Traffic data feature extraction method, malicious traffic identification method and network system

A traffic data and feature extraction technology, applied in data exchange networks, digital transmission systems, transmission systems, etc., can solve the problems of difficulty in analyzing dynamic behavior, consumption of large resources and time, and achieve the effect of facilitating subsequent calculations and improving accuracy.

Active Publication Date: 2020-10-16
中国星网网络应用有限公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, signature matching can only detect known malicious behaviors through signature sets, and is powerless against new malicious attacks; dynamic behavior analysis consumes a lot of resources and time, and the high amount of calculation and continuous changes in the data distribution of space-ground integration make it difficult to analyze dynamic behaviors. difficult
In addition, in the past, network attacks were organized in a simple and random manner, but the current attacks are systematic and long-term, with the characteristics of rapid update and strong attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic data feature extraction method, malicious traffic identification method and network system
  • Traffic data feature extraction method, malicious traffic identification method and network system
  • Traffic data feature extraction method, malicious traffic identification method and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0030] In describing the present invention, it should be understood that the terms "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", "vertical", The orientation or positional relationship indicated by "horizontal", "top", "bottom", "inner", "outer", etc. are based on the orientation or positional relationship shown in the drawings, and are only for the convenience of describing the present invention and simplifying the description, rather than Nothing indicating or implying that a referenced device or elem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traffic data feature extraction method, a malicious traffic identification method and a network system. The feature extraction method comprises the steps of S1, obtaining traffic data including m data streams, extracting n features from each data stream, and constructing a matrix X; S2, performing normalization processing on the matrix X to obtain a feature value matrix;S3, solving the similarity of every two elements in each column of data for the feature value matrix to construct a self-similarity matrix of corresponding features of the column of data; S4, solvinga feature value histogram of features corresponding to each column of data of the feature value matrix; taking an upper triangular element of the self-similarity matrix of each feature to obtain a feature difference histogram; combining the feature value histogram and the feature difference histogram of each feature into a feature vector; and S5, integrating the vectors of the n features into a feature vector of the traffic data. The feature vectors have variation tolerance capability for the traffic features and are used as input of the classification model, so that the classifier can accurately identify malicious traffic and variants thereof.

Description

technical field [0001] The invention relates to the technical field of flow detection, in particular to a flow data feature extraction method, a malicious flow identification method and a network system. Background technique [0002] The future space-ground integrated network is a mixed network composed of various heterogeneous networks, and the security of the network will face severe challenges. Due to the openness of space links and ground networks, illegal users can also intercept data by attacking ground networks and conduct indirect attacks on space vehicles through ground networks. In the future space network environment of satellite-based interconnection, malicious traffic attacks may be a serious threat. For example, attackers may hijack satellites to hide their identities, replace satellites to communicate with targets, and obtain content illegally; more seriously, attackers may also evade security detection by changing communication flow characteristics, that is,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24G06K9/62G06F17/16G06N3/08
CPCH04L63/1416H04L63/20H04L41/142G06F17/16G06N3/084G06F18/23G06F18/2414G06F18/2411G06F18/2451G06F18/214
Inventor 陶利民王静崔翔
Owner 中国星网网络应用有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products