CN102821002A - Method and system for network flow anomaly detection - Google Patents

Method and system for network flow anomaly detection Download PDF

Info

Publication number
CN102821002A
CN102821002A CN2011101542263A CN201110154226A CN102821002A CN 102821002 A CN102821002 A CN 102821002A CN 2011101542263 A CN2011101542263 A CN 2011101542263A CN 201110154226 A CN201110154226 A CN 201110154226A CN 102821002 A CN102821002 A CN 102821002A
Authority
CN
China
Prior art keywords
attack
output
characteristic data
network
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101542263A
Other languages
Chinese (zh)
Other versions
CN102821002B (en
Inventor
杨柳青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Henan Co Ltd
Original Assignee
China Mobile Group Henan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Henan Co Ltd filed Critical China Mobile Group Henan Co Ltd
Priority to CN201110154226.3A priority Critical patent/CN102821002B/en
Publication of CN102821002A publication Critical patent/CN102821002A/en
Application granted granted Critical
Publication of CN102821002B publication Critical patent/CN102821002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a system for network flow anomaly detection. The method includes: monitoring network flow, and extracting basic characteristic data of the network flow; determining combination characteristic data of selected aggressive behaviors according to the extracted basic characteristic data, wherein the combination characteristic data are subsets of the basic characteristic data; inputting the determined combination characteristic data into corresponding flow models of the selected aggressive behaviors to obtain output results, wherein the flow models are preset according to sample data of the selected aggressive behaviors in a sample characteristic library; and determining whether the selected aggressive behaviors exist in the network flow or not according to the obtained output results. Using the method and the system for network flow anomaly detection can realize diversification in flow detection, more accuracy in identification and high extensibility.

Description

Network flow abnormal detecting method and system
Technical field
The present invention relates to the network information security technology field, refer to a kind of network flow abnormal detecting method and system that is applicable to High Speed IP Metropolitan Area Network especially.
Background technology
Along with the development of Internet, network traffics rapidly increase, and the Internet has become indispensable information carrier.Meanwhile, the abnormal flow of normal range (NR) also appears departing from network traffics through regular meeting, mainly is to be caused by malicious network attacks behaviors such as worm propagation, dos attack, DDOS attack, Botnet and network configuration error, sporadic line interruption etc.These abnormal flows tend to cause whole network service quality sharply to descend, and the end main frame of being injured, network are directly paralysed.Therefore, how under large-scale network environment, to carry out the network abnormality detection and early warning information in time is provided, significant to ensureing the normal operation of network.
Simultaneously; Along with improving constantly of the network bandwidth, exception of network traffic detects and faces new problem: on the one hand, network transmission speed increases substantially; Identical network attack; Very obvious in the local area network (LAN) performance, and in high-speed line, maybe and be not easy to find, need the exception of network traffic detection model of high accuracy; On the other hand, the network bandwidth has also been accelerated the speed of network attack when improving, be example with the internet worm eruption, and it can infect most of fragile main frame in the Internet in 10min even shorter time.This just requires abnormality detection system when rapidly and efficiently identifying abnormal flow, can also implement blocking strategy in real time.
Therefore, the key of abnormality detection is through the abnormal behaviour of the description of network traffics normal behaviour being analyzed and found possibly occur in network or the system, and sounds a warning to the keeper, or initiatively reacts.
Existing method for detecting abnormality mainly contains: the statistics abnormal detection method; Abnormal detection method based on thresholding; Abnormal detection method based on small echo; Based on immunologic abnormal detection method, based on the abnormal detection method of machine learning, data mining and neural net and based on abnormal detection method of flow information entropy etc.
But mainly there is following problem in these methods:
(1) warning interrogatory is true.Because above-mentioned method for detecting abnormality only detects one or more characteristic vectors in the network traffics; And the characteristic vector of choosing does not have specific attack implication; Thereby detection system can only know that some characteristic vector has occurred unusually in the network when reporting to the police, and still can not judge which type of attack to have occurred.
(2) shared data of synthetic operation can not be provided.Because Internet is the internet of a plurality of management domains of centralized management not, is synthetic operation but abnormality detection requires between each detection system, thereby just seem extremely important as the providing of shared data of the main contents of synthetic operation.
(3) extensibility is relatively poor: because existing abnormality detection system adopts the foundation of one or more single network characterization vectors as study and judgement mostly, comparatively thin to the non-conformance description of network traffics; In the abnormality detection system synthetic operation network characterization vector choose the less extensibility that just may influence detection system.
(4) accuracy of detection, real-time, comprehensive and new abnormal behaviour recognition capability can not satisfy the test request of abnormality detection.
Accuracy of detection, real-time, comprehensive and new abnormal behaviour recognition capability are to estimate four big key indexs of abnormality detection system.And present method for detecting abnormality is because the real-time measurement of the high-speed network flow of can not loading still can not realize real-time abnormality detection; And generally adopt the cluster sampling formula to handle,, cause accuracy of detection and accuracy to reduce, can not satisfy the accuracy requirement of high speed traffic monitoring because sampling can be lost flow information inevitably; Existing in addition abnormality detection means are single, and recognition capability is limited, and it is all poor that it detects comprehensive ability with the new abnormal behaviour of identification.
It is thus clear that existing Traffic Anomaly detects implementation, there are many factors that cause detecting poor effect such as accuracy of detection, real-time, comprehensive and warning interrogatory be true; Simultaneously, single characteristic vector detects, control strategy is single owing to be directed against, and causes the poor expandability of abnormality detection, and recognition capability is limited.And because the software processes recognition rate is low, cause when abnormality detection, only sending warning, can not realize the blocking-up of abnormal flow to the keeper.
Summary of the invention
The embodiment of the invention provides a kind of network flow abnormal detecting method and system, exists Traffic Anomaly to detect the problem of poor effect, flexibility and poor expandability in the prior art in order to solve.
A kind of network flow abnormal detecting method comprises:
Flow in the monitor network, the essential characteristic data of extraction network traffics;
According to the essential characteristic data of extracting, confirm the assemblage characteristic data of selected attack, wherein, said assemblage characteristic data are the subclass of essential characteristic data;
The discharge model of the said selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result; Said discharge model is to set up in advance according to the sample data of the selected attack in the sample characteristics storehouse;
According to the output result who obtains, confirm whether there is selected attack in the network traffics.
A kind of exception of network traffic detection system comprises: traffic statistics filter subsystem and webmaster analyzing subsystem;
The traffic statistics filter subsystem is used for the flow of monitor network, extracts the essential characteristic data of network traffics;
The webmaster analyzing subsystem is used for confirming the assemblage characteristic data of selected attack according to the essential characteristic data of extracting that wherein, said assemblage characteristic data are the subclass of essential characteristic data; The discharge model of the said selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result; Said discharge model is to set up in advance according to the sample data of the selected attack in the sample characteristics storehouse; Output result according to the discharge model of said selected attack confirms whether to exist in the network traffics this selected attack.
Beneficial effect of the present invention is following:
Network flow abnormal detecting method that the embodiment of the invention provides and system; Through the flow in the real-time monitor network; Extract the essential characteristic data of network traffics, confirm the assemblage characteristic data of selected attack, the assemblage characteristic data of confirming are imported successively the discharge model of corresponding said selected attack; Obtain exporting the result, thereby confirm to exist in the network traffics this selected attack.This method is set up model respectively to different attacks, is which kind of attack thereby can detect accurately, the warning univocal, and accuracy of detection is high; Essential characteristic data in these method extract real-time network traffics, and to the definite targetedly assemblage characteristic data of different attacks, thereby can comprehensively detect the various attack behavior, be beneficial to the cooperation management of a plurality of management domains.This method can be expanded detectable attack easily, when the new attack behavior, can set up its discharge model, and it is detected, and expansion is convenient.This method can be obtained good detection effect, higher detection precision.
Description of drawings
Fig. 1 is the structural representation of exception of network traffic detection system in the embodiment of the invention;
Fig. 2 is the flow chart of network flow abnormal detecting method in the embodiment of the invention;
Fig. 3 builds the structure chart based on the discharge model of quantum wavelet neural network in the embodiment of the invention;
Fig. 4 is the deployment diagram of exception of network traffic detection system in MAN in the embodiment of the invention;
Fig. 5 is the concrete structure sketch map of exception of network traffic detection system in the embodiment of the invention;
Fig. 6 is the concrete structure sketch map of webmaster analyzing subsystem in the embodiment of the invention.
Embodiment
In prior art; Exception of network traffic detects some problems such as poor effect, flexibility and poor expandability; The embodiment of the invention provides a kind of network flow abnormal detecting method, realizes that based on the characteristic of the network traffics of extract real-time Traffic Anomaly detects, owing to considered the combination of corresponding various features data to the different anomalies attack; Real-time, accuracy, comprehensive all acquisition of detection are improved, and detect flexibility and can expand also relatively good.
The network flow abnormal detecting method that the embodiment of the invention provides is realized through exception of network traffic detection system as shown in Figure 1.This system comprises: traffic statistics filter subsystem 1 and webmaster analyzing subsystem 2.
Traffic statistics filter subsystem 1 is used for the traffic statistics filter subsystem, is used for the flow of monitor network, extracts the essential characteristic data of network traffics.
Webmaster analyzing subsystem 2 is used for confirming the assemblage characteristic data of selected attack according to the essential characteristic data of extracting that wherein, said assemblage characteristic data are the subclass of essential characteristic data; The discharge model of the said selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result; Said discharge model is to set up in advance according to the sample data of the selected attack in the sample characteristics storehouse; Output result according to the discharge model of said selected attack confirms to exist in the network traffics this selected attack.
Preferably, webmaster analyzing subsystem 2 is used for also confirming that there is this selected attack in network traffics, and the attribute information according to this selected attack is provided with the flow control parameter;
Traffic statistics filter subsystem 1 also is used for according to the flow control parameter that is provided with network traffics being filtered control.
The flow process of above-mentioned network flow abnormal detecting method based on High Speed IP Metropolitan Area Network is as shown in Figure 2, comprises the steps:
Step S11: the flow in the monitor network, the essential characteristic data of extraction network traffics.
Flow in the real-time monitor network; Extract to set the characteristic information of quantity in following at least one information from network traffics, as the essential characteristic data: the relevant information of flow relevant information, packet relevant information, agreement relevant information, port relevant information, port flow relevant information, address relevant information, TCP flag bit.
Concrete; From above-mentioned information, extract to set the quantative attribute data, specifically comprise some kinds in the following data: stream packet number, stream byte number, stream time started, stream concluding time, the long concussion of bag frequency, packet equispaced, average packet are long, SYN bag number, protocol type, source port, destination interface, each second are sent data packet number, source address, destination address.Can be through these essential characteristic data than the running status that has described network traffics in greater detail.
For example: the essential characteristic data that count on can be designated as the essential characteristic collection X that comprises n essential characteristic variable 1, X 2, L L X nWherein, n representes the quantity of the essential characteristic variable that essential characteristic is concentrated, and is preferred, n=256.
Step S12: according to the essential characteristic data of extracting, confirm the assemblage characteristic data of selected attack, wherein, the assemblage characteristic data are the subclass of essential characteristic data.
The classification cross-entropy is carried out in essential characteristic data of extracting and selected attack; According to the cross-entropy result, confirm the significance level of each essential characteristic data to selected attack; According to the significance level of each essential characteristic data, from the essential characteristic data, confirm the assemblage characteristic data of selected attack to selected attack.
Promptly carry out choosing of assemblage characteristic data to every kind of attack that possibly exist.When carrying out the yojan of characteristic, exploit information entropy correlation theory is through calculating each essential characteristic variable X that essential characteristic is concentrated 1, X 2, L L X nCarry out key character with the cross-entropy of different attack and choose, confirm the essential characteristic variable X according to the size of cross-entropy i(i=1,2 ..., significance level λ n) i
Choose important essential characteristic set of variables according to significance level and become combination feature set X 1, X 2... X m, m<n wherein.And then obtain assemblage characteristic data
Figure BDA0000067174880000061
Exploit information entropy correlation theory; Carry out choosing of key character data through essential characteristic data that calculate to extract with the cross-entropy of different attack; Set up the assemblage characteristic set that accurately to represent each attack according to the key character data of choosing, realize effective yojan the essential characteristic data of network flow calculation.
Step S13: the discharge model of the selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result.
To various possible attacks, after the extraction assemblage characteristic data, in the discharge model of the attack that the assemblage characteristic data input of extracting is corresponding.
Discharge model is to set up in advance according to the sample data of the selected attack in the sample characteristics storehouse.Be based on specifically that the quantum wavelet neural network carries out obtaining after the learning training to the characteristic of the attack in the sample characteristics storehouse.
The foundation of discharge model and use traffic model are handled the process that obtains exporting the result to the assemblage characteristic data of statistics, are described in detail below.
Step S14:, confirm whether to exist in the network traffics type of attack and attack according to the output result of the discharge model of selected attack.
According to the output result who obtains; The type of confirming whether there is attack in the network traffics and confirming attack; Specifically comprise: according to the discharge model of the attack of exporting said output result, the type of the attack that the said output result's of definite output discharge model is corresponding; And according to output result's the output valve of output, confirm this output valve corresponding be to exist to attack or do not have attack, realize confirming whether to exist in the network traffics type of attack and attack.
If the discharge model of the said output result's of output attack is the discharge model of ddos attack, when the output result is the output valve of normal discharge, confirm not exist ddos attack; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a ddos attack;
If the discharge model of the said output result's of output attack is the discharge model of trojan horse, when the output result is the output valve of normal discharge, confirm not exist trojan horse; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a trojan horse;
If the discharge model of the said output result's of output attack is the discharge model of malicious code, when the output result is the output valve of normal discharge, confirm not exist malicious code; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a malicious code;
If the discharge model of the said output result's of output attack is the discharge model of ossified virus, when the output result is the output valve of normal discharge, confirm not exist ossified virus; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is ossified virus.
Promptly, can judge whether there is this attack in the network traffics according to the output result of the discharge model of certain attack.For example: behind the discharge model of this attack of assemblage characteristic data input that certain selected attack-wooden horse is attacked, the output result is A, then shows not exist wooden horse to attack, and the output result is B, then shows to exist wooden horse to attack.
Preferably, above-mentioned network flow abnormal detecting method also comprises:
Step S15: when in confirming network traffics, having certain selected attack, the attribute information according to this selected attack is provided with the flow control parameter.
In case when having certain attack in the discovery network traffics,, confirm the flow control parameter of this attack, for example: port, address or other Control Parameter etc. promptly according to the assemblage characteristic data of this attack of from network traffics, extracting.
Preferably, when in determining network traffics, having this selected attack, the alarm exhibition information is provided to the user.
Step S16: the flow-control parameter based on being provided with is filtered control to network traffics.
According to flow control parameters such as the port that is provided with, addresses, network traffics are filtered control, realize that interception has the network traffics of the flow control parameter of setting.Thereby realize the interception and the blocking-up of the attack in the network traffics are filtered.
In the said method, the process of setting up discharge model specifically comprises:
1) according to the desired output and actual output of sample data, confirms model parameter weights based on the discharge model of quantum wavelet neural network.To the adjustment of model parameter weights, the input data can be corresponded in the different space-likes.
According to the desired output and actual output of sample data, the mean square error function of training sample, wherein the mean square error function of sample is:
E k = 1 2 Σ k = 1 2 ( y k s - c k s ) 2
= 1 2 Σ k = 1 2 ( y k s - Σ j = 1 u v jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w ij λ i X i ) - θ j q ) - b j a j ) ) ) 2
Wherein,
Figure BDA0000067174880000083
is the desired output of this k output neuron of s lot sample,
Figure BDA0000067174880000084
be the actual output of this k output neuron of s lot sample.
The wavelet basis of supposing the quantum wavelet neural network adopts two to advance the orthogonal wavelet function, can train the model parameter weight w that obtains based on the discharge model of quantum wavelet neural network according to above-mentioned mean square error function Ij, v Jk, a j, b j, in the quantum wavelet network, these neuron weight w Ij, v Jk, a j, b jBe adjustable parameter.
Concrete, can realize mean square error function Ek minimization based on Fast Newton's (FN) algorithm based on sample data, carry out neural metwork training, obtain w Ij, v Jk, a j, b jCorrection.
2) according to the model parameter weights of confirming based on the discharge model of quantum wavelet neural network, the quantum of adjustment quantum wavelet-neural network model at interval.
In each cycle of training, upgrade the quantum interval that layer quantum neuron weighed and concealed in the connection between different layers, specifically according to obtaining the neuron weight w Ij, v Jk, a jAnd b j, to the neuronic quantum of the latent layer of neural network model quantum small echo at interval through corresponding algorithm
Figure BDA0000067174880000091
Adjust.The quantum at interval thought of adjustment algorithm is to make in the quantum wavelet neural network output based on the hidden neuron of same type of flow behavior sample data change minimum.
3) set up discharge model at interval according to model parameter weights and the adjusted quantum confirmed based on the quantum wavelet neural network.The discharge model of setting up based on the quantum wavelet neural network is:
c k s = Σ j = 1 u v jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w ij λ i X i ) - θ j q ) - b j a j ) ) k=1,2
Wherein: is the desired output of this k output neuron of s lot sample;
Figure BDA0000067174880000094
is the actual output of this k output neuron of s lot sample;
X iBe the characteristic vector in the assemblage characteristic data;
λ iRepresentation feature vector X iSignificance level;
w IjBe input layer P iTo hidden layer neuron S jConnection power;
β is a slope factor;
Figure BDA0000067174880000095
is the quantum interval;
a jFor hiding layer excitation function scale factor;
b jFor hiding layer excitation function wavelet function shift factor;
H () is for hiding layer excitation function, wherein
n qBe quantum number at interval;
v JkHidden layer neuron is to the interneuronal connection power of output layer;
Through adopting the quantum wavelet neural network that the sample data of network traffics is carried out training study, set up discharge model based on the various dimensions characteristic, be used for detecting the network abnormal flow.
Because online remote upgrade is supported in the sample characteristics storehouse, utilizes the quantum wavelet neural network can in time set up the detection model of cognition of new abnormal behaviour, be convenient to the real-time update abnormal flow and detect model of cognition.
The structure of setting up based on the discharge model of quantum wavelet neural network is as shown in Figure 3.In this discharge model, input layer L InM node arranged, respectively m of corresponding assemblage characteristic collection vector; Hidden layer L hInterstitial content be u; Output layer L Out2 nodes are arranged.The corresponding a kind of output result of each node, the normal and unusual two states of map network flow respectively.The adjacent layer node is totally interconnected, and does not have connection between every layer of neuron.
(1) input layer can be imported assemblage characteristic collection X 1, X 2, L L X m, calculate the input layer output function that is used to import hidden layer through input layer:
P i=λ iX i?i=1,2,L,m;
(2) with input layer output function input hidden layer, calculate the hidden layer node output function that is used for the input and output layer through hidden layer:
S j = 1 n q Σ q = 1 n q h [ β ( W T P - θ j q ) ] j=1,2,L,u;
That is to say that the hidden layer excitation function does
Figure BDA0000067174880000102
This is one and contains scale factor a jWith shift factor b jWavelet function.β is a slope factor; W TP is the neuronic input stimulus of quantum small echo;
Figure BDA0000067174880000103
Be quantum interval (s=1,2, L, n q); n qBe quantum number at interval.W TFor comprising w IjVector, be the network weight vector; P is for comprising P iiX iI=1,2, L, the vector of m for the network input vector, obtains from Access Layer.
(3) hidden layer node output function input and output layer obtains exporting c1 and c2 as a result after output layer calculates.
The calculating of comprehensive input layer, hidden layer and output layer, promptly pass through the calculating of following discharge model:
c k s = Σ j = 1 u v Jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w Ij λ i X i ) - θ j q ) - b j a j ) ) K=1,2, finally can obtain exporting the result, promptly export the result and satisfy above-mentioned formula.
Wherein, v JkBe hidden layer neuron S jTo output layer neuron C kBetween connection power.
Above-mentioned model adopts the quantum wavelet neural network; Wherein the hidden neuron of quantum wavelet neural network has been used for reference the thought of the quantum state stack in the quantum theory; The linear superposition that adopts a plurality of wavelet basis functions is as excitation function, and each wavelet function of stack has different quantum at interval.
Step S13 and step S14; The assemblage characteristic data of confirming are imported successively the discharge model of corresponding selected attack; Confirm whether to exist in the network process of selected attack; Promptly above-mentioned based on the discharge model of quantum wavelet neural network in input assemblage characteristic data, last output result's process.
To pass through the assemblage characteristic collection X that obtains after the comentropy yojan 1, X 2, L L X mAs the assemblage characteristic data of describing selected attack, import the discharge model of this attack, can confirm whether had this attack in the network traffics.
The quantum wavelet neural network structurally is a kind of multilayer feedforward neural network, is similar to the BP network.Because the way of realization of quantum wavelet neural network is varied; Above-mentionedly only enumerated a kind of way of realization; Key of the present invention is the assemblage characteristic data to each attack based on Dynamic Extraction; Determine whether to exist this kind attack; Realize that attack confirms to consider the characteristic of diversification, so the discharge model that the present invention set up being not limited to the above-mentioned discharge model of being set up based on the quantum wavelet neural network, also can be the neural network model of existing maturation based on wavelet theory.
The deployment scenario of above-mentioned exception of network traffic detection system in MAN is as shown in Figure 4.Wherein High Speed IP Metropolitan Area Network comprises transmission network, core layer, service access control layer and broadband access network.As can be seen from Figure 4; The exception of network traffic detection system that the embodiment of the invention provides can be deployed on the trunk link of High Speed IP Metropolitan Area Network; Abnormal flow (wooden horse, virus etc.) on the trunk link at a high speed carries out Real time identification and control, reaches the function to the Real-time Alarm and the real time filtering of abnormal flow.For example be deployed on the couple in router or the link between exchange of secondary Ethernet and the service access control layer of broadband access network.
The concrete structure of above-mentioned exception of network traffic detection system is as shown in Figure 5.This system comprises traffic statistics filter subsystem 1 and webmaster analyzing subsystem 2.Wherein:
Traffic statistics filter subsystem 1 specifically comprises: traffic statistics identification module 11 and on-line filtration module 12.Preferably, flow measurement module 13 before traffic statistics identification module 11 also is connected with and detects also is connected with after the on-line filtration module 12 and detects back flow measurement module 14.
Traffic statistics identification module 11 is used for the flow of monitor network, extracts the essential characteristic data of network traffics.
On-line filtration module 12, when being used for obtaining the webmaster analyzing subsystem and confirming that there is selected attack in network traffics, the attribute information according to this selected attack is provided with the flow control parameter; And network traffics are filtered control according to the flow control parameter of obtaining.
Webmaster analyzing subsystem 2 specifically comprises: model building module 21, data extraction module 22, data analysis module 23 and flow identification module 24.
Model building module 21 is used for setting up the discharge model of selected attack in advance according to the sample data of the selected attack in sample characteristics storehouse.
Preferably, above-mentioned model building module 21 specifically is used for: according to the desired output and the actual output of sample data, confirm the model parameter weights based on the discharge model of quantum wavelet neural network; According to the model parameter weights of confirming based on the discharge model of quantum wavelet neural network, the quantum of adjustment quantum wavelet-neural network model at interval; Model parameter weights and adjusted quantum according to confirming are set up the discharge model based on the quantum wavelet neural network at interval.
Data extraction module 22 is used for confirming the assemblage characteristic data of selected attack according to the essential characteristic data of extracting that wherein, said assemblage characteristic data are the subclass of essential characteristic data.
Preferably, above-mentioned data extraction module 22 specifically is used for: the classification cross-entropy is carried out in essential characteristic data of extracting and selected attack; According to the cross-entropy result, confirm the significance level of each essential characteristic data to said selected attack; According to the significance level of each essential characteristic data, from the essential characteristic data, confirm the assemblage characteristic data of said selected attack to said selected attack.
Data analysis module 23 is used for the discharge model with the said selected attack of the assemblage characteristic data input correspondence of confirming, obtains exporting the result.
Preferably, above-mentioned data analysis module 23 specifically is used for: input layer input assemblage characteristic collection X 1, X 2, L L X m, calculate the input layer output function that is used to import hidden layer through input layer; Input layer output function input hidden layer with obtaining calculates the hidden layer node output function through hidden layer; With the hidden layer node output function input and output layer that obtains,, output layer obtains exporting the result after calculating.
Flow identification module 24 is used for the output result based on the discharge model of said selected attack, confirms to exist in the network traffics this selected attack.
Preferably, above-mentioned webmaster analyzing subsystem 2 also comprises: rule digging module 25, be used for when determining this selected attack of network traffics existence, and the attribute information according to this selected attack is provided with the flow control parameter.
Preferably; Above-mentioned webmaster analyzing subsystem 2 also comprises: message output module is used for to every kind of attack; The definite result who shows flow identification module 24 to the user; The user just can know which kind of attack of existence and not have which kind of attack according to output information, and when having selected attack, to the user alarm exhibition information is provided.
Above-mentioned traffic statistics filter subsystem 1 adopts high-speed hardware circuit forwarding engine; Can carry out the parallel identification of multi-service to network traffics; The recognition performance of this subsystem can not increased because of the kind quantity of business descend, disposal ability does not rely on user, business and tactful complexity yet.The network flow statistic of this subsystem is discerned in each of flow Network Based essential characteristic and is discerned; Realized network flow characteristic statistics based on the link overall situation; Integrated use deep-packet detection (Deep Packet Inspection; DPI), deep stream detect (Deep Flow Inspection, DFI) etc. recognition technology is carried out characteristic statistics one by one to message; For example: protocol characteristic identification, flow behavioural analysis, business diagnosis and statistics, can realize real-time statistics and packet level or other Intelligent Recognition of stream level to network traffics multidimensional characteristic (for example 256 kinds of characteristic informations).
When above-mentioned traffic statistics filter subsystem 1 realizes the network flow statistic function, can comprise the function of following aspect: all types of user and professional traffic statistics; The traffic statistics of all kinds of Flow Control strategies; Set the traffic statistics of strategy stream flexibly; The traffic statistics of assigned ip address or groups of users; Real-time and historical traffic statistics or the like are enumerated at this no longer one by one.When above-mentioned traffic statistics filter subsystem 1 realizes network traffics traffic identification function; The function that can comprise following aspect: can realize to encrypt, mutation carry out effective recognition and control or the like with the emerging business conduct of the unknown, also enumerate no longer one by one here.
The flow control parameter that above-mentioned traffic statistics filter subsystem 1 is provided with according to webmaster analyzing subsystem 2; Realize flow control; The Control Parameter that is provided with can be port, address etc., when message is carried out ONLINE RECOGNITION, utilizes the string matching engine of colleges and universities to realize the examination to the data content in the network traffics; Data flow for carrying malicious code is filtered blocking-up, has cut off the route of transmission of trojan horse.Traffic statistics filter subsystem 1 can start on-line filtration identification according to the transmitting order to lower levels of webmaster analyzing subsystem 2.
Above-mentioned webmaster analyzing subsystem 2 is mainly realized through back-end software design, the statistics that reports according to traffic statistics filter subsystem 1; Obtain the essential characteristic data of network traffics; Obtain the assemblage characteristic data through the comentropy yojan, carry out data analysis based on quantum wavelet neural network discharge model then, detect the abnormal flow in the network; And can confirm it is which kind of attack; And then excavate filtering rule, and the flow control parameter is set, indication traffic statistics filter subsystem 1 realizes online virus filtration function.Webmaster analyzing subsystem 2 can make up a plurality of discharge models to multiple attack; After getting access to the essential characteristic data; Obtain the assemblage characteristic data to multiple attack yojan successively, import corresponding discharge model successively respectively, thereby determine whether to exist corresponding attack.This method can be set up discharge model analysis and get final product when having the new attack behavior to analyze, and makes things convenient for expanded application.
Wherein the concrete structure of webmaster analyzing subsystem is as shown in Figure 6, the traffic statistics filter subsystem is obtained data from the internet after, sends the webmaster analyzing subsystem to.The webmaster analyzing subsystem can be disposed several parts such as data storage cell, data analysis unit and application program unit when actual deployment.
The storage of from the internet, obtaining is in data storage cell; Specifically can lay a plurality of databases in the data storage cell, for example: the database of traffic statistics database, link-layer statistics storehouse, flow behavioural characteristic storehouse, alarm log database, policy rule database and other statisticss.Be respectively applied for the various characteristics that storage extracts, discharge model of foundation etc. from network traffics; And the filtering rule of excavating; The information such as flow control parameter that for example are provided with to certain attack can also be stored warning information when detecting abnormal flow, alarm exhibition information etc.Wherein, the attack of selecting comprises one or more in the following attack: ddos attack, trojan horse, malicious code and ossified virus etc.The alarm exhibition information comprises one or more in the following exhibition information: the chart displaying of information is showed, is attacked in the classification alarm of each attack and the policing rule of abnormality detection is showed.
This data storage cell is mainly accomplished storage and is handled all data resources, administers and maintains standard through unified data, realizes the data resource management.And according to the type of resource and towards different application, different storage, processing and access strategies is provided, for types of applications provides the unified data view.The data owner of this unit will come from the traffic statistics data that traffic statistics filter subsystem that bottom hardware forms reports, and the flow behavior sample feature database in this unit is supported online remote upgrade, to support the identification to new abnormal behaviour.
Above-mentioned data analysis unit can realize from essential characteristic extracting data assemblage characteristic data, the concrete feature reduction mode that adopts based on comentropy.And, carry out data analysis with the discharge model of assemblage characteristic data input based on the quantum wavelet neural network.Specifically can data extraction module 22, data analysis module 23 and flow identification module 24.
In addition, data analysis unit can also implementation model be set up the function of module 21, sets up discharge model and transfers to the data storage cell storage.
During the data analysis unit abnormal flow that analyzing and testing implies from a large amount of network traffics data; Problem for fear of the detection accuracy difference of selecting for use one or more characteristics to cause; Adopted the layering of traffic characteristic data to divide thought: from network traffics, to extract the essential characteristic data that contain the full detail in the network traffics basically earlier, make the running status of the reaction network flow that the characteristic of extraction can be detailed.If but all essential characteristic data were all carried out real-time storage, maintenance and analyzing and testing, for high speed network environment, its complexity would be high, realizes that difficulty is very big.Therefore when analyzing, analyze to the characteristic after the different yojan of different attack employings.
The yojan from the essential characteristic data of above-mentioned data analysis unit goes out the assemblage characteristic data, is used for analyzing whether have abnormal flow.The set of assemblage characteristic data real time altering according to actual needs is provided with.To certain specific attack, the subclass of essential characteristic that will be referred to this attack is as the assemblage characteristic data of describing this kind attack.The optimum of the essential characteristic data of network traffics is selected and effectively yojan about theory through comentropy; The cross-entropy of each essential characteristic in the essential characteristic data and selected attack is chosen in calculating; The realization key character is chosen, and makes the assemblage characteristic data of choosing for can accurately representing the validity feature data of selected attack.These validity feature data load in the discharge model of setting up to corresponding attack based on the quantum wavelet neural network, just can be determined whether to exist abnormal flow according to the output result, and can confirm that abnormal flow is caused by the sort of attack.
Above-mentioned data analysis unit is carried out policing rule and is excavated when detecting attack, confirms to filter the flow control parameter of this attack of interception, and in time is handed down to the traffic statistics filter subsystem, realizes blocking in real time abnormal flow.
The exception of network traffic detection system that the embodiment of the invention provides also comprises an application program unit, is used to realize the function of message output module.For example: application program unit can be directed against ddos attack, malicious code attack, trojan horse, ossified virus detects and show testing result to the user, and the multidimensional displaying of warning information and the blocking-up of abnormal flow etc. are provided.Wherein:
(Distributed Denial of service, DDoS) attack utilizes rational services request to take too much Service Source, causes the service overload, can't respond other request in distributed denial of service.These Service Sources comprise the network bandwidth, file system space capacity, open process or inside connection.System mainly attacks (Land attack) from the attack of following aspect monitoring DDoS:SYN flood (SYN flooding), smurf attack (Smurf attack), UDP flood (Udp flooding) attack, assembly (the Ping of death) attack of death, tear (TearDrop) attack, Land; The assemblage characteristic data of its extraction can be purpose IP address and source IP address, realize interception and blocking-up according to the identical purpose IP address and the source IP address of the data of network traffics.
Trojan horse utilizes the leak of Windows, invades subscriber computer, and the control subscriber computer is stolen subscriber data, and its hazard area is very wide, the extent of injury is very dark.Can filter trojan horse as the assemblage characteristic Data Detection with IP address, port numbers etc.Can detected wooden horse type comprise: hang horse network address, Trojan for stealing numbers, Long-distance Control wooden horse, the wooden horse of damage type, denial of service (Denial of Service; DoS) attack wooden horse, rebound ports Trojan horse, program killer's type, act on behalf of wooden horse, FTP (File Transfer Protocol, FTP) many types such as wooden horse.
The detection of malicious code, relatively realizes detecting with condition code through the network traffics packet is carried out data analysis through the mass data of network traffics being carried out refinement and association analysis detects.
Ossified virus; Be that Botnet (English name is Botnet) is development on the basis of traditional malicious code forms such as network worm, Trojan Horse, back door instrument on the Internet, merges and a kind of novel attack method of generation; Often be used for initiating large-scale network attack by the hacker; Like distributed denial of service attack (DDoS), magnanimity spam etc., the information that these computers of hacker's control are simultaneously preserved also all can be by hacker random " taking ".Therefore, no matter be concerning the Cybersecurity Operation or the protection of secure user data, Botnet all is the hidden danger that has threat.Can adopt the Botnet detection mode of agreement and structurally associated to the detection of ossified virus, can be with domain name as characteristic, and combine log analysis, determine position and scale, the distribution etc. of Botnet.
The exhibition information of above-mentioned various attack behavior can adopt the form of chart to show the user visually; The displaying content that can show the incident that comprises attack source, victim, attack time, attack, filtration, successful attack number, attack number of failure or the like, and read with the user.
Warning information is showed the effect realized existing when attacking to user's alarm.In real time alarm log being classified by various conditions helps to help the keeper promptly to find some particular attack.Generally can be by the dynamically classification of switching alarm daily record of multiple standards.Can be for every attack logs by prior definition with the high bright demonstration of various colors.
The displaying of all right support policy rule of application program unit; Support is carried out edit-modify with the form of policy groups, and the keeper can revise whole group regular attribute quickly, comprises whether activating, and various system actings etc.; User Defined policing rule function is provided, and has supported regular expression.
Traffic statistics filter subsystem in the said system, based on " devices at full hardwareization " and processing mode, add up, discern and filter specifying the message on the high-speed link; The webmaster analyzing subsystem is showed the timely alarm of the safe condition and the Virus Info of whole network with functions such as integrated viral rule digging, data analysis, information exhibition, system's O&M and strategy maintenances with various ways such as form, curve charts.The intruding detection system framework of this layering can be integrated effectively the identification of 40Gbps link linear speed virus rule, abnormal flow filter, functions such as warning message statistics and network equipment maintenance; This architecture adopts the mode that the front end hardware platform combines with the daemon software system simultaneously; Accomplish preliminary treatment by the front end hardware platform to service traffics information; The daemon software system focuses on front terminal system reporting information again; Significantly reduce the processing time, can identify the abnormal flow that exists in the network fast, efficiently and accurately.
It is example that the SYN FLOOD that comprises with ddos attack below attacks, and explains that the network flow abnormal detecting method and the system that provide through the embodiment of the invention realize the detailed process that exception of network traffic detects.
Attack for SYN FLOOD; The assemblage characteristic vector that after the comentropy yojan, obtains is 6, long 6 assemblage characteristic vectors such as frequency, bag equispaced, SYN bag number, stream beginning/concluding time that shake of stream packet number, stream byte number, bag that example is as shown in table 1 below.The discharge model of being set up based on the quantum wavelet neural network to SYN FLOOD attack is as shown in Figure 3, and wherein the network topology structure of this model is 6-12-2.Input layer is 6, respectively corresponding after effective yojan 6 assemblage characteristic vectors; Hidden neuron is 12; The output layer neuron is 2, respectively normal, unusual two states, i.e. c of corresponding flow 1c 2Represent flow normal condition, c during=10 (c1 is 1, and c2 is 0) 1c 2Represent the Traffic Anomaly state during=01 (c1 is 0, and c2 is 1), expression exists SYN FLOOD to attack.The weights of quantum wavelet neural network and the learning rate of threshold value elect 0.02 as; Quantum learning rate at interval is 0.02; Select the slope factor of multilayer small echo excitation function to equal 0.95; Selecting the neuronic quantum number of plies of quantum is 4.When all parameters are provided with identically, promptly to learn to accomplish up to the study number of times of setting under the situation that error precision do not set, learning rate is 0.02, maximum iteration time is set at 580,2500 respectively.Train 580 times, the quantum wavelet neural network error of this patent is 8.8761 * 10 -4When training 2500 times, the quantum wavelet neural network error of this patent is 1.8978 * 10 -5
Part training sample data (not before the normalization) are as shown in table 1 below.
Table 1
Figure BDA0000067174880000181
Figure BDA0000067174880000191
Network flow abnormal detecting method that the embodiment of the invention provides and system are applicable to High Speed IP Metropolitan Area Network backbone network environment, and its single-pass process ability is not less than 40Gbps, also can smooth compatible 10Gbps interface when supporting the 40Gbps LI(link interface).Can effectively realize the identification and the blocking-up of the abnormal flow in the network traffics; Can real-time and dynamic monitor attack; And dynamically update database mining on-line filtration rule, and confirm the flow control parameter, protean attack is in time discerned, alarms, filters, blocked.
Which kind of attack discharge model is set up in different attacks respectively realized discerning different attacks, be thereby can detect what exist in the network traffics accurately, the warning univocal, and accuracy of detection is high.
Integrated use DPI and two kinds of recognition technologies of DFI; Message carries out protocol characteristic identification, flow behavioural analysis, business diagnosis and statistics one by one one by one; Essential characteristic data in these method extract real-time network traffics, the characteristic of its extraction is more comprehensive, and confirms the assemblage characteristic data targetedly to different attacks; Thereby can comprehensively detect the various attack behavior, be beneficial to the cooperation management of a plurality of management domains.And because the characteristic in the extract real-time network traffics, can satisfy preferably high-speed network flow monitoring in real time requirement, can satisfy the service application kind and application scale is pushed the speed comparatively fast, 7 * 24 hours requirements such as high available and high real-time of service application.
Can expand detectable attack easily, when the new attack behavior, can set up its discharge model, it is detected, expansion is convenient.This method can be obtained good detection effect, higher detection precision.Whole system adopts a plurality of independently functional modules and subsystem to realize that framework is flexible, and structure is unified, is with good expansibility and re-configurability.
Because the characteristic of extracting can be than the actual conditions of more comprehensive reaction network flow; Avoided existing mode to adopt the problem of single characteristic as the detection poor effect that basis for estimation caused; And can add easily and the discharge model that reduces to different attacks, obtain and detect effect comprehensively and accurately.To certain attack; Choose wherein key character through the cross-entropy of each essential characteristic and this attack in the calculation training sample and set up the assemblage characteristic set; And utilize the quantum wavelet-neural network model that assemblage characteristic is gathered and carry out learning training with the classification of realization to the flow behavior, fast convergence rate, the flow information of containing is comprehensive and accurate; Under high speed network environment, can effectively improve accuracy of detection and the new unusual capacity of identification in real time; Make and under the abnormality detection framework of whole flow model Network Based, can realize detection more easily, and can obtain reasonable detection effect different types of unusual attack.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (25)

1. a network flow abnormal detecting method is characterized in that, comprising:
Flow in the monitor network, the essential characteristic data of extraction network traffics;
According to the essential characteristic data of extracting, confirm the assemblage characteristic data of selected attack, wherein, said assemblage characteristic data are the subclass of essential characteristic data;
The discharge model of the attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result; Said discharge model is what set up in advance according to the sample data of each attack in the sample characteristics storehouse;
Based on the output result who obtains, the type of confirming whether there is attack in the network traffics and confirming attack.
2. the method for claim 1 is characterized in that, the essential characteristic data of said extraction network traffics specifically comprise:
Extract to set the characteristic information of quantity in following at least one information from network traffics, as the essential characteristic data: the relevant information of flow relevant information, packet relevant information, agreement relevant information, port relevant information, port flow relevant information, address relevant information, TCP flag bit.
3. method as claimed in claim 2 is characterized in that, the setting quantative attribute data of said extraction network traffics specifically comprise some kinds in the following data:
Stream packet number, stream byte number, stream time started, stream concluding time, the long concussion of bag frequency, packet equispaced, average packet are long, SYN bag number, protocol type, source port, destination interface, each second are sent data packet number, source address, destination address.
4. the method for claim 1 is characterized in that, and is said according to the essential characteristic data of extracting, and confirms the assemblage characteristic data of selected attack, specifically comprises:
The classification cross-entropy is carried out in essential characteristic data of extracting and selected attack;
Based on the cross-entropy result, confirm the significance level of each essential characteristic data to said selected attack;
According to the significance level of each essential characteristic data, from the essential characteristic data, confirm the assemblage characteristic data of said selected attack to said selected attack.
5. the method for claim 1 is characterized in that, the process of setting up discharge model according to the sample data of the selected attack in the sample characteristics storehouse comprises:
According to the desired output and actual output of sample data, confirm model parameter weights based on the discharge model of quantum wavelet neural network;
According to the model parameter weights of confirming based on the discharge model of quantum wavelet neural network, the quantum of adjustment quantum wavelet-neural network model at interval;
Model parameter weights and adjusted quantum according to confirming are set up the discharge model based on the quantum wavelet neural network at interval.
6. method as claimed in claim 5 is characterized in that, said desired output and actual output according to sample data are confirmed the model parameter weights based on the discharge model of quantum wavelet neural network; Specifically comprise:
According to the desired output and actual output of sample data, the mean square error function of training sample:
E k = 1 2 Σ k = 1 2 ( y k s - c k s ) 2
= 1 2 Σ k = 1 2 ( y k s - Σ j = 1 u v jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w ij λ i X i ) - θ j q ) - b j a j ) ) ) 2
Wherein,
Figure FDA0000067174870000023
is the desired output of this k output neuron of s lot sample;
Figure FDA0000067174870000024
is the actual output of this k output neuron of s lot sample;
X iBe the characteristic vector in the assemblage characteristic data;
λ iRepresentation feature vector X iSignificance level;
w IjBe input layer P iTo hidden layer neuron S jConnection power;
β is a slope factor;
Figure FDA0000067174870000025
is the quantum interval;
a jFor hiding layer excitation function scale factor;
b jFor hiding layer excitation function wavelet function shift factor;
H () is for hiding layer excitation function, wherein
Figure FDA0000067174870000031
n qBe quantum number at interval;
v JkHidden layer neuron is to the interneuronal connection power of output layer;
Through realizing that mean square error function minimization is obtained the model parameter weight w Ij, v Jk, a j, b j
7. method as claimed in claim 6 is characterized in that, the model parameter weights that said basis is confirmed based on the discharge model of quantum wavelet neural network, and the quantum of adjustment quantum wavelet-neural network model specifically comprises at interval:
According to the model parameter weight w that obtains Ij, v Jk, a j, b j, the quantum of adjustment adjustment quantum wavelet-neural network model at interval
8. method as claimed in claim 7 is characterized in that, the discharge model based on the quantum wavelet neural network of said foundation is:
c k s = Σ j = 1 u v jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w ij λ i X i ) - θ j q ) - b j a j ) ) k=1,2。
9. the method for claim 1 is characterized in that, the discharge model of the said selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result, specifically comprises:
Input layer input assemblage characteristic collection X 1, X 2, L L X m, calculate the input layer output function that is used to import hidden layer through input layer;
Input layer output function input hidden layer with obtaining calculates the hidden layer node output function through hidden layer;
With the hidden layer node output function input and output layer that obtains,, output layer obtains exporting the result after calculating.
10. method as claimed in claim 9 is characterized in that, said input layer output function is P iiX iI=1,2, L, m;
Wherein: X iBe the characteristic vector in the assemblage characteristic data;
λ iRepresentation feature vector X iSignificance level.
11. method as claimed in claim 10 is characterized in that, said hidden layer node output function does S j = 1 n q Σ q = 1 n q h [ β ( W T P - θ j q ) ] J=1,2, L, u;
Wherein: W TFor comprising w IjVector, w IjBe input layer P iTo hidden layer neuron S jConnection power;
P is for comprising P iiX iI=1,2, L, the vector of m;
β is a slope factor;
Figure FDA0000067174870000042
is the quantum interval;
H () is for hiding layer excitation function, wherein
Figure FDA0000067174870000043
n qBe quantum number at interval.
12. method as claimed in claim 11 is characterized in that, the output result satisfies formula: c k s = Σ j = 1 u v Jk ( 1 n q Σ q = 1 n q h ( ( β ( Σ i = 1 m w Ij λ i X i ) - θ j q ) - b j a j ) ) K=1,2;
Wherein, is the desired output of this k output neuron of s lot sample;
Figure FDA0000067174870000046
is the actual output of this k output neuron of s lot sample;
X iBe the characteristic vector in the assemblage characteristic data;
λ iRepresentation feature vector X iSignificance level;
w IjBe input layer P iTo hidden layer neuron S jConnection power;
β is a slope factor;
Figure FDA0000067174870000047
is the quantum interval;
a jFor hiding layer excitation function scale factor;
b jFor hiding layer excitation function wavelet function shift factor;
H () is for hiding layer excitation function, wherein
Figure FDA0000067174870000051
n qBe quantum number at interval;
v JkHidden layer neuron is to the interneuronal connection power of output layer.
13. the method for claim 1 is characterized in that, said selected attack comprises one or more in the following attack: ddos attack, trojan horse, malicious code and ossified virus.
14. method as claimed in claim 13 is characterized in that, the output result that said basis obtains, and the type of confirming whether there is attack in the network traffics and confirming attack specifically comprises:
If the discharge model of the said output result's of output attack is the discharge model of ddos attack, when the output result is the output valve of normal discharge, confirm not exist ddos attack; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a ddos attack;
If the discharge model of the said output result's of output attack is the discharge model of trojan horse, when the output result is the output valve of normal discharge, confirm not exist trojan horse; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a trojan horse;
If the discharge model of the said output result's of output attack is the discharge model of malicious code, when the output result is the output valve of normal discharge, confirm not exist malicious code; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is a malicious code;
If the discharge model of the said output result's of output attack is the discharge model of ossified virus, when the output result is the output valve of normal discharge, confirm not exist ossified virus; When its output result is the output valve of abnormal flow, confirm that the type of the attack of existence is ossified virus.
15. like the arbitrary described method of claim 1-14, it is characterized in that, also comprise:
When in determining network traffics, having this selected attack, the attribute information based on this selected attack is provided with the flow-control parameter, and network traffics are filtered control.
16. method as claimed in claim 15 is characterized in that, also comprises, when in determining network traffics, having this selected attack, to the user alarm exhibition information is provided;
Said alarm exhibition information comprises one or more in the following exhibition information: the chart displaying of information is showed, is attacked in the classification alarm of each attack and the policing rule of abnormality detection is showed.
17. an exception of network traffic detection system is characterized in that, comprising: traffic statistics filter subsystem and webmaster analyzing subsystem;
The traffic statistics filter subsystem is used for the flow of monitor network, extracts the essential characteristic data of network traffics;
The webmaster analyzing subsystem is used for confirming the assemblage characteristic data of selected attack according to the essential characteristic data of extracting that wherein, said assemblage characteristic data are the subclass of essential characteristic data; The discharge model of the said selected attack that the assemblage characteristic data input of confirming is corresponding obtains exporting the result; Said discharge model is to set up in advance according to the sample data of the selected attack in the sample characteristics storehouse; According to the output result of the discharge model of said selected attack, the type of confirming whether there is attack in the network traffics and confirming attack.
18. system as claimed in claim 17 is characterized in that, said webmaster analyzing subsystem also is used for: confirm that there is this selected attack in network traffics, the attribute information according to this selected attack is provided with the flow control parameter;
The traffic statistics filter subsystem also is used for: the flow-control parameter based on being provided with is filtered control to network traffics.
19. system as claimed in claim 17 is characterized in that, said traffic statistics filter subsystem specifically comprises:
The traffic statistics identification module is used for the flow of monitor network, extracts the essential characteristic data of network traffics;
The on-line filtration module, when being used for obtaining the webmaster analyzing subsystem and confirming that there is selected attack in network traffics, the attribute information according to this selected attack is provided with the flow control parameter; And network traffics are filtered control according to the flow control parameter of obtaining.
20. system as claimed in claim 17 is characterized in that, said webmaster analyzing subsystem specifically comprises:
Model building module is used for setting up the discharge model of selected attack in advance according to the sample data of the selected attack in sample characteristics storehouse;
Data extraction module is used for confirming the assemblage characteristic data of selected attack according to the essential characteristic data of extracting that wherein, said assemblage characteristic data are the subclass of essential characteristic data;
Data analysis module is used for the discharge model with the said selected attack of the assemblage characteristic data input correspondence of confirming, obtains exporting the result;
The flow identification module is used for the output result based on the discharge model of said selected attack, confirms to exist in the network traffics this selected attack.
21. system as claimed in claim 20 is characterized in that, said data extraction module specifically is used for:
The classification cross-entropy is carried out in essential characteristic data of extracting and selected attack; According to the cross-entropy result, confirm the significance level of each essential characteristic data to said selected attack; According to the significance level of each essential characteristic data, from the essential characteristic data, confirm the assemblage characteristic data of said selected attack to said selected attack.
22. system as claimed in claim 20 is characterized in that, said model building module specifically is used for:
According to the desired output and actual output of sample data, confirm model parameter weights based on the discharge model of quantum wavelet neural network;
According to the model parameter weights of confirming based on the discharge model of quantum wavelet neural network, the quantum of adjustment quantum wavelet-neural network model at interval;
Model parameter weights and adjusted quantum according to confirming are set up the discharge model based on the quantum wavelet neural network at interval.
23. system as claimed in claim 20 is characterized in that, said data analysis module specifically is used for:
Input layer input assemblage characteristic collection X 1, X 2, L L X m, calculate the input layer output function that is used to import hidden layer through input layer;
Input layer output function input hidden layer with obtaining calculates the hidden layer node output function through hidden layer;
With the hidden layer node output function input and output layer that obtains,, output layer obtains exporting the result after calculating.
24., it is characterized in that said webmaster analyzing subsystem also comprises like the arbitrary described system of claim 20-23:
The rule digging module is used for when determining this selected attack of network traffics existence, and the attribute information according to this selected attack is provided with the flow control parameter.
25., it is characterized in that said webmaster analyzing subsystem also comprises like the arbitrary described system of claim 20-23:
Message output module is used for to every kind of attack, the definite result who shows the flow identification module to the user, and when having the attack of selecting, the alarm exhibition information is provided to the user.
CN201110154226.3A 2011-06-09 2011-06-09 Network flow abnormal detecting method and system Active CN102821002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110154226.3A CN102821002B (en) 2011-06-09 2011-06-09 Network flow abnormal detecting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110154226.3A CN102821002B (en) 2011-06-09 2011-06-09 Network flow abnormal detecting method and system

Publications (2)

Publication Number Publication Date
CN102821002A true CN102821002A (en) 2012-12-12
CN102821002B CN102821002B (en) 2015-08-26

Family

ID=47304873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110154226.3A Active CN102821002B (en) 2011-06-09 2011-06-09 Network flow abnormal detecting method and system

Country Status (1)

Country Link
CN (1) CN102821002B (en)

Cited By (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117903A (en) * 2013-02-07 2013-05-22 中国联合网络通信集团有限公司 Internet surfing unusual flow detection method and device
CN103152442A (en) * 2013-01-31 2013-06-12 中国科学院计算机网络信息中心 Detection and processing method and system for botnet domain names
CN103716180A (en) * 2013-12-04 2014-04-09 国网上海市电力公司 Network flow actual forecasting-based network abnormality pre-warning method
CN103746987A (en) * 2013-12-31 2014-04-23 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN103973684A (en) * 2014-05-07 2014-08-06 北京神州绿盟信息安全科技股份有限公司 Rule compiling and matching method and device
CN104077524A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Training method used for virus identification and virus identification method and device
CN104079545A (en) * 2013-03-29 2014-10-01 西门子公司 Method, device and system for extracting data package filtering rules
CN104137503A (en) * 2012-12-19 2014-11-05 华为技术有限公司 Method, apparatus and network device for monitoring network
CN104202336A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 DDoS (distributed denial of service) attach detection method based on information entropy
CN104219221A (en) * 2014-05-30 2014-12-17 郭瑞 Network security flow generating method and network security flow generating system
CN104519031A (en) * 2013-09-30 2015-04-15 西门子公司 Method and device for detecting malicious network behaviors
CN104994056A (en) * 2015-05-11 2015-10-21 中国电力科学研究院 Method for dynamically updating flow identification model in power information network
CN105208026A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Hostile attack preventing method and network system
CN103095728B (en) * 2013-02-07 2016-04-27 重庆大学 A kind of network security points-scoring system of Behavior-based control data fusion and method
CN105847043A (en) * 2016-03-21 2016-08-10 浪潮通信信息系统有限公司 Mobile user Internet access diagnostic method
CN105873105A (en) * 2016-04-22 2016-08-17 中国科学技术大学 Method for anomaly detection and positioning of mobile communication network based on network experience quality
CN106130960A (en) * 2016-06-12 2016-11-16 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN106411597A (en) * 2016-10-14 2017-02-15 广东工业大学 Network traffic abnormality detection method and system
CN106447383A (en) * 2016-08-30 2017-02-22 杭州启冠网络技术有限公司 Cross-time multi-dimensional abnormal data monitoring method and system
CN106685964A (en) * 2016-12-29 2017-05-17 济南大学 Malicious software detecting method and system based on malicious network flow word library
CN106815521A (en) * 2015-12-31 2017-06-09 武汉安天信息技术有限责任公司 A kind of sample relevance detection method, system and electronic equipment
CN106850632A (en) * 2017-02-10 2017-06-13 北京奇艺世纪科技有限公司 The detection method and device of a kind of unusual combination data
CN107104960A (en) * 2017-04-20 2017-08-29 四川电科智造科技有限公司 A kind of industrial control system intrusion detection method based on machine learning
CN107196816A (en) * 2016-03-14 2017-09-22 中国移动通信集团江西有限公司 Anomalous traffic detection method, system and Network analyzing equipment
CN107196930A (en) * 2017-05-12 2017-09-22 苏州优圣美智能系统有限公司 Method, system and the mobile terminal of computer network abnormality detection
CN107426141A (en) * 2016-05-23 2017-12-01 纬创资通股份有限公司 Malicious code protection method, system and monitoring device
CN107508816A (en) * 2017-08-31 2017-12-22 杭州迪普科技股份有限公司 A kind of attack traffic means of defence and device
CN107633058A (en) * 2017-09-20 2018-01-26 武汉虹旭信息技术有限责任公司 A kind of data dynamic filtration system and method based on deep learning
CN107707509A (en) * 2016-08-08 2018-02-16 阿里巴巴集团控股有限公司 Identify and assist in identifying the method, apparatus and system of false flow
CN108171053A (en) * 2017-12-28 2018-06-15 北京奇虎科技有限公司 The method and system of a kind of rule discovery
CN108259494A (en) * 2018-01-17 2018-07-06 北京邮电大学 A kind of network attack detecting method and device
CN108322463A (en) * 2018-01-31 2018-07-24 平安科技(深圳)有限公司 Ddos attack detection method, device, computer equipment and storage medium
CN108494791A (en) * 2018-04-08 2018-09-04 北京明朝万达科技股份有限公司 A kind of DDOS attack detection method and device based on Netflow daily record datas
CN108647292A (en) * 2018-05-07 2018-10-12 前海梧桐(深圳)数据有限公司 Enterprise's property sort computational methods based on neural network algorithm and system
CN108933706A (en) * 2017-05-23 2018-12-04 华为技术有限公司 A kind of method, apparatus and system of monitoring data flow
CN109039797A (en) * 2018-06-11 2018-12-18 电子科技大学 Big stream detection method based on intensified learning
CN109040113A (en) * 2018-09-04 2018-12-18 海南大学 Detecting method of distributed denial of service attacking and device based on Multiple Kernel Learning
CN109067773A (en) * 2018-09-10 2018-12-21 成都信息工程大学 A kind of vehicle-mounted CAN network inbreak detection method neural network based and system
CN109120630A (en) * 2018-09-03 2019-01-01 上海海事大学 A kind of SDN network ddos attack detection method based on Optimized BP Neural Network
WO2018224055A3 (en) * 2017-06-05 2019-01-24 中兴通讯股份有限公司 Multi-dimensional data abnormality detection method and apparatus
CN109327453A (en) * 2018-10-31 2019-02-12 北斗智谷(北京)安全技术有限公司 A kind of recognition methods of specific threat and electronic equipment
CN109450895A (en) * 2018-11-07 2019-03-08 北京锐安科技有限公司 A kind of method for recognizing flux, device, server and storage medium
CN109889470A (en) * 2017-12-06 2019-06-14 中国科学院声学研究所 A kind of method and system based on router defending DDoS (Distributed Denial of Service) attacks
JP2019102960A (en) * 2017-12-01 2019-06-24 日本電信電話株式会社 Cyber attack detection system, feature amount selection system, cyber attack detection method, and program
CN110149331A (en) * 2019-05-22 2019-08-20 中国科学院长春光学精密机械与物理研究所 A kind of P2P botnet detection method, device and medium
CN110247911A (en) * 2019-06-14 2019-09-17 曹严清 A kind of Traffic anomaly detection method and system
CN110287699A (en) * 2019-06-12 2019-09-27 杭州迪普科技股份有限公司 The feature extracting method and device of application program
CN110336830A (en) * 2019-07-17 2019-10-15 山东大学 A kind of ddos attack detection system based on software defined network
CN110569282A (en) * 2019-09-04 2019-12-13 中国工商银行股份有限公司 Data processing method, data processing device, computing equipment and computer readable storage medium
CN110602029A (en) * 2019-05-15 2019-12-20 上海云盾信息技术有限公司 Method and system for identifying network attack
TWI684113B (en) * 2018-08-28 2020-02-01 中華電信股份有限公司 Gateway apparatus, detecting method of malicious domain and hacked host, and non-transitory computer readable medium thereof
CN110784435A (en) * 2019-04-15 2020-02-11 北京嘀嘀无限科技发展有限公司 Abnormal service identification method and device, electronic equipment and storage medium
CN110909753A (en) * 2018-09-14 2020-03-24 中国移动通信集团广东有限公司 Data classification method, system and equipment
CN111092852A (en) * 2019-10-16 2020-05-01 平安科技(深圳)有限公司 Network security monitoring method, device, equipment and storage medium based on big data
CN111131237A (en) * 2019-12-23 2020-05-08 深圳供电局有限公司 Microgrid attack identification method based on BP neural network and grid-connected interface device
CN111756584A (en) * 2020-07-14 2020-10-09 济南浪潮高新科技投资发展有限公司 Netflow protocol network flow analysis method and system based on deep learning
CN111756708A (en) * 2020-06-09 2020-10-09 北京天空卫士网络安全技术有限公司 Method and device for detecting directional threat attack
CN111818103A (en) * 2020-09-09 2020-10-23 信联科技(南京)有限公司 Traffic-based tracing attack path method in network target range
CN111953695A (en) * 2020-08-14 2020-11-17 中国工商银行股份有限公司 Method and device for constructing terminal behavior portrait
CN112001443A (en) * 2020-08-24 2020-11-27 成都卫士通信息产业股份有限公司 Network behavior data monitoring method and device, storage medium and electronic equipment
CN112333023A (en) * 2020-11-06 2021-02-05 四川师范大学 Intrusion detection system based on flow of Internet of things and detection method thereof
CN112491806A (en) * 2020-11-04 2021-03-12 深圳供电局有限公司 Cloud platform flow security analysis system and method
CN112866185A (en) * 2019-11-28 2021-05-28 海信集团有限公司 Network traffic monitoring device and abnormal traffic detection method
CN112907321A (en) * 2021-02-03 2021-06-04 珠海市鸿瑞信息技术股份有限公司 Big data-based information security anomaly sensing platform for data mining and analysis
CN113010884A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Real-time feature filtering method in intrusion detection system
WO2021139235A1 (en) * 2020-06-30 2021-07-15 平安科技(深圳)有限公司 Method and apparatus for system exception testing, device, and storage medium
CN113625681A (en) * 2021-07-19 2021-11-09 湖南大学 CAN bus abnormality detection method, system and storage medium
CN113746686A (en) * 2020-05-27 2021-12-03 阿里巴巴集团控股有限公司 Network flow state determination method, computing device and storage medium
CN113747443A (en) * 2021-02-26 2021-12-03 上海观安信息技术股份有限公司 Machine learning algorithm-based security detection method and device
CN113810207A (en) * 2020-06-12 2021-12-17 中国电信股份有限公司 Root cause server positioning method and root cause server positioning device
CN114666162A (en) * 2022-04-29 2022-06-24 北京火山引擎科技有限公司 Flow detection method, device, equipment and storage medium
CN115134099A (en) * 2021-03-22 2022-09-30 中国移动通信集团江苏有限公司 Network attack behavior analysis method and device based on full flow
CN115174254A (en) * 2022-07-22 2022-10-11 科来网络技术股份有限公司 Flow abnormity warning method and device, electronic equipment and storage medium
CN116074215A (en) * 2022-12-30 2023-05-05 中国联合网络通信集团有限公司 Network quality detection method, device, equipment and storage medium
CN116208356A (en) * 2022-10-27 2023-06-02 浙江大学 Virtual currency mining flow detection method based on deep learning
CN116723138A (en) * 2023-08-10 2023-09-08 杭银消费金融股份有限公司 Abnormal flow monitoring method and system based on flow probe dyeing
CN115134099B (en) * 2021-03-22 2024-05-03 中国移动通信集团江苏有限公司 Network attack behavior analysis method and device based on full flow

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158905A1 (en) * 2002-02-19 2003-08-21 Postini Corporation E-mail management services
CN101221554A (en) * 2008-01-25 2008-07-16 北京工业大学 Brain wave characteristic extraction method based on wavelet translation and BP neural network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158905A1 (en) * 2002-02-19 2003-08-21 Postini Corporation E-mail management services
CN101221554A (en) * 2008-01-25 2008-07-16 北京工业大学 Brain wave characteristic extraction method based on wavelet translation and BP neural network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张义荣等: "一种基于粗糙集属性约简的支持向量异常入侵检测方法", 《计算机科学》 *

Cited By (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104137503A (en) * 2012-12-19 2014-11-05 华为技术有限公司 Method, apparatus and network device for monitoring network
CN103152442A (en) * 2013-01-31 2013-06-12 中国科学院计算机网络信息中心 Detection and processing method and system for botnet domain names
CN103152442B (en) * 2013-01-31 2016-06-01 中国科学院计算机网络信息中心 A kind of detection and treatment method of corpse domain names and system
CN103117903A (en) * 2013-02-07 2013-05-22 中国联合网络通信集团有限公司 Internet surfing unusual flow detection method and device
CN103095728B (en) * 2013-02-07 2016-04-27 重庆大学 A kind of network security points-scoring system of Behavior-based control data fusion and method
CN103117903B (en) * 2013-02-07 2016-01-06 中国联合网络通信集团有限公司 Surfing flow method for detecting abnormality and device
CN104077524A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Training method used for virus identification and virus identification method and device
CN104077524B (en) * 2013-03-25 2018-01-09 腾讯科技(深圳)有限公司 Training method and viruses indentification method and device for viruses indentification
CN104079545A (en) * 2013-03-29 2014-10-01 西门子公司 Method, device and system for extracting data package filtering rules
CN104519031B (en) * 2013-09-30 2018-03-09 西门子公司 A kind of method and apparatus for hostile network behavioral value
CN104519031A (en) * 2013-09-30 2015-04-15 西门子公司 Method and device for detecting malicious network behaviors
CN103716180A (en) * 2013-12-04 2014-04-09 国网上海市电力公司 Network flow actual forecasting-based network abnormality pre-warning method
CN103746987B (en) * 2013-12-31 2017-02-01 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN103746987A (en) * 2013-12-31 2014-04-23 东软集团股份有限公司 Method and system for detecting DoS attack in semantic Web application
CN103973684B (en) * 2014-05-07 2017-05-24 北京神州绿盟信息安全科技股份有限公司 Rule compiling and matching method and device
CN103973684A (en) * 2014-05-07 2014-08-06 北京神州绿盟信息安全科技股份有限公司 Rule compiling and matching method and device
CN104219221A (en) * 2014-05-30 2014-12-17 郭瑞 Network security flow generating method and network security flow generating system
CN104202336A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 DDoS (distributed denial of service) attach detection method based on information entropy
CN104994056B (en) * 2015-05-11 2018-01-19 中国电力科学研究院 The dynamic updating method of flow identification model in a kind of Power Information Network
CN104994056A (en) * 2015-05-11 2015-10-21 中国电力科学研究院 Method for dynamically updating flow identification model in power information network
CN105208026A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Hostile attack preventing method and network system
CN106815521B (en) * 2015-12-31 2019-07-23 武汉安天信息技术有限责任公司 A kind of sample relevance detection method, system and electronic equipment
CN106815521A (en) * 2015-12-31 2017-06-09 武汉安天信息技术有限责任公司 A kind of sample relevance detection method, system and electronic equipment
CN107196816A (en) * 2016-03-14 2017-09-22 中国移动通信集团江西有限公司 Anomalous traffic detection method, system and Network analyzing equipment
CN105847043A (en) * 2016-03-21 2016-08-10 浪潮通信信息系统有限公司 Mobile user Internet access diagnostic method
CN105873105B (en) * 2016-04-22 2018-07-03 中国科学技术大学 A kind of mobile radio communication abnormality detection and localization method based on network Quality of experience
CN105873105A (en) * 2016-04-22 2016-08-17 中国科学技术大学 Method for anomaly detection and positioning of mobile communication network based on network experience quality
CN107426141B (en) * 2016-05-23 2020-06-09 纬创资通股份有限公司 Malicious code protection method, system and monitoring device
CN107426141A (en) * 2016-05-23 2017-12-01 纬创资通股份有限公司 Malicious code protection method, system and monitoring device
CN106130960B (en) * 2016-06-12 2019-08-09 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN106130960A (en) * 2016-06-12 2016-11-16 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN107707509B (en) * 2016-08-08 2020-09-29 阿里巴巴集团控股有限公司 Method, device and system for identifying and assisting in identifying false traffic
US10848511B2 (en) 2016-08-08 2020-11-24 Alibaba Group Holding Limited Method and apparatus for identifying fake traffic
CN107707509A (en) * 2016-08-08 2018-02-16 阿里巴巴集团控股有限公司 Identify and assist in identifying the method, apparatus and system of false flow
CN106447383A (en) * 2016-08-30 2017-02-22 杭州启冠网络技术有限公司 Cross-time multi-dimensional abnormal data monitoring method and system
CN106411597A (en) * 2016-10-14 2017-02-15 广东工业大学 Network traffic abnormality detection method and system
CN106685964B (en) * 2016-12-29 2020-10-30 济南大学 Malicious software detection method and system based on malicious network traffic thesaurus
CN106685964A (en) * 2016-12-29 2017-05-17 济南大学 Malicious software detecting method and system based on malicious network flow word library
CN106850632A (en) * 2017-02-10 2017-06-13 北京奇艺世纪科技有限公司 The detection method and device of a kind of unusual combination data
CN106850632B (en) * 2017-02-10 2020-09-29 北京奇艺世纪科技有限公司 Method and device for detecting abnormal combined data
CN107104960A (en) * 2017-04-20 2017-08-29 四川电科智造科技有限公司 A kind of industrial control system intrusion detection method based on machine learning
CN107196930B (en) * 2017-05-12 2019-11-29 苏州优圣美智能系统有限公司 The method of computer network abnormality detection
CN107196930A (en) * 2017-05-12 2017-09-22 苏州优圣美智能系统有限公司 Method, system and the mobile terminal of computer network abnormality detection
CN108933706B (en) * 2017-05-23 2022-02-25 华为技术有限公司 Method, device and system for monitoring data traffic
CN108933706A (en) * 2017-05-23 2018-12-04 华为技术有限公司 A kind of method, apparatus and system of monitoring data flow
WO2018224055A3 (en) * 2017-06-05 2019-01-24 中兴通讯股份有限公司 Multi-dimensional data abnormality detection method and apparatus
CN107508816A (en) * 2017-08-31 2017-12-22 杭州迪普科技股份有限公司 A kind of attack traffic means of defence and device
CN107633058B (en) * 2017-09-20 2021-06-01 武汉虹旭信息技术有限责任公司 Deep learning-based data dynamic filtering system and method
CN107633058A (en) * 2017-09-20 2018-01-26 武汉虹旭信息技术有限责任公司 A kind of data dynamic filtration system and method based on deep learning
JP2019102960A (en) * 2017-12-01 2019-06-24 日本電信電話株式会社 Cyber attack detection system, feature amount selection system, cyber attack detection method, and program
CN109889470B (en) * 2017-12-06 2020-06-26 中国科学院声学研究所 Method and system for defending DDoS attack based on router
CN109889470A (en) * 2017-12-06 2019-06-14 中国科学院声学研究所 A kind of method and system based on router defending DDoS (Distributed Denial of Service) attacks
CN108171053B (en) * 2017-12-28 2020-06-12 北京奇虎科技有限公司 Rule discovery method and system
CN108171053A (en) * 2017-12-28 2018-06-15 北京奇虎科技有限公司 The method and system of a kind of rule discovery
CN108259494A (en) * 2018-01-17 2018-07-06 北京邮电大学 A kind of network attack detecting method and device
CN108322463A (en) * 2018-01-31 2018-07-24 平安科技(深圳)有限公司 Ddos attack detection method, device, computer equipment and storage medium
CN108494791A (en) * 2018-04-08 2018-09-04 北京明朝万达科技股份有限公司 A kind of DDOS attack detection method and device based on Netflow daily record datas
CN108647292A (en) * 2018-05-07 2018-10-12 前海梧桐(深圳)数据有限公司 Enterprise's property sort computational methods based on neural network algorithm and system
CN109039797A (en) * 2018-06-11 2018-12-18 电子科技大学 Big stream detection method based on intensified learning
CN109039797B (en) * 2018-06-11 2021-11-23 电子科技大学 Strong learning based large flow detection method
TWI684113B (en) * 2018-08-28 2020-02-01 中華電信股份有限公司 Gateway apparatus, detecting method of malicious domain and hacked host, and non-transitory computer readable medium thereof
CN109120630A (en) * 2018-09-03 2019-01-01 上海海事大学 A kind of SDN network ddos attack detection method based on Optimized BP Neural Network
CN109120630B (en) * 2018-09-03 2022-08-02 上海海事大学 SDN network DDoS attack detection method based on BP neural network optimization
CN109040113B (en) * 2018-09-04 2021-03-19 海南大学 Distributed denial of service attack detection method and device based on multi-core learning
CN109040113A (en) * 2018-09-04 2018-12-18 海南大学 Detecting method of distributed denial of service attacking and device based on Multiple Kernel Learning
CN109067773B (en) * 2018-09-10 2020-10-27 成都信息工程大学 Vehicle-mounted CAN network intrusion detection method and system based on neural network
CN109067773A (en) * 2018-09-10 2018-12-21 成都信息工程大学 A kind of vehicle-mounted CAN network inbreak detection method neural network based and system
CN110909753A (en) * 2018-09-14 2020-03-24 中国移动通信集团广东有限公司 Data classification method, system and equipment
CN110909753B (en) * 2018-09-14 2022-07-01 中国移动通信集团广东有限公司 Data classification method, system and equipment
CN109327453A (en) * 2018-10-31 2019-02-12 北斗智谷(北京)安全技术有限公司 A kind of recognition methods of specific threat and electronic equipment
CN109450895A (en) * 2018-11-07 2019-03-08 北京锐安科技有限公司 A kind of method for recognizing flux, device, server and storage medium
CN109450895B (en) * 2018-11-07 2021-07-02 北京锐安科技有限公司 Traffic identification method, traffic identification device, server and storage medium
CN110784435A (en) * 2019-04-15 2020-02-11 北京嘀嘀无限科技发展有限公司 Abnormal service identification method and device, electronic equipment and storage medium
CN110602029B (en) * 2019-05-15 2022-06-28 上海云盾信息技术有限公司 Method and system for identifying network attack
CN110602029A (en) * 2019-05-15 2019-12-20 上海云盾信息技术有限公司 Method and system for identifying network attack
CN110149331A (en) * 2019-05-22 2019-08-20 中国科学院长春光学精密机械与物理研究所 A kind of P2P botnet detection method, device and medium
CN110287699A (en) * 2019-06-12 2019-09-27 杭州迪普科技股份有限公司 The feature extracting method and device of application program
CN110247911B (en) * 2019-06-14 2021-06-08 曹严清 Flow abnormity detection method and system
CN110247911A (en) * 2019-06-14 2019-09-17 曹严清 A kind of Traffic anomaly detection method and system
CN110336830A (en) * 2019-07-17 2019-10-15 山东大学 A kind of ddos attack detection system based on software defined network
CN110569282A (en) * 2019-09-04 2019-12-13 中国工商银行股份有限公司 Data processing method, data processing device, computing equipment and computer readable storage medium
CN111092852B (en) * 2019-10-16 2023-04-07 平安科技(深圳)有限公司 Network security monitoring method, device, equipment and storage medium based on big data
CN111092852A (en) * 2019-10-16 2020-05-01 平安科技(深圳)有限公司 Network security monitoring method, device, equipment and storage medium based on big data
CN112866185A (en) * 2019-11-28 2021-05-28 海信集团有限公司 Network traffic monitoring device and abnormal traffic detection method
CN111131237A (en) * 2019-12-23 2020-05-08 深圳供电局有限公司 Microgrid attack identification method based on BP neural network and grid-connected interface device
CN113746686A (en) * 2020-05-27 2021-12-03 阿里巴巴集团控股有限公司 Network flow state determination method, computing device and storage medium
CN111756708B (en) * 2020-06-09 2022-06-28 北京天空卫士网络安全技术有限公司 Method and device for detecting directional threat attack
CN111756708A (en) * 2020-06-09 2020-10-09 北京天空卫士网络安全技术有限公司 Method and device for detecting directional threat attack
CN113810207A (en) * 2020-06-12 2021-12-17 中国电信股份有限公司 Root cause server positioning method and root cause server positioning device
WO2021139235A1 (en) * 2020-06-30 2021-07-15 平安科技(深圳)有限公司 Method and apparatus for system exception testing, device, and storage medium
CN111756584A (en) * 2020-07-14 2020-10-09 济南浪潮高新科技投资发展有限公司 Netflow protocol network flow analysis method and system based on deep learning
CN111953695B (en) * 2020-08-14 2022-10-28 中国工商银行股份有限公司 Terminal behavior portrait construction method and device, electronic equipment and storage medium
CN111953695A (en) * 2020-08-14 2020-11-17 中国工商银行股份有限公司 Method and device for constructing terminal behavior portrait
CN112001443A (en) * 2020-08-24 2020-11-27 成都卫士通信息产业股份有限公司 Network behavior data monitoring method and device, storage medium and electronic equipment
CN111818103A (en) * 2020-09-09 2020-10-23 信联科技(南京)有限公司 Traffic-based tracing attack path method in network target range
CN111818103B (en) * 2020-09-09 2020-12-15 信联科技(南京)有限公司 Traffic-based tracing attack path method in network target range
CN112491806A (en) * 2020-11-04 2021-03-12 深圳供电局有限公司 Cloud platform flow security analysis system and method
CN112333023A (en) * 2020-11-06 2021-02-05 四川师范大学 Intrusion detection system based on flow of Internet of things and detection method thereof
CN112907321A (en) * 2021-02-03 2021-06-04 珠海市鸿瑞信息技术股份有限公司 Big data-based information security anomaly sensing platform for data mining and analysis
CN112907321B (en) * 2021-02-03 2021-08-27 珠海市鸿瑞信息技术股份有限公司 Big data-based information security anomaly sensing platform for data mining and analysis
CN113010884A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Real-time feature filtering method in intrusion detection system
CN113010884B (en) * 2021-02-23 2022-08-26 重庆邮电大学 Real-time feature filtering method in intrusion detection system
CN113747443A (en) * 2021-02-26 2021-12-03 上海观安信息技术股份有限公司 Machine learning algorithm-based security detection method and device
CN115134099A (en) * 2021-03-22 2022-09-30 中国移动通信集团江苏有限公司 Network attack behavior analysis method and device based on full flow
CN115134099B (en) * 2021-03-22 2024-05-03 中国移动通信集团江苏有限公司 Network attack behavior analysis method and device based on full flow
CN113625681A (en) * 2021-07-19 2021-11-09 湖南大学 CAN bus abnormality detection method, system and storage medium
CN113625681B (en) * 2021-07-19 2022-12-13 湖南大学 CAN bus abnormality detection method, system and storage medium
CN114666162A (en) * 2022-04-29 2022-06-24 北京火山引擎科技有限公司 Flow detection method, device, equipment and storage medium
WO2023207548A1 (en) * 2022-04-29 2023-11-02 北京火山引擎科技有限公司 Traffic detection method and apparatus, device and storage medium
CN115174254A (en) * 2022-07-22 2022-10-11 科来网络技术股份有限公司 Flow abnormity warning method and device, electronic equipment and storage medium
CN115174254B (en) * 2022-07-22 2023-10-31 科来网络技术股份有限公司 Flow abnormality warning method and device, electronic equipment and storage medium
CN116208356B (en) * 2022-10-27 2023-09-29 浙江大学 Virtual currency mining flow detection method based on deep learning
CN116208356A (en) * 2022-10-27 2023-06-02 浙江大学 Virtual currency mining flow detection method based on deep learning
CN116074215B (en) * 2022-12-30 2024-04-19 中国联合网络通信集团有限公司 Network quality detection method, device, equipment and storage medium
CN116074215A (en) * 2022-12-30 2023-05-05 中国联合网络通信集团有限公司 Network quality detection method, device, equipment and storage medium
CN116723138A (en) * 2023-08-10 2023-09-08 杭银消费金融股份有限公司 Abnormal flow monitoring method and system based on flow probe dyeing
CN116723138B (en) * 2023-08-10 2023-10-20 杭银消费金融股份有限公司 Abnormal flow monitoring method and system based on flow probe dyeing

Also Published As

Publication number Publication date
CN102821002B (en) 2015-08-26

Similar Documents

Publication Publication Date Title
CN102821002A (en) Method and system for network flow anomaly detection
Chen et al. Collaborative detection of DDoS attacks over multiple network domains
EP1995929B1 (en) Distributed system for the detection of eThreats
Dickerson et al. Fuzzy intrusion detection
KR101070614B1 (en) Malicious traffic isolation system using botnet infomation and malicious traffic isolation method using botnet infomation
CN109558729B (en) Intelligent defense system for network attack
CN108494746A (en) A kind of network port Traffic anomaly detection method and system
CN108289088A (en) Abnormal traffic detection system and method based on business model
CN103532957B (en) A kind of long-range shell behavioral values device and method of wooden horse
CN103152222B (en) A kind of Intrusion Detection based on host group character detects speed and becomes the method for attacking domain name
Lee et al. Abnormal behavior-based detection of Shodan and Censys-like scanning
CN106230819A (en) A kind of DDoS detection method based on stream sampling
Zhu Attack pattern discovery in forensic investigation of network attacks
Mathews et al. A collaborative approach to situational awareness for cybersecurity
Gharehchopogh et al. Evaluation of fuzzy k-means and k-means clustering algorithms in intrusion detection systems
CN107332863A (en) The safety detection method and system of a kind of main frame based on centralized management
Lahza et al. Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols
Bin et al. A NetFlow based flow analysis and monitoring system in enterprise networks
Ghourabi et al. Data analyzer based on data mining for honeypot router
Kotenko et al. Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
Balram et al. Detection of TCP SYN scanning using packet counts and neural network
Nehinbe A simple method for improving intrusion detections in corporate networks
CN106330975A (en) Method for periodic exception detection based on SCADA system
Nguyen A scheme for building a dataset for intrusion detection systems
Kaur et al. A novel multi scale approach for detecting high bandwidth aggregates in network traffic

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant