State application blind identifying method

A blind identification and state technology, applied in the network field, can solve the problems of packet loss, lack of prior knowledge in new non-standard applications, loss of state synchronization tracking, etc.

Inactive Publication Date: 2007-08-22
SUN YAT SEN UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the possible differences in the round-trip paths of data packets during the session, coupled with the impact of caches at all levels on the network (for example, Web Proxy may respond to some requests) and loss of data packets, the monitoring device in the middle may not be able to observe the full details of the protocol. process, thus potentially losing track of state synchronization
In this case, it is obviously unrealistic or costly to require an ordinary network manager to track the state of a new application through a special programming language
This stateful tracking method is not suitable for stateful tracking of unknown application patterns on the backbone network, because the backbone network managers lack prior knowledge of new non-standard applications compared to enterprise network managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • State application blind identifying method
  • State application blind identifying method
  • State application blind identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings.

[0046] The system structure of the present invention is shown in Figure 1. Including: flow collection module, used to extract application layer data from data packets, and recombine application layer data flow; general modeling module, used to perform cluster analysis and modeling on collected application layer data flow samples, and provide model The identification module provides parameters; the pattern identification module is used to classify and measure the application layer data flow online, providing reference for the classification control of subsequent data packets; the control module is used to perform real-time classification control on the application layer data flow.

[0047] The stream acquisition module includes a data packet parsing sub-module, an application layer data stream recombination sub-module, a segmentation and time interval recording sub-modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A blind-identifying method of stating application provides a universal hidden markov mode modeling means and an automatic identification means to carry out analysis, modeling identification and control on various known and unknown stating application as well as its hidden stating protocol.

Description

technical field [0001] The invention belongs to the field of network technology, in particular to the classification control technology for application layer data flow in the network. Background technique [0002] The traditional way of controlling the data flow in the network is based on the classification of the flow on the network layer and the transport layer. Recently it has been developed to classify based on application, content and user at the application layer. Based on this application-layer classification technology, bandwidth guarantees can be provided for key applications, key content, and key users, bandwidth restrictions can be imposed on bandwidth-grabbing applications and users, and dynamic bandwidth allocation can be performed on non-critical applications to improve network service quality. , and protect against cyber attacks. Another important development is to perform stateful tracking on the basis of in-depth analysis of the protocol, that is, to track...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06
Inventor 余顺争
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products