Method for classifying secondary encrypted traffic transmitted in encrypted channel

A technology for encrypting channels and traffic, applied in the physical field, can solve problems such as failing to meet classification accuracy requirements

Active Publication Date: 2021-03-26
上海阅维科技股份有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the use of technologies such as port forgery, plaintext encryption, and secondary encryption, the above classification methods cannot meet the classification accuracy requirements at this stage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solution of the present invention is described in further detail below in conjunction with specific examples, but the present embodiment is not intended to limit the present invention, and all similar structures and similar changes thereof that adopt the present invention should be included in the scope of protection of the present invention. The commas in all represent the relationship between and, and the English letters in the present invention are case-sensitive.

[0024] A method for classifying secondary encrypted traffic transmitted in an encrypted channel provided by an embodiment of the present invention is characterized in that the specific steps are as follows:

[0025] 1) Select a variety of encrypted channel programs and target applications for transmitting encrypted traffic, and collect network traffic data samples of the selected encrypted channel programs and target applications. The network traffic data samples include positive samples and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for classifying secondary encrypted traffic transmitted in an encrypted channel relates to the technical field of network information security, and comprises the following steps: firstly, collecting positive and negative samples, converting an encrypted load in sample data into an rgb image, training a deep neural network backbone network model by using the rgb image, and identifying theinternet surfing behavior in the real-time network flow data and the internet surfing program combination adopted by the internet surfing behavior by using the deep neural network backbone network model. According to the method provided by the invention, the classification of the Internet surfing behaviors in the network flow data and the Internet surfing program combinations adopted by the Internet surfing behaviors can be accurately realized.

Description

technical field [0001] The invention relates to the field of physics, in particular to network information technology, in particular to a method for classifying secondary encrypted traffic transmitted in an encrypted channel. Background technique [0002] With the popularization of personal mobile terminals, a wide variety of mobile Internet applications have generated a large amount of traffic, and with the widespread use of HTTPS-like encrypted transmission protocols, the encrypted traffic loads generated by these mobile Internet applications have been difficult to break easily, and With the improvement of personal privacy awareness, more users will choose encrypted channels such as VPN to access the Internet to hide their online behavior, which will have a negative impact on network security. How to efficiently identify the user's online behavior from the intercepted twice-encrypted traffic has become a research hotspot in recent years. [0003] Among the traditional met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/906G06K9/62H04L12/26
CPCG06F16/906H04L43/08G06F18/214
Inventor 顾东升贺辉郑宇宏
Owner 上海阅维科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products