Unlock instant, AI-driven research and patent intelligence for your innovation.

Traffic monitoring method and device, equipment and medium

A traffic monitoring and network traffic technology, applied in the Internet field, can solve problems such as password leakage, and achieve the effect of improving the accuracy of prediction

Active Publication Date: 2021-06-18
北京天际友盟信息技术有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the technical problem that the fixed password of the prior art is easy to cause the security problem of password disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic monitoring method and device, equipment and medium
  • Traffic monitoring method and device, equipment and medium
  • Traffic monitoring method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Such as figure 1 Shown:

[0043] The present disclosure provides a flow monitoring method, the method comprising:

[0044] S101: capturing network traffic of a preset duration in the network to form a pcap file;

[0045] S102: Perform feature construction on the captured pcap file to form a data set in the form of a two-dimensional matrix;

[0046] S103: Perform feature screening on the data set to obtain filtered data;

[0047] S104: Using a preset model to classify the filtered data.

[0048] Further, the feature construction of the captured pcap file described in S102 is specifically:

[0049] Feature construction is performed on the captured pcap file by means of flow construction and / or subdivision construction.

[0050] Further, the process of flow construction specifically includes:

[0051] The captured network traffic is divided into different flows through the five-tuple information, and the time-related characteristics in the flow are counted as the cha...

Embodiment 2

[0091] Such as Figure 5 as shown,

[0092] The present disclosure can also provide a flow monitoring device, including:

[0093] A data capture module 201, configured to capture network traffic of a preset duration in the network to form a data file;

[0094] The feature extraction module 202 is configured to perform feature construction on the captured data files to form a data set in the form of a two-dimensional matrix;

[0095] A data screening module 203, configured to perform feature screening on the data set to obtain filtered data;

[0096] The data classification module 204 is configured to use a preset model to classify the filtered data.

[0097] Wherein, the data capture module 201 in this disclosure is connected with the feature extraction module 202 , the data screening module 203 and the data classification module 204 in sequence.

[0098] Wherein, in the feature extraction module 202, the captured data files are specifically constructed by means of stream ...

Embodiment 3

[0112] The present disclosure can also provide a computer storage medium, on which a computer program is stored, and when the computer program is executed by a processor, it is used to realize the steps of the above flow monitoring method.

[0113] The computer storage medium of the present disclosure may be implemented using semiconductor memory, magnetic core memory, magnetic drum memory, or magnetic disk memory.

[0114] Semiconductor memory, mainly used in computers, mainly has two types of semiconductor memory elements: Mos and bipolar. Mos components are highly integrated, the process is simple but the speed is slow. Bipolar components are complex in process, high in power consumption, low in integration but fast in speed. After the advent of NMos and CMos, Mos memory began to play a major role in semiconductor memory. NMos is fast, for example, the access time of Intel's 1K-bit SRAM is 45ns. CMos consumes less power, and the 4K-bit CMos static memory access time is 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a traffic monitoring method and device, a medium and equipment. The method comprises the following steps: capturing network traffic of a preset duration in a network to form a data file; performing feature construction on the captured data file to form a data set in a two-dimensional matrix form; performing feature screening on the data set to obtain screened data; and classifying the screened data by using a preset model. According to the method, multiple feature selection methods are adopted in the feature selection stage, all the feature selection methods are regarded as important features to be fused, and the importance of the selected features can be guaranteed to a great extent. In the model construction, three machine learning models are fused in a model fusion mode of a stacking method, the model fusion can well combine the advantages of prediction of each model, and the prediction accuracy is improved.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and more specifically, the present disclosure relates to a traffic monitoring method, device, equipment and medium. Background technique [0002] In recent years, with the full popularity of HTTPS, in order to ensure communication security and privacy, more and more network traffic has begun to use HTTPS encryption. As of today, more than 65% of network traffic has been encrypted using HTTPS. The introduction of HTTPS is mainly to deal with various eavesdropping and man-in-the-middle attacks, so as to establish the only secure channel on an insecure network. However, while ensuring communication security and privacy, the encryption of data traffic has inadvertently brought new hidden dangers to network security, and now nearly half of malware uses some type of encryption to hide delivery, command, control, etc. Malicious activities for the purpose of data theft. The traditional me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1425G06F18/285G06F18/2113G06F18/2148G06F18/24323G06F18/253G06F18/214
Inventor 李锟
Owner 北京天际友盟信息技术有限公司