Application identification method, data mining method, device and system

A data mining and subsystem technology, applied in the field of communication, can solve the problems such as the inability to recognize the application in encrypted data, the low performance of DPI recognition, and the inability to recognize the application.

Active Publication Date: 2013-04-17
HUAWEI TECH CO LTD
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In addition, since the update speed of Internet applications is much faster than that of DPI’s feature library, and many applications are increasingly using encryption methods such as SSL and HTTPS for data transmission for security reasons, resulting in low DPI recognition performance. The application identification of the encryption protocol can only identify the L7 protocol information, and the running application on the L7 is still unable to identify; for example, encrypted data such as HTTPS cannot identify the application, which leads to the failure of DPI identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application identification method, data mining method, device and system
  • Application identification method, data mining method, device and system
  • Application identification method, data mining method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0126] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0127] To facilitate understanding of the embodiments of the present invention, firstly, several elements that will be introduced in the description of the embodiments of the present invention are introduced here.

[0128] Five-tuple information: source IP address, source port, destination IP address, destination port, and transmissio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data mining method, device and system. The UBA (user behavior analysis) data mining method comprises the steps of: obtaining data to be processed, wherein the data to be processed comprises a plurality of records, each record comprises application information and far-end triad information which are in corresponding relation; clustering the records of which the far-end triad information and the application information are the same in the data to be processed, calculating service charge capacities corresponding to the far-end triad information and the application information according to the records of which the far-end triad information and the application information are the same in the data to be processed to obtain a clustering result comprising the far-end triad information and the application information which are in the corresponding relation, and the service charge capacities; selecting the far-end triad information and the application information which are high in credibility and in corresponding relation from the clustering result according to the size or specific weight of the service charge capacities; and sending the far-end triad information and the application information which are high in credibility and in corresponding relation to a DPI (Deep Packet Inspection) subsystem so as to improve the DPI identification performance and application identification rate.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to an application identification method, a data mining method, a device and a system. Background technique [0002] With the rapid development of broadband services, it brings both opportunities and challenges to operators. A series of issues such as billing and information security processing. [0003] Deep Packet Inspection (DPI) technology is considered to be a method to deal with management problems caused by multiple service operations in the network, that is, the use of DPI technology can quickly parse network data, so that the operator network can Supports application-based services, such as email tariff packages, video tariff packages, game tariff packages, blocking of specific downloaded software, etc. [0004] like Figure 1A As shown, it is a protocol hierarchy diagram. From the perspective of the transport layer, network applications are mostly carried...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30
CPCH04L63/1408H04L63/0428H04L63/1425H04L67/535
Inventor 周韡唐东张洪丁
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products