Supercharge Your Innovation With Domain-Expert AI Agents!

Wireless flow judging method

A discrimination method and wireless flow technology, applied in the field of network security, can solve the problems of scenarios with large interference load and inapplicability, and achieve the effect of clear decision rules, easy implementation and good detection effect.

Active Publication Date: 2012-10-31
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The purpose of the present invention is to overcome the limitations of the existing technology on the effective feature index, which is not applicable to the scene with a large interference load, so as to provide a wireless traffic identification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless flow judging method
  • Wireless flow judging method
  • Wireless flow judging method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0048] Before describing the method of the present invention in detail, firstly, a unified description will be given to the related concepts involved in the present invention.

[0049] Wireless flow: The communication parties of the data flow are the wireless host connected through the IEEE 802.11 wireless LAN in the monitored area and the network flow of the host outside the monitored area.

[0050] J-IAT (Jitter of Inter-Arrival Time, data packet arrival interval jitter): specifically refers to the data flow of two adjacent pairs of non-repeated The absolute value J of the difference between the time interval Δ of the data packets sent i =|Δ i+1 -Δ i |.

[0051] Normalized entropy value: Let the random variable of discrete finite state X={X 1 , X 2 ...X n}, its probability vector is P={P 1 , P 2 ...P N}, then the information entropy of X is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless flow judging method which comprises the following steps of: capturing a data packet in a network, and matching the captured data packet to a relevant data stream; calculating a J-IAT normalized entropy of the data stream, and representing the J-IAT normalized entropy by h(J), wherein J is an absolute value of the difference between time intervals delta of two adjacent non-retransmitted data packets on the data stream, P={P1, P2......PN} is a probability vector of a J-IAT parameter vector, namely J={J1, J2......JN}, and N is a basic value of the J-IAT parameter vector; and comparing the calculated J-IAT normalized entropy of the data stream with a first threshold value. When the J-IAT normalized entropy of the data stream is smaller than the threshold value, the data stream belongs to wired flow; otherwise, the data stream belongs to wireless flow. The invention has specific judging rule, low complexity, easy realization and good detection effect.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for discriminating wireless traffic. Background technique [0002] The 802.11 WLAN has become an important extension and supplement of the wired access method because of its advantages such as convenient installation, flexible use, and easy expansion. The terminal nodes in this type of network can access the network through Ethernet (i.e. wired access mode), and can also access the network through wireless local area network (i.e. wireless access mode). In this wired access mode, wireless In a hybrid access network where access modes coexist, the open nature of wireless media brings potential security threats and performance threats to the network. The data flow sent by the terminal nodes that access the network through wireless access is wireless traffic. To minimize this potential damage in the existing system, the first step is to quickly and accurately identify wirel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/00H04L12/26H04L12/24H04L29/06
Inventor 张弦谢高岗杨建华张广兴
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More