Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious machine traffic identification method and system

A flow identification and flow technology, applied in transmission systems, digital transmission systems, neural learning methods, etc., can solve problems such as dependence, single identification means, and identification rules relying on expert experience, and achieve the effect of accurate positioning

Pending Publication Date: 2022-04-29
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the static feature classification method is simply whether it has exactly the same features as the classification standard, and it only needs simple packing or obfuscation to achieve the target effect, which has been gradually eliminated; dynamic signatures use malicious signatures manually extracted by managers. Cluster analysis of traffic characteristics, and aims to use the cluster analysis results to classify the same type of malicious traffic, but due to the heavy reliance on manually extracted features and the low accuracy of cluster analysis, detection and classification The result is very unstable
Moreover, the malicious machine traffic identification method still has the following problems: the identification method is relatively single, and can only be identified from the perspective of the number of prizes and traffic in the operation process; the identification rules rely on expert experience, and finding suitable expert resources is a challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious machine traffic identification method and system
  • Malicious machine traffic identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] Such as figure 1 As shown, the present invention provides a kind of malicious machine traffic identification method, comprises the following steps:

[0025] Step 1. Collect a full amount of historical traffic data, decompose the traffic data, and form training samples;

[0026] In practical applications, network traffic data in the current network can be captured through Internet behavior management such as network probes, and the captured network traffic data can be input to the built-in traffic analyzer. The behavior analysis module can conduct preliminary analysis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention designs a malicious machine traffic identification method and system, and aims to solve the problem of malicious traffic identification difficulty caused by great increase of user access times and frequency possibly occurring in Internet side APPs of state grids and the like, a deep learning technology is adopted to dynamically divide suspicious traffic, and a hidden Markov chain is used for traffic to predict user access behaviors, so that the malicious machine traffic identification efficiency is improved. The effects of pertinently analyzing and identifying the malicious machine traffic and providing accurate positioning for the processing of the malicious traffic are achieved.

Description

technical field [0001] The present invention relates to the field of electric power data security, and more particularly relates to a malicious machine traffic identification method and system. Background technique [0002] Malicious machine traffic identification is to monitor business system traffic in real time to accurately find out business requests initiated by malicious crawlers, automata, simulators, etc. that forge real users. These traffic attack the business system at the application layer. API, causing huge economic losses to the enterprise. This application uses an identification method to analyze and identify malicious machine traffic, so that these business requests that are not sent by real users can be restricted, and data security risks in the process of developing electric power financial services can be reduced. The malicious traffic identification method extracts characteristic information from the traffic, and judges whether the traffic is malicious ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06N3/08
CPCH04L63/1425H04L63/1441G06N3/08
Inventor 沈文郭骞于鹏飞
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products