Unlock instant, AI-driven research and patent intelligence for your innovation.

A flow monitoring method, device, equipment and medium

A traffic monitoring and network traffic technology, applied in the Internet field, can solve problems such as password leakage, and achieve the effect of ensuring validity, increasing detection accuracy, and reducing feature dimensions.

Active Publication Date: 2021-10-08
北京天际友盟信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the technical problem that the fixed password of the prior art is easy to cause the security problem of password disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A flow monitoring method, device, equipment and medium
  • A flow monitoring method, device, equipment and medium
  • A flow monitoring method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Such as figure 1 Shown:

[0046] The present disclosure provides a flow monitoring method, the method comprising:

[0047] S101: Capture network traffic of a preset duration in the network and store it in a database;

[0048] S102: Perform feature extraction on the traffic data in the database to obtain feature data;

[0049] S103: Perform feature screening on the feature data to obtain filtered data;

[0050] S104: Using a preset model to classify the filtered data.

[0051] Further, the classification results include:

[0052] The captured network traffic belongs to non-encrypted normal network traffic or VPN encrypted network traffic.

[0053] Further, the process of performing feature extraction on the traffic data in the database to obtain feature data is specifically:

[0054] Extracting a series of data with the same quintuple information in the traffic data to obtain network flow data;

[0055] Feature extraction is performed on statistical features of th...

Embodiment 2

[0091] Such as Figure 5 as shown,

[0092] The present disclosure can also provide a flow monitoring device, including:

[0093] The data capture module 201 is used to capture the network traffic of preset duration in the network and store it in the database;

[0094] A feature extraction module 202, configured to perform feature extraction on the traffic data in the database to obtain feature data;

[0095] A data screening module 203, configured to perform feature screening on the feature data to obtain filtered data;

[0096] The data classification module 204 is configured to use a preset model to classify the filtered data.

[0097] Wherein, the data capture module 201 in this disclosure is connected with the feature extraction module 202 , the data screening module 203 and the data classification module 204 in sequence.

Embodiment 3

[0099] The present disclosure can also provide a computer storage medium, on which a computer program is stored, and when the computer program is executed by a processor, it is used to realize the steps of the above flow monitoring method.

[0100] The computer storage medium of the present disclosure may be implemented using semiconductor memory, magnetic core memory, magnetic drum memory, or magnetic disk memory.

[0101] Semiconductor memory, mainly used in computers, mainly has two types of semiconductor memory elements: Mos and bipolar. Mos components are highly integrated, the process is simple but the speed is slow. Bipolar components are complex in process, high in power consumption, low in integration but fast in speed. After the advent of NMos and CMos, Mos memory began to play a major role in semiconductor memory. NMos is fast, for example, the access time of Intel's 1K-bit SRAM is 45ns. CMos consumes less power, and the 4K-bit CMos static memory access time is 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a traffic monitoring method, device, medium and equipment. The method includes: grabbing network traffic with a preset duration in the network and storing it in a database; performing feature extraction on the traffic data in the database to obtain features data; performing feature screening on the feature data to obtain filtered data; using a preset model to classify the filtered data. The disclosure adds incremental learning capability to the system by establishing an incremental database, so that the system can update machine learning algorithms in time, learn new VPN traffic characteristics, and increase detection accuracy. Use the feature construction program to construct features of the collected network traffic, realize automatic feature extraction, and obtain features in a fixed format. During model training and online operation, the uniformity of the format is guaranteed to facilitate the smooth subsequent process of the model.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and more specifically, the present disclosure relates to a traffic monitoring method, device, equipment and medium. Background technique [0002] In recent years, due to the establishment of mechanisms such as network quality of service, network traffic classification technology has received great attention. Many researchers in the industry and academia have devoted their energy to researching a series of classification methods. However, with the expansion and innovation of the network, a large number of new applications and services appear every day and are constantly updated to create a dynamic network traffic. environment of. Moreover, the application of encryption technology in the network is becoming more and more common. Now more than half of the traffic in the network uses encryption technology, which creates an environment for network communication security, but brings grea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/851H04L12/24H04L12/26H04L12/46G06K9/62G06N5/00
CPCH04L47/2441H04L41/145H04L12/4641H04L43/08G06N5/01G06F18/2113G06F18/2148G06F18/24323
Inventor 李锟
Owner 北京天际友盟信息技术有限公司