Encrypted traffic feature extraction method based on feature fusion

A traffic feature and feature fusion technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as the difficulty of providing distinguishing information for encrypted application fingerprints, the discount of classification accuracy performance, and the reduction of encryption application classification accuracy.

Active Publication Date: 2019-08-09
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the number and types of traffic to be classified increase, the performance of this classification method in terms of classification accuracy is greatly reduced
[0007] To sum up, in the existing field of encrypted traffic classification, encrypted traffic classification methods rely on single-dimensional features to construct encrypted application fingerprints. As the number of applications increases with single-dimensional features, encrypted application fingerprints constructed by single-dimensional features are difficult to provide sufficient The distinguishing information of the encrypted application will lead to a decrease in the classification accuracy of the encrypted application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted traffic feature extraction method based on feature fusion
  • Encrypted traffic feature extraction method based on feature fusion
  • Encrypted traffic feature extraction method based on feature fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] This embodiment is a complete encrypted traffic feature extraction simulation based on steps 1 to 3 of the present invention. The overall flow chart is as follows figure 1 As shown, Dataset Collection is the data collection stage, which can collect Taobao, JD.com and other website traffic that uses encrypted protocols to transmit data, then perform feature selection and feature fusion, and finally use the fused features for machine learning classification device to classify. By extracting features of different dimensions, the radial basis kernel function is used to increase the feature dimension to obtain the final feature set that participates in classification.

[0064] Collect Taobao, JD.com, Netease Cloud, Amazon, Alipay, WeChat, etc. using encryption protocols to transmit traffic, and divide it in the form of quintuples, specifically:

[0065] The first is to extract the statistical feature values ​​of the data packet about the length of the data packet, the time ...

Embodiment 2

[0071] In this embodiment, the traffic features extracted by the method of the present invention are used in a machine learning classifier, and compared with other classifiers that only use single-dimensional features, so as to verify the advantages and effectiveness of the present invention. Combining the encrypted traffic feature extraction method based on feature fusion described in the present invention with the traditional machine learning algorithm random forest is used as the classifier of this method, which is denoted as FFP.

[0072] The methods to be compared include the Markov classifier (MARK) using only the packet flag as a feature and the random forest classifier (APPS) using only the packet length as a feature. The indicators for comparison include the accuracy rate (Accuracy) and F1-score of the classifier. F1-Score comprehensively considers the evaluation criteria of the classifier for the precision rate (Precision) and the recall rate (Recall). The comparison...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encrypted traffic feature extraction method based on feature fusion, and belongs to the technical field of machine learning, network service security and traffic identification. The method comprises the following steps: step 1, extracting characteristic values of different dimensions of an encrypted data packet in an encrypted stream; step 2, calculating and normalizinga feature contribution degree, performing feature selection based on the feature contribution degree, selecting an optimal feature number n participating in fusion, and selecting the first n featuresas optimal feature quantities participating in fusion; and step 3, classifying features of different dimensions based on the optimal fusion feature number n, carrying out dimension raising and fusionon the optimal features selected in the step 2 by using a kernel function, and outputting a final feature set participating in classification. According to the method, the encrypted network traffic fingerprint can be better depicted; the relation between different characteristics can be represented; the number of features participating in fusion can be rapidly determined, and the feature fusion efficiency is improved; higher accuracy is realized.

Description

technical field [0001] The present invention relates to a method for extracting encrypted traffic features based on feature fusion, in particular to dimensionally increasing and merging traffic features of different dimensions, aiming to provide high-dimensional and reliable features for identifying encrypted traffic, belonging to machine learning, network service security and Flow identification technology field. Background technique [0002] Traffic is the carrier of network information transmission. In order to protect user privacy, existing network transmission protocols use encryption to transmit data. By analyzing and identifying encrypted network traffic, it can provide a theoretical basis for network service providers to better formulate routing strategies, improve the efficiency of data distribution at key transmission nodes, and further improve the user experience of network users. The existing encrypted traffic identification methods rely on single-dimensional n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/851H04L12/24
CPCH04L41/142H04L47/2441H04L47/2483H04L63/0428
Inventor 沈蒙张晋鹏祝烈煌陈偲祺
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products