Online encrypted traffic classification method based on CNN and LSTM

A traffic classification and sub-flow technology, applied in the field of computer networks, can solve problems such as data imbalance, difficulty in obtaining ideal data sets, and increased complexity of feature matching, so as to achieve the effect of improving reliability and accuracy

Inactive Publication Date: 2020-02-04
UNIV OF SCI & TECH OF CHINA
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of network technology, this method faces many problems: some application ports may not be registered; some application software uses dynamic ports, which may change during data transmission; In order to evade the system to restrict the use of ports of other commonly used protocols for data transmission, so as to achieve port concealment
However, this method faces many problems as follows: With the emergence of new network traffic, the content in the expression library needs to be continuously expanded, which consumes a lot of storage space, and the complexity of feature matching will also increase; it is very difficult for encrypted traffic If it is difficult to obtain the expression of its payload, then it cannot be parsed and matched; this method will parse the payload of the data packet, so it may violate the privacy of the user
Although thes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online encrypted traffic classification method based on CNN and LSTM
  • Online encrypted traffic classification method based on CNN and LSTM
  • Online encrypted traffic classification method based on CNN and LSTM

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] The following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0022] Traditional traffic identification methods have great limitations in the identification of encrypted traffic due to the dynamic nature of ports, the difficulty of extracting and matching payload expressions and matching, and the high consumption of time and space resources for behavioral feature analysis. However, based on various machine learning methods, Usually, only various statistical characteristics of network data streams are consi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an online encrypted traffic classification method based on CNN and LSTM, and the method comprises the steps: segmenting an original encrypted data stream through a dynamic window, and obtaining n sub-streams with a time sequence relation; respectively extracting statistical characteristics of the n sub-streams, converting the n sub-streams, and extracting corresponding payload characteristics by using a CNN; fusing the load feature and the statistical feature of each substream, performing related processing on the fused comprehensive features from the perspective of time by adopting LSTM, and obtaining an identification result through a classifier. According to the method, online identification to a certain extent can be realized, and a more accurate encrypted traffic identification effect can be obtained.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an online encrypted traffic classification method based on CNN and LSTM. Background technique [0002] With the rapid development of Internet technology, the Internet has increasingly penetrated into public life. With the emergence of various new network applications, application traffic continues to grow, and due to people's increasing emphasis on network information security and the continuous development of encryption technology, network encrypted traffic is also on the rise. In order to better improve network traffic management level and improve network service quality, it is particularly important to correctly identify the application type of network encrypted traffic. [0003] Traditional network traffic classification methods can be divided into the following four categories: [0004] Port number-based method: This method is based on the port number in the head...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06N3/04
CPCG06N3/044G06N3/045G06F18/24
Inventor 谭小彬佟欣欣陈翔杨坚张勇东
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products