Supercharge Your Innovation With Domain-Expert AI Agents!

Encrypted traffic detection method and device, and storage medium

A detection method and storage medium technology, applied in the field of network security, can solve problems such as deviation, large difference in model recognition rate, and difficulty in building a detection model, and achieve effective creation, accurate and efficient detection, and effective and accurate judgment Effect

Pending Publication Date: 2022-01-14
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In this detection method, it is difficult to obtain maliciously encrypted traffic samples, and it is difficult to build a detection model; and the recognition rate of models trained by different samples is quite different, and there are deviations, which makes the detection model unable to efficiently and accurately detect malicious encryption. flow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted traffic detection method and device, and storage medium
  • Encrypted traffic detection method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0061] It is introduced in the foregoing embodiments that in the malicious encrypted traffic information table, each ip address corresponds to a malicious domain name. In order to realize a more accurate judgment, the judgment can also be made in combination with the malicious domain name corresponding to the ip address. Therefore, as an optional implementation, the detection method further includes: obtaining the domain name of the encrypted traffic to be detected, and correspondingly, step 130 includes: if the IP address is the IP address in the preset malicious encrypted traffic information table, judging Whether the domain name corresponding to the ip address in the preset malicious encrypted traffic information table is consistent with the domain name of the encrypted traffic to be detected; if the domain name corresponding to the ip address in the preset malicious encrypted traffic information table is consistent with the domain name of the encrypted traffic to be detected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encrypted traffic detection method and device, and a storage medium. The encrypted traffic detection method comprises the steps of obtaining an ip address of to-be-detected encrypted traffic; judging whether the ip address is an ip address in a preset malicious encrypted traffic information table or not; if the ip address is an ip address in a preset malicious encrypted traffic information table, determining that the encrypted traffic to be detected is malicious encrypted traffic; if the ip address is not an ip address in a preset malicious encrypted traffic information table, acquiring an issuing organization domain name in a public key certificate corresponding to the encrypted traffic to be detected; judging whether the domain name of the issuing mechanism is the domain name in the preset malicious encrypted traffic information table or not; if the issuing organization domain name is the domain name in the preset malicious encrypted traffic information table, determining that the encrypted traffic to be detected is malicious encrypted traffic. The detection method is used for realizing accurate and efficient detection of malicious encrypted traffic.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a detection method and device for encrypted traffic, and a storage medium. Background technique [0002] At present, there are more and more network applications, and malicious encrypted traffic is becoming more and more common. Therefore, effective detection of malicious encrypted traffic is required to ensure the security of the network. [0003] In the existing technology, artificial intelligence algorithms such as random forest and neural network are used to analyze and learn the behavior of malicious encrypted traffic samples, build a detection model, and then use the detection model to detect unknown traffic to realize the detection of malicious encrypted traffic. [0004] In this detection method, it is difficult to obtain maliciously encrypted traffic samples, and it is difficult to build a detection model; and the recognition rate of models train...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L61/5007
CPCH04L63/1408H04L63/1425H04L63/1441H04L63/0236H04L63/168
Inventor 周强范鸿雷
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More