Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Session identification method and device, control equipment and storage medium

A technology of identification method and session type, applied in the field of communication, can solve the problem of lack of identification method of Tor traffic, etc.

Active Publication Date: 2020-07-28
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, there is currently no effective identification method for Tor traffic obfuscated by obfuscation plug-ins

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session identification method and device, control equipment and storage medium
  • Session identification method and device, control equipment and storage medium
  • Session identification method and device, control equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the application clearer, the technical solutions of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described embodiments are the Some embodiments of the technical solution, but not all embodiments. Based on the embodiments described in the application documents, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the technical solutions of the present application.

[0053] The terms "first" and "second" in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the term "comprises", as well as any variations thereof, is intended to cover non-exclusive protections. For exam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a session identification method and device, control equipment and a storage medium, which are used for identifying Tor flow confused by confused plug-ins. The method comprisesthe steps of acquiring a first message, wherein the message type of the first message is an application data sub-protocol type; determining a session type of a first session corresponding to the firstmessage, with the session type comprising a first session type and a second session type, identifying the probability that the session in the first session type as an with obfuscation processing session being higher than the probability that the session in the second session type is identified as an obfuscation processing session; if the session type of the first session is the first session type, counting flow characteristic information of the first session, with the flow characteristic information representing the total number of messages of the first session at a preset time point, and thenumber of occurrences of characteristic messages corresponding to the suspected obfuscation processing session, and message length distribution condition information; and if determining that the value of at least one piece of traffic feature information in the traffic feature information exceeds a corresponding first threshold, determining that the first session is an obfuscation processing session.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a session identification method, device, control device and storage medium. Background technique [0002] The Onion Router (TOR / Tor) is a tool that provides users with anonymous communication services, helps users surf the Internet anonymously, and protects user privacy. Based on the characteristics of Tor's concealment and difficulty of traceability, some users use Tor to carry out illegal activities such as hacker attacks and drug transactions. Therefore, more and more countries, institutions and units have included Tor as a key review object. In order to bypass the audit identification, the Tor community has successively added a variety of traffic obfuscation plug-ins. The mainstream obfuscation plug-ins currently in use include the meek plug-in, which relies on domain name pre-transit resources provided by the Content Delivery Network (CDN) Traffic techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/851H04L12/26
CPCH04L63/1408H04L63/0421H04L47/2483H04L43/0876H04L43/16
Inventor 任家西何东静赵洪亮
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products