Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious encrypted traffic detection method and system based on behavior analysis

A traffic detection and behavior analysis technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of inaccurate detection results of encrypted traffic, and reduce the false alarm rate.

Inactive Publication Date: 2020-06-12
武汉思普崚技术有限公司
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a malicious encrypted traffic detection method and system based on behavior analysis to solve the problem of inaccurate traditional encrypted traffic detection results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious encrypted traffic detection method and system based on behavior analysis
  • Malicious encrypted traffic detection method and system based on behavior analysis
  • Malicious encrypted traffic detection method and system based on behavior analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The embodiments will be described in detail hereinafter, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following examples do not represent all implementations consistent with this application. These are merely examples of systems and methods consistent with aspects of the present application as recited in the claims.

[0055] The malicious encrypted traffic detection method based on behavior analysis provided by this application can be applied to Internet behavior management equipment, so as to detect traffic data in the network and prevent users from being threatened by malicious traffic. The online behavior management device is a device that helps Internet users to control and manage Internet usage. Access web page filtering, network applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious encrypted traffic detection method and system based on behavior analysis, and the method comprises the steps: carrying out the feature analysis of network traffic data after the network traffic data is obtained, and obtaining a feature sequence based on a session; and inputting the feature sequence into a detection model to obtain a detection result score, and determining whether the network traffic is malicious encrypted traffic or not according to the detection result score. According to the method, behavior characteristic analysis is carried out on the network traffic data, so that normal encrypted traffic in the network can be effectively filtered, malicious encrypted traffic is identified, and the false alarm rate is reduced. Meanwhile, through a detection model constructed in a machine learning mode, unknown data characteristics can be deduced according to known samples, and whether the network traffic data is malicious encrypted traffic or notis accurately judged.

Description

technical field [0001] The present application relates to the technical field of traffic detection, and in particular to a method and system for detecting malicious encrypted traffic based on behavior analysis. Background technique [0002] Encrypted traffic refers to network traffic encrypted by a specific encryption algorithm, which aims to protect the security of Internet traffic, so that user data and privacy cannot be easily obtained by criminals. However, malicious network traffic can also be transmitted through encryption algorithms, and cannot be detected by protective measures such as firewalls and security gateways, so as to launch attacks on target devices and steal target user information. Therefore, how to effectively identify malicious encrypted traffic plays an important role in ensuring the security of user network data and maintaining user privacy. [0003] The same as the normal network traffic encryption method, in the malicious network traffic encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24H04L12/26
CPCH04L63/1416H04L63/1425H04L63/0227H04L67/14H04L41/145H04L43/10H04L43/16
Inventor 李韦成
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products