Network traffic protocol recognition method based on deep learning

A network traffic and protocol identification technology, which is applied in the field of network traffic protocol identification based on deep learning, can solve problems such as high network environment requirements, limited scope of application, and difficult identification

Active Publication Date: 2018-02-09
NANJING NARI GROUP CORP +2
View PDF5 Cites 74 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to overcome the deficiencies in the prior art, provide a network traffic protocol identification method based on deep learning, and solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic protocol recognition method based on deep learning
  • Network traffic protocol recognition method based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The network flow protocol identification method based on deep learning in the present invention utilizes the similarity between network flow data and images, bypasses the work of selecting and extracting flow characteristic values, and directly uses the network flow data to be identified as the input of the convolutional neural network model to perform Supervised learning, training the network traffic protocol recognition model, and realizing the network traffic protocol recognition function.

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] Such as figure 1 As shown, the network traffic protocol identification method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network traffic protocol recognition method based on deep learning. The similarity of network traffic data and images is utilized, the work of traffic feature value selectionand extraction is skipped and the network traffic data directly act as the input of a convolutional neural network to perform supervised learning and train a network traffic protocol recognition model so that the function of network traffic protocol recognition can be realized. According to the method, only a network traffic protocol sample to be recognized is provided for training of the convolutional neural network so that the features favorable for the classification task can be automatically extracted without spending energy on protocol feature extraction and selection; and the method haslearning and extending capacity and can be used for recognizing the new unknown protocol and can be extended to be applied to recognition of the network traffic including malicious codes and recognition of the corresponding program traffic.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network traffic protocol identification method based on deep learning. Background technique [0002] A network protocol is a collection of rules, standards or conventions established for data exchange in computer networks. The identification and analysis of network protocols is the basis of network security and is of great significance to network supervision, anomaly detection and maintenance of network security. Traditional network traffic protocol identification methods mainly include: port-based network traffic protocol identification, network traffic protocol identification based on deep packet inspection (DPI), and network traffic protocol identification based on machine learning methods. [0003] Port-based network traffic protocol identification method: In a traditional network environment, various network applications follow established rules and use specific ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/18H04L63/1416
Inventor 张路煜王继业郭靓方泉杨维永赵俊峰廖鹏于晓文蒋甜俞皓贾雪姜帆栾国强秦学嘉李斌斌夏飞孙琦刘盼关海潮
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products