Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning

An anonymous network and flow recognition technology, applied in neural learning methods, secure communication devices, character and pattern recognition, etc., to achieve the effect of online update, enrichment and comprehensiveness, and simplified feature design process

Active Publication Date: 2022-06-10
NANJING UNIV OF INFORMATION SCI & TECH
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traffic classification method based on machine learning requires expert experience to extract and screen traffic features, which consumes time and energy, and the features are not comprehensive enough. The representativeness of the features is very high, and the classification accuracy is not high enough.
The model based on deep learning is currently a research hotspot, and the end-to-end model is favored by researchers. However, in actual deployment, the model needs to be retrained when encountering new traffic recognition scenarios, which takes a lot of time. This is currently the case in anonymous network traffic. Difficulties Encountered in App Classification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning
  • Anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning
  • Anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] (2) Use the inherited loss function to learn the original model parameters while adapting to new categories;

[0031] (4) Use linear mapping in the fully connected layer to balance the classification preferences of different categories;

[0032] (7)

[0033] Step 6: Determine the final attribution application of the traffic based on the majority principle.

[0034] Using the majority rule to determine traffic classification refers to the prior N After the data packets get the classification results, they vote for selection. N If most packets in the packet classification results are classified as a certain type of application, the flow will be determined as such application traffic. like Figure 7 As shown, in the present invention N Take 10, most of the 10 data packet classification results are classified as a certain type of application, then the flow will be determined as such application traffic, if the number of data packets classified into multiple categori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning, and the method comprises the steps: collecting original network traffic, carrying out the preliminary screening of the traffic, and removing non-Tor traffic; reconstructing the flow after preliminary screening, and converting the flow into a gray feature map; utilizing a convolutional neural network and a recurrent neural network model to process the feature map after flow reconstruction, extracting an interaction information feature vector, a packet space feature vector and a flow time sequence feature vector, and fusing the three feature vectors; inputting the fusion features into a multi-classifier for application classification, wherein the multi-classifier updates classifier parameters through an inheritance learning mechanism when detecting a new traffic category; and determining the attribution application of the traffic based on a majority principle. According to the method, the feature design process is simplified, the comprehensiveness of features is enriched, the requirement for online updating of model parameters is met, the model keeps memory for past training, and only small-scale training needs to be carried out when a new category is added every time.

Description

technical field [0001] The invention relates to network traffic identification and network application classification, in particular to an anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning. Background technique [0002] With the continuous development of the Internet, the types of network traffic are becoming more and more complex, and different types of applications are constantly emerging. Applications generate a large amount of network traffic, and different types of traffic exhibit different characteristics. The goal of traffic classification is to identify traffic types according to the distinguishing characteristics of traffic. Network traffic classification is essential for network operators. The reasons include the following two aspects. On the one hand, from the perspective of user service quality, traffic classification is the first step to ensure service quality, and it is the premise to provide di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/16G06K9/62G06N3/04G06N3/08
CPCH04L63/1416H04L63/1425H04L63/20H04L41/16G06N3/08G06N3/044G06N3/045G06F18/2431G06F18/253
Inventor 肖滕龙翟江涛许成程
Owner NANJING UNIV OF INFORMATION SCI & TECH