Encrypted stream identification method and device

An identification method and technology for encrypted flow, applied in the field of identification method and device of encrypted flow, can solve the problems of long time identification of encrypted flow and increased harm to users, etc.

Inactive Publication Date: 2019-02-12
RUIJIE NETWORKS CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method and device for identifying encrypted streams, which are used to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted stream identification method and device
  • Encrypted stream identification method and device
  • Encrypted stream identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In view of the time-consuming identification of encrypted streams in the prior art and the potential harm to users, the embodiment of the present invention provides an identification method of encrypted streams, which is applied in the server. The method needs to use training The final random forest model can be obtained by training the initial random forest model. Therefore, it can be divided into the training phase and the use phase of the random forest model. The following two phases are introduced respectively.

[0078] Firstly, it introduces the flow of the identification method of the encrypted stream in the stage of using the trained random forest model as follows: figure 1 As shown, the execution steps are as follows:

[0079] S11: Obtain the encrypted stream to be identified.

[0080] S12: Select a first set number of packets from the encrypted stream to be identified.

[0081] Usually, a to-be-identified encrypted flow will contain a lot of messages, it is n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted stream identification method and device. The method comprises the steps of obtaining a to-be-identified encrypted stream; selecting a first set number of messagesfrom the to-be-identified encrypted stream; calculating a characteristic value of a selected characteristic of at least a message head of the to-be-identified encrypted stream based on the characteristic value of the selected characteristic of at least one message head of each message in the first set number of messages; inputting the characteristic value of the selected characteristic of the at least one message head of the to-be-identified encrypted stream to a trained random forest model to obtain an identification result of the to-be-identified encrypted stream. The scheme can greatly reduce identification time and can decrease potential hazards to users.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to an encryption stream identification method and device. Background technique [0002] With the rapid development of society and the rapid progress of Internet technology, data encryption technology has been widely used. However, while data encryption technology protects user data, it also provides a place for malware to hide. [0003] At present, Hyper Text Transfer Protocol over Secure Socket Layer (HTTPS) based on Secure Socket Layer is used more than Hyper Text Transfer Protocol (Hyper Text Transfer Protocol over Secure Socket Layer, HTTP), and malware on encrypted network channels has also become more and more. In different scenarios, such as institutions, schools, enterprises, Internet cafes, etc., users may suffer threats such as malware spread and data leakage at any time. Therefore, how to proactively identify encrypted malicious traffic becomes particularly impo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/851
CPCH04L47/2483H04L63/1425H04L63/1441
Inventor 沈振宏
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products