Loading...

Table of Content

    01 March 2021, Volume 0 Issue 02
    Breast Mass Recognition Based on Texture Features in Ultrasound Images
    LI Zi-long, LYU Yong, TAN Guo-ping, YAN Qin,
    2021, 0(02):  1-6. 
    Asbtract ( 527 )   PDF (1152KB) ( 415 )  
    References | Related Articles | Metrics
    Aiming at the breast ultrasound image, a method of breast mass recognition based on  texture feature extraction is proposed, which is helpful to use computer-aided identification method to judge whether breast mass is cancerous or not, and assist radiologists to predict the nature of images. Firstly, the max-response filter is applied to the breast ultrasound image to remove the main noise interference while ensuring the integrity of a certain edge tissue structure. On this basis, the first-order and second-order texture features of breast images are extracted, and then the features are identified and classified by artificial neural network. The accuracy of the method is verified on the real data set obtained from a hospital and the proposed method is compared with other methods from three aspects: preprocessing, feature extraction and classification. The results show that the proposed method improves the recognition rate of breast masses on the basis of reducing the complexity of the algorithm.
    Method of Substation Equipment Defect Detection Based on Attention Mechanism Learning
    WU Yi-jia , HUA Xiong, WANG Li-rong, CHEN Hong-bo
    2021, 0(02):  7-12. 
    Asbtract ( 287 )   PDF (3578KB) ( 188 )  
    References | Related Articles | Metrics
    In order to solve the problem that the existing algorithm of substation defect image detection and recognition cant work effectively, a method of defect image detection and recognition of substation equipment based on attention mechanism learning is proposed. The proposed method uses convolutional neural network as the skeleton network of defect image feature extraction, and integrates the principle of attention mechanism to further improve the recognition ability of defect image features. Firstly, the convolution neural network feature extraction model of attention mechanism is constructed to extract the features of substation defect image under different attention mechanisms; secondly, an adaptive feature learning function is designed to fuse the features into new high-quality substation defect image features under different attention mechanisms; finally, the defect image features under different attention mechanisms are input into the classification model to realize the detection and recognition of substation defect image. The proposed method can improve the accuracy and robustness of defect detection. Extensive experiments show that the accuracy mAP of this method is 70.4%.
    Image Segmentation Algorithm Based on Spatial Clustering and Edge Gradient
    YONG Yu-jie, GU Hua
    2021, 0(02):  13-17. 
    Asbtract ( 186 )   PDF (1371KB) ( 139 )  
    References | Related Articles | Metrics
    This paper proposes an automatic image segmentation algorithm which combines spatial clustering and edge gradient information. While evaluating the color and texture similarity of super pixel, a more accurate calculation method of segmented edge gradient is proposed. The geodesic distance is used to describe the similarity between super pixels, so that the segmentation results better integrate edge discontinuity and regional similarity in the image. A large number of experimental results of image segmentation show that this method can find the segmentation boundary more accurately and improve the accuracy of image segmentation.
    Classification of Ground-based Meteorological Cloud Images Based on Feature Selection Technique of Mutual Information F-statistics 
    YANG Qiu-liang, WANG Yu, YANG Xing-li, LI Ji-hong
    2021, 0(02):  18-23. 
    Asbtract ( 134 )   PDF (709KB) ( 234 )  
    References | Related Articles | Metrics
    In the study of cloud type recognition of ground-based meteorological cloud images, the feature selection technology based on Local Binary Pattern (LBP) descriptors is the most common method due to its simplicity and effectiveness. However, the high-dimensional property of LBP features makes the performance and computational overhead of cloud type recognition unsatisfactory. To the end, an LBP feature selection algorithm based on F-statistics constructed by mutual information is proposed, which can achieve effective dimensionality reduction of high-dimensional LBP features, while ensuring the accuracy of cloud type recognition, greatly reducing the computational cost of feature selection process.
    Method of Metamorphic Testing for Image Recognition System Based on GAN
    JIANG Jing-jie, XU Luo, LI Ning
    2021, 0(02):  24-29. 
    Asbtract ( 281 )   PDF (1242KB) ( 98 )  
    References | Related Articles | Metrics
    Image recognition is a key research field of image processing. Under the influence of the difficult determination of test results and the unbalanced category of data set samples, the test technology suitable for the robustness and stability of image recognition systems is deficient. In order to effectively test the image recognition system, this paper applies metamorphosis test method into testing process of image recognition system, generates derived data close to reality based on Generative Adversarial Network to construct a metamorphic relationship suitable for the image recognition system, introduces derivative image quality verification methods and automatic judgment methods of test results to construc a metamorphic testing framework process for image recognition systems. Finally, the feasibility and effectiveness of this method are verified through a case study of vehicle identification. The experimental results show that the method can detect the inconsistent behavior of the image recognition system in different scenes and can evaluate the robustness of system effectively.
    Basic Situation Data Display and Optimization in Augmented Reality Scenarios
    AN Yu, NIE Yun, WANG Guo-wei
    2021, 0(02):  30-34. 
    Asbtract ( 132 )   PDF (1121KB) ( 84 )  
    References | Related Articles | Metrics
    With the development of augmented reality (AR) devices, augmented situation has become a major application point. Due to the lack of computing power and image processing power of AR equipment, there exist some problems such as slow scene generation speed and narrow field of vision. Based on the application of situation information display on AR equipment and the realization of the display function of device geographic information scene, this paper optimizes the terrain segmentation algorithm and proposes an adaptive Mesh regionalization algorithm to solve the above problems. The proposed algorithm, traditional terrain generation algorithm and terrain segmentation algorithm are tested. By comparing and analyzing, the test results show that this algorithm is superior to the traditional terrain generation algorithm in terms of display effect and fineness, and has less system overhead than the terrain segmentation algorithm. Therefore, the adaptive Mesh regionalization algorithm proposed in this paper can guarantee the effect of geographic information scene display function in augmented situation display application with less hardware cost.
    FRDet: A Fast Detection Method for Multi-directional Remote Sensing Targets Based on Feature Correction of Candidate Frames
    TU Xin, WANG Bin
    2021, 0(02):  35-39. 
    Asbtract ( 163 )   PDF (1659KB) ( 96 )  
    References | Related Articles | Metrics
    In the target detection task of remote sensing images, in order to locate the target more accurately, the existing one-stage detection method based on the feature extraction of candidate frames is to fully preset multiple priori frames at each spatial position to cover the target to be detected. However, this will greatly increase the computational complexity of the one-stage detection method. This paper proposes a multi-directional remote sensing target detection method based on the feature correction of the candidate frame. In this method, only one candidate frame is preset at each position of the feature map. We replace the original box with the candidate box obtained after feature correction through regression learning, and then use the classification layer and regression layer of the one-stage detection method to identify and locate respectively. The method uses Mobilenetv2 as the basic structure of the detection network. The detection rate of aircraft on the DOTA dataset can reach 96.8%, the false alarm rate is 6.7%, the mAP value is 0.87, and it has complete real-time results, surpassing all remote sensing image detection methods based on candidate frame feature extraction such as SSD and YOLOv3. Because this method cleverly avoids the priori design of the aspect ratio and scale of the candidate frame, this method can be easily applied to other similar detection tasks, plug-and-play, it has strong task adaptability.
    Design of Data Reliability Evaluation Model Based on Index Hierarchical Structure Algorithm
    LIAO Jia-wei, WU Yong-huan, DU Shu-ming, ZOU Shi-rong, XU Xuan-dong
    2021, 0(02):  40-44. 
    Asbtract ( 213 )   PDF (841KB) ( 98 )  
    References | Related Articles | Metrics
    To solve the problem of poor classification adaptability in traditional data credibility evaluation models, a data credibility evaluation model based on exponential hierarchical structure algorithm is designed. This paper analyzes the actual data asset management process, establishes the data credibility evaluation index system; supplies the missing data in the data to be evaluated according to the data type and the periodical relationship between the data, and completes the pretreatment of the estimated data; generates the data set after data normalization, establishes the sub-hypermetric space according to the correlation coefficient between the data, and generates the exponential hierarchical structure tree. The reliability model is designed by combining the analytic hierarchy process. The experimental results show that compared with the traditional evaluation model, the proposed model has better classification adaptability, higher data recall rate and more obvious application advantages.
    Application of Multi-label Classification Based on Digital Content Preference
    LIU Bin, LI Xiao
    2021, 0(02):  45-50. 
    Asbtract ( 157 )   PDF (793KB) ( 72 )  
    References | Related Articles | Metrics
    At present, the research on digital content in telecom industry is mainly based on the user insight of different preferences based on business caliber, and most of them are based on business experience, which is not conducive to the development and expansion of the scale of digital content users. To this end, this paper makes use of the historical data of large-volume customers and studies the digital content preference based on multi-label classification algorithm, so as to obtain various potential target customers, and finally recommend customers’ preferences through marketing to improve precision marketing ability. Firstly, desensitization data such as the basis and consumption attributes of M telecom users are taken as the data source, and the list of active users of video, music and reading in the last three months is obtained. The active dimension is manually annotated to obtain the initial data set. Because the positive and negative samples are not balanced, three samples are randomly sampled by multiple down-sampling method, and six algorithms including CC, ML-KNN and RakelD are used for comparative experimental verification. The experimental results show that the RakelD and ML-KNN multi-tag classification algorithms have better predictive ability in the perspective of user preference. Therefore, ML-KNN is adopted as the basic classifier of RakelD algorithm, namely RakelD_MLKNN method, to respectively predict the data sets with different positive and negative sample proportions, and the results are all better than the previous 6 existing common multi-label classification algorithms and traditional empirical selection methods.
    Named Entity Recognition on Chinese Electronic Medical Records Based on RoBERTa-WWM
    ZHU Yan, ZHANG Li, WANG Yu
    2021, 0(02):  51-55. 
    Asbtract ( 476 )   PDF (690KB) ( 102 )  
    References | Related Articles | Metrics
    Electronic Medical Records (EMRs) contain abundant information, such as clinical symptoms, diagnosis results and drug efficacy. Named Entity Recognition (NER) aims to extract named entities from unstructured texts. It is also the initial step to extract valuable information from the EMRs. This paper proposes a method to recognize named entities based on the RoBERTa-WWM (A Robustly Optimized BERT Pre-training Approach-Whole Word  Masking). RoBERTa-WWM is a kind of pre-training model, which is utilized to generate semantic representations with prior knowledge. Compared with BERT (Bidirectional Encoder Representations from Transformers), the semantic representations generated by RoBERTa-WWM are more suitable for Chinese NER task because it masks the whole word during pre-training. The semantic representations are then inputted into Bidirectional Long  Short-Term Memory (BiLSTM) and Conditional Random Field (CRF) models in turn. The experimental results show that this method can effectively improve the F1-score on “China Conference on Knowledge Graph and Semantic Computing 2019 (CCKS 2019)” dataset and improve the performance of NER in Chinese EMRs.
    Taxi Pick-up Demand Prediction Based on Deep Networks for
    LI Wei
    2021, 0(02):  56-61. 
    Asbtract ( 127 )   PDF (2274KB) ( 84 )  
    References | Related Articles | Metrics
    The taxi demand prediction is an important part in the construction of smart cities. In order to predict the taxi demand in the designated regions in the future, this paper proposes a multi-time resolution hierarchical attention-based recurrent highway networks (MTR-HRHN) through expanding existing prediction models. The MTR-HRHN integrates the extraction of spatiotemporal features of exogenous data and the spatiotemporal modeling of target data into a single framework, builds a model based on the different temporal properties of sequential data through multiple resolutions (such as every hour or every day), so as to capture a more comprehensive time pattern. Finally, this paper evaluates the prediction performance of MTR-HRHN on the New York City taxi dataset. The experimental results show that compared with other classical time series prediction methods, MTR-HRHN has better prediction performance in short-term demand prediction in multiple high-demand regions.

    Environmental Sound Recognition Based on Feature Fusion and Improved Convolution Neural Network 
    XU Rui, LI Zhi-hua, HAN Can-can
    2021, 0(02):  62-67. 
    Asbtract ( 191 )   PDF (1668KB) ( 107 )  
    References | Related Articles | Metrics
    Environmental sound recognition is a challenging problem due to the complex structure of environmental sounds. An environmental sound recognition method of combining feature fusion with improved convolutional neural network algorithm is proposed. Firstly, for the original audio file, the features learned from waveform and traditional audio features are extracted, which are MFCC (Mel-Frequency Cepstral Coefficients), GFCC (Gammatone Frequency Cepstral Coefficients), spectral contrast and CQT (Constant Q-transform). Then, the extracted features are respectively input into end-to-end neural network SF-CNN and multi-scale convolution neural network MS-CNN for recognition. Finally, the decision-level fusion is carried out according to the D-S evidence theory decision rule, and the final recognition result is output. Experimental results over public dataset ESC-50 show that the proposed model can achieve higher recognition accuracy, it is superior to methods based on a single feature, and is more suitable for complex acoustic scenes.
    Smart Home System Based on Motion Imagination EEG Control
    HUANG Xu-bin, ZHANG Jin-shuang
    2021, 0(02):  68-72. 
    Asbtract ( 185 )   PDF (1336KB) ( 167 )  
    References | Related Articles | Metrics
    Combining smart home with Brain Computer Interface (BCI) technology and using “ideation” to achieve home operation and control can provide a more friendly and convenient home life for people with sports disabilities, which has important social significance. This paper proposes a smart home system based on motion imagination  EEG control taking the left and right hand movement intention as an example, studies the EEG signal acquisition, noise filtering preprocessing, feature extraction and classification recognition involved in the system design. And in the end, a realization plan of the system is given.
    Method of Nonparallel Speech Denoising Based on CycleGAN
    HAN Can-can, LI Zhi-hua, XU Rui
    2021, 0(02):  73-77. 
    Asbtract ( 260 )   PDF (1596KB) ( 92 )  
    References | Related Articles | Metrics
    To solve the problem of speech denoising, a method based on cyclic generation adversarial network (CycleGAN) is proposed. This method combines and optimizes the network model of CycleGAN with the voice conversion technology in different fields, extracts the spectrum envelope features of speech, and then encodes and decodes the speech, aiming to achieve the end-to-end denoising of speech with advanced generation technology. Thus, the proposed algorithm simplifies the high-order difference problem in the process of speech denoising, and generalizes its application scenarios. By training and testing the nonparallel data set and parallel data set, the denoising effect of this method is mainly compared with that of the traditional CycleGAN method. The experimental results show that PESQ, NR and SSNR are improved by 8.49%, 6.53% and 23.30% respectively, which effectively solves the problem of nonparallel speech denoising in the actual scene.
    Optical Flow Estimate Method for Neuromorphic Vision Based on Local Plane Fitting
    WANG Mei
    2021, 0(02):  78-82. 
    Asbtract ( 178 )   PDF (876KB) ( 85 )  
    References | Related Articles | Metrics
    In the new generation of artificial intelligence, neuromorphic vision is an important research direction of neuromorphic computing. Event camera has the advantages of low power consumption, low information redundancy and high dynamic range, and it has important application value in autonomous control scenes of intelligent aircraft and agile robots. Based on the spatio-temporal characteristic of event sequence, this paper studies the principle of optical flow estimation based on local plane fitting, proposes an algorithm that uses eigenvalue method to perform local plane fitting to estimate optical flow, and uses RANSAC method to further improve the robustness of this algorithm. Experiments show that the method proposed in this paper can effectively estimate the optical flow for neuromorphic vision and is robust to noise.
    Video Prediction Strategy Based on Markov Modified Model
    GUI Yi-qi, JU Shuang-shuang
    2021, 0(02):  83-88. 
    Asbtract ( 161 )   PDF (1209KB) ( 72 )  
    References | Related Articles | Metrics
    In P2P streaming media system, if users want to get a better viewing quality, the system will choose the video segment with higher popularity. In some cases, the shortest response time is not the best video segment, it also depends on the needs of users. The popularity of the newly released video segment has not formed a stable trend, so there is not enough data, and traditional statistical methods cannot reflect the changes in popularity in time. To solve this problem, this paper proposes a video prediction caching strategy Modified Markov Prediction Model (MMPM) based on Markov modified model. This strategy can be run when there are not many historical access records of users. It obtains the state transition matrix from the number of clicks on the video segment to adapt to the continuous change of user click rate. Simulation experiments show that the realization of dynamic prediction improves the hit rate and response speed, and verifies the effectiveness, accuracy and speed of the algorithm.
    An Algorithm of Joint Blind Equalization
    TAN Xiao-gang, DAI Tian-zhe, DONG Shu-lin, ZHANG Yi-jian, REN Min-hua
    2021, 0(02):  89-93. 
    Asbtract ( 181 )   PDF (903KB) ( 82 )  
    References | Related Articles | Metrics
    In order to overcome the severe Inter-Symbol Interference (ISI) effect generated by digital baseband signals passing through UTP-CAT5, adaptive equalization technology is widely used to reduce the Inter-Symbol Interference, which greatly reduces the bit error rate of the received signal. The Least Mean Square (LMS) algorithm can effectively reduce Inter-Symbol Interference, but requires training sequences, which affects transmission efficiency. The Decision-Directed LMS (DDLMS) algorithm does not require training sequences, but when the eye diagram is not open, misjudgment may occur and even cause false convergence. The Constant Modulus Algorithm (CMA) has better blind equalization characteristics than the DDLMS algorithm, but the residual error is large. A novel joint blind equalization algorithm is proposed, which optimizes the existing CMA algorithm, and forms a new joint blind equalization algorithm with the DDLMS algorithm, and uses the Mean Square Error (MSE) to control the weights of the two algorithms. MATLAB modeling and simulation results show that the new joint blind equalization algorithm overcomes the shortcomings of the large residual error of the CMA algorithm and the false convergence of the DDLMS algorithm, and can effectively equalize the digital signals transmitted in the UTP-CAT5.
    Analysis of New York Rail Transit Network Characteristics Based on Complex Network
    LI Wei-dong, XU Shu-kun, WANG Yun-ming
    2021, 0(02):  94-99. 
    Asbtract ( 170 )   PDF (1361KB) ( 77 )  
    References | Related Articles | Metrics
    Most of the existing research on rail transit network modeling is based on unauthorized network models, which can not reflect the characteristics of the network well, the thesis takes the New York rail transit network as the research object, adopts the complex network theory and Space L method, considers that there may be multiple lines between two stations, constructs a New York rail transit weighted network model, and uses the relevant characteristic indicators of the complex network to analyze the characteristics of the New York rail transit network. Compared with the unauthorized network, it is found that the weight of the New York rail transit weighted network has a certain correlation with the topology, the network has both small world and scale-free characteristics. Through random attacks and multiple deliberate attack strategies, this paper researches the robustness of the New York rail transit network.
    An Improved Complete Path Planning Algorithm
    LI Shu-xia, YANG Jun-cheng,
    2021, 0(02):  100-103. 
    Asbtract ( 610 )   PDF (689KB) ( 132 )  
    References | Related Articles | Metrics
    Complete coverage path planning is widely used in real life. This paper improves the Internal Spiral Coverage algorithm that is one of the existing full coverage path planning algorithms. And the PISC algorithm with priority is proposed. It adds the walking priority to Internal Spiral Coverage algorithm, uses backtracking to solve the dead problem of cleaning robot, so as to optimize robots cleaning path. Finally, simulation experiments under Visual C+〖KG-*3〗+ 6.0 programming environment show this algorithm enables the cleaning robot to avoid obstacles effectively and smoothly walk in free area, so as to improve the cleaning efficiency of cleaning robot and reduce the repeat paths of cleaning robot.
    Ant Colony Algorithm-based Navigation Satellite Power Enhancement Mission Planning
    QU Jian-bo, SUN Jian-wei
    2021, 0(02):  104-108. 
    Asbtract ( 101 )   PDF (783KB) ( 64 )  
    References | Related Articles | Metrics
    In order to ensure the stability of the navigation signal in wartime area, satellites are required to enhance the power of ground area. Planning for large-scale power enhancement missions can ensure the enhancement effect. In this paper, for the problem of navigation satellite power enhancement task planning, the problems of star-ground visibility and time window conflict of adjacent tasks are analyzed. A power enhancement task planning model is constructed, and an adaptive ant colony algorthim based on ant colony system and maximum and minimum ant system is selected. The task revenue parameters are introduced to improve the optimization strategy of the algorithm, and to speed up the convergence rate of the algorithm as well as to avoid falling into the local optimal solution. Experimental results show that the improved ant colony algorithm designed in this paper has a good planning effect for large-scale power enhancement tasks.
    Anomaly Detection of Network Traffic Based on t-SNE Dimensionality Reduction Preprocessing
    HAO Yi-ran, SHENG Yi-qiang, WANG Jing-lin,
    2021, 0(02):  109-116. 
    Asbtract ( 200 )   PDF (1662KB) ( 98 )  
    References | Related Articles | Metrics
    Most of network traffic is normal, but abnormal traffic often deviates from normal range, which is mainly caused by malicious network behaviors such as DDOS attacks, penetration attacks, etc. These abnormal behaviors usually cause the network quality to decline and even cause the network to be paralyzed. Therefore, the prediction of network security situation is introduced, and the abnormality in the network is judged only when the normal network traffic is known. Anomaly detection is a method of predicting the security situation of a network to determine whether there are abnormalities in the network. Existing anomaly detection algorithms have poor performance due to their inability to accurately extract low-dimensional features of network packets. Therefore, it is necessary to find an accurate low-dimensional feature representation of network packets, which can distinguish whether the network packets are normal or attacked. Therefore, this paper introduces the NLOF anomaly detection algorithm based on t-SNE dimension reduction. The algorithm uses the t-SNE algorithm to automatically preprocess network packets to obtain low-dimensional network packet features, and then takes the obtained low-dimensional network packet features as input to the NLOF algorithm for anomaly detection. In detail, the step of the NLOF algorithm proposed in this paper is to first use the k-means algorithm to cluster network packets into K clusters, and mark the clusters with fewer than N network packets as abnormal clusters. After that, network packets that are not marked as abnormal clusters are used as input to the LOF algorithm for abnormal detection. The experimental results on the ISCX2012 dataset show that under the optimal performance of the t-SNE dimensionality-reduced LOF algorithm, the accuracy is 98.46%, the precision is 98.38%, the detection rate is 98.54% and the FAR is 066%. The proposed algorithm achieves the best performances regarding the accuracy, the detection rate and the F1 exceeding those of the other state-of-the-art algorithms by 3.18 percentage points, 0.02 percentage points and 0.01 percentage points, respectively. When the NLOF algorithm based on t-SNE dimension reduction achieves the optimal performance, the accuracy rate is 98.53%, the accuracy is 98.86%, the detection rate is 98.86% and the FAR is 0.32%. The proposed algorithm achieves the best performances regarding the accuracy, the detection rate and the F1 exceeding those of the other state-of-the-art algorithms by 3.25 percentage points, 0.34 percentage points and 0.41 percentage points, respectively. This is the first time in anomaly detection that the t-SNE algorithm is used to automatically extract low-dimensional network packet features. In addition, the LOF algorithm is only capable of capturing abnormal points, but the proposed NLOF algorithm can simultaneously capture abnormal points and abnormal clusters.
    SDN-based DDoS Attack Defense System
    WANG Wen-wei, XIAO Jun-bi, CHENG Peng, ZHANG Yue
    2021, 0(02):  117-121. 
    Asbtract ( 214 )   PDF (913KB) ( 123 )  
    References | Related Articles | Metrics
    Software Defined Network (SDN) is an emerging network architecture. By separating the forwarding layer and the control layer, centralized management and control of the network is achieved. As the core of the SDN network, the controller is easy to be the target of attacks. Distributed Denial of Service (DDoS) attack is one of the most threatening attacks faced by SDN networks. In response to this problem, this paper proposes a DDoS attack detection model based on machine learning. First, the method monitors the switch port traffic based on information entropy to determine whether there is abnormal traffic. After detecting anomalies, it extracts the flow characteristics and uses the SVM + K-Means composite algorithm to detect DDoS attacks. Finally, the controller delivers a drop flow table to deal with attack traffic. Experimental results show that the algorithm proposed in this paper is superior to SVM algorithm and K-Means algorithm in the indicators of false alarm rate, detection rate and accuracy.
    IPv6 Network Deployment and Transformation Method Against Grey Hole Attack
    CHEN Shou-ming, LIANG Yun-de, QIAN Yang, LI Xue-wu, LU Yan-qian
    2021, 0(02):  122-126. 
    Asbtract ( 133 )   PDF (1261KB) ( 69 )  
    References | Related Articles | Metrics
    In view of the poor detection ability of the original IPv6 network deployment and transformation method for gray hole attack, which results in the poor early warning ability of IPv6 network attack, this paper designs an IPv6 network deployment and transformation method against gray hole attack. The network architecture is divided into core layer, convergence layer, access layer, and access part of Wan and server from a logical point of view by adopting hierarchical design concept. Based on the network architecture, the server cluster used in the network and network indirect mode are optimized. The paper sets network detection and matching rules, uses access mode as an indirect method of routers in the network, against multi-mode network attack, uses multi-mode detection method to achieve IPv6 network attack detection. The experimental results show that the designed method has strong early warning ability of gray hole attack and high compatibility of operating system.