WO2022057355A1 - Procédé et appareil de reconnaissance de paquets de données - Google Patents

Procédé et appareil de reconnaissance de paquets de données Download PDF

Info

Publication number
WO2022057355A1
WO2022057355A1 PCT/CN2021/101662 CN2021101662W WO2022057355A1 WO 2022057355 A1 WO2022057355 A1 WO 2022057355A1 CN 2021101662 W CN2021101662 W CN 2021101662W WO 2022057355 A1 WO2022057355 A1 WO 2022057355A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
model
data packet
target model
information
Prior art date
Application number
PCT/CN2021/101662
Other languages
English (en)
Chinese (zh)
Inventor
卢嘉勋
李秉帅
邵云峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022057355A1 publication Critical patent/WO2022057355A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition

Definitions

  • the present application relates to the field of artificial intelligence, and in particular, to a method and device for identifying data packets.
  • data packets can be identified through deep learning methods.
  • the data packet identification device can identify data packets generated by existing applications through the following methods: the data packet identification device will obtain a large number of marked data packets, which are data packets generated by existing applications; data packets The packet identification device will identify the characteristic information of each data packet, for example, the keyword of the application corresponding to the data packet; the data packet identification device will repeatedly train the model according to the identified characteristic information of each data packet, and through the training The model identifies newly received packets generated by existing applications.
  • the above-mentioned data packet identification device cannot identify the data packet generated by the newly added application. Therefore, the data packet identification device will again perform model training based on a large number of marked data packets, so that the trained model can identify data packets generated by existing applications and data packets generated by new applications. This process is not only computationally intensive, but also takes a long time to train. In addition, if new applications appear frequently, the data packet identification device needs to perform the above process frequently, and the data overhead and calculation overhead are relatively large.
  • the present application provides a method and device for identifying a data packet, which can perform model training based on the data packet generated by the marked new application in the case of a new application, with a small amount of calculation and a short training time.
  • an embodiment of the present application provides a method for identifying a data packet.
  • the method includes: a first device obtains a first target model, and the first target model is used to extract first feature information of a first data packet, and determine the first target model.
  • the first application in the first application set corresponding to the data packet in the case of satisfying the trigger condition, the first device obtains the second target model, and the second target model is used to extract the second feature information of the second data packet, and determine the first
  • the first application in the first application set is different from the second application in the second application set; the first device acquires the third data packet, according to the first target model and the second target model to determine the first application or the second application corresponding to the third data packet.
  • the first device when a new application appears after using the first target model (the new application is the application in the second application set), the first device does not need to use the marked first application Perform model training on the data packets of the first application set and the data packets of the second application to obtain a model that can identify both the data packets of the applications in the first application set and the data packets of the applications in the second application set.
  • the first device can perform model training according to the marked data packets of the second application to obtain the second target model, and subsequently, identify the data packets of the applications in the first application set according to the first target model and the second target model , or a data packet of an application in the second application set.
  • the first device Because the number of marked data packets of the second application is much smaller than the number of marked data packets of the first application and the number of data packets of the second application, in the method provided by the first aspect, the first device's The amount of computation is small and the training time is short. In addition, in the method provided in the first aspect, in the case of a newly added application, the first device uses the data package of the marked second application for model training, so the marked first application can be released data packets, reducing the cost of data storage.
  • a possible implementation manner, where the first device acquires the second target model includes: the first device receives information from the server of the first initial model and a list of second applications included in the second application set, where the first initial model is based on Determined by the number of applications in the second application set, the list of second applications is used to indicate the correspondence between the second application in the second application set and the output end of the first initial model;
  • the marked data packet of the second application trains the first initial model to obtain the first intermediate model;
  • the first device sends the information of the first intermediate model to the server;
  • the first device receives the information of the second target model from the server, the second
  • the information of the target model is obtained by aggregating information from intermediate models of multiple first devices; the first device obtains the second target model according to the information of the second target model and the first initial model.
  • a device participating in model training such as a first device, can receive information about the first initial model from the server and a list of second applications included in the second application set, and train according to the marked data packets of the second application
  • the first intermediate model is obtained, and the information of the first intermediate model is sent to the server, so that the server aggregates the information of the intermediate models from multiple first devices to obtain the information of the second target model.
  • the first device may receive the information of the second target model from the server, and obtain the second target model according to the information of the second target model and the first initial model.
  • all devices participating in the model training can obtain a model that can finally identify the data packets applied in the second application set.
  • the server does not need to perform model training, but delegates the model training process to the devices participating in the model training.
  • the number of marked data packets used by each device participating in the model training when training the model is also It is less than the number of marked data packets used by the server to train the model. For these devices, the amount of calculation is not large, and it can also save the time of model training.
  • the first device obtains the second target model, and further includes: the first device obtains the data packet of the second application; the first device sends the data packet of the second application to the server; the first device receives the data packet from the server. Annotated data packets of the second application. Based on the above method, the first device can send the data packet of the second application to the server, so that the server can mark the data packet conveniently.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the first device when the number of newly added applications reaches the first threshold, or when the number of unidentifiable data packets is greater than the second threshold, or when the number of newly added applications reaches the first threshold, And when the number of unidentifiable data packets is greater than the second threshold, the first device may be triggered to acquire the second target model. In this way, on the one hand, it can be avoided that the first device frequently acquires the second target model, resulting in excessive computational overhead of the first device. On the other hand, it can be avoided that the first device does not acquire the second target model for a long time, resulting in the generation of a large number of unidentified data packets, which affects the use of services.
  • the first device determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model, including: the first device obtains the third data packet according to the first target model.
  • the first output entropy of the data packet, the first output entropy is used to indicate the probability that the application corresponding to the third data packet is the application predicted by the first target model; the first device obtains the second data packet according to the second target model.
  • the output entropy, the second output entropy is used to indicate the probability that the application corresponding to the third data packet is the application predicted by the second target model;
  • the application predicted by the target model is determined as the application corresponding to the third data packet.
  • the first device can determine the application corresponding to the third data packet according to the first output entropy and the second output entropy, thereby realizing the combination of the first target model and the second target model to identify the application.
  • the first device does not need to perform model training according to the marked data packets of the first application and the data packets of the second application to obtain an application that can both identify the first application set
  • the data packets of the second application set are also capable of identifying the data packet models of the applications in the second application set.
  • the method further includes: the first device obtains a second initial model, and the second initial model is determined according to the number of applications in the first application set and the number of applications in the second application set; A device trains a second initial model to obtain a third target model according to the labeling results of the data packets obtained by the first device based on the first target model and the second target model, and the third target model is used to extract third feature information, and according to The third characteristic information determines the application corresponding to the data packet corresponding to the third characteristic information, the third characteristic information includes characteristic information of the data packet corresponding to the third characteristic information, and the data packet corresponding to the third characteristic information is the application in the first application set The data packet, or the data packet of the application in the second application set.
  • the first device can obtain the second initial model, and train the second initial model to obtain the third target model according to the first target model and the labeling result of the data packet obtained by the first device by the second target model. Subsequently, the first device can identify the data packet according to the third target model, which can save time for the first device to identify the data packet. In addition, by continuously compressing the model, the first device can stabilize the size of the model, which is beneficial to the deployment of the model in the system-on-chip.
  • the method further includes: the first device, according to the marked data packets used when acquiring the first target model, and/or the marked data packets used when acquiring the second target model, train the first device.
  • a three-target model is obtained, and a third target model after training is obtained.
  • the first device can train the third target model according to the marked data packet used when acquiring the first target model, and/or the marked data packet used when acquiring the second target model, so that after training The accuracy of the third target model is higher and the identification of data packets is more accurate.
  • the method further includes: the first device receives indication information from a server, where the indication information is used to instruct the first device to retrain a data packet for identifying the first application and the second application The fourth destination model of the packet.
  • the server may instruct the first device to retrain the model, so that the trained model can identify the data packets applied in the first application set and the data packets applied in the second application set.
  • an embodiment of the present application provides a method for identifying a data packet.
  • the method includes: the server obtains information of a first target model, and the first target model is used to extract the first feature information of the first data packet, and determine the first target model.
  • the server does not need to perform model training, but delegates the model training process to the devices (the first device and the second device) participating in the model training, and the server transfers the data from the middle of multiple devices.
  • the information of the model can be aggregated, which reduces the computing overhead of the server.
  • the first device does not need to perform model training according to the marked data packets of the first application and the second application, and obtain a model that can both The data packets of the applications in the first application set are identified, and the model of the data packets of the applications in the second application set can be identified.
  • the first device performs model training according to the marked data packets of the second application to obtain a second target model, and subsequently, identifies the data packets of the applications in the first application set according to the first target model and the second target model, or Data packets of applications in the second set of applications.
  • the number of marked data packets of the second application is much smaller than the number of marked data packets of the first application and the second application, so the calculation amount of the first device is small and the training time is short.
  • the first device uses the data package of the marked second application for model training, so the marked first device can be released. Application data package, reducing the cost of data storage.
  • the server acquiring the information of the second target model includes: the server sending the information of the first initial model and the list of the second applications included in the second application set to the first device, the first initial model is based on the first initial model. The number of applications in the second application set is determined, and the list of the second application is used to indicate the corresponding relationship between the second application in the second application set and the output end of the first initial model; the server receives the first intermediate model from the first device. information, the first intermediate model is obtained by the first device training the first initial model according to the marked data packets of the second application obtained by the first device; the server sends the information of the first initial model and the first initial model to the second device. 2.
  • the server receives the information of the second intermediate model from the second device, and the second intermediate model is obtained by the second device training the first initial model according to the marked data packets of the second application obtained by the second device ; the server aggregates the information of the first intermediate model and the information of the second intermediate model to obtain the information of the second target model.
  • the server can send the information of the first initial model and the list of the second application to the device participating in the model training, such as the first device, so that the first device can train the first initial model according to the marked data packets of the second application. model, obtain the first intermediate model, and send the information of the first intermediate model to the server.
  • the server After receiving the information of the intermediate models from multiple devices, the server aggregates the information of the multiple intermediate models to obtain the information of the second target model, and sends the information of the second target model to the first device so that the first device can According to the information of the second target model and the first initial model, the second target model is obtained.
  • all devices participating in the model training can obtain a model that can finally identify the data packets applied in the second application set.
  • the server does not need to perform model training, but delegates the model training process to the devices participating in the model training.
  • the number of marked data packets used by each device participating in the model training when training the model is also It is less than the number of marked data packets used by the server to train the model. For these devices, the amount of calculation is not large, and it can also save the time of model training.
  • the server obtains the information of the second target model, and further includes: the server receives the data packet of the second application from the first device; the server obtains the marked data packet of the second application according to the data packet of the second application. data packet; the server sends the marked data packet of the second application to the first device. Based on the above method, the server may receive the data packet of the second application from the first device, and mark the data packet, so that the first device can perform model training according to the marked data packet.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the server may be triggered to acquire information of the second target model.
  • the server may be triggered to acquire information of the second target model.
  • the method further includes: if the correct rate of identifying the data packets between the first target model and the second target model is less than or equal to a third threshold, the server sends indication information to the first device, and the indication information is used to indicate the first device.
  • a device retrains a fourth target model for identifying packets of the first application and packets of the second application. Based on the above method, when the correct rate of identifying data packets between the first target model and the second target model is less than or equal to the third threshold, the server may instruct the first device to retrain the model, so that the trained model can identify the first application the data packet and the data packet of the second application.
  • an embodiment of the present application provides an apparatus for identifying a data packet, which can implement the method in the first aspect or any possible implementation manner of the first aspect.
  • the apparatus comprises corresponding units or components for carrying out the above-described method.
  • the units included in the apparatus may be implemented by software and/or hardware.
  • the apparatus may be, for example, a first device, or a chip, a chip system, or a processor that can support the first device to implement the above method.
  • an embodiment of the present application provides an apparatus for identifying a data packet, which can implement the method in the second aspect or any possible implementation manner of the second aspect.
  • the apparatus comprises corresponding units or components for carrying out the above-described method.
  • the units included in the apparatus may be implemented by software and/or hardware.
  • the apparatus can be, for example, a server, or a chip, a chip system, or a processor that can support the server to implement the above method.
  • an embodiment of the present application provides an apparatus for identifying a data packet, including: a processor, where the processor is coupled to a memory, and the memory is used to store a program or an instruction, when the program or the instruction is processed by the When the device is executed, the device is made to implement the method described in the first aspect or any possible implementation manner of the first aspect.
  • an embodiment of the present application provides an apparatus for identifying a data packet, including: a processor, the processor is coupled to a memory, and the memory is used to store a program or an instruction, when the program or instruction is processed by the When the device is executed, the device is made to implement the method described in the second aspect or any possible implementation manner of the second aspect.
  • an embodiment of the present application provides an apparatus for identifying a data packet, where the apparatus is configured to implement the method described in the first aspect or any possible implementation manner of the first aspect.
  • an embodiment of the present application provides an apparatus for identifying a data packet, where the apparatus is configured to implement the method described in the second aspect or any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a computer-readable medium on which a computer program or instruction is stored, and when the computer program or instruction is executed, enables a computer to perform the above-mentioned first aspect, or any possibility of the first aspect method described in the implementation of .
  • an embodiment of the present application provides a computer-readable medium on which a computer program or instruction is stored, and when the computer program or instruction is executed, enables a computer to execute the second aspect or any possibility of the second aspect. method described in the implementation of .
  • an embodiment of the present application provides a computer program product, which includes computer program code, and when the computer program code is run on a computer, enables the computer to execute the above-mentioned first aspect, or any possible possibility of the first aspect. Implement the method described in the method.
  • an embodiment of the present application provides a computer program product, which includes computer program code, and when the computer program code is run on a computer, enables the computer to execute the second aspect or any of the possibilities of the second aspect. Implement the method described in the method.
  • an embodiment of the present application provides a chip, including: a processor, where the processor is coupled to a memory, and the memory is used to store a program or an instruction, and when the program or instruction is executed by the processor , so that the chip implements the method described in the first aspect or any possible implementation manner of the first aspect.
  • an embodiment of the present application provides a chip, including: a processor, where the processor is coupled to a memory, and the memory is used to store programs or instructions, and when the programs or instructions are executed by the processor , so that the chip implements the method described in the second aspect or any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a data packet identification system.
  • the system includes the device described in the third aspect and/or the device described in the fourth aspect, or the system includes the device described in the fifth aspect and/or the device described in the sixth aspect, or the system It includes the device of the seventh aspect and/or the device of the eighth aspect.
  • any identification device, chip, computer readable medium, computer program product or identification system of the data packet provided above are all used to execute the corresponding method provided above.
  • beneficial effects that can be achieved reference may be made to the beneficial effects in the corresponding method, which will not be repeated here.
  • an embodiment of the present application provides a method for identifying a data packet.
  • the method includes: acquiring a first target model, where the first target model is used to extract first feature information of the first data packet, and determine the first data packet.
  • the first application in the corresponding first application set; in the case of satisfying the trigger condition, the second target model is obtained, and the second target model is used to extract the second feature information of the second data packet, and determine the corresponding the second application in the second application set, where the first application in the first application set is different from the second application in the second application set; acquire a third data packet, and determine the first application according to the first target model and the second target model The first application or the second application corresponding to the three data packets.
  • the first device when a new application appears after using the first target model (the new application is the application in the second application set), the first device does not need to use the marked first target model.
  • Model training is performed on the data packets of the application and the data packets of the second application to obtain a model that can identify both the data packets of the applications in the first application set and the data packets of the applications in the second application set.
  • the first device can perform model training according to the marked data packets of the second application to obtain the second target model, and subsequently, identify the data packets of the applications in the first application set according to the first target model and the second target model , or a data packet of an application in the second application set.
  • the first device uses the marked data package of the second application to perform model training, so the marked first application can be released. Application data package, reducing the cost of data storage.
  • acquiring the second target model includes: acquiring the marked data package of the second application; acquiring the first initial model and a list of the second applications included in the second application set, where the first initial model is based on Determined by the number of applications in the second application set, the list of second applications is used to indicate the correspondence between the second application in the second application set and the output end of the first initial model; according to the marked data packets of the second application , train the first initial model to obtain the second target model.
  • the first device can train the first initial model according to the marked data package of the second application to obtain the second target model, so that the first device can subsequently determine the first target model according to the first target model and the second target model.
  • the application corresponding to the three data packets.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the first device when the number of newly added applications reaches the first threshold, or when the number of unidentifiable data packets is greater than the second threshold, or when the number of newly added applications reaches the first threshold, And when the number of unidentifiable data packets is greater than the second threshold, the first device may be triggered to acquire the second target model. In this way, on the one hand, it can be avoided that the first device frequently acquires the second target model, resulting in excessive computational overhead of the first device. On the other hand, it can be avoided that the first device does not acquire the second target model for a long time, resulting in the generation of a large number of unidentified data packets, which affects the use of services.
  • determining the first application or the second application corresponding to the third data packet according to the first target model and the second target model includes: obtaining the first output of the third data packet according to the first target model entropy, the first output entropy is used to indicate the probability that the application corresponding to the third data packet is an application predicted by the first target model; according to the second target model, the second output entropy of the third data packet is obtained, and the second output entropy is used for Indicate the probability that the application corresponding to the third data packet is the application predicted by the second target model; in the first output entropy and the second output entropy, the application predicted by the target model corresponding to the output entropy with a low value is determined as the third data packet corresponding to Applications.
  • the first device can determine the application corresponding to the third data packet according to the first output entropy and the second output entropy, thereby realizing the combination of the first target model and the second target model to identify the application.
  • the first device does not need to perform model training according to the marked data packets of the first application and the data packets of the second application to obtain an application that can both identify the first application set
  • the data packets of the second application set are also capable of identifying the data packet models of the applications in the second application set.
  • the method further includes: acquiring a second initial model, where the second initial model is determined according to the number of applications in the first application set and the number of applications in the second application set; according to the first target
  • the model and the second target model mark the result of the data packet obtained by the first device, train the second initial model to obtain the third target model, and the third target model is used to extract the third feature information, and determine the third target model according to the third feature information.
  • the application corresponding to the data packet corresponding to the three characteristic information, the third characteristic information includes characteristic information of the data packet corresponding to the third characteristic information, the data packet corresponding to the third characteristic information is the data packet of the application in the first application set, or the second characteristic information A package of apps in the app collection.
  • the first device can obtain the second initial model, and train the second initial model to obtain the third target model according to the first target model and the labeling result of the data packet obtained by the first device by the second target model. Subsequently, the first device can identify the data packet according to the third target model, which can save time for the first device to identify the data packet. In addition, the first device can stabilize the size of the model by continuously compressing the model, which is beneficial to the deployment of the model in the system-on-chip.
  • the method further includes: training the third target model according to the marked data packets used when acquiring the first target model and/or the marked data packets used when acquiring the second target model , to get the third target model after training.
  • the first device can train the third target model according to the marked data packets used when acquiring the first target model, and/or the marked data packets used when acquiring the second target model, so that after training The accuracy of the third target model is higher and the identification of data packets is more accurate.
  • the method further includes: if the correct rate of the first target model and the second target model identifying the data packet is less than or equal to a third threshold, retraining the data packet and the second application for identifying the first application.
  • the fourth destination model of the packet Based on the above method, when the correct rate of identifying data packets between the first target model and the second target model is less than or equal to the third threshold, the first device can retrain the model, so that the trained model can identify the first application set Application data packets and data packets of applications in the second application set.
  • an embodiment of the present application provides a data packet identification device, the device includes: an acquisition module and a determination module; the acquisition module is used to acquire a first target model, and the first target model is used to extract the first data packet The first feature information of the first data packet is used to determine the first application in the first application set corresponding to the first data packet; the obtaining module is also used to obtain a second target model when the trigger condition is met, and the second target model is used to extract The second feature information of the second data packet determines the second application in the second application set corresponding to the second data packet, and the first application in the first application set is different from the second application in the second application set; determining module , which is used to obtain the third data packet, and determine the first application or the second application corresponding to the third data packet according to the first target model and the second target model.
  • the acquisition module is specifically used to acquire the marked data package of the second application; the acquisition module is also specifically used to acquire the first initial model and the list of the second applications included in the second application set, the first An initial model is determined according to the number of applications in the second application set, and the list of second applications is used to indicate the corresponding relationship between the second application in the second application set and the output end of the first initial model; the acquiring module, also specifically It is used to train the first initial model according to the marked data packets of the second application, so as to obtain the second target model.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the determination module is specifically used to obtain the first output entropy of the third data packet according to the first target model, and the first output entropy is used to indicate that the application corresponding to the third data packet is predicted by the first target model.
  • the determination module is also specifically used to obtain the second output entropy of the third data packet according to the second target model, and the second output entropy is used to indicate that the application corresponding to the third data packet is predicted by the second target model.
  • the probability of the application; the determining module is further specifically configured to determine the application predicted by the target model corresponding to the output entropy with a lower value among the first output entropy and the second output entropy as the application corresponding to the third data packet.
  • the device further includes: a training module; an acquisition module, further configured to acquire a second initial model, the second initial model is based on the number of applications in the first application set and the number of applications in the second application set The number is determined; the training module is used to train the second initial model to obtain the third target model according to the labeling results of the data packets obtained by the first device by the first target model and the second target model, and the third target model is used for Extract the third feature information, and determine the application corresponding to the data packet corresponding to the third feature information according to the third feature information, the third feature information includes the feature information of the data packet corresponding to the third feature information, and the data packet corresponding to the third feature information. It is a data packet of an application in the first application set, or a data packet of an application in the second application set.
  • the training module is also used to train the third target according to the marked data packets used when acquiring the first target model, and/or the marked data packets used when acquiring the second target model model to obtain the third target model after training.
  • the acquisition module is also used to retrain the data packets and the second data packets for identifying the first application if the correct rate of the first target model and the second target model to identify the data packets is less than or equal to the third threshold.
  • the fourth destination model of the applied packet is also used to retrain the data packets and the second data packets for identifying the first application if the correct rate of the first target model and the second target model to identify the data packets is less than or equal to the third threshold.
  • an embodiment of the present application provides an apparatus for identifying a data packet, including: a processor, where the processor is coupled to a memory, and the memory is used to store a program or an instruction.
  • the apparatus When executed by the processor, the apparatus is made to implement the method described in the sixteenth aspect or any possible implementation manner of the sixteenth aspect.
  • an embodiment of the present application provides an apparatus for identifying a data packet, where the apparatus is configured to implement the method described in the sixteenth aspect or any possible implementation manner of the sixteenth aspect.
  • embodiments of the present application provide a computer-readable medium on which a computer program or instruction is stored, and when the computer program or instruction is executed, causes a computer to execute the above-mentioned sixteenth aspect, or any of the sixteenth aspect.
  • an embodiment of the present application provides a computer program product, which includes computer program code, and when the computer program code runs on a computer, causes the computer to execute the above-mentioned sixteenth aspect or any one of the sixteenth aspects. methods described in possible implementations.
  • an embodiment of the present application provides a chip, including: a processor, where the processor is coupled to a memory, and the memory is used to store programs or instructions, and when the programs or instructions are executed by the processor , the chip is made to implement the method described in the sixteenth aspect or any possible implementation manner of the sixteenth aspect.
  • the identification device, chip, computer readable medium or computer program product of any of the data packets provided above are all used to execute the corresponding method provided above. Therefore, the beneficial effects that can be achieved can be achieved. Referring to the beneficial effects in the corresponding method, details are not repeated here.
  • FIG. 1 is a schematic diagram of the architecture of a data packet identification system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a hardware structure of an identification device provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method for identifying a data packet according to an embodiment of the present application
  • FIG. 4A is a schematic diagram of a first target model provided by an embodiment of the present application.
  • 4B is a schematic diagram of a second target model provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 6A is a schematic diagram of a third initial model provided by an embodiment of the present application.
  • 6B is a schematic diagram of a first initial model provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 11 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 13 is a schematic flowchart of another data packet identification method provided by an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of an apparatus for identifying a data packet according to an embodiment of the present application.
  • 15 is a schematic structural diagram of another data packet identification device provided by an embodiment of the application.
  • 16 is a schematic structural diagram of another data packet identification device provided by an embodiment of the application.
  • 17 is a schematic structural diagram of a chip provided by an embodiment of the present application.
  • FIG. 18 is a schematic diagram of the composition of a data packet identification system according to an embodiment of the present application.
  • federated learning refers to the method of machine learning by uniting different participants (also known as data owners, or clients).
  • participants In federated learning, participants do not need to expose their own data to other participants, managers or coordinators (for example, servers), so federated learning can well protect user privacy and ensure data security.
  • a device in a non-federated learning scenario can perform machine learning based on the data obtained by the device.
  • the following takes a federated learning scenario as an example to introduce the data packet identification system provided by the embodiment of the present application.
  • FIG. 1 it is a schematic structural diagram of a data packet identification system 10 according to an embodiment of the present application.
  • the data packet identification system 10 may include one or more servers 101 (only one is shown) and devices 102 - 104 that may communicate with the server 101 .
  • FIG. 1 is only a schematic diagram, and does not constitute a limitation on the applicable scenarios of the technical solutions provided in the present application.
  • the server 101 may function as a manager or a coordinator. That is, server 101 may manage or coordinate one or more participants (eg, device 102, device 103, or device 104). Exemplarily, the server 101 may determine a device that needs to perform model training (hereinafter referred to as a training device). Subsequently, the server 101 may also send information of the initial model to each training device, where the information of the initial model is used to indicate the initial model that needs to be trained by the training device. The server 101 may also receive information on the intermediate model from each training device, where the information on the intermediate model is used to indicate the intermediate model trained by the training device according to the initial model.
  • a training device e.g., a device that needs to perform model training
  • the server 101 may also receive information on the intermediate model from each training device, where the information on the intermediate model is used to indicate the intermediate model trained by the training device according to the initial model.
  • the server 101 may further aggregate the received intermediate models to obtain the information of the target model, and send the information of the target model to each training device, so that each training device obtains the target model according to the information of the target model, and identifies the target model according to the information of the target model. data pack.
  • device 102, device 103, or device 104 may have the function of a participant. That is, device 102, device 103, or device 104 may perform machine learning or model training.
  • the device 102, the device 103 or the device 104 may receive the information of the initial model from the server 101, and obtain the intermediate model by training according to the initial model. Subsequently, the device 102, the device 103 or the device 104 may send the information of the intermediate model to the server 101, so that the server 101 aggregates the intermediate models obtained by the device 102, the device 103 and the device 104 to obtain the information of the target model.
  • Device 102 , device 103 or device 104 may also receive information from server 101 for the target model. In this way, the device 102, the device 103 or the device 104 can obtain the target model according to the information of the target model, and identify the data packet according to the target model.
  • the server 101 in FIG. 1 may be a device capable of providing services such as computing or applications for participants.
  • the server 101 in FIG. 1 may be a network device, a network cloud engine (NCE), a federated learning server (FLS), or the like.
  • NCE network cloud engine
  • FLS federated learning server
  • the device 102, the device 103 or the device 104 in FIG. 1 may be a device capable of receiving, sending or generating data packets and capable of performing machine learning.
  • the device 102, the device 103, or the device 104 may be a network device, a terminal, an optical network terminal (ONT), a federated learning client (federated learning client, FLC), or the like.
  • ONT optical network terminal
  • FLC federated learning client
  • the above-mentioned network device may be any device with a wireless transceiver function. Including but not limited to: evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in long term evolution (long term evolution, LTE) system, base station (gNodeB or gNB) in new radio (new radio, NR) system ) or transmitting and receiving point (transmission receiving point/transmission receiving point, TRP), 3GPP subsequent evolution base station, access node in WiFi system, wireless relay node, wireless backhaul node, etc.
  • NodeB or eNB or e-NodeB evolutional Node B
  • long term evolution long term evolution
  • LTE long term evolution
  • gNodeB or gNB new radio
  • TRP transmitting and receiving point
  • 3GPP subsequent evolution base station access node in WiFi system
  • wireless relay node wireless backhaul node, etc.
  • the above-mentioned terminal may be a device with a wireless transceiver function.
  • the above-mentioned terminal may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, an industrial control (industrial control) terminal. ), in-vehicle terminals, terminals in self-driving, terminals in assisted driving, etc.
  • a terminal may also sometimes be referred to as terminal equipment, user equipment (UE), access terminal, vehicle-mounted terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station, remote station, remote terminal, mobile equipment, UE terminal equipment, wireless communication equipment, machine terminal, UE proxy or UE device, etc.
  • Terminals can be fixed or mobile.
  • the data packet identification system 10 shown in FIG. 1 is only used for example, and is not used to limit the technical solution of the present application. Those skilled in the art should understand that, in the specific implementation process, the data packet identification system 10 may also include other devices, and the number of network devices and terminals may also be determined according to specific needs, which is not limited.
  • each device in FIG. 1 in this embodiment of the present application may be a functional module in an apparatus.
  • the functional module can be an element in a hardware device, for example, a communication chip or a communication component in a terminal or a network device, or a software functional module running on hardware, or a platform (for example, a cloud Virtualization functions instantiated on the platform).
  • FIG. 2 is a schematic diagram of a hardware structure of an identification device applicable to an embodiment of the present application.
  • the identification device 200 includes at least one processor 201 , a communication line 202 , a memory 203 and at least one communication interface 204 .
  • the processor 201 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors for controlling the execution of the programs of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication line 202 may include a path, such as a bus, for transferring information between the components described above.
  • Communication interface 204 using any transceiver-like device for communicating with other devices or communication networks, such as Ethernet interfaces, radio access network (RAN), wireless local area networks (wireless local area networks, WLAN), etc.
  • RAN radio access network
  • WLAN wireless local area networks
  • Memory 203 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM) or other types of information and instructions It can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, CD-ROM storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being executed by a computer Access any other medium without limitation.
  • the memory may exist independently and be connected to the processor through the communication line 202 .
  • the memory can also be integrated with the processor.
  • the memory provided by the embodiments of the present application may generally be non-volatile.
  • the memory 203 is used for storing the computer-executed instructions involved in executing the solution of the present application, and the execution is controlled by the processor 201 .
  • the processor 201 is configured to execute the computer-executed instructions stored in the memory 203, thereby implementing the method provided by the embodiments of the present application.
  • the computer-executed instructions in the embodiment of the present application may also be referred to as application code, which is not specifically limited in the embodiment of the present application.
  • the processor 201 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 2 .
  • the identification device 200 may include multiple processors, for example, the processor 201 and the processor 207 in FIG. 2 .
  • processors can be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the identification apparatus 200 may further include an output device 205 and an input device 206 .
  • the output device 205 is in communication with the processor 201 and can display information in a variety of ways.
  • the output device 205 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector) Wait.
  • Input device 206 is in communication with processor 201 and can receive user input in a variety of ways.
  • the input device 206 may be a mouse, a keyboard, a touch screen device, a sensor device, or the like.
  • the above-mentioned identification device 200 may be a general-purpose device or a special-purpose device.
  • the identification device 200 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a similar structure in FIG. 2 . equipment.
  • PDA personal digital assistant
  • This embodiment of the present application does not limit the type of the identification device 200 .
  • a federated learning scenario and a non-federated learning scenario are taken as examples to describe the data packet identification method provided by the embodiment of the present application in detail with reference to FIG. 1 and FIG. 2 .
  • A/B may indicate A or B
  • a and/or may be used to describe There are three kinds of relationships between related objects, for example, A and/or B, which can be expressed as: the existence of A alone, the existence of A and B at the same time, and the existence of B alone, where A and B can be singular or plural.
  • words such as “first” and “second” may be used to distinguish technical features with the same or similar functions.
  • the words “first”, “second” and the like do not limit the quantity and execution order, and the words “first”, “second” and the like do not limit the difference.
  • words such as “exemplary” or “for example” are used to represent examples, illustrations or illustrations, and any embodiment or design solution described as “exemplary” or “for example” should not be construed are preferred or advantageous over other embodiments or designs.
  • the use of words such as “exemplary” or “such as” is intended to present the relevant concepts in a specific manner to facilitate understanding.
  • the server or the first device may perform some or all of the steps in the embodiments of the present application. These steps are only examples, and the embodiments of the present application may also perform other steps or variations of various steps. In addition, various steps may be performed in different orders presented in the embodiments of the present application, and it may not be necessary to perform all the steps in the embodiments of the present application.
  • the specific structure of the execution body of the data packet identification is not particularly limited in the embodiment of the present application, as long as the program that records the code of the data packet identification method of the embodiment of the present application can be executed according to the embodiment of the present application.
  • the data packet identification method according to the embodiment of the present application only needs to perform communication.
  • the execution body of the data packet identification method provided in this embodiment of the present application may be a server, or a component applied in the server, such as a chip, which is not limited in this application.
  • the execution body of the data packet identification method provided in this embodiment of the present application may be the first device, or a component applied in the first device, such as a chip, which is not limited in this application.
  • the following embodiments are described by taking an example that the execution bodies of the data packet identification method are the server and the first device respectively.
  • a federated learning scenario is used as an example to introduce the data packet identification method provided by the embodiment of the present application. Specifically, reference may be made to the methods shown in FIG. 3 , FIG. 5 , and FIGS. 7 to 11 below.
  • a method for identifying a data packet provided in an embodiment of the present application is applied to a first device.
  • the method for identifying the data packet includes steps 301 to 303 .
  • Step 301 The first device acquires a first target model.
  • the first device may be the device 102 , the device 103 or the device 104 in FIG. 1 .
  • the first device may be a device determined by the server that needs to perform model training.
  • the server may be the server 101 in FIG. 1 .
  • the first target model is used to extract the first feature information of the first data packet, and determine the first application in the first application set corresponding to the first data packet.
  • the first set of applications includes at least one first application.
  • the at least one first application includes applications already installed on the server, the first device, or other devices.
  • the first feature information includes feature information of the first data packet.
  • the first feature information includes a keyword of an application to which the first data packet belongs. It should be understood that the first data packet is generated by the first application in the first application set.
  • the first application set includes and Packet 1 is The generated packet, packet 2 is Taking the generated data packet as an example, the first characteristic information corresponding to the data packet 1 includes Wechat, and the first characteristic information corresponding to the data packet 2 includes Alipay.
  • each data packet generated by the first application corresponds to the first feature information.
  • the first feature information corresponding to the data packets of the same application may be the same or different.
  • the data packet of the application can be understood as the data packet generated by the application.
  • the first target model includes a first target feature extractor and a first target classifier.
  • the first target feature extractor is used to extract the first feature information of the first data packet, for example, the first feature information.
  • the first target classifier is used to determine the first application in the first application set corresponding to the first data packet.
  • the first target model may be as shown in FIG. 4A .
  • the first target model 401 includes a first target feature extractor 402 and a first target classifier 403 .
  • the input of the first target feature extractor 402 is the input of the first target model 401
  • the output of the first target feature extractor 402 is the input of the first target classifier 403
  • the output of the first target classifier 403 is the first target model 401 output.
  • the first target classifier 403 has n output ports, and each output port corresponds to a first application in the first application set.
  • n is the number of applications in the first application set. It can be understood that, among the n output ports, the application corresponding to the port with the highest output value may be determined as the application corresponding to the data packet input to the first target model 401 .
  • the first application set includes and Packet 1 is The generated packet
  • packet 2 is Taking the generated data packet as an example, if the first target model is shown in FIG. 4A , the value of n is 2. Assume that port 1 corresponds to Port 2 corresponds Then the data packet 1 obtains the Wechat through the first target feature extractor 402, and the Wechat is input to the first target classifier 403, and it can be obtained that the output value of port 1 is greater than the output value of port 2, that is, the application corresponding to the data packet 1 is Similarly, data packet 2 obtains Alipay through the first target feature extractor 402, and Alipay is input to the first target classifier 403, and it can be obtained that the output value of port 2 is greater than the output value of port 1, that is, the corresponding application of data packet 2 is
  • a possible implementation manner, where the first device acquires the first target model includes: the first device receives the information of the third initial model from the server and the list of the first applications included in the first application set; The marked data packets of the first application obtained by the device train the third initial model to obtain the third intermediate model; the first device sends the information of the third intermediate model to the server; the first device receives the information of the first target model from the server ; The first device obtains the first target model according to the information of the first model and the third initial model.
  • the specific process of acquiring the first target model by the first device will be described in the method shown in FIG. 5 below.
  • the first device acquires the first target model.
  • Step 302 In the case that the trigger condition is satisfied, the first device acquires the second target model.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the first threshold and the second threshold are positive integers.
  • the second application set includes at least one second application.
  • the at least one second application includes an application installed on the server, the first device or other devices after the first device acquires the first target model.
  • the first threshold is 5, as an example, if the number of applications in the second application set is 6, the first device obtains The second target model. If the number of applications in the second application set is 3, the first device does not acquire the second target model.
  • the first device acquires the second target model. If the number of data packets of the first application is 5 and the number of data packets of the second application is 10, the first device does not acquire the second target model.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold, the first threshold is 3, and the first threshold is 3.
  • the second threshold is 50
  • the second application set includes two applications, and the number of data packets of the first application and the number of data packets of the second application are both 30, the first device does not obtain the first application.
  • Two-objective model If the second application set includes 4 applications, the number of data packets of the first application and the number of data packets of the second application are both 10, and the number of data packets of the third application and the fourth application is 10. If the numbers are all 5, the first device does not acquire the second target model. If the second application set includes 3 applications, and the number of data packets of the first application, the data packets of the second application and the data packets of the third application are all 25, the first device obtains the first Two-objective model.
  • the server sends the information for instructing the acquisition of the second target model to the first device, the first device receives the information from the server for instructing the acquisition of the second target model, and acquires the first device.
  • Two-objective model when the trigger condition is satisfied, the server sends the information of the first initial model and the list of second applications included in the second application set to the first device, and the first device receives the information of the first initial model and The second application list is obtained, and the second target model is obtained, wherein the information of the first initial model and the introduction of the list of the second application can be referred to the following description in the method shown in FIG. 7 .
  • the server when the trigger condition is satisfied, the server will send the above-mentioned indication information, or the information of the first initial model and the list of the second application to the first device. After receiving the above-mentioned information, the first device will obtain the second target model.
  • the above triggering conditions may be set by the administrator, or may be set by the server as required.
  • the server may instruct the first device to acquire the second target model after monitoring that the trigger condition is satisfied.
  • the administrator may instruct the first device to acquire the second target model. It should be understood that during the operation of the first device, the administrator or the server may reset the trigger condition as required.
  • the second target model is used to extract the second feature information of the second data packet, and determine the second application in the second application set corresponding to the second data packet.
  • the second characteristic information includes characteristic information of the second data packet.
  • the second feature information includes a keyword of an application to which the second data packet belongs. It should be understood that the second data packet is generated by the second application in the second application set.
  • the second application set includes and Packet 1 is The generated packet, packet 2 is Taking the generated data packet as an example, the second characteristic information corresponding to the data packet 1 includes iQIYI, and the second characteristic information corresponding to the data packet 2 includes Tencent.
  • each data packet generated by the second application corresponds to the second feature information.
  • the second feature information corresponding to the data packets of the same application may be the same or different.
  • the second target model includes a second target feature extractor and a second target classifier.
  • the second target feature extractor is the same as the first target feature extractor, and can be used to extract the feature information of the data packet, for example, can be used to extract the second feature information of the second data packet.
  • the second target classifier is configured to determine the second application in the second application set corresponding to the second data packet.
  • the second target model may be as shown in FIG. 4B .
  • the second target model 404 includes a second target feature extractor 405 and a second target classifier 406 .
  • the input of the second target feature extractor 405 is the input of the second target model 404
  • the output of the second target feature extractor 405 is the input of the second target classifier 406,
  • the output of the second target classifier 406 is the second target model 404 output.
  • the second object classifier 406 has m output ports, and each output port corresponds to one application in the second set of applications. m is the number of applications in the second application set. It can be understood that, among the m output ports, the application corresponding to the port with the highest output value may be determined as the application corresponding to the data packet input to the second target model 404 .
  • the second application set includes and Packet 1 is The generated packet, packet 2 is Taking the generated data packet as an example, if the second target model is shown in FIG. 4B , the value of m is 2. Assume that port 1 corresponds to Port 2 corresponds Then the data packet 1 obtains iQIYI through the second target feature extractor 405, and the iQIYI is input to the second target classifier 406, and it can be obtained that the output value of port 1 is greater than the output value of port 2, that is, the corresponding application of data packet 1 is Similarly, packet 2 obtains Tencent through the second target feature extractor 405, and input Tencent into the second target classifier 406, it can be obtained that the output value of port 2 is greater than the output value of port 1, that is, the application corresponding to packet 2 is
  • a possible implementation manner, where the first device acquires the second target model includes: the first device receives the information of the first initial model from the server and the list of second applications included in the second application set; The marked data packets of the second application obtained by the device train the first initial model to obtain the first intermediate model; the first device sends the information of the first intermediate model to the server; the first device receives the information of the second target model from the server ; The first device obtains the second target model according to the information of the second target model and the first initial model.
  • the specific process of acquiring the second target model by the first device will be described in the method shown in FIG. 7 below.
  • the first device will acquire the second target model. That is, before step 303, or after step 303, the first device may acquire the second target model multiple times. The difference is that the applications in the second application set corresponding to the second target model acquired each time are different.
  • the second set of applications includes applications installed on the server, the first device or other devices after the first device acquires the target model last time.
  • the first device obtains the second target model three times as an example
  • the second application set corresponding to the second target model obtained for the first time includes the installation of the first device after obtaining the first target model.
  • the second set of applications corresponding to the second target model acquired for the second time includes applications installed on the server, the first device, or other devices after the first device acquires the second target model for the first time.
  • the second application set corresponding to the second target model acquired for the third time includes applications installed on the server, the first device or other devices after the first device acquires the second target model for the second time.
  • Step 303 The first device acquires the third data packet, and determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model.
  • the first device determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model, including: the first device obtains the third data packet according to the first target model. The first output entropy of the data packet; the first device obtains the second output entropy of the third data packet according to the second target model; The application predicted by the target model is determined as the application corresponding to the third data packet. In this way, the first device can identify the data packet generated by the first application or identify the data packet generated by the second application according to the first target model and the second target model.
  • the first output entropy is used to indicate the probability that the application corresponding to the third data packet is the application predicted by the first target model.
  • the second output entropy is used to indicate the probability that the application corresponding to the third data packet is the application predicted by the second target model.
  • the first output entropy satisfies the following formula: Wherein, H 1 (p 1 ) is the first output entropy. n is the number of output ports of the first target classifier. p 1 (i) is the probability that the application corresponding to the data packet input to the first target model is the application corresponding to the ith port.
  • the second output entropy satisfies the following formula: Wherein, H 2 (p 2 ) is the second output entropy. m is the number of output ports of the second target classifier. p 2 (i) is the probability that the application corresponding to the data packet input to the second target model is the application corresponding to the ith port.
  • the application corresponding to the first target model prediction data package 1 is The application corresponding to the second target model prediction data package 1 is: For example, if the value of the first output entropy is 20 and the value of the second output entropy is 85, the first device determines that the application corresponding to the third data packet is If the value of the first output entropy is 90 and the value of the second output entropy is 15, the first device determines that the application corresponding to the third data packet is
  • the first device determines the first application or the first application corresponding to the third data packet according to the first target model and the second target model acquired multiple times. Second application.
  • the first device determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model obtained multiple times, including: the first device obtains the third data packet according to the first target model. The first output entropy of the data packet; the first device obtains the second output entropy of the third data packet corresponding to each second target model according to the second target model obtained multiple times; the first device combines the first output entropy and the obtained In the obtained second output entropy, the application predicted by the target model corresponding to the output entropy with a low value is determined as the application corresponding to the third data packet.
  • the first device retrains the fourth target model for identifying the data packets of the first application and the data packets of the second application.
  • the indication information is used to instruct the first device to retrain the fourth target model for identifying the data packets of the first application and the data packets of the second application.
  • the fourth target model is obtained by training according to the marked data packets of the first application and the marked data packets of the second application. For the process of the first device retraining the fourth target model for identifying the data packets of the first application and the data packets of the second application, reference may be made to the process of acquiring the first target model by the first device in the foregoing step 301 .
  • the fourth target model is obtained by training according to the marked data packets of the first application and the marked data packets of the second application, and when the first device identifies the data packets according to the first target model and the second target model, is the result inferred from the output entropy. Therefore, the correct rate of identifying the data packet by the fourth target model is greater than the correct rate of the first device identifying the data packet according to the first target model and the second target model.
  • the above-mentioned indication information may be sent by the administrator triggering the server, or it may be sent to the first device when the server detects that the correct rate of the application corresponding to the third data packet determined by the first device is less than or equal to the third threshold. sent by the device.
  • the first device when a new application appears after using the first target model (the new application is the application in the second application set), the first device does not need to use the marked first application Model training is performed on the set and the data packets of the applications in the second application set to obtain a model that can identify both the data packets of the applications in the first application set and the data packets of the applications in the second application set.
  • the first device can perform model training according to the marked data packets of the second application to obtain a second target model, and subsequently, identify the data packets of the applications in the first application set according to the first target model and the second target model, or data packets of applications in the second application set.
  • the calculation of the first device The volume is small and the training time is short.
  • the first device uses the marked data packet of the second application for model training, so the marked first application can be released. data packets, reducing the cost of data storage.
  • step 301 may include steps 3011 to 3015 .
  • Step 3011 The first device receives the information of the third initial model and the list of the first applications from the server.
  • the information of the third initial model is used to indicate the third initial model.
  • the third initial model is determined according to the number of applications in the first application set. That is, the third initial model is an initialized model obtained according to the number of applications in the first application set.
  • the third initial model includes a third initial feature extractor and a third initial classifier.
  • the third initial feature extractor can be updated to the first target feature extractor after training, and the third initial classifier can be updated to the first target classifier after model training.
  • the third initial model may be as shown in FIG. 6A .
  • the third initial model 601 includes a third initial feature extractor 602 and a third initial classifier 603 .
  • the input of the third initial feature extractor 602 is the input of the third initial model 601
  • the output of the third initial feature extractor 602 is the input of the third initial classifier 603
  • the output of the third initial classifier 603 is the third initial model 601 output.
  • the third initial classifier 603 has n output ports, and each output port corresponds to one application in the first application set. n is the number of applications in the first application set.
  • the information of the third initial model includes structural information of the third initial model and parameter information of the third initial model.
  • the structure information of the third initial model is used to indicate the structure of the third initial model, for example, the structure information of the third initial model is used to indicate that the third initial model includes a third initial feature extractor and a third initial classifier.
  • the parameter information of the third initial model is used to indicate parameters of the third initial model, for example, parameters of the third initial feature extractor and parameters of the third initial classifier.
  • the list of the first applications is used to indicate the correspondence between the first application in the first application set and the output end of the third initial model.
  • the correspondence between the first application in the first application set and the output end of the third initial model may be as shown in Table 1.
  • the port corresponding to application 1 is port 1
  • the port corresponding to application 2 is port 2
  • ... the port corresponding to application n-1
  • the port corresponding to application n is port n.
  • the first application in the first application set The output of the third initial model Application 1 port 1 Application 2 port 2 ... ... apply n-1 port n-1 application n port n
  • Step 3012 The first device trains a third initial model according to the marked data packets of the first application obtained by the first device, and obtains a third intermediate model.
  • the marked data packet of the first application obtained by the first device may be marked manually or marked by a machine.
  • the data packet may be marked by the administrator of the first device, or may be marked by the administrator of the server. If the data packet is marked by the administrator of the server, the first device can obtain the data packet of the first application, send the data packet of the first application to the server, and receive the marked data packet of the first application from the server. The data packet of the first application may be received by the first device, or generated by an application on the first device.
  • the data packet may be labelled by the first device, or may be labelled by the server. If the data packet is marked by the server, the first device may obtain the data packet of the first application, send the data packet of the first application to the server, and receive the marked data packet of the first application from the server.
  • the first device updates the third initial model by means of backpropagation according to the marked data packets of the first application obtained by the first device to obtain the third intermediate model. Further, the loss function used in the process of updating the third initial model by the method of backpropagation by the first device satisfies the following formula:
  • L represents a loss function, and the loss function can be used to calculate the gradient of the parameters of the third initial model.
  • N is the number of marked data packets of the first application obtained by the first device.
  • M is the number of applications in the first application set.
  • pic is the predicted probability that the ith data packet belongs to category c.
  • the first device uses the method of back propagation to update the third initial model, and the specific process of obtaining the third intermediate model can be referred to the explanation in the conventional technology, and will not be repeated.
  • Step 3013 The first device sends the information of the third intermediate model to the server.
  • the information of the third intermediate model includes parameters of the third intermediate model.
  • the parameters of the third intermediate model include gradients of the parameters of the third initial model.
  • Step 3014 The first device receives the information of the first target model from the server.
  • the information of the first target model is obtained by aggregating information from intermediate models of multiple first devices.
  • the information of the first target model is used to indicate parameters of the first target model.
  • the parameters of the first target model include gradients of the updated parameters of the third initial model.
  • Step 3015 The first device obtains the first target model according to the information of the first target model and the third initial model.
  • the first device obtains the first target model according to the information of the first target model and the third initial model, including: the first device obtains according to the parameters of the third initial model and the information of the first target model. Parameters of the first target model; the first device replaces the parameters of the third initial model in the third initial model with parameters of the first target model to obtain the first target model.
  • the above steps 3011 to 3015 are described by taking the example that the first device performs one model training to obtain the first target model as an example.
  • the first device may perform model training multiple times to obtain the first target model. That is, in step 3015, the model obtained by the first device according to the information of the first target model and the third initial model may be an incomplete first target model, that is, the model obtained by the first device may not converge.
  • the first device may train the unfinished first target model according to the marked data packets of the first application obtained by the first device, send the trained gradients to the server, receive the aggregated gradients from the server, and A model is obtained according to the aggregated gradient and the above-mentioned unfinished first target model. If the model converges, the model is the first target model. If the model does not converge, the above process is repeated until the model obtained by the first device converges.
  • a device participating in the model training such as the first device, can receive the information of the third initial model and the list of the first applications from the server, and train the third The initial model is obtained, the third intermediate model is obtained, and the information of the third intermediate model is sent to the server, so that the server aggregates the information of the intermediate models from multiple first devices to obtain the information of the first target model.
  • the first device may receive the information of the first target model from the server, and obtain the first target model according to the information of the first target model and the third initial model. In this way, all devices participating in the model training can obtain a model that can finally recognize the data packet of the first application.
  • the server does not need to perform model training, but delegates the model training process to the equipment participating in the model training.
  • the number is also smaller than the number of labeled data packets used by the server to train the model. For these devices, the amount of computation is not large, and it can also save model training time.
  • step 302 may include steps 3021 to 3025 .
  • Step 3021 The first device receives the information of the first initial model and the list of the second applications from the server.
  • the information of the first initial model is used to indicate the first initial model.
  • the first initial model is determined according to the number of applications in the second application set. That is, the first initial model is an initialized model obtained according to the number of applications in the second application set.
  • the first initial model includes a second target feature extractor and a first initial classifier.
  • the second target feature extractor is a feature extractor that multiplexes the first target feature extractor into the first initial model, and subsequently, the first device may not need to train the feature extractor.
  • the first initial classifier can be updated to the second target classifier after model training.
  • the first initial model may not reuse the first target feature extractor.
  • the first initial model includes the first initial feature extractor and the first initial classifier.
  • the first initial feature extractor is an initialized feature extractor obtained by the first device.
  • the first initial model may be as shown in FIG. 6B .
  • the first initial model 604 includes a second target feature extractor 605 and a first initial classifier 606 .
  • the input of the second target feature extractor 605 is the input of the first initial model 604, the output of the second target feature extractor 605 is the input of the first initial classifier 606, and the output of the first initial classifier 606 is the first initial model 604 output.
  • the first initial classifier 606 has m output ports, and each output port corresponds to an application in the second set of applications. m is the number of applications in the second application set.
  • the information of the first initial model includes structural information of the first initial model and parameter information of the first initial model.
  • the structure information of the first initial model is used to indicate the structure of the first initial model, for example, the structure information of the first initial model is used to indicate that the first initial model includes the second target feature extractor and the first initial classifier.
  • the parameter information of the first initial model is used to indicate parameters of the first initial model, for example, parameters of the second target feature extractor and parameters of the first initial classifier.
  • the list of second applications is used to indicate the correspondence between the second application in the second application set and the output end of the first initial model.
  • the correspondence between the second application in the second application set and the output end of the first initial model may be as shown in Table 2.
  • the port corresponding to application 1 is port 1
  • the port corresponding to application 2 is port 2
  • ... the port corresponding to application m-1
  • the port corresponding to application m is port m.
  • the second application in the second set of applications The output of the first initial model Application 1 port 1 Application 2 port 2 ... ... Apply m-1 port m-1 application m port m
  • Step 3022 The first device trains the first initial model according to the marked data packet of the second application obtained by the first device, to obtain a first intermediate model.
  • the marked data packet of the second application obtained by the first device may be marked manually or marked by a machine.
  • the data packet may be marked by the administrator of the first device, or may be marked by the administrator of the server. If the data packet is marked by the administrator of the server, the first device can obtain the data packet of the second application, send the data packet of the second application to the server, and receive the marked data packet of the second application from the server. The data packet of the second application may be received by the first device, or generated by an application on the first device.
  • the data packet may be labelled by the first device, or may be labelled by the server. If the data packet is marked by the server, the first device may obtain the data packet of the second application, send the data packet of the second application to the server, and receive the marked data packet of the second application from the server.
  • the first device updates the first initial model by means of backpropagation according to the marked data packets of the second application obtained by the first device to obtain the first intermediate model. Further, the loss function used in the process of updating the first initial model by the method of backpropagation by the first device satisfies the following formula:
  • L represents the loss function, and the loss function can be used to calculate the parameters of the first initial classifier.
  • N is the number of marked data packets of the second application obtained by the first device.
  • M is the number of applications in the second application set.
  • pic is the predicted probability that the ith data packet belongs to category c.
  • the first device updates the first initial model by the method of back propagation, and the specific process of obtaining the first intermediate model can be referred to the explanation in the conventional technology, and will not be repeated.
  • Step 3023 The first device sends the information of the first intermediate model to the server.
  • the information of the first intermediate model includes parameters of the first intermediate model.
  • the parameters of the first intermediate model include gradients of parameters of the first initial classifier.
  • Step 3024 The first device receives the information of the second target model from the server.
  • the information of the second target model is obtained by aggregating information from intermediate models of multiple first devices.
  • the information of the second target model is used to indicate the parameters of the second target model.
  • the parameters of the second target model include the updated gradients of the parameters of the first initial classifier.
  • Step 3025 The first device obtains the second target model according to the information of the second target model and the first initial model.
  • the first device obtains the second target model according to the information of the second target model and the first initial model, including: the first device obtains the second target model according to the parameters of the first initial classifier and the information of the second target model, Obtain the parameters of the second target classifier; the first device replaces the parameters of the first initial classifier with the parameters of the second target classifier in the first initial model to obtain the second target model.
  • the above steps 3021 to 3025 are described by taking the example that the first device performs one model training to obtain the second target model.
  • the first device may perform model training multiple times to obtain the second target model. That is, in step 3025, the model obtained by the first device according to the information of the second target model and the first initial model may be an unfinished second target model, that is, the model obtained by the first device may not converge.
  • the first device may train the unfinished second target model according to the marked data packets of the second application obtained by the first device, send the trained gradients to the server, receive the aggregated gradients from the server, and A model is obtained based on the aggregated gradient and the above-mentioned unfinished second target model. If the model converges, the model is the second target model. If the model does not converge, the above process is repeated until the model obtained by the first device converges.
  • a device participating in model training such as a first device, can receive information about the first initial model and a list of second applications from the server, and train the first device according to the marked data packets of the second application. From the initial model, the first intermediate model is obtained, and the information of the first intermediate model is sent to the server, so that the server aggregates the information of the intermediate models from multiple first devices to obtain the information of the second target model. Subsequently, the first device may receive the information of the second target model from the server, and obtain the second target model according to the information of the second target model and the first initial model. On the one hand, all devices participating in the model training can obtain a model that can finally recognize the data packets of the second application.
  • the first initial model reuses the first target feature extractor, so when training the model, there is no need to train the feature extractor, which reduces computational overhead.
  • the server does not need to perform model training, but delegates the model training process to the equipment participating in the model training.
  • the number is also smaller than the number of labeled data packets used by the server to train the model. For these devices, the amount of computation is not large, and it can also save model training time.
  • the first device in the case where the first device has acquired the second target model multiple times, when the first device recognizes the third data packet, it needs to acquire the first target model and the plurality of second target models, each of which corresponds to the target model. and then determine the application corresponding to the third data packet according to the obtained multiple output entropies. Therefore, it may take a long time for the first device to identify the third data packet, which affects user experience.
  • the first device can compress the first target model and multiple target models into one target model, and subsequently, identify the third data packet through the compressed target model, which can save the first device from identifying the third data packet time. Specifically, reference may be made to the method shown in FIG. 8 .
  • the method shown in FIG. 3 further includes step 801 and step 802 .
  • Step 801 The first device acquires a second initial model.
  • the second initial model is determined according to the number of applications in the first application set and the number of applications in the second application set. That is, the second initial model is an initialized model obtained according to the number of applications in the first application set and the number of applications in the second application set.
  • the second initial model includes a second initial feature extractor and a second initial classifier.
  • the second initial feature extractor is a feature extractor that multiplexes the first target feature extractor into the second initial model, and subsequently, the first device does not need to train the feature extractor.
  • the second initial classifier is an initialized classifier obtained by the first device.
  • the second initial model may not reuse the first target feature extractor.
  • the feature extractor included in the second initial model is the initialized feature extractor obtained by the first device.
  • the input of the second initial model is the input of the second initial feature extractor
  • the output of the second initial feature extractor is the input of the second initial classifier
  • the output of the second initial classifier is the second initial classifier.
  • the second initial classifier has q output ports, and each output port corresponds to an application in the first application set or the second application set. q is the sum of the number of applications in the first application set and the number of applications in the second application set.
  • the first device creates the second initial model according to the number of applications in the first application set and the number of applications in the second application set.
  • the first device sends the first information to the server, and receives the information of the second initial model from the server.
  • the first information is used to indicate the number of applications in the first application set and the number of applications in the second application set.
  • the information of the second initial model is used to indicate the second initial model.
  • the information of the second initial model includes structural information of the second initial model and parameter information of the second initial model.
  • the structure information of the second initial model is used to indicate that the second initial model includes a second initial feature extractor and a second initial classifier.
  • the parameter information of the second initial model is used to indicate parameters of the second initial model, for example, parameters of the second initial feature extractor and parameters of the second initial classifier.
  • step 801 is performed. where R is an integer greater than 0.
  • Step 802 The first device trains the second initial model to obtain the third target model according to the labeling result of the data packet obtained by the first device by the first target model and the second target model.
  • the labeling result of the first target model and the second target model on the data packet obtained by the first device may be that after the first device obtains the first target model and the second target model, according to the first target model and the second target model The identification result of the data packet. That is, in the process of obtaining the third target model, the first device may use the recognition result obtained by the first device in the process of using the first target model and the second target model to recognize the data packet to train the second initial model. In this way, the first device does not need to store the marked data packets used when acquiring the first target model and the second model, which saves storage overhead.
  • the third target model is used to extract the third feature information, and determine the application corresponding to the data packet corresponding to the third feature information according to the third feature information.
  • the third feature information includes feature information of the data packet corresponding to the third feature information.
  • the third feature information includes a keyword of an application to which the data packet corresponding to the third feature information belongs. It should be understood that the data packet corresponding to the third feature information is the data packet applied in the first application set, or the data packet applied in the second application set.
  • the third target model includes a second initial feature extractor and a third target classifier.
  • the second initial feature extractor is used to extract feature information of the data packet, for example, third feature information.
  • the third target classifier is used to determine the application corresponding to the data packet corresponding to the third feature information.
  • the third target classifier is obtained by training the second initial classifier by the first device.
  • step 3022 for the specific process of training the second initial model to obtain the third target model by the first device according to the labeling results of the data packets obtained by the first device on the basis of the first target model and the second target model, refer to step 3022 above.
  • the process of training the first initial model by the first device according to the marked data packet of the second application obtained by the first device to obtain the first intermediate model will not be repeated.
  • the first device identifies the data packet of the first application or the data packet of the second application according to the third target model.
  • the first device trains the third device according to the marked data packet used when acquiring the first target model and/or the marked data packet used when acquiring the second target model. target model, and obtain the third target model after training.
  • the first device trains the third target model according to the marked data packet used when acquiring the first target model, and/or the marked data packet used when acquiring the second target model, and obtains the trained third target model
  • For the specific process refer to the process of training the first initial model by the first device according to the marked data packet of the second application obtained by the first device in the above step 3022 to obtain the first intermediate model, which will not be repeated.
  • the first device obtains the first target model according to the labeled data packets used, and/ Or, the labeled data packets used when the second target model is acquired and the third target model is trained can improve the accuracy of the model, so that the trained third target model has higher accuracy and more accurate data packet identification.
  • the second initial model can be acquired, and the data packets obtained by the first device can be processed according to the first target model and the second target model. Label the results and train the second initial model to obtain the third target model. Subsequently, the first device can identify the data packet according to the third target model, which can save time for the first device to identify the data packet. In addition, by continuously compressing the model, the first device can stabilize the size of the model, which is beneficial to the deployment of the model in the system-on-chip.
  • FIG. 9 another method for identifying a data packet provided by an embodiment of the present application is applied to a server.
  • the method includes steps 901-904.
  • Step 901 The server obtains information of the first target model.
  • the server may be the server 101 in FIG. 1 .
  • the introduction of the information of the first target model reference may be made to the above-mentioned step 3014 , and the introduction of the first target model may refer to the above-mentioned step 301 .
  • the server acquires the information of the first target model in the case of initialization (for example, the server is powered on for the first time, or the server is restored to factory settings).
  • the server acquiring the information of the first target model includes the following steps A-step E.
  • the following steps are described by taking as an example that the devices determined by the server that need to perform model training are the first device and the second device.
  • the situation in which the server obtains the first target model may refer to the situation that the devices determined by the server to be subjected to model training are the first device and the second device, and details are not repeated. .
  • the first device and the second device may be the devices in FIG. 1 .
  • the second device may be the device 103 or the device 104 in FIG. 1 .
  • the first device is the device 103 in FIG. 1
  • the second device may be the device 102 or the device 104 in FIG. 1 .
  • the first device is the device 104 in FIG. 1
  • the second device may be the device 102 or the device 103 in FIG. 1 .
  • Step A The server sends the information of the third initial model and the list of the first applications included in the first application set to the first device.
  • Step B The server receives the information of the third intermediate model from the first device.
  • Step C The server sends the information of the third initial model and the list of the first applications included in the first application set to the second device.
  • Step D The service receives the information of the fourth intermediate model from the second device.
  • Step E The server aggregates the information of the third intermediate model and the information of the fourth intermediate model to obtain the information of the first target model.
  • the server performs weighted summation of the information of the third intermediate model and the information of the fourth intermediate model to obtain the information of the first target model.
  • the above steps A to E are described by taking the example that the first device and the second device perform one model training, and the server obtains the information of the first target model.
  • the first device and the second device may perform model training multiple times before the server can obtain the information of the first target model. That is, according to the information of the first target model in step E, the obtained model may be an unfinished first target model, that is, according to the information of the first target model in step E, the obtained model may not converge.
  • the server may receive information from the intermediate models of the first device and the second device multiple times, and aggregate the received intermediate models each time to obtain the aggregated information. If the obtained model converges, the model is the first target model. If it does not converge, the above steps are repeated until the obtained model converges.
  • the server may also mark the data packet of the first application.
  • the server may mark the data packet of the first application through the administrator. For example, the server receives the data packet of the first application from the first device; the server obtains the marked data packet of the first application according to the data packet of the first application; the server sends the marked data of the first application to the first device Bag.
  • the server When the server marks the data packet of the first application, the server obtains the marked data packet of the first application according to the data packet of the first application, which includes: the server marks the data packet of the first application, and obtains the marked data packet of the first application. the first application packet.
  • the server When the server marks the data packet of the first application by the administrator, the server obtains the marked data packet of the first application according to the data packet of the first application, including: in response to the input of the administrator, the server receives the marked data packet of the first application. the first application packet.
  • Step 902 The server sends the information of the first target model to the first device.
  • Step 903 In the case that the trigger condition is satisfied, the server obtains the information of the second target model.
  • the server acquiring the information of the second target model includes the following steps a-e.
  • the following steps are described by taking as an example that the devices determined by the server that need to perform model training are the first device and the second device.
  • the information about the second target model obtained by the server may refer to the situation that the devices determined by the server that need model training are the first device and the second device. To repeat.
  • Step a The server sends the information of the first initial model and the list of second applications included in the second application set to the first device.
  • Step b The server receives the information of the first intermediate model from the first device.
  • Step c The server sends the information of the first initial model and the list of second applications included in the second application set to the second device.
  • Step d The service receives the information of the second intermediate model from the second device.
  • Step e The server aggregates the information of the first intermediate model and the information of the second intermediate model to obtain the information of the second target model.
  • the server performs weighted summation of the information of the first intermediate model and the information of the second intermediate model to obtain the information of the second target model.
  • the above steps a to e are described by taking the example that the first device and the second device perform a model training, and the server obtains the information of the second target model as an example.
  • the first device and the second device may perform model training multiple times before the server can obtain the information of the second target model. That is, according to the information of the second target model in step e, the obtained model may be an unfinished second target model, that is, according to the information of the second target model in step e, the obtained model may not converge.
  • the server may receive information from the intermediate models of the first device and the second device multiple times, and aggregate the received intermediate models each time to obtain the aggregated information. If the obtained model converges, the model is the second target model. If it does not converge, the above steps are repeated until the obtained model converges.
  • the server may also mark the data packet of the second application.
  • the server may mark the data packets of the second application through the administrator. For example, the server receives the data packet of the second application from the first device; the server obtains the marked data packet of the second application according to the data packet of the second application; the server sends the marked data of the second application to the first device Bag.
  • the server When the server marks the data packet of the second application, the server obtains the marked data packet of the second application according to the data packet of the second application, which includes: the server marks the data packet of the second application, and obtains the marked data packet of the second application. the data package of the second application.
  • the server When the server marks the data packet of the second application by the administrator, the server obtains the marked data packet of the second application according to the data packet of the second application, including: in response to the administrator's input, the server receives the marked data packet the data package of the second application.
  • Step 904 The server sends the information of the second target model to the first device.
  • the server can monitor the correct rate of the model identification data packet on the first device. If the correct rate of the model identification data packet on the first device is less than or equal to the third threshold, the server sends an indication message to the first device, indicating that The information is used to instruct the first device to retrain a fourth target model for identifying the data packets of the first application and the data packets of the second application.
  • the fourth target model is obtained by training according to the marked data packets of the first application and the marked data packets of the second application.
  • the correct rate of identifying the data packet by the fourth target model is greater than the correct rate of identifying the data packet by the first device according to the first target model and the second target model. In this way, the correct rate of identifying the data packet by the first device can be improved.
  • the server sends indication information to the first device.
  • the server sends the indication information to the first device.
  • the third target model For the introduction of the third target model, reference may be made to the method shown in FIG. 8 above.
  • the server does not need to perform model training, but delegates the model training process to the devices (the first device and the second device) participating in the model training, and the server transfers the information from the intermediate models of multiple devices Aggregation can be performed, which reduces the computing overhead of the server.
  • the number of labeled data packets used by each device participating in model training is also smaller than the number of labeled data packets used by the server when training the model. For these devices, the amount of calculation is not large, and it can save money Model training time.
  • the above-mentioned methods for identifying data packets shown in FIG. 3 , FIG. 5 , FIG. 7 and FIG. 8 are applied to the first device, and the method for identifying data packets shown in FIG. 9 is applied to the server.
  • the method for identifying the data packet provided by the embodiment of the present application is described below from the perspective of the interaction between the first device, the second device and the server.
  • the method for identifying a data packet may include steps 1001 to 1019 .
  • Step 1001 The server sends the information of the third initial model and the list of the first applications included in the first application set to the first device.
  • step 100 For the introduction of step 1001, reference may be made to the description in step A above.
  • the first device receives the information of the third initial model from the server and the list of the first applications included in the first application set.
  • Step 1002 The first device trains a third initial model according to the marked data packets of the first application obtained by the first device, and obtains a third intermediate model.
  • Step 1003 The first device sends the information of the third intermediate model to the server.
  • steps 1002 to 1003 For the introduction of steps 1002 to 1003, reference may be made to the above steps 3012 to 3013.
  • the server receives the information of the third intermediate model from the first device.
  • Step 1004 The server sends the information of the third initial model and the list of the first applications included in the first application set to the second device.
  • step 1004 For the introduction of step 1004, reference may be made to the description in step C above.
  • the second device receives the information of the third initial model and the list of the first applications included in the first application set from the server.
  • Step 1005 The second device trains the third initial model according to the marked data packets of the first application obtained by the second device, and obtains a fourth intermediate model.
  • Step 1006 The second device sends the information of the fourth intermediate model to the server.
  • steps 1005 to 1006 For the introduction of steps 1005 to 1006, reference may be made to the corresponding descriptions in the foregoing steps 3012 to 3013.
  • the server receives the information of the fourth intermediate model from the second device.
  • steps 1001 to 1003 and steps 1004 to 1006 do not limit the execution order of steps 1001 to 1003 and steps 1004 to 1006 .
  • steps 1001 to 1003 may be performed first, and then steps 1004 to 1006 may be performed.
  • steps 1004 to 1006 may also be performed first, and then steps 1001 to 1003 are performed.
  • steps 1004 to 1006 and steps 1001 to 1003 may also be performed simultaneously.
  • Step 1007 The server aggregates the information of the third intermediate model and the information of the fourth intermediate model to obtain the information of the first target model.
  • step 1007 For the description of step 1007, reference may be made to the description of step E above.
  • Step 1008 The server sends the information of the first target model to the first device.
  • the first device receives the information of the first target model from the server.
  • Step 1009 The first device obtains the first target model according to the information of the first target model and the third initial model.
  • step 1009 For the introduction of step 1009, reference may be made to the description in step 3015 above.
  • Step 1010 The server sends the information of the first initial model and the list of second applications included in the second application set to the first device.
  • step 1010 For the introduction of step 1010, reference may be made to the description in step a above.
  • the first device receives information from the server of the first initial model and a list of second applications included in the second application set.
  • Step 1011 The first device trains the first initial model according to the marked data packet of the second application obtained by the first device to obtain a first intermediate model.
  • Step 1012 The first device sends the information of the first intermediate model to the server.
  • steps 1011 to 1012 For the introduction of steps 1011 to 1012, reference may be made to the above steps 3022 to 3023.
  • the server receives the information of the first intermediate model from the first device.
  • Step 1013 The server sends the information of the first initial model and the list of second applications included in the second application set to the second device.
  • step 1013 for the introduction of step 1013, reference may be made to the description in step c above.
  • the second device receives information from the server of the first initial model and a list of second applications included in the second application set.
  • Step 1014 The second device trains the first initial model according to the marked data packet of the second application obtained by the second device, to obtain a second intermediate model.
  • Step 1015 The second device sends the information of the second intermediate model to the server.
  • steps 1014 to 1015 For the introduction of steps 1014 to 1015, reference may be made to the corresponding descriptions in the foregoing steps 3022 to 3023.
  • the server receives the information of the second intermediate model from the second device.
  • steps 1010 to 1012 and steps 1013 to 1015 do not limit the execution order of steps 1010 to 1012 and steps 1013 to 1015 .
  • steps 1010 to 1012 may be performed first, and then steps 1013 to 1015 may be performed.
  • steps 1013 to 1015 may also be performed first, and then steps 1010 to 1012 are performed.
  • steps 1013 to 1015 and steps 1010 to 1012 may be performed simultaneously.
  • Step 1016 The server aggregates the information of the first intermediate model and the information of the second intermediate model to obtain the information of the second target model.
  • step 1016 For the description of step 1016, reference may be made to the description of step e above.
  • Step 1017 The server sends the information of the second target model to the first device.
  • the first device receives the information of the second target model from the server.
  • Step 1018 The first device obtains the second target model according to the information of the second target model and the first initial model.
  • step 1018 For the introduction of step 1018, reference may be made to the description in step 3025 above.
  • Step 1019 The first device acquires the third data packet, and determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model.
  • step 1019 For the introduction of step 1019, reference may be made to the description in step 303 above.
  • the server does not need to perform model training, but delegates the model training process to the devices (the first device and the second device) participating in the model training.
  • the information of the model can be aggregated, which reduces the computing overhead of the server.
  • the first device does not need to use the marked first application set and the second Model training is performed on the data packets of the applications in the application set to obtain a model that can identify both the data packets of the applications in the first application set and the data packets of the applications in the second application set.
  • the first device can perform model training according to the marked data packets of the second application to obtain a second target model, and subsequently, identify the data packets of the applications in the first application set according to the first target model and the second target model, or data packets of applications in the second application set.
  • the number of marked data packets of the second application is much smaller than the number of marked data packets of the first application and the second application, so the calculation amount of the first device is small and the training time is short.
  • the first device uses the data package of the marked second application for model training, so the marked first application can be released. data packets, reducing the cost of data storage.
  • the first device in the case where the first device has acquired the second target model multiple times, when the first device recognizes the third data packet, it needs to acquire the first target model and the plurality of second target models, each of which corresponds to the target model. and then determine the application corresponding to the third data packet according to the obtained multiple output entropies. Therefore, it may take a long time for the first device to identify the third data packet, which affects user experience.
  • the first device can compress the first target model and multiple target models into one target model, and subsequently, identify the third data packet through the compressed target model, which can save the first device from identifying the third data packet time. Specifically, reference may be made to the method shown in FIG. 11 .
  • the method shown in FIG. 10 further includes step 1101 and step 1102 .
  • Step 1101 The first device acquires a second initial model.
  • Step 1102 The first device trains the second initial model to obtain the third target model according to the labeling result of the data packet obtained by the first device by the first target model and the second target model.
  • steps 1101 and 1102 For the introduction of steps 1101 and 1102, reference may be made to the descriptions in steps 801 and 802 above.
  • the second initial model can be acquired, and the data packets obtained by the first device can be processed according to the first target model and the second target model. Label the results and train the second initial model to obtain the third target model. Subsequently, the first device can identify the data packet according to the third target model, which can save time for the first device to identify the data packet. In addition, by continuously compressing the model, the first device can stabilize the size of the model, which is beneficial to the deployment of the model in the system-on-chip.
  • FIG. 12 another method for identifying a data packet provided by an embodiment of the present application.
  • the method includes steps 1201-1203.
  • Step 1201 The first device acquires a first target model.
  • the first apparatus may be the server 101 , the device 102 , the device 103 or the device 104 in FIG. 1 .
  • the first device acquires the first target model when the first device is initialized (for example, the first device is powered on for the first time, or the first device is restored to factory settings).
  • the acquisition of the first target model by the first device includes the following steps 1-3.
  • Step 1 The first device acquires a data packet of the first application in the marked first application set.
  • the data packet of the first application in the marked first application set obtained by the first device may be marked manually or marked by a machine.
  • Step 2 The first device acquires the third initial model and the list of first applications included in the first application set.
  • Step 3 The first device trains the third initial model according to the marked data packets of the first application to obtain the first target model.
  • step 3 For the introduction of step 3, reference may be made to the corresponding description in step 3012 above.
  • Step 1202 In the case that the trigger condition is satisfied, the first device acquires the second target model.
  • the acquisition of the second target model by the first device includes the following steps 4-6.
  • Step 4 The first device acquires the data packet of the second application in the marked second application set.
  • the data packets of the second application in the marked second application set obtained by the first device may be manually marked or machine marked.
  • Step 5 The first device acquires the first initial model and a list of second applications included in the second application set.
  • Step 6 The first device trains the first initial model according to the marked data packets of the second application to obtain the second target model.
  • step 6 For the introduction of step 6, reference may be made to the corresponding description in step 3022 above.
  • the first device will acquire the second target model. That is, before step 1203, or after step 1203, the first device may acquire the second target model for multiple times. The difference is that the applications in the second application set corresponding to the second target model acquired each time are different.
  • the second set of applications includes applications installed on the server, the first device or other devices after the first device acquires the target model last time.
  • Step 1203 The first device acquires the third data packet, and determines the first application or the second application corresponding to the third data packet according to the first target model and the second target model.
  • step 1203 For the introduction of step 1203, reference may be made to the description in step 303 above.
  • the first device when a new application appears after using the first target model (the new application is the application in the second application set), the first device does not need to use the marked first application Model training is performed on the set and the data packets of the applications in the second application set to obtain a model that can identify both the data packets of the applications in the first application set and the data packets of the applications in the second application set.
  • the first device can perform model training according to the marked data packets of the second application to obtain the second target model, and subsequently, identify the data packets of the applications in the first application set according to the first target model and the second target model, or data packets of applications in the second application set.
  • the calculation of the first device The volume is small and the training time is short.
  • the first device uses the data package of the marked second application for model training, so the marked first application can be released. data packets, reducing the cost of data storage.
  • the first device can compress the first target model and multiple target models into one target model, and subsequently, identify the third data packet by using the compressed target model, which can save the first device from identifying the third data packet time. Specifically, reference may be made to the method shown in FIG. 13 .
  • the method shown in FIG. 12 further includes step 1301 and step 1302 .
  • Step 1301 The first device acquires a second initial model.
  • Step 1302 The first device trains the second initial model to obtain the third target model according to the labeling results of the data packets obtained by the first device by the first target model and the second target model.
  • step 1301 and step 1302 For the introduction of step 1301 and step 1302, reference may be made to the description in step 801 and step 802 above.
  • the second initial model can be acquired, and the data packets obtained by the first device can be processed according to the first target model and the second target model. Label the results and train the second initial model to obtain the third target model. Subsequently, the first device can identify the data packet according to the third target model, which can save time for the first device to identify the data packet. In addition, the first device can stabilize the size of the model by continuously compressing the model, which is beneficial to the deployment of the model in the system-on-chip.
  • the above-mentioned first device, server, or first apparatus, etc. include corresponding hardware structures and/or software modules for executing each function.
  • Those skilled in the art should easily realize that the unit and algorithm operations of each example described in conjunction with the embodiments disclosed herein can be implemented in hardware or in the form of a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
  • the first device, the server, or the first device may be divided into functional modules according to the foregoing method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one in the processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that, the division of modules in the embodiments of the present application is schematic, and is only a logical function division, and there may be other division manners in actual implementation.
  • FIG. 14 shows a schematic structural diagram of an apparatus for identifying a data packet.
  • the apparatus may be the first device or a chip or a system-on-chip in the first device, and the apparatus may be used to execute the functions of the first device involved in the foregoing embodiments.
  • the apparatus shown in FIG. 14 includes: an acquisition module 1401 and a determination module 1402 .
  • the obtaining module 1401 is used to obtain the first target model.
  • the first target model is used to extract the first feature information of the first data packet, and determine the first application in the first application set corresponding to the first data packet.
  • the obtaining module 1401 is configured to perform step 301 .
  • the obtaining module 1401 is further configured to obtain the second target model when the trigger condition is satisfied.
  • the second target model is used to extract the second feature information of the second data packet, determine the second application in the second application set corresponding to the second data packet, and the first application and the second application set in the first application set The second application in is different.
  • the obtaining module 1401 is further configured to perform step 302 .
  • the determining module 1402 is further configured to acquire a third data packet, and determine the first application or the second application corresponding to the third data packet according to the first target model and the second target model. Exemplarily, with reference to FIG. 3 , the determination module 1402 is configured to perform step 303 .
  • the acquisition module 1401 is specifically configured to receive the information of the first initial model from the server and the list of second applications included in the second application set, where the first initial model is applied according to the second application set. If the number is determined, the list of second applications is used to indicate the correspondence between the second application in the second application set and the output end of the first initial model; the obtaining module 1401 is also specifically configured to obtain the marked second application obtained by the device.
  • the applied data package trains the first initial model to obtain the first intermediate model; the acquisition module 1401 is also specifically used to send the information of the first intermediate model to the server; the acquisition module 1401 is also specifically used to receive the second target from the server
  • the information of the model, the information of the second target model is obtained by aggregating the information of the intermediate models from a plurality of first devices; the obtaining module 1401 is also specifically used to obtain the information of the second target model and the first initial model according to the information of the second target model and the first initial model. Obtain the second target model.
  • the acquisition module 1401 is also specifically used to acquire the data packet of the second application; the acquisition module 1401 is also specifically used to send the data packet of the second application to the server; the acquisition module 1401 is also specifically used to receive Annotated data packets of the second application from the server.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the determination module 1402 is specifically configured to obtain the first output entropy of the third data packet according to the first target model, and the first output entropy is used to indicate that the application corresponding to the third data packet is the first target model The probability of the predicted application; the determination module 1402 is also specifically configured to obtain the second output entropy of the third data packet according to the second target model, and the second output entropy is used to indicate that the application corresponding to the third data packet is the second target model Probability of the predicted application; the determining module 1402 is further specifically configured to determine the application predicted by the target model corresponding to the output entropy with a lower value among the first output entropy and the second output entropy as the application corresponding to the third data packet.
  • the device further includes: a training module; an acquisition module 1401, further configured to acquire a second initial model, where the second initial model is based on the number of applications in the first application set and the number of applications in the second application set The number is determined; the training module is used to label the data packets obtained by the device according to the first target model and the second target model, train the second initial model to obtain the third target model, and the third target model is used to extract the third characteristic information, and the application corresponding to the data packet corresponding to the third characteristic information is determined according to the third characteristic information, the third characteristic information includes characteristic information of the data packet corresponding to the third characteristic information, and the data packet corresponding to the third characteristic information is Data packets of applications in the first application set, or data packets of applications in the second application set.
  • the training module is also used to train the third target according to the marked data packets used when acquiring the first target model, and/or the marked data packets used when acquiring the second target model model to obtain the third target model after training.
  • the apparatus further includes: a receiving module; a receiving module, configured to receive indication information from the server, where the indication information is used to instruct the apparatus to retrain the data packets used to identify the first application and the data packets of the second application the fourth target model.
  • the apparatus is presented in the form of dividing each functional module in an integrated manner.
  • Module herein may refer to a specific ASIC, circuit, processor and memory executing one or more software or firmware programs, integrated logic circuit, and/or other device that may provide the functions described above.
  • the device may take the form shown in FIG. 2 .
  • the processor 201 in FIG. 2 can execute the instructions by calling the computer stored in the memory 203, so that the apparatus executes the data packet identification method in the above method embodiment.
  • the function/implementation process of the acquisition module 1401 and the determination module 1402 in FIG. 14 may be implemented by the processor 201 in FIG. 2 calling the computer-executed instructions stored in the memory 203 .
  • the apparatus provided in this embodiment can perform the above-mentioned data packet identification method, the technical effect that can be obtained can be referred to the above-mentioned method embodiments, which will not be repeated here.
  • FIG. 15 shows a schematic structural diagram of an apparatus for identifying a data packet.
  • the apparatus may be a server or a chip or a system-on-chip in the server, and the apparatus may be used to execute the functions of the server involved in the foregoing embodiments.
  • the apparatus shown in FIG. 15 includes: an acquiring module 1501 and a sending module 1502;
  • the acquiring module 1501 is used for acquiring information of the first target model.
  • the first target model is used to extract the first feature information of the first data packet, and determine the first application in the first application set corresponding to the first data packet.
  • the obtaining module 1501 is configured to perform step 901 .
  • the sending module 1502 is configured to send the information of the first target model to the first device. Exemplarily, with reference to FIG. 9 , the sending module 1502 is configured to perform step 902 .
  • the obtaining module 1501 is further configured to obtain the information of the second target model when the trigger condition is satisfied.
  • the second target model is used to extract the second feature information of the second data packet, determine the second application in the second application set corresponding to the second data packet, and the first application and the second application set in the first application set The second application in is different.
  • the obtaining module 1501 is further configured to perform step 903 .
  • the sending module 1502 is further configured to send the information of the second target model to the first device. Exemplarily, with reference to FIG. 9 , the sending module 1502 is further configured to perform step 904 .
  • the acquisition module 1501 is specifically configured to send the information of the first initial model and the list of the second applications included in the second application set to the first device, where the first initial model is based on the first initial model in the second application set.
  • the number of the second application is determined, and the list of the second application is used to indicate the corresponding relationship between the second application in the second application set and the output end of the first initial model;
  • the obtaining module 1501 is also specifically configured to receive the information from the first device.
  • Information of the first intermediate model, the first intermediate model is obtained by the first device training the first initial model according to the marked data packet of the second application obtained by the first device; the obtaining module 1501 is also specifically used to send the first device to the first device.
  • the second device sends the information of the first initial model and the list of the second application;
  • the obtaining module 1501 is also specifically configured to receive the information of the second intermediate model from the second device, and the second intermediate model is obtained by the second device according to the second device
  • the marked data package of the second application is obtained by training the first initial model;
  • the acquisition module 1501 is also specifically used to aggregate the information of the first intermediate model and the information of the second intermediate model to obtain the second target model Information.
  • the acquisition module 1501 is also specifically used to receive the data packet of the second application from the first device; the acquisition module 1501 is also specifically used to acquire the marked second application according to the data packet of the second application.
  • the data packet of the application; the obtaining module 1501 is further specifically configured to send the marked data packet of the second application to the first device.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the sending module 1502 is further configured to send indication information to the first device if the correct rate of the identification data packets of the first target model and the second target model is less than or equal to the third threshold, and the indication information is used to indicate The first device retrains a fourth target model for identifying the data packets of the first application and the data packets of the second application.
  • the apparatus is presented in the form of dividing each functional module in an integrated manner.
  • Module herein may refer to a specific ASIC, circuit, processor and memory executing one or more software or firmware programs, integrated logic circuit, and/or other device that may provide the functions described above.
  • the device may take the form shown in FIG. 2 .
  • the processor 201 in FIG. 2 can execute the instructions by calling the computer stored in the memory 203, so that the apparatus executes the communication method in the above method embodiment.
  • the function/implementation process of the acquiring module 1501 and the sending module 1502 in FIG. 15 may be implemented by the processor 201 in FIG. 2 calling the computer-executed instructions stored in the memory 203 .
  • the function/implementation process of the acquiring module 1501 in FIG. 15 can be implemented by the processor 201 in FIG. 2 calling the computer execution instructions stored in the memory 203, and the function/implementation process of the sending module 1502 in FIG. 2 in the communication interface 204 to achieve.
  • the apparatus provided in this embodiment can perform the above-mentioned data packet identification method, the technical effect that can be obtained can be referred to the above-mentioned method embodiments, which will not be repeated here.
  • FIG. 16 shows a schematic structural diagram of an apparatus for identifying a data packet.
  • the apparatus may be a first apparatus or a chip or a system-on-chip in the first apparatus, and the apparatus may be configured to perform the functions of the first apparatus involved in the foregoing embodiments.
  • the apparatus shown in FIG. 16 includes: an acquisition module 1601 and a determination module 1602 .
  • the obtaining module 1601 is used to obtain the first target model.
  • the first target model is used to extract the first feature information of the first data packet, and determine the first application in the first application set corresponding to the first data packet.
  • the obtaining module 1601 is configured to perform step 1201 .
  • the acquiring module 1601 is further configured to acquire the second target model when the trigger condition is satisfied.
  • the second target model is used to extract the second feature information of the second data packet, determine the second application in the second application set corresponding to the second data packet, and the first application and the second application set in the first application set The second application in is different.
  • the obtaining module 1601 is further configured to perform step 1202 .
  • the determining module 1602 is configured to acquire the third data packet, and determine the first application or the second application corresponding to the third data packet according to the first target model and the second target model. Exemplarily, with reference to FIG. 12 , the determination module 1602 is configured to perform step 1203 .
  • the acquisition module 1601 is specifically used to acquire the data package of the second application in the marked second application set; the acquisition module 1601 is also specifically used to acquire the first initial model and the second application set included.
  • a list of second applications, the first initial model is determined according to the number of applications in the second application set, and the list of second applications is used to indicate the correspondence between the second application in the second application set and the output of the first initial model relationship; the obtaining module 1601 is further specifically configured to train the first initial model according to the marked data package of the second application to obtain the second target model.
  • the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold; or, the trigger condition is that the number of data packets applied in the second application set is greater than or equal to the second threshold; Alternatively, the trigger condition is that the number of applications in the second application set is greater than or equal to the first threshold, and the number of data packets applied in the second application set is greater than or equal to the second threshold.
  • the determination module 1602 is specifically configured to obtain the first output entropy of the third data packet according to the first target model, and the first output entropy is used to indicate that the application corresponding to the third data packet is the first target model The probability of the predicted application; the determination module 1602 is also specifically configured to obtain the second output entropy of the third data packet according to the second target model, and the second output entropy is used to indicate that the application corresponding to the third data packet is the second target model Probability of the predicted application; the determining module 1602 is further specifically configured to determine, among the first output entropy and the second output entropy, the application predicted by the target model corresponding to the output entropy with a lower value as the application corresponding to the third data packet.
  • the apparatus further includes: a training module; an acquisition module 1601, further configured to acquire a second initial model, where the second initial model is based on the number of applications in the first application set and the number of applications in the second application set The number is determined; the training module is used for the labeling results of the data packets obtained by the first device according to the first target model and the second target model, and trains the second initial model to obtain the third target model.
  • the third target model uses is used to extract the third characteristic information, and determine the application corresponding to the data packet corresponding to the third characteristic information according to the third characteristic information.
  • the third characteristic information includes characteristic information of the data packet corresponding to the third characteristic information, and data corresponding to the third characteristic information.
  • the package is a data package of an application in the first application set, or a data package of an application in the second application set.
  • the training module is also used to train the third target according to the marked data packets used when acquiring the first target model, and/or the marked data packets used when acquiring the second target model
  • the model after getting trained, wants the third target model.
  • the acquisition module 1601 is also used to retrain the data packets used to identify the first application and the first target model if the correct rate of the data packets identified by the first target model and the second target model is less than or equal to the third threshold.
  • the fourth destination model of the packet of the second application is also used to retrain the data packets used to identify the first application and the first target model if the correct rate of the data packets identified by the first target model and the second target model is less than or equal to the third threshold.
  • the fourth destination model of the packet of the second application is also used to retrain the data packets used to identify the first application and the first target model if the correct rate of the data packets identified by the first target model and the second target model is less than or equal to the third threshold.
  • the apparatus is presented in the form of dividing each functional module in an integrated manner.
  • Module herein may refer to a specific ASIC, circuit, processor and memory executing one or more software or firmware programs, integrated logic circuit, and/or other device that may provide the functions described above.
  • the device may take the form shown in FIG. 2 .
  • the processor 201 in FIG. 2 may call the computer to execute the instructions stored in the memory 203, so that the apparatus executes the data packet identification method in the above method embodiment.
  • the function/implementation process of the acquiring module 1601 and the determining module 1602 in FIG. 16 may be implemented by the processor 201 in FIG. 2 calling the computer-executed instructions stored in the memory 203 .
  • the apparatus provided in this embodiment can perform the above-mentioned data packet identification method, the technical effect that can be obtained can be referred to the above-mentioned method embodiments, which will not be repeated here.
  • FIG. 17 is a schematic structural diagram of a chip provided by an embodiment of the present application.
  • Chip 170 includes one or more processors 1701 and interface circuits 1702 .
  • the chip 170 may further include a bus 1703 . in:
  • the processor 1701 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above-mentioned method may be completed by an integrated logic circuit of hardware in the processor 1701 or an instruction in the form of software.
  • the aforementioned processor 1701 may be a general purpose processor, a digital communicator (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
  • DSP digital communicator
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the interface circuit 1702 is used to transmit or receive data, instructions or information.
  • the processor 1701 can use the data, instructions or other information received by the interface circuit 1702 to perform processing, and can send the processing completion information through the interface circuit 1702 .
  • the chip 170 further includes a memory, which may include a read-only memory and a random access memory, and provides operation instructions and data to the processor.
  • a portion of the memory may also include non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory stores executable software modules or data structures
  • the processor may execute corresponding operations by calling operation instructions stored in the memory (the operation instructions may be stored in the operating system).
  • the chip 170 may be used in a data packet identification apparatus (including a first device, a server, or a first apparatus) involved in the embodiments of the present application.
  • the interface circuit 1702 may be used to output the execution result of the processor 1701 .
  • processor 1701 and the interface circuit 1702 can be implemented by hardware design, software design, or a combination of software and hardware, which is not limited here.
  • FIG. 18 shows a schematic diagram of the composition of a data packet identification system.
  • the data packet identification system 180 may include: a first device 1801 and a server 1802 .
  • FIG. 18 is only an exemplary drawing, and the embodiments of the present application do not limit the devices and the number of devices included in the data packet identification system 180 shown in FIG. 18 .
  • the first device 1801 has the function of the device for identifying the data packet shown in FIG. 14, and is used to obtain the first target model, and when the trigger condition is satisfied, obtain the second target model, and obtain the third data packet, according to The first target model and the second target model determine the first application or the second application corresponding to the third data packet.
  • the server 1802 has the function of the identification device of the data packet shown in FIG. 15, and can be used to obtain the information of the first target model, send the information of the first target model to the first device 1801, obtain the information of the second target model, and send the information of the second target model to the first device 1801.
  • the first device 1802 sends information of the second target model.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are only illustrative.
  • the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be Incorporation may either be integrated into another device, or some features may be omitted, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may be one physical unit or multiple physical units, that is, they may be located in one place, or may be distributed to multiple different places . Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium.
  • the technical solutions of the embodiments of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, which are stored in a storage medium , including several instructions to make a device (may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk and other mediums that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente demande divulgue un procédé et un appareil de reconnaissance de paquets de données qui se rapportent au domaine de l'intelligence artificielle. Dans le cas où une nouvelle application est ajoutée, un apprentissage de modèle peut être réalisé sur la base d'un paquet de données généré par l'application nouvellement ajoutée qui est marquée, la quantité de calcul étant petite et le temps d'apprentissage étant court. Ledit procédé consiste à : acquérir un premier modèle cible, le premier modèle cible étant utilisé pour extraire des premières informations de caractéristiques d'un premier paquet de données et déterminer une première application parmi un premier ensemble d'applications correspondant au premier paquet de données; lorsqu'une condition de déclenchement est satisfaite, acquérir un second modèle cible, le second modèle cible étant utilisé pour extraire des secondes informations de caractéristique d'un deuxième paquet de données et déterminer une seconde application parmi un second ensemble d'applications correspondant au deuxième paquet de données; et acquérir un troisième paquet de données et déterminer, en fonction du premier modèle cible et du second modèle cible, une première application ou une seconde application correspondant au troisième paquet de données.
PCT/CN2021/101662 2020-09-21 2021-06-22 Procédé et appareil de reconnaissance de paquets de données WO2022057355A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010998077.8A CN114298116A (zh) 2020-09-21 2020-09-21 数据包的识别方法及装置
CN202010998077.8 2020-09-21

Publications (1)

Publication Number Publication Date
WO2022057355A1 true WO2022057355A1 (fr) 2022-03-24

Family

ID=80777490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/101662 WO2022057355A1 (fr) 2020-09-21 2021-06-22 Procédé et appareil de reconnaissance de paquets de données

Country Status (2)

Country Link
CN (1) CN114298116A (fr)
WO (1) WO2022057355A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106976A1 (en) * 2005-11-07 2007-05-10 International Business Machines Corporation Re-wiring component assemblies in component based user applications
CN104796300A (zh) * 2015-03-23 2015-07-22 亚信科技(南京)有限公司 一种数据包特征提取方法及装置
CN110300003A (zh) * 2018-03-21 2019-10-01 华为技术有限公司 数据处理方法以及客户端
WO2020024761A1 (fr) * 2018-07-30 2020-02-06 华为技术有限公司 Procédé et appareil de génération de modèle d'identification d'applications
CN111181986A (zh) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 数据安全检测方法、模型训练方法、装置和计算机设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106976A1 (en) * 2005-11-07 2007-05-10 International Business Machines Corporation Re-wiring component assemblies in component based user applications
CN104796300A (zh) * 2015-03-23 2015-07-22 亚信科技(南京)有限公司 一种数据包特征提取方法及装置
CN110300003A (zh) * 2018-03-21 2019-10-01 华为技术有限公司 数据处理方法以及客户端
WO2020024761A1 (fr) * 2018-07-30 2020-02-06 华为技术有限公司 Procédé et appareil de génération de modèle d'identification d'applications
CN111181986A (zh) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 数据安全检测方法、模型训练方法、装置和计算机设备

Also Published As

Publication number Publication date
CN114298116A (zh) 2022-04-08

Similar Documents

Publication Publication Date Title
US10788992B2 (en) System and method for efficient access for remote storage devices
CN111226238B (zh) 一种预测方法及终端、服务器
US20190268213A1 (en) Network function management method, management unit, and system
CN110958281B (zh) 基于物联网的数据传输方法及通信装置
CN108021518A (zh) 一种数据交互方法和计算设备
CN110278161B (zh) 基于用户态协议栈的报文分流方法、装置及系统
JP7392139B2 (ja) ネットワークデータ分析方法、機能エンティティ及び電子機器
US20230042747A1 (en) Message Processing Method and Device, Storage Medium, and Electronic Device
US11483177B2 (en) Dynamic intelligent analytics VPN instantiation and/or aggregation employing secured access to the cloud network device
CN112346833A (zh) 用于隐私计算的任务处理方法、处理器及异构处理系统
US20220300418A1 (en) Maximizing resource bandwidth with efficient temporal arbitration
CN114374609A (zh) 基于rdma设备的深度学习作业运行方法及系统
US20190215348A1 (en) Beacon sensor advertisement frame
US20230148106A1 (en) Optimized Model Transmission
CN107277163B (zh) 一种设备远程映射方法及装置
WO2022057355A1 (fr) Procédé et appareil de reconnaissance de paquets de données
WO2019062634A1 (fr) Procédé et appareil de communication
CN110727511B (zh) 应用程序的控制方法、网络侧设备和计算机可读存储介质
WO2023020432A1 (fr) Procédé de demande de puissance de calcul, procédé d'attribution de puissance de calcul, procédé d'exécution de puissance de calcul et terminal et dispositif côté réseau
CN114285906B (zh) 报文处理方法、装置、电子设备及存储介质
CN110391998A (zh) 一种业务流传输的方法和设备
US20190107971A1 (en) System and method for providing input/output determinism
WO2018010420A1 (fr) Procédé d'accès à un réseau sans fil, dispositif, terminal, système, et support de stockage
CN112511526B (zh) 数据传输方法、设备和可读存储介质
WO2024082099A1 (fr) Procédé de communication, dispositif électronique et support d'enregistrement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21868184

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21868184

Country of ref document: EP

Kind code of ref document: A1