Network flow identification method and device

A network traffic and identification method technology, applied in the field of network traffic identification methods and devices, can solve problems such as no solution proposed, and achieve the effect of improving identification accuracy and accurate and effective identification

Active Publication Date: 2022-04-15
COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow identification method and device
  • Network flow identification method and device
  • Network flow identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0033] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network flow identification method and device. The method comprises the following steps: acquiring a data packet of target network traffic to be identified; enhancing the data packet through wavelet transform and histogram equalization; the enhanced data packet is input into a recognition model, the type of the target network traffic is output by the recognition model, the recognition model comprises a residual module and an attention module, the recognition model is formed by training multiple sets of training data, and each set of training data comprises the input data packet of the network traffic and the type of the network traffic. According to the invention, the technical problem of low identification accuracy of the traditional network flow identification method in the related technology is solved.

Description

technical field [0001] The present invention relates to the field of traffic identification, in particular to a network traffic identification method and device. Background technique [0002] With the popularity of the Internet, the number of Internet users has shown a blowout growth. At present, traffic encryption technology exists in all walks of life in society, bringing practical solutions to various applications with high privacy requirements such as distance education, online consultation, and video calls. Various websites have also generally begun to adopt the HTTPS protocol to ensure that they are not maliciously attacked. In search engines such as Google, websites using the HTTPS encryption protocol will be ranked first. However, technology is a double-edged sword. Traffic encryption technology is also used as a tool to disrupt network security. The abuse of encrypted traffic will bring a lot of hidden dangers to cyberspace security and network operation and main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06K9/62G06N3/04G06N3/08
CPCY02D30/50
Inventor 任勇毛周旭陈卓唐海娜谢高岗
Owner COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products