Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing network flow classified model and corresponding system thereof

A network traffic and classification model technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of low recognition rate, inapplicability of online real-time recognition, and the influence of extracted features, and achieve high recognition accuracy and fast The effect of the application layer traffic identification method

Inactive Publication Date: 2008-08-27
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method also has its own shortcomings: first, it can only identify those applications whose characteristic strings are visible, but it is very difficult to obtain the characteristic strings, especially for some non-public protocols, such as Skype; second, the identification process The process becomes complicated and requires a certain amount of memory, and the Payload of a large number of data packets needs to be saved, which affects the real-time performance of traffic identification
This method has three shortcomings: first, the indicators used are basically flow statistics indicators, which can only be obtained after the end of the flow, so it is not suitable for online real-time recognition; second, it does not explain which indicator can produce better results ;Third, the K-means algorithm used has defects in the selection of the initial cluster center and the determination of the number of clusters, which has a great impact on the results of clustering and the extracted features, and the recognition rate of the experimental results is low
Although the article has made some improvements in the selection of indicators for flow statistics, it does not explain how to improve the shortcomings of the K-means algorithm in the initialization of cluster centers and the determination of the number of clusters.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing network flow classified model and corresponding system thereof
  • Method for establishing network flow classified model and corresponding system thereof
  • Method for establishing network flow classified model and corresponding system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0062] In the process of classifying network traffic, a segment of network traffic is firstly intercepted, and then the segment of network traffic is analyzed, and then flows in the network traffic are divided into specific applications. The stream is a quintuple including source IP, destination IP, source port, destination port and protocol of dual communication. In this process, the possible types of applications to which the flows belong are known, and the key lies in how to classify these flows and divide them into corresponding applications. In the process of classifying the streams, a network traffic classification model needs to be adopted, and what the present invention aims to solve is how to establish a network traffic classification model.

[0063] The establishment of the network traffic classification model is based on the analysi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a setup method of a network flow classification model. The method includes that identification indexes are selected and extracted from the stream data packets of the caught network flow; an initialization cluster center is selected under the set-up cluster numbers according to the identification indexes; a clustering operation is taken on the identification indexes and a new cluster center is newly computed; the normalized mutual information values of all clustering operation results are computed respectively under the set-up cluster numbers and one of the clusters is selected as the best cluster number according to the normalized mutual information values; the clustering operation result under the best cluster number and the new cluster center are selected as the network flow classification model according to the obtained best cluster number. The invention verifies if the selection of the cluster numbers is right by the computation of a NMI value and gives better clustering feature and higher identification precision by the selection of the best cluster number.

Description

technical field [0001] The invention relates to network flow classification, in particular to a method for establishing a classification model in network flow classification and a corresponding system. Background technique [0002] In recent years, with the rapid development of Internet technology, new protocols and application software have emerged, such as P2P (Peer-To-Peer), VOIP (Voice Over Internet Protocol) and so on. The continuous increase of new services keeps the egress network bandwidth utilization rate high and even causes network congestion, especially for enterprise or campus networks. Therefore, network traffic needs to be controlled in practical applications. In addition, applications obtained through unsafe network environments may also cause the intrusion of viruses and malicious codes, bringing hidden dangers to network security. The aforementioned network traffic control and network security both involve how to quickly and accurately identify application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L12/26H04L12/801
Inventor 苏欣杨建华张大方谢高岗
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products