Paper
16 June 2023 Monitoring method of API encryption parameter tamper attack based on deep learning
Author Affiliations +
Proceedings Volume 12703, Sixth International Conference on Intelligent Computing, Communication, and Devices (ICCD 2023); 127031X (2023) https://doi.org/10.1117/12.2682859
Event: Sixth International Conference on Intelligent Computing, Communication, and Devices (ICCD 2023), 2023, Hong Kong, China
Abstract
This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is designed. Secondly, considering various security factors of the basic operating environment, a 5G security monitoring indicator system is established around the terminal side security indicators, network side security indicators and API side security indicators. Then, study the automatic learning and construction technology of normal behavior benchmark model, establish a normal benchmark model based on multiple RBM neural networks, study the normal behavior baseline of 5G terminal operation behavior benchmark, the same type of equipment benchmark, specific communication line benchmark and other normal behavior baselines, and build the security baseline indicators of the normal behavior model of 5G terminal. On this basis, abnormal behavior detection technology based on normal benchmark model is studied.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lu Chen, Tao Zhang, Yuanyuan Ma, and Mu Chen "Monitoring method of API encryption parameter tamper attack based on deep learning", Proc. SPIE 12703, Sixth International Conference on Intelligent Computing, Communication, and Devices (ICCD 2023), 127031X (16 June 2023); https://doi.org/10.1117/12.2682859
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Machine learning

Convolution

Computer security

Semantics

Data processing

Deep learning

Back to Top