Anonymous network traffic identification method and device based on traffic reconstruction and inheritance learning
An anonymous network and flow recognition technology, applied in neural learning methods, secure communication devices, character and pattern recognition, etc., to achieve the effect of online update, enrichment and comprehensiveness, and simplified feature design process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] (2) Use the inherited loss function to learn the original model parameters while adapting to new categories;
[0031] (4) Use linear mapping in the fully connected layer to balance the classification preferences of different categories;
[0032] (7)
[0033] Step 6: Determine the final attribution application of the traffic based on the majority principle.
[0034] Using the majority rule to determine traffic classification refers to the prior N After the data packets get the classification results, they vote for selection. N If most packets in the packet classification results are classified as a certain type of application, the flow will be determined as such application traffic. like Figure 7 As shown, in the present invention N Take 10, most of the 10 data packet classification results are classified as a certain type of application, then the flow will be determined as such application traffic, if the number of data packets classified into multiple categori...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


