Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for network traffic identification

A network traffic and identification method technology, applied in the field of protocol and application identification methods and devices, can solve the problems of low accuracy and incomplete identification results.

Inactive Publication Date: 2015-04-01
COLASOFT
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a network traffic identification method and device to solve the technical problems of low accuracy and incomplete identification results of existing identification methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for network traffic identification
  • Method and device for network traffic identification
  • Method and device for network traffic identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] see figure 1 , which shows a method for identifying network traffic provided by an embodiment of the present invention, specifically including the following steps:

[0045] Step S101: Obtain the data packet to be identified.

[0046] In this embodiment, firstly, the data packets in the network are captured, and the captured data packets are used as the data packets to be identified.

[0047] Step S102: Identify the header of the to-be-identified data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and a device for network traffic identification. The method comprises the following steps: identifying the head of an obtained data packet to be identified, determining network protocols respectively used by a transmission layer and all layers below the transmission layer, extracting an IP address and a port from the head of the data packet to be identified, searching the IP address and the port in a preset flow table, if the IP address and the port are searched, determining that a network protocol and an application which correspond to the IP address and the port are the network protocol and the application which are used by an application layer, if the IP address and the port are not searched, matching load data in the data packet to be identified with feature keywords in a preset feature library, and if matching is successfully carried out, determining that a network protocol and an application which correspond to the feature keywords are the network protocol and the application which are used by the application layer. Compared with the prior art, the application has the advantages that not only can the protocol of the application layer be accurately identified through the flow table and the feature library which are previously set, the application type can also be determined according to corresponding relationships record in the flow table and the feature library; the recognizing results are more comprehensive.

Description

technical field [0001] The present application relates to the technical field of network traffic identification, in particular to an identification method and device that can accurately and comprehensively identify protocols and applications used by network traffic. Background technique [0002] The OSI (Open System Interconnection) network protocol includes seven layers, which are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. Among them, the data link layer, network layer, transport layer and application layer each contain a variety of network protocols, which are important research objects in network traffic analysis. Specifically, network traffic analysis is to identify network protocols used by network data packets. [0003] At present, the identification method of network traffic is to extract the field value from some specific fields in the data packet, and use the internationally stipulat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/801H04L29/06
CPCH04L43/04H04L43/045H04L45/38H04L47/10H04L63/1408H04L63/1425
Inventor 罗鹰伍宏宁林康侯勇军
Owner COLASOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products