Selected article for: "constructed network and model constructed network"

Author: Fan, Guo-gen; Zhai, Jian-li
Title: Network APT Attack Detection Based on Big Data Analysis
  • Cord-id: 1bpswpyc
  • Document date: 2020_6_8
  • ID: 1bpswpyc
    Snippet: In order to improve the security of the distributed optical fiber sensing network, the self-adaptive detection of the fiber sensing network needs to be carried out, and an overlap detection algorithm under the APT attack of the distributed optical fiber sensing network based on the spectral characteristic component and the big data analysis is proposed. the large data sampling model of the network APT attack is constructed, the attack characteristics and the related properties of the distributed
    Document: In order to improve the security of the distributed optical fiber sensing network, the self-adaptive detection of the fiber sensing network needs to be carried out, and an overlap detection algorithm under the APT attack of the distributed optical fiber sensing network based on the spectral characteristic component and the big data analysis is proposed. the large data sampling model of the network APT attack is constructed, the attack characteristics and the related properties of the distributed optical fiber sensing network virus are simulated by adopting the spectrum correlation characteristic detection and the large-data quantization characteristic coding, and the large-data fusion and feature extraction of the APT attack information are realized, the output abnormal characteristic detection of the distributed optical fiber sensing network is carried out through the feature extraction result, a distributed optical fiber sensing network intrusion large data statistical analysis model is constructed, and a narrow-band signal spectrum offset correction method is adopted, And calculating the connection probability density and the individual infection probability of the APT attack node, and improving the detection capability of the network APT attack. The simulation results show that the algorithm can effectively implement the network APT attack detection, improve the security detection capability of the network APT attack, and has a good network security protection capability.

    Search related documents:
    Co phrase search for related documents
    • Try single phrases listed below for: 1