Unlock instant, AI-driven research and patent intelligence for your innovation.

Traffic classification identification method based on device identification

A technology of traffic classification and device identification, which is applied in the field of Internet of Things security, can solve problems such as insufficient security protection, and achieve the effect of mitigating network security attacks

Pending Publication Date: 2022-02-01
NINGBO POWER SUPPLY COMPANY STATE GRID ZHEJIANG ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the lack of security protection caused by the limited resources of IoT devices, many IoT devices have become tools or springboards for cyber attacks, posing severe challenges to global cyberspace security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic classification identification method based on device identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] The embodiment of this application proposes a traffic classification and identification method based on device identification, such as figure 1 shown, including:

[0030] S1, obtaining traffic information of networked devices, and extracting feature vectors in the traffic information;

[0031] S2, constructing training data according to the historical feature vector, and using the training data to train the classifier;

[0032] S3, importing the feature vector into the trained classifier for traffic classification and identification.

[0033] In implementation,

[0034] Optionally, the S1 includes:

[0035] S11,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a traffic classification identification method based on device identification. The method comprises the following steps: acquiring traffic information of networking equipment, and extracting a feature vector in the traffic information; constructing training data according to the historical feature vectors, and training a classifier by using the training data; and importing the feature vector into a trained classifier to carry out traffic classification identification. Traffic attack of the abnormal Internet of Things equipment can be quickly positioned by identifying and classifying the Internet of Things equipment, and the network security intensity is improved.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things security, and in particular relates to a traffic classification and recognition method based on device identification. Background technique [0002] At present, while the Internet of Things is widely popularized, government regulators and network operators lack statistics and management of Internet of Things devices in cyberspace. It is very necessary to provide detection methods for intrusion attacks. Due to the lack of security protection caused by the limited resources of IoT devices, many IoT devices have become tools or springboards for cyber attacks, posing severe challenges to global cyberspace security. Therefore, it is important to prevent fake IoT devices from masquerading as real IoT devices to attack. Therefore, IoT devices should be identified and classified, which is also an aspect of intrusion detection. Network security attacks can be detected and mitigated through tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62H04L9/40
CPCH04L63/1416G06F18/24155G06F18/24323G06F18/214
Inventor 吴昊曹炯吴迪权孙健杨跃平俞佳捷焦阳黄致远曹松钱贝斌斌
Owner NINGBO POWER SUPPLY COMPANY STATE GRID ZHEJIANG ELECTRIC POWER