CN116208356B - A virtual currency mining traffic detection method based on deep learning - Google Patents

A virtual currency mining traffic detection method based on deep learning Download PDF

Info

Publication number
CN116208356B
CN116208356B CN202211325209.6A CN202211325209A CN116208356B CN 116208356 B CN116208356 B CN 116208356B CN 202211325209 A CN202211325209 A CN 202211325209A CN 116208356 B CN116208356 B CN 116208356B
Authority
CN
China
Prior art keywords
detection
mining
data
flow
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211325209.6A
Other languages
Chinese (zh)
Other versions
CN116208356A (en
Inventor
付添翼
席少珂
卜凯
任奎
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN202211325209.6A priority Critical patent/CN116208356B/en
Publication of CN116208356A publication Critical patent/CN116208356A/en
Application granted granted Critical
Publication of CN116208356B publication Critical patent/CN116208356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Molecular Biology (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种基于深度学习的虚拟货币挖矿流量检测方法,包括:(1)预先抓取挖矿流量以及正常流量,抓取的每个数据流中包含若干个数据包,提取出每个数据包的相关信息并保存;(2)构建基于神经网络的检测模型,并利用每个数据包的包长、时间戳、目标地址信息将每个网络连接的数据流处理成若干个检测输入,随后利用检测输入对检测模型进行训练;其中,检测模型的结构包括两个卷积层、两个池化层以及三个全连接层;(3)搭建实时检测系统,在实时检测系统中利用训练好的检测模型对实时数据流进行检测,判断出是否为挖矿流量。本发明具有检测准确率高、检测实时性强、方便部署和移植、适用于加密网络环境等优点。

The invention discloses a virtual currency mining traffic detection method based on deep learning, which includes: (1) Pre-capturing mining traffic and normal traffic. Each captured data stream contains several data packets, and each captured data stream is extracted. and save the relevant information of each data packet; (2) Build a detection model based on neural network, and use the packet length, timestamp, and destination address information of each data packet to process the data stream of each network connection into several detection inputs , and then use the detection input to train the detection model; among them, the structure of the detection model includes two convolutional layers, two pooling layers and three fully connected layers; (3) Build a real-time detection system and use The trained detection model detects the real-time data flow and determines whether it is mining traffic. The invention has the advantages of high detection accuracy, strong real-time detection, convenient deployment and transplantation, and is suitable for encrypted network environments.

Description

一种基于深度学习的虚拟货币挖矿流量检测方法A virtual currency mining traffic detection method based on deep learning

技术领域Technical field

本发明涉及区块链和网络安全领域,尤其是涉及一种基于深度学习的虚拟货币挖矿流量检测方法。The invention relates to the field of blockchain and network security, and in particular to a virtual currency mining traffic detection method based on deep learning.

背景技术Background technique

虚拟货币是指以比特币、以太坊、门罗币等为代表的利用区块链产生的数字货币,这些货币不受政府机构的控制。区块链是一种去中心化的系统,该系统的运行不依赖某一个或某些特定的网络节点,而是设计一种机制依靠网络中大部分节点进行“投票”决定结果,并将结果和信息广播到整个链上,从而实现去中心化。然而随着各种虚拟货币的市场行情不断上扬,伴随而来的是挖矿现象(通过开采虚拟货币而获得收益)的与日俱增。这也带来了一些安全性问题,网络中的不法分子为了节省资源纷纷使用挖矿攻击技术去利用他人的设备进行虚拟货币的开采,严重侵害了他人的利益。Virtual currencies refer to digital currencies generated using blockchain, represented by Bitcoin, Ethereum, Monero, etc. These currencies are not controlled by government agencies. Blockchain is a decentralized system. The operation of the system does not rely on one or some specific network nodes. Instead, it designs a mechanism that relies on most nodes in the network to "vote" to determine the results, and the results are and information is broadcast to the entire chain, thereby achieving decentralization. However, as the market prices of various virtual currencies continue to rise, the phenomenon of mining (earning profits by mining virtual currencies) is increasing day by day. This has also brought about some security issues. In order to save resources, criminals on the network have used mining attack technology to use other people's equipment to mine virtual currencies, seriously infringing on the interests of others.

挖矿攻击(Cryptojacking)的危害十分严重,这是因为挖矿利用了计算机的中央处理器(CPU)和图形处理器(GPU),让它们在极高的负载下运行,这会对受害者的设备造成巨大的性能损失。除此之外,挖矿攻击者可能通过木马在受害者的主机上执行以下操作:卸载安全防护软件、添加启动项、添加管理员以及关闭防护墙,这些行为会严重危害受害者主机的安全。另外,挖矿活动会带来大量的用电支出,调查显示,虚拟货币挖矿成本中电费支出占总成本的90%以上。因此,对挖矿活动进行有效检测是有必要的。The harm of mining attacks (Cryptojacking) is very serious. This is because mining utilizes the central processing unit (CPU) and graphics processing unit (GPU) of the computer, allowing them to run under extremely high loads, which will have a negative impact on the victim's health. Devices suffer huge performance losses. In addition, mining attackers may use Trojans to perform the following operations on the victim's host: uninstall security software, add startup items, add administrators, and close the protection wall. These behaviors can seriously endanger the security of the victim's host. In addition, mining activities will bring a large amount of electricity expenditure. Surveys show that electricity expenditure accounts for more than 90% of the total cost of virtual currency mining. Therefore, effective detection of mining activities is necessary.

目前的挖矿攻击主要分为两种类型,第一种是攻击者入侵流行的网络服务器并将恶意挖矿代码嵌入网站,当用户浏览网站时,他们将被动进行虚拟货币挖矿(简称为浏览器挖矿行为);另一种攻击是指攻击者通过恶意软件控制用户的计算机,直接使用用户的主机进行挖矿(简称为主机挖矿行为)。Current mining attacks are mainly divided into two types. The first is where attackers invade popular network servers and embed malicious mining code into websites. When users browse the website, they will passively mine virtual currency (referred to as browsing). Server mining behavior); another type of attack means that the attacker controls the user's computer through malware and directly uses the user's host to mine (referred to as host mining behavior).

然而,在已有的文献中,尚未有较实用的挖矿检测方法被提出,现有的方法大多数存在着较为明显的缺陷:实时性较差或者部署难度较大。这些方法主要可以分为三类:第一类是针对挖矿脚本的检测,比如Geng Hong等人(How you get shot in the back:Asystematical study about cryptojacking in the real world,2018)以及Konoth等人(Minesweeper:An in-depth look into drive-by cryptocurrency mining and itsdefense,2018)提出的检测方法。第二类是针对挖矿软件的检测,比如Soviany等人(Android malware detection and crypto-mining recognition methodology withmachine learning,2018)以及Gangwal等人(Cryptomining cannot change its spots:Detecting covert cryptomining using magnetic side-channel,2019)提出的检测方法。第三类是针对挖矿流量分析的检测,比如Shize Zhang等人(MineHunter:A PracticalCryptomining Traffic Detection Algorithm Based on Time Series Tracking,2021)以及Caprolu等人(Cryptomining makes noise:a machine learning approach forcryptojacking detection,2019)提出的检测方法。However, in the existing literature, no practical mining detection method has yet been proposed. Most of the existing methods have obvious flaws: poor real-time performance or difficulty in deployment. These methods can be mainly divided into three categories: The first category is for the detection of mining scripts, such as Geng Hong et al. (How you get shot in the back: Asystematic study about cryptojacking in the real world, 2018) and Konoth et al. The detection method proposed by Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense, 2018). The second category is for the detection of mining software, such as Soviany et al. (Android malware detection and crypto-mining recognition methodology with machine learning, 2018) and Gangwal et al. (Cryptomining cannot change its spots: Detecting covert cryptomining using magnetic side-channel, 2019) proposed detection method. The third category is detection for mining traffic analysis, such as Shize Zhang et al. (MineHunter: A PracticalCryptomining Traffic Detection Algorithm Based on Time Series Tracking, 2021) and Caprolu et al. (Cryptomining makes noise: a machine learning approach for cryptojacking detection, 2019 ) detection method proposed.

第一种针对挖矿脚本的检测,这类检测方法面向浏览器挖矿行为,根据挖矿脚本常常涉及到大量哈希计算这一特点对它们进行检测。目前最具时效性的方法包括利用虚拟货币挖矿脚本的某些固有特性,设计一组基于运行时行为的分析器,考虑到挖矿工作的核心功能是工作量证明系统,通常大部分工作负载都是哈希值的计算,而普通网页在哈希函数上花费的时间较少,因此可以通过计算网页在常见的可访问哈希库接口上花费的累计时间进行分析,如果某个网页在哈希值计算上的花费时长超过总时长的10%,分析器会怀疑其执行了挖矿脚本,除此之外,在挖矿脚本的执行过程中,其栈深度和调用链存在某些规律性,而正常网页很少重复调用相同的堆栈,这也是的分析依据之一;通过分析来自常见网络挖矿工具(比如NFWebMiner、coinhive等)的JavaScript代码以及wasm模块里包含各种加密操作(异或、移位、旋转)的函数的相关特性,设计一套检测策略,在待测网页使用的wasm模块的字节码里,将每个函数与挖矿算法计算哈希值必须用到的五种加密原语(Keccak、AES、BLAKE-256、Groestl-256、Skein-256)的指纹进行匹配,若有足够多的加密原语被完全匹配,则认为该网页包含挖矿脚本。除此之外,他们会根据网页所用到的wasm模块里每个函数中循环里的加密操作数量,若该数值超出某个阈值,这时也会怀疑该网页包含了挖矿脚本。这类根据挖矿脚本的某些特性对挖矿行为进行识别的方式,往往都需要获取整个网页的明文内容,这时如果在网络传输过程中采取负载混淆的策略,就能明显影响这些工作的效率。The first type of detection is for mining scripts. This type of detection method is oriented towards browser mining behavior. Mining scripts are detected based on the fact that they often involve a large number of hash calculations. The most time-effective method at present involves taking advantage of certain inherent characteristics of virtual currency mining scripts and designing a set of analyzers based on runtime behavior, considering that the core function of mining work is a proof-of-work system, usually most workloads They are all calculations of hash values, and ordinary web pages spend less time on hash functions. Therefore, it can be analyzed by calculating the cumulative time spent by web pages on common accessible hash library interfaces. If a web page is in a hash function, If the time spent on hash value calculation exceeds 10% of the total time, the analyzer will suspect that it has executed a mining script. In addition, during the execution of the mining script, there are certain regularities in its stack depth and call chain. , and normal web pages rarely call the same stack repeatedly, which is also one of the basis for analysis; by analyzing the JavaScript code from common network mining tools (such as NFWebMiner, coinhive, etc.) and the wasm module containing various encryption operations (XOR , shift, rotation) functions, design a set of detection strategies, and in the bytecode of the wasm module used by the web page to be tested, combine each function with the five types that must be used by the mining algorithm to calculate the hash value. The fingerprints of encryption primitives (Keccak, AES, BLAKE-256, Groestl-256, Skein-256) are matched. If enough encryption primitives are completely matched, the webpage is considered to contain a mining script. In addition, they will also suspect that the webpage contains a mining script based on the number of encryption operations in the loop of each function in the wasm module used on the webpage. If the value exceeds a certain threshold, they will also suspect that the webpage contains a mining script. This type of method of identifying mining behavior based on certain characteristics of mining scripts often requires obtaining the plain text content of the entire web page. In this case, if a load obfuscation strategy is adopted during network transmission, it can significantly affect the performance of these tasks. efficiency.

第二种针对挖矿软件的检测,这类方法面向主机挖矿行为,把主机上的挖矿软件当作恶意软件进行检测监控。常用做法包括将各类软件的相关设备及其操作系统的一些功能或操作的信息作为原始特征,这些信息涉及权限、移动应用程序设置、设备属性、协议相关信息、操作系统相关属性,随后根据相关设备以及操作系统上发生的恶意软件事件的统计信息提取出某些衍生特征,利用原始特征和衍生特征进行特征融合和特征提取,最后使用支持向量机(SVM)对最终生成的特征进行训练分类,从而实现对恶意挖矿软件的识别;利用磁性侧通道对挖矿行为进行识别,其理论依据是在CPU执行挖矿操作时,其电流负载会过高,这可能导致其周围的磁场强度产生较剧烈的变化,通过使用一个10HZ的探头磁传感器测量并记录一个时间段(100次采样)内CPU在执行不同操作时周围的磁场强度序列,并利用K-最近邻居算法对该磁场强度序列进行训练学习,最终实现对挖矿行为的检测。这类方法存在的问题包括检测范围较小,无法识别未知软件以及需要检查者、磁传感器以及待测设备的物理接近,难以在大型企业上部署。The second type is for the detection of mining software. This type of method is oriented to the mining behavior of the host, and detects and monitors the mining software on the host as malware. Common practices include using information about various functions or operations of various software related devices and their operating systems as original features. This information involves permissions, mobile application settings, device attributes, protocol-related information, operating system-related attributes, and then based on relevant Some derived features are extracted from the statistical information of malware events that occur on the device and operating system, and the original features and derived features are used for feature fusion and feature extraction. Finally, a support vector machine (SVM) is used to train and classify the final generated features. This enables the identification of malicious mining software; the magnetic side channel is used to identify mining behavior. The theoretical basis is that when the CPU performs mining operations, its current load will be too high, which may cause the magnetic field intensity around it to produce a higher Dramatic changes, by using a 10HZ probe magnetic sensor to measure and record the magnetic field intensity sequence around the CPU when performing different operations within a time period (100 samples), and use the K-nearest neighbor algorithm to train the magnetic field intensity sequence Learning, and ultimately realizing the detection of mining behavior. Problems with this type of method include a small detection range, the inability to identify unknown software, and the need for physical proximity of the examiner, magnetic sensors, and devices under test, making them difficult to deploy in large enterprises.

第三种针对挖矿流量分析的检测,这类方法同时面向浏览器挖矿和主机挖矿,利用挖矿过程中的网络传输特性对其进行检测,本发明属于该类检测方法。最近以来随着针对挖矿行为网络防御力度的增强,如运营商通过矿池IP封锁、域名污染等手段切断受害主机与矿池的网络传输,使得新型挖矿攻击的网络活动更具隐蔽性。例如,挖矿木马可使用代理工具(如:VPN),对通信内容加密,同时混淆流量传输过程中的包长、包数目和包间隔等特征;通过代理主机与矿池连接,从而轻易绕开当下基于IP地址和数据包内容的网络检测手段。针对新型挖矿攻击最具时效性的检测方法包括利用区块链出块和挖矿流量包之间的相关性,设计了一套基于时序跟踪的识别策略:在网关入口处收集流量,根据ip源和目的地的二元组对流进行区分,对每个流记录每个数据包的时间戳;在每个局部特定时间段内,计算为每个流记录的时间戳序列与对应时间段内虚拟货币的出块时间序列之间的局部相关性,最后根据每个流的全局相关性评价该流是挖矿流量的可能性;使用包时间间隔和数据包大小以及它们的衍生特性作为训练随机森林的特征,同时使用k折交叉验证法进行评估。然而这些方法存在对未知(未训练)代理工具的加密流量识别效果差、需要人工设计和筛选流量特征、对训练集的平衡性要求高、检测确认时间窗口长(需要等待多个区块产生)等问题。The third type of detection is based on mining traffic analysis. This type of method is oriented to both browser mining and host mining, and uses the network transmission characteristics during the mining process to detect them. The present invention belongs to this type of detection method. Recently, with the strengthening of network defense against mining activities, for example, operators cut off network transmission between victim hosts and mining pools through mining pool IP blocking, domain name pollution, etc., making the network activities of new mining attacks more covert. For example, mining Trojans can use proxy tools (such as VPN) to encrypt communication content and confuse characteristics such as packet length, number of packets, and packet intervals during traffic transmission; they can connect to mining pools through proxy hosts, thereby easily bypassing Current network detection methods based on IP address and data packet content. The most time-sensitive detection method for new mining attacks includes utilizing the correlation between blockchain block production and mining traffic packets, and designing a set of identification strategies based on timing tracking: collect traffic at the gateway entrance, and based on IP The tuples of source and destination distinguish flows, and record the timestamp of each packet for each flow; in each local specific time period, calculate the timestamp sequence recorded for each flow and the virtual value in the corresponding time period. Local correlation between the currency's block generation time series, and finally evaluate the possibility of the flow being mining traffic based on the global correlation of each flow; use packet time interval and data packet size and their derived characteristics as training random forest The characteristics are evaluated using the k-fold cross-validation method. However, these methods have poor performance in identifying encrypted traffic of unknown (untrained) proxy tools, require manual design and screening of traffic characteristics, have high requirements for the balance of the training set, and have a long detection and confirmation time window (need to wait for multiple blocks to be generated). And other issues.

发明内容Contents of the invention

本发明提供了一种基于深度学习的虚拟货币挖矿流量检测方法,具有检测准确率高、检测实时性强、方便部署和移植、适用于规模不平衡的数据集、适用于加密网络环境等优点。The present invention provides a virtual currency mining traffic detection method based on deep learning, which has the advantages of high detection accuracy, strong real-time detection, convenient deployment and transplantation, suitable for unbalanced scale data sets, and suitable for encrypted network environments. .

一种基于深度学习的虚拟货币挖矿流量检测方法,包括以下步骤:A virtual currency mining traffic detection method based on deep learning, including the following steps:

(1)预先抓取挖矿流量以及正常流量,抓取的每个数据流中包含若干个数据包,提取出每个数据包的相关信息并保存,保存格式为<时间戳,包长,源地址ip,源地址端口号,目标地址ip,目标地址端口号>的元组序列;(1) Pre-capture mining traffic and normal traffic. Each captured data stream contains several data packets. Extract the relevant information of each data packet and save it. The saving format is <timestamp, packet length, source Address ip, source address port number, destination address ip, destination address port number > tuple sequence;

(2)构建基于神经网络的检测模型,并利用每个数据包的包长、时间戳、目标地址信息将每个网络连接的数据流处理成若干个检测输入,随后利用检测输入对检测模型进行训练;(2) Build a detection model based on neural networks, and use the packet length, timestamp, and target address information of each data packet to process the data stream of each network connection into several detection inputs, and then use the detection inputs to perform the detection model train;

其中,检测模型的结构包括两个卷积层、两个池化层以及三个全连接层;Among them, the structure of the detection model includes two convolutional layers, two pooling layers and three fully connected layers;

(3)搭建实时检测系统,在实时检测系统中,利用训练好的检测模型对实时数据流进行检测,判断出是否为挖矿流量。(3) Build a real-time detection system. In the real-time detection system, use the trained detection model to detect the real-time data flow to determine whether it is mining traffic.

步骤(1)中,挖矿流量来自于虚拟货币,通过工具Wireshark抓取每次挖矿过程中网络连接的数据流,每个网络连接持续1个小时;正常流量来自于日常的网络使用,数据规模是挖矿流量的8-15倍。In step (1), the mining traffic comes from the virtual currency. The tool Wireshark is used to capture the data flow of the network connection during each mining process. Each network connection lasts for 1 hour; normal traffic comes from daily network use, and the data The scale is 8-15 times that of mining traffic.

步骤(2)中,检测输入的格式如下:In step (2), the format of the detection input is as follows:

[Tin,Tout,Sin,Sout][T in ,T out ,S in ,S out ]

其中,T表示当前包和同方向前一个数据包的时序差,S表示数据包的包长;in和out分别表示进入和发出的流量,根据每个数据包的源地址和目标地址判断。Among them, T represents the timing difference between the current packet and the previous data packet in the same direction, S represents the packet length of the data packet; in and out represent the incoming and outgoing traffic respectively, and are judged based on the source address and destination address of each data packet.

在对检测模型进行训练过程中,对于一个数据流,每组检测输入在每个方向的每个特征上按顺序取N个数据包,使得每个检测输入遵从4×N的二维矩阵格式,数量不够的特征用0进行填充;下一组检测输入的每个特征从当前输入每个特征的最后一个数据相邻的下一个位置开始,直到任意一个特征被检测模型消费完为止。During the training process of the detection model, for a data stream, each set of detection inputs takes N data packets in order on each feature in each direction, so that each detection input follows a 4×N two-dimensional matrix format, Insufficient features are filled with 0; each feature of the next set of detection inputs starts from the next position adjacent to the last data of each feature currently input, until any feature is consumed by the detection model.

步骤(2)中,检测模型的结构具体包括依次连接的第一卷积层、第一池化层、第二卷积层、第二池化层、第一全连接层、第二全连接层和第三全连接层;In step (2), the structure of the detection model specifically includes a first convolution layer, a first pooling layer, a second convolution layer, a second pooling layer, a first fully connected layer, and a second fully connected layer that are connected in sequence. and the third fully connected layer;

其中,第一卷积层的卷积核数量为20,卷积核大小为2×20,步长为2×1;第二卷积层的卷积核数量为100,卷积核大小为2×20,步长为2×1;第一池化层和第二池化层的窗口大小为1×5,步长为1×1;第一全连接层的隐藏层数为1200,第二全连接层的隐藏层数为500,第三全连接层的隐藏层数为100。Among them, the number of convolution kernels in the first convolution layer is 20, the convolution kernel size is 2×20, and the step size is 2×1; the number of convolution kernels in the second convolution layer is 100, and the convolution kernel size is 2 ×20, the step size is 2×1; the window size of the first pooling layer and the second pooling layer is 1×5, the step size is 1×1; the number of hidden layers of the first fully connected layer is 1200, and the number of hidden layers of the second fully connected layer is 1200. The number of hidden layers of the fully connected layer is 500, and the number of hidden layers of the third fully connected layer is 100.

检测模型的检测过程为:检测输入首先进入卷积层,卷积核与输入的每个区域进行卷积运算,从而在输入中提取出特征,这些特征值被输入到激活函数,从激活函数得到的输出进入池化层;池化层作用是减小特征矩阵的规模大小,从而减少参数的数量以减少训练过程的计算量;The detection process of the detection model is: the detection input first enters the convolution layer, and the convolution kernel performs a convolution operation with each area of the input to extract features from the input. These feature values are input to the activation function, and are obtained from the activation function. The output enters the pooling layer; the function of the pooling layer is to reduce the size of the feature matrix, thereby reducing the number of parameters and reducing the calculation amount of the training process;

经过所有的卷积层和池化层之后,得到每组检测输入的高级衍生特征;随后,这些高级衍生特征传递给全连接层,使用这些特征对输入进行分类,同时,结合dropout防止过拟合;After all the convolutional layers and pooling layers, the high-level derived features of each set of detection inputs are obtained; then, these high-level derived features are passed to the fully connected layer, and these features are used to classify the input. At the same time, dropout is combined to prevent overfitting. ;

最后得到的网络输出用来表示相关网络连接与挖矿流量之间的相关系数,数值越大表示该数据流是挖矿流量的概率越高,当网络输出大于检测阈值时,认为该组输入检测结果属于挖矿流量。The final network output is used to represent the correlation coefficient between relevant network connections and mining traffic. The larger the value, the higher the probability that the data flow is mining traffic. When the network output is greater than the detection threshold, the group of inputs is considered to be detected. The result belongs to mining traffic.

对检测模型进行训练过程中,对于训练集里的每个输入样本,如果属于挖矿流量,使用数值为1的标签来标识,反之若是正常行为的流量,则使用的标签数值为0;During the training process of the detection model, for each input sample in the training set, if it belongs to mining traffic, use a label with a value of 1 to identify it, otherwise if it is normal behavior traffic, use a label with a value of 0;

随后使用分类交叉熵函数估计损失值,在计算损失之前,需要使用sigmoid函数将每个输入在检测模型中得到的输出映射到(0,1)的区间;损失函数最小化的训练过程使用Adam优化器对网络节点值进行优化。The categorical cross-entropy function is then used to estimate the loss value. Before calculating the loss, the sigmoid function needs to be used to map the output obtained by each input in the detection model to the interval of (0, 1); the training process for minimizing the loss function uses Adam optimization. The controller optimizes network node values.

步骤(3)中,使用DPDK-17.05.2搭建一个实时检测系统,其中,使用两个进程分别进行流量数据获取和流量检测;In step (3), use DPDK-17.05.2 to build a real-time detection system, in which two processes are used to obtain traffic data and detect traffic respectively;

在检测过程中,需要保存每个网络连接的相关信息,包括:目前通过该网络连接传送的数据包总数、每个数据包包长与时间戳;获取进程根据从网络端口收到的数据包的字段信息判断其对应的网络连接,同时更新对应连接的相关信息;当某个网络连接的包数目达到设定的规模,就把目前保存的属于该连接的相应数目的数据包的相关特征处理成一组检测输入放入一个缓存池中;检测进程则不断消费缓存池中的各组检测输入,使用检测模型对它们进行检测。During the detection process, relevant information of each network connection needs to be saved, including: the total number of data packets currently transmitted through the network connection, the length and timestamp of each data packet; the acquisition process is based on the number of data packets received from the network port. The field information determines its corresponding network connection, and at the same time updates the relevant information of the corresponding connection; when the number of packets of a certain network connection reaches the set scale, the relevant features of the currently saved corresponding number of data packets belonging to the connection are processed into one Groups of detection inputs are put into a cache pool; the detection process continuously consumes each group of detection inputs in the cache pool and uses the detection model to detect them.

与现有技术相比,本发明具有以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:

1、本发明利用深度神经网络学习原始的加密挖矿流量通信交互特征,针对采用PoW共识机制的加密货币挖矿流量具有普遍的检测效果;相比于传统的有监督类机器学习算法可节约设计和筛选有效流量特征的人力和时间成本。1. The present invention uses deep neural networks to learn original encryption mining traffic communication interaction characteristics, and has a universal detection effect for cryptocurrency mining traffic using the PoW consensus mechanism; compared with traditional supervised machine learning algorithms, it can save design and the labor and time costs of screening effective traffic characteristics.

2、本发明针对未知的代理工具(流量混淆方法)具有更好的识别效果,适用于规模不平衡的数据集。2. The present invention has better identification effect for unknown proxy tools (traffic confusion method) and is suitable for unbalanced data sets.

3、本发明采用的神经网络设计对主流的开源软硬件框架实现友好,能够支持100G网口的实时流量检测。3. The neural network design adopted in the present invention is friendly to mainstream open source software and hardware frameworks and can support real-time traffic detection of 100G network ports.

附图说明Description of the drawings

图1为本发明中检测模型的网络结构图;Figure 1 is a network structure diagram of the detection model in the present invention;

图2为本发明中实时检测系统的框架图。Figure 2 is a framework diagram of the real-time detection system in the present invention.

具体实施方式Detailed ways

下面结合附图和实施例对本发明做进一步详细描述,需要指出的是,以下所述实施例旨在便于对本发明的理解,而对其不起任何限定作用。The present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be noted that the following examples are intended to facilitate the understanding of the present invention and do not limit it in any way.

本发明中,按照10:1的规模收集了正常流量和挖矿流量(使用Wireshark工具)。在抓取的数据中,每个数据流(pcap文件)中包含若干个数据包,提取出每个数据包的相关信息,并将其保存下来,保存的格式为<时间戳,包长,源地址ip,源地址端口号,目标地址ip,目标地址端口号>的元组序列。In this invention, normal traffic and mining traffic (using the Wireshark tool) are collected on a scale of 10:1. In the captured data, each data stream (pcap file) contains several data packets. The relevant information of each data packet is extracted and saved. The saved format is <timestamp, packet length, source Address ip, source address port number, destination address ip, destination address port number > tuple sequence.

利用每个包的包长、时间戳、目标地址等信息将每个网络连接pcap文件表示成若干网络输入,其表示如下:Each network connection pcap file is represented as several network inputs using the packet length, timestamp, destination address and other information of each packet, which is expressed as follows:

[Tin,Tout,Sin,Sout][T in ,T out ,S in ,S out ]

这里,T表示当前包和同方向前一个包的时序差,S表示包长,in和out分别表示进入和发出的流量(根据每个数据包的源地址和目标地址判断)。Here, T represents the timing difference between the current packet and the previous packet in the same direction, S represents the packet length, in and out represent the incoming and outgoing traffic respectively (judged based on the source address and destination address of each data packet).

由于CNN网络输入要求固定长度,对于一个流,每组输入在每个方向的每个特征上按顺序N取个数据包,使得每个输入遵从4×N的二维矩阵格式,数量不够的特征会用0进行填充,下一组输入的每个特征从当前输入每个特征的最后一个数据相邻的下一个位置开始,直到任意一个特征被消费完为止。Since the CNN network input requires a fixed length, for a stream, each set of inputs takes N data packets in order for each feature in each direction, so that each input follows a 4×N two-dimensional matrix format, and the number of features is not enough. It will be filled with 0, and each feature of the next set of inputs starts from the next position adjacent to the last data of each feature of the current input, until any feature is consumed.

基于卷积神经网络构建检测模型,用来对网络输入进行识别并输出识别结果。检测模型网络结构包括两个卷积层、两个池化层以及三个全连接层,其中涉及到的操作包括:特征提取、全连接和防止过拟合,具体结构如图1所示。A detection model is built based on the convolutional neural network to identify the network input and output the identification results. The detection model network structure includes two convolutional layers, two pooling layers and three fully connected layers. The operations involved include: feature extraction, fully connected and preventing overfitting. The specific structure is shown in Figure 1.

在特征提取的过程中,输入首先进入卷积层,卷积核会与输入的每个区域进行卷积运算,从而在输入中提取出特征,更多的卷积核意味着能够提取出更多特征,这些值被输入到激活函数(激活函数我们选择了ReLU)。从激活函数得到的输出进入池化层,其作用是减小特征矩阵的规模大小,从而减少参数的数量以减少训练过程的计算量。这里我们使用的方法是Max Pooling,保留特征矩阵特定区域内的最大值。这里我们第一层卷积层里使用到n1个卷积核,每个卷积核的尺寸为2×w1,步长为2×s1,旨在发现不同方向的同一特征之间的联系。第二个卷积层使用到n2个卷积核,尺寸为2×w2,步长为2×s2In the process of feature extraction, the input first enters the convolution layer. The convolution kernel will perform a convolution operation with each area of the input to extract features from the input. More convolution kernels mean that more convolution kernels can be extracted. Features, these values are input to the activation function (we chose ReLU for the activation function). The output obtained from the activation function enters the pooling layer, whose role is to reduce the size of the feature matrix, thereby reducing the number of parameters and reducing the calculation amount of the training process. The method we use here is Max Pooling, which retains the maximum value in a specific area of the feature matrix. Here we use n 1 convolution kernels in the first convolution layer. The size of each convolution kernel is 2×w 1 and the step size is 2×s 1 . It aims to find the differences between the same features in different directions. connect. The second convolutional layer uses n 2 convolution kernels, with a size of 2×w 2 and a stride of 2×s 2 .

经过所有的卷积层和池化层之后,已经可以得到每组输入的高级衍生特征。随后,这些特征传递给全连接层,其作用是为了使用这些特征对输入进行分类,除此之外,结合dropout防止过拟合的问题。After all the convolutional layers and pooling layers, the high-level derived features of each set of inputs can be obtained. Subsequently, these features are passed to the fully connected layer, whose role is to use these features to classify the input. In addition, dropout is combined to prevent overfitting problems.

综上所述,对于任意一组输入f在网络中得到的输出可以表示成:To sum up, for any set of inputs f, the output obtained in the network can be expressed as:

网络输出用来表示f所在的网络流与挖矿流量之间的相关系数,其数值越大则意味着f对应的网络流属于挖矿流量的概率越高。这里我们设置检测阈值η,当网络输入大于检测阈值时,我们认为该组输入属于挖矿流量。The network output is used to represent the correlation coefficient between the network flow where f is located and mining traffic. The larger the value, the higher the probability that the network flow corresponding to f belongs to mining traffic. Here we set the detection threshold eta. When the network input is greater than the detection threshold, we consider this group of inputs to belong to mining traffic.

在对网络的训练过程中,对于训练集里的每个输入样本,如果属于挖矿流量,使用数值为1的标签来标识,反之若是正常行为的流量,则使用的标签数值为0。为了估计损失值,使用分类交叉熵函数,在计算损失之前,我们需要使用sigmoid函数将每个输入在网络中得到的输出映射到(0,1)的区间。损失函数最小化的训练过程选择了Adam优化器对网络节点值进行优化,网络结构各层的参数如表1所示。During the training process of the network, for each input sample in the training set, if it belongs to mining traffic, use a label with a value of 1 to identify it. Otherwise, if it is normal behavior traffic, use a label with a value of 0. In order to estimate the loss value, using the categorical cross-entropy function, before calculating the loss, we need to use the sigmoid function to map the output obtained by each input in the network to the interval of (0, 1). The Adam optimizer was selected to optimize the network node values in the training process of loss function minimization. The parameters of each layer of the network structure are shown in Table 1.

表1Table 1

将本发明运行在一个服务器上(CPU:2.8GHz Intel Core i5-8400,内存:128GB),使用DPDK-17.05.2搭建了一个网络流量的实时检测系统,我们使用两个进程分别进行流量数据获取和流量检测。首先需要保存每个网络连接的相关信息,其中包括:目前通过该连接传送的数据包总数、每个数据包包长与时间戳;获取进程根据从网络端口收到的数据包的字段信息判断其对应的网络连接,同时更新对应连接的相关信息,当某个连接的包数目达到一定的规模,就把目前保存的属于该连接的相应数目的数据包的相关特征处理成一组检测输入放入一个缓存池中;检测进程则不断消费缓存池中的检测输入,使用检测模型对它们进行检测。实时检测系统的框架如图2所示。The present invention is run on a server (CPU: 2.8GHz Intel Core i5-8400, memory: 128GB), and a real-time detection system of network traffic is built using DPDK-17.05.2. We use two processes to obtain traffic data respectively. and traffic detection. First, you need to save relevant information about each network connection, including: the total number of data packets currently transmitted through the connection, the length of each data packet, and the timestamp; the acquisition process determines the data packet based on the field information received from the network port. The corresponding network connection, and at the same time update the relevant information of the corresponding connection. When the number of packets of a certain connection reaches a certain scale, the relevant features of the currently saved corresponding number of data packets belonging to the connection are processed into a set of detection inputs and put into a in the cache pool; the detection process continuously consumes the detection inputs in the cache pool and uses the detection model to detect them. The framework of the real-time detection system is shown in Figure 2.

由于目前还没有已经公开的挖矿流量数据集,本发明使用自己构造的一个混合数据集来进行实验,这其中包括挖矿流量以及正常行为流量。Since there is currently no published mining traffic data set, the present invention uses a mixed data set constructed by itself to conduct experiments, which includes mining traffic and normal behavior traffic.

本发明构造的挖矿流量主要来自于以太坊,通过工具Wireshark抓取每次挖矿过程中的流量包,每个连接持续1个小时。数据构造需要充分考虑各种代理工具以及其他因素对挖矿行为的流量特征可能存在的影响,除此之外,还需要尽可能选择算力高以及支持TLS通信的矿池。矿机型号包括RTX2060以及RTX3090*4,主要使用NBminer挖矿工具,数据集覆盖了ethermine、flexpool、f2pool等42个矿池,挖矿算法为ethash,所使用的挖矿协议主要包括Stratum和Ethproxy,矿池连接协议包括TCP以及SSL,涉及OpenVPN、V2Ray、SSR、Trojan等多种代理工具。目前,一共收集了约300个挖矿流,每条流平均包括约3万个数据包信息。正常行为的流量主要来自于Zoom、Youtube、Webpage等日常的网络使用,全部来源于自己的实验机,总的规模大约是挖矿流量集的10倍,最终数据集上得到10万组数据。The mining traffic constructed by this invention mainly comes from Ethereum. The tool Wireshark is used to capture the traffic packets in each mining process. Each connection lasts for one hour. Data construction needs to fully consider the possible impact of various proxy tools and other factors on the traffic characteristics of mining behavior. In addition, it is also necessary to select a mining pool with high computing power and support TLS communication as much as possible. Mining machine models include RTX2060 and RTX3090*4, mainly using the NBminer mining tool. The data set covers 42 mining pools such as ethermine, flexpool, and f2pool. The mining algorithm is ethash. The mining protocols used mainly include Stratum and Ethproxy. , the mining pool connection protocol includes TCP and SSL, involving various proxy tools such as OpenVPN, V2Ray, SSR, Trojan and so on. Currently, a total of about 300 mining flows have been collected, and each flow includes an average of about 30,000 data packet information. Normal traffic mainly comes from daily network usage such as Zoom, Youtube, Webpage, etc., all from our own experimental machines. The total scale is about 10 times that of the mining traffic set, and 100,000 sets of data were obtained in the final data set.

最终的实验结果表明,本发明的检测精确率达到99.9%,召回率达到99.4%,检测速度达到8.3Mpps。以上实验数据证明了,本发明不仅是可行的,而且同时具备了高效性和实时性,让实际问题得到解决。The final experimental results show that the detection accuracy of the present invention reaches 99.9%, the recall rate reaches 99.4%, and the detection speed reaches 8.3Mpps. The above experimental data proves that the present invention is not only feasible, but also efficient and real-time, allowing practical problems to be solved.

以上所述的实施例对本发明的技术方案和有益效果进行了详细说明,应理解的是以上所述仅为本发明的具体实施例,并不用于限制本发明,凡在本发明的原则范围内所做的任何修改、补充和等同替换,均应包含在本发明的保护范围之内。The above-described embodiments describe in detail the technical solutions and beneficial effects of the present invention. It should be understood that the above-mentioned are only specific embodiments of the present invention and are not intended to limit the present invention. Any modifications, additions and equivalent substitutions should be included in the protection scope of the present invention.

Claims (5)

1. The method for detecting the virtual currency mining flow based on deep learning is characterized by comprising the following steps of:
(1) Each data flow grabbed in advance comprises a plurality of data packets, relevant information of each data packet is extracted and stored, and a tuple sequence with the format of < timestamp, packet length, source address ip, source address port number, destination address ip and destination address port number > is stored;
(2) Constructing a detection model based on a neural network, processing the data flow connected with each network into a plurality of detection inputs by utilizing the packet length, the time stamp and the target address information of each data packet, and then training the detection model by utilizing the detection inputs;
the structure of the detection model comprises two convolution layers, two pooling layers and three full-connection layers; the device specifically comprises a first convolution layer, a first pooling layer, a second convolution layer, a second pooling layer, a first full-connection layer, a second full-connection layer and a third full-connection layer which are sequentially connected;
wherein the number of convolution kernels of the first convolution layer is 20, the convolution kernel size is 2×20, and the step size is 2×1; the number of convolution kernels of the second convolution layer is 100, the convolution kernel size is 2×20, and the step size is 2×1; the window sizes of the first pooling layer and the second pooling layer are 1 multiplied by 5, and the step length is 1 multiplied by 1; the number of hidden layers of the first full-connection layer is 1200, the number of hidden layers of the second full-connection layer is 500, and the number of hidden layers of the third full-connection layer is 100;
the detection process of the detection model comprises the following steps: the detection input firstly enters a convolution layer, the convolution kernel and each input area are subjected to convolution operation, so that characteristics are extracted from the input, the characteristic values are input into an activation function, and the output obtained from the activation function enters a pooling layer; the pooling layer is used for reducing the scale of the feature matrix, so that the number of parameters is reduced to reduce the calculated amount of the training process;
after all the convolution layers and the pooling layers, obtaining advanced derivative characteristics of each group of detection inputs; these advanced derivative features are then passed to the fully connected layer, using these features to classify the input, while combining dropout to prevent overfitting;
the network output obtained finally is used for representing the correlation coefficient between the correlation network connection and the mining flow, the larger the numerical value is, the higher the probability that the data flow is the mining flow is, and when the network output is larger than the detection threshold value, the group of input detection results are considered to belong to the mining flow;
(3) Building a real-time detection system, wherein in the real-time detection system, a trained detection model is utilized to detect real-time data flow, and whether the real-time data flow is the mining flow is judged;
specifically, a real-time detection system is built by using DPDK-17.05.2, wherein two processes are used for respectively acquiring flow data and detecting flow;
in the detection process, relevant information of each network connection needs to be saved, including: the total number of data packets currently transmitted over the network connection, the packet length of each data packet, and the time stamp; the acquisition process judges the corresponding network connection according to the field information of the data packet received from the network port and updates the related information of the corresponding connection; when the number of packets of a certain network connection reaches a set scale, processing the relevant characteristics of the corresponding number of data packets belonging to the connection stored at present into a group of detection inputs and putting the detection inputs into a cache pool; the detection process then consumes the sets of detection inputs in the cache pool continuously, and uses the detection model to detect them.
2. The method for detecting the mining flow of the virtual currency based on deep learning according to claim 1, wherein in the step (1), the mining flow is from the virtual currency, and the data flow of the network connection in each mining process is captured through a tool Wireshark, and each network connection lasts for 1 hour; normal traffic comes from daily network usage, with data sizes 8-15 times greater than mine-mining traffic.
3. The method for detecting a flow rate of virtual currency mining based on deep learning according to claim 1, wherein in the step (2), a format of the detection input is as follows:
wherein, T represents the time sequence difference between the current packet and the previous data packet in the same direction, S represents the packet length of the data packet; in and out represent incoming and outgoing traffic, respectively, and are determined based on the source address and destination address of each packet.
4. A method for detecting a flow rate of virtual currency mining based on deep learning according to claim 3, wherein in training the detection model, for one data stream, each group of detection inputs sequentially takes N data packets on each feature in each direction, so that each detection input complies with a two-dimensional matrix format of 4×n, and an insufficient number of features are filled with 0; each feature of the next set of detection inputs starts from the next position adjacent to the last data currently input each feature until any feature is consumed by the detection model.
5. The method for detecting the mining flow of the virtual currency based on deep learning according to claim 1, wherein in the training process of the detection model, for each input sample in the training set, if the input sample belongs to the mining flow, a label with a value of 1 is used for identification, otherwise if the input sample belongs to the normal behavior flow, the value of the label used is 0;
then estimating a loss value using a classification cross entropy function, wherein before calculating the loss, a sigmoid function is required to map the output obtained by each input in the detection model to a section of (0, 1); the training process of loss function minimization uses Adam optimizers to optimize network node values.
CN202211325209.6A 2022-10-27 2022-10-27 A virtual currency mining traffic detection method based on deep learning Active CN116208356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211325209.6A CN116208356B (en) 2022-10-27 2022-10-27 A virtual currency mining traffic detection method based on deep learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211325209.6A CN116208356B (en) 2022-10-27 2022-10-27 A virtual currency mining traffic detection method based on deep learning

Publications (2)

Publication Number Publication Date
CN116208356A CN116208356A (en) 2023-06-02
CN116208356B true CN116208356B (en) 2023-09-29

Family

ID=86511902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211325209.6A Active CN116208356B (en) 2022-10-27 2022-10-27 A virtual currency mining traffic detection method based on deep learning

Country Status (1)

Country Link
CN (1) CN116208356B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116996278B (en) * 2023-07-21 2024-01-19 广东技术师范大学 Webpage detection method and device based on mining behavior of WASM module
CN118631589B (en) * 2024-08-09 2024-10-11 四川云互未来科技有限公司 A network traffic supervision anomaly identification and early warning method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821002A (en) * 2011-06-09 2012-12-12 中国移动通信集团河南有限公司信阳分公司 Method and system for network flow anomaly detection
CN107092862A (en) * 2017-03-16 2017-08-25 浙江零跑科技有限公司 A kind of track edge detection method based on convolutional neural networks
CN109120610A (en) * 2018-08-03 2019-01-01 上海海事大学 An Intrusion Detection Method Integrating Improved Intelligent Bee Colony Algorithm and BP Neural Network
WO2019042139A1 (en) * 2017-08-29 2019-03-07 京东方科技集团股份有限公司 Image processing method, image processing apparatus, and a neural network training method
WO2020156348A1 (en) * 2019-01-31 2020-08-06 青岛理工大学 Structural damage identification method based on ensemble empirical mode decomposition and convolution neural network
WO2021114231A1 (en) * 2019-12-11 2021-06-17 中国科学院深圳先进技术研究院 Training method and detection method for network traffic anomaly detection model
WO2022110027A1 (en) * 2020-11-27 2022-06-02 Boe Technology Group Co., Ltd. Computer-implemented image-processing method, image-enhancing convolutional neural network, and computer product

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821002A (en) * 2011-06-09 2012-12-12 中国移动通信集团河南有限公司信阳分公司 Method and system for network flow anomaly detection
CN107092862A (en) * 2017-03-16 2017-08-25 浙江零跑科技有限公司 A kind of track edge detection method based on convolutional neural networks
WO2019042139A1 (en) * 2017-08-29 2019-03-07 京东方科技集团股份有限公司 Image processing method, image processing apparatus, and a neural network training method
CN109120610A (en) * 2018-08-03 2019-01-01 上海海事大学 An Intrusion Detection Method Integrating Improved Intelligent Bee Colony Algorithm and BP Neural Network
WO2020156348A1 (en) * 2019-01-31 2020-08-06 青岛理工大学 Structural damage identification method based on ensemble empirical mode decomposition and convolution neural network
WO2021114231A1 (en) * 2019-12-11 2021-06-17 中国科学院深圳先进技术研究院 Training method and detection method for network traffic anomaly detection model
WO2022110027A1 (en) * 2020-11-27 2022-06-02 Boe Technology Group Co., Ltd. Computer-implemented image-processing method, image-enhancing convolutional neural network, and computer product

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Dipti Srinivasan ; Xin Jin ; Ruey Long Cheu.Evaluation of Adaptive Neural Network Models for Freeway Incident Detection.《 IEEE transactions on intelligent transportation systems》.2004,第1-11页. *
Hybrid intrusion detection model based on a designed autoencoder;Hou Yuluo;《 Journal of Ambient Intelligence and Humanized Computing》;第10799-10809页 *
基于循环神经网络的恶意软件行为检测技术研究;崔文杰;《中国优秀硕士学位论文全文数据库 信息科技辑》;全文 *

Also Published As

Publication number Publication date
CN116208356A (en) 2023-06-02

Similar Documents

Publication Publication Date Title
US10375143B2 (en) Learning indicators of compromise with hierarchical models
CN116208356B (en) A virtual currency mining traffic detection method based on deep learning
CN109936578A (en) A detection method for HTTPS tunnel traffic in the network
CN106534133B (en) DDOS defence installation and method based on deep learning in a kind of SDN
CN113079150B (en) Intrusion detection method for power terminal equipment
CN110392013A (en) Malware identification method, system and electronic device based on network traffic classification
Gulmezoglu Xai-based microarchitectural side-channel analysis for website fingerprinting attacks and defenses
Silveira et al. Smart detection-IoT: A DDoS sensor system for Internet of Things
Niu et al. Uncovering APT malware traffic using deep learning combined with time sequence and association analysis
Liang et al. FECC: DNS tunnel detection model based on CNN and clustering
Xia et al. An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network
Draghicescu et al. Crypto-mining application fingerprinting method
Imamverdiyev et al. Deep learning in cybersecurity: Challenges and approaches
Cui et al. CBSeq: A channel-level behavior sequence for encrypted malware traffic detection
CN110839042B (en) A flow-based self-feedback malware monitoring system and method
CN116155572A (en) Encryption traffic network intrusion detection method based on ensemble learning
CN115834097B (en) HTTPS malicious software flow detection system and method based on multiple views
Abdallah et al. An optimal framework for SDN based on deep neural network
Xie et al. Spatio-temporal graph convolutional networks for ddos attack detecting
Korba et al. AI-Driven Fast and Early Detection of IoT Botnet Threats: A Comprehensive Network Traffic Analysis Approach
Weitkamp et al. Maliot: Scalable and real-time malware traffic detection for iot networks
TW202205116A (en) Method for detecting malicious attacks and network security management device
Wang et al. MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision
Jaber et al. Methods for preventing DDoS attacks in cloud computing
Sun et al. Edge-Gateway Intrusion Detection for Smart Home

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant