Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

407 results about "Traffic identification" patented technology

Network application flow recognition method and apparatus and network application flow management apparatus

The invention discloses a network application traffic identification method, a network application traffic identification device and network application traffic management equipment. The method comprises the following steps of: associating a characteristic sequence template of known network application and corresponding specific plaintext characteristics; taking a source IP of network session as a key value to record the characteristic sequence template which is identified by DPI and is associated with the specific plaintext characteristics into a first list; and for network session which fails to be identified by the prior art, recording characteristic information of a current message, and adapting the characteristic information to the entire characteristic sequence templates under a corresponding key value when a preset threshold is reached to obtain a network application traffic identification result. The network application traffic identification method and the network application traffic identification device can identify network application traffic which fails to be identified by a DPI identification method, improve identification efficiency at the same time, reduce identification cost, and reduce the false report rate of the identification.
Owner:NEW H3C TECH CO LTD

Encrypted traffic identification method based on load adjacent probability model

The invention discloses an encrypted traffic identification method based on a load adjacent probability model, and aims to provide a high-accuracy universal encrypted traffic identification method which utilizes a non-encrypted flow characteristic. The encrypted traffic identification method is technologically characterized by comprising the steps of first step, inputting a non-encrypted network traffic, counting a number of times in which message data load bytes are adjacent, selecting number points for differentiating a high-probability adjacent relationship and a low-probability adjacent relationship, and constructing an adjacent probability relationship model; a second step, inputting a network session traffic, extracting an adjacent characteristic and a random characteristic, and simultaneously acquiring a data random characteristic based on an information entropy; and a third step, transmitting the adjacent characteristics and the random characteristics of the non-encrypted traffic and the encrypted traffic as an input into a classification engine based on machine learning, and furthermore performing encrypted traffic identification based on the adjacent characteristic and the random characteristic of an unknown traffic. Compared with an existing principal encrypted traffic identification method, the encrypted traffic identification method has advantages of realizing universal identification on unknown encrypted protocol traffic and effectively improving identification accuracy.
Owner:NAT UNIV OF DEFENSE TECH

Highway tunnel traffic identification method

The invention discloses a highway tunnel traffic identification method, which is characterized in that 1. an inlet vehicle identification device and an inlet vehicle speed detection device, an outlet vehicle identification device and an outlet vehicle speed detection device are arranged; 2. a central processing unit obtains the information and speed of the inlet vehicles and the information and speed of the outlet vehicles, and the entering and exiting times of the vehicles are recorded; 3. practical traveling time is calculated; 4. the threshold value range of the traveling time of the vehicles normally and safely passing through the tunnel is determined; 5. abnormal vehicles are determined; 6. abnormal conditions occurring in the tunnel are determined; and 7. the number of the vehicles besieged in the tunnel and average queuing length are calculated and a traffic abnormal event alarming is sent. The invention has the obvious effect that the line laying is simple, implement is easy, cost is low, and real-time monitoring is carried out aiming to the highway tunnel traffic conditions so as to facilitate statistic data; and whether the abnormal conditions occur or not can be obtained in time, and the conditions in the tunnel after the abnormal conditions occur can be predicted.
Owner:CHINA MERCHANTS CHONGQING COMM RES & DESIGN INST

Method for recognizing flux based on characteristic library

The invention discloses a traffic identification method based on a feature library, which comprises the following steps: the generation of the feature library, the loading of the initialized feature library, traffic identification of the feature library, and on-line maintenance of the feature library. A network application protocol can configure a plurality of feature value descriptions, and features can be concurrently matched in a coprocessor which supports quick content lookup, so the traffic identification method based on the feature library not only effectively improves the accuracy of the traffic identification, but also improves the performance of the traffic identification. A manager can browse each application in the feature library, modify the name of each application, and add or delete each application through a management interface through management interface; for each application in the feature library, the manager can edit any existing feature string and can add or delete the feature string; and all the modification to the feature library can be loaded to the coprocessor which supports the quick content lookup in a real-time mode after the manager confirms, thereby obtaining effective improvement on the expansibility of the traffic identification.
Owner:合肥昊特信息科技有限公司

Encrypted network traffic identification method based on deep neural network

ActiveCN110247930AEasy extractionGood multi-category recognition accuracyNeural architecturesTransmissionTraffic capacityData set
The invention relates to an encrypted network traffic identification method based on a deep neural network, and belongs to the technical field of deep learning, network service security and traffic identification. The encrypted network traffic identification method based on the deep neural network comprises the steps of 1, obtaining an offline data set based on capture, deployment and extraction operations, and generating a training set and a test set; 2, building a deep neural network model; 3, performing data reading, model training and parameter optimization: inputting the offline data set into a deep neural network model for training and iteration until the accuracy reaches the standard, and then stopping training; 4, establishing and deploying an online network flow capture platform, and capturing an online data set; and 5, performing online network flow identification to obtain an identification result. According to the method, high-dimensional features of the flow data can be better extracted; compared with an existing deep neural network, the method has the advantages of better multi-classification recognition accuracy, lower false positive rate and lower false alarm rate, and ensures the high efficiency of encrypted data flow on-line recognition.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Network encrypted traffic identification method and device based on deep learning

ActiveCN112003870AAdapt to the structural formOvercoming manual extraction of packetsNeural architecturesTransmissionData packInternet traffic
The embodiment of the invention provides a network encrypted traffic identification method and device based on deep learning, relates to the technical field of network security, and can improve the accuracy and efficiency of network encrypted traffic identification. The method comprises the steps of obtaining message information and communication behavior information of a preset number of data packets belonging to a communication establishment stage in to-be-identified network traffic; constructing a message two-dimensional data matrix according to the message information, and constructing a behavior two-dimensional data matrix according to the communication behavior information; and inputting the message two-dimensional data matrix and the behavior two-dimensional data matrix into a network traffic identification model, and determining the protocol type of the to-be-identified network traffic, wherein the network flow identification model is a sample two-dimensional data matrix passing through the sample network flow and a protocol type label corresponding to the sample network flow; and training the deep learning network to obtain a model, wherein the sample two-dimensional datamatrix comprises a sample message two-dimensional data matrix and a sample behavior two-dimensional data matrix corresponding to the sample network flow.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT

Traffic identification and feature extraction method based on deep learning

The invention discloses a traffic identification and feature extraction method based on deep learning. The method comprises the steps of data packet capture, data set establishment, convolutional neural network establishment, model training, model self-study and optimization, and network data packet feature extraction. According to the method, the good performance of the convolutional neural network in data processing application is fully utilized, and the convolutional neural network which is rapid and accurate and is suitable for network message processing is designed; and flow classification prediction is carried out by utilizing the trained model, data packets with insufficient probabilities of prediction errors and classification under a correct type in a result are selected out and re-fused into a training set training model, thereby realizing autonomous optimization of the model. According to the method, a class activation mapping method is utilized to carry out feature extraction on the traffic, extracted feature fields can enable people to know the features of data packets of specific types, and the feature fields not only can be used for a traditional DPI technology, butalso are suitable for application scenarios where DPI traffic classification has been deployed.
Owner:上海乘安科技集团有限公司

An online traffic identification method based on incremental clustering algorithm

The invention belongs to the network technical field, in particular to an online traffic identification method based on an incremental clustering algorithm. The method includes: an offline recognitionstage and an online recognition stage, wherein in the offline recognition stage,a semi-supervised learning flow algorithm based on an improved K-means algorithm is used to perform preliminary clustering and mapping work on the prepared training data sets, and the data sets which are preliminarily classifiedare obtained; in the online recognition stage,based on the completed clustering and mappingdata sets formed in the offline identification phase, incremental clustering is used to determine the network application type of the newly added data streams online, so as to achieve the purpose oftraffic identification. According to the method,based on machine learning technology, by constructing a suitable recognition model to learn the prepared data, the online traffic can be incrementally clustered in real time, and the preliminary semi-supervised classification can be carried out by combining the prepared training set, which can realize the online recognition of network traffic, and has good real-time performance and high recognition rate.
Owner:HARBIN ENG UNIV

Behavior-detection-based network traffic identification method and device

The invention discloses a behavior-detection-based network traffic identification method and a behavior-detection-based network traffic identification device. The method comprises the following steps of capturing data packet information of network traffic, and performing TCP (transmission control protocol) session recombination to extract information of each TCP session stream respectively; extracting information about session statistical characteristics of the information of each TCP session stream according to session characteristics of Trojan communication, and establishing corresponding TCP session characteristic matrix information; optimally clustering the TCP session characteristic matrix information to generate optimally-clustered information by adopting a bacterial foraging optimization-based clustering method; obtaining information about the network traffic type of each TCP session stream according to the optimally-clustered information. According to the method and the device, the TCP session streams are extracted to a data packet of the network traffic, the information about the TCP session statistical characteristics is obtained according to the session characteristics of Trojan communication to generate the TCP session characteristic matrix information, and the bacterial foraging optimization-based clustering method is used for optimally clustering the TCP session characteristic matrix information to obtain the information about the network traffic types of the TCP session streams.
Owner:BEIJING VENUS INFORMATION TECH +1

Method and device for network traffic identification

InactiveCN104486161AAccurately determineComprehensive recognition resultsData switching networksTraffic capacityNetworking protocol
The application provides a method and a device for network traffic identification. The method comprises the following steps: identifying the head of an obtained data packet to be identified, determining network protocols respectively used by a transmission layer and all layers below the transmission layer, extracting an IP address and a port from the head of the data packet to be identified, searching the IP address and the port in a preset flow table, if the IP address and the port are searched, determining that a network protocol and an application which correspond to the IP address and the port are the network protocol and the application which are used by an application layer, if the IP address and the port are not searched, matching load data in the data packet to be identified with feature keywords in a preset feature library, and if matching is successfully carried out, determining that a network protocol and an application which correspond to the feature keywords are the network protocol and the application which are used by the application layer. Compared with the prior art, the application has the advantages that not only can the protocol of the application layer be accurately identified through the flow table and the feature library which are previously set, the application type can also be determined according to corresponding relationships record in the flow table and the feature library; the recognizing results are more comprehensive.
Owner:COLASOFT

Unmanned aerial vehicle-based abnormal traffic identification method

The invention relates to an unmanned aerial vehicle-based abnormal traffic identification method. The method includes the following steps that: an unmanned aerial vehicle acquires traffic image information in a cruise range and outputs the traffic image information to a server; the traffic image information is processed; current processed traffic image information is compared with preset normal state traffic image information; and whether a anomaly exists in a current road section can be judged. According to the unmanned aerial vehicle-based abnormal traffic identification method of the invention adopted; real-time traffic is photographed by the unmanned aerial vehicle, and pictures are automatically processed; picture information worthy of being distributed is selected and is uploaded to a traffic control system; based on a floating car method principle and an intensity projection method, the unmanned aerial vehicle is utilized to detect the volume of traffic of the road; and the traffic control system can perform operation such as traffic state detection, traffic safety early warning and traffic control induction according to traffic real-time condition and traffic flow in the pictures and perform picture receiving, processing and instruction distribution according to a cloud service platform.
Owner:CHINA MERCHANTS CHONGQING COMM RES & DESIGN INST

Encrypted malicious traffic identification method, equipment and device

The invention discloses an encrypted malicious traffic identification method, equipment and device, and the method comprises the steps: separating encrypted to-be-detected network traffic from networktraffic, and dividing the to-be-detected network traffic into a plurality of traffic packets according to a time sequence, wherein the traffic packets are learned and judged through a first neural network to obtain time sequence features and/or space features of each flow packet; summarizing the time sequence features and/or the space features of all the flow packets into summarized features according to a time sequence, and obtaining the summarized time sequence features of the flow to be detected from the summarized features through learning judgment by a second neural network; and comparing the to-be-detected traffic summary time sequence feature with a preset normal traffic summary time sequence feature to judge whether the to-be-detected network traffic is a malicious feature or not.According to the method, the space and time characteristics of the flow are learned by adopting the neural network, a multi-flow network flow processing mode is introduced, behavior characteristics between flows are fully considered, and the accuracy of malicious flow identification can be more accurate.
Owner:北京观成科技有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products