Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240900110-6.doi: 10.11896/jsjkx.240900110

• Information Security • Previous Articles     Next Articles

Large Scale Network Defense Algorithm Based on Temporal Network Flow Watermarking Technology

ZHU Keda, CAI Ruijie, LIU Shengli   

  1. School of Network and Cybersecurity,Information Engineering University,Zhengzhou 450001,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:ZHU Keda,born in 1994,postgraduate.His main research interests include network attack detection and so on.
    LIU Shengli,born in 1973,Ph.D,professor.His main research interests include network device security and network attack detection.

Abstract: Network attackers use multiple nodes such as dark net,stepping stones,and other relay links to create complex and unpredictable attack path,making it difficult to trace the entire chain,leading to unstable detection effectiveness of large-scale network.Therefore,a large-scale network defense algorithm based on temporal network pipeline detection technology is proposed.This algorithm uses time intervals to group large-scale network data streams,reducing false alarms caused by single parameter anomalies.By using convolutional encoding and traffic modulation,the temporal watermark embedding of the data stream is achieved,so that the watermark information can maintain a certain stability in the face of network traffic fluctuations,enhancing the robustness of the watermark.By comparing the joint centroid entropy of multiple streams in a temporal network,the marked streams containing watermarks could be identified quickly.Experiment shows that the proposed algorithm is less affected by jitter and can ensure watermark embedding,achieving defense against large-scale network attacks.

Key words: Cyber security, Flow detection, Temporal, Large-scale network defense, Network stream watermarking, Joint centroid entropy

CLC Number: 

  • TP393
[1]ZHAO N,SU J S,ZHAO B K,et al.A Survey on Hidden Servi-ce Location Technologies in Anonymous Communication System [J].Chinese Journal of Computers,2022,45(2):393-411.
[2]MA X G,LI T Y,LIU F L,et al.Robust network flow watermarking algorithm based on dynamic interval compression [J].Application Research of Computers,2023,40(10):3144-3148,3154.
[3]ZHANG L C,KONG Y Z,GUO Y,et al.Survey on networkflow watermarking;model,interferences,applications,technologies and security [J].IET Communications,2018,12(14):1639-1648.
[4]CHEN Q,SHEN T,LI P F,et al.Optical watermarking reconstruction method based on FC-DenseNets-BC neural network [J].Optical Technique,2021,47(2):223-230.
[5]MELLIMI S,RAJPUT V,ANSARI I A,et al.A fast and efficient image watermarking scheme based on deep neural network[J].Pattern Recognition Letters,2021,151:222-228.
[6]ZHENG G,HU D H,GE H,et al.End-to-end image steganography and watermarking driven by generative adversarial networks[J].Journal of Image and Graphics,2021,26(10):2485-2502.
[7]WANG F.Simulation of Network Big Data Lossless Encryption Algorithm Based on Two-Way Defense[J].Computer Simulation,2021,38(10):316-319.
[8]ZHANG L,LUO J Z,YANG M,et al.Interval Centroid Based Flow Watermarking Technique for Anonymous Communication Traceback [J].Journal of Software,2011,22(10):2358-2371.
[9]LI Q K,LIU G J,LIU W W,et al.Detecting Network Watermark Through Multi-flow Joint Entropy of Centroid [J].Journal of Chinese Computer Systems,2017,38(11):2443-2447.
[10]ZHANG Y J,CHEN K,ZHOU G,et al.Research Progress of Neural Networks Watermarking Technology[J].Journal of Computer Research and Development,2021,58(5):964-976.
[11]XIA D X,WANG L N,SONG Y F,et al.Review of Deep Neural Network Model Digital Watermarking Technology [J].Science Technology and Engineering,2023,23(5):1799-1811.
[12]YANG A S,WANG L,CAO Y J,et al.Neural network model integrity verification algorithm based on reversible watermark [J].Computer Engineering and Design,2024,45(2):383-389.
[13]LIU Y L,HE H J,CHEN F,et al.Traceable DNN Model Protection Based on Watermark Neural Network [J].Journal of Applied Sciences,2023,41(2):183-196.
[14]TAO J,ZHU Z C,WANG Z Y,et al.A Feature Watermarking Generation and Embedding Scheme for IPv6 Network [J].Journal of Computer Research and Development,2021,58(11):2400-2415.
[15]ZHAO X Q,SUN L,WANG Y J,et al.Covert Channel Construction Method based on IPv6 Protocol [J].Communications Technology,2021,54(1):158-163.
[16]WU Q,LI Y H,ZHU Q L.HMM-Viterbi Based Network Resource Data Processing Method and Its Application [J].Mobile Communications,2022,46(2):89-94.
[17]FENG L,ZHU R J,WU H Z,et al.Survey of Neural Network Watermarking[J].Journal of Applied Sciences,2021,39(6):881-892.
[18]WANG X C,ZHANG L,YU Y Q,et al.Robust image watermarking network algorithm based on effective neural architecture search [J].Journal of Zhejiang University(Science Edition),2021,48(3):261-269.
[19]DI Y L,ZHANG Y Z,WANG T Q,et al.Low Distortion Watermark Scheme Based on Redistributable Anticollusion Coding [J].Journal of Data Acquisition and Processing,2023,38(2):413-425.
[20]SONG Y,SHEN Q J,YANG H S.Reversible Database Watermarking Scheme Based on Cuckoo Algorithm [J].Computer Applications and Software,2021,38(12):304-313.
[1] BIAN Hui, MENG Changqian, LI Zihan, CHEN Zihaoand XIE Xuelei. Continuous Sign Language Recognition Based on Graph Convolutional Network and CTC/Attention [J]. Computer Science, 2025, 52(6A): 240400098-9.
[2] HONG Yi, SHEN Shikai, SHE Yumei, YANG Bin, DAI Fei, WANG Jianxiao, ZHANG Liyi. Multivariate Time Series Prediction Based on Dynamic Graph Learning and Attention Mechanism [J]. Computer Science, 2025, 52(6A): 240700047-8.
[3] LI Weirong, YIN Jibin. FB-TimesNet:An Improved Multimodal Emotion Recognition Method Based on TimesNet [J]. Computer Science, 2025, 52(6A): 240900046-8.
[4] JIN Hong, CHEN Like, YOU Lan, LYU Shunying, ZHOU Kaicheng, XIAO Kui. Point-of-interest Recommendation Based on Geospatial-TemporalCorrelations and Social Influence [J]. Computer Science, 2025, 52(5): 128-138.
[5] KONG Chao, WANG Wei, HUANG Subin, ZHANG Yi, MENG Dan. Autonomous Obstacle Avoidance Method for Unmanned Surface Vehicles Based on ImprovedProximal Policy Optimization [J]. Computer Science, 2025, 52(4): 40-48.
[6] LIU Tengfei, CHEN Liyue, FANG Jiangyi, WANG Leye. SCFNet:Fusion Framework of External Spatial Features for Spatio-temporal Prediction [J]. Computer Science, 2025, 52(4): 110-118.
[7] DENG Ceyu, LI Duantengchuan, HU Yiren, WANG Xiaoguang, LI Zhifei. Joint Inter-word and Inter-sentence Multi-relationship Modeling for Review-basedRecommendation Algorithm [J]. Computer Science, 2025, 52(4): 119-128.
[8] XIONG Keqin, RUAN Sijie, YANG Qianyu, XU Changwei , YUAN Hanning. Mobility Data-driven Location Type Inference Based on Crowd Voting [J]. Computer Science, 2025, 52(3): 169-179.
[9] WANG Huiqiang, HUANG Feihu, PENG Jian, JIANG Yuan, ZHANG Linghao. Multivariate Time Series Forecasting Based on Temporal Dependency and Variable Interaction [J]. Computer Science, 2025, 52(2): 67-79.
[10] WANG Tianyi, LIN Youfang, GONG Letian, CHEN Wei, GUO Shengnan, WAN Huaiyu. Check-in Trajectory and User Linking Based on Natural Language Augmentation [J]. Computer Science, 2025, 52(2): 99-106.
[11] ZHANG Yusong, XU Shuai, YAN Xingyu, GUAN Donghai, XU Jianqiu. Survey on Cross-city Human Mobility Prediction [J]. Computer Science, 2025, 52(1): 102-119.
[12] WANG Jiabin, LUO Junren, ZHOU Yanzhong, WANG Chao, ZHANG Wanpeng. Survey on Event Extraction Methods:Comparative Analysis of Deep Learning and Pre-training [J]. Computer Science, 2024, 51(9): 196-206.
[13] BAI Wenchao, BAI Shuwen, HAN Xixian, ZHAO Yubo. Efficient Query Workload Prediction Algorithm Based on TCN-A [J]. Computer Science, 2024, 51(7): 71-79.
[14] LEI Yongsheng, DING Meng, SHEN Yao, LI Juhao, ZHAO Dongyue, CHEN Fushi. Action Recognition Model Based on Improved Two Stream Vision Transformer [J]. Computer Science, 2024, 51(7): 229-235.
[15] DONG Wanqing, ZHAO Zirong, LIAO Huimin, XIAO Hui, ZHANG Xiaoliang. Research and Implementation of Urban Traffic Accident Risk Prediction in Dynamic Road Network [J]. Computer Science, 2024, 51(6A): 230500118-10.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!