Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

VPN tool refined classification method based on hierarchical detection

A classification method and a level-level detection technology, applied in the field of network security, can solve problems such as no development, poor classification accuracy, and difficulty in monitoring VPN tools, so as to meet the classification requirements and improve the efficiency and strength of supervision.

Active Publication Date: 2022-06-21
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Overall classification accuracy is poor, with some limitations
When it comes to the classification of specific VPN tools, the traffic of VPN tools using the same proxy protocol shows a high degree of similarity, and conventional encrypted traffic detection methods are difficult to identify. The industry has not yet carried out corresponding research, and further exploration is needed
Therefore, the research status is summarized as follows: 1) There is a certain gap in the current research on the classification of VPN proxy protocols, and there is no overall analysis and research on VPN tools mainly used by domestic users; The detection accuracy of VPN tools is low, making it difficult to effectively supervise VPN tools

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN tool refined classification method based on hierarchical detection
  • VPN tool refined classification method based on hierarchical detection
  • VPN tool refined classification method based on hierarchical detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to have a clearer understanding of the technical features, objects and effects of the present invention, the specific embodiments of the present invention will now be described. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention, that is, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work fall within the protection scope of the present invention.

[0057] This embodiment proposes a fine-grained classification method of VPN tools for hierarchical detection. The detection framework is as follows figure 1 As shown, it includes two levels. The first level is the GBDT-LR-based proxy protocol classification method. First, analyze the key negotiation process of each...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a VPN (Virtual Private Network) tool refined classification method for hierarchical detection, which comprises the following steps of: (1) according to key negotiation characteristics of different VPN tools, extracting length characteristics and time correlation characteristics of a single flow, and generating flow classification data sets of different proxy protocols; (2) constructing a GBDT-LR training model based on ensemble learning to realize preliminary classification of VPN tool proxy protocol levels; (3) constructing a 1D-CNN training model of a second level for classifying different VPN tools according to the preliminarily classified proxy protocol category; and (4) optimizing the difference between the predicted VPN tool category of the 1D-CNN training model and a real label by using a maximum entropy classifier, and finally outputting an identification result of the VPN tool. According to the method, various private VPN tools can be accurately identified, and the supervision efficiency and strength of network space security are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for fine-grained classification of VPN tools for hierarchical detection. Background technique [0002] With the increasingly severe cyberspace security situation, the regulation of cyberspace is also more stringent. In order to evade supervision, private VPN tools hide users' real network addresses by enabling anonymous proxies, helping users access overseas nodes and obtain overseas related information, which brings a lot of challenges to my country's network supervision and network security governance. It is urgent to carry out classification research and security supervision of some private VPN tools. [0003] With the development of VPN technology, encrypted traffic covered by VPN technology loses the packet header information and traffic side channel feature information of the original traffic, which makes it more difficult to detect, identify and classify ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L47/2441H04L47/10H04L41/14H04L41/147H04L67/565H04L12/46
CPCH04L47/2441H04L47/29H04L41/145H04L41/147H04L12/4641Y02D30/50
Inventor 吉庆兵倪绿林胡晓艳谈程罗杰康璐刘成
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products