Network blasting attack detection method and system based on langchain large model
The invention provides a network blasting attack detection method and system based on a langchain large model. The method comprises the following steps: S1, loading a knowledge base; s2, performing data segmentation on the knowledge base loaded in the step S1 to obtain text blocks; s3, combining the...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | WEI YONG XU XIAOBO LUO PENGYU SUN CHENGSHENG |
description | The invention provides a network blasting attack detection method and system based on a langchain large model. The method comprises the following steps: S1, loading a knowledge base; s2, performing data segmentation on the knowledge base loaded in the step S1 to obtain text blocks; s3, combining the text block obtained in the step S2 with the embedded model, and outputting an information text fragment; s4, constructing a cue word template according to the information text fragments output in the step S3; s5, customizing a network security domain task customization data set, and completing model pre-training; s6, performing fine tuning and evaluation on the pre-trained model; and S7, combining the cue word template constructed in the step S4 with the fine-tuned and evaluated model in the step S6 so as to judge the network blasting attack. According to the method, the blasting attack text can be well mined, the blasting attack information can be found, and the blasting attack behavior in the network flow can be |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118138343A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118138343A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118138343A3</originalsourceid><addsrcrecordid>eNqNir0KwjAURrM4iPoO1wdwCHHoKkVx6iDu5Tb5TEPzU5oL4tur4AM4nQPnrNWtgzzLMtEQuUrInliE7UQOAiuhZEqQsTji7Ki-qiDRwBWOPily9nbk8LXFg1JxiFu1enCs2P24UfvL-d5eD5hLjzqzRYb0bad1o01jjuZk_nneITc4BA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network blasting attack detection method and system based on langchain large model</title><source>esp@cenet</source><creator>WEI YONG ; XU XIAOBO ; LUO PENGYU ; SUN CHENGSHENG</creator><creatorcontrib>WEI YONG ; XU XIAOBO ; LUO PENGYU ; SUN CHENGSHENG</creatorcontrib><description>The invention provides a network blasting attack detection method and system based on a langchain large model. The method comprises the following steps: S1, loading a knowledge base; s2, performing data segmentation on the knowledge base loaded in the step S1 to obtain text blocks; s3, combining the text block obtained in the step S2 with the embedded model, and outputting an information text fragment; s4, constructing a cue word template according to the information text fragments output in the step S3; s5, customizing a network security domain task customization data set, and completing model pre-training; s6, performing fine tuning and evaluation on the pre-trained model; and S7, combining the cue word template constructed in the step S4 with the fine-tuned and evaluated model in the step S6 so as to judge the network blasting attack. According to the method, the blasting attack text can be well mined, the blasting attack information can be found, and the blasting attack behavior in the network flow can be</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240604&DB=EPODOC&CC=CN&NR=118138343A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240604&DB=EPODOC&CC=CN&NR=118138343A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEI YONG</creatorcontrib><creatorcontrib>XU XIAOBO</creatorcontrib><creatorcontrib>LUO PENGYU</creatorcontrib><creatorcontrib>SUN CHENGSHENG</creatorcontrib><title>Network blasting attack detection method and system based on langchain large model</title><description>The invention provides a network blasting attack detection method and system based on a langchain large model. The method comprises the following steps: S1, loading a knowledge base; s2, performing data segmentation on the knowledge base loaded in the step S1 to obtain text blocks; s3, combining the text block obtained in the step S2 with the embedded model, and outputting an information text fragment; s4, constructing a cue word template according to the information text fragments output in the step S3; s5, customizing a network security domain task customization data set, and completing model pre-training; s6, performing fine tuning and evaluation on the pre-trained model; and S7, combining the cue word template constructed in the step S4 with the fine-tuned and evaluated model in the step S6 so as to judge the network blasting attack. According to the method, the blasting attack text can be well mined, the blasting attack information can be found, and the blasting attack behavior in the network flow can be</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNir0KwjAURrM4iPoO1wdwCHHoKkVx6iDu5Tb5TEPzU5oL4tur4AM4nQPnrNWtgzzLMtEQuUrInliE7UQOAiuhZEqQsTji7Ki-qiDRwBWOPily9nbk8LXFg1JxiFu1enCs2P24UfvL-d5eD5hLjzqzRYb0bad1o01jjuZk_nneITc4BA</recordid><startdate>20240604</startdate><enddate>20240604</enddate><creator>WEI YONG</creator><creator>XU XIAOBO</creator><creator>LUO PENGYU</creator><creator>SUN CHENGSHENG</creator><scope>EVB</scope></search><sort><creationdate>20240604</creationdate><title>Network blasting attack detection method and system based on langchain large model</title><author>WEI YONG ; XU XIAOBO ; LUO PENGYU ; SUN CHENGSHENG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118138343A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WEI YONG</creatorcontrib><creatorcontrib>XU XIAOBO</creatorcontrib><creatorcontrib>LUO PENGYU</creatorcontrib><creatorcontrib>SUN CHENGSHENG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEI YONG</au><au>XU XIAOBO</au><au>LUO PENGYU</au><au>SUN CHENGSHENG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network blasting attack detection method and system based on langchain large model</title><date>2024-06-04</date><risdate>2024</risdate><abstract>The invention provides a network blasting attack detection method and system based on a langchain large model. The method comprises the following steps: S1, loading a knowledge base; s2, performing data segmentation on the knowledge base loaded in the step S1 to obtain text blocks; s3, combining the text block obtained in the step S2 with the embedded model, and outputting an information text fragment; s4, constructing a cue word template according to the information text fragments output in the step S3; s5, customizing a network security domain task customization data set, and completing model pre-training; s6, performing fine tuning and evaluation on the pre-trained model; and S7, combining the cue word template constructed in the step S4 with the fine-tuned and evaluated model in the step S6 so as to judge the network blasting attack. According to the method, the blasting attack text can be well mined, the blasting attack information can be found, and the blasting attack behavior in the network flow can be</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN118138343A |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Network blasting attack detection method and system based on langchain large model |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T13%3A49%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEI%20YONG&rft.date=2024-06-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118138343A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |