Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CNN-based network authentication method and system

A network authentication and network technology, applied in the field of network security, can solve problems such as pooling operation is not conducive to traffic analysis, and network traffic learning is not applicable

Inactive Publication Date: 2020-02-28
武汉思普崚技术有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, the characteristics of some layers in the convolutional neural network CNN used in the SDN network system are not suitable for learning network traffic, and the characteristics of its pooling operation are not conducive to traffic analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CNN-based network authentication method and system
  • CNN-based network authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the protection scope of the present invention will be defined more clearly.

[0046] figure 1 The flow chart of the CNN-based network authentication method provided for this application, the method includes:

[0047] Obtain network traffic data and identify the type of network based on network characteristics;

[0048] According to the type of network traffic data, the network input layer of the CNN analysis model is determined to be a 1×13 vector, and all operations in the network are modified to operations on one-dimensional data; according to different tasks, the neurons of the network output layer are determined quantity;

[0049] Use the principal component analysis method PCA to map all the features of the data set to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a CNN-based network authentication method and system. The method comprises the following steps: establishing a security encryption channel between a controller and a switch, adding a trusted authority CA to authenticate and sign the controller and the switch, realizing bidirectional authentication between the controller and the switch, and performing key negotiation betweenthe controller and the switch to realize targeted improvement of SDN network vulnerability; by improving a convolutional neural network CNN analysis model, the pooling operation defect of a traditional CNN model is overcome.

Description

Technical field [0001] This application relates to the field of network security technology, and in particular to a CNN-based network authentication method and system. Background technique [0002] In the existing SDN network, the TLS security channel is not compulsorily established between the controller and the switch, and the default state is not open, which makes the network fragile. There may be clear text communication between the controller and the switch, and any third party can intercept it. Or modify the content of the communication between the two parties, which is vulnerable to man-in-the-middle attacks. The lack of certificate verification between the controller and the switch makes it easy for an attacker to intercept the request sent by the controller to the switch and pretend to be the controller to communicate with the switch, thereby obtaining all the content of the communication between the switch and the controller. [0003] At the same time, the characteristic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0272H04L63/0428H04L63/061H04L63/0869
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products