[go: up one dir, main page]

CN112910859B - Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis - Google Patents

Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis Download PDF

Info

Publication number
CN112910859B
CN112910859B CN202110066683.0A CN202110066683A CN112910859B CN 112910859 B CN112910859 B CN 112910859B CN 202110066683 A CN202110066683 A CN 202110066683A CN 112910859 B CN112910859 B CN 112910859B
Authority
CN
China
Prior art keywords
data
internet
decision tree
early warning
things equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110066683.0A
Other languages
Chinese (zh)
Other versions
CN112910859A (en
Inventor
朱飑凯
侯心怿
刘三满
李峰
杜思璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Police College
Original Assignee
Shanxi Police College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Police College filed Critical Shanxi Police College
Priority to CN202110066683.0A priority Critical patent/CN112910859B/en
Publication of CN112910859A publication Critical patent/CN112910859A/en
Application granted granted Critical
Publication of CN112910859B publication Critical patent/CN112910859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/10Pre-processing; Data cleansing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • G06F18/24323Tree-organised classifiers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/20Ensemble learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/049Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Software Systems (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Molecular Biology (AREA)
  • Medical Informatics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an Internet of things equipment monitoring and early warning method, in particular to an Internet of things equipment monitoring and early warning method based on a C5.0 decision tree and time sequence analysis. The method is characterized by classifying the characteristics of data based on a C5.0 algorithm, predicting the time sequence by using a CNN-LSTM mixed model, and matching the Internet of things equipment and the data based on a white list technology. According to the invention, a decision tree C5.0 algorithm and a time sequence prediction technology CNN-LSTM combined model are respectively cited as an information classification module and a data prediction module of the system, a host in a monitoring range is monitored through analysis of historical data, accurate analysis and monitoring prediction on unknown attacks are realized, and once a great attacked risk and a potential leak of the equipment are found, the system can give out early warning, so that the classification and prediction precision and practicability of the system are greatly improved, and meanwhile, the problem of real-time monitoring in the flow monitoring field is solved.

Description

Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis
Technical Field
The invention relates to an Internet of things equipment monitoring and early warning method, in particular to an Internet of things equipment monitoring and early warning method based on a C5.0 decision tree and time sequence analysis.
Background
Abnormal traffic and vulnerability attack monitoring play a vital role in today's internet of things (IoT) applications. Particularly, under the promotion of rapid development of technologies such as big data, artificial intelligence, information communication and the like, the scale of the internet of things is rapidly increased, the technology of the internet of things and related applications are continuously innovated and broken through, and the number of devices is increased. With the large-scale application of the Internet of things, an attacker can take advantage of the Internet of things. The attacker accesses the leaked equipment into the target network to be latent and can launch the attack at any time. The internet of things architecture has the characteristics of itself, and once the internet of things architecture is attacked, network paralysis can be caused, so that countries and individuals can be greatly threatened and lost. The existing solution generally performs feature extraction and classification on the flow based on machine learning, and has the defects that a large amount of manual operation is required in the classification process, and the adaptability is poor; and aiming at unknown attacks and bugs, early warning cannot be given in time only by means of a flow monitoring system, and the detection system lacks real-time performance. Therefore, it is very necessary to improve the monitoring and early warning efficiency of the internet of things equipment.
Disclosure of Invention
The invention provides an Internet of things equipment monitoring and early warning method based on a C5.0 decision tree and time sequence analysis, aiming at solving the problems that the existing flow monitoring and early warning method is not strong in adaptivity, not high in real-time performance and incapable of monitoring and predicting unknown flow in time.
The invention is realized by adopting the following technical scheme: the Internet of things equipment monitoring and early warning method based on the C5.0 decision tree and the time sequence analysis comprises the following steps:
the first step is as follows: data collection and preprocessing: collecting flow data of the Internet of things equipment to obtain a data set S, wherein part of data in the data set S is used as a training set to train a C5.0 decision tree, and the rest data is used as a test set;
the second step is that: classifying the data of the tested set by using a C5.0 decision tree algorithm: inputting the training set into the established C5.0 decision tree model for training and learning to obtain selection characteristics, performing classification prediction on the test set by using the selection characteristics as classification rules, thereby achieving classification and identification processing of the test set data, finally outputting abnormal data as a new data set H, and converting the data set H into time sequence information;
the third step: converting time series information into a GAF graph, taking the GAF graph as a data feature of abnormal data, training by using a convolutional neural network to obtain a detection key feature, combining a selection feature in the training process of a decision tree with the key feature generated based on the convolutional neural network to form a new feature set, inputting the new feature set into a long-short term memory network model, predicting the data trend in a data set H by using the long-short term memory network, and finally obtaining the data abnormal trend of the data set H, wherein the abnormal trend represents the probability that the data is possibly abnormal, attacked or has potential loopholes in the future;
the fourth step: matching the data set H data and the equipment based on the white list: carrying out secondary filtration on the data set H through a white list technology, comparing data with data in a white list, wherein the probability of the data set H possibly having abnormality, attack or potential loophole exceeds a certain value, extracting data coincident with the white list, reducing an early warning retrieval range, and obtaining final early warning data; and then, matching the early warning data with the Internet of things equipment, identifying the type of the abnormal Internet of things equipment, and realizing the conversion of the prediction result from the data to the equipment. Through detection, the Internet of things equipment which is vulnerable and has potential vulnerabilities is determined and early-warned, so that a user can obtain the state information of the Internet of things equipment in advance
The Internet of things equipment monitoring and early warning system and the identification method based on C5.0 and time sequence analysis comprise the following steps:
preprocessing the data in the test set, and classifying the data by using a trained decision tree; the data preprocessing process comprises data identification, data cleaning and data standardization.
(1) Data identification: the attribute A of each data in the data set S has n values, wherein one attribute value is an attack type, and the data identification is to identify the data according to the attack type;
(2) data cleaning: checking, repairing or eliminating the data which do not meet the standard in the data set S;
(3) data normalization: including centering and normalization, i.e., removing the unit limitation of the data by shifting and scaling the differences that exist between the features.
The test set data is preprocessed and then classified, so that the classification precision can be improved.
The Internet of things equipment monitoring and early warning system and the identification method based on C5.0 and time sequence analysis are used for optimizing data on the basis of classifying test set data, and the Boosting technology and the pruning technology are utilized, so that the classification precision can be effectively improved, and the purposes of model data pruning and optimization are achieved.
The invention provides an Internet of things equipment monitoring and early warning system and an identification method based on C5.0 and time sequence analysis. According to the current situation of network security, a Device Hive Internet of things virtual platform is used for collecting flow data of Internet of things equipment, and a decision tree C5.0 and a time sequence prediction model are respectively quoted as an information classification module and a data prediction module of the system, so that the monitoring precision is greatly improved, the problem of real-time monitoring on unknown attacks in the flow monitoring field is effectively solved, and the practicability and the real-time performance are improved.
Drawings
FIG. 1 is a flow chart of the present invention.
FIG. 2 is a schematic diagram of the operation principle of the CNN-LSTM combined model.
Detailed Description
The Internet of things equipment monitoring and early warning method based on the C5.0 decision tree and time sequence analysis comprises the steps of carrying out feature classification by taking the decision tree C5.0 as a training model, inputting data after analysis and processing for classification training, improving model accuracy by adopting methods such as Boosting and pruning and the like, reducing overfitting, improving precision indexes, and constructing a time sequence model to analyze classification results to obtain accurate prediction values. Compared with the traditional Internet of things equipment identification monitoring method, the method provided by the invention optimizes the processing of data repetition and redundancy, improves the accuracy and stability, and meanwhile, the system
And a time sequence technology is added to predict abnormal flow, so that flow monitoring and early warning are more timely, and unnecessary loss caused by malicious attack can be avoided.
The first step is as follows: data collection and preprocessing: data collection is carried out through a Device Hive Internet of things virtual platform, and forty three kinds of Internet of things equipment such as an intelligent temperature management system and household appliances are added into the Device Hive Internet of things virtual platform. In order to enable all tested devices to generate enough data, the devices are activated by initialization setting, meanwhile, the devices are connected to WiFi or Ethernet by means of application software provided by a supplier, at the moment, the certificates are synchronously transmitted to a user network, and the devices are forcibly restored to factory settings through a series of operations, so that repeated testing of the device data is facilitated.
70 percent of data set S collected by the Device Hive Internet of things virtual platform is randomly extracted to be used as a training set, and the rest 30 percent is subjected to data preprocessing to obtain a test set. The data preprocessing process comprises data identification, data cleaning and data standardization.
(1) And (5) data identification. The attribute A of each data in the data set S has n values { a }1,a2,...,anAnd one attribute value is an attack type, and the data identification is used for identifying the data according to the attack type.
(2) And (6) data cleaning. Data (such as error data, missing data, redundant data, meaningless features and the like) which do not meet the specification in the data set S are checked, repaired or eliminated.
(3) And (4) standardizing the data. Including centering and normalization, i.e., removing the unit limitation of the data by shifting and scaling the differences that exist between the features.
And (3) carrying out data standardization on the data in the data set S after data cleaning, centralizing the data according to a mean value x, and zooming according to a standard deviation delta to finally obtain normal distribution with a value range between [0 and 1 ].
Figure BDA0002904336730000051
The second step is that: and classifying the preprocessed test set data in a system classification detection module by using a C5.0 decision tree algorithm.
And inputting the training set into the established C5.0 decision tree model for training and learning to obtain selection features, and performing classification prediction on the test set by using the selection features as classification rules, thereby achieving classification and identification processing of the data of the test set. In the process of training a decision tree model, information gain rate is used as a basis for judging nodes of the decision tree, the decision tree is generated by taking the information gain rate as measurement, the characteristics of test set data are distinguished, test set abnormal data which really carry malicious attacks and vulnerabilities are identified, data are optimized on the basis of classification, an initial weight value is given to each sample by using a Boosting technology and a pruning technology, a new decision tree model is established by selecting the sample, the larger the weight is, the direct proportion is realized to the selected probability, and according to the rule, repeated iteration is continuously carried out on wrong samples until the classification error is smaller than a specified threshold value.
Gain (S, a), i.e. the information Gain for attribute a, represents the degree to which the information is free of random uncertainty under a condition, and the information Gain obtained by dividing the data set S by attribute a. Sa iRepresented in the data set S, the attribute A takes the valuea iThe obtained sample set subset is taken as the attribute Aa iThe larger the number is, the feature inherent value SpliInformation (S)a iThe larger A), the larger
Figure BDA0002904336730000061
The information gain rate calculation method comprises the following steps:
Figure BDA0002904336730000062
the generation of the decision tree is a process of recursively invoking feature selection, starting from a root node, selecting the optimal feature as a node feature by using the information gain rate, establishing child nodes according to different values of the feature, then invoking the above method for the child nodes until the information gain rates of all the features are very small or no feature can be selected, and finally obtaining the decision tree model.
A pruning method is used in the C5.0 decision tree model to improve the accuracy of the model, and pruning is used as a regularization technology, so that the model is close to the optimal structure through calculation, overfitting is prevented, and the accuracy index is improved.
Based on a data set S and an information gain rate thereof, a decision tree T is established, wherein T is a leaf node, and the number of the leaf nodes is | T |, Pt、HtAnd respectively, the attributes of the T-th node on the decision tree, wherein alpha can be used as a parameter for adjusting the size of the tree and the balance between the fit of the tree and the data, alpha | T | is the complexity of the tree, and pruning is used for calculating the model loss value.
Then the loss function can be defined as:
Figure BDA0002904336730000071
feature distinguishing is carried out through a decision tree C5.0 model, meanwhile, the accuracy of the model is improved through a pruning method, the problem of decision tree overfitting is solved, the accuracy index is improved, finally, abnormal data are output to serve as a new data set H, the data set H is converted into time sequence information, and the time sequence information is displayed in an Excel table mode and used for a subsequent time sequence prediction model.
The third step: a prediction model is built based on the characteristic time sequence, time sequence information is converted into a GAF graph in a prediction module of the system by using a visualization technology and is used as a data characteristic of abnormal data, a one-dimensional Convolutional Neural Network (CNN) is used for training to obtain a detection key characteristic, a selection characteristic in the training process of a decision tree and a key characteristic generated based on the convolutional neural network are combined to form a new characteristic set, the new characteristic set is input into a long-short term memory network (LSTM) model, the data trend in a data set H is predicted by the long-short term memory network (LSTM), and finally the data abnormal trend of the data set H is obtained.
Because it is difficult to build a prediction model by adding deep learning to a time sequence, time sequence information is converted into a two-dimensional image GAF through a python library. Gramian Angular Field (GAF) works on the principle that a one-dimensional time sequence is converted into a polar coordinate system in a Cartesian coordinate system, and then a GAF matrix is generated through a trigonometric function.
The LSTM (Long Short-Term Memory) is a Long and Short Term Memory network, belongs to a type of a time Recurrent Neural Network (RNN), and can just solve a series of problems of gradient disappearance, gradient explosion and the like which can occur in the Long sequence training process of the RNN by training data characteristics.
The fourth step: matching the data set H data and the equipment based on the white list: carrying out secondary filtration on the data set H through a white list technology, comparing data with the data in the white list, wherein the probability of the data set H possibly having abnormity, attack or potential bugs exceeds sixty percent, extracting data coincident with the white list, reducing the early warning retrieval range, and obtaining final early warning data; and then, matching the early warning data with the Internet of things equipment, identifying the type of the abnormal Internet of things equipment, and realizing the conversion of the prediction result from the data to the equipment. And after detection, determining the Internet of things equipment which is vulnerable and has potential vulnerabilities and early warning the Internet of things equipment, so that the user can obtain the state information of the Internet of things equipment in advance.
Selecting NSL-KDD, ADFA IDS Data, Masquerading User Data and DARPA1998, comparing the classified normal Data in the four Data sets, extracting the overlapped Data to ensure the Data accuracy, and using the overlapped Data as a white list database.

Claims (3)

1. The Internet of things equipment monitoring and early warning method based on the C5.0 decision tree and the time sequence analysis is characterized by comprising the following steps: the method comprises the following steps:
the first step is as follows: data collection and preprocessing: collecting flow data of the Internet of things equipment to obtain a data set S, wherein a part of data in the data set S is used as a training set to train a C5.0 decision tree, and the rest data is used as a test set;
the second step is that: classifying the test set data by using a C5.0 decision tree algorithm: inputting the training set into the established C5.0 decision tree model for training and learning to obtain selection characteristics, performing classification prediction on the test set by using the selection characteristics as classification rules, thereby achieving classification and identification processing of the test set data, finally outputting abnormal data as a new data set H, and converting the data set H into time sequence information;
the third step: converting time sequence information into a GAF (generalized open form factor) graph, taking the GAF graph as a data feature of abnormal data, training by using a convolutional neural network to obtain a detection key feature, combining a selection feature in the training process of a decision tree with the key feature generated based on the convolutional neural network to form a new feature set, inputting the new feature set into a long-short term memory network model, predicting the data trend in the data set H by using the long-short term memory network, and finally obtaining the data abnormal trend of the data set H, wherein the abnormal trend represents the probability that the data is possibly abnormal, attacked or has potential bugs in the future;
the fourth step: matching the data set H data and the equipment based on the white list: carrying out secondary filtration on the data set H through a white list technology, comparing data with data in a white list, wherein the probability of the data set H possibly having abnormality, attack or potential loophole exceeds a certain value, extracting data coincident with the white list, reducing an early warning retrieval range, and obtaining final early warning data; and then, matching the early warning data with the Internet of things equipment, identifying the type of the abnormal Internet of things equipment, and realizing the conversion of the prediction result from the data to the equipment.
2. The Internet of things equipment monitoring and early warning method based on the C5.0 decision tree and the time sequence analysis as claimed in claim 1, wherein: the method comprises the following steps:
preprocessing the test centralized data and then classifying the data by a trained decision tree; the data preprocessing process comprises data identification, data cleaning and data standardization.
(1) Data identification: the attribute A of each data in the data set S has n values, wherein one attribute value is an attack type, and the data identification is to identify the data according to the attack type;
(2) data cleaning: checking, repairing or eliminating the data which do not meet the standard in the data set S;
(3) data normalization: including centering and normalization, i.e., removing the unit limitation of the data by shifting and scaling the differences that exist between the features.
3. The Internet of things equipment monitoring and early warning method based on the C5.0 decision tree and the time sequence analysis as claimed in claim 1 or 2, wherein: data optimization is performed on the basis of test set data classification, and the classification precision can be effectively improved by using the Boosting technology and the pruning technology, so that the purposes of model data pruning and optimization are achieved.
CN202110066683.0A 2021-01-19 2021-01-19 Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis Active CN112910859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110066683.0A CN112910859B (en) 2021-01-19 2021-01-19 Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110066683.0A CN112910859B (en) 2021-01-19 2021-01-19 Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis

Publications (2)

Publication Number Publication Date
CN112910859A CN112910859A (en) 2021-06-04
CN112910859B true CN112910859B (en) 2022-06-14

Family

ID=76115097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110066683.0A Active CN112910859B (en) 2021-01-19 2021-01-19 Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis

Country Status (1)

Country Link
CN (1) CN112910859B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113505925B (en) * 2021-07-09 2022-07-15 重庆邮电大学 A kind of abnormal information early warning method of laboratory hazardous chemicals based on ANFIS
CN113657628A (en) * 2021-08-20 2021-11-16 武汉霖汐科技有限公司 Industrial equipment monitoring method and system, electronic equipment and storage medium
CN113781213B (en) * 2021-08-20 2023-09-29 上海华鑫股份有限公司 Intelligent transaction anomaly detection method based on graph and hierarchical convertors
CN114252739B (en) * 2021-12-24 2023-11-03 国家电网有限公司 Power distribution network single-phase earth fault discrimination method, system, equipment and storage medium
CN114338187B (en) * 2021-12-30 2024-02-02 中国电信股份有限公司 Terminal safety detection method and device based on decision tree
CN114554490B (en) * 2021-12-30 2024-08-06 国网辽宁省电力有限公司电力科学研究院 Abnormal AP detection method and system based on time sequence model
CN116008756B (en) * 2023-03-15 2023-06-09 国网福建省电力有限公司 Insulation fault diagnosis method, system, equipment and medium for capacitive voltage transformer
CN117527369B (en) * 2023-11-13 2024-06-04 无锡商业职业技术学院 Android malicious attack monitoring method and system based on hash function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103107902A (en) * 2011-11-14 2013-05-15 无锡南理工科技发展有限公司 Attack detection system based on decision-making tree
CN108718291A (en) * 2018-02-28 2018-10-30 北京微智信业科技有限公司 A kind of malice URL detection methods based on big data
CN111062511A (en) * 2019-11-14 2020-04-24 佛山科学技术学院 Aquaculture disease prediction method and system based on decision tree and neural network
CN111526101A (en) * 2020-04-16 2020-08-11 华北电力大学 A machine learning-based dynamic traffic classification method for the Internet of Things
AU2020102094A4 (en) * 2020-09-01 2020-10-08 K.R, Ananth DR GROUP ACTIVITY RECOGNITION BY INTEGRATION AND FUSION OF INDIVIDUAL MULTISENSORY IoT DATA

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190180196A1 (en) * 2015-01-23 2019-06-13 Conversica, Inc. Systems and methods for generating and updating machine hybrid deep learning models

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103107902A (en) * 2011-11-14 2013-05-15 无锡南理工科技发展有限公司 Attack detection system based on decision-making tree
CN108718291A (en) * 2018-02-28 2018-10-30 北京微智信业科技有限公司 A kind of malice URL detection methods based on big data
CN111062511A (en) * 2019-11-14 2020-04-24 佛山科学技术学院 Aquaculture disease prediction method and system based on decision tree and neural network
CN111526101A (en) * 2020-04-16 2020-08-11 华北电力大学 A machine learning-based dynamic traffic classification method for the Internet of Things
AU2020102094A4 (en) * 2020-09-01 2020-10-08 K.R, Ananth DR GROUP ACTIVITY RECOGNITION BY INTEGRATION AND FUSION OF INDIVIDUAL MULTISENSORY IoT DATA

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Comparison of SVM and CNN-LSTM Based Approach for Detecting Smoke Inhalations from Respiratory signal;Volkan Y Senyurek.etl;《2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)》;20191007;全文 *
基于主成分分析禁忌搜索和决策树分类的异常流量检测方法;冶晓隆等;《计算机应用》;20131001(第10期);全文 *

Also Published As

Publication number Publication date
CN112910859A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN112910859B (en) Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis
CN117473571B (en) Data information security processing method and system
CN111163057B (en) User identification system and method based on heterogeneous information network embedding algorithm
CN112235283B (en) A network attack assessment method for power industrial control system based on vulnerability description attack graph
CN111901340B (en) A kind of intrusion detection system and method for energy internet
CN113378990B (en) Flow data anomaly detection method based on deep learning
CN113505371B (en) Database Security Risk Assessment System
CN115987615A (en) Network behavior safety early warning method and system
CN114218998A (en) Power system abnormal behavior analysis method based on hidden Markov model
CN117056902A (en) Password management method and system for Internet of things
Ao Using machine learning models to detect different intrusion on NSL-KDD
KR102470364B1 (en) A method for generating security event traning data and an apparatus for generating security event traning data
CN117349618A (en) Method and medium for constructing malicious encryption traffic detection model of network information system
CN115242431A (en) Industrial Internet of things data anomaly detection method based on random forest and long-short term memory network
CN118627066A (en) A BERT-based APT attack tracing method
Chen et al. An efficient network intrusion detection model based on temporal convolutional networks
CN118041587A (en) Network security test evaluation system and method
CN117034149A (en) Fault processing strategy determining method and device, electronic equipment and storage medium
CN116346475A (en) Hidden high-risk behavior operation anomaly scoring method and system
Harbola et al. Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set
CN118573455B (en) Deep learning-based power system network security prediction method and device
CN119449452A (en) A network threat deduction system and method based on Transformer and graph attention network model
Dong et al. Security situation assessment algorithm for industrial control network nodes based on improved text simhash
Li et al. On Testing and Evaluation of Artificial Intelligence Models
Su et al. Intrusion detection using convolutional recurrent neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant