Cloud edge cooperative attack identification method and system, computer equipment and storage medium

The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: XIA FEI, YANG HUAFEI, WANG LING, MAO LINHUI, TANG MING, YANG WENQING, JIANG CHENGLING, MU JUN, YU JINGHANG, CHU YI, ZHANG MINGMING, ZHANG LIZHI, LI MENGYA, CHENG XINYUN, LI LEI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator XIA FEI
YANG HUAFEI
WANG LING
MAO LINHUI
TANG MING
YANG WENQING
JIANG CHENGLING
MU JUN
YU JINGHANG
CHU YI
ZHANG MINGMING
ZHANG LIZHI
LI MENGYA
CHENG XINYUN
LI LEI
description The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117478379A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117478379A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117478379A3</originalsourceid><addsrcrecordid>eNqNjLEKAjEQRK-xEPUf1l6L44TTUg7Fysr-WJJRg5dsvGwE_96AfoDVwJs3M63QDZItwd5ARiRiZHUvEKuyeZCzCOquzhQqgTz0LpY4WErvpPCrMvIxK0bCM7voi_6tVUYunx7WZT-vJlceEha_nFXL4-HSndaI0iNFNgjQvjvXdbtpt0272zf_OB9pej_O</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><source>esp@cenet</source><creator>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</creator><creatorcontrib>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</creatorcontrib><description>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240130&amp;DB=EPODOC&amp;CC=CN&amp;NR=117478379A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240130&amp;DB=EPODOC&amp;CC=CN&amp;NR=117478379A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>XIA FEI</creatorcontrib><creatorcontrib>YANG HUAFEI</creatorcontrib><creatorcontrib>WANG LING</creatorcontrib><creatorcontrib>MAO LINHUI</creatorcontrib><creatorcontrib>TANG MING</creatorcontrib><creatorcontrib>YANG WENQING</creatorcontrib><creatorcontrib>JIANG CHENGLING</creatorcontrib><creatorcontrib>MU JUN</creatorcontrib><creatorcontrib>YU JINGHANG</creatorcontrib><creatorcontrib>CHU YI</creatorcontrib><creatorcontrib>ZHANG MINGMING</creatorcontrib><creatorcontrib>ZHANG LIZHI</creatorcontrib><creatorcontrib>LI MENGYA</creatorcontrib><creatorcontrib>CHENG XINYUN</creatorcontrib><creatorcontrib>LI LEI</creatorcontrib><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><description>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjLEKAjEQRK-xEPUf1l6L44TTUg7Fysr-WJJRg5dsvGwE_96AfoDVwJs3M63QDZItwd5ARiRiZHUvEKuyeZCzCOquzhQqgTz0LpY4WErvpPCrMvIxK0bCM7voi_6tVUYunx7WZT-vJlceEha_nFXL4-HSndaI0iNFNgjQvjvXdbtpt0272zf_OB9pej_O</recordid><startdate>20240130</startdate><enddate>20240130</enddate><creator>XIA FEI</creator><creator>YANG HUAFEI</creator><creator>WANG LING</creator><creator>MAO LINHUI</creator><creator>TANG MING</creator><creator>YANG WENQING</creator><creator>JIANG CHENGLING</creator><creator>MU JUN</creator><creator>YU JINGHANG</creator><creator>CHU YI</creator><creator>ZHANG MINGMING</creator><creator>ZHANG LIZHI</creator><creator>LI MENGYA</creator><creator>CHENG XINYUN</creator><creator>LI LEI</creator><scope>EVB</scope></search><sort><creationdate>20240130</creationdate><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><author>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117478379A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>XIA FEI</creatorcontrib><creatorcontrib>YANG HUAFEI</creatorcontrib><creatorcontrib>WANG LING</creatorcontrib><creatorcontrib>MAO LINHUI</creatorcontrib><creatorcontrib>TANG MING</creatorcontrib><creatorcontrib>YANG WENQING</creatorcontrib><creatorcontrib>JIANG CHENGLING</creatorcontrib><creatorcontrib>MU JUN</creatorcontrib><creatorcontrib>YU JINGHANG</creatorcontrib><creatorcontrib>CHU YI</creatorcontrib><creatorcontrib>ZHANG MINGMING</creatorcontrib><creatorcontrib>ZHANG LIZHI</creatorcontrib><creatorcontrib>LI MENGYA</creatorcontrib><creatorcontrib>CHENG XINYUN</creatorcontrib><creatorcontrib>LI LEI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>XIA FEI</au><au>YANG HUAFEI</au><au>WANG LING</au><au>MAO LINHUI</au><au>TANG MING</au><au>YANG WENQING</au><au>JIANG CHENGLING</au><au>MU JUN</au><au>YU JINGHANG</au><au>CHU YI</au><au>ZHANG MINGMING</au><au>ZHANG LIZHI</au><au>LI MENGYA</au><au>CHENG XINYUN</au><au>LI LEI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><date>2024-01-30</date><risdate>2024</risdate><abstract>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN117478379A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Cloud edge cooperative attack identification method and system, computer equipment and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T03%3A29%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=XIA%20FEI&rft.date=2024-01-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117478379A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true