Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious traffic detection method and device in high-bandwidth scene based on frequency domain analysis

A technology of frequency domain analysis and malicious traffic, applied in the field of network security, can solve problems such as unguaranteed real-time detection, low detection accuracy, and inapplicability to high-bandwidth scenarios, etc., achieving low time delay, high detection accuracy, and high detection throughput volume effect

Active Publication Date: 2021-12-14
TSINGHUA UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] For this reason, the first purpose of this application is to propose a malicious traffic detection method in high bandwidth scenarios based on frequency domain analysis, which solves the problem that the existing methods cannot be applied to high bandwidth scenarios and the detection accuracy is not high, and at the same time It also solves the problem that the existing methods work in low-bandwidth scenarios, or work in the form of offline analysis, which does not guarantee real-time detection, and uses frequency domain analysis to extract the characteristics of network traffic, which is realized under the condition of ensuring high processing efficiency. Effectively extract the characteristics of network traffic, and use statistical clustering algorithms to detect malicious traffic accurately and in real time, while ensuring high detection throughput and low time delay, with extremely high detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious traffic detection method and device in high-bandwidth scene based on frequency domain analysis
  • Malicious traffic detection method and device in high-bandwidth scene based on frequency domain analysis
  • Malicious traffic detection method and device in high-bandwidth scene based on frequency domain analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0059] The method and device for detecting malicious traffic in a high-bandwidth scenario based on frequency domain analysis according to embodiments of the present application will be described below with reference to the accompanying drawings.

[0060] figure 1 It is a flow chart of a method for detecting malicious traffic in a high-bandwidth scenario based on frequency domain analysis provided in Embodiment 1 of the present application.

[0061] Such as figure 1 As shown, the malicious traffic detection method in the hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious traffic detection method in a high-bandwidth scene based on frequency domain analysis. The method comprises the following steps: carrying out data packet granularity feature extraction on network traffic to obtain a data packet granularity feature; encoding the features of the data packet granularity to obtain matrix representation, performing fitting operation to obtain a plurality of frames, and performing frequency domain analysis on each frame to obtain a corresponding frequency domain feature; calculating the power of the frequency domain features to obtain power representation, performing logarithmic transformation to obtain frequency domain feature representation, cutting and averaging the frequency domain feature representation to serve as the input of a statistical clustering algorithm, and outputting a clustering center; and calculating the distance between the frequency domain feature representation and the corresponding nearest clustering center, if the distance is greater than a predetermined multiple of a training error, determining that the flow corresponding to the frequency domain feature representation is abnormal flow, otherwise, determining that the flow is normal flow. The method has the advantages of high detection throughput, high precision, low time delay and the like, and malicious traffic can be accurately detected in a high-bandwidth scene while calculation overhead and storage overhead are considered.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for detecting malicious traffic in a high-bandwidth scenario based on frequency domain analysis. Background technique [0002] In recent years, network security has gradually become an important part of national security. The phrase "there is no national security without network security" fully demonstrates the important position of Internet security construction in national security construction. However, a large number of new types of cyber attacks are proposed every year. How to quickly detect new network attacks has become an important issue in the field of network security research. [0003] In high-bandwidth scenarios such as backbone networks or enterprise gateways, detecting and blocking malicious traffic can protect a large number of legitimate network users and significantly improve Internet security. In addition, tools for detec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06K9/62
CPCH04L63/1416H04L63/20H04L41/142G06F18/23
Inventor 徐恪傅川溥李琦
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products