Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 380-384.doi: 10.11896/j.issn.1002-137X.2017.6A.086

Previous Articles     Next Articles

Encrypted Data Stream Recognition Based on Data Randomness and ELM

ZHOU Yu-huan, JIANG Da-wei, GONG Yong and CHEN Cong   

  • Online:2017-12-01 Published:2018-12-01

Abstract: This paper presented the identification method of encrypted data stream based on data randomness and pattern recognition without decrypting the encrypted data.The method uses the randomness distribution characteristics of different data as classification features,and then uses the pattern recognition method to classify different types of data.Firstly,the randomness test method NIST is used to analyze the data stream,getting the 15 kinds of randomness test values as the classification feature.Then the method creates classification models for different types of data streams.Finally,the method uses the trained model to identify the unknown data stream.Simulation results show that using the 15 kinds of features,the proposed method can effectively classify the different types of data stream,and the error rate decreases from 60% to 30%.Using the feature optimization method,the error rate drops to 15%.

Key words: Encrypted data,Data randomness,Pattern recognition,ELM

[1] SOTO J.Statistical Testing of Random Number Generators.http://www.nist.gov.
[2] RUKHIN A,SOTO J.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications [DB/OL].http://www.nist.gov.
[3] SOTO J.Randomness Testing of the AES Candidate Algorithms .http://www.nist.gov.
[4] HUANG G B,ZHU Q Y,SIEW C K.Extreme Learning Ma-chine:A New Learning Scheme of Feedforward Neural Networks[C]∥Proceedings of International Joint Conference on Neural Networks (IJCNN2004).Budapest,Hungary,July,2004:25-29.
[5] HUANG G B,ZHU Q Y,SIEW C K.Extreme learning ma-chine:Theory and applications[J].Neurocomputing,2006,70(1-3):489-501.
[6] HUANG G B,ZHOU H,DING X,et al.Extreme learning ma-chine for regression and multiclass classification[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B:Cybernetics,2012,42(2):513-529.
[7] MICHE Y,SORJAMANN A,BAS P,et al.OP-ELM:optimally pruned extreme learning machine[J].IEEE Transactions on Neural Networks,2010,21(1):158-162.
[8] KIM M S,YU H J,KWAK K C,et al.Robust text-independent speaker identification using hybrid PCA & LDA[C]∥MICAI’ 06.Mexico,Nov.2006:1067-1074.
[9] LIU C.Gabor-based kernel PCA with fractional power polynomial models for face recognition[J].IEEE Trans,Pattern Analysis and Machine Intelligence,2004,26(5):573-581.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!