Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for extracting common features of traffic data for network traffic identification

A technology of common features and flow data, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as complex calculation, slow calculation speed, and inability to determine common subsequences

Active Publication Date: 2020-06-12
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1) The traffic characteristics used for network traffic identification need to find out the common features with the highest probability of occurrence from a large number of identified traffic data sequences, and the longest common subsequence algorithm can only obtain the common subsequences of 2 data sequences for each calculation , resulting in finding the common feature with the highest probability of occurrence from a large number of identified traffic data sequences, it is necessary to go through multiple pairwise data sequence comparisons, the calculation amount increases exponentially, the calculation is complex, and the calculation speed is slow, so it cannot meet the needs of network traffic. The speed of recognition requires
[0009] 2) The longest common subsequence algorithm is mainly used to calculate the longest common subsequence of two data sequences. The probability of occurrence of different subsequences in traffic data cannot be counted, so it is impossible to determine whether the extracted common subsequence is a network flow feature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for extracting common features of traffic data for network traffic identification
  • A method for extracting common features of traffic data for network traffic identification
  • A method for extracting common features of traffic data for network traffic identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] figure 2 Is the overall flow chart of the present invention; as figure 2 Shown, the present invention comprises the following steps:

[0100] The first step is to build a public feature extraction system for network traffic data. The system as image 3 As shown, it consists of a stream reorganization component, a stream data sequence construction component, a feature subsequence extraction component, a stream feature tree construction component, a feature subsequence probability statistics component, a feature sequence output component, and a parameter configuration file.

[0101] The parameter configuration file is used to store the input parameters of the network traffic data public feature extraction system, including flow data sequence parameters (including the maximum number of packets N p , the maximum number of bytes per packet N used when constructing the stream data sequence b , N p and N b Both are integers), characteristic subsequence parameters (incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a flow data public feature extraction method for network flow identification, and aims to solve the problem of rapid extraction of network flow data public features. Accordingto the technical scheme, a network traffic data public feature extraction system is constructed firstly; the system reads a network data message from a flow data file to generate a network flow linkedlist. Stream data sequences are constructed for elements in the network stream linked list. The stream data sequence is intercepted into feature sub-sequences with different lengths according to thefeature sub-sequence parameters. A stream feature tree is generated according to the feature sub-sequences. The length of each feature sub-sequence and the occurrence probability of each feature sub-sequence are calculated in the stream data sequence for each node. A common feature sequence meeting a feature sequence limiting parameter condition is limited from the stream feature tree after the node probability is calculated. The requirements of current network traffic identification on speed and accuracy of public feature extraction can be met.

Description

technical field [0001] The invention belongs to the technical field of network application traffic identification, and in particular relates to a method for extracting public features of traffic data used for network traffic identification. Background technique [0002] With the development of computer network technology, public characteristics of network traffic data have become an effective technical means for network traffic analysis and classification. Common features of network traffic data refer to byte sequences commonly contained in the same type of network traffic. figure 1 It is a schematic diagram of the relationship between existing network traffic identification methods and feature extraction of network traffic data. Such as figure 1 As shown, the existing network traffic identification method includes the following steps: [0003] The first step is to obtain the identified message data from the identified network traffic data; [0004] The second step is to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/851
CPCH04L47/2483
Inventor 原玉磊陈曙晖赵宝康赵锋时向泉陶静韩彪周静
Owner NAT UNIV OF DEFENSE TECH