CN104734916B - A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol - Google Patents
A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol Download PDFInfo
- Publication number
- CN104734916B CN104734916B CN201510104409.2A CN201510104409A CN104734916B CN 104734916 B CN104734916 B CN 104734916B CN 201510104409 A CN201510104409 A CN 201510104409A CN 104734916 B CN104734916 B CN 104734916B
- Authority
- CN
- China
- Prior art keywords
- difference
- detection
- sequence
- flow
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol is claimed in the present invention, and a kind of multistage abnormality detection mechanism is added during traditional abnormal traffic detection.This method is the abnormality detection of the data traffic sent to client in network, the original flow that it produces client using the method for difference average carries out difference tranquilization processing, analyzed, counted according to existing flow in network at the same time, dynamically one adaptive threshold section of setting, adaptive threshold difference flow detection is carried out to the flow after tranquilization, and further abnormality detection is carried out to the data packet by primary detection.This further abnormality detection is mainly that the data packet to come by routing forwarding is parsed, and extracts its critical field, according to the judgement to critical field, determines whether from the data packet that client sends over be abnormal.The present invention improves accuracy of detection and simplicity is easily achieved.
Description
Technical field
The invention belongs to communication abnormality detection technique field, it is related to the quick, different in real time of all kinds of abnormality detections on internet
Normal detection technique, specifically designs a kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol.
Background technology
Exception flow of network detection is exactly a part and parcel in network monitor.Exception flow of network refers in network
Traffic behavior deviate normal behaviour situation.In network, the reason for causing exception of network traffic have it is very much, such as, in network
Equipment break down, cause to communicate abnormal, cause exception;Network operation is abnormal, the access (Flash crowd) of burst,
Network intrusions etc. can all cause Network Abnormal.Meanwhile Network anomaly detection is that network continues to develop growth, network topology structure
Planning becomes increasingly complex, and the network equipment is more and more diversified, in the increasing evolution of network user's scale, communication security
An important leverage.The network user is while the convenient communication of network is sought and to network trust, the network prestige of new type
The side of body is also being continuously increased.How to find and exclude the vital task that these Cyberthreats are Network anomaly detections, and ensure ne
The important component of network normal communication.
The attack and threat of network faces are mainly derived from network internal, such as the active of host in a large amount of internet worms, net
Attack and uprushing for exception flow of network will all cause network equipment overload, so that cause network congestion, and may be into one
Step causes network paralysis.SYN Flood ddos attacks, are exactly that the bad user of network is deposited using the three-way handshake connection of Transmission Control Protocol
The defects of, the IP address of normal users, the attack of generation are forged, so as to give Netowrk tape to carry out immeasurable loss.Therefore, when
When having abnormal in network, primary measure is to find out these exceptions, and produces abnormal alarm.Meanwhile Network Abnormal will not be only
To being attacked for certain, but as wide as possible can be spread to surrounding.Its final purpose is to involve maximum magnitude
Network, produce polytype exception.For such case, it is necessary to it is a kind of in real time, the detection method that quickly notes abnormalities,
Note abnormalities, block exception, so that network is able to normal communication.
The characteristics of exception flow of network is bursts of traffic change, and Premonitory Characters of Doppler Radar is unknown, can be given within the of short duration time
Computer on network or network brings great harm, therefore in real time, rapidly detects the abnormal behaviour of network traffics, judges
Cause the reason for abnormal, it is to ensure one of premise that network is effectively run to make rational response, and reduces network malicious attack
The loss brought is another importance to guarantee network security.
At present, it has been suggested that method for detecting abnormality, such as non-linear anomalous traffic detection method (NLPP), based on wavelet analysis
Anomalous traffic detection method, anomalous traffic detection method based on arma modeling etc., although can detect real-time
It is abnormal, but computation complexity is higher, while the result detected is not accurate enough, often there are larger rate of false alarm, and the side of detection
Method needs that there are could be used during long correlation properties when data on flows.And most of datas on flows collection when, the correlation of presentation
Property feature and unobvious, fluctuation tendency often shows unstable condition so that the use scope limitation of detection method is very big.This
The method for detecting abnormality proposed is invented, before flow detection is carried out, data on flows is pre-processed, so as to overcome detection
The problem of limitation.Meanwhile on the basis of the detection of traditional detection method, the multistage testing mechanism of proposition, effectively reduces
The rate of false alarm of detection.
The content of the invention
For deficiency of the prior art, ensure to reduce wrong report while accuracy it is an object of the invention to provide one kind
Rate, method is simple and the method that is easily achieved, technical scheme are as follows:A kind of high-efficiency multi-stage based on Transmission Control Protocol is different
Permanent current quantity measuring method, it comprises the following steps:
101st, the collection network data on flows in period T, then for the original flow sequence in network flow data
R, in the observation x of moment ttRepresent, xt∈ R, t=1,2 ..., T, according to | xt|>Kvar_R criterions remove disabled stream
Measure data value xt, what wherein k was represented is Grubbs test method coefficient, and var_R represents the variance of the sequence R, will remain
Data on flows, as a Flow Observation sequence X;
102nd, difference smoothing preprocessing being carried out to Flow Observation sequence X, the difference flow sequence pre-processed is D,
Wherein difference value dt=xt-xt-1,t>1, dt∈ D, t=1,2 ... N, after obtaining difference flow sequence D, in input step 103;
103rd, the average value and variance of sequence X and sequence D are calculated respectively, and according to average value and variance, estimate t moment
Difference flow value where section [lt,ht],Wherein ptRepresent t moment
Threshold value predicted value, ltAnd htIt is illustrated respectively in the minimum value and maximum of the difference flow of t moment permission, var_dtWhen representing t
The variance of difference flow is carved, after the difference flow sequence D input in step 102 is detected, fire wall opens primary inspection
Defense function is surveyed, to the data sent, according to the threshold value predicted value p of t momenttIt is detected, when the difference flow of t moment
Section [l of the data value in difference traffic prediction valuet,ht] in the range of when, determine that it is normal discharge, and forward it to service
Device;When beyond section [lt,ht] scope when, be determined as abnormal flow, jump to step 104;
104th, the multi-stage detection system of fire wall decomposes the data packet forwarded, extracts the key in data packet
Field key_field, and these critical fielies key_field is judged, if not noting abnormalities field, it is forwarded
To server;If detecting exception field, by the data packet discarding;
105th, after the detection again in step 104, normal data packet is transmitted to server so that server with
Client establishes connection of shaking hands for the first time;
106th, after connection of shaking hands for the first time is established, server will send return information MresponseTo client, together
When wait client confirmation message ACK, when client receives the return information M of serverresponseAfterwards, both ends establish second
Secondary connection of shaking hands;After server have received confirmation message ACK, server and client establish the third time company of shaking hands
Connect, can communicate between the two.
Further, the step of difference smoothing preprocessing described in step 102 is:
S21, to the network communication data sequence { x in collected period T1,x2,…,xT, analysis removes outlier,
Retain normal value, here, if | xt|>Kvar_R then represents xiWhat outlier, wherein k represented is Grubbs test method coefficient,
Var_R represents the variance of the sequence R;Using the sequence of observations remained as observation sequence X;
S22:Its average value is calculated to the original series RWith its variance var_R;
S23:To the observation sequence X, difference pretreatment is carried out, there is dt∈ D, t=1,2 ... T, wherein dt=xt-
xt-1,t>1;
S24:To the difference sequence D, its average value is calculatedWith variance var_D.
Further, the average value of original series RFormula is:Var_R represents their variance,
Advantages of the present invention and have the beneficial effect that:
The present invention carries out data on flows using a kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol multiple
Detection and judgement.Since existing abnormality detection technology is during detection, the rate of false alarm of detection is higher so that the standard of detection
Exactness receives very big influence.In order to ensure the security of the accuracy of detection and network service.Proposing multistage herein
The method of abnormality detection.First, it is online lower to be based on statistics, using the method for adaptive threshold to the flow institute at next moment
Estimated in section;Then the flow rate zone estimated according to this, is detected judgement on line;When judgement result is exception
When, then multistage detection is carried out, in multistage detection process, the key message in data packet is extracted, and judged.This multistage inspection
The mechanism of survey, effectively reduces the rate of false alarm of abnormality detection.The present invention is abnormal using a kind of high-efficiency multi-stage based on Transmission Control Protocol
Flow rate testing methods, using the method for difference mean variance, obtain the difference flow that tranquilization is presented in trend, the calculating of this method
Complexity is relatively low, utilizes the mode for calculating under line, being detected on line so that detection speed is fast, and can reach real-time detection
It is required that.Meanwhile the multistage testing mechanism of addition, both reach the requirement for reducing rate of false alarm, also ensure Network Communicate Security.
Brief description of the drawings
Fig. 1 is the multistage abnormality detection flow diagram of the present invention;
Fig. 2 is inventive flow data screening schematic diagram;
Fig. 3 is the sequence stationary schematic diagram of the present invention;
Fig. 4 is the adaptive threshold schematic diagram calculation of the present invention;
Fig. 5 is the multistage abnormality detection schematic diagram of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Whole description.Obviously, described embodiment is only one embodiment of the present of invention, instead of all the embodiments.
Fig. 1 is the multistage abnormality detection flow diagram of the present invention.The present invention, be the TCP based on internet communication three times
What connection protocol of shaking hands proposed.In communication process, client is filed a request, and request accesses server, establishes connection.Work as access
When normal, the flow of access is following steps:
S1:Client initiates request, and the request data package of transmission is transmitted to fire wall by router, and fire wall is receiving
To after request data package, flow is counted, and carries out primary detection, is i.e. difference flow detection;If detect flow in difference
Section [the l of shunt volume predicted valuet,ht] in, fire wall will judge the data packet for normal data packet, and forward it to service
Device;Otherwise, which will be judged as abnormal data bag;At this time, fire wall will open further detection;Further different
Often in detection, data packet is analyzed, and extracts critical field key_field, further detection is done to key_field, this
When, if testing result is still exception, do discard processing;If normal, then labeled as erroneous judgement, and server is forwarded it to;
At this time, client will be established to shake hands for the first time and is connected with server;
S2:Server sends a return information M while First Contact Connections are established with clientresponseTo client
End, and the confirmation message ACK of client is waited, while open and wait timing Twait, when client computer receives return information
MresponseWhen, second handshake connection is established;
S3:Exceed maximum latency when the stand-by period of server, server will make discard processing to the data packet;
Otherwise, after server receives the confirmation message ACK of client transmission, connection of shaking hands for the third time is established.At this time, both sides can be into
Row communication.
Fig. 2 is the data on flows screening schematic diagram of the present invention.The data on flows in one section of T time is collected, between sampled data
1s is divided into, then the original flow sequence collected is represented with R, in the observation x of moment ttRepresent, wherein xt∈ R, t=1,
2,…,T;WithRepresent original series { x1,x2,…,xTAverage value,Var_R represents their variance,
Before flow data screening, observation sequenceEach value in sequence R is judged successively, works as t moment
Value xtMeet | xt|>During kvar_R, x is rejectedt, what wherein k was represented is Grubbs test method coefficient, otherwise observation sequence X=X
∪xt, wherein xt∈ X, t=1,2 ..., N.
Fig. 3 is the sequence stationary schematic diagram of the present invention.In order to enable the difference sequence of original series preferably to reflect
The trend of data fluctuations, the difference sequence for defining original series is D, i.e., to observation sequence { x1,x2,…,xNPre-process, i.e.,
Use dtRepresent the difference value of t moment, dt=xt-xt-1,t>1, dt∈ D, t=1,2 ... N.WithRepresent being averaged for difference sequence D
Value, and haveThen the difference average of t moment isDifference sequence is represented with var_D
The variance of D, hasAs N → ∞, haveThus may be used
Draw, difference tending to be steady of flow.
Fig. 4 is the adaptive threshold schematic diagram calculation of the present invention.When into real-time abnormality detection on line, it is necessary first to
Carry out the calculating of adaptive threshold.When determining adaptive threshold, l is usedtAnd htIt is illustrated respectively in the difference flow of t moment permission
Minimum value and maximum.The present invention carries out the calculating of adaptive threshold by flush mechanism, main as follows:
Difference flow by being superimposed previous moment obtains the threshold value predicted value p of t momentt,
Wherein α represents weighting constant, is mainly determined according to host number is given out a contract for a project in model, that is, controls new data shared in a model
Proportion, Controlling model adapts to the speed degree of local behavior, so as to establish the flush mechanism of normal model.If current observation
Value complies fully with normal model, then thinks that observation at this time is normal.But since actual conditions are difficult to meet theory
Model, then sets a confidential interval with the standard deviation of observation, and different according to the number of the standard deviation of addition, obtains
The rank of range of tolerable variance also differ, under normal circumstances using 2 to 3 times of standard deviation, due to being carried out to data
Difference pre-processes, and is judged herein using 2 times of standard deviation, so obtained threshold range isWherein n represents the quantity of client computer.Thus adaptive threshold area is obtained
Between be [lt,ht]。
Fig. 5 is the multistage abnormality detection schematic diagram of the present invention.The request data package that client is sent is forwarded by router
To fire wall, fire wall carries out the calculating in adaptive threshold section according to existing observation sequence after data packet is received.It is main
The calculation wanted is progress first time adaptive threshold detection first.In the detection, mainly according to the statistical number of network traffics
According to being detected to the data on flows at next moment.If in the detection, judge that data packet is normal, be then directly forwarded
To server;If it is determined that to be abnormal, then multistage detection, further confirms that whether the data packet is abnormal bag.
In further abnormality detection, data packet is analyzed, and extract critical field key_field.To key_field
Further detection is done, if normal, then labeled as erroneous judgement, and forwards it to server;If testing result is still exception, do
Go out the action of discard processing.Next data packet in queue queue Q is handled at the same time.
The above embodiment is interpreted as being merely to illustrate the present invention rather than limits the scope of the invention.
After the content for having read the record of the present invention, technical staff can make various changes or modifications the present invention, these equivalent changes
Change and modification equally falls into the scope of the claims in the present invention.
Claims (3)
1. a kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol, it is characterised in that comprise the following steps:
101st, the collection network data on flows in period T, then for the original series R in network flow data, in moment t
Observation xtRepresent, xt∈ R, t=1,2 ..., T, according to | xt| > kvar_R criterions remove disabled flor rate data value
xt, what wherein k was represented is Grubbs test method coefficient, and var_R represents the variance of original series R, the flow number that will be remained
According to as an observation sequence X;
102nd, difference smoothing preprocessing is carried out to observation sequence X, the difference sequence pre-processed is D, wherein difference value dt=
xt-xt-1, t > 1, dt∈ D, t=1,2 ... N, after obtaining difference sequence D, in input step 103;
103rd, the average value and variance of observation sequence X and difference sequence D are calculated respectively, and according to average value and variance, estimate t
Section [l where the difference flow value at momentt,ht],N represents client
Quantity, wherein ptRepresent the threshold value predicted value of t moment, ltAnd htIt is illustrated respectively in the minimum value of the difference flow of t moment permission
And maximum, var_dtRepresent the variance in the difference flow of t moment, the difference sequence D inputs in step 102 is detected
Afterwards, fire wall opens primary detection defense function, to the data sent, according to the threshold value predicted value p of t momenttCarry out
Detection, when t moment difference flor rate data value difference traffic prediction value section [lt,ht] in the range of when, determine that it is normal
Flow, and forward it to server;When beyond section [lt,ht] scope when, be determined as abnormal flow, jump to step 104;
104th, the multi-stage detection system of fire wall decomposes the data packet forwarded, extracts the critical field in data packet
Key_field, and these critical fielies key_field is judged, if not noting abnormalities field, forward it to clothes
Business device;If detecting exception field, by the data packet discarding;
105th, after the detection again in step 104, normal data packet is transmitted to server so that server and client
Connection of shaking hands for the first time is established at end;
106th, after connection of shaking hands for the first time is established, server will send return information MresponseTo client, while etc.
The confirmation message ACK of client is treated, when client receives the return information M of serverresponseAfterwards, both ends establish holds for the second time
Hand connects;After server have received confirmation message ACK, the third time that establishes of server and client is shaken hands connection, and two
It can communicate between person.
2. the high-efficiency multi-stage anomalous traffic detection method according to claim 1 based on Transmission Control Protocol, it is characterised in that step
The step of difference smoothing preprocessing described in rapid 102 is:
S21, to the network communication data sequence { x in collected period T1,x2,…,xT, analysis removes outlier, retains
Normal value, here, if | xt| > kvar_R then represent xtWhat outlier, wherein k represented is Grubbs test method coefficient,
Var_R represents the variance of original series R;Using the sequence of observations remained as observation sequence X;
S22:Its average value is calculated to the original series RWith its variance var_R;
S23:To the observation sequence X, difference pretreatment is carried out, there is dt∈ D, t=1,2 ... T, wherein dt=xt-xt-1, t >
1;
S24:To the difference sequence D, its average value is calculatedWith variance var_D.
3. the high-efficiency multi-stage anomalous traffic detection method according to claim 2 based on Transmission Control Protocol, it is characterised in that former
The average value of beginning sequence RFormula is:Var_R represents the variance of original series,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510104409.2A CN104734916B (en) | 2015-03-10 | 2015-03-10 | A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510104409.2A CN104734916B (en) | 2015-03-10 | 2015-03-10 | A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104734916A CN104734916A (en) | 2015-06-24 |
CN104734916B true CN104734916B (en) | 2018-04-27 |
Family
ID=53458370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510104409.2A Active CN104734916B (en) | 2015-03-10 | 2015-03-10 | A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104734916B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108123843B (en) * | 2016-11-28 | 2020-04-14 | 中国移动通信有限公司研究院 | Flow detection method, detection data processing method and device |
CN107123113B (en) * | 2017-04-20 | 2019-10-18 | 北京工业大学 | A kind of GWAC light curve method for detecting abnormality based on Grubbs test method and ARIMA |
CN107124314B (en) * | 2017-05-12 | 2018-11-09 | 腾讯科技(深圳)有限公司 | data monitoring method and device |
CN109951420B (en) * | 2017-12-20 | 2020-02-21 | 广东电网有限责任公司电力调度控制中心 | Multi-stage flow anomaly detection method based on entropy and dynamic linear relation |
CN108718257B (en) * | 2018-05-23 | 2020-10-20 | 浙江大学 | Wireless camera detection and positioning method based on network flow |
CN108429651B (en) * | 2018-06-06 | 2022-02-25 | 腾讯科技(深圳)有限公司 | Flow data detection method and device, electronic equipment and computer readable medium |
CN111953504B (en) * | 2019-05-15 | 2023-03-24 | 中国电信股份有限公司 | Abnormal flow detection method and device, and computer readable storage medium |
CN110351163B (en) * | 2019-06-05 | 2022-11-18 | 华南理工大学 | OpenStack cloud host traffic peak detection method |
CN117278290B (en) * | 2023-10-07 | 2024-03-08 | 广东励通信息技术有限公司 | Distributed data detection system and method under Internet |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217378A (en) * | 2008-01-18 | 2008-07-09 | 南京邮电大学 | A wavelet analysis boundary processing method based on traffic statistics |
CN101753381A (en) * | 2009-12-25 | 2010-06-23 | 华中科技大学 | Method for detecting network attack behaviors |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090034423A1 (en) * | 2007-07-30 | 2009-02-05 | Anthony Terrance Coon | Automated detection of TCP anomalies |
-
2015
- 2015-03-10 CN CN201510104409.2A patent/CN104734916B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217378A (en) * | 2008-01-18 | 2008-07-09 | 南京邮电大学 | A wavelet analysis boundary processing method based on traffic statistics |
CN101753381A (en) * | 2009-12-25 | 2010-06-23 | 华中科技大学 | Method for detecting network attack behaviors |
Non-Patent Citations (2)
Title |
---|
An Effective Network Traffic Classification Method with Unknown Flow Detection;Jun Zhang 等;《IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT》;20130630;全文 * |
基于网络处理器的高性能入侵防护系统研究;赵月爱等;《太原师范学院学报(自然科学版)》;20140331;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104734916A (en) | 2015-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104734916B (en) | A kind of high-efficiency multi-stage anomalous traffic detection method based on Transmission Control Protocol | |
Wang et al. | An entropy-based distributed DDoS detection mechanism in software-defined networking | |
CN111935170B (en) | Network abnormal flow detection method, device and equipment | |
RU2538292C1 (en) | Method of detecting computer attacks to networked computer system | |
CN104506385B (en) | A kind of software defined network safety situation evaluation method | |
CN102271068B (en) | Method for detecting DOS/DDOS (denial of service/distributed denial of service) attack | |
CN105847283A (en) | Information entropy variance analysis-based abnormal traffic detection method | |
CN108289088A (en) | Abnormal traffic detection system and method based on business model | |
CN109617931A (en) | A kind of the ddos attack defence method and system of defense of SDN controller | |
CN106357622A (en) | Network anomaly flow detection and defense system based on SDN (software defined networking) | |
CN104009986B (en) | A kind of host-based network attacks springboard detection method and device | |
Yan et al. | Low-rate dos attack detection based on improved logistic regression | |
CN110493260A (en) | A kind of network flood model attack detection method | |
Neu et al. | Lightweight IPS for port scan in OpenFlow SDN networks | |
CN106254318A (en) | A kind of Analysis of Network Attack method | |
CN106534068A (en) | Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system | |
Şimşek et al. | Fast and lightweight detection and filtering method for low‐rate TCP targeted distributed denial of service (LDDoS) attacks | |
Şimşek | A new metric for flow‐level filtering of low‐rate DDoS attacks | |
Rajakumaran et al. | Early detection of LDoS attack using SNMP MIBs | |
Thorat et al. | SDN-based machine learning powered alarm manager for mitigating the traffic spikes at the IoT gateways | |
CN109309679A (en) | A kind of Network scan detection method and detection system based on TCP flow state | |
KR102575526B1 (en) | Apparatus and method for detecting distributed denial of service attack using learned historical data | |
Usuzaki et al. | A proposal of highly responsive distributed Denial-of-Service attacks detection using Real-Time burst detection method | |
AsSadhan et al. | Network traffic behavior analysis by decomposition into control and data planes | |
Paulauskas et al. | Investigation of the intrusion detection system “snort” performance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |