Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application encrypted traffic generation method and system based on generative adversarial network

A traffic and network technology, applied in the direction of biological neural network model, transmission system, neural learning method, etc., can solve the problem of high marking cost and achieve the effect of reducing cost

Active Publication Date: 2019-12-20
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because new data has the characteristics of application encryption, it can participate in the subsequent recognition model training, which greatly reduces the difficulty of obtaining deep learning samples and the high cost of marking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application encrypted traffic generation method and system based on generative adversarial network
  • Application encrypted traffic generation method and system based on generative adversarial network
  • Application encrypted traffic generation method and system based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these examples are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention All modifications of the valence form fall within the scope defined by the appended claims of the present application.

[0040] A method for generating application encrypted traffic based on Generative Adversarial Networks, such as figure 1As shown, through the encrypted traffic packet of the real application, the traffic data (including the protocol header) is extracted, converted into decimal, and intercepted to 784 bits (if it is insufficient, fill it with 0), and use " between each byte, "Segmentation, put only one traffic data in each line, put the traffic of the same application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application encrypted traffic generation method and system based on a generative adversarial network. An encrypted traffic packet (including a data packet header) of a realapplication is extracted into decimal data and intercepted to a fixed length (insufficient bits are supplemented by 0) and separated by comma, each row is one piece of traffic data, the traffic data is sent to a GAN (Generative Adversarial Network) for feature extraction, and after a generator and a discriminator of the GAN tend to be stable, a small amount of encrypted traffic of a real application is input into the generator of the GAN to generate any number of encrypted traffic containing the traffic characteristics of the application. According to the method, the features in the encryptedtraffic are ingeniously abstracted through the GAN, the traffic does not need to be decrypted, the decryption work is reduced, meanwhile, the privacy of a user is effectively protected, and the cost for obtaining a sample is greatly reduced. The method is suitable for all encrypted traffic recognition scenes based on deep learning, and the recognition rate is low due to the fact that encrypted traffic samples are difficult to obtain.

Description

technical field [0001] The invention relates to a method for generating application encryption traffic based on a generative confrontation network (GAN), and belongs to the technical field of data encryption. Background technique [0002] Traffic classification and identification are the basis for improving network management and security monitoring, improving service quality, and also the prerequisite for network behavior such as network design and planning. With the enhancement of user privacy protection and security awareness, technologies such as SSL, SSH, and VPN have been more and more widely used, resulting in an increasing proportion of encrypted traffic in network transmission. [0003] Due to the use of application layer encryption, traditional port matching and DPI can no longer accurately identify application traffic; compared with machine learning, deep learning can better express the essential characteristics of data, but its training relies on a large number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06N3/08
CPCH04L63/0428G06N3/08
Inventor 王攀王梓炫李书航黄琛
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products