[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101431416A - Synergistic learning invasion detection method used for data gridding - Google Patents

Synergistic learning invasion detection method used for data gridding Download PDF

Info

Publication number
CN101431416A
CN101431416A CNA2008102439075A CN200810243907A CN101431416A CN 101431416 A CN101431416 A CN 101431416A CN A2008102439075 A CNA2008102439075 A CN A2008102439075A CN 200810243907 A CN200810243907 A CN 200810243907A CN 101431416 A CN101431416 A CN 101431416A
Authority
CN
China
Prior art keywords
data
invasion
sample
local
collaborative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008102439075A
Other languages
Chinese (zh)
Other versions
CN101431416B (en
Inventor
王汝传
周何骏
任勋益
付雄
邓松
季一木
易侃
杨明慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2008102439075A priority Critical patent/CN101431416B/en
Publication of CN101431416A publication Critical patent/CN101431416A/en
Application granted granted Critical
Publication of CN101431416B publication Critical patent/CN101431416B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method of collaborative learning intrusion detection applied in data grid, which draws advantages of current popular technologies like distributed detection in intrusion detection domain and ensemble learning etc., combines method of abnormal detection and feature detection, adopts BP neural network collaborative learning for complementary advantages, and makes intrusion detection system based on the method applies to data grid environment. Deploy a plurality of strong detectors integrated by BP neural network in center-nod according to security requirement of different kinds of nods in data grid by the invention, and collect new intrusion sample feature come from everywhere whenever possible to make sure about the security of important copy in center-nod. Deploy collaborative intrusion analysis engine in center-nod meanwhile to provide collaborative detection service for all normal nods. A plurality of normal nods are organized by center-nod for collaborative calculation and suspected data can be detected which cannot be judged by original signal nod so as to improve security of normal nod.

Description

A kind of synergetics learning invasion detection method that is applied to data grids
Technical field
The present invention is a kind of intrusion detection method based on the collaborative study of BP neural net that is applied to data grids.Be mainly used in the attack that detects automatic network, belong to the crossing domain of data grids technology and Intrusion Detection Technique at back end in the grid.
Background technology
Along with express network technology and computing grid technology rapid development in recent years, people are more and more stronger to the demand of large-scale data sharing, more current memory technologies, as network attached storage NAS, storage area network SAN, group of planes storage, object storage etc., because its closure, independence and relative higher cost, storage and extended capability deficiency, cause it to be difficult under wide area network, share huge day by day data volume, on the other hand, still existing a large amount of idle memory spaces on wide area network fails to be utilized effectively.Data grids just one be the desirable virtual storage system of main resource with data, can be various grid application good support be provided.On the one hand, utilize the efficient disposal ability of grid environment can realize effectively integrating of large-scale data, and effectively utilize existing numerous data resource; Simultaneously, also can utilize the data managing capacity of data grids system high efficiency, for the integrated optimization of the management of fulfillment database resources effective, distributed data in the grid and the analyzing and processing of big data etc. provide strong support.
Calculate in the Wide Area Network deploy, safety assurance is vital.Grid security mechanism will provide basic safeguard protection authentication mechanism; with checking legal users and resource; and provide interface for other security services; allow the user to select different security strategies, level of security and encryption method; the safety devices of underlying basis are provided, and this is the requirement and the characteristics of grid computing.Intruding detection system also is further extended in the grid environment as the defence line, second road of network security after fire compartment wall, as the defence line, another road on the grid bottom GSI, be deployed in the intrusion detection prototype system first meeting blank of computing grid, these systems be mostly with the behavior profile that the form of upper strata security service detects grid user find and the attack that stops malicious user to guarantee the safety of grid.Yet situation is different in data grids, in order to improve data service quality, used the lot of data copy in the data grids, on the node of these copy distributed store isomery in wide scope, undoubtedly, data redudancy is big more, and is just many more to the point of attack that the assailant provides, the assailant at first can initiate at some key node from network the attack of data grid, and then destroys whole data grids.If can not guarantee the safety of the node computer of each storage significant data, also just can not guarantee the safety of data grids integral body.The existing Intrusion Detection Technique overwhelming majority is at the operating system of unit and network, and the intruding detection system that is applied to computing grid is deployed in the user of grid upper strata at whole grid, shortage is not suitable for the special circumstances of data grids to the consideration of individual node network security.The research and development of relevant data grid at present also is in the starting stage, to the research of grid data safety just still less, and the seldom several data grids intrusion detection models that proposed now all are the Intrusion Detection Technique of indiscriminately imitating in the computing grid, and consider the attack that comes automatic network that the node of storage data faces.
The distributed Intrusion Detection Systems technology has had very great development in recent years, yet such system or need a unified control centre and come the security incident transmitted on each crucial test point of analyzing and processing perhaps adopts the agent technology to come incident on the node that independence or associated treatment distribute.Because number of nodes is huge in the grid, use focuses on engine can cause the processing center overload of power, and can't avoid the single point failure problem, use the agent technology not give full play to the mutual supplement with each other's advantages of each agent under the grid heterogeneous environment and the trust problem between the very difficult agent of solution.As seen already present various distributed Intrusion Detection Systems technology is not suitable for the particular surroundings of data grids.
At intrusion detection field integrated study also is hot research in recent years, it is the weak learner of a lot of stand-alone trainings such as BP neural net to be integrated obtain a strong learner improving verification and measurement ratio, but this method mainly still is used for the intrusion detection of unit.Therefore the intrusion detection method of studying a kind of suitable data grid environment is significant.
Summary of the invention
Technical problem: the purpose of this invention is to provide a kind of intrusion detection method that is applied to data grids, detect the attack at back end in the grid of automatic network.
Technical scheme: the present invention is a kind of intrusion detection method of collaborative study, based on the BP neural net, learn from each other, have complementary advantages and improve the fail safe of each back end by the neural net on each heterogeneous nodes in the data grids, resist the attack of automatic network effectively.
One, architecture
According to the complex network scientific theory, network in the real world (the Internet, grid) has no characteristics of scale, data grids are as the dynamic network of a wide area self-organizing, its topological structure also should meet no scale network model: minority Centroid degree is very big, is connecting many ordinary nodes on it.Therefore the canonical topology structure of data grids wherein generally is used on the Centroid storing important data trnascription (root copy) as shown in Figure 1, and its fail safe is most important.In order to reduce security overhead, lay special stress on protecting the safety of critical data node, the intrusion detection module on design centre node and the ordinary node is as follows respectively:
Fig. 2 has provided the architecture of Centroid intrusion detection module, and its functional part mainly comprises local data collector, novel invasion sample receiver, collaborative request service broker, data preliminary treatment and form transducer, local integrated invasion analysis engine (detector), invasion sample characteristics storehouse, cooperative intrusion analysis engine, novel invasion sample transmitter, response alarm device.
Below we provide the explanation of several concrete parts:
The local data collector: collection network packet on the local network segment, to detect attack from local network.
Novel invasion sample receiver: what receive that other nodes send over detects the data sample of judging to attacking.
Collaborative request service broker: receive the suspection sample that can't judge that certain ordinary node sends over, mode with broadcasting is transmitted to all direct-connected ordinary nodes of this Centroid with collaborative analysis again, the final judged result of cooperative intrusion analysis engine is returned to the node of the collaborative request of initiation.
Data preliminary treatment and form transducer: because the isomerism of data grids, the form of the handled network packet of detector of each node computer and the field difference of detection, transducer becomes the form of the detector processes on the unified suitable local node with the data transaction that receives, and carries out suitable preliminary treatment to improve detection efficiency.
Local integrated invasion analysis engine: be the main intrusion detection parts of Centroid, in order to ensure the safety of Centroid, detector adopts the integrated detection mode of BP neural net of a plurality of stand-alone trainings, forms strong local detectability.
Invasion sample characteristics storehouse: the novel invasion sample characteristics that the storage ordinary node is submitted to, with this locality integrated invasion analysis engine cooperating, the data to be tested of receiving for analysis engine, at first with feature database in the comparison of existing invasion sample characteristics, if no abnormal, the integrated BP neural net by analysis engine detects again.
Cooperative intrusion analysis engine: receive data, for ordinary node provides the collaborative service that detects from collaborative request service broker.
Novel invasion sample transmitter: the invasion sample of the newtype that will find on local node sends to other nodes and does to detect reference for it.
The response alarm device: find automatic network at the attack of this node the time, send break alarm and impel system to take measures to stop intrusion behavior.
Fig. 3 has provided the architecture of ordinary node intrusion detection module, because its importance is not as Centroid, demand for security is lower than Centroid, therefore its invasion analysis engine has only used two BP neural net cooperative detection, and because the degree of ordinary node is very little, calculated performance is not as Centroid, so provide the collaborative obligation of serving that detects except the requirement of the Centroid that carries out local detection and be attached thereto for response at one's leisure participates in not bearing certain collaborative detection computations for other nodes.Its functional part mainly comprises local data collector, data preliminary treatment and form transducer, local invasion analysis engine (detector), local invasion sample characteristics storehouse, novel invasion sample transmitter, communication for coordination server, response alarm device.Wherein the effect of local data collector, data preliminary treatment and form transducer, novel invasion sample transmitter, response alarm device and Centroid is identical, repeat no more, slightly different is detector and feature database, in addition because it often will send the collaborative request that detects to other nodes by Centroid, so needing increases the communication for coordination server, now is respectively described below:
Local invasion analysis engine: the detection engine of ordinary node adopts two independently modes of BP neural net cooperative detection, and one of them BP network is a primary detector, and another is an assisted detector.During actual detected,, then regard normal data as if two networks all are judged as normally; If two networks all are judged as unusually, then regard the invasion data as; If one is judged as normal and another is judged as unusually, then as the suspection data that temporarily can't adjudicate, to suspect that by the communication for coordination server sample sends to the Centroid that it connects, uniting other a plurality of ordinary nodes by Centroid again provides collaborative the detection to serve to make final judgement.
The local sample characteristics storehouse of invading: suspect sample if the final result that draws through collaborative detection is a kind of invasion really, then extract its characteristic storage in invasion sample characteristics storehouse, this locality, check feature database in the detection afterwards earlier, if and certain bar record coupling wherein, then directly be judged as invasion, need not work in coordination with detection once more, to reduce security overhead.
The communication for coordination server: the suspection sample that this node can't be judged sends to remote center's node, propose the cooperation with service request or respond the requirement of certain Centroid, receive the suspection data that it is sent, the result of calculation of analysis engine is returned in invasion analysis engine analysis on this machine of submitting to again to Centroid.
Two, method flow
A kind of synergetics learning invasion detection method that is applied to data grids resists the attack of automatic network effectively by the fail safe that the collaborative study of the BP neural net on each heterogeneous nodes in the data grids, mutual supplement with each other's advantages improve each back end, and is specific as follows:
The local intrusion detection flow process of ordinary node:
Step 1: the real-time collection network packet of local data collector,
Step 2: data preliminary treatment and form transducer extract each attributive character of the packet that collects, and carry out preliminary treatment and change into the form that is fit to this node machine,
Step 3: the data after the conversion are sent local invasion analysis engine, detects respectively by two BP detectors,
Step 4: if two detectors all are judged to normal data normal, then be judged to normal data, finish epicycle and detect, change step 1 and continue the collection network packet; Attack attack if two detectors all are judged as, then start the response alarm device, the local network invasion is found in warning, changes step 5; If the judged result of two detectors is inconsistent, change step 6,
Step 5: novel invasion sample transmitter will be attacked the novel invasion sample receiver that data sample sends to the direct-connected Centroid of this node, inform that Centroid found a kind of invasion here, finish epicycle and detect, and change step 1 and continue the collection network packet,
Step 6: local invasion analysis engine connects local invasion sample characteristics storehouse, whether attack signature sample with this Data Matching is arranged in the query characteristics storehouse,, then start the response alarm device if having, the local network invasion is found in warning, changes step 1 and continues the collection network packet; If do not have, then think suspicious data, send the communication for coordination server, change step 7,
Step 7: the communication for coordination server will suspect that sample mails to the collaborative request service broker with the direct-connected Centroid of this node, propose the cooperation with service request,
Step 8: the communication for coordination server receives the result that collaborative request service broker returns, and submits to detector,
Step 9: detector receives and checks return results, if normal data is then changeed step 1 and continued the collection network packet; If the attack data then start the response alarm device, the local network invasion is found in warning, simultaneously the characteristic storage of this attack sample is invaded in the sample characteristics storehouse to this locality, changes step 1 and continues the collection network packet;
Ordinary node participates in collaborative evaluation work flow process:
Step 21: the communication for coordination server receives suspection data and the collaborative calculation requirement from other nodes that the collaborative request service broker of Centroid sends, and whether the state of the local invasion of inquiry analysis engine is idle,
Step 22: if local invasion analysis engine state is busy, have no time to participate in collaborative calculating, the then not requirement of responsing center's node, packet discard finishes this flow process; Otherwise change step 23,
Step 23: the communication for coordination server will receive from the suspection data of Centroid and submit to the invasion analysis engine,
Step 24: the primary detector by analysis engine detects this suspection data, and the result returns to the communication for coordination server,
Step 25: the communication for coordination server sends to the result of calculation of this node the collaborative request service broker of Centroid;
The local intrusion detection workflow of Centroid:
Step 31: the real-time collection network packet of local data collector,
Step 32: data preliminary treatment and form transducer extract each attributive character of the packet that collects, and carry out preliminary treatment and change into the form that is fit to this node machine,
Step 33: the data after the conversion are sent local integrated invasion analysis engine, detects by integrated detector,
Step 34:, then change step 35 if testing result is normal normal; If unusual, then start the response alarm device, the local network invasion is found in warning, changes step 36,
Step 35: the invasion analysis engine connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, then starts the response alarm device, and the local network invasion is found in warning, changes step 36; If do not have, then think normal data, finish epicycle and detect, change step 31 and continue the collection network packet,
Step 36: novel invasion sample transmitter will be attacked data sample and send to novel invasion sample receiver with direct-connected other Centroids of this Centroid, inform and found a kind of invasion here, finish epicycle and detect, change step 31 and continue the collection network packet;
Centroid is collected novel invasion sample characteristics flow process:
Step 41: novel invasion sample receiver receives the detected attack data of submitting to from collaborative request service broker on other nodes or this machine, and data are submitted to integrated detector,
Step 42: integrated detector detects data, if testing result is also for attacking attack, then process ends; Otherwise, enter next step,
Step 43: integrated detector connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, and process ends then; If do not have, then think a kind of newfound invasion, enter next step,
Step 44: this characteristic storage of attacking sample in invasion sample characteristics storehouse;
Centroid provides the collaborative service procedure that detects:
Step 51: collaborative request service broker receives suspection sample and the cooperation with service request that certain ordinary node is sent,
Step 52: the service broker sends these suspection data and collaborative calculation requirement in the mode of broadcasting to all ordinary nodes that this node was connected,
Step 53: the service broker receives the result of calculation that all nodes that respond return, and submits to the cooperative intrusion analysis engine,
Step 54: cooperative intrusion analysis engine statistics service broker submits to the collaborative testing result of its each responsive node, to this suspect data if the quantity of node that is judged as attack more than or equal to the quantity num that is judged as normal node (attack)=num (normal), then be judged as attack, otherwise be judged as normal.
Step 55: the cooperative intrusion analysis engine returns judged result to the service broker,
Step 56: the service broker checks the result who receives, if normal, then it is directly returned the node that sends the cooperation with service request; If unusual, except the result being returned the node that sends the cooperation with service request, also will confirm as the data sample of attack and issue local novel invasion sample receiver, a kind of new invasion has been found in report.
The functional part of Centroid intrusion detection module mainly comprises local data collector, novel invasion sample receiver, collaborative request service broker, data preliminary treatment and form transducer, local integrated invasion analysis engine, invasion sample characteristics storehouse, cooperative intrusion analysis engine, novel invasion sample transmitter, response alarm device; The functional part of ordinary node intrusion detection module mainly comprises local data collector, data preliminary treatment and form transducer, local invasion analysis engine, local invasion sample characteristics storehouse, novel invasion sample transmitter, communication for coordination server, response alarm device.
Beneficial effect: use this scheme that following advantage is arranged:
1. fail safe, the survivability of data grids Centroids have greatly been guaranteed.Because verified weak the integrated of learner of experimental study can form powerful detectability, can effectively guarantee the safety of data center at the integrated study device of Centroid deploy, Centroid is collected the novel invasion feature of finding from other nodes (comprising Centroid and ordinary node) in real time simultaneously, at any time learn " experience " of other nodes, make the knowledge of its feature database more and more abundanter, comprehensively, this design combines abnormality detection and feature detection, powerful anomaly detector cooperates the feature detection of comprehensive and abundant, have complementary advantages, make data grids have the ability that very strong anti-specific aim is hit.
2. improved the network security of ordinary node effectively.Though ordinary node is because the limitation of self performance, can not dispose powerful detector, but the present invention has utilized the isomerism of data grids nodes and advantage separately dexterously, because ordinary node wide area physically distributes, be positioned at the diversified Virtual Organization and the network segment, the level of security difference, the network packet difference of Cai Jiing is very big separately, the attack type that runs into has a great difference, the detector of possible certain node to a kind of often be easy to detect at self attack and this attack to be other nodes seldom run into and be difficult for detecting.The collaborative detection service that ordinary node provides by Centroid, can with a lot of other collaborative study of ordinary node, learn from other's strong points to offset one's weaknesses, improved the detectability of self greatly.
3. reduced the security overhead of data grids.Because the intrusion detection module on each node detects local invasion independently of one another, handle by each node oneself for own confessedly data, do not need unified central processing unit, under data grid environment, realized distributed Intrusion Detection Systems truly; For through the collaborative suspection sample of confirming as attack that detects, in time extract attack signature and be stored in the local feature database, run into this type of attack later on again, just can directly search feature database, need not work in coordination with calculating once more, reduced security overhead.
Description of drawings
Fig. 1 is the data grids canonical topology structure chart of simplifying according to Complex Networks Theory.
Fig. 2 is the system assumption diagram of Centroid intrusion detection module.
Fig. 3 is the system assumption diagram of ordinary node intrusion detection module.
Fig. 4 is the local intrusion detection flow chart of ordinary node.
Fig. 5 is that ordinary node participates in collaborative calculation flow chart.
Fig. 6 is the local intrusion detection flow chart of Centroid.
Fig. 7 is that Centroid is collected novel invasion sample characteristics flow chart.
Fig. 8 is that Centroid provides the collaborative service procedure figure that detects.
Embodiment
1, ordinary node intrusion detection flow process
This locality invasion analysis engine on the ordinary node is made of two BP neural nets, and two networks are stand-alone trainings, and appointment wherein any network is a primary detector, and another then is an assisted detector.Two local network packet of gathering of detector cooperative detection, wherein primary detector is except carrying out this locality detection, and also the cooperative intrusion of primary detector detects on participation and other nodes.Network data for this locality, have only when major-minor two detectors all are judged as and just often just be defined as normal data, if two detector judged results disagree then as suspect data sample by the communication for coordination server mail to this node a direct-connected Centroid, provide the collaborative service that detects by the cooperative intrusion analysis engine on the Centroid.Any ordinary node all will be issued coupled Centroid with the invasion data as long as find intrusion behavior, reference is provided for the detection of Centroid.
The local intrusion detection groundwork of ordinary node flow process (see figure 4):
Step1: the real-time collection network packet of local data collector.
Step2: data preliminary treatment and form transducer extract each attributive character of the packet that collects, carry out preliminary treatment and change into the form that is fit to this node machine.
Step3: the data after the conversion are sent local invasion analysis engine, are detected respectively by two BP detectors.
Step4: if two detectors all are judged to normal data (normal), then be judged to normal data, finish epicycle and detect, change step1 and continue the collection network packet; If two detectors all are judged as attack (attack), then start the response alarm device, the local network invasion is found in warning, changes step5; If the judged result of two detectors is inconsistent, change step6.
Step5: novel invasion sample transmitter will be attacked the novel invasion sample receiver that data sample sends to the direct-connected Centroid of this node, inform that Centroid found a kind of invasion here, finish epicycle and detect, and change step1 and continue the collection network packet.
Step6: local invasion analysis engine connects local invasion sample characteristics storehouse, whether attack signature sample with this Data Matching is arranged in the query characteristics storehouse,, then start the response alarm device if having, the local network invasion is found in warning, changes step1 and continues the collection network packet; If do not have, then think suspicious data, send the communication for coordination server, change step7.
Step7: the communication for coordination server will suspect that sample mails to the collaborative request service broker with the direct-connected Centroid of this node, proposes the cooperation with service request.
Step8: the communication for coordination server receives the result that collaborative request service broker returns, and submits to detector.
Step9: detector receives and checks return results, if normal data is then changeed step1 and continued the collection network packet; If the attack data then start the response alarm device, the local network invasion is found in warning, simultaneously the characteristic storage of this attack sample is invaded in the sample characteristics storehouse to this locality, changes step1 and continues the collection network packet.
Ordinary node participates in collaborative evaluation work flow process (see figure 5):
Step1: the communication for coordination server receives suspection data and the collaborative calculation requirement from other nodes that the collaborative request service broker of Centroid sends, and whether the state of the local invasion of inquiry analysis engine is idle.
Step2: if local invasion analysis engine state is busy, have no time to participate in collaborative calculating, the then not requirement of responsing center's node, packet discard finishes this flow process; Otherwise change step3.
Step3: the communication for coordination server will receive from the suspection data of Centroid and submit to the invasion analysis engine.
Step4: the primary detector by analysis engine detects this suspection data, and the result returns to the communication for coordination server.
Step5: the communication for coordination server sends to the result of calculation of this node the collaborative request service broker of Centroid.
2, Centroid intrusion detection flow process
The Centroid deploy be strong detector by a lot of BP network integrations, and it is collected in real time and deposits in the feature database from the invasion data characteristics that has been detected on other nodes, feature database on it is being stored all novel attack signatures that each place of whole mesh is found, therefore Centroid does not need to detect local invasion with other nodes are collaborative, because its powerful computing ability and very big degree of communication can provide the collaborative service that detects for the ordinary node in the grid easily.
The local intrusion detection workflow of Centroid (see figure 6):
Step1: the real-time collection network packet of local data collector.
Step2: data preliminary treatment and form transducer extract each attributive character of the packet that collects, carry out preliminary treatment and change into the form that is fit to this node machine.
Step3: the data after the conversion are sent local integrated invasion analysis engine, are detected by integrated detector.
Step4:, then change step5 if testing result is normal (normal); If unusual, then start the response alarm device, the local network invasion is found in warning, changes step6.
Step5: the invasion analysis engine connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, then starts the response alarm device, and the local network invasion is found in warning, changes step6; If do not have, then think normal data, finish epicycle and detect, change step1 and continue the collection network packet.
Step6: novel invasion sample transmitter will be attacked data sample and send to novel invasion sample receiver with direct-connected other Centroids of this Centroid, inform and find a kind of invasion here, finish epicycle and detect, and change step1 and continue the collection network packet.
Centroid is collected novel invasion sample characteristics flow process (see figure 7):
Step1: novel invasion sample receiver receives the detected attack data of submitting to from collaborative request service broker on other nodes or this machine, and data are submitted to integrated detector.
Step2: integrated detector detects data, if testing result is also for attacking (attack), then process ends; Otherwise, enter next step.
Step3: integrated detector connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, and process ends then; If do not have, then think a kind of newfound invasion, enter next step.
Step4: this characteristic storage of attacking sample in invasion sample characteristics storehouse.
Centroid provides the collaborative service procedure (see figure 8) that detects:
Step1: collaborative request service broker receives suspection sample and the cooperation with service request that certain ordinary node is sent.
Step2: the service broker sends these suspection data and collaborative calculation requirement in the mode of broadcasting to all ordinary nodes that this node was connected.
Step3: the service broker receives the result of calculation that all nodes that respond return, and submits to the cooperative intrusion analysis engine.
Step4: cooperative intrusion analysis engine statistics service broker submits to the collaborative testing result of its each responsive node, to this suspect data if the quantity of node that is judged as attack more than or equal to the quantity num that is judged as normal node (attack)=num (normal), then be judged as attack, otherwise be judged as normal.
Step5: the cooperative intrusion analysis engine returns judged result to the service broker.
Step6: the service broker checks the result who receives, if normal, then it is directly returned the node that sends the cooperation with service request; If unusual, except the result being returned the node that sends the cooperation with service request, also will confirm as the data sample of attack and issue local novel invasion sample receiver, a kind of new invasion has been found in report.
For convenience of description, our topological structure of tentation data grid example as shown in Figure 1, the testing process of ordinary node and Centroid is that representative is told about with ai and A respectively, other node detection process is identical therewith, and then its embodiment is: initial: Centroid A, B, C and separately ordinary node a1, a2 ..., am; B1, b2 ..., bn; C1, c2, ck is last according to Fig. 2, the system assumption diagram of Fig. 3 is set up the intruding detection system of each node self respectively, and according to (the data subset training that each neural net of same node detection device adopts independent random in this node training dataset to extract of the BP neural net on each self-detector of data stand-alone training of the residing real network environment of each node, and get different yojan attribute sets, guaranteed to train the isomerism of each neural net that obtains), the feature database of each node of initialization, several modal invasion feature that a minute book ground node is run in the initial storehouse.
The local intrusion detection of ordinary node ai:
(1) the real-time collection network packet of the local data collector on the ai.
(2) data preliminary treatment and form transducer extract each attributive character of the packet that collects, carry out preliminary treatment and change into the form that is fit to this node machine.
(3) data after the conversion are sent local invasion analysis engine, are detected respectively by two BP detectors.
(4) if two detectors all are judged to normal data (normal), then be judged to normal data, finish epicycle and detect, change (1) and continue the collection network packet; If two detectors all are judged as attack (attack), then start the response alarm device, the local network invasion is found in warning, changes (5); If the judged result of two detectors is inconsistent, change (6).
(5) novel invasion sample transmitter will be attacked the novel invasion sample receiver that data sample sends to A, inform that A has found a kind of invasion here, finish epicycle and detect, and change (1) and continue the collection network packet.
(6) local invasion analysis engine connects local invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, then starts the response alarm device, and the local network invasion is found in warning, changes (1) and continues the collection network packet; If do not have, then think suspicious data, send the communication for coordination server, change (7).
(7) the communication for coordination server will suspect that sample mails to the collaborative request service broker of A, propose the cooperation with service request.
(8) the communication for coordination server receives the result that collaborative request service broker returns, and submits to detector.
(9) detector receives and checks return results, if normal data is then changeed (1) and continued the collection network packet; If the attack data then start the response alarm device, the local network invasion is found in warning, simultaneously the characteristic storage of this attack sample is invaded in the sample characteristics storehouse to this locality, changes (1) and continues the collection network packet.
Ai participates in collaborative evaluation work flow process:
(1) the communication for coordination server receives suspection data and the collaborative calculation requirement from other nodes that the collaborative request service broker of A sends, and whether the state of the local invasion of inquiry analysis engine is idle.
(2) if local invasion analysis engine state is busy, have no time to participate in collaborative calculating, then do not respond the requirement of A, packet discard finishes this flow process; Otherwise change (3).
(3) the communication for coordination server will receive from the suspection data of A and submit to the invasion analysis engine.
(4) primary detector by analysis engine detects this suspection data, and the result returns to the communication for coordination server.
(5) the communication for coordination server sends to the result of calculation of this node the collaborative request service broker of A.
The local intrusion detection of Centroid A:
(1) the real-time collection network packet of the local data collector on the A.
(2) data preliminary treatment and form transducer extract each attributive character of the packet that collects, carry out preliminary treatment and change into the form that is fit to this node machine.
(3) data after the conversion are sent local integrated invasion analysis engine, are detected by integrated detector.
(4) if testing result is normal (normal), then change (5); If unusual, then start the response alarm device, the local network invasion is found in warning, changes (6).
(5) the invasion analysis engine connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, then starts the response alarm device, and the local network invasion is found in warning, changes (6); If do not have, then think normal data, finish epicycle and detect, change (1).
(6) novel invasion sample transmitter will be attacked data sample and send to novel invasion sample receiver on B and the C, inform and find a kind of invasion here, change (1).
A collects novel invasion sample characteristics:
(1) the novel invasion sample receiver on the A receives the detected attack data of submitting to from collaborative request service broker on B, C or this machine, and data are submitted to integrated detector.
(2) integrated detector detects data, if testing result is also for attacking (attack), then process ends; Otherwise, enter (3).
(3) integrated detector connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, and process ends then; If do not have, then think a kind of newfound invasion, enter (4).
(4) this characteristic storage of attacking sample in invasion sample characteristics storehouse.
A provides the collaborative service process that detects:
(1) the collaborative request service broker on the A receives suspection sample and the cooperation with service request that ai sends.
(2) service broker with the mode of broadcasting to all ordinary node a1, a2 that A was connected ..., am sends these suspection data and collaborative calculation requirement.
(3) service broker receives the result of calculation that all nodes that respond return, and submits to the cooperative intrusion analysis engine.
(4) cooperative intrusion analysis engine statistics service broker submits to the collaborative testing result of its each responsive node, to this suspect data if the quantity of node that is judged as attack more than or equal to the quantity num that is judged as normal node (attack)=num (normal), then be judged as attack, otherwise be judged as normal.
(5) the cooperative intrusion analysis engine returns judged result to the service broker.
(6) service broker checks the result who receives, if normal, then it is directly returned ai; If unusual, except the result is returned the ai, also will confirm as the data sample of attack and issue local novel invasion sample receiver, a kind of new invasion has been found in report.

Claims (2)

1, a kind of synergetics learning invasion detection method that is applied to data grids, it is characterized in that by the collaborative fail safe of learning, having complementary advantages and improving each back end of the BP neural net on each heterogeneous nodes in the data grids, resist the attack of automatic network effectively, specific as follows:
The local intrusion detection flow process of ordinary node:
Step 1: the real-time collection network packet of local data collector,
Step 2: data preliminary treatment and form transducer extract each attributive character of the packet that collects, and carry out preliminary treatment and change into the form that is fit to this node machine,
Step 3: the data after the conversion are sent local invasion analysis engine, detects respectively by two BP detectors,
Step 4: if two detectors all are judged to normal data normal, then be judged to normal data, finish epicycle and detect, change step 1 and continue the collection network packet; Attack attack if two detectors all are judged as, then start the response alarm device, the local network invasion is found in warning, changes step 5; If the judged result of two detectors is inconsistent, change step 6,
Step 5: novel invasion sample transmitter will be attacked the novel invasion sample receiver that data sample sends to the direct-connected Centroid of this node, inform that Centroid found a kind of invasion here, finish epicycle and detect, and change step 1 and continue the collection network packet,
Step 6: local invasion analysis engine connects local invasion sample characteristics storehouse, whether attack signature sample with this Data Matching is arranged in the query characteristics storehouse,, then start the response alarm device if having, the local network invasion is found in warning, changes step 1 and continues the collection network packet; If do not have, then think suspicious data, send the communication for coordination server, change step 7,
Step 7: the communication for coordination server will suspect that sample mails to the collaborative request service broker with the direct-connected Centroid of this node, propose the cooperation with service request,
Step 8: the communication for coordination server receives the result that collaborative request service broker returns, and submits to detector,
Step 9: detector receives and checks return results, if normal data is then changeed step 1 and continued the collection network packet; If the attack data then start the response alarm device, the local network invasion is found in warning, simultaneously the characteristic storage of this attack sample is invaded in the sample characteristics storehouse to this locality, changes step 1 and continues the collection network packet;
Ordinary node participates in collaborative evaluation work flow process:
Step 21: the communication for coordination server receives suspection data and the collaborative calculation requirement from other nodes that the collaborative request service broker of Centroid sends, and whether the state of the local invasion of inquiry analysis engine is idle,
Step 22: if local invasion analysis engine state is busy, have no time to participate in collaborative calculating, the then not requirement of responsing center's node, packet discard finishes this flow process; Otherwise change step 23,
Step 23: the communication for coordination server will receive from the suspection data of Centroid and submit to the invasion analysis engine,
Step 24: the primary detector by analysis engine detects this suspection data, and the result returns to the communication for coordination server,
Step 25: the communication for coordination server sends to the result of calculation of this node the collaborative request service broker of Centroid;
The local intrusion detection workflow of Centroid:
Step 31: the real-time collection network packet of local data collector,
Step 32: data preliminary treatment and form transducer extract each attributive character of the packet that collects, and carry out preliminary treatment and change into the form that is fit to this node machine,
Step 33: the data after the conversion are sent local integrated invasion analysis engine, detects by integrated detector,
Step 34:, then change step 35 if testing result is normal normal; If unusual, then start the response alarm device, the local network invasion is found in warning, changes step 36,
Step 35: the invasion analysis engine connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, then starts the response alarm device, and the local network invasion is found in warning, changes step 36; If do not have, then think normal data, finish epicycle and detect, change step 31 and continue the collection network packet,
Step 36: novel invasion sample transmitter will be attacked data sample and send to novel invasion sample receiver with direct-connected other Centroids of this Centroid, inform and found a kind of invasion here, finish epicycle and detect, change step 31 and continue the collection network packet;
Centroid is collected novel invasion sample characteristics flow process:
Step 41: novel invasion sample receiver receives the detected attack data of submitting to from collaborative request service broker on other nodes or this machine, and data are submitted to integrated detector,
Step 42: integrated detector detects data, if testing result is also for attacking attack, then process ends; Otherwise, enter next step,
Step 43: integrated detector connects invasion sample characteristics storehouse, and whether the attack signature sample with this Data Matching is arranged in the query characteristics storehouse, if having, and process ends then; If do not have, then think a kind of newfound invasion, enter next step,
Step 44: this characteristic storage of attacking sample in invasion sample characteristics storehouse;
Centroid provides the collaborative service procedure that detects:
Step 51: collaborative request service broker receives suspection sample and the cooperation with service request that certain ordinary node is sent,
Step 52: the service broker sends these suspection data and collaborative calculation requirement in the mode of broadcasting to all ordinary nodes that this node was connected,
Step 53: the service broker receives the result of calculation that all nodes that respond return, and submits to the cooperative intrusion analysis engine,
Step 54: cooperative intrusion analysis engine statistics service broker submits to the collaborative testing result of its each responsive node, to this suspect data if the quantity of node that is judged as attack more than or equal to the quantity num that is judged as normal node (attack)=num (normal), then be judged as attack, otherwise be judged as normal.
Step 55: the cooperative intrusion analysis engine returns judged result to the service broker,
Step 56: the service broker checks the result who receives, if normal, then it is directly returned the node that sends the cooperation with service request; If unusual, except the result being returned the node that sends the cooperation with service request, also will confirm as the data sample of attack and issue local novel invasion sample receiver, a kind of new invasion has been found in report.
2, a kind of synergetics learning invasion detection method that is applied to data grids according to claim 1 is characterized in that the functional part of Centroid intrusion detection module mainly comprises local data collector, novel invasion sample receiver, collaborative request service broker, data preliminary treatment and form transducer, local integrated invasion analysis engine, invasion sample characteristics storehouse, cooperative intrusion analysis engine, novel invasion sample transmitter, response alarm device; The functional part of ordinary node intrusion detection module mainly comprises local data collector, data preliminary treatment and form transducer, local invasion analysis engine, local invasion sample characteristics storehouse, novel invasion sample transmitter, communication for coordination server, response alarm device.
CN2008102439075A 2008-12-10 2008-12-10 Synergistic learning invasion detection method used for data gridding Expired - Fee Related CN101431416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102439075A CN101431416B (en) 2008-12-10 2008-12-10 Synergistic learning invasion detection method used for data gridding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102439075A CN101431416B (en) 2008-12-10 2008-12-10 Synergistic learning invasion detection method used for data gridding

Publications (2)

Publication Number Publication Date
CN101431416A true CN101431416A (en) 2009-05-13
CN101431416B CN101431416B (en) 2011-04-20

Family

ID=40646597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102439075A Expired - Fee Related CN101431416B (en) 2008-12-10 2008-12-10 Synergistic learning invasion detection method used for data gridding

Country Status (1)

Country Link
CN (1) CN101431416B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195975A (en) * 2011-04-08 2011-09-21 上海电机学院 Intelligent NIPS (Network Intrusion Prevention System) framework for quantifying neural network based on mobile agent (MA) and learning vector
CN102801720A (en) * 2012-08-08 2012-11-28 浙江树人大学 Method for institution-governed and contract-ensured hierarchical synergetic self-organization
CN103036745A (en) * 2012-12-21 2013-04-10 北京邮电大学 Anomaly detection system based on neural network in cloud computing
CN103716204A (en) * 2013-12-20 2014-04-09 中国科学院信息工程研究所 Abnormal intrusion detection ensemble learning method and apparatus based on Wiener process
CN103731426A (en) * 2013-12-31 2014-04-16 曙光云计算技术有限公司 Intrusion alarming system based on virtual network
CN103973697A (en) * 2014-05-19 2014-08-06 重庆邮电大学 Intrusion detecting method of internet-of-things sensing layer
CN104796421A (en) * 2015-04-21 2015-07-22 西安工程大学 Multimedia network intrusion detecting method
CN104883349A (en) * 2014-09-28 2015-09-02 北京匡恩网络科技有限责任公司 Network security regulation learning method and system
CN105025031A (en) * 2015-07-30 2015-11-04 西安工程大学 Network intrusion detection method based on decomposition linked list of multimedia rule
CN105471854A (en) * 2015-11-18 2016-04-06 国网智能电网研究院 Adaptive boundary abnormity detection method based on multistage strategies
CN106131054A (en) * 2016-08-17 2016-11-16 国家计算机网络与信息安全管理中心 Network intrusions collaborative detection method based on secure cloud
TWI587252B (en) * 2016-06-27 2017-06-11 Evaluation Method and Serving Method of Learning Progress Based on Fuzzy Markup Language for Cooperative Learning
CN107662559A (en) * 2016-07-28 2018-02-06 奥迪股份公司 Alert control device and method
CN108419303A (en) * 2018-03-15 2018-08-17 河北师范大学 Wireless sensor network safety management system
CN109151051A (en) * 2018-09-12 2019-01-04 南昌航空大学 Data safety Enhancement Method under a kind of cloud computing environment
CN109861988A (en) * 2019-01-07 2019-06-07 浙江大学 A kind of industrial control system intrusion detection method based on integrated study
CN110572379A (en) * 2019-08-29 2019-12-13 深圳市网域信息安全技术有限公司 Network security oriented visualization big data situation awareness analysis system key technology
CN113010884A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Real-time feature filtering method in intrusion detection system
CN113242258A (en) * 2021-05-27 2021-08-10 安天科技集团股份有限公司 Host cluster threat detection method and device
CN113315784A (en) * 2021-06-23 2021-08-27 深信服科技股份有限公司 Security event processing method, device, equipment and medium
WO2022151726A1 (en) * 2021-01-12 2022-07-21 华为技术有限公司 Network threat processing method and communication apparatus
CN114826698A (en) * 2022-04-08 2022-07-29 湖南旗语科技有限公司 Network security intrusion detection system based on block chain technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7225343B1 (en) * 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
CN1252555C (en) * 2003-12-19 2006-04-19 华中科技大学 Cooperative invading testing system based on distributed data dig
CN1309214C (en) * 2004-12-20 2007-04-04 华中科技大学 Cooperative intrusion detection based large-scale network security defense system

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195975A (en) * 2011-04-08 2011-09-21 上海电机学院 Intelligent NIPS (Network Intrusion Prevention System) framework for quantifying neural network based on mobile agent (MA) and learning vector
CN102801720B (en) * 2012-08-08 2015-04-08 浙江树人大学 Method for institution-governed and contract-ensured hierarchical synergetic self-organization
CN102801720A (en) * 2012-08-08 2012-11-28 浙江树人大学 Method for institution-governed and contract-ensured hierarchical synergetic self-organization
CN103036745A (en) * 2012-12-21 2013-04-10 北京邮电大学 Anomaly detection system based on neural network in cloud computing
CN103716204A (en) * 2013-12-20 2014-04-09 中国科学院信息工程研究所 Abnormal intrusion detection ensemble learning method and apparatus based on Wiener process
CN103716204B (en) * 2013-12-20 2017-02-08 中国科学院信息工程研究所 Abnormal intrusion detection ensemble learning method and apparatus based on Wiener process
CN103731426A (en) * 2013-12-31 2014-04-16 曙光云计算技术有限公司 Intrusion alarming system based on virtual network
CN103973697A (en) * 2014-05-19 2014-08-06 重庆邮电大学 Intrusion detecting method of internet-of-things sensing layer
CN103973697B (en) * 2014-05-19 2017-03-29 重庆邮电大学 A kind of thing network sensing layer intrusion detection method
CN104883349A (en) * 2014-09-28 2015-09-02 北京匡恩网络科技有限责任公司 Network security regulation learning method and system
CN104796421A (en) * 2015-04-21 2015-07-22 西安工程大学 Multimedia network intrusion detecting method
CN105025031A (en) * 2015-07-30 2015-11-04 西安工程大学 Network intrusion detection method based on decomposition linked list of multimedia rule
CN105471854A (en) * 2015-11-18 2016-04-06 国网智能电网研究院 Adaptive boundary abnormity detection method based on multistage strategies
CN105471854B (en) * 2015-11-18 2019-06-28 国网智能电网研究院 A kind of adaptive boundary method for detecting abnormality based on multistage strategy
TWI587252B (en) * 2016-06-27 2017-06-11 Evaluation Method and Serving Method of Learning Progress Based on Fuzzy Markup Language for Cooperative Learning
CN107662559A (en) * 2016-07-28 2018-02-06 奥迪股份公司 Alert control device and method
CN106131054A (en) * 2016-08-17 2016-11-16 国家计算机网络与信息安全管理中心 Network intrusions collaborative detection method based on secure cloud
CN106131054B (en) * 2016-08-17 2019-07-09 国家计算机网络与信息安全管理中心 Network intrusions collaborative detection method based on secure cloud
CN108419303A (en) * 2018-03-15 2018-08-17 河北师范大学 Wireless sensor network safety management system
CN109151051A (en) * 2018-09-12 2019-01-04 南昌航空大学 Data safety Enhancement Method under a kind of cloud computing environment
CN109151051B (en) * 2018-09-12 2020-12-08 南昌航空大学 Data security enhancement method in cloud computing environment
CN109861988A (en) * 2019-01-07 2019-06-07 浙江大学 A kind of industrial control system intrusion detection method based on integrated study
CN110572379A (en) * 2019-08-29 2019-12-13 深圳市网域信息安全技术有限公司 Network security oriented visualization big data situation awareness analysis system key technology
WO2022151726A1 (en) * 2021-01-12 2022-07-21 华为技术有限公司 Network threat processing method and communication apparatus
EP4262144A4 (en) * 2021-01-12 2024-07-03 Huawei Tech Co Ltd Network threat processing method and communication apparatus
CN113010884A (en) * 2021-02-23 2021-06-22 重庆邮电大学 Real-time feature filtering method in intrusion detection system
CN113010884B (en) * 2021-02-23 2022-08-26 重庆邮电大学 Real-time feature filtering method in intrusion detection system
CN113242258B (en) * 2021-05-27 2023-11-14 安天科技集团股份有限公司 Threat detection method and device for host cluster
CN113242258A (en) * 2021-05-27 2021-08-10 安天科技集团股份有限公司 Host cluster threat detection method and device
CN113315784A (en) * 2021-06-23 2021-08-27 深信服科技股份有限公司 Security event processing method, device, equipment and medium
CN114826698A (en) * 2022-04-08 2022-07-29 湖南旗语科技有限公司 Network security intrusion detection system based on block chain technology

Also Published As

Publication number Publication date
CN101431416B (en) 2011-04-20

Similar Documents

Publication Publication Date Title
CN101431416B (en) Synergistic learning invasion detection method used for data gridding
Wang et al. Using humans as sensors: an estimation-theoretic perspective
CN105511944B (en) A kind of method for detecting abnormality of cloud system internal virtual machine
CN103905440B (en) Network security situation awareness analysis method based on log and SNMP information fusion
CN101562537A (en) Distributed self-optimized intrusion detection alarm associated system
CN100362803C (en) Network safety warning system based on cluster and relavance
Srivastav et al. Novel intrusion detection system integrating layered framework with neural network
CN104270372B (en) A kind of network safety situation quantitative estimation method of parameter adaptive
CN112235295B (en) Method for troubleshooting and early warning potential safety hazards of coal mine
CN103618652A (en) Audit and depth analysis system and audit and depth analysis method of business data
CN106453412A (en) Malicious domain name determination method based on frequency characteristics
CN103561012A (en) WEB backdoor detection method and system based on relevance tree
CN102506991A (en) Distributed urban environment noise real-time automatic monitoring system
CN112087445A (en) Electric power Internet of things security vulnerability assessment method fusing business security
CN100493088C (en) Method for applying cooperative enhancement mechanism to adhoc network
CN114845097A (en) IPC safety monitoring system
CN115378711A (en) Industrial control network intrusion detection method and system
CN106302412A (en) A kind of intelligent checking system for the test of information system crushing resistance and detection method
Cuzzocrea et al. DynamicNet: an effective and efficient algorithm for supporting community evolution detection in time-evolving information networks
CN102195975A (en) Intelligent NIPS (Network Intrusion Prevention System) framework for quantifying neural network based on mobile agent (MA) and learning vector
CN103902725B (en) The acquisition methods of search engine optimization information and device
Wang et al. Construction of Audit Internal Control Intelligent System Based on Blockchain and Cloud Storage
Tian et al. Network intrusion detection method based on radial basic function neural network
CN103312723B (en) A kind of based on the inside threat feature construction method accessing vector
Sodiya Multi-level and secured agent-based intrusion detection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20090513

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: 2016320000217

Denomination of invention: Synergistic learning invasion detection method used for data gridding

Granted publication date: 20110420

License type: Common License

Record date: 20161118

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: 2016320000217

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110420