Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
An information detection method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology to be detected and difference detected, applied in the Internet field, can solve the problem of large feature scale and achieve the effect of reducing feature scale and reducing dependence
Active Publication Date: 2020-05-22
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] Although the above technologies can be accurately detected in practical applications, once attacked, for example, the attacker changes the network traffic through encryption or static transformation to avoid detection. In order to ensure accurate information detection, it is necessary to add various transformed features. , it can be seen that the above information detection method relies on specific features to detect successfully, and the required feature scale is large
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0076] Example 1: Assume that the data included in the feature data block are: 0xFF, 0x01, 0x04, 0x07, 0x06, the initial value of the feature offset Offset is 0, the preset number is 4, and the preset transformation key is 1. The first default value is 255, and the second default value is 0, then
[0077] When using the finite field addition algorithm Add(x, i), wherein, x represents the data in the above-mentioned feature data block, and i represents the above-mentioned preset transformation key;
[0078] Specifically, first calculate the "applicable sequence" of the four consecutive bytes 0xFF, 0x01, 0x04, and 0x07 from the starting position of the feature data block, so that the values of the above x are: 0xFF, 0x01, 0x04, 0x07, The value of the above i is 1, that is, the value of the above i is 0x01, then
[0079] 0xFF+0x01>255, then 0xFF+0x01=ERR;
[0080] 0x01+0x01<255, then 0x01+0x01=0x02;
[0081] 0x04+0x01<255, then 0x04+0x01=0x05;
[0082] 0x07+0x01<255, then 0...
example 2
[0100] Example 2: Assume that the data included in the data block to be detected are: 0xFF, 0x01, 0x04, 0x07, 0x06, 0x03, 0x08, 0x05, and the adjacent difference detection features are: {1, [0x03, 0x03, -0x01]} , that is, the offset set in the inter-adjacent difference detection feature is: 1, and the difference feature values set in the inter-adjacent difference detection feature are: 0x03, 0x03, -0x01.
[0101] For the specific detection process of the data block to be detected, please refer to Figure 4 , Figure 4 It is a schematic diagram of an information detection process provided by the embodiment of this application.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
Embodiments of the invention disclose an information detection method and an information detection device, and relate to the technical field of Internet. The method comprises the following steps: determining the starting detection position of a data block to be detected according to an offset set in an adjacent difference detection characteristic; from the starting detection position, sequentially detecting whether the difference values corresponding to a target number of positions in the data block to be detected correspondingly match differentiated characteristic values set in the adjacent difference detection characteristic, wherein the difference value corresponding to any position in the target number of positions is the difference value between the numerical value of a position calculated by calculating the order based on a preset difference value and the numerical value of a position next to the position, and the target number is equal to the number of the differentiated characteristic values set in the adjacent difference detection characteristic; judging that the data block to be detected matches the adjacent difference detection characteristic if all the difference values correspondingly match the differentiated characteristic values set in the adjacent difference detection characteristic; and judging that the data block to be detected does not match the adjacent difference detection characteristic if not all the difference values correspondingly match the differentiated characteristic values set in the adjacent difference detection characteristic. By implementing the scheme provided by the embodiments of the invention, the characteristic scale is reduced.
Description
technical field [0001] The present application relates to the field of Internet technologies, and in particular to an information detection method and device. Background technique [0002] With the popularization of computers and networks, information technology is changing and affecting human life style. Various network applications emerge in endlessly, and security threats and network abuse are also increasing day by day. Therefore, in practical applications, it is necessary to detect network traffic so that network regulators can identify, classify, and control various network traffic. [0003] In the prior art, when network traffic is detected, a DPI (Deep Packet Inspection, Deep Packet Inspection) technology based on traffic characteristics is usually used for detection. [0004] Although the above technologies can be accurately detected in practical applications, once attacked, for example, the attacker changes the network traffic through encryption or static transfor...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.