Protocol comparison method based on vector operation

A vector operation and protocol technology, applied in the field of protocol comparison based on vector operation, which can solve the problems of low protocol identification efficiency and inability to subdivide the protocol error rate, and achieve the effect of rapid identification and good scalability.

Inactive Publication Date: 2015-11-04
上海南邮实业有限公司 +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the problem that the existing protocol comparison method cannot subdivide the protocol or there is an error rate in the protocol recognition or the protocol recognition efficiency is low, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol comparison method based on vector operation
  • Protocol comparison method based on vector operation
  • Protocol comparison method based on vector operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0021] The protocol comparison method based on vector operation in the present invention extracts each feature of the data packet into a feature vector, and by calculating the distance between the data packet and the standard vector, the similarity between the data packet and a certain protocol can be obtained, and the data packet can be compared. The similarity between the packet and all protocols, find the one with the highest similarity, and the data packet can be considered as the data packet of the protocol.

[0022] The protocol comparison method based on vector operation of the present invention, such as figure 1 As shown, the specific implementation steps are as follows:

[0023] Step 1: Grab the data flow of the known protocol, extract the feature vector of the data packet of the known protocol, and build the protocol feature vector library....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a protocol comparison method based on vector operation and used for network protocol identification. The method comprises: extracting a feature vector of a data packet with a known protocol and constructing a protocol feature vector database; extracting the feature vector of an unknown protocol data flow to be determined; computing the similarity between the feature vector of the unknown protocol data flow and each feature vector in the protocol feature vector database by using a distance algorithm, and selecting a protocol with the largest similarity as a comparison result; setting a threshold to determine the comparison result in order that the comparison result is more correct, and if an unknown protocol is a new protocol, adding a corresponding feature vector to the protocol feature vector database. The protocol comparison method has a unified comparison processing flow and good expansibility, and may automatically identify a new protocol type and identify the protocols easily, rapidly, and accurately.

Description

technical field [0001] The invention relates to the field of protocol identification, especially the field of Internet protocol identification, in particular to a protocol comparison method based on vector operation. Background technique [0002] With the increasing development of the Internet, people pay more and more attention to the issue of network security. In order to strengthen the management and security control of the network, the identification of the data flow transmitted in the network becomes the first problem that needs to be solved. [0003] Currently common protocol comparison methods mainly include the following: [0004] (1) Port-based method: judge the protocol type of the data packet according to the port number used by the data packet. This judgment method is simple and fast, and has relatively high accuracy for commonly used protocols, but for less commonly used protocols or ports In addition, this method can only judge the general category of the agr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 黄亮陈训逊王洋常为领王永建肖国营
Owner 上海南邮实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products