Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

113 results about "Classful network" patented technology

A classful network is a network addressing architecture used in the Internet from 1981 until the introduction of Classless Inter-Domain Routing in 1993. The method divides the IP address space for Internet Protocol version 4 (IPv4) into five address classes based on the leading four address bits. Classes A, B, and C provide unicast addresses for networks of three different network sizes. Class D is for multicast networking and the class E address range is reserved for future or experimental purposes.

Method and apparatus for adaptively classifying network traffic

A method of adaptively classifying information using a binary tree comprises establishing a binary tree including a set of binary sequences each representing one or more network addresses. Once network traffic is received having identifiers describing network traffic sources, the identifiers are correlated to binary sequences within the binary tree. A revision metric is formed based on this correlating, and the binary tree is then revised according to this revision metric.A method of blocking a DDOS attack comprises establishing a binary tree including a set of binary sequences, each of these binary sequences representing one or more network addresses. When network traffic is received having identifiers describing network traffic sources, the identifiers are correlated to binary sequences within the binary tree. Once a DDOS attack notification signal is received, a selected binary tree path within the binary tree is identified as a low cost blocking path within the binary tree. Network traffic correlated to a binary sequence corresponding to the selected binary tree path is blocked.
Owner:MCAFEE LLC

Adversarial-network-based semi-supervised semantic segmentation method

The invention proposes an adversarial-network-based semi-supervised semantic segmentation method comprising two parts of network construction and a training process. To be specific, a ResNet-101-model-contained DeepLab-v2 frame pretrained in an ImageNet database is used as a segmentation network; a last classification network layer is removed and the space between last two convolutional layers ischanged from 2 to 1; an extended convolutional network is employed to increase a receiving domain and spatial Pyramid pooling is used after the last layer; and a full convolutional network is used asan authentication network and an up sampling network is used for adjusting an output image matching the size of an input image again. According to the invention, on the basis of the adversarial network, a semi-supervised semantic segmentation method is provided; the full convolution discriminator allows the system to carry out semi-supervised learning and an additional supervision signal is provided, so that the performance of image semantic segmentation is improved.
Owner:SHENZHEN WEITESHI TECH

Network intrusion detection method and device based on multi-network model and electronic equipment

The invention discloses a network intrusion detection method and device based on a multi-network model and electronic equipment, and the network intrusion detection method comprises the steps: obtaining to-be-processed data, and carrying out the preprocessing of the to-be-processed data; carrying out feature extraction on the preprocessed data to obtain a feature vector; respectively taking the feature vectors as input vectors of a plurality of pre-trained classification network models to respectively obtain output probability values of the plurality of classification network models; and splicing the output probability values of the plurality of classification network models into one-dimensional matrix information, taking the one-dimensional matrix information as an input vector of a pre-trained decision model, and judging whether the to-be-processed data is intrusion data or not according to the output probability values of the decision model. According to the network intrusion detection method based on the multiple network models, multiple model algorithms are effectively combined together, and the respective advantages are brought into play together, and the recognition accuracyis improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method of application classification in Tor anonymous communication flow

ActiveCN104135385AReduce loadImplement application classificationData switching networksTraffic capacitySequence alignment algorithm
The invention discloses a method of application classification in Tor anonymous communication flow, which mainly solves the problem of acquisition of upper-layer application type information in the Tor anonymous communication flow and relates to the correlation technique, such as feature selection, sampling preprocessing and flow modeling. The method comprises the following steps of: firstly, defining a concept of a flow burst section by utilizing a data packet scheduling mechanism of Tor, and serving a volume value and a direction of the flow burst section as classification features; secondly, preprocessing a data sample based on a K-means clustering algorithm and a multiple sequence alignment algorithm, and solving the problems of over-fitting and inconsistent length of the data sample through the manners of value symbolization and gap insertion; and lastly, respectively modeling uplink Tor anonymous communication flow and downlink Tor anonymous communication flow of different applications by utilizing a Profile hidden Markov model, providing a heuristic algorithm to establish the Profile hidden Markov model quickly, during specific classification, substituting features of network flow to be classified into the Profile hidden Markov models of different applications, respectively figuring up probabilities corresponding to an uplink flow model and a downlink flow model, and deciding the upper-layer application type included by the Tor anonymous communication flow to be classified through a maximum joint probability value.
Owner:南京市公安局

Method and device for training event prediction model

The embodiment of the invention provides a method for training an event prediction model, the method can be applied to a transfer learning scene, and data isolation and privacy security protection ofa source domain participant and a target domain participant are realized by setting a neutral server, wherein the source domain participant deploys a source domain feature extractor, the target domainparticipant deploys a target domain feature device, and a model sharing part in an event prediction model is deployed in a neutral server and specifically comprises a sharing feature extractor, a graph neural network and a classification network. For any participant, feature extraction is performed on a sample in a local domain by utilizing a feature extractor of the local domain to obtain localdomain feature representations, and the local domain feature representation is processed by using the current parameters of the model sharing part obtained from the server to obtain a corresponding event classification result, model updating based on the event classification result and the local domain sample is performed, and an updating result of the model sharing part is uploaded to the serverto enable the server to perform centralized updating.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Network information data popularity calculation method

The invention discloses a method for calculating popularity of network information data, which relates to the technical field of computers and comprises the following steps of: crawling web portals with preset grade values to obtain a plurality of pieces of network information data; performing network information label classification; carrying out overall clustering when the network information event library has a plurality of network information event subsets, otherwise, carrying out incremental clustering; counting the network information quantity, the network information release time and the user behavior data in each network information event subset; sorting and assigning each piece of network information data of each network information event subset to obtain a first weight; processing to obtain the forwarded and reshipped quantity of each network information data; and carrying out weighted summation on the preset grade value, the network information label, the network informationquantity, the network information report time, the user behavior data, the first weight, the forwarded quantity and the transshipment quantity to obtain a network information data popularity value. According to the method, multiple influence factors are considered, and the network information data popularity value is more comprehensive and reasonable.
Owner:创新奇智(上海)科技有限公司

Training method and detection method of network traffic anomaly detection model

The invention discloses a training method and a detection method of a network traffic anomaly detection model. The network traffic anomaly detection model comprises a feature extraction network and aclassification network, and the training method comprises the following steps: determining the number of hidden layers and the number of neurons in each hidden layer according to a training sample; constructing an initial feature extraction network according to the number of the hidden layers and the number of neurons in each hidden layer; training the initial feature extraction network by using atraining sample to obtain a trained feature extraction network; extracting abstract feature data of a training sample by using the trained feature extraction network, and training a classification network by using the abstract feature data so as to complete training of a network traffic detection model. The network structure can adapt to network flow data, the situation that the structure of a detection model is too complex and too simple is avoided, and therefore, generalization errors are reduced, the detection time can be obviously shortened, and the detection accuracy can be obviously improved.
Owner:SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI

Route advertising method and network equipment

The invention discloses a route advertising method and network equipment, wherein the method comprises the following steps: determining route information protocol versions run by all neighborhood equipment by first network equipment running a second version RIPv2 (Routing Information Protocol version 2) of a route information protocol; and splitting a hypernet route into continuous routes of classful networks contained in a hypernet and advertising the split continuous routes of the classful networks to the neighborhood equipment running RIPv1 (Routing Information Protocol version 1) through the first network equipment when the first network equipment advertises the hypenet routes to the neighborhood equipment running the RIPv1 (Routing Information Protocol version 1) of the route information protocol. The invention can ensure that equipment running the RIPv1 (Routing Information Protocol version 1) can correctly learn all continuous routes of the classful networks contained in the hypernet in a network running the RIPv1 protocol and the RIPv2 protocol, thereby avoiding the problem of route black hole.
Owner:BEIJING ZHIGU TECH SERVICE

Encrypted malicious traffic detection method, detection system and computer equipment

The invention belongs to the technical field of malicious traffic detection, and discloses an encrypted malicious traffic detection method, a detection system and computer equipment, wherein the method comprises the steps of: supervising and controlling network card traffic and capturing traffic data packets; performing data preprocessing; carrying out byte dimension feature extraction; carrying out data packet dimension feature extraction; constructing a classification network; and generating and transmitting an alarm log. The invention provides a C&C encrypted malicious traffic detection method, and particularly relates to a deep learning detection model for C&C encrypted malicious traffic. The C&C traffic is traffic which utilizes an encryption technology and a multi-stage attack mode at the same time. The model has good generalization performance, and attack instructions outside a training set can be detected. The model has good classification performance, and malicious traffic types with high similarity can be distinguished.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for classifying the traffic dynamism of a network communication using a network that contains pulsed neurons, neuronal network and system for carrying out said method

A method classifies the traffic dynamism of a network communication using a network that contains pulsed neurons. Traffic data of the network communication are used as the input variables of the neuronal network. Temporal clusters obtained by processing the pulses are used as the output variables of the neuronal network. The traffic dynamism is classified by a synaptic model whose dynamism depends directly on the exact clocking of pre- or post-synaptic pulses.
Owner:SIEMENS AG

Traffic sign target detection method based on multilevel divide-and-conquer network

The invention discloses a traffic sign target detection method based on a multilevel divide-and-conquer network, which is used for solving the technical problems of low traffic sign detection precision and low recall rate in the prior art. The method comprises the following specific steps: generating a training set and a test set; training a target detection network; extracting a background category of a sample of a traffic sign-free target in the test set; enhancing the data in the training set; generating a training set of label categories and a training set of label and background categories; training a classification network; positioning and roughly classifying a to-be-detected target; and carrying out fine classification on the pictures after rough classification. The multi-level divide-and-conquer network constructed by the invention overcomes the defect that excellent results cannot be obtained on the aspects of positioning and classification of the traffic sign targets in the prior art, so the positioning and classification accuracy of the traffic sign targets is effectively improved by the multi-level divide-and-conquer network.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products