Traffic analysis method, public service traffic attribution method and corresponding computer system

A public service and traffic analysis technology, applied in the field of network traffic analysis, can solve problems such as service identification is more difficult, application identification accuracy decline, etc., to achieve efficient identification and improve accuracy

Active Publication Date: 2019-06-25
HUAWEI TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the widespread use of network protocol encryption technology, some plaintext features of messages under the original non-encrypted protocol are hidden, and application identification only uses unconcealed features, which reduces the accuracy of application identification.
[0006] On the other hand, an application may invoke multiple services. Existing traffic analysis technologies can distinguish traffic belonging to different applications to a certain extent, but rarely involve finer-grained distinctions, such as distinguishing traffic belonging to different services (this application calls Service identification, another purpose of traffic analysis), especially after the introduction of network protocol encryption technology, many original plaintext features of the message are hidden, making service identification even more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic analysis method, public service traffic attribution method and corresponding computer system
  • Traffic analysis method, public service traffic attribution method and corresponding computer system
  • Traffic analysis method, public service traffic attribution method and corresponding computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to facilitate the understanding of the technical solution proposed in this application, several elements that will be introduced in the description of this application are firstly introduced here. It should be understood that the following introduction is only for understanding these elements, so as to understand the content of the embodiments, and does not necessarily cover all possible situations.

[0067] Traffic: Interaction between devices connected through the network will generate network communication packets, which are called traffic. Traffic is a general term.

[0068] Data flow: The data packets generated during a complete communication process between the server and the client (from connection establishment to connection end), are called the data flow of the connection. During the application process, multiple interactions are usually performed, so multiple interactions will be generated. Data streams form application traffic.

[0069]For example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a flow analysis method and device and a computer system. The method comprises the steps of obtaining plaintext features and ciphertext features of a message in traffic, whereinthe ciphertext features comprise length features of an encrypted field in the message; and performing analysis on the flow according to the plaintext features and the ciphertext features to identify aservice or an application to which the flow belongs. The method can be used for service identification and can also be applied to application identification. By introducing ciphertext characteristicsinto traffic analysis, the accuracy of traffic identification is improved in a message encryption scene. On the other hand, the invention further provides a public service flow attribution method anddevice and a computer system, the flow of the public service is attributed to the corresponding application by identifying the initial service and/or the exclusive service of the application, the accuracy of application flow attribution is improved, and a foundation is provided for subsequent application flow charging and other services.

Description

technical field [0001] The present application relates to the field of network traffic analysis, in particular to a traffic analysis method, a public service traffic attribution method, and a corresponding computer system. Background technique [0002] In recent years, with the rapid development of the mobile Internet, the proportion of network traffic has increased year by year. In order to ensure that network users enjoy reliable services and facilitate network managers to manage and monitor activities between network elements in real time, traffic analysis technology is widely used in various network devices, including network transit or grouping devices such as gateways and routers. At present, operators use this technology to provide information assurance for their network services such as billing, blocking, and policy control. [0003] One purpose of traffic analysis is to attribute packets (or data streams) included in the traffic to different applications, and this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/851H04L29/06H04L47/22H04L47/32
CPCH04L43/062H04L43/026H04L43/028H04L63/0428H04L63/1408H04L63/0245G06N20/00H04L47/22H04L47/2441H04L47/32
Inventor 欧阳黜霏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products