Military communication encrypted traffic identification method based on generative adversarial network and model compression

A traffic identification and military communication technology, applied in the field of military communication encrypted traffic identification, can solve the problems of difficult to obtain encrypted traffic data sets, deploy deep neural network models, and large deep learning models, achieve strong robustness, and solve problems that are difficult to obtain. Effect

Pending Publication Date: 2022-04-08
成都中科微信息技术研究院有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The deep learning models mentioned above have achieved high accuracy in identifying encrypted traffic. However, these methods also have some drawbacks.
(1) The deep learning model relies on huge traffic data sets during training. Due to privacy issues, encrypted traffic for military communications is difficult to obtain
(2) The storage space of military equipment (handheld and airborne) is limited, and the deep learning model is huge, making it difficult to deploy deep neural network models on these devices
Although GANs have achieved promising performance in dataset augmentation, few studies have focused on using GANs to solve the problem of unavailable encrypted traffic datasets in military communications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Military communication encrypted traffic identification method based on generative adversarial network and model compression
  • Military communication encrypted traffic identification method based on generative adversarial network and model compression
  • Military communication encrypted traffic identification method based on generative adversarial network and model compression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] like figure 1 As shown, this embodiment proposes a method for identifying the encrypted traffic of military communication based on generative adversarial network and model compression, which includes the following steps:

[0055] S10, build and train a large model for the identification of encrypted traffic in military communications:

[0056] S11, collect the encrypted traffic of military communication of a certain base;

[0057] S12, performing data preprocessing on the collected encrypted traffic to establish an original encrypted traffic data set;

[0058] S13, build a large model for identifying encrypted traffic in military communications; the large model is a deep neural network with parameter R, and the deep neural network is a convolutional neural network including a convolution layer and a fully connected layer;

[0059] S14, using the original encrypted traffic data set to train the large model for identifying the encrypted traffic of military communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a military communication encrypted traffic identification method based on a generative adversarial network and model compression. The method comprises the following steps: S10, constructing and training a large model for military communication encrypted traffic identification; s20, establishing a compression model for encrypted traffic identification; s30, constructing and training a generation network for generating encrypted traffic; s40, training a compression model by using the generated encrypted traffic in combination with a knowledge distillation mode to obtain a trained compression model; and S50, carrying out military communication encrypted traffic identification by adopting the trained compression model. The method can solve the problem that the military communication encrypted traffic is difficult to obtain, and can be deployed on military equipment (airborne, handheld and shoulder equipment) with limited power consumption. The method is high in robustness, and the working scene can be a military ad hoc network or a military sensor network.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a method for identifying encrypted traffic in military communication based on generative confrontation network and model compression. Background technique [0002] Military communication networks are oriented to military missions and provide reliable and accurate information transmission. The military communication network is different from the general civilian network in: (1) The communication system has higher requirements. Pay more attention to the management of communication, such as individual calls, group calls, emergency calls, multi-priority, over-the-air encryption, end-to-end encryption, etc. (2) Terminal requirements are more stringent. More emphasis is placed on the reliability and security of terminals and the low latency of information transmission, and the volume and power consumption of communication equipment are smaller. With the develo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L47/2483H04L47/2441H04L9/40G06N3/04G06K9/62
Inventor 卜智勇赵宇鲁敏周斌
Owner 成都中科微信息技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products