Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypted Traffic Identification Method Based on Flow Gradient Orientation

A flow recognition and flow gradient technology, applied in the field of computer networks, achieves the effect of strong ease of use and high recognition rate

Active Publication Date: 2019-10-29
THE PLA INFORMATION ENG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the deficiencies in the prior art, the present invention provides an encryption flow identification method based on flow gradient orientation, which solves the defects in the identification rate and complexity of encryption flow in the prior art, and realizes the gradient orientation of network data flow. Better recognition rate of encrypted flow, further guarantee the security and stability of network information, applied to all levels of nodes in data transmission network, applicable to any network encrypted flow recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted Traffic Identification Method Based on Flow Gradient Orientation
  • Encrypted Traffic Identification Method Based on Flow Gradient Orientation
  • Encrypted Traffic Identification Method Based on Flow Gradient Orientation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment one, see figure 1 As shown, a flow gradient-oriented encryption traffic identification method includes the following steps:

[0036] Step 1. According to the known data flow training set, calculate the data flow gradient-oriented key identifier;

[0037] Step 2. Extract network data streams, including grabbing target encrypted traffic business data streams and non-target encrypted traffic business data streams, respectively calculating the data flow gradient orientation key identifier of target encrypted traffic services and the data flow gradient of non-target encrypted traffic services Orientation key identification;

[0038] Step 3. For the unknown traffic to be tested in the network, calculate the data flow gradient-oriented key identifier of the unknown traffic;

[0039] Step 4. Calculate the correlation offset St of the data flow gradient-oriented key identifier between the unknown traffic and the target encrypted traffic service, and the correlation ...

Embodiment 2

[0042] Embodiment two, see Figure 2-4 As shown, a flow gradient-oriented encryption traffic identification method includes the following content:

[0043] 1) According to the known data flow training set, statistical data flow feature data, the data flow feature data includes preorder data packet size, current data packet size, preorder data packet arrival interval, and current data packet arrival interval; according to the data Flow feature data, calculate the key identifier of the data flow, evaluate its gradient-oriented weighting function index according to the change gradient of the data flow characteristic data, and perform weighted processing on the data flow characteristic data; describe the gradient-oriented key identifier as a vector data pair, and establish a data flow representation The vector probability density function is obtained by counting the vector data sequence; in order to alleviate the noise interference and reduce the interference between the character...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypted traffic identification method based on stream gradient orientation. The method comprises the steps of calculating data stream gradient orientation key identifiers in a known training set, extracting network data traffic, carrying out key identifier analysis, and calculating key identifiers of target encrypted traffic service and non-target encrypted traffic service in a network; for a to-be-measured unknown data stream, calculating the orientation key identifier, a related offset of the data stream gradient orientation key identifiers between the unknown traffic and the target encrypted traffic service, and the related offset of the data stream gradient orientation key identifiers between the unknown traffic and the non-target encrypted traffic service, judging the magnitude of the related offsets, further judging that the unknown stream is the target encrypted traffic service or the non-target encrypted traffic service. The method is high in identification rate and high in usability, and the method is applicable to any network encrypted traffic identification, supports evolution of the network and is compatible with network encrypted traffic identification possibly appearing in the future.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to an encryption flow identification method based on flow gradient guidance. Background technique [0002] Peer-to-Peer (P2P) technology has been widely used in the current Internet, for example, streaming media services, VoIP, file sharing and many other fields adopt peer-to-peer network transmission technology. Because this technology is easy to implement, has strong carrying capacity, and is suitable for individual users, it has a very high usage rate in the network. However, the open nature of peer-to-peer network services makes its security unable to meet the needs of the current network. Various encrypted Trojan horse viruses, malware, and pirated information are widely spread in the peer-to-peer network. How to improve network security has become a severe problem. challenge. The existing encrypted traffic identification methods include: encrypted traff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/851H04L29/06
CPCH04L43/0876H04L47/2441H04L47/2483H04L63/0428
Inventor 韩伟涛伊鹏张震李向涛李锦玲白冰董永吉张鹏
Owner THE PLA INFORMATION ENG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More