Method for extracting voiceprint feature vectors of encrypted network flow

A voiceprint feature and extraction method technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as the inability to effectively identify protocols, the inability of traffic classification systems to correctly classify private encrypted protocol traffic, and the inability to identify hidden protocols. , to achieve the effect of rich and reliable knowledge

Active Publication Date: 2014-01-29
TSINGHUA UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] 2. No other data packets arrive within 15 seconds after receiving a data packet;
Using the existing statistical feature extraction method, although the traffic classification technology based on network flow can effectively identify the encrypted proxy channel protocol, it cannot identify the hidden protocol in the channel
[0020] To sum up, because the statistical feature extraction method adopted by the current classification technology can only extract static statistical features from the network flow, the traffic classification system cannot correctly classify the traffic of the private encryption protocol, let alone effectively identify the traffic hidden in the encrypted proxy channel. protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for extracting voiceprint feature vectors of encrypted network flow
  • Method for extracting voiceprint feature vectors of encrypted network flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0040] The statistical feature extraction method adopted by the current classification technology can only extract static statistical features from the network flow, which leads to the problem that the traffic classification system cannot correctly classify the private encryption protocol traffic, let alone effectively identify the protocol hidden in the encrypted proxy channel. The invention proposes a method for extracting feature vectors of encrypted network flow voiceprints. This method first uses a sliding window to record the time-series statistical characteristics of the encrypted network flow in a continuous period of time, then filters the processing units in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for extracting voiceprint feature vectors of encrypted network flow. The method includes steps of S2, creating a voiceprint feature vector extraction sliding window for the encrypted network flow; S3, updating the voiceprint feature extraction sliding window by the aid of current data packets; S5, filtering the voiceprint feature extraction sliding window; S7, screening unit groups containing more k units from the sliding window; S9, sequentially extracting voiceprint features of each unit group. The method has the advantages that dynamic features of the network flow can be effectively described by the extracted voiceprint features; merits of the traditional method for extracting statistical features of network flow are inherited, rich and reliable knowledge can be provided, and technical support can be provided for designing and implementing high-performance flow classification systems in high-speed networks.

Description

technical field [0001] The invention belongs to the technical field of flow classification in network technology, and in particular relates to a method for extracting a feature vector of encrypted network flow voiceprints. Background technique [0002] The rapid development of network technology and network bandwidth has posed new challenges to network security: First, the data traffic in the network has doubled, and network data arrives at high speed and without interruption, presenting the characteristics of massive data, which cannot be stored locally. Therefore, the efficiency of the traditional traffic classification technology based on data packet load cannot meet the needs; secondly, the services carried by the network are becoming more and more abundant, and more and more network services are encapsulated and transmitted using encryption protocols. The wide use of encryption protocols makes The traditional traffic classification technology based on packet load cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 薛一波王大伟
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products