Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying Shadowsockets (R) based on protocol attributes

An identification method and protocol technology, applied in the field of traffic identification, can solve the problems of not being universal, unable to reflect the privacy of the protocol, etc.

Active Publication Date: 2022-04-12
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] There are not many researches on Shadowsocks(R) traffic identification at home and abroad, which may have a lot to do with the difficulty and sensitivity of the technology. At present, there are few public research results, and most of the actual attack cases are implemented Engineering aspects such as code defects
Most of the known Shadowsocks(R) traffic identification-related articles are based on machine learning. Shadowsocks(R) is a privatized software. Common features cannot reflect the privacy of the protocol. Machine learning based on common features The method is not universal, and it is difficult to accurately identify Shadowsocks(R) using only one technology
At present, there are basically no Shadowsocks(R) identification methods based on protocol attributes that combine protocol analysis, machine learning and other technologies.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying Shadowsockets (R) based on protocol attributes
  • Method for identifying Shadowsockets (R) based on protocol attributes
  • Method for identifying Shadowsockets (R) based on protocol attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] A method for identifying Shadowsocks(R) based on protocol attributes, comprising the steps of:

[0076] After the traffic is collected, the identification features are extracted based on the attribute analysis of the Shadowsocks(R) protocol to form self-created features;

[0077] After the self-created features are trained on a machine learning-based model, the recognition results are output.

Embodiment 2

[0079] On the basis of Embodiment 1, the method includes the steps of: after performing secondary recognition on the output recognition result, outputting the secondary recognition result.

Embodiment 3

[0081] On the basis of Embodiment 1 or 2, it includes the steps of: pre-processing the collected traffic before analyzing and extracting the attributes based on the Shadowsocks(R) protocol; the pre-processing includes the steps: collecting the training set: Collect white traffic; label the training set after collecting; cut the labeled traffic in units of flow.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Shadowsockets (R) identification method based on protocol attributes, and the method comprises the steps: carrying out the analysis and extraction of identification features based on the Shadowsockets (R) protocol attributes after traffic collection, and forming self-created features; after machine learning-based model training is performed on the self-created features, an identification result is output; according to the method, the Shadowsockets (R) traffic in various environments (a laboratory environment, an internet real network environment and the like) can be effectively and accurately identified.

Description

technical field [0001] The invention relates to the field of traffic identification, and more particularly, to a method for identifying Shadowsocks (R) based on protocol attributes and machine learning based on protocol attributes. Background technique [0002] With the development of Internet technology, VPN protocols or application software such as VPN or private proxy emerge in an endless stream. The early VPN protocols mainly focus on PPTP, IPSec, Openvpn, SSH, etc., but PPTP, IPSec, Openvpn, SSH use fixed ports and standardized protocol, so it is easy to be blocked. Although blue light, Expressvpn, Tor and other paid VPN software can be used, they are very unstable. Shadowsocks(R) is a Socks5-based VPN proxy software developed by the clowwindy team. Shadowsocks(R) is the collective name of two private proxy protocols, Shadowsocks and ShadowsocksR. Because it improves the drawbacks of other VPN software, it has fast speed, The advantages of flexible encryption, cross-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L47/2483H04L43/028G06N3/04G06N3/08G06N20/00
CPCY02D30/50
Inventor 罗杰吉庆兵倪绿林
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP