Abstract
In recent years, with the rapid development and application of emerging technologies such as the Internet, cloud computing, and big data, there has been a substantial increase in threats to intrusions into networks and information systems. Plays an important role in preventing security threats and protecting the network from attacks. Over the years, attackers and defenders have been at war with each other, with new, combined or higher-level attack patterns emerging. Based on public information such as social accounts and IP, this paper describes network intrusion attacks from multiple dimensions such as attackers, attack targets, and attack methods. The key technology for the complete construction and positioning of the portrait. At the same time, this paper combines the advantages of deep learning and generative methods to build a deep generative model to detect and identify attacks. The construction of attacker portraits has become a network intrusion detection and defense process, analyzing the attacker’s intention, and effectively restoring and predicting the attack process. It is a good solution to the problems that traditional machine learning methods suffer from low detection rate and high false alarm rate. The final results of the research show that the processing time can be greatly reduced after the algorithm is optimized. The processing time of IP addresses is determined by The increase from 266s to 636s is because each word segment needs to be compared with all addresses in the address library, and the processing time of all programs increases rapidly with the number of statements.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.