Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

VoIP malicious behavior detection method and system based on heterogeneous neural network technology

A neural network and detection method technology, applied in the field of VoIP malicious behavior detection, can solve the problems of lack of association analysis of multiple data sets, single data source, inability to mine implicit and explicit relationships of VoIP behavior, etc., so as to facilitate multi-dimensional information. Fusion and correlation network construction, the effect of improving detection capabilities

Pending Publication Date: 2022-07-29
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing research lacks association analysis on multiple data sets, and cannot mine implicit and explicit relationships in VoIP behaviors
The existing patent CN111556013A uses the features extracted from VoIP traffic for statistical analysis, and the data source is relatively single; it does not dig out the hidden relationship in VoIP behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VoIP malicious behavior detection method and system based on heterogeneous neural network technology
  • VoIP malicious behavior detection method and system based on heterogeneous neural network technology
  • VoIP malicious behavior detection method and system based on heterogeneous neural network technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the above-mentioned features and advantages of the present invention more obvious and easy to understand, the following embodiments are given and described in detail with the accompanying drawings as follows.

[0025] This embodiment discloses a method for detecting malicious VoIP behaviors based on heterogeneous neural network technology, which uses heterogeneous information networks to detect malicious VoIP behaviors under multiple VoIP data sources. This embodiment uses heterogeneous information formed by VoIP multiple data sources network instance such as figure 1 Specifically, the following processing steps are included:

[0026] Step 1: Extract information objects from multiple data sources.

[0027] The multi-data source information in this embodiment includes: m∈M is the set of phone numbers, n∈N is the set of VoIP user names in the form of non-telephone numbers, p∈P is the set of IP-type service domain names, and q∈Q is A collection of servic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a VoIP malicious behavior detection method and system based on a heterogeneous neural network technology, and relates to the field of network information security. An information object is extracted from a VoIP multi-data source, a heterogeneous information network is constructed, and node vector representation is obtained by using a GEM model; clustering is carried out by calculating the similarity between different nodes, training data are enriched by labeling the same class of nodes with the same label, and then supervised learning classification is carried out on a classification algorithm to obtain harmful VoIP nodes. According to the method, the information of various data sources can be utilized, and the harmful VoIP behavior can be found by mining the implicit relationship and the hidden mode in the heterogeneous information network.

Description

technical field [0001] The invention relates to the field of network information security, and particularly relates to a VoIP malicious behavior detection method and system based on a heterogeneous neural network technology. Background technique [0002] VoIP (Voice over Internet Protocol) refers to the technology of transmitting voice and multimedia content through the Internet. The rapid development of VoIP has also brought many security threats. For example, some attackers use VoIP lines to harass or defraud users, which will block users' call lines. [0003] Most of the detection and analysis technologies for harmful VoIP behaviors use data such as call records and VoIP traffic. For the call record, it mainly includes the user and service domain names of the caller and the callee, where the user name can be a phone number, and the service domain name is the fully qualified domain name (FQDN) or IP address of the host. For VoIP traffic, it mainly includes the path infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416
Inventor 李鹏王晨旭张震沈亮王立强李钊段冬梅杜梅婕
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products