Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious traffic detection method, system and apparatus, and computer readable storage medium

A detection method and malicious traffic technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems of unstable detection and classification results, low accuracy of cluster analysis, dependence, etc.

Inactive Publication Date: 2018-06-22
SANGFOR TECH INC
View PDF6 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the static feature classification method is simply whether it has exactly the same features as the classification standard, and it only needs simple packing or obfuscation to achieve the target effect, which has been gradually eliminated; dynamic signatures use malicious signatures manually extracted by managers. Cluster analysis of traffic characteristics, and aims to use the cluster analysis results to classify the same type of malicious traffic, but due to the heavy reliance on manually extracted features and the low accuracy of cluster analysis, detection and classification The result is very unstable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious traffic detection method, system and apparatus, and computer readable storage medium
  • Malicious traffic detection method, system and apparatus, and computer readable storage medium
  • Malicious traffic detection method, system and apparatus, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The core of this application is to provide a method, system, device, and computer-readable storage medium for detecting malicious traffic. The corresponding data sample database is established from the obtained malicious data traffic sample and the normal data traffic sample, and the data sample database is used Data traffic with different threat levels is trained in combination with deep learning algorithms to obtain a traffic detection model with significant classification effect, which can be used to better judge whether the actual data traffic to be tested contains malicious traffic. Take full advantage of the automatic learning features of deep learning algorithms, and perform feature learning and training from the normal and malicious data sample library provided, without consuming valuable human resources to complete the feature information extraction operation, significantly improving work efficiency and increasing malicious traffic The accuracy of discrimination ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious traffic detection method. The method comprises the following steps: correspondingly establishing malicious and normal data sample libraries by using obtained malicious and normal data traffic samples; executing a data cleaning operation and a preprocessing operation on the data sample libraries in sequence to obtain training data, and constructing a traffic detection model by using the training data and a deep learning algorithm; judging whether to-be-measured data traffic contains malicious data by using the traffic detection model; and if so, sending alarminformation carrying the to-be-measured data traffic belonging to malicious data via a preset oath. Feature learning and training are performed by using the malicious and normal data traffic samplesvia the automatic learning property of the deep learning algorithm, the feature information extraction operation is completed without consuming precious human resources, thereby improving the improving the work efficiency and improving the discrimination of the malicious traffic. Precision. The invention further discloses a malicious traffic detection system and apparatus and a computer readable storage medium, which have the above beneficial effects.

Description

Technical field [0001] This application relates to the technical field of traffic detection, and in particular to a method, system, device and computer-readable storage medium for detecting malicious traffic. Background technique [0002] With the advent of the era of big data, compared to traditional data storage methods, storing it in the form of binary data on a data storage server or the cloud can save costs and effectively improve work efficiency. The question that follows is how to effectively prevent malicious network traffic attacks and data theft in the current network environment. [0003] In the prior art, malicious data traffic is often discriminated through two methods, static feature classification and dynamic signature classification, so as to block malicious traffic from entering itself based on the judgment result. Among them, the method of static feature classification is simply whether it has exactly the same features as the classification standard. It only need...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L63/1408H04L63/1416H04L63/145H04L63/1491H04L63/306
Inventor 刘伯仲蒋振超古亮马程梁玉
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products