Training method of traffic detection model, traffic detection method, device and equipment
A training method and traffic detection technology, applied in the field of information security, can solve the problems of encrypted data packet anomaly detection and low accuracy of anomaly detection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
[0067] In order to use the encrypted information carried in the data stream to perform anomaly detection on the data stream, an existing solution is to input the data stream into an encrypted information prediction model (such as a random forest model, which is pre-trained), and through the The encrypted information prediction model predicts and obtains the encrypted information carried in the data stream, and then inputs the encrypted information and other features in the data stream into the anomaly detection model (such as support vector machine), so that the encrypted information can be used to analyze the data. Stream for anomaly detection. Its model structure is as figure 1 shown.
[0068] This method uses encrypted information as the input of the anomaly ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com