Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Online encrypted traffic classification method based on CNN and LSTM

A traffic classification and sub-flow technology, applied in the field of computer networks, can solve problems such as data imbalance, difficulty in obtaining ideal data sets, and increased complexity of feature matching, so as to achieve the effect of improving reliability and accuracy

Inactive Publication Date: 2020-02-04
UNIV OF SCI & TECH OF CHINA
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of network technology, this method faces many problems: some application ports may not be registered; some application software uses dynamic ports, which may change during data transmission; In order to evade the system to restrict the use of ports of other commonly used protocols for data transmission, so as to achieve port concealment
However, this method faces many problems as follows: With the emergence of new network traffic, the content in the expression library needs to be continuously expanded, which consumes a lot of storage space, and the complexity of feature matching will also increase; it is very difficult for encrypted traffic If it is difficult to obtain the expression of its payload, then it cannot be parsed and matched; this method will parse the payload of the data packet, so it may violate the privacy of the user
Although these classic algorithms can be used to identify traffic to a certain extent, using this method requires a large number of labeled data sets, and with the increasing number of application protocols, it is difficult to obtain ideal data sets; this method also needs to consider data when training. imbalance problem
[0008] Therefore, although the above methods can classify and identify traffic to a certain extent, due to the dynamics and concealment of ports, the difficulty of extracting payload expressions of traffic, the high matching complexity, and the analysis of behavioral characteristics, it takes a lot of time and space resources and acquisition The emergence of problems such as the difficulty of a large number of labeled data sets makes the traffic identification method need to be further improved, and these solutions are also difficult to achieve online identification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online encrypted traffic classification method based on CNN and LSTM
  • Online encrypted traffic classification method based on CNN and LSTM
  • Online encrypted traffic classification method based on CNN and LSTM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] Traditional traffic identification methods have great limitations in the identification of encrypted traffic due to the dynamics of ports, the difficulty of extracting and matching payload expressions, and the large consumption of time and space resources for behavioral feature analysis. However, based on various machine learning methods, Usually, only various statistical characteristics of network data streams are considered, and it is diffi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an online encrypted traffic classification method based on CNN and LSTM, and the method comprises the steps: segmenting an original encrypted data stream through a dynamic window, and obtaining n sub-streams with a time sequence relation; respectively extracting statistical characteristics of the n sub-streams, converting the n sub-streams, and extracting corresponding payload characteristics by using a CNN; fusing the load feature and the statistical feature of each substream, performing related processing on the fused comprehensive features from the perspective of time by adopting LSTM, and obtaining an identification result through a classifier. According to the method, online identification to a certain extent can be realized, and a more accurate encrypted traffic identification effect can be obtained.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an online encrypted traffic classification method based on CNN and LSTM. Background technique [0002] With the rapid development of Internet technology, the Internet has increasingly penetrated into public life. With the emergence of various new network applications, application traffic continues to grow, and due to people's increasing emphasis on network information security and the continuous development of encryption technology, network encrypted traffic is also on the rise. In order to better improve network traffic management level and improve network service quality, it is particularly important to correctly identify the application type of network encrypted traffic. [0003] Traditional network traffic classification methods can be divided into the following four categories: [0004] Port number-based method: This method is based on the port number in the head...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06N3/04
CPCG06N3/044G06N3/045G06F18/24
Inventor 谭小彬佟欣欣陈翔杨坚张勇东
Owner UNIV OF SCI & TECH OF CHINA
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More