首页> 外文会议>International conference on frontier computing: theory, technologies and applications >The Deep Learning Modules for Cyberattack Identification in NetFlow Data Log with Ceph
【24h】

The Deep Learning Modules for Cyberattack Identification in NetFlow Data Log with Ceph

机译:使用Ceph的NetFlow数据日志中用于网络攻击识别的深度学习模块

获取原文

摘要

In today's fast-moving information era, there is no doubt that the Internet has become an indispensable part of human life. However, in the world of the Internet, it also hides unusual network behavior. Find the hidden unusual network behavior can reduce the vulnerability in the network. This paper proposes a complete architecture to store and analyze the collected network log data. We process and integrate the network data collected by each router on the campus, and store the integrated data in the Ceph storage. Ceph distributed storage environment with open source, high performance, high reliability and scalability, and preliminary preprocessing of raw materials through Python, eliminating redundant fields and unit unification. The collated data set is divided into two parts analysis, and part of the abnormal analysis is part of attack identification. In the sub-analysis, we find the abnormal data period and total flow through the standard deviation of three standard deviations. Moreover, we use Keras to identify the real-time data obtained by a cyberattack, establish an automatic identification model through the recurrent neural network (RNN), an experiment and adjust various parameters without affecting the accuracy. Further, optimize the RNN automated identification model. The identification accuracy of the optimization model in attack identification is about 98%.
机译:在当今瞬息万变的信息时代,毫无疑问,互联网已成为人类生活中不可或缺的一部分。但是,在Internet的世界中,它也隐藏了异常的网络行为。查找隐藏的异常网络行为可以减少网络中的漏洞。本文提出了一个完整的体系结构,用于存储和分析收集的网络日志数据。我们处理和集成园区中每个路由器收集的网络数据,并将集成的数据存储在Ceph存储中。 Ceph分布式存储环境具有开源,高性能,高可靠性和可扩展性,并且可以通过Python进行原材料的预处理,从而消除了冗余字段和单元统一。整理后的数据集分为两部分分析,部分异常分析是攻击识别的一部分。在子分析中,我们通过三个标准偏差的标准偏差找到了异常数据周期和总流量。此外,我们使用Keras识别网络攻击获得的实时数据,通过递归神经网络(RNN)建立自动识别模型,进行实验并调整各种参数,而不会影响准确性。此外,优化RNN自动识别模型。该优化模型在攻击识别中的识别精度约为98%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号