Supercharge Your Innovation With Domain-Expert AI Agents!

Training method of traffic detection model, traffic detection method, device and equipment

A training method and traffic detection technology, applied in the field of information security, can solve the problems of encrypted data packet anomaly detection and low accuracy of anomaly detection.

Active Publication Date: 2022-07-12
BEIJING QIANXIN TECH +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a traffic detection model training method, traffic detection method, device, and equipment to improve the inability to perform anomaly detection on encrypted data packets in the prior art, so that the accuracy of anomaly detection is not high The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Training method of traffic detection model, traffic detection method, device and equipment
  • Training method of traffic detection model, traffic detection method, device and equipment
  • Training method of traffic detection model, traffic detection method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.

[0067] In order to use the encrypted information carried in the data stream to perform anomaly detection on the data stream, an existing solution is to input the data stream into an encrypted information prediction model (such as a random forest model, which is pre-trained), and through the The encrypted information prediction model predicts and obtains the encrypted information carried in the data stream, and then inputs the encrypted information and other features in the data stream into the anomaly detection model (such as support vector machine), so that the encrypted information can be used to analyze the data. Stream for anomaly detection. Its model structure is as figure 1 shown.

[0068] This method uses encrypted information as the input of the anomaly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a training method for a traffic detection model, a traffic detection method, an apparatus and equipment, and relates to the technical field of information security. The training method of the traffic detection model uses two branch networks to predict encrypted information and abnormal traffic respectively, so that the prediction of abnormal traffic does not depend on the predicted result of encrypted information, even if the predicted result of encrypted information is wrong, it will not affect the abnormal traffic. The prediction of traffic has a direct impact, but multi-task joint optimization will be achieved through model training, thereby improving the accuracy of abnormal traffic detection.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a training method of a traffic detection model, a traffic detection method, an apparatus and equipment. Background technique [0002] To ensure network security, in some application scenarios, the data traffic transmitted in the network can be detected to determine whether there is data in the data stream, such as viruses and attack packets, that may affect network security. An existing detection method is to parse and obtain plaintext features carried in the data stream, and perform feature comparison to detect whether the data stream is abnormal traffic. [0003] However, with the popularization of encrypted transmission technologies such as the Secure Sockets Layer (SSL) protocol and the Transport Layer Security (TLS) protocol, there is still a large amount of encrypted data in the network. The attacker forges the encrypted data in the data stream,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08
CPCH04L63/1425G06N3/08G06N3/047G06N3/044
Inventor 王骞郑恩南刘明烜杨鑫付卓群郑晓峰应凌云刘璐聂眉宁段海新
Owner BEIJING QIANXIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More