通信学报 ›› 2013, Vol. 34 ›› Issue (10): 135-142.doi: 10.3969/j.issn.1000-436x.2013.10.016

• 技术报告 • 上一篇    下一篇

基于主动学习和SVM方法的网络协议识别技术

王一鹏1,2,3,云晓春1,3,张永铮3(),李书豪3   

  1. 1 中国科学院 计算技术研究所,北京 100190
    2 中国科学院大学,北京 100049
    3 中国科学院 信息工程研究所,北京 100093
  • 出版日期:2013-10-25 发布日期:2017-08-10
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家科技支撑计划基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目

Network protocol identification based on active learning and SVM algorithm

Yi-peng WANG1,2,3,Xiao-chun YUN1,3,Yong-zheng ZHANG3(),Shu-hao LI3   

  1. 1 Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
    3 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
  • Online:2013-10-25 Published:2017-08-10
  • Supported by:
    The National High Technology Research and Development Program of China(863 Program);The National High Technology Research and Development Program of China(863 Program);The National Science and Technology Support Program;The National Natural Science Founda-tion of China;The National Natural Science Founda-tion of China

摘要:

针对未知网络协议数据流的获取与标记工作主要依赖于领域专家。然而,样本数据量的增加会导致人工成本超过实际负荷。提出了一种新颖的未知网络协议识别方法。该方法基于主动学习算法,仅依靠原始网络数据流的载荷部分实现对未知网络协议的有效识别。实验结果表明,采用该方法设计的识别系统在保证识别准确率和召回率的前提下,能够有效地降低学习过程中标记的样本数目,更适用于实际的网络应用环境。

关键词: 网络安全, 网络协议识别, 主动学习, 网络数据流, 支持向量机

Abstract:

Obtaining qualified training data for protocol identif ion generally requires domain experts to be involved,which is time-consuming and laborious.A novel approach for network protocol identification based on active learning and SVM algorithm was proposed.The experimental evaluations on real-world network traces show this approach can accurately and efficiently classify the target network protocol from mixed Internet traffic,and meanwhile display a sig-nificant reduction in the number of labeled samples.Therefore,this approach can be employed as an auxiliary tool for analyzing unknown protocols in real-world environment.

Key words: network security, protocol identification, active learning, network traces, support vector machine

No Suggested Reading articles found!