Method for identifying Shadowsockets (R) based on protocol attributes
An identification method and protocol technology, applied in the field of traffic identification, can solve the problems of not being universal, unable to reflect the privacy of the protocol, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] A method for identifying Shadowsocks(R) based on protocol attributes, comprising the steps of:
[0076] After the traffic is collected, the identification features are extracted based on the attribute analysis of the Shadowsocks(R) protocol to form self-created features;
[0077] After the self-created features are trained on a machine learning-based model, the recognition results are output.
Embodiment 2
[0079] On the basis of Embodiment 1, the method includes the steps of: after performing secondary recognition on the output recognition result, outputting the secondary recognition result.
Embodiment 3
[0081] On the basis of Embodiment 1 or 2, it includes the steps of: pre-processing the collected traffic before analyzing and extracting the attributes based on the Shadowsocks(R) protocol; the pre-processing includes the steps: collecting the training set: Collect white traffic; label the training set after collecting; cut the labeled traffic in units of flow.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


