Method and system for defending network traffic reconnaissance based on generative adversarial network, terminal and storage medium

A network traffic and network technology, applied in the field of network security technology and data privacy protection, can solve the problems of high operating cost, network feature confusion and deception defense technology deployment, etc.

Pending Publication Date: 2022-07-12
尚蝉(浙江)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem of high deployment and operation costs of the existing network feature confusion and deception defense technology, the present invention provides a method, system, terminal and storage medium for resisting network traffic reconnaissance based on generative adversarial networks. A disturbance traffic generator is added to the topology to add disturbance to the traffic information, so as to confuse attackers in the network reconnaissance stage, and make their prediction models wrongly estimated, so as to resist network reconnaissance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for defending network traffic reconnaissance based on generative adversarial network, terminal and storage medium
  • Method and system for defending network traffic reconnaissance based on generative adversarial network, terminal and storage medium
  • Method and system for defending network traffic reconnaissance based on generative adversarial network, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings.

[0038] Embodiments of the present invention provide a method and system for resisting network traffic reconnaissance based on generative adversarial networks, including the following steps:

[0039] 1) Data preprocessing

[0040] 1.1) Dataset

[0041] The data set of the present invention adopts a GEANT network with 24 nodes and 37 links. The schematic diagram of the GEANT network is as follows: figure 1 As shown, the dataset contains topology information of a network and a large number of routing tables and traffic information. The routing information consists of BGP routes of the GEANT network, collected from 00:30 on January 1, 2005 to 15:30 on April 21, 2005, once every 15 minutes. All router ID and absolute time information is anonymized in a publicly available dataset with attributes of time (points in 15-minute intervals) and traffic values ​​(unit: kbps (kil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for defending network traffic reconnaissance based on a generative adversarial network, a terminal and a storage medium, belongs to the technical field of network security and the field of data privacy protection, and aims to protect own network traffic information from being reconnoitered by enemies. According to the technical scheme, false traffic information is added to our network, so that attackers in the network investigation stage are puzzled, prediction models of the attackers are made to have wrong estimation, and the purpose of defending network traffic reconnaissance is achieved. Compared with a traditional network defense method, the method has the advantages that the method deployment cost and the complexity are greatly reduced. By adopting the method, mapping of enemy on own network flow information can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of network security and the field of data privacy protection, in particular to a method, system, terminal and storage medium for resisting network traffic reconnaissance based on a generative confrontation network. Background technique [0002] Software Defined Networking (SDN) is a new network architecture different from traditional networks proposed by the team of Professor Nick McKeown of Stanford University. Decoupling from the data forwarding layer. One of the advantages of SDN network is that it gets rid of the limitation of hardware on the network architecture, and can modify the network like upgrading and installing software. The essence of SDN is network software, which improves network programmability and is a reconstruction of network architecture. , faster and simpler to implement various functional features. [0003] Network reconnaissance is an important step in a network attack. Attackers us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/147H04L41/16G06K9/62G06N3/04G06N3/08
CPCH04L63/1483H04L41/147H04L41/16G06N3/08G06N3/045G06F18/214
Inventor 纪守领王鹏程陈晋音伍一鸣蒲誉文张旭鸿
Owner 尚蝉(浙江)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products