Online and automatic identification of encryption network behaviors in big data environment

被引:1
|
作者
Zhu Hejun [1 ,2 ]
Zhu Liehuang [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[2] Beijing Esafenet Network Secur Technol Co Ltd, Beijing 100085, Peoples R China
来源
关键词
correlation coefficient; encryption network behaviors; online identification; reference distance;
D O I
10.1002/cpe.4849
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To handle the difficulty in identifying encrypted network traffic in big data environment, a fast and online identification method for encryption network behaviors was proposed. Twitter audios, messages, videos, images, and other encrypted network behaviors were deeply studied in big data environment, and the features were extracted from a lot of encryption network behaviors, and the model database based on the correlation coefficient was established by these features, and the correlation coefficient between the network interactive data and the model database was calculated by acquiring the network interactive data at real time. The reference distance will be proposed and used to eliminate the noise of similar traffic sets; at last, the automatic and online identification of encryption network behaviors based on correlation coefficient and reference distance in big data environment were implemented by combination with the classification threshold, and the online identification rate was about 93% by this method, and the experiment results show the proposed method is applicable and effective.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Hybrid encryption framework for securing big data storage in multi-cloud environment
    G. Viswanath
    P. Venkata Krishna
    [J]. Evolutionary Intelligence, 2021, 14 : 691 - 698
  • [32] Identification of corrosion factors in blast furnace gas pipe network with corrosion big data online monitoring technology
    Wang, Bingqin
    Mu, Yunquan
    Shen, Faming
    Zhu, Renzheng
    Li, Yiran
    Liu, Chao
    Cheng, Xuequn
    Zhang, Dawei
    Li, Xiaogang
    [J]. CORROSION SCIENCE, 2024, 230
  • [33] Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm
    Ming Li
    [J]. Wireless Personal Communications, 2022, 127 : 353 - 367
  • [34] Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm
    Li, Ming
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 353 - 367
  • [35] Simulation of Dark Network Scene Based on the Big Data Environment
    Wang, Pengpeng
    Liu, Hongri
    Wang, Bailing
    Dong, Kaikun
    Wang, Lianhai
    Xu, Shujiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING 2018 (ICITEE '18), 2018,
  • [36] Modeling and Prediction of Network Security Situation in Big Data Environment
    Li Jingfu
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3037 - 3043
  • [37] Distribution network model using big data in an international environment
    Mishra, Shraddha
    Singh, Surya Prakash
    [J]. SCIENCE OF THE TOTAL ENVIRONMENT, 2020, 707
  • [38] Purchase decision under network environment and application of big data
    Ma, Te
    [J]. 2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [39] Ocean Big Data Service Technology in a Distributed Network Environment
    Liang, Xiangbo
    Wang, Kun
    [J]. JOURNAL OF COASTAL RESEARCH, 2020, : 576 - 579
  • [40] Construction of Network User Behavior Spectrum in Big Data Environment
    Xu, Mengyao
    Yan, Fangfei
    Wang, Biao
    Yi, Shuping
    Yi, Qian
    Xiong, Shiquan
    [J]. INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 133 - 143