Internet encrypted traffic interaction feature extraction method based on graph structure

A feature extraction and Internet technology, applied in the direction of neural architecture, biological neural network models, instruments, etc., can solve the problems of small discrimination, large quantity, and reduced discrimination of packet length sequence timing information, etc., to achieve high accuracy and low error The effect of rate of return

Active Publication Date: 2021-01-12
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the work related to statistical features, there are literatures that calculate 54 statistical features for uplink, downlink, and bidirectional data packet lengths, such as the average length of uplink data packets. However, such feature calculation methods require a large number of packets and feature calculation time complexity. High, but also requires a complex feature selection process
In related work on sequence features, there are literatures that use packet length sequences as feature inputs for deep learning methods such as convolutional neural networks. However, most of the data packets in the network are transmitted with a fixed maximum length, making the packet length sequence The timing information of the discriminative reduction
[0004] To sum up, the features currently suitable for network encrypted traffic classification have problems such as high computational complexity or low discrimination.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet encrypted traffic interaction feature extraction method based on graph structure
  • Internet encrypted traffic interaction feature extraction method based on graph structure
  • Internet encrypted traffic interaction feature extraction method based on graph structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] This embodiment is based on the graph-structured encrypted traffic feature extraction performed in steps 1 to 7. figure 1 It is the data packet interaction process between the client and the server. The length of the uplink data packet is set to negative, and the length of the downlink data packet is set to positive. The gray and white blocks represent the handshake protocol and record protocol in the SSL / TLS protocol respectively.

[0033] Step 1: According to network encryption flow P=(-571, 1514, 1142, -118, -140, -330, 618, 85, -85, -361, 279, 93, -93, 55).

[0034] Step 2: Initialize the vertex set V and the edge set E to be empty.

[0035] Step 3: Add vertices to the vertex set. According to the order of the elements in P, pi is associated with vertex vi in ​​turn and added to the vertex set V to obtain the vertex set V=[-571, 1514, 1142, -118, -140, -330, 618, 85, -85, - 361,279,93,-93,55].

[0036] Step 4: Divide the vertex set V into burst traffic sets B=[[-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet encrypted traffic interaction feature extraction method based on a graph structure, belongs to the technical field of encrypted network traffic classification, andis applied to fine-grained classification of network traffic after TLS encryption. Encrypted traffic interaction characteristics based on the graph structure are extracted from an original packet sequence, and the graph structure characteristics include sequence information, packet direction information, packet length information, burst traffic information and the like of data packets. Through quantitative calculation, compared with a packet length sequence, the intra-class distance is obviously reduced and the inter-class distance is increased after the graph structure characteristics are used. According to the method, the encrypted traffic characteristics with richer dimensions and higher discrimination can be obtained, and then the method is combined with deep neural networks such as agraph neural network to carry out refined classification and identification of the encrypted traffic. A large number of experimental data experiments prove that compared with an existing method, the method adopting the graph structure characteristics in combination with the graph neural network has higher accuracy and lower false alarm rate.

Description

technical field [0001] The invention relates to a method for extracting interactive features of Internet encrypted traffic, in particular to a method for extracting interactive features of Internet encrypted traffic based on a graph structure, which provides a feature with richer dimensions and higher discrimination for deep neural networks such as graph neural networks, and belongs to Encrypted network traffic classification technology field. Background technique [0002] Traffic classification can assist network operators in load balancing and routing planning, bringing better user experience to users. However, with the dramatic increase in the usage of encryption protocols such as SSL / TLS, traditional classification methods, such as deep packet inspection, fail due to the fact that the payload information is encrypted. In order to be able to classify encrypted network traffic, related research has begun to extract available information from encrypted network data packets...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62G06N3/04
CPCH04L63/1408H04L63/1416G06N3/045G06F18/2413G06F18/29
Inventor 沈蒙高振波祝烈煌孙天艺刘星彤
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products