Information recognition method and device

A technology for information identification and to-be-identified, applied in the field of network communication, can solve the problem of high error rate and achieve the effect of improving the accuracy rate

Inactive Publication Date: 2013-03-20
HUAWEI TECH CO LTD +1
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing encryption protocol identification technology based on statistical features cannot extract statistical features well for identification, and the error rate is high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information recognition method and device
  • Information recognition method and device
  • Information recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] In order to better identify encryption protocols, more and more statistical features of network flows have been proposed for training machine learning models. Among them, the data packet interval time and the data packet payload length are the two most commonly used features. Such as figure 1 As shown, it is the probability distribution diagram of the payload size of the fifth data packet using a certain encryption protocol network flow. The abscissa in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information recognition method and a device. The method comprises the following steps: acquiring two-dimensional gauss distribution model parameters according to a training dataset which comprises a data packet provided with type identification, and the two-dimensional gauss distribution model parameters comprise data packet load mean values, interval time mean values, data packet load variances, interval time variances and correlation coefficients; acquiring classification features of a data packet waited to be recognized according to a two-dimensional gauss distribution model; and carrying out feature recognition of the data packet waited to be recognized according to the training dataset and the classification features of the data packet waited to be recognized, and acquiring type identification of the data packet waited to be recognized. By the adoption of the information recognition method and the device, accuracy of encryption protocol identification can be improved.

Description

technical field [0001] The invention relates to the field of network communication, in particular to an information identification method and device in network communication. Background technique [0002] The increasing maturity and wide application of encryption protocols pose new challenges to the traditional protocol identification technology of data streams: first, encryption protocols use encryption algorithms to encrypt the payload in data streams, which hides keyword information, making traditional key-based Second, more and more applications use private encryption protocols, and these undisclosed protocols pose challenges to traditional protocol identification technologies. Therefore, how to accurately identify encryption protocols has become a hot topic at home and abroad. [0003] Aiming at the problem of encryption protocol identification, researchers at home and abroad have proposed protocol identification technology based on statistical features. Different fro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 薛一波王大伟吴富强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products