A user behavior fine classification method and system of a mobile application private encryption protocol

An encryption protocol, mobile application technology, applied in transmission systems, digital transmission systems, instruments, etc., can solve the problems of complex classifier effect tuning, high data set requirements, low universality, etc., to achieve fast training speed, reduce Feature dimension, the effect of good classification effect

Inactive Publication Date: 2019-06-07
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method based on statistical machine learning is the future development trend of processing encrypted traffic, but the current method has problems such as high data set requirements, low universality for samples outside the set, and complicated tuning of the classifier effect.
The existing machine learning methods are mainly used in the identification of websites, which are not refined enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user behavior fine classification method and system of a mobile application private encryption protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings . It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The scheme of the present invention comprises the following steps,

[0046] Step S101, user data collection environment deployment. Install each version of the application to different iOS and Android devices. Connect the device to the wireless hotspot, and use the traffic collection tool to capture the application traffic.

[0047] Step S102, identifying the private encryption protocol in the traffic. Set the characteristics of the privat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user behavior fine classification method and system of a mobile application private encryption protocol. The method comprises the following steps: 1) collecting the flow of amobile application, and then identifying the private encryption protocol flow from the collected flow according to set private encryption protocol characteristics; 2) collecting flow data of a set user behavior category from the identified private encryption protocol flow, and labeling the flow data; 3) generating a training set, a verification set and a test set according to the flow data collected and marked in the step 2); 4) performing feature extraction on the flow data in the three sets, and converting the flow data into feature vectors; 5) setting hyper-parameters of the selected classifier, and training the selected classifier; 6) verifying the training classifier by utilizing the feature vectors corresponding to the verification set, and 7) classifying the classifier on the testset, and if the set standard is met, classifying the mobile application traffic to be processed by utilizing the classifier.

Description

technical field [0001] The invention relates to a user behavior fine classification method and system of a mobile application private encryption protocol, and belongs to the technical field of computer software. Background technique [0002] With the vigorous development of the Internet, users bring huge profits to enterprises. In the Internet era, the analysis of user behavior helps companies optimize and customize user access to provide better services. It can also be used to build behavior models, distinguish different types of users, and identify malicious and abnormal users. [0003] User behavior classification is a network measurement method based on passively collected traffic. The user behavior classification method can be divided into plaintext protocol traffic and encrypted protocol traffic according to application scenarios. The mainstream solution for user behavior classification of plaintext protocol traffic is to first use deep packet inspection technology (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/851G06K9/62
Inventor 熊刚康翠翠王炳旭侯承尚
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products