Dark network user behavior detection method and system based on network traffic

A network traffic and detection method technology, applied in transmission systems, electrical components, etc., can solve problems such as difficulty in building a network security system and high concealment of dark web traffic, reduce the possibility of error propagation, improve accuracy, and benefit The effect of traceability and control

Inactive Publication Date: 2021-01-08
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the differences in network traffic characteristics, a good dark network user behavior detection model can be established, thereby solving the problem of high concealment of dark network traffic on the Internet and difficulty in building a comprehensive network security system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dark network user behavior detection method and system based on network traffic
  • Dark network user behavior detection method and system based on network traffic
  • Dark network user behavior detection method and system based on network traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following describes several preferred embodiments of the present invention with reference to the accompanying drawings, so as to make the technical content clearer and easier to understand. The present invention can be embodied in many different forms of embodiments, and the protection scope of the present invention is not limited to the embodiments mentioned herein.

[0043] In the drawings, components with the same structure are denoted by the same numerals, and components with similar structures or functions are denoted by similar numerals. The size and thickness of each component shown in the drawings are shown arbitrarily, and the present invention does not limit the size and thickness of each component. In order to make the illustration clearer, the thickness of parts is appropriately exaggerated in some places in the drawings.

[0044] The present invention provides a dark network user behavior detection method and system, the system covers Tor, I2P, ZeroNet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dark network user behavior detection method and system based on network traffic, and relates to the field of computer network security. Analysis and research are carried outon user behaviors in four mainstream dark networks of Tor, I2P, ZeroNet and Freenet. User behaviors are divided into eight classes, and a hierarchical classification model is trained by establishing adark network data collection environment, collecting real dark network flow data, extracting flow characteristics in the data. According to the method, model training is carried out by adopting a hierarchical classification method, and the method is good in performance in dark network traffic identification scenes of four dark network types and 25 user behaviors and has relatively high accuracy.Meanwhile, the base classifiers in the hierarchical classifiers are independent of each other and do not interfere with each other, so that the method and the system have good expandability and can adapt to dark network environments with different ages. The system can be deployed at a flow outlet of an actual production environment and linked with an IDS and a firewall, and a solution is providedfor control and traceability of a dark network.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method and system for detecting dark network user behavior based on network traffic. Background technique [0002] Darknet refers to a network that can only be accessed through special configurations, software, authorization, or non-standard communication protocols and ports, but cannot be accessed through ordinary browsers or search engines. The server address and data transmission of the dark web are usually anonymous and invisible. With the maturity of various dark web service protocols, the dark web has gradually become a "hotbed" for terrorism and crimes. At the same time, due to the technical structure of the dark web The anonymity of the Internet also makes it a platform for the circulation of various political intelligence and private data. In view of the danger and high value of the dark web, the analysis of dark web traffic has gradually become the focus of r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425
Inventor 邹福泰胡煜宗章思宇姜开达
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products