging the period, flow transmission mode of the expression network segment in a period of time input and output.
The training refers to:It is all in test benchmark model by the benchmark model after aggregate of data input initialization RBM benchmark models, the reconstruct for calculating the aggregate of data in benchmark model exports, and calculates reconstruct output and the square root of initial data Error is improved training pattern parameter or is increased benchmark model, directly according to the size of distance between each model To the training of all training datasets, the industry control network normal baseline model comprising multiple RBM models and training number are obtained According to the abnormal data cluster of concentration.
Distance between the model, using but be not limited to square root error and characterized.
The abnormal data cluster refers to:According to each aggregate of data of the quantity set of the aggregate of data in RBM models after cluster Abnormality degree, the quantity of aggregate of data is more in RBM models, illustrates that the model more meets network segment transportation law, corresponding aggregate of data Abnormality degree is lower, which is exactly abnormal data.
The abnormality degree is the percentage of abnormal data in model, by the quantity of the aggregate of data in RBM models after clustering It determines, the quantity of aggregate of data is more in RBM models, and corresponding RBM models abnormality degree is lower, and what it was characterized is the different of RBM models Normal state.
It is described benchmark model increase refer to:When output data is all super at a distance from former data in training process When crossing given threshold, then illustrates that the feature in the aggregate of data is misfitted with existing all RBM network modes and belong to new Mode type, it is therefore desirable to create a RBM network and the aggregate of data is inputted in the RBM networks be trained and adjust network This is finally created and the RBM networks after initializing is added in benchmark model by parameter.
The adjustment network parameter refers to:The RBM models for meeting preset abnormality degree detection threshold value are summarized, after summarizing For RBM Models Sets more than one, Models Sets correspond to multiple RBM models, and the number of RBM models is K, and each RBM models correspond to oneself Parameter and aggregate of data.
The former data:Data after feature extraction, data correspondence are referred to as weight before inputting RBM networks The former data of structure output.
The abnormality degree detection threshold value is error of the RBM models with normal baseline model, and threshold value setting is smaller to be illustrated to miss Difference is smaller, which is exactly normal baseline model.
The training pattern parameter is improved:When in training process output data at a distance from former data part in threshold When being worth in range, the RBM Models Sets of selected distance minimum add the former data corresponding to the aggregate of data and enter corresponding benchmark model Training dataset, while networks re -training RBM update model parameter.
When the training data of model concentrates overabundance of data, abandoned at random according to the data set data volume number being set in advance Partial redundance data, the new data set of training simultaneously update corresponding benchmark model parameter.
The real-time network message is assessed:After network message is carried out feature extraction and merger, drawn with the period It separates the detection data cluster of aggregate of data form and is input in industry control network normal baseline model, wherein all RBM moulds of test Type simultaneously calculates the output data of the detection data cluster at a distance from former data, when distance is more than abnormality degree error amount, then detects The corresponding network message of aggregate of data is exception message.
Technique effect
Compared with prior art, the technology of the present invention effect includes:
1) speed of service of real-time traffic is promoted, when a small when institute of the network of power grid industry control network setting There is flow into fashionable, the update of the invention that abnormal identification and parameter can be completed within one minute;The present invention uses RBM nets The structure of network, can be in inside by the setting completion dimension whether dimensionality reduction and needs are reduced to of parameter and due to the present invention Can give up in the update of parameter and be associated with little data, keep data it is effective while avoid high remaining therefore wanted to hardware Ask lower;
2) by RBM methods establish benchmark model have the characteristics that it is nonlinear so that industry control network of the present invention Normal baseline model has better robustness, and multiple RBM are modeled it is possible to prevente effectively from different working condition is to data in addition It influences, is conducive to hold more normal operating conditions, to more accurate identification abnormality.
3) present invention uses hierarchical clustering, without the quantity for needing to cluster is set in advance, passes through the interrelated journey of model Degree is come the case where completing, more meet practical application.
Description of the drawings
Fig. 1 is that industry control network normal baseline model of the present invention builds flow chart automatically;
Fig. 2 is that the present invention is based on the anomalous traffic detection method flow charts of normal baseline model.
Specific implementation mode
The present embodiment operation object is the message data that the electricity consumption data of the daily uninterrupted sampling whole network segment samples, this reality It applies example and uses 15 days data as the structure data of benchmark model based on the data dataset in certain setting network segment, message Preceding 15 day data is set as benchmark model training data train_data in data, and rear 8 day data is test data test_ data。
As shown in Figure 1, acquiring the exception of flow for a kind of electricity consumption data in power grid industry control network that the present embodiment is related to Detection method specifically includes following steps:
It is initialized before carry out method detects and sets some parameters, the data prediction described in method includes following Partial content:The feature that data are determined according to afn, fn of message transmissions property in communication protocol extracts all data Feature type obtains 97 kinds of message characteristics, according to the 97 of setting kinds of features come conversion data.Then according to sampling time interval 10 Minute carries out the merging (setting Ta=10mins, Tb=1hour) of message amount, is set as within every ten minutes a message transmissions Data, when ten minutes no data transmissions be then all 0. finally by merging after data carry out min-max standardization normalization Processing, by simply scaling, the value of each dimension of adjustment data to [0,1], the function of conversion and application is:X=(x- min)/(max-min).Feature after normalized may be used for the input of K-RBM algorithms.
The RBM network parameters of Clustering Model are concurrently set, the visible layer node number in RBM networks is set as 96, because The model for being input to RBM is 97 dimensions (the visible node layer of RBM models is since 0), and hidden layer node number is set as 11, study speed Rate α=0.02, RBM model iterations are 1000 times, and RBM model root-mean-square errors are 0.03, the setting of Temporal Clustering period Tb It is 1 hour.
Set cluster after RBM abnormality degrees as:When the RBM models aggregate of data all aggregates of data accounting be i%, then Corresponding abnormality degree is 1-i%, and abnormality degree detection threshold value is 1%, and abnormality degree detection error value is 5%.
As shown in Figure 1, being as follows:
Step 1) is data={ x1, x2 ... xm } when sample sets of the train_data after above-mentioned pretreatment, each Then data is carried out data cutting, Ta by sample characteristics classification xi={ t1, t2t97 } according to Temporal Clustering period Tb It is to ensure RBM models while inputting multiple data segments, this multiple data segment represents time tranfer rule of the data on flows in Tb Rule.The aggregate of data segmented can consider data_i, and (i=1,2 ... n), then total n segment datas cluster establishes benchmark mould by iteration Type.
Step 2) first aggregate of data data_1 of training and the model parameter para_ for recording first aggregate of data RBM model 1, which is added to Models Sets R, is denoted as R1, para_2 is added to parameter set P, is denoted as P1, it will be each in aggregate of data Data are added to model data collection D, are denoted as D1, and record cast number K is that 1. subsequent iteration seek benchmark model, and detailed process is such as Under:
The parameter of all RBM models, is instructed when by model y in step 3) extraction aggregate of data data_j, test parameter collection P The root mean square e errors of data and former data after white silk are less than RBM model root-mean-square errors, then state parameter collection stata_y= Otherwise true is state_y=false, y is any one model in Models Sets.All state are verified, when all False then illustrates that the aggregate of data does not meet all existing models, when existing pattern number is n, training data cluster data_j, and remembers The RBM models are added to Models Sets R, Rn+1 are denoted as, by para_j by the model parameter para_j for recording aggregate of data RBM models It is added to parameter set P, is denoted as Pn+1, each data in aggregate of data is added to model data collection D, are denoted as Dn+1, record cast Number K is n+1;Work as presencestateFor true, then e_d=min (e) is sought, wherein d is corresponding model, then will be in data_j Data are added to Dd, and training Dd simultaneously updates corresponding parameter Pd, in aggregate of data to corresponding model is added, as of aggregate of data Number is more than 100, random discard cluster j when training, j random selections so that aggregate of data when training remains at 100.
Then the complete all data of step 4) iteration calculate the exception of each aggregate of data according to above-mentioned abnormality degree method Degree for the RBM model extractions more than abnormality degree threshold value and is considered abnormal, is less than the RBM models setting of the threshold value of abnormality degree On the basis of model, benchmark model may include multiple RBM models.
Step 5) reads test_data numbers as shown in Fig. 2, the validity that test benchmark model is applied in real time data It is data_test={ x1, x2 ... xm } according to the test set after above-mentioned pretreatment, each sample characteristics classification xi=t1, T2t97 }, it is aggregate of data that data_test is then carried out data cutting according to Temporal Clustering period Tb, reads number according to this According to the data in cluster, the parameter of all RBM models in normal baseline model is tested, when there are scale models, then the hop count Just meet normal baseline model according to cluster, which is also the normal message for meeting data transmission rule;When there is no less than different The square root error of normal detection error degree then illustrates that the secondary message is exception message
In the present embodiment, in order to verify more RBM model constructions benchmark model performance and validity, in above-mentioned electricity The dataset of net industry control network has done extensive analysis and assessment to method shown in the present invention, using this method it can be found that Abnormal flow in power grid industry control network and the flow for not meeting proper network transportation law, specific accuracy are specific by power grid Implementation environment is verified.
Above-mentioned specific implementation can by those skilled in the art under the premise of without departing substantially from the principle of the invention and objective with difference Mode carry out local directed complete set to it, protection scope of the present invention is subject to claims and not by above-mentioned specific implementation institute Limit, each implementation within its scope is by the constraint of the present invention.

Claims (10)

1. a kind of industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models, which is characterized in that from work Feature is extracted in control network and generates training dataset, and benchmark model is trained and is obtained comprising multiple RBM models The abnormal data cluster that industry control network normal baseline model and training data are concentrated, is carried out in real time with industry control network normal baseline model Network message is assessed, and realizes Traffic anomaly detection;
The benchmark model includes at least one RBM networks, which completes RBM nets by inputting any data cluster The update of the network parameter and initial parameter of benchmark model is set at random passes through and receives the aggregates of data of different rules and complete RBM networks The increase of quantity;
The network parameter of the RBM networks includes:Learning rate α, iterations n, visible layer and hidden layer node number, Square error threshold value e, merge period Ta, Temporal Clustering cluster period Tb.
2. according to the method described in claim 1, the training refers to:By the benchmark model after aggregate of data input initialization In, all RBM benchmark models in test benchmark model, the reconstruct for calculating the aggregate of data in benchmark model exports, and calculates weight Structure exports the square root error with initial data, perfect to training pattern parameter according to the size of distance between each model Or benchmark model is increased, until after the training of all training datasets, obtain the industry control for including multiple RBM models The abnormal data cluster that network normal baseline model and training data are concentrated.
3. according to the method described in claim 1, the training dataset, feature is carried out according to the network characteristic of industry control network After extraction and merger, the training data in the form of aggregate of data is marked off by the period.
4. according to the method described in claim 3, the feature extraction refers to:The association transmitted according to industry control network data on flows View extracts the features such as time, quantity, the type of message transmissions and carries out feature selecting, removes the high remaining feature in data set, obtains Message characteristic after extraction.
5. method according to claim 1 or 2, the abnormal data cluster refers to:According to the number in RBM models after cluster According to the abnormality degree of each aggregate of data of the quantity set of cluster, the quantity of aggregate of data is more in RBM models, illustrates that the model more meets net Section transportation law, corresponding aggregate of data abnormality degree is lower, which is exactly abnormal data;
The abnormality degree is the percentage of abnormal data in model, is determined by the quantity of the aggregate of data in RBM models after clustering, The quantity of aggregate of data is more in RBM models, and corresponding RBM models abnormality degree is lower, and what it was characterized is the abnormal shape of RBM models State.
6. according to the method described in claim 2, it is described to benchmark model carry out increase refer to:When exporting number in training process According at a distance from former data all more than given threshold when, then illustrate feature in the aggregate of data and existing all RBM networks Pattern misfits the mode type for belonging to new, it is therefore desirable to create a RBM network and the aggregate of data is inputted the RBM nets Network parameter is trained and adjusted in network, and finally this is created and the RBM networks after initializing are added in benchmark model.
7. according to the method described in claim 6, the adjustment network parameter refers to:Preset abnormality degree detection threshold will be met The RBM models of value summarize, and are RBM Models Sets more than one after summarizing, and Models Sets correspond to multiple RBM models, and the number of RBM models is K, each RBM models correspond to the parameter and aggregate of data of oneself.
8. according to the method described in claim 2, the training pattern parameter is improved refers to:When output data in training process With when part is in threshold range at a distance from former data, the RBM Models Sets of selected distance minimum add corresponding to the aggregate of data Former data enter the training dataset of corresponding benchmark model, while the networks re -training RBM, update model parameter.
9. according to the method described in claim 8, when model training data concentrate overabundance of data when, according to the number being set in advance Partial redundance data are abandoned at random according to collection data volume number, and the new data set of training simultaneously updates corresponding benchmark model parameter.
10. according to the method described in claim 1, the real-time network message assessment refers to:Network message is subjected to feature After extraction and merger, the detection data cluster in the form of aggregate of data is marked off by the period and is input to industry control network normal baseline model In, wherein all RBM models of test and calculate the output data of the detection data cluster at a distance from original data, when distance is more than When abnormality degree error amount, then the corresponding network message of detection data cluster is exception message.
CN201810449297.8A 2018-05-11 2018-05-11 Industrial control network flow abnormity identification method based on multi-RBM network construction reference model Active CN108683658B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810449297.8A CN108683658B (en) 2018-05-11 2018-05-11 Industrial control network flow abnormity identification method based on multi-RBM network construction reference model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810449297.8A CN108683658B (en) 2018-05-11 2018-05-11 Industrial control network flow abnormity identification method based on multi-RBM network construction reference model

Publications (2)

Publication Number Publication Date
CN108683658A true CN108683658A (en) 2018-10-19
CN108683658B CN108683658B (en) 2020-11-03

Family

ID=63805500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810449297.8A Active CN108683658B (en) 2018-05-11 2018-05-11 Industrial control network flow abnormity identification method based on multi-RBM network construction reference model

Country Status (1)

Country Link
CN (1) CN108683658B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098959A (en) * 2019-04-23 2019-08-06 广东技术师范大学 Modeling method, device, system and the storage medium of industry control protocol interaction behavior
CN111832647A (en) * 2020-07-10 2020-10-27 上海交通大学 Abnormal flow detection system and method
CN113343587A (en) * 2021-07-01 2021-09-03 国网湖南省电力有限公司 Flow abnormity detection method for electric power industrial control network
CN114666075A (en) * 2020-12-08 2022-06-24 上海交通大学 Distributed network anomaly detection method and system based on depth feature coarse coding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453416A (en) * 2016-12-01 2017-02-22 广东技术师范学院 Detection method of distributed attack intrusion based on deep belief network
CN107241358A (en) * 2017-08-02 2017-10-10 重庆邮电大学 A kind of smart home intrusion detection method based on deep learning
US20180032862A1 (en) * 2016-07-29 2018-02-01 Splunk, Inc. Automated anomaly detection for event-based system
CN107679859A (en) * 2017-07-18 2018-02-09 中国银联股份有限公司 A kind of Risk Identification Method and system based on Transfer Depth study

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180032862A1 (en) * 2016-07-29 2018-02-01 Splunk, Inc. Automated anomaly detection for event-based system
CN106453416A (en) * 2016-12-01 2017-02-22 广东技术师范学院 Detection method of distributed attack intrusion based on deep belief network
CN107679859A (en) * 2017-07-18 2018-02-09 中国银联股份有限公司 A kind of Risk Identification Method and system based on Transfer Depth study
CN107241358A (en) * 2017-08-02 2017-10-10 重庆邮电大学 A kind of smart home intrusion detection method based on deep learning

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
逯玉婧: "基于深度信念网络的入侵检测算法研究", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098959A (en) * 2019-04-23 2019-08-06 广东技术师范大学 Modeling method, device, system and the storage medium of industry control protocol interaction behavior
CN110098959B (en) * 2019-04-23 2021-11-16 广东技术师范大学 Industrial control protocol interactive behavior modeling method, device, system and storage medium
CN111832647A (en) * 2020-07-10 2020-10-27 上海交通大学 Abnormal flow detection system and method
CN114666075A (en) * 2020-12-08 2022-06-24 上海交通大学 Distributed network anomaly detection method and system based on depth feature coarse coding
CN113343587A (en) * 2021-07-01 2021-09-03 国网湖南省电力有限公司 Flow abnormity detection method for electric power industrial control network

Also Published As

Publication number Publication date
CN108683658B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN111798312B (en) Financial transaction system anomaly identification method based on isolated forest algorithm
CN108768946B (en) Network intrusion detection method based on random forest algorithm
CN108683658A (en) Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models
CN109034194B (en) Transaction fraud behavior deep detection method based on feature differentiation
CN107067324A (en) A kind of utilization network packet capturing data realize the method and system of transaction risk control
CN111191767A (en) Vectorization-based malicious traffic attack type judgment method
CN109766435A (en) The recognition methods of barrage classification, device, equipment and storage medium
CN109951462A (en) A kind of application software Traffic anomaly detection system and method based on holographic modeling
CN106681980B (en) A kind of refuse messages analysis method and device
Nuiaa et al. Evolving Dynamic Fuzzy Clustering (EDFC) to Enhance DRDoS_DNS Attacks Detection Mechnism.
CN105446954A (en) Project duplicate checking method for science and technology big data
Chen et al. An efficient network intrusion detection model based on temporal convolutional networks
WO2016106944A1 (en) Method for creating virtual human on mapreduce platform
CN110059126B (en) LKJ abnormal value data-based complex correlation network analysis method and system
CN115795285A (en) Abnormal data detection and monitoring method based on CUSUM type variable point statistics
CN113256438B (en) Role identification method and system for network user
Chu et al. Exploiting spatial-temporal behavior patterns for fraud detection in telecom networks
CN112422546A (en) Network anomaly detection method based on variable neighborhood algorithm and fuzzy clustering
CN114124437B (en) Encrypted flow identification method based on prototype convolutional network
CN107977727B (en) Method for predicting blocking probability of optical cable network based on social development and climate factors
CN111241145A (en) Self-healing rule mining method and device based on big data
CN110348005A (en) Distribution net equipment status data processing method, device, computer equipment and medium
CN116633589A (en) Malicious account detection method, device and storage medium in social network
CN112561538B (en) Risk model creation method, apparatus, computer device and readable storage medium
CN110071845A (en) The method and device that a kind of pair of unknown applications are classified

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant