Unlock instant, AI-driven research and patent intelligence for your innovation.

A network asset identification method and system based on encrypted traffic

A network asset and identification method technology, applied in transmission systems, character and pattern recognition, instruments, etc., can solve problems such as low accuracy, low efficiency, and difficult detection of encrypted traffic network assets, and achieve the effect of convenient and fast operation and maintenance

Active Publication Date: 2022-03-01
北京广通优云科技股份有限公司 +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the current IT operation and maintenance process, encrypted traffic network assets are difficult to detect and sniff, traditional fingerprint identification, network asset mapping and other methods have low accuracy and low efficiency, etc., the present invention provides a network asset identification method based on encrypted traffic with the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network asset identification method and system based on encrypted traffic
  • A network asset identification method and system based on encrypted traffic
  • A network asset identification method and system based on encrypted traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with accompanying drawing:

[0031] The invention discloses a network asset identification method and system based on encrypted traffic analysis, which generates network asset fingerprint vectors based on encrypted traffic extraction, and then classifies through machine learning algorithms to realize automatic identification of network assets, so that network operation and maintenance personnel can deeply understand the network assets in real time. Understand the structure and dynamics of network assets within the organization, enabling more convenient and efficient operation and maintenance. Such as figure 1 As shown, the invention mainly includes four modules, a traffic data cleaning module, a fingerprint vector generation module, a sensitive parameter tuning module, and a system classification display module.

[0032] Such as figure 2As shown, before generating network asset fingerprints, the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network asset identification method and system based on encrypted traffic. Firstly, the information of historical network assets in the organization is obtained, and then the attributes and necessary information of the network assets are manually marked, and then the characteristics of network assets based on encrypted traffic are used. The extraction algorithm extracts the encrypted traffic fingerprint features of network assets, then calculates the feature accuracy under different sensitive values, and finally determines the sensitive values ​​of the model, feeds them back into the machine learning model, and completes the model training. When network assets need to be updated and iterated , use the existing model to survey and map the traffic data of the new structure in the organization, and form the classification and identification results of network assets according to the model results. The beneficial effects of the present invention are: the present invention generates network asset fingerprint vectors based on encrypted traffic extraction, and then classifies through machine learning algorithms to realize automatic identification of network assets, so that network operation and maintenance personnel can deeply understand the network asset structure and structure of the organization in real time. Dynamic, more convenient and efficient operation and maintenance.

Description

technical field [0001] The invention relates to the technical field of network asset operation and maintenance in an IT operation and maintenance system, in particular to a network asset identification method and system based on encrypted traffic. Background technique [0002] Network asset identification in IT operation and maintenance is to sort out all the internal hardware assets of the enterprise organization. When the scale of the unit is complicated, a large number of business system equipment, database equipment, network equipment, and security protection equipment will cause a lot of management problems, and these network assets have been left idle for a long time. It is vulnerable to network attacks or security risks. When events such as organizational internal structure adjustments and network asset update cycles come, IT operation and maintenance work is huge. Traditional networks use technologies such as network detection and fingerprint recognition for identific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L47/2441H04L47/2483G06F16/215G06K9/62G06N20/00
CPCG06N20/00H04L47/2441H04L47/2483G06F18/24155G06F18/2411G06F18/24323G06F18/214
Inventor 刘东海徐育毅庞辉富
Owner 北京广通优云科技股份有限公司