Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Keyword extracting method for network unknown application

A technology for extracting methods and keywords, which is applied in the field of network security and can solve problems such as confusion

Inactive Publication Date: 2009-07-22
SUN YAT SEN UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, words that appear frequently in the data content of the application layer are also easily confused as keywords.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Keyword extracting method for network unknown application
  • Keyword extracting method for network unknown application
  • Keyword extracting method for network unknown application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings.

[0023] The invention adopts a data mining method to extract keywords from application layer data of unknown applications. A specific implementation method such as figure 1 As shown, it includes the following steps:

[0024] 1. Collection of samples

[0025] Samples are collected from the same unknown application to form a sample set, each of which is a session record of this application; these session samples are further divided into sample subsets, and the session samples contained in each sample subset should have something in common, for example, for client-server applications, all sessions in this sample subset have the same server IP address and port number; for P2P applications, all sessions in this sample subset occur at between a given set of IP addresses. Assume that there are N>1 sample subsets in the sample set, and M>N session samples. In order to make...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for extracting application layer protocol key words from an unknown application layer data, the method can implement the data excavation of the key words by annotating the positions of characters in the conversation and the message and defining the general-purpose degree and the supporting degree of the character string. The key words extracted by the invention can be used for unknown applied characteristic analysis and type recognition, the classification controls comprising the service based on content, classification rate control and abnormal flow filtering and so on for the application can be implemented based on the recognition.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a technology for extracting keywords of unknown application layer protocols in the network. technical background [0002] New applications and attacks in the network are constantly emerging, many of which have no standard documents to check. The existing methods are to manually analyze the unknown application layer data to discover some of its character string features. To analyze its application layer protocol process is a more difficult problem. The method of data mining is used to extract the frequent item sets contained in the data of the unknown application layer, so that the keyword set of the unknown application can be discovered through an automatic method, and the keyword set mined out can be used to study and analyze the unknown application layer protocol. Implementation process. Furthermore, the obtained keyword set can be used to identify the application, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/36H04L29/06
Inventor 余顺争
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products