Cloud edge cooperative attack identification method and system, computer equipment and storage medium
The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | XIA FEI YANG HUAFEI WANG LING MAO LINHUI TANG MING YANG WENQING JIANG CHENGLING MU JUN YU JINGHANG CHU YI ZHANG MINGMING ZHANG LIZHI LI MENGYA CHENG XINYUN LI LEI |
description | The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117478379A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117478379A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117478379A3</originalsourceid><addsrcrecordid>eNqNjLEKAjEQRK-xEPUf1l6L44TTUg7Fysr-WJJRg5dsvGwE_96AfoDVwJs3M63QDZItwd5ARiRiZHUvEKuyeZCzCOquzhQqgTz0LpY4WErvpPCrMvIxK0bCM7voi_6tVUYunx7WZT-vJlceEha_nFXL4-HSndaI0iNFNgjQvjvXdbtpt0272zf_OB9pej_O</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><source>esp@cenet</source><creator>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</creator><creatorcontrib>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</creatorcontrib><description>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240130&DB=EPODOC&CC=CN&NR=117478379A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240130&DB=EPODOC&CC=CN&NR=117478379A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>XIA FEI</creatorcontrib><creatorcontrib>YANG HUAFEI</creatorcontrib><creatorcontrib>WANG LING</creatorcontrib><creatorcontrib>MAO LINHUI</creatorcontrib><creatorcontrib>TANG MING</creatorcontrib><creatorcontrib>YANG WENQING</creatorcontrib><creatorcontrib>JIANG CHENGLING</creatorcontrib><creatorcontrib>MU JUN</creatorcontrib><creatorcontrib>YU JINGHANG</creatorcontrib><creatorcontrib>CHU YI</creatorcontrib><creatorcontrib>ZHANG MINGMING</creatorcontrib><creatorcontrib>ZHANG LIZHI</creatorcontrib><creatorcontrib>LI MENGYA</creatorcontrib><creatorcontrib>CHENG XINYUN</creatorcontrib><creatorcontrib>LI LEI</creatorcontrib><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><description>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjLEKAjEQRK-xEPUf1l6L44TTUg7Fysr-WJJRg5dsvGwE_96AfoDVwJs3M63QDZItwd5ARiRiZHUvEKuyeZCzCOquzhQqgTz0LpY4WErvpPCrMvIxK0bCM7voi_6tVUYunx7WZT-vJlceEha_nFXL4-HSndaI0iNFNgjQvjvXdbtpt0272zf_OB9pej_O</recordid><startdate>20240130</startdate><enddate>20240130</enddate><creator>XIA FEI</creator><creator>YANG HUAFEI</creator><creator>WANG LING</creator><creator>MAO LINHUI</creator><creator>TANG MING</creator><creator>YANG WENQING</creator><creator>JIANG CHENGLING</creator><creator>MU JUN</creator><creator>YU JINGHANG</creator><creator>CHU YI</creator><creator>ZHANG MINGMING</creator><creator>ZHANG LIZHI</creator><creator>LI MENGYA</creator><creator>CHENG XINYUN</creator><creator>LI LEI</creator><scope>EVB</scope></search><sort><creationdate>20240130</creationdate><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><author>XIA FEI ; YANG HUAFEI ; WANG LING ; MAO LINHUI ; TANG MING ; YANG WENQING ; JIANG CHENGLING ; MU JUN ; YU JINGHANG ; CHU YI ; ZHANG MINGMING ; ZHANG LIZHI ; LI MENGYA ; CHENG XINYUN ; LI LEI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117478379A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>XIA FEI</creatorcontrib><creatorcontrib>YANG HUAFEI</creatorcontrib><creatorcontrib>WANG LING</creatorcontrib><creatorcontrib>MAO LINHUI</creatorcontrib><creatorcontrib>TANG MING</creatorcontrib><creatorcontrib>YANG WENQING</creatorcontrib><creatorcontrib>JIANG CHENGLING</creatorcontrib><creatorcontrib>MU JUN</creatorcontrib><creatorcontrib>YU JINGHANG</creatorcontrib><creatorcontrib>CHU YI</creatorcontrib><creatorcontrib>ZHANG MINGMING</creatorcontrib><creatorcontrib>ZHANG LIZHI</creatorcontrib><creatorcontrib>LI MENGYA</creatorcontrib><creatorcontrib>CHENG XINYUN</creatorcontrib><creatorcontrib>LI LEI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>XIA FEI</au><au>YANG HUAFEI</au><au>WANG LING</au><au>MAO LINHUI</au><au>TANG MING</au><au>YANG WENQING</au><au>JIANG CHENGLING</au><au>MU JUN</au><au>YU JINGHANG</au><au>CHU YI</au><au>ZHANG MINGMING</au><au>ZHANG LIZHI</au><au>LI MENGYA</au><au>CHENG XINYUN</au><au>LI LEI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Cloud edge cooperative attack identification method and system, computer equipment and storage medium</title><date>2024-01-30</date><risdate>2024</risdate><abstract>The cloud edge cooperative attack identification method comprises the following steps: an edge end trains an attack identification model based on a GNN algorithm and transmits self training set data to a cloud end; the cloud updates a self data set based on the training set data and trains an attack recognition model by using the data set; the cloud side screens the attack recognition model and distributes the screened model to the edge side; in the whole process, the edge end collects hostile attack traffic records to update a self training set. According to the method, GNN and an open source data set are utilized to train an attack recognition model, edge computing ends distributed with certain resource training capability and information collection capability are trained, the edge ends with high recognition precision transmit the training set to the cloud to update the training set of the cloud, and the cloud issues the model with high recognition precision to the cloud, so that the recognition efficiency</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN117478379A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Cloud edge cooperative attack identification method and system, computer equipment and storage medium |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T03%3A29%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=XIA%20FEI&rft.date=2024-01-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117478379A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |