WO2021103135A1 - 一种基于深度神经网络的流量分类方法、系统及电子设备 - Google Patents
一种基于深度神经网络的流量分类方法、系统及电子设备 Download PDFInfo
- Publication number
- WO2021103135A1 WO2021103135A1 PCT/CN2019/124267 CN2019124267W WO2021103135A1 WO 2021103135 A1 WO2021103135 A1 WO 2021103135A1 CN 2019124267 W CN2019124267 W CN 2019124267W WO 2021103135 A1 WO2021103135 A1 WO 2021103135A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- flow
- features
- data set
- dimensional
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2441—Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
Definitions
- This application belongs to the technical field of network data classification, and in particular relates to a method, system and electronic device for traffic classification based on a deep neural network.
- network traffic classification technology is the process of identifying network applications and traffic classification. It is a key link in modern network security and resource management systems. How to accurately classify and identify these network traffic to improve network security levels, provide accurate network services, and provide customers with better services is still a big challenge.
- network traffic classification technology mainly includes two parts: traditional network traffic classification and current machine learning-based network traffic classification. Among them:
- Port-based traffic classification method by analyzing and extracting some network applications or protocols that use fixed network ports, some of the port numbers are registered with the Internet Assigned Numbers Agency (IANA). By comparing with the IANA list one by one, you can know which application or which network protocol the network traffic belongs to, which has a good classification effect.
- IANA Internet Assigned Numbers Agency
- Load-based traffic classification method by extracting the load content of each IP network packet, including the characteristics of the network transmission protocol, network data content, and the byte size of the transmission packet. Different network applications or transmission protocols will produce different network behaviors or network traces when surfing the Internet. This method can perform efficient traffic classification based on this network characteristic, but the drawback is that it cannot analyze encrypted traffic.
- Network traffic classification technology based on machine learning It mainly includes classification methods based on supervised learning and classification methods based on unsupervised learning. These two types of machine learning technologies have been widely used in the field of network traffic classification research.
- the classification process is shown in Figure 1, and is generally divided into four steps: data preprocessing (Preprocessing), training and learning (Training), model evaluation (Evaluation), and prediction (Prediction).
- a) Classification method based on supervised learning Learn the potential knowledge between the data from the labeled training data, and carry out intensive training on this set of knowledge to form a model with classification learning experience to predict the label of the new data. Through continuous optimization of the model, to achieve the desired output effect.
- Wang Binfeng et al. invented a noisy network traffic classification modeling method based on statistical characteristics, which includes: Step 1. Network data collection and processing, real-time extraction of network traffic data from network traffic monitoring stations, and pre-processing of network traffic data Processing; Step 2. Establish a network traffic noise judgment model and remove the noise in the network traffic data; Step 3. Establish a network traffic noise tolerance model; Step 4. According to the network traffic noise judgment model and network traffic described in Steps 2 and 3 Noise tolerance model, establish a robust classification model; Step 5, use the random forest classification method, use the online network traffic data as the test set, and use the robust classification model for classification.
- Zhang Yu et al. invented a network traffic classification method based on the fusion algorithm of K_means and KNN. Their method framework is to construct a two-classifier for each application protocol, and the output of all the classifiers is integrated into the final output by the decision rule.
- the algorithm also integrates the unsupervised K_means algorithm and the supervised KNN algorithm.
- the method also proposes a feature selection algorithm based on K_means iteration. The purpose is to select high-resolution features to save time, space and improve classification. effect.
- the existing machine learning-based network traffic classification technology has better classification results than traditional network traffic classification methods, it also has many drawbacks, mainly including: manual feature extraction, which requires a lot of manpower Material resources; the density of existing traffic features is small, and network applications and protocol traffic features cannot be deeply utilized; the existing network traffic classification model is not very robust. As long as the data environment of network traffic changes, the model must be retrained Learning its characteristics, the classification effect obtained is not very good.
- This application provides a method, system and electronic device for traffic classification based on a deep neural network, which aims to solve one of the above technical problems in the prior art at least to a certain extent.
- a traffic classification method based on a deep neural network including the following steps:
- Step a Perform feature extraction on the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; where the extracted features include each Three-dimensional characteristics of forward flow, reverse flow, and transmission flow of a network flow;
- Step b Restructure the data set structure, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features and forward flow in each network flow based on the extracted three-dimensional features. Correlation coefficient matrix between the characteristics of the transport stream, the reverse flow and the transport stream, and output high-dimensional global convolution features;
- Step c Input the global convolution feature output by the CNN network into the LSTM network for training, and output the traffic classification prediction result.
- the technical solution adopted in the embodiment of the present application further includes: the step a further includes: collecting original network traffic and obtaining corresponding network logs; wherein, the original network traffic is collected through a network data center or a simulated local area network environment, and The content of the web log includes the interaction between web applications, the transmission load of the web applications and the server.
- the technical solution adopted in the embodiment of the present application further includes: in the step a, the feature extraction of the original network traffic, generating various types of network flow data, and marking the network flow data according to the network log specifically includes:
- Step a1 Combine the network packets ⁇ packet_1,packet_2,...,packet_n ⁇ with the same 5-tuple ⁇ source IP, source Port, destination IP, destination Port, transmission protocol (TCP,UDP) ⁇ into the corresponding network flow
- Step a2 Extract packet characteristics ⁇ Size-packet,Interval-packet,... ⁇ , flow characteristics ⁇ Length-flow,Flow packet-per,... ⁇ , state connection characteristics ⁇ Flag-Cnt,Active,... ⁇ , and each network ⁇ Forward flow (client->server), reverse flow (server->client), transport flow (tcp, udp) ⁇ three-dimensional features;
- Step a3 Check the five fields ⁇ source IP, source Port, destination IP, destination Port, transport protocol (TCP, UDP) ⁇ in the network log and each network flow, if the network flow and the network log have the same five yuan Group, the label of the network flow is marked as the corresponding network application or protocol in the network log.
- TCP transport protocol
- the technical solution adopted in the embodiment of the present application further includes: the step a further includes: preprocessing and normalizing the data set.
- the training process of the convolutional neural network specifically includes:
- Step b1 Input the labeled data set into the convolutional neural network
- Step b2 Based on the extracted three-dimensional features, respectively calculate the correlation coefficient matrix between the forward flow and reverse flow characteristics, the forward flow and the transmission flow characteristics, the reverse flow and the transmission flow characteristics in each network flow, and generate a three-dimensional Characteristic network flow data set structure;
- Step b3 In order to adapt to the data input format of the convolutional neural network, the data set format is transformed to (None, 25, 25, 3); among them, the transformed data format (None, 25, 25, 3) can be regarded as 25x25 color picture with 3 channels;
- Step b4 Use the transformed data set to train the convolutional neural network to obtain high-dimensional global convolution features.
- the convolutional neural network includes a convolutional layer, a pooling layer, and a fully connected layer; the convolutional layer is used to extract local characteristics; the The pooling layer is used to divide the high-dimensional features generated after convolution into several regions, and the maximum or average value of each region is taken to obtain new smaller-dimensional features; the fully connected layer is used to divide all high-dimensional features The feature is converted to a global feature.
- the technical solution adopted in the embodiment of this application also includes: in the step c, after the LSTM network is trained, a multi-dimensional sequence correlation flow (Corr-Flow Vector) vector feature is obtained; then the fully connected layer is connected, and the softmax is used as the activation function , Output the predicted probability matrix of each class, and finally get the traffic classification prediction result.
- a multi-dimensional sequence correlation flow Corr-Flow Vector
- the technical solution adopted in the embodiment of the present application further includes: after the step c, it further includes: evaluating the accuracy of the model with a test data set of the same structure and testing and verifying it.
- a traffic classification system based on a deep neural network including:
- Data set generation module used to extract features of the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; among them, the extracted The characteristics include the three-dimensional characteristics of forward flow, reverse flow, and transmission flow of each network flow;
- CNN feature extraction module used to reconstruct the structure of the data set, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features in each network flow based on the extracted three-dimensional features. , The correlation coefficient matrix between forward flow and transmission flow characteristics, reverse flow and transmission flow characteristics, and output high-dimensional global convolution features;
- LSTM prediction module used to input the global convolution features output by the CNN network into the LSTM network for training, and output traffic classification prediction results.
- an electronic device including:
- At least one processor At least one processor
- a memory communicatively connected with the at least one processor; wherein,
- the memory stores instructions executable by the one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute the following of the above-mentioned deep neural network-based traffic classification method: operating:
- Step a Perform feature extraction on the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; where the extracted features include each Three-dimensional characteristics of forward flow, reverse flow, and transmission flow of a network flow;
- Step b Restructure the data set structure, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features and forward flow in each network flow based on the extracted three-dimensional features. Correlation coefficient matrix between the characteristics of the transport stream, the reverse flow and the transport stream, and output high-dimensional global convolution features;
- Step c Input the global convolution features output by the CNN network into the LSTM network for training, and output the traffic classification prediction result.
- the beneficial effects produced by the embodiments of this application are: the methods, systems and electronic devices for traffic classification based on deep neural networks in the embodiments of this application propose a traffic classification scheme based on CNN+LSTM, which uses each item for the first time.
- the forward flow, reverse flow, and transmission flow characteristics of the network flow are taken as global features.
- you can fully understand the network behavior; at the same time, using the deep learning neural network algorithm to do traffic classification can automatically Convolution extracts high-dimensional features, continuously iterative feature learning, and automatically learns parameters until the learning rate does not change. As a result, good classification accuracy is achieved.
- the present application can improve the accuracy and performance of network traffic classification.
- FIG. 1 is a flowchart of a method for traffic classification based on a deep neural network according to an embodiment of the present application
- FIG. 2 is a schematic structural diagram of a traffic classification system based on a deep neural network according to an embodiment of the present application
- FIG. 3 is a schematic diagram of a hardware device structure of a method for traffic classification based on a deep neural network provided by an embodiment of the present application.
- FIG. 1 is a flowchart of a method for traffic classification based on a deep neural network according to an embodiment of the present application.
- the method for traffic classification based on a deep neural network in the embodiment of the present application includes the following steps:
- Step 100 Collect raw network traffic (Raw Traffic), and obtain corresponding network logs;
- step 100 collecting original network traffic specifically refers to collecting network traffic through a network data center or a simulated local area network environment.
- monitor the network data center by setting the dedicated network monitoring software parameters, such as enabling the SNMP protocol to periodically poll the smart switching nodes that enable the SNMP service to obtain traffic statistics based on the device port.
- Other protocols operate in the same way.
- Step 200 Perform feature extraction of the original network traffic based on the network packet classification technology, generate various types of network flow data (Flow Data), and mark the network flow data according to the network log to generate a data set for building a deep neural network ;
- Flow Data network flow data
- the feature extraction of network traffic includes: packet feature ⁇ Size-packet, Interval-packet,... ⁇ , flow feature ⁇ Length-flow, Flow packet-per,... ⁇ , state connection feature ⁇ Flag-Cnt, Active,... ⁇ , etc., and extract the three-dimensional characteristics of each network flow ⁇ forward flow (client->server), reverse flow (server->client), transport flow (tcp, udp) ⁇ , and the three-dimensional characteristics of each network flow
- the characteristics of forward flow, reverse flow, and transmission flow are both different and inherently related.
- This application uses the correlation coefficient matrix of these three network flows as the input of the deep neural network, so as to have a deep understanding of the characteristics of network traffic Contact to improve classification accuracy.
- the network flow data mark is specifically: by detecting the five fields ⁇ source IP, source Port, destination IP, destination Port, transport protocol (TCP, UDP) ⁇ in the network log and each network flow, if the network flow and the network log are If there is the same 5-tuple, the label of the network flow is marked as the corresponding network application or protocol in the network log.
- Step 300 Perform preprocessing and normalization processing on the data set to obtain a marked network flow data set
- Step 400 reconstruct the structure of the training data set, and train a Convolutional Neural Network (CNN) through the reconstructed training data set to obtain high-dimensional global convolution features;
- CNN Convolutional Neural Network
- step 400 the training process of the convolutional neural network specifically includes the following steps:
- Step 401 Input the marked training data set into the convolutional neural network
- Step 402 Based on the extracted three-dimensional features, respectively calculate the correlation coefficient matrix between the forward flow and reverse flow characteristics, the forward flow and the transmission flow characteristics, the reverse flow and the transmission flow characteristics in each network flow, and generate a three-dimensional Characteristic network flow data set structure.
- each network flow can be roughly divided into 75 features, including 25 features for forward flow, 25 features for reverse flow, and 25 features for transmission flow. The correlation coefficient matrix between the two is calculated respectively.
- Step 403 In order to adapt to the data input format of the convolutional neural network, transform the data set format to (None, 25, 25, 3); for example: advanced neural network Keras, if you use Theano and Caffe as the backend, use (sample Number, number of channels, row or height, column or width) The channel first method is called channels_first; if you use TensorFlow as the backend, use (sample number, row or height, column or Width, number of channels) The way after the channel is called channels_last.
- the transformed data format (None, 25, 25, 3) can be regarded as a 25x25 color picture with 3 channels, which can better convolution operations to obtain comprehensive convolution features.
- Step 404 Use the reconstructed training data set to train the convolutional neural network to obtain high-dimensional global convolution features
- the convolutional neural network generally includes the following layers:
- Each convolutional layer in CNN can be composed of several convolutional units, and the parameters of each convolutional unit are optimized by backpropagation algorithm.
- the purpose of the convolution operation is to extract local features.
- the first layer of convolution may only extract some low-level features such as edges, lines, and corners. With more network layers, more complex local features can be extracted.
- the activation function (Activation function) can transform the features through nonlinear transformation, making it more suitable for reality and reducing over-fitting;
- 2Pooling layer usually a large number of high-dimensional features are generated after convolution. These high-dimensional features are divided into several regions, and the maximum or average value of each region is taken to obtain a new smaller dimension feature;
- 3Fully-Connected layer Convert all high-dimensional features into global features.
- Step 500 Re-adjust the structure of the global convolution features output by the convolutional neural network and input them into the Long Short-Term Memory (LSTM) for training, and output the final traffic classification prediction results;
- LSTM Long Short-Term Memory
- the LSTM network is composed of different network units or memory blocks.
- the LSTM unit generally outputs two states to the next LSTM unit, namely the unit state and the hidden state.
- the memory block is responsible for memorizing events in each hidden state or previous time step. This memory method is generally implemented through three gate control mechanisms: input gate, forget gate and output gate.
- this application uses the LSTM network to use sequence features as input for predictive classification, which can learn the relationship between features well and obtain high classification accuracy.
- Step 600 Evaluate the accuracy of the model with a test data set of the same structure and test and verify it, so as to improve the classification accuracy and robustness of the model;
- step 600 by verifying the model with the same structure of the test set, automatic convolution to obtain many high-dimensional features, and using the training deep neural model to obtain a higher classification recognition rate and accuracy.
- FIG. 2 is a schematic structural diagram of a traffic classification system based on a deep neural network according to an embodiment of the present application.
- the deep neural network-based traffic classification system of the embodiment of the present application includes a data acquisition module, a data set generation module, a data set processing module, a CNN feature extraction module, an LSTM prediction module, and a test module.
- Data collection module used to collect raw network traffic (Raw Traffic) and obtain corresponding network logs; among them, collecting raw network traffic specifically refers to network traffic collection through a network data center or a simulated LAN environment.
- Other protocols operate in the same way. Or set a specific network protocol in the simulated LAN environment, and let the corresponding network application service obtain network traffic data through the firewall.
- In order to accurately mark network traffic when collecting network traffic, it is necessary to obtain corresponding network logs. These logs record in detail the interaction between network applications, the transmission load of network applications and servers, etc.
- Data set generation module used to extract features of original network traffic based on network packet classification technology, generate various types of network flow data (Flow Data), and mark network flow data according to network logs to generate deep neural networks
- the data set generation module includes:
- a feature extraction unit used to extract network traffic characteristics; network traffic feature extraction includes: packet characteristics ⁇ Size-packet, Interval-packet,... ⁇ , flow characteristics ⁇ Length-flow, Flow packet-per,... ⁇ , state connection characteristics ⁇ Flag-Cnt, Active,... ⁇ , etc., and extract the ⁇ forward flow (client->server), reverse flow (server->client), transport flow (tcp, udp) ⁇ three-dimensional features of each network flow, The characteristics of the forward flow, reverse flow, and transmission flow of each network flow have both differences and internal connections.
- This application uses the correlation coefficient matrices of these three network flows as the input of the deep neural network, so as to achieve a deeper level Understand the characteristics of network traffic and improve classification accuracy.
- the network flow marking unit used to mark network flow data; by detecting the five fields ⁇ source IP, source Port, destination IP, destination Port, transport protocol (TCP, UDP) ⁇ in the network log and each network flow, If the network flow and the network log have the same 5-tuple, the label of the network flow is marked as the corresponding network application or protocol in the network log.
- Data set processing module used to preprocess and normalize the data set to obtain a marked network flow data set
- CNN feature extraction module used to reconstruct the structure of the training data set, and train a Convolutional Neural Network (CNN) through the reconstructed training data set to obtain high-dimensional global convolution features; the CNN feature extraction module specifically includes The following operations:
- each network flow can be roughly divided into 75 features, including 25 features for forward flow, 25 features for reverse flow, and 25 features for transmission flow.
- the correlation coefficient matrix between the two is calculated respectively.
- the data set format is transformed to (None, 25, 25, 3); for example: advanced neural network Keras, if you use Theano and Caffe as the backend, use (number of samples) , Channel number, row or height, column or width)
- the channel first method is called channels_first; if you use TensorFlow as the backend, use (sample number, row or height, column or width) , The number of channels)
- the way after the channel is called channels_last.
- the transformed data format (None, 25, 25, 3) can be regarded as a 25x25 color picture with 3 channels, which can better convolution operations to obtain comprehensive convolution features.
- the convolutional neural network with the reconstructed training data set to obtain high-dimensional global convolutional features;
- the convolutional neural network generally includes the following layers:
- Each convolutional layer in CNN can be composed of several convolution units, and the parameters of each convolution unit are optimized by backpropagation algorithm.
- the purpose of the convolution operation is to extract local features.
- the first layer of convolution may only extract some low-level features such as edges, lines, and corners. With more network layers, more complex local features can be extracted.
- the activation function (Activation function) can transform the features through nonlinear transformation, making it more suitable for reality and reducing over-fitting;
- 2Pooling layer usually a large number of high-dimensional features are generated after convolution. These high-dimensional features are divided into several regions, and the maximum or average value of each region is taken to obtain a new smaller dimension feature;
- 3Fully-Connected layer Convert all high-dimensional features into global features.
- LSTM prediction module used to re-adjust the structure of the global convolutional features output by the convolutional neural network and input it into the Long Short-Term Memory (LSTM) for training, and output the final traffic classification prediction results; among them, LSTM
- the network is composed of different network units or memory blocks.
- the LSTM unit generally outputs two states to the next LSTM unit, namely the unit state and the hidden state.
- the memory block is responsible for memorizing events in each hidden state or previous time step. This memory method is generally implemented through three gate control mechanisms: input gate, forget gate and output gate.
- multi-dimensional sequence correlation flow (Corr-Flow Vector) vector features can be obtained; then the fully connected layer is connected, and softmax is used as the activation function to output the predicted probability matrix of each class, and finally the traffic classification prediction result is obtained .
- this application uses the LSTM network to use sequence features as input for predictive classification, which can learn the relationship between features well and obtain high classification accuracy.
- Test module used to evaluate the accuracy of the model and test and verify it with the test data set of the same structure to improve the classification accuracy and robustness of the model; by verifying the model with the test set of the same structure, automatic convolution can obtain many high-dimensional features , And training deep neural models can achieve higher classification recognition rate and accuracy.
- FIG. 3 is a schematic diagram of a hardware device structure of a method for traffic classification based on a deep neural network provided by an embodiment of the present application.
- the device includes one or more processors and memory. Taking a processor as an example, the device may also include: an input system and an output system.
- the processor, the memory, the input system, and the output system may be connected by a bus or other methods.
- the connection by a bus is taken as an example.
- the memory can be used to store non-transitory software programs, non-transitory computer executable programs, and modules.
- the processor executes various functional applications and data processing of the electronic device by running non-transitory software programs, instructions, and modules stored in the memory, that is, realizing the processing methods of the foregoing method embodiments.
- the memory may include a program storage area and a data storage area, where the program storage area can store an operating system and an application program required by at least one function; the data storage area can store data and the like.
- the memory may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices.
- the memory may optionally include a memory remotely provided with respect to the processor, and these remote memories may be connected to the processing system through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
- the input system can receive input digital or character information, and generate signal input.
- the output system may include display devices such as a display screen.
- the one or more modules are stored in the memory, and when executed by the one or more processors, the following operations of any of the foregoing method embodiments are performed:
- Step a Perform feature extraction on the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; where the extracted features include each Three-dimensional characteristics of forward flow, reverse flow, and transmission flow of a network flow;
- Step b Restructure the data set structure, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features and forward flow in each network flow based on the extracted three-dimensional features. Correlation coefficient matrix between the characteristics of the transport stream, the reverse flow and the transport stream, and output high-dimensional global convolution features;
- Step c Input the global convolution feature output by the CNN network into the LSTM network for training, and output the traffic classification prediction result.
- the embodiments of the present application provide a non-transitory (non-volatile) computer storage medium.
- the computer storage medium stores computer-executable instructions, and the computer-executable instructions can perform the following operations:
- Step a Perform feature extraction on the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; where the extracted features include each Three-dimensional characteristics of forward flow, reverse flow, and transmission flow of a network flow;
- Step b Restructure the data set structure, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features and forward flow in each network flow based on the extracted three-dimensional features. Correlation coefficient matrix between the characteristics of the transport stream, the reverse flow and the transport stream, and output high-dimensional global convolution features;
- Step c Input the global convolution feature output by the CNN network into the LSTM network for training, and output the traffic classification prediction result.
- the embodiment of the present application provides a computer program product, the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, when the program instructions are executed by a computer To make the computer do the following:
- Step a Perform feature extraction on the original network traffic, generate various types of network flow data, and mark the network flow data according to the network log to generate a data set for building a deep neural network; where the extracted features include each Three-dimensional characteristics of forward flow, reverse flow, and transmission flow of a network flow;
- Step b Restructure the data set structure, and train the CNN network through the reconstructed data set.
- the CNN network calculates the forward flow and reverse flow features and forward flow in each network flow based on the extracted three-dimensional features. Correlation coefficient matrix between the characteristics of the transport stream, the reverse flow and the transport stream, and output high-dimensional global convolution features;
- Step c Input the global convolution feature output by the CNN network into the LSTM network for training, and output the traffic classification prediction result.
- the method, system and electronic device for traffic classification based on deep neural networks in the embodiments of this application propose a traffic classification scheme based on CNN+LSTM, which uses the forward flow, reverse flow, and transport flow characteristics of each network flow as the global Feature, by analyzing and mining the association between these three, you can fully understand the network behavior; at the same time, using the deep learning neural network algorithm to do traffic classification, it can automatically convolution to extract high-dimensional features, iterative feature learning, automatic learning parameters, Until the learning rate does not change, the result is a good classification accuracy. Compared with the prior art, the present application can improve the accuracy and performance of network traffic classification.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Computational Linguistics (AREA)
- General Engineering & Computer Science (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
- 一种基于深度神经网络的流量分类方法,其特征在于,包括以下步骤:步骤a:对原始网络流量进行特征提取,生成各种类型的网络流数据,并根据网络日志对网络流数据进行标记,生成用于构建深度神经网络的数据集;其中,所提取的特征包括每条网络流的前向流、反向流、传输流三维特征;步骤b:重构数据集结构,并通过重构的数据集训练CNN网络,所述CNN网络基于提取的三维特征,分别计算每条网络流中的前向流和反向流特征、前向流和传输流特征、反向流和传输流特征之间的相关系数矩阵,输出高维度的全局卷积特征;步骤c:将所述CNN网络输出的全局卷积特征输入LSTM网络进行训练,并输出流量分类预测结果。
- 根据权利要求1所述的基于深度神经网络的流量分类方法,其特征在于,所述步骤a还包括:采集原始网络流量,并获取相应的网络日志;其中,所述原始网络流量通过网络数据中心或者模拟局域网环境进行采集,所述网络日志内容包括网络应用间的交互行为、网络应用和服务端的传输负载。
- 根据权利要求2所述的基于深度神经网络的流量分类方法,其特征在于,在所述步骤a中,所述对原始网络流量进行特征提取,生成各种类型的网络流数据,并根据网络日志对网络流数据进行标记具体包括:步骤a1:将拥有相同的五元组{源IP,源Port,目的IP,目的Port,传输协议(TCP,UDP)}的网络包{packet_1,packet_2,…,packet_n}归并为对应的网络流Flow_i={packet_1,packet_2,…,packet_n}(i=1,2,…,n);步骤a2:提取包特征{Size-packet,Interval-packet,…}、流特征{Length-flow,Flow packet-per,…}、状态连接特征{Flag-Cnt,Active,…},以及每条网络流的{前向流(client->server),反向流(server->client),传输流(tcp,udp)}三维特征;步骤a3:检测网络日志和每条网络流中的{源IP,源Port,目的IP,目的Port,传输协议(TCP,UDP)}五个字段,如果网络流与网络日志中有相同的五元组,则将该条网络流的标签标记为网络日志中对应的网络应用或者协议。
- 根据权利要求1所述的基于深度神经网络的流量分类方法,其特征在于,所述步骤a还包括:对数据集进行预处理及归一化处理。
- 根据权利要求1至4任一项所述的基于深度神经网络的流量分类方法,其特征在于,在所述步骤b中,所述卷积神经网络的训练过程具体包括:步骤b1:将标记好的数据集输入卷积神经网络中;步骤b2:基于提取的三维特征,分别计算每条网络流中的前向流和反向流特征、前向流和传输流特征、反向流和传输流特征之间的相关系数矩阵,生成三维特征的网络流数据集结构;步骤b3:为了适应卷积神经网的数据输入格式,将数据集格式变换为(None,25,25,3);其中,变换后的数据格式(None,25,25,3)可以看成是25x25的彩色图片3通道;步骤b4:用变换后的数据集训练卷积神经网络,得到高维度的全局卷积特征。
- 根据权利要求5所述的基于深度神经网络的流量分类方法,其特征在于,在所述步骤b中,所述卷积神经网络包括卷积层、池化层和全连接层;所述卷积层用于提取局部特性;所述池化层用于将卷积之后产生的高维度特征分成几个 区域,取每个区域的最大值或者平均值,得到新的较小维特征;所述全连接层用于将所有高维的特征转换成全局特征。
- 根据权利要求5所述的基于深度神经网络的流量分类方法,其特征在于,在所述步骤c中,经过LSTM网络训练后,得到多维的序列相关流(Corr-Flow Vector)向量特征;然后连接全连接层,并用softmax做激活函数,输出预测的每个类的概率矩阵,最终得到流量分类预测结果。
- 根据权利要求7所述的基于深度神经网络的流量分类方法,其特征在于,所述步骤c后还包括:用相同结构的测试数据集评估模型的精确度并测试验证。
- 一种基于深度神经网络的流量分类系统,其特征在于,包括:数据集生成模块:用于对原始网络流量进行特征提取,生成各种类型的网络流数据,并根据网络日志对网络流数据进行标记,生成用于构建深度神经网络的数据集;其中,所提取的特征包括每条网络流的前向流、反向流、传输流三维特征;CNN特征提取模块:用于重构数据集结构,并通过重构的数据集训练CNN网络,所述CNN网络基于提取的三维特征,分别计算每条网络流中的前向流和反向流特征、前向流和传输流特征、反向流和传输流特征之间的相关系数矩阵,输出高维度的全局卷积特征;LSTM预测模块:用于将所述CNN网络输出的全局卷积特征输入LSTM网络进行训练,并输出流量分类预测结果。
- 一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述一个处理器执行的指令,所述指令被所述至少一 个处理器执行,以使所述至少一个处理器能够执行上述1至8任一项所述的基于深度神经网络的流量分类方法的以下操作:步骤a:对原始网络流量进行特征提取,生成各种类型的网络流数据,并根据网络日志对网络流数据进行标记,生成用于构建深度神经网络的数据集;其中,所提取的特征包括每条网络流的前向流、反向流、传输流三维特征;步骤b:重构数据集结构,并通过重构的数据集训练CNN网络,所述CNN网络基于提取的三维特征,分别计算每条网络流中的前向流和反向流特征、前向流和传输流特征、反向流和传输流特征之间的相关系数矩阵,输出高维度的全局卷积特征;步骤c:将所述CNN网络输出的全局卷积特征输入LSTM网络进行训练,并输出流量分类预测结果。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911164170.2A CN110896381B (zh) | 2019-11-25 | 2019-11-25 | 一种基于深度神经网络的流量分类方法、系统及电子设备 |
CN201911164170.2 | 2019-11-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021103135A1 true WO2021103135A1 (zh) | 2021-06-03 |
Family
ID=69786801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/124267 WO2021103135A1 (zh) | 2019-11-25 | 2019-12-10 | 一种基于深度神经网络的流量分类方法、系统及电子设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110896381B (zh) |
WO (1) | WO2021103135A1 (zh) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113408202A (zh) * | 2021-06-18 | 2021-09-17 | 国网湖南省电力有限公司 | 面向变电站核心工控业务的流量基线模型构造方法 |
CN113949653A (zh) * | 2021-10-18 | 2022-01-18 | 中铁二院工程集团有限责任公司 | 一种基于深度学习的加密协议识别方法及系统 |
CN114338853A (zh) * | 2021-12-31 | 2022-04-12 | 西南民族大学 | 一种工业互联网下的区块链流量监检测方法 |
CN114338437A (zh) * | 2022-01-13 | 2022-04-12 | 北京邮电大学 | 网络流量分类方法、装置、电子设备及存储介质 |
CN114358118A (zh) * | 2021-11-29 | 2022-04-15 | 南京邮电大学 | 一种基于跨模态特征融合的多任务加密网络流量分类方法 |
CN114520838A (zh) * | 2022-01-11 | 2022-05-20 | 北京交通大学 | 一种基于k近邻的自定义协议应用层的网络报文匹配方法 |
CN114679310A (zh) * | 2022-03-22 | 2022-06-28 | 安徽赛福贝特信息技术有限公司 | 一种网络信息安全检测方法 |
CN114793197A (zh) * | 2022-03-29 | 2022-07-26 | 广州杰赛科技股份有限公司 | 基于nfv的网络资源配置方法、装置、设备及存储介质 |
CN114818933A (zh) * | 2021-12-23 | 2022-07-29 | 金数信息科技(苏州)有限公司 | 一种基于Epsilon贪心算法监测人工流量作弊的方法及装置 |
CN114844840A (zh) * | 2022-04-26 | 2022-08-02 | 哈尔滨工业大学 | 一种基于计算似然比的分布外网络流量数据检测方法 |
CN115277888A (zh) * | 2022-09-26 | 2022-11-01 | 中国电子科技集团公司第三十研究所 | 一种移动应用加密协议报文类型解析方法及系统 |
CN115297016A (zh) * | 2022-05-07 | 2022-11-04 | 国网江苏省电力有限公司淮安供电分公司 | 一种基于深度学习的电力网络活跃度评价和预测方法 |
WO2023016159A1 (zh) * | 2021-08-12 | 2023-02-16 | 北京邮电大学 | 智慧城市网络流量预测方法及系统 |
CN115712614A (zh) * | 2022-11-07 | 2023-02-24 | 航科广软(广州)数字科技有限公司 | 基于数据传输流控制的信息处理方法及系统 |
WO2023040962A1 (zh) * | 2021-09-18 | 2023-03-23 | 深圳比特微电子科技有限公司 | 参数配置模型的训练方法、参数配置方法和参数配置设备 |
CN116029219A (zh) * | 2023-02-27 | 2023-04-28 | 中国空气动力研究与发展中心计算空气动力研究所 | 一种飞行器气动热预测方法、装置、设备及存储介质 |
CN116647877A (zh) * | 2023-06-12 | 2023-08-25 | 广州爱浦路网络技术有限公司 | 一种基于图卷积模型的流量类别验证方法和系统 |
CN116708313A (zh) * | 2023-08-08 | 2023-09-05 | 中国电信股份有限公司 | 流量检测方法、流量检测装置、存储介质和电子设备 |
CN117463506A (zh) * | 2023-12-26 | 2024-01-30 | 浙江佳环电子有限公司 | 自适应恒流恒压控制高压电源 |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111565311B (zh) * | 2020-04-29 | 2022-02-25 | 杭州迪普科技股份有限公司 | 网络流量特征生成方法及装置 |
CN111885213A (zh) * | 2020-06-09 | 2020-11-03 | 中国科学院信息工程研究所 | 一种基于门控卷积变分自编码器的IPv6地址发现方法和装置 |
CN111817981A (zh) * | 2020-07-01 | 2020-10-23 | 黄东 | 一种基于深度学习的网络流量分类方法 |
CN111935134A (zh) * | 2020-08-06 | 2020-11-13 | 中国交通通信信息中心 | 一种复杂网络安全风险监测方法和系统 |
CN112163594B (zh) * | 2020-08-28 | 2022-07-26 | 南京邮电大学 | 一种网络加密流量识别方法及装置 |
CN112153045B (zh) * | 2020-09-24 | 2023-03-28 | 中国人民解放军战略支援部队信息工程大学 | 一种私有协议的加密字段的识别方法及系统 |
CN112261063A (zh) * | 2020-11-09 | 2021-01-22 | 北京理工大学 | 结合深度分层网络的网络恶意流量检测方法 |
CN112671600A (zh) * | 2020-12-09 | 2021-04-16 | 中国科学院深圳先进技术研究院 | 网络流的特征提取方法、网络流异常检测方法及相关装置 |
CN112800142B (zh) * | 2020-12-15 | 2023-08-08 | 赛尔网络有限公司 | Mr作业处理方法、装置、电子设备及存储介质 |
CN112910881A (zh) * | 2021-01-28 | 2021-06-04 | 武汉市博畅软件开发有限公司 | 一种基于通信协议的数据监控方法及系统 |
CN112990108B (zh) * | 2021-04-19 | 2022-12-27 | 四川省水利科学研究院 | 一种基于卷积神经网络实现堤坝护坡的系统 |
CN113225331A (zh) * | 2021-04-30 | 2021-08-06 | 中国科学技术大学 | 基于图神经网络的主机入侵安全检测方法、系统及装置 |
CN113347659B (zh) * | 2021-06-01 | 2022-12-23 | 深圳市大数据研究院 | 流量预测方法及装置 |
CN114459760B (zh) * | 2021-12-31 | 2024-05-24 | 南京理工大学 | 一种强噪声环境下的滚动轴承故障诊断方法及系统 |
CN114422623B (zh) * | 2022-01-17 | 2022-11-18 | 山西省信息通信网络技术保障中心 | 一种基于指令序列的车联网异常流量识别方法及装置 |
CN115396346B (zh) * | 2022-08-30 | 2023-11-28 | 北京知道创宇信息技术股份有限公司 | 仿真压力测试方法、装置、系统和电子设备 |
CN115549780B (zh) * | 2022-08-30 | 2024-06-14 | 北京邮电大学 | 光通信网络性能参数监测方法及装置 |
CN116170384A (zh) * | 2023-04-24 | 2023-05-26 | 北京智芯微电子科技有限公司 | 边缘计算业务感知方法及装置、边缘计算设备 |
CN117041360A (zh) * | 2023-06-02 | 2023-11-10 | 广州大学 | 一种基于自监督学习的网络流独立编码方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283859A1 (en) * | 2015-03-25 | 2016-09-29 | Cisco Technology, Inc. | Network traffic classification |
CN109167680A (zh) * | 2018-08-06 | 2019-01-08 | 浙江工商大学 | 一种基于深度学习的流量分类方法 |
CN109361617A (zh) * | 2018-09-26 | 2019-02-19 | 中国科学院计算机网络信息中心 | 一种基于网络包载荷的卷积神经网络流量分类方法及系统 |
CN109639481A (zh) * | 2018-12-11 | 2019-04-16 | 深圳先进技术研究院 | 一种基于深度学习的网络流量分类方法、系统及电子设备 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10154051B2 (en) * | 2016-08-31 | 2018-12-11 | Cisco Technology, Inc. | Automatic detection of network threats based on modeling sequential behavior in network traffic |
GB201714917D0 (en) * | 2017-09-15 | 2017-11-01 | Spherical Defence Labs Ltd | Detecting anomalous application messages in telecommunication networks |
CN108200030A (zh) * | 2017-12-27 | 2018-06-22 | 深信服科技股份有限公司 | 恶意流量的检测方法、系统、装置及计算机可读存储介质 |
CN109995601B (zh) * | 2017-12-29 | 2020-12-01 | 中国移动通信集团上海有限公司 | 一种网络流量识别方法及装置 |
US11368476B2 (en) * | 2018-02-22 | 2022-06-21 | Helios Data Inc. | Data-defined architecture for network data management |
CN109104441A (zh) * | 2018-10-24 | 2018-12-28 | 上海交通大学 | 一种基于深度学习的加密恶意流量的检测系统和方法 |
CN109981485A (zh) * | 2019-03-25 | 2019-07-05 | 北京理工大学 | 基于长短期记忆网络的V2ray流量识别方法 |
KR102046789B1 (ko) * | 2019-04-05 | 2019-11-20 | 호서대학교 산학협력단 | 웹 어플리케이션에 대한 딥러닝 기반의 침입탐지 방법, 시스템 및 컴퓨터 프로그램 |
CN110213244A (zh) * | 2019-05-15 | 2019-09-06 | 杭州电子科技大学 | 一种基于时空特征融合的网络入侵检测方法 |
CN110138787A (zh) * | 2019-05-20 | 2019-08-16 | 福州大学 | 一种基于混合神经网络的异常流量检测方法及系统 |
CN110147877A (zh) * | 2019-05-24 | 2019-08-20 | 福州大学 | 基于卷积长短时网络的pm2.5预测方法 |
-
2019
- 2019-11-25 CN CN201911164170.2A patent/CN110896381B/zh active Active
- 2019-12-10 WO PCT/CN2019/124267 patent/WO2021103135A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283859A1 (en) * | 2015-03-25 | 2016-09-29 | Cisco Technology, Inc. | Network traffic classification |
CN109167680A (zh) * | 2018-08-06 | 2019-01-08 | 浙江工商大学 | 一种基于深度学习的流量分类方法 |
CN109361617A (zh) * | 2018-09-26 | 2019-02-19 | 中国科学院计算机网络信息中心 | 一种基于网络包载荷的卷积神经网络流量分类方法及系统 |
CN109639481A (zh) * | 2018-12-11 | 2019-04-16 | 深圳先进技术研究院 | 一种基于深度学习的网络流量分类方法、系统及电子设备 |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113408202B (zh) * | 2021-06-18 | 2022-04-08 | 国网湖南省电力有限公司 | 面向变电站核心工控业务的流量基线模型构造方法 |
CN113408202A (zh) * | 2021-06-18 | 2021-09-17 | 国网湖南省电力有限公司 | 面向变电站核心工控业务的流量基线模型构造方法 |
WO2023016159A1 (zh) * | 2021-08-12 | 2023-02-16 | 北京邮电大学 | 智慧城市网络流量预测方法及系统 |
WO2023040962A1 (zh) * | 2021-09-18 | 2023-03-23 | 深圳比特微电子科技有限公司 | 参数配置模型的训练方法、参数配置方法和参数配置设备 |
CN113949653A (zh) * | 2021-10-18 | 2022-01-18 | 中铁二院工程集团有限责任公司 | 一种基于深度学习的加密协议识别方法及系统 |
CN113949653B (zh) * | 2021-10-18 | 2023-07-07 | 中铁二院工程集团有限责任公司 | 一种基于深度学习的加密协议识别方法及系统 |
CN114358118A (zh) * | 2021-11-29 | 2022-04-15 | 南京邮电大学 | 一种基于跨模态特征融合的多任务加密网络流量分类方法 |
CN114818933A (zh) * | 2021-12-23 | 2022-07-29 | 金数信息科技(苏州)有限公司 | 一种基于Epsilon贪心算法监测人工流量作弊的方法及装置 |
CN114818933B (zh) * | 2021-12-23 | 2024-05-28 | 金数信息科技(苏州)有限公司 | 一种基于Epsilon贪心算法监测人工流量作弊的方法及装置 |
CN114338853A (zh) * | 2021-12-31 | 2022-04-12 | 西南民族大学 | 一种工业互联网下的区块链流量监检测方法 |
CN114338853B (zh) * | 2021-12-31 | 2022-09-20 | 西南民族大学 | 一种工业互联网下的区块链流量监检测方法 |
CN114520838A (zh) * | 2022-01-11 | 2022-05-20 | 北京交通大学 | 一种基于k近邻的自定义协议应用层的网络报文匹配方法 |
CN114520838B (zh) * | 2022-01-11 | 2023-10-17 | 北京交通大学 | 一种基于k近邻的自定义协议应用层的网络报文匹配方法 |
CN114338437A (zh) * | 2022-01-13 | 2022-04-12 | 北京邮电大学 | 网络流量分类方法、装置、电子设备及存储介质 |
CN114338437B (zh) * | 2022-01-13 | 2023-12-29 | 北京邮电大学 | 网络流量分类方法、装置、电子设备及存储介质 |
CN114679310A (zh) * | 2022-03-22 | 2022-06-28 | 安徽赛福贝特信息技术有限公司 | 一种网络信息安全检测方法 |
CN114793197A (zh) * | 2022-03-29 | 2022-07-26 | 广州杰赛科技股份有限公司 | 基于nfv的网络资源配置方法、装置、设备及存储介质 |
CN114793197B (zh) * | 2022-03-29 | 2023-09-19 | 广州杰赛科技股份有限公司 | 基于nfv的网络资源配置方法、装置、设备及存储介质 |
CN114844840A (zh) * | 2022-04-26 | 2022-08-02 | 哈尔滨工业大学 | 一种基于计算似然比的分布外网络流量数据检测方法 |
CN114844840B (zh) * | 2022-04-26 | 2024-04-02 | 哈尔滨工业大学 | 一种基于计算似然比的分布外网络流量数据检测方法 |
CN115297016B (zh) * | 2022-05-07 | 2024-02-20 | 国网江苏省电力有限公司淮安供电分公司 | 一种基于深度学习的电力网络活跃度评价和预测方法 |
CN115297016A (zh) * | 2022-05-07 | 2022-11-04 | 国网江苏省电力有限公司淮安供电分公司 | 一种基于深度学习的电力网络活跃度评价和预测方法 |
CN115277888B (zh) * | 2022-09-26 | 2023-01-31 | 中国电子科技集团公司第三十研究所 | 一种移动应用加密协议报文类型解析方法及系统 |
CN115277888A (zh) * | 2022-09-26 | 2022-11-01 | 中国电子科技集团公司第三十研究所 | 一种移动应用加密协议报文类型解析方法及系统 |
CN115712614A (zh) * | 2022-11-07 | 2023-02-24 | 航科广软(广州)数字科技有限公司 | 基于数据传输流控制的信息处理方法及系统 |
CN116029219A (zh) * | 2023-02-27 | 2023-04-28 | 中国空气动力研究与发展中心计算空气动力研究所 | 一种飞行器气动热预测方法、装置、设备及存储介质 |
CN116029219B (zh) * | 2023-02-27 | 2023-07-07 | 中国空气动力研究与发展中心计算空气动力研究所 | 一种飞行器气动热预测方法、装置、设备及存储介质 |
CN116647877B (zh) * | 2023-06-12 | 2024-03-15 | 广州爱浦路网络技术有限公司 | 一种基于图卷积模型的流量类别验证方法和系统 |
CN116647877A (zh) * | 2023-06-12 | 2023-08-25 | 广州爱浦路网络技术有限公司 | 一种基于图卷积模型的流量类别验证方法和系统 |
CN116708313B (zh) * | 2023-08-08 | 2023-11-14 | 中国电信股份有限公司 | 流量检测方法、流量检测装置、存储介质和电子设备 |
CN116708313A (zh) * | 2023-08-08 | 2023-09-05 | 中国电信股份有限公司 | 流量检测方法、流量检测装置、存储介质和电子设备 |
CN117463506A (zh) * | 2023-12-26 | 2024-01-30 | 浙江佳环电子有限公司 | 自适应恒流恒压控制高压电源 |
CN117463506B (zh) * | 2023-12-26 | 2024-03-22 | 浙江佳环电子有限公司 | 自适应恒流恒压控制高压电源 |
Also Published As
Publication number | Publication date |
---|---|
CN110896381B (zh) | 2021-10-29 |
CN110896381A (zh) | 2020-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021103135A1 (zh) | 一种基于深度神经网络的流量分类方法、系统及电子设备 | |
WO2020119662A1 (zh) | 一种网络流量分类方法 | |
WO2020119481A1 (zh) | 一种基于深度学习的网络流量分类方法、系统及电子设备 | |
CN108540338B (zh) | 基于深度循环神经网络的应用层通信协议识别的方法 | |
CN111431819A (zh) | 一种基于序列化的协议流特征的网络流量分类方法和装置 | |
CN115277888B (zh) | 一种移动应用加密协议报文类型解析方法及系统 | |
CN115567269A (zh) | 基于联邦学习与深度学习的物联网异常检测方法及系统 | |
CN113938290B (zh) | 一种用户侧流量数据分析的网站去匿名方法和系统 | |
Chen et al. | A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network | |
WO2024061141A1 (zh) | 共性知识约束的遥感样本迁移方法 | |
CN110995770B (zh) | 一种模糊测试应用效果对比方法 | |
CN115348215B (zh) | 一种基于时空注意力机制的加密网络流量分类方法 | |
CN116578436A (zh) | 基于异步多元时间序列数据的实时在线检测方法 | |
CN114884894B (zh) | 一种基于迁移学习的半监督网络流量分类方法 | |
CN114979017A (zh) | 基于工控系统原始流量的深度学习协议识别方法及系统 | |
CN113992542A (zh) | 一种基于新增流数目特征的在线网络流量预测方法及系统 | |
Ma et al. | Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTM | |
CN116055224B (zh) | 基于时空超图卷积的加密应用程序行为流量检测方法 | |
Wang et al. | Encrypted Traffic Classification Model Based on SwinT-CNN | |
CN115442309B (zh) | 一种基于图神经网络的包粒度网络流量分类方法 | |
Wang et al. | Feature Extraction and Attack Correlation Detection in Power Communication Networks Based on Convolutional Neural Networks | |
Rojas et al. | Detecting Network Degradation Using Machine Learning Predicting abnormal network behavior with anomaly detection | |
Xiong et al. | Detecting Anomalous Traffic in IoT Networks Through Deep Learning | |
Liu et al. | Intrusion Detection Based on Feature Reduction and Model Pruning in Electricity Trading Network | |
Yin et al. | An Intrusion Detection Model Based on Random Tree Algorithm with Dimensionality Reduction and Oversampling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19954646 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19954646 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17/01/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19954646 Country of ref document: EP Kind code of ref document: A1 |