期刊文献+

加密流量检测与态势预警平台研究 被引量:5

Research on Encrytpted Traffic Detection Technology
下载PDF
导出
摘要 网络流量检测是实现网络整体安全态势感知的主要手段,通过采集网络流量、脆弱性、安全事件和威胁情报等数据,利用大数据和机器学习技术,分析网络行为及用户行为等因素构成的整个网络当前状态和变化趋势,并预测网络安全状态发展趋势。随着密码技术的广泛应用,网络中存在着越来越多的加密流量,如HTTPS、VPN流量;由于加密技术的使用,破坏了明文数据的统计特点、数据格式等,用通用的流量检测方法很难有效检测加密流量,基于加密技术的随机性、网络上下文等,结合人工智能技术和机器学习方法,研究和设计了网络加密流量检测体系框架、方法和关键技术,对加密流量的检测具有较强的指导意义。 Monitoring and analysis of the Networks traffic is the main method to realize the security situation.through collecting the network traffic,vulnerability,security events and threat intelligence.People use big data and machine learning techniques to analyze the network behavior and user behavior,then to know the whole network current and trend status.With the widespread application of cryptography,there are more and more encrypted traffic in the network,such as HTTPS and VPN traffic.Due to using of encryption technology,the statistical characteristics and data format of plaintext data are destroyed.It is difficult to effectively detect encrypted traffic with the general traffic method.The randomness and network context of encrypted traffic,Based on Artificial Intelligence and Machine learning,analyze the framework,methods and key technology of encrypted traffic detection.It is significance to the encrypted traffic detection.
作者 王瑛 张文科 罗影 秦体红 孙付 WANG Ying;ZHANG Wen-ke;LUO Ying;QIN Ti-hong;SUN Fu(The 30th Research Institute of CETC,Chengdu Sichuan 610041,China;Westone Information Industry,Ltd.,Chengdu Sichuan 610041,China;Chengdu Branch of Xinsheng Intelligent Technology Co.,Ltd,Chengdu Sichuan 610041,China;Beijing Century Xin'an Technology Co.,Ltd,Beijing 100039,China;Chengdu Branch of Beijing Huayuan blockchain Technology Co.,Ltd,Chengdu Sichuan 610041,China)
出处 《信息安全与通信保密》 2020年第2期98-105,共8页 Information Security and Communications Privacy
关键词 加密流量检测 态势感知 人工智能 机器学习 内容识别 encrypted traffic detection situational awareness artificial intelligence machine learning content recognition
  • 相关文献

参考文献3

二级参考文献32

  • 1彭芸,刘琼.Internet流分类方法的比较研究[J].计算机科学,2007,34(8):58-61. 被引量:17
  • 2Madhukar A,Williamson C.A longitudinal study of p2p traffic classification. MASCOTS’’06 . 2006
  • 3Hjelmvik E,John W.Breaking and improving protocol obfuscation. . 2010
  • 4Moore A W, Zuev D. Internet traffic classification using Bayesian analysis techniques. ACM SIGMETRICS Per- formance Evaluation Review ,2005, 33 (1) :50-60.
  • 5Williams N, Zander S, Armitage G. A preliminaryperfor- mance comparison of five machine learning algorithms for- practical IP traffic flowclassification. ACM SIGCOMM Computer , 2006, 36(5) :5-16.
  • 6Internet Assigned Numbers Authority. http://www, iana. org.
  • 7Moore A W, Papagiannaki K. Toward the accurate identi- fication of network applications. In: Proceedings of the 6th Passive and Active Measurement Workshop, Boston, USA, 2005. 41-54.
  • 8Zander S, Nguyen T, Arrnitage G. Automated traffieclas- sifieation and application identification using machine learning. In : Proceedings of the 30th IEEE Conference on Local Computer Networks, Sydney, Australia, 2005. 250-257.
  • 9Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: multilevel traffic classification in the dark. ACM SIG- COMMComputer Communication Review, 2005, 35 (4) : 229 -240.
  • 10Tavallaee M, Lu W, Ghorbani A. Online classification ofnetwork flows. In: Proceedings of the 7th Communica- tion Networks and Services Research Conference, Monc- ton, Canada, 2009. 78 -85.

共引文献31

同被引文献32

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部