Multi-feature fusion CC encrypted traffic recognition algorithm

The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CHEN MIAO, HE JUNWEN, HUANG MINGLEI, DU ZIPENG, WANG DAPENG, YAN JIADONG, LIN CHENG, HOU ZUFENG, LIAO ZHIGE, DENG LIFEN, GUO SIXIAO, HE WEI, ZHOU YAYI, ZHENG YAN, SONG WEIJIE, HUANG XIAOYING, LING HUAMING, ZHANG SHUO
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CHEN MIAO
HE JUNWEN
HUANG MINGLEI
DU ZIPENG
WANG DAPENG
YAN JIADONG
LIN CHENG
HOU ZUFENG
LIAO ZHIGE
DENG LIFEN
GUO SIXIAO
HE WEI
ZHOU YAYI
ZHENG YAN
SONG WEIJIE
HUANG XIAOYING
LING HUAMING
ZHANG SHUO
description The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118656737A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118656737A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118656737A3</originalsourceid><addsrcrecordid>eNrjZLD3Lc0pydRNS00sKS1KVUgrLc7Mz1NwdlZIzUsuqiwoSU1RKClKTEvLTFYoSk3OT8_LLAEpSMxJzy_KLMnI5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYWZqZm5sbmjsbEqAEArq8xUQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><source>esp@cenet</source><creator>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</creator><creatorcontrib>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</creatorcontrib><description>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240917&amp;DB=EPODOC&amp;CC=CN&amp;NR=118656737A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240917&amp;DB=EPODOC&amp;CC=CN&amp;NR=118656737A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CHEN MIAO</creatorcontrib><creatorcontrib>HE JUNWEN</creatorcontrib><creatorcontrib>HUANG MINGLEI</creatorcontrib><creatorcontrib>DU ZIPENG</creatorcontrib><creatorcontrib>WANG DAPENG</creatorcontrib><creatorcontrib>YAN JIADONG</creatorcontrib><creatorcontrib>LIN CHENG</creatorcontrib><creatorcontrib>HOU ZUFENG</creatorcontrib><creatorcontrib>LIAO ZHIGE</creatorcontrib><creatorcontrib>DENG LIFEN</creatorcontrib><creatorcontrib>GUO SIXIAO</creatorcontrib><creatorcontrib>HE WEI</creatorcontrib><creatorcontrib>ZHOU YAYI</creatorcontrib><creatorcontrib>ZHENG YAN</creatorcontrib><creatorcontrib>SONG WEIJIE</creatorcontrib><creatorcontrib>HUANG XIAOYING</creatorcontrib><creatorcontrib>LING HUAMING</creatorcontrib><creatorcontrib>ZHANG SHUO</creatorcontrib><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><description>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLD3Lc0pydRNS00sKS1KVUgrLc7Mz1NwdlZIzUsuqiwoSU1RKClKTEvLTFYoSk3OT8_LLAEpSMxJzy_KLMnI5WFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYWZqZm5sbmjsbEqAEArq8xUQ</recordid><startdate>20240917</startdate><enddate>20240917</enddate><creator>CHEN MIAO</creator><creator>HE JUNWEN</creator><creator>HUANG MINGLEI</creator><creator>DU ZIPENG</creator><creator>WANG DAPENG</creator><creator>YAN JIADONG</creator><creator>LIN CHENG</creator><creator>HOU ZUFENG</creator><creator>LIAO ZHIGE</creator><creator>DENG LIFEN</creator><creator>GUO SIXIAO</creator><creator>HE WEI</creator><creator>ZHOU YAYI</creator><creator>ZHENG YAN</creator><creator>SONG WEIJIE</creator><creator>HUANG XIAOYING</creator><creator>LING HUAMING</creator><creator>ZHANG SHUO</creator><scope>EVB</scope></search><sort><creationdate>20240917</creationdate><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><author>CHEN MIAO ; HE JUNWEN ; HUANG MINGLEI ; DU ZIPENG ; WANG DAPENG ; YAN JIADONG ; LIN CHENG ; HOU ZUFENG ; LIAO ZHIGE ; DENG LIFEN ; GUO SIXIAO ; HE WEI ; ZHOU YAYI ; ZHENG YAN ; SONG WEIJIE ; HUANG XIAOYING ; LING HUAMING ; ZHANG SHUO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118656737A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>CHEN MIAO</creatorcontrib><creatorcontrib>HE JUNWEN</creatorcontrib><creatorcontrib>HUANG MINGLEI</creatorcontrib><creatorcontrib>DU ZIPENG</creatorcontrib><creatorcontrib>WANG DAPENG</creatorcontrib><creatorcontrib>YAN JIADONG</creatorcontrib><creatorcontrib>LIN CHENG</creatorcontrib><creatorcontrib>HOU ZUFENG</creatorcontrib><creatorcontrib>LIAO ZHIGE</creatorcontrib><creatorcontrib>DENG LIFEN</creatorcontrib><creatorcontrib>GUO SIXIAO</creatorcontrib><creatorcontrib>HE WEI</creatorcontrib><creatorcontrib>ZHOU YAYI</creatorcontrib><creatorcontrib>ZHENG YAN</creatorcontrib><creatorcontrib>SONG WEIJIE</creatorcontrib><creatorcontrib>HUANG XIAOYING</creatorcontrib><creatorcontrib>LING HUAMING</creatorcontrib><creatorcontrib>ZHANG SHUO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CHEN MIAO</au><au>HE JUNWEN</au><au>HUANG MINGLEI</au><au>DU ZIPENG</au><au>WANG DAPENG</au><au>YAN JIADONG</au><au>LIN CHENG</au><au>HOU ZUFENG</au><au>LIAO ZHIGE</au><au>DENG LIFEN</au><au>GUO SIXIAO</au><au>HE WEI</au><au>ZHOU YAYI</au><au>ZHENG YAN</au><au>SONG WEIJIE</au><au>HUANG XIAOYING</au><au>LING HUAMING</au><au>ZHANG SHUO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Multi-feature fusion CC encrypted traffic recognition algorithm</title><date>2024-09-17</date><risdate>2024</risdate><abstract>The invention relates to the technical field of traffic identification, in particular to multi-feature fusion Camp. The C encryption flow identification algorithm comprises the following steps: analyzing the Camp; c, encrypting traffic data, and identifying and classifying encryption protocol types, version numbers and Camp; and C, encrypting the traffic identifier, performing tagging processing, and adopting multi-feature fusion to obtain an encrypted traffic feature set. According to the method and the device, the Camp is converted into Camp; c, when the encrypted traffic features are compared with historical data, deviation value sorting and priority classification are introduced, the sensitivity of anomaly detection is enhanced, the rapid response capability to potential threats is provided, and Camp is analyzed through recognition of an abnormal mode; c, encrypting the nonlinear characteristic and the hidden state of the traffic, and deeply understanding the Camp; and C, encrypting the dynamic change beh</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN118656737A
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Multi-feature fusion CC encrypted traffic recognition algorithm
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T06%3A15%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CHEN%20MIAO&rft.date=2024-09-17&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118656737A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true