Multi-feature fusion CC encrypted traffic recognition algorithm
The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types,...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | CHEN MIAO HE JUNWEN HUANG MINGLEI DU ZIPENG WANG DAPENG YAN JIADONG LIN CHENG HOU ZUFENG LIAO ZHIGE DENG LIFEN GUO SIXIAO HE WEI ZHOU YAYI ZHENG YAN SONG WEIJIE HUANG XIAOYING LING HUAMING ZHANG SHUO |
description | The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118656737A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118656737A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118656737A3</originalsourceid><addsrcrecordid>eNrjZLD3Lc0pydRNS00sKS1KVUgrLc7Mz1NwdlZIzUsuqiwoSU1RKClKTEvLTFYoSk3OT8_LLAEpSMxJzy_KLMnI5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYWZqZm5sbmjsbEqAEArq8xUQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><source>esp@cenet</source><creator>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</creator><creatorcontrib>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</creatorcontrib><description>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240917&DB=EPODOC&CC=CN&NR=118656737A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240917&DB=EPODOC&CC=CN&NR=118656737A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CHEN MIAO</creatorcontrib><creatorcontrib>HE JUNWEN</creatorcontrib><creatorcontrib>HUANG MINGLEI</creatorcontrib><creatorcontrib>DU ZIPENG</creatorcontrib><creatorcontrib>WANG DAPENG</creatorcontrib><creatorcontrib>YAN JIADONG</creatorcontrib><creatorcontrib>LIN CHENG</creatorcontrib><creatorcontrib>HOU ZUFENG</creatorcontrib><creatorcontrib>LIAO ZHIGE</creatorcontrib><creatorcontrib>DENG LIFEN</creatorcontrib><creatorcontrib>GUO SIXIAO</creatorcontrib><creatorcontrib>HE WEI</creatorcontrib><creatorcontrib>ZHOU YAYI</creatorcontrib><creatorcontrib>ZHENG YAN</creatorcontrib><creatorcontrib>SONG WEIJIE</creatorcontrib><creatorcontrib>HUANG XIAOYING</creatorcontrib><creatorcontrib>LING HUAMING</creatorcontrib><creatorcontrib>ZHANG SHUO</creatorcontrib><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><description>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLD3Lc0pydRNS00sKS1KVUgrLc7Mz1NwdlZIzUsuqiwoSU1RKClKTEvLTFYoSk3OT8_LLAEpSMxJzy_KLMnI5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYWZqZm5sbmjsbEqAEArq8xUQ</recordid><startdate>20240917</startdate><enddate>20240917</enddate><creator>CHEN MIAO</creator><creator>HE JUNWEN</creator><creator>HUANG MINGLEI</creator><creator>DU ZIPENG</creator><creator>WANG DAPENG</creator><creator>YAN JIADONG</creator><creator>LIN CHENG</creator><creator>HOU ZUFENG</creator><creator>LIAO ZHIGE</creator><creator>DENG LIFEN</creator><creator>GUO SIXIAO</creator><creator>HE WEI</creator><creator>ZHOU YAYI</creator><creator>ZHENG YAN</creator><creator>SONG WEIJIE</creator><creator>HUANG XIAOYING</creator><creator>LING HUAMING</creator><creator>ZHANG SHUO</creator><scope>EVB</scope></search><sort><creationdate>20240917</creationdate><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><author>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118656737A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>CHEN MIAO</creatorcontrib><creatorcontrib>HE JUNWEN</creatorcontrib><creatorcontrib>HUANG MINGLEI</creatorcontrib><creatorcontrib>DU ZIPENG</creatorcontrib><creatorcontrib>WANG DAPENG</creatorcontrib><creatorcontrib>YAN JIADONG</creatorcontrib><creatorcontrib>LIN CHENG</creatorcontrib><creatorcontrib>HOU ZUFENG</creatorcontrib><creatorcontrib>LIAO ZHIGE</creatorcontrib><creatorcontrib>DENG LIFEN</creatorcontrib><creatorcontrib>GUO SIXIAO</creatorcontrib><creatorcontrib>HE WEI</creatorcontrib><creatorcontrib>ZHOU YAYI</creatorcontrib><creatorcontrib>ZHENG YAN</creatorcontrib><creatorcontrib>SONG WEIJIE</creatorcontrib><creatorcontrib>HUANG XIAOYING</creatorcontrib><creatorcontrib>LING HUAMING</creatorcontrib><creatorcontrib>ZHANG SHUO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CHEN MIAO</au><au>HE JUNWEN</au><au>HUANG MINGLEI</au><au>DU ZIPENG</au><au>WANG DAPENG</au><au>YAN JIADONG</au><au>LIN CHENG</au><au>HOU ZUFENG</au><au>LIAO ZHIGE</au><au>DENG LIFEN</au><au>GUO SIXIAO</au><au>HE WEI</au><au>ZHOU YAYI</au><au>ZHENG YAN</au><au>SONG WEIJIE</au><au>HUANG XIAOYING</au><au>LING HUAMING</au><au>ZHANG SHUO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><date>2024-09-17</date><risdate>2024</risdate><abstract>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN118656737A |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Multi-feature fusion CC encrypted traffic recognition algorithm |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T06%3A15%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CHEN%20MIAO&rft.date=2024-09-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118656737A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |