A Classification Method for Encrypted Traffic Based on Dual-Channel Convolutional Neural Network

A convolutional neural network and traffic classification technology, which is applied in the field of network security and information, can solve problems such as inconsistency in size, and achieve the effect of improving accuracy and strong generalization ability

Active Publication Date: 2020-05-19
SICHUAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, different network flow representations are usually formed by network flow preprocessing methods based on different dimensions or granularities, and there is a problem of inconsistency in size.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Classification Method for Encrypted Traffic Based on Dual-Channel Convolutional Neural Network
  • A Classification Method for Encrypted Traffic Based on Dual-Channel Convolutional Neural Network
  • A Classification Method for Encrypted Traffic Based on Dual-Channel Convolutional Neural Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as figure 1 As shown, taking the application type classification of ShadowSocks encrypted traffic as an example, the application types to be divided are video (Video), Tor, mail (Mail), file transfer (File Transfer), audio (Audio) and web page access (Web) categories, including the following steps:

[0032] Step 1: Preprocess the network flow to form a flow representation based on the attributes of the packet header;

[0033] Step 2: Preprocess the network flow to form a flow representation based on time-segmented low-order statistical features;

[0034] Step 3: Build a convolutional neural network-based classification model with two independent input channels;

[0035] Step 4: Take the sample data represented by the two flows of step 1 and step 2 as input at the same time, and verify the classification effect of the model through the model training and testing process.

[0036] The network flows in step 1 and step 2 are all bidirectional flows (bidirectional fl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for classifying encrypted traffic based on a dual-channel convolutional neural network. Network streams are represented in two dimensions based on network data packet header attributes and time-segmented low-order statistical features, and then through dual-channel convolution The neural network learns encrypted traffic features from two kinds of network flow representations at the same time, and realizes the classification of application types carried on encrypted traffic. The present invention makes full use of the local and overall advantages of data packet header attributes and traffic statistical features without the need for expert knowledge, automatically learns traffic characteristics from two dimensions, and improves the classification accuracy of encrypted network traffic; and only uses data packet headers The field information in the section has strong generalization ability and will not violate the data confidentiality and privacy protection policies.

Description

technical field [0001] The invention belongs to the field of network security and information technology, and in particular relates to an encrypted traffic classification method based on a dual-channel convolutional neural network. Background technique [0002] Network security and privacy protection are increasingly becoming the focus of enterprises and network users. More and more enterprises choose VPN to protect the security of enterprise data transmission. Network users use various encryption and anonymous communication technologies to protect network terminals and personal privacy. . And these technologies are also used by criminals to engage in illegal network activities to evade network security monitoring. Traffic masquerading and obfuscation technologies are widely used. Methods such as protocol encapsulation and traffic proxy encapsulate one encrypted traffic in another encrypted traffic, changing the original characteristics of encrypted traffic. Bearer traffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06N3/04H04L29/06
CPCH04L63/1425H04L63/1416G06N3/045G06F18/24
Inventor 曾雪梅陈兴蜀岳亚伟何涛王丽娜文奕韩珍辉
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products