Network encrypted traffic identification method and device based on deep learning

A network traffic and traffic identification technology, which is applied in the field of network encrypted traffic identification based on deep learning, can solve the problems of manual extraction, low identification efficiency, and large human resources consumption, and achieve the effect of improving accuracy and efficiency

Active Publication Date: 2020-11-27
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing network monitoring and analysis methods, such as port identification and deep packet inspection, can only identify whether the network traffic using mainstream public network protocols is abnormal, and cannot effectively detect malicious encrypted network traffic.
And the existing methods based on statistical features, such as machine learning, input the network traffic characteristics into the machine learning model, and the model outputs the recognition results. Although this method does not rely on the analysis of the data packet payload, the network traffic characteristics of the input model Manual extraction is required, which consumes a lot of human resources, resulting in low recognition efficiency and low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network encrypted traffic identification method and device based on deep learning
  • Network encrypted traffic identification method and device based on deep learning
  • Network encrypted traffic identification method and device based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0069] In order to improve the accuracy and efficiency of network encrypted traffic identification, an embodiment of the present invention provides a network encrypted traffic identification method based on deep learning, which can be applied to electronic devices, where electronic devices can be mobile phones, computers, tablet computers, etc. Equipment with data processing capabilities. Such as figure 1 As shown, the method includes the following steps.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network encrypted traffic identification method and device based on deep learning, relates to the technical field of network security, and can improve the accuracy and efficiency of network encrypted traffic identification. The method comprises the steps of obtaining message information and communication behavior information of a preset number of data packets belonging to a communication establishment stage in to-be-identified network traffic; constructing a message two-dimensional data matrix according to the message information, and constructing a behavior two-dimensional data matrix according to the communication behavior information; and inputting the message two-dimensional data matrix and the behavior two-dimensional data matrix into a network traffic identification model, and determining the protocol type of the to-be-identified network traffic, wherein the network flow identification model is a sample two-dimensional data matrix passing through the sample network flow and a protocol type label corresponding to the sample network flow; and training the deep learning network to obtain a model, wherein the sample two-dimensional datamatrix comprises a sample message two-dimensional data matrix and a sample behavior two-dimensional data matrix corresponding to the sample network flow.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method and device for identifying network encrypted traffic based on deep learning. Background technique [0002] With the rapid development of new network technologies such as the 5th generation mobile networks (5G) technology, the Internet of Things, and the Industrial Internet, and the diversification of application scenarios, the forms of network terminals are more diversified and the number is increasing exponentially. . Once the remote control, information theft, denial of service and other network attacks initiated by malicious devices successfully invade the network, it will pose a major threat to the user information security of network terminals. Therefore, the network security risks faced by network terminals are becoming increasingly prominent. [0003] At present, most network attacks need to achieve their malicious purposes through network commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1408G06N3/08G06N3/045
Inventor 王进
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products