Traffic classification method for unknown network protocol of application layer
A network protocol, application-oriented technology, applied in transmission systems, electrical components, etc., can solve problems such as unknown protocol formats that cannot be accurately located and extracted for encryption, clustering results cannot be accurately mapped, and network traffic cannot be identified. Interpretability, accurate feature representation, and the effect of improving correspondence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] Embodiment 1: a traffic classification method oriented to an application layer unknown network protocol, the method includes the following steps:
[0065] In step (1), the data collection tool is used to collect traffic data at different times in the backbone network, the traffic collected first is used as training data, and the traffic collected later is used as test data. Processing enters step (6);
[0066] Step (2) extracts the feature of training data by the feature extraction method of statistical alignment byte probability, obtains feature vector;
[0067] Step (3) using an unsupervised machine learning method to cluster and label the feature vectors obtained in step (2) to obtain a clustering result;
[0068] Step (4) uses the merging similar clustering algorithm to carry out the merging of similar clusters to the clustering results obtained in step (3), and unifies the clustering labels of the same protocol;
[0069] Step (5) uses a supervised machine learnin...
Embodiment 2
[0104] Embodiment 2: A traffic classification method for unknown network protocols at the application layer provided by the present invention, the overall structure of which is as follows: figure 1 shown, including the following steps:
[0105] In step (1), the data collection tool is used to collect traffic data at different times in the backbone network, the traffic collected first is used as training data, and the traffic collected later is used as test data. Processing enters step (6);
[0106] Step (2) extracts the feature of training data by the feature extraction method of statistical alignment byte probability, obtains feature vector;
[0107] Step (3) using an unsupervised machine learning method to cluster and label the feature vectors obtained in step (2) to obtain a clustering result;
[0108] Step (4) uses the merging similar clustering algorithm to carry out the merging of similar clusters to the clustering results obtained in step (3), and unifies the clusteri...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


