Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious encrypted traffic detection method based on graph analysis

A traffic detection and traffic technology, applied in the field of network communication, can solve the problem that the traffic detection method cannot meet the detection requirements, and achieve the effect of accurate judgment

Active Publication Date: 2021-11-23
BEIJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current network environment, with the introduction and use of port hopping technology, dynamic port technology, and tunnel technology, traffic detection methods based on quintuple information such as ports have been unable to meet the detection requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious encrypted traffic detection method based on graph analysis
  • Malicious encrypted traffic detection method based on graph analysis
  • Malicious encrypted traffic detection method based on graph analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0053] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a malicious encrypted traffic detection method based on graph analysis, and relates to the technical field of network communication. The malicious encrypted traffic detection method based on graph analysis comprises the following steps: extracting features of marked encrypted traffic; training the GraphSAGE graph model by adopting the characteristics of the encrypted traffic; and extracting features of encrypted traffic to be detected, and inputting the trained GraphSAGE graph model to judge whether the encrypted traffic is malicious or not. According to the detection method, whether the encrypted traffic is malicious or not can be quickly and accurately judged, and the encrypted traffic does not need to be decrypted.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for detecting malicious encrypted traffic based on graph analysis. Background technique [0002] As the scale of Internet applications expands, the awareness of network security risk prevention continues to increase. More and more applications use encryption to protect private data, and the proportion of encrypted traffic in the network is getting higher and higher. At the same time, attackers also use encryption to hide their own information. Malicious codes using encrypted communication and malicious attacks on encrypted channels emerge in an endless stream, which brings great challenges to traditional rule-based traffic detection methods. [0003] Currently, there are two mainstream encryption traffic attack detection methods: detection after decryption and detection without decryption. Gateway devices in the industry mainly use the method of decrypting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1408H04L63/1416H04L63/1425G06F18/22G06F18/24G06F18/214
Inventor 李祺杨彦青赵键锦米嘉欣
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More