Movatterモバイル変換


[0]ホーム

URL:


CN102457525A - Load-based anomaly intrusion detection method and system - Google Patents

Load-based anomaly intrusion detection method and system
Download PDF

Info

Publication number
CN102457525A
CN102457525ACN2011104246134ACN201110424613ACN102457525ACN 102457525 ACN102457525 ACN 102457525ACN 2011104246134 ACN2011104246134 ACN 2011104246134ACN 201110424613 ACN201110424613 ACN 201110424613ACN 102457525 ACN102457525 ACN 102457525A
Authority
CN
China
Prior art keywords
feature
data packet
load
cluster
samples
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN2011104246134A
Other languages
Chinese (zh)
Inventor
李继国
刘杭州
张亦辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHUfiledCriticalHohai University HHU
Priority to CN2011104246134ApriorityCriticalpatent/CN102457525A/en
Publication of CN102457525ApublicationCriticalpatent/CN102457525A/en
Withdrawnlegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

Translated fromChinese

本发明公开了一种基于负荷的异常入侵检测方法,属于计算网络安全技术领域。本发明在进行异常入侵检测时,先利用CPP算法对待检测数据包负荷进行分块,然后仅对前N块数据进行特征提取,从而减小了数据处理量,提高检测速度,对高速网络的监视有更好的适应性。本发明进一步地采用多分类器系统构建正常通信轮廓,提高了检测的准确率。本发明还公开了一种基于负荷的异常入侵检测系统,包括基于CPP的负荷分块模块、特征提取模块、检测模块和响应模块。相比现有技术,本发明可实现高速网络的异常入侵快速检测。

Figure 201110424613

The invention discloses a load-based abnormal intrusion detection method, which belongs to the technical field of computing network security. When performing abnormal intrusion detection, the present invention first uses the CPP algorithm to block the load of the data packet to be detected, and then only performs feature extraction on the first N blocks of data, thereby reducing the amount of data processing, improving the detection speed, and monitoring the high-speed network. Have better adaptability. The present invention further adopts a multi-classifier system to construct the normal communication profile, which improves the detection accuracy. The invention also discloses a load-based abnormal intrusion detection system, which includes a CPP-based load block module, feature extraction module, detection module and response module. Compared with the prior art, the invention can realize the fast detection of abnormal intrusion of the high-speed network.

Figure 201110424613

Description

Translated fromChinese
一种基于负荷的异常入侵检测方法及系统A load-based abnormal intrusion detection method and system

技术领域technical field

本发明涉及一种异常入侵检测方法,尤其涉及一种基于负荷的异常入侵检测方法及系统,属于计算网络安全技术领域。The invention relates to an abnormal intrusion detection method, in particular to a load-based abnormal intrusion detection method and system, and belongs to the technical field of computing network security.

背景技术Background technique

近年来,随着计算机技术的不断发展,网络规模的不断扩大,入侵行为己经越来越严重的威胁到了计算机系统和网络的安全。入侵就是未经授权蓄意尝试访问信息、篡改信息,使系统不可靠或不能使用。由于入侵方式越来越多样化,手段越来越先进,传统的静态安全技术如:防火墙、数据加密技术等,己经无法满足系统和网络的安全性需求。In recent years, with the continuous development of computer technology and the continuous expansion of network scale, intrusion behaviors have become more and more serious threats to the security of computer systems and networks. Intrusion is a deliberate attempt to access information without authorization, to alter information, and to render a system unreliable or unusable. As the methods of intrusion become more and more diversified and the means are more and more advanced, traditional static security technologies such as firewalls and data encryption technologies cannot meet the security requirements of systems and networks.

入侵检测技术作为一种重要的动态安全技术,很好地弥补了静态安全技术的不足。入侵检测技术主要分为两类:误用入侵检测和异常入侵检测。误用入侵检测是指利用已知系统和应用软件的弱点攻击模式来检测入侵。由于该技术主要是依赖于已知的系统缺陷和入侵,所以可以准确的检测到已知的入侵,但无法检测到系统未知的攻击行为。异常入侵检测是指能够根据异常行为和使用计算机资源情况检测出来的入侵。异常入侵检测试图用定量方式描述可接受的行为特征,以区分非正常的、潜在的入侵性行为。该方法可以检测未知的入侵行为,但是由于描述的可接受行为特征可能与实际情况偏差较大导致检测的准确性不高。As an important dynamic security technology, intrusion detection technology makes up for the deficiency of static security technology. Intrusion detection techniques are mainly divided into two categories: misuse intrusion detection and anomaly intrusion detection. Misuse intrusion detection refers to the detection of intrusions by exploiting known system and application software weakness attack patterns. Since this technology mainly relies on known system flaws and intrusions, it can accurately detect known intrusions, but cannot detect unknown system attacks. Abnormal intrusion detection refers to intrusions that can be detected based on abnormal behavior and the use of computer resources. Anomaly intrusion detection attempts to describe acceptable behavior characteristics in a quantitative way to distinguish abnormal and potentially invasive behaviors. This method can detect unknown intrusion behaviors, but the accuracy of detection is not high because the described acceptable behavior characteristics may deviate greatly from the actual situation.

在异常入侵检测中,有研究表明误警率过高是其真正的限制因素。基于负荷的异常入侵检测系统能够精确地检测将恶意数据保存在数据包负荷中的网络攻击,但是在使用网络数据包的负荷来进行异常检测时,通常面临一个问题:即有时网络数据包的负荷很大,如端口21和端口80上的网络数据包的负荷。如果使用网络数据包100%的负荷来进行建模,则所得到的异常入侵检测系统就很难适用于监视高速网络。In anomaly intrusion detection, some studies have shown that the high false alarm rate is the real limiting factor. The load-based anomaly intrusion detection system can accurately detect network attacks that store malicious data in the data packet payload, but when using the load of the network data packet for anomaly detection, it usually faces a problem: that is, sometimes the load of the network data packet Large, such as loads of network packets on ports 21 and 80. If 100% load of network packets is used for modeling, the obtained anomaly intrusion detection system is difficult to be suitable for monitoring high-speed networks.

基于负荷的异常入侵检测是近年发展起来的一种新的入侵检测方法,目前已经取得了一定的进展。Wang和Stolfo等提出了基于负荷的网络异常入侵检测系统PAYL,PAYL计算

Figure 2011104246134100002DEST_PATH_IMAGE001
(
Figure 455142DEST_PATH_IMAGE002
的一种,
Figure 2011104246134100002DEST_PATH_IMAGE003
个连续的字节,在时即为)在负荷中的发生频率,以此为特征,对每一个不同长度的数据包建立一个正常通信行为轮廓。PAYL的正常通信轮廓是
Figure 703644DEST_PATH_IMAGE006
的发生频率均值和标准差,进行检测时,若待检测数据包的简单马氏距离超出一定门限,则就判定该数据包异常。PAYL能够有效的检测各种攻击。Perdisci,Lee等人提出了一个使用多分类器系统提高基于有效负荷的异常检测系统检测率的方案(McPAD)。McPAD使用MCS(Multiple Classifier System,多分类器系统)来提高基于有效负荷的异常检测的检测率,其采用多个单类分类器来构建正常通信轮廓,以提高检测准确率。在检测时,通过特征提取,得到在不同特征空间上对同一个数据包的描述,然后把每一个特征空间作为相应的代表正常通信轮廓的单类分类器的输入,来对数据包进行分类。最后综合多个单类分类器的输出,对数据包异常与否做出最终判定。实验结果表明,McPAD在检测将恶意数据保存在数据包负荷中的网络攻击时,能够在较低的误警率下得到很高的检测率;而且,在检测诸如多态混合攻击这样的高级攻击时,McPAD也能在相对较低的误警率下,得到较高的检测率。Zhang等提出使用降噪模糊支持向量机(noise against fuzzy support vector machine)来改进PAYL和McPAD,其主要解决McPAD等在检测多态混合攻击时准确率较低的问题,借助于降噪模糊支持向量机获得了更好的检测效果。但是,上述基于负荷的异常检测系统在监视高速、高带宽的网络时,在数据包负荷较大的情况下不能有效地进行检测。Load-based anomaly intrusion detection is a new intrusion detection method developed in recent years, and has made some progress. Wang and Stolfo proposed a load-based network anomaly intrusion detection system PAYL, PAYL calculation
Figure 2011104246134100002DEST_PATH_IMAGE001
(
Figure 455142DEST_PATH_IMAGE002
kind of
Figure 2011104246134100002DEST_PATH_IMAGE003
consecutive bytes, in time is ) in the load, as a feature, to establish a normal communication behavior profile for each data packet of different length. The normal communication profile of PAYL is
Figure 703644DEST_PATH_IMAGE006
When performing detection, if the simple Mahalanobis distance of the data packet to be detected exceeds a certain threshold, it is determined that the data packet is abnormal. PAYL can effectively detect various attacks. Perdisci, Lee et al. proposed a scheme to improve the detection rate of payload-based anomaly detection systems using a multi-classifier system (McPAD). McPAD uses MCS (Multiple Classifier System, multi-classifier system) to improve the detection rate of payload-based anomaly detection, which uses multiple single-class classifiers to construct normal communication profiles to improve detection accuracy. During detection, the description of the same data packet in different feature spaces is obtained through feature extraction, and then each feature space is used as the input of the corresponding single-class classifier representing the normal communication profile to classify the data packet. Finally, the output of multiple single-class classifiers is integrated to make a final judgment on whether the data packet is abnormal or not. Experimental results show that McPAD can achieve a high detection rate at a low false alarm rate when detecting network attacks that store malicious data in packet payloads; When , McPAD can also get a higher detection rate at a relatively low false alarm rate. Zhang et al. proposed to use noise-reduction fuzzy support vector machine (noise against fuzzy support vector machine) to improve PAYL and McPAD. The machine has obtained a better detection effect. However, the above-mentioned load-based anomaly detection system cannot effectively detect when the data packet load is large when monitoring a high-speed, high-bandwidth network.

发明内容Contents of the invention

本发明所要解决的技术问题在于克服现有基于负荷的异常入侵检测方法难以对高速网络中的数据包进行快速检测的不足,提供一种基于负荷的异常入侵检测方法,可以在保证检测准确率的前提下,对高速网络中的数据包进行快速检测。The technical problem to be solved by the present invention is to overcome the deficiency that the existing load-based abnormal intrusion detection method is difficult to quickly detect the data packets in the high-speed network, and provide a load-based abnormal intrusion detection method that can ensure the accuracy of detection Under the premise, fast detection of data packets in the high-speed network.

本发明具体采用以下技术方案解决上述技术问题:The present invention specifically adopts the following technical solutions to solve the above technical problems:

一种基于负荷的异常入侵检测方法,包括以下步骤:A load-based abnormal intrusion detection method, comprising the following steps:

步骤A、预先训练得到正常通信轮廓;Step A, pre-training to obtain a normal communication profile;

步骤B、对待检测数据包进行特征提取;Step B, performing feature extraction on the data packet to be detected;

步骤C、利用正常通信轮廓,根据待检测数据包的特征进行检测,判断待检测数据包是否为异常数据包;Step C, using the normal communication profile to detect according to the characteristics of the data packet to be detected, and determine whether the data packet to be detected is an abnormal data packet;

在训练得到正常通信轮廓时,首先利用CPP算法对训练数据包进行分块;然后仅对分块后的前N块进行特征提取;然后根据提取出的特征样本,训练得到正常通信轮廓;When training to obtain the normal communication profile, first use the CPP algorithm to block the training data packet; then only perform feature extraction on the firstN blocks after the block; then, according to the extracted feature samples, train to obtain the normal communication profile;

在对待检测数据包进行特征提取前,先利用CPP算法对待检测数据包进行分块,然后仅使用分块后的前N块来提取特征;Before performing feature extraction on the data packet to be detected, first use the CPP algorithm to block the data packet to be detected, and then only use the firstN blocks after the block to extract features;

其中,N为小于数据包分块总数的整数。Wherein,N is an integer less than the total number of data packet blocks.

进一步地,所述特征提取采用方法,具体为:按照一组变化的整数v值,计算在数据包负荷中相距v字节的字符对的发生频率,得到该数据包在多个特征空间的特征,一个v值对应一个特征空间;所述正常通信轮廓由多个与所述特征空间一一对应的单类分类器构成,每个单类分类器均通过在其所对应的特征空间中训练得到。Further, the feature extraction adopts The method is specifically: according to a set of changing integerv values, calculate the occurrence frequency of character pairs that are apart fromv bytes in the data packet load, and obtain the characteristics of the data packet in multiple feature spaces, onev value corresponds to one feature space ; The normal communication profile is composed of a plurality of single-class classifiers corresponding to the feature space one by one, and each single-class classifier is obtained by training in its corresponding feature space.

更进一步地,所述单类分类器具体按照以下方法训练得到:首先对从该单类分类器所对应的特征空间中提取的特征样本进行聚类;然后在每一个簇内挑选距簇中心较近的特征样本;以挑选出的特征样本为训练样本集对该单类分类器进行训练。Furthermore, the single-class classifier is specifically trained according to the following method: first, cluster the feature samples extracted from the feature space corresponding to the single-class classifier; The nearest feature samples; the single-class classifier is trained with the selected feature samples as the training sample set.

优选地,所述在每一个簇内挑选距簇中心较近的特征样本,具体按照以下方法:判断该簇中的样本数是否大于一预先设定的阈值,如是,选择该簇中距离中心较近的前

Figure 561748DEST_PATH_IMAGE008
个样本;如否,则选择该簇中距离中心较近的前
Figure 2011104246134100002DEST_PATH_IMAGE009
个样本;其中
Figure 46824DEST_PATH_IMAGE008
Figure 995189DEST_PATH_IMAGE009
均为预设的整数,且。Preferably, the selection of feature samples that are closer to the center of the cluster in each cluster is specifically in accordance with the following method: determine whether the number of samples in the cluster is greater than a preset threshold, and if so, select a feature sample that is closer to the center of the cluster. near front
Figure 561748DEST_PATH_IMAGE008
samples; if not, select the top of the cluster that is closer to the center
Figure 2011104246134100002DEST_PATH_IMAGE009
samples; of which
Figure 46824DEST_PATH_IMAGE008
and
Figure 995189DEST_PATH_IMAGE009
are preset integers, and .

根据本发明的还可以得到一种基于负荷的异常入侵检测系统,该系统包括:According to the present invention, a load-based abnormal intrusion detection system can also be obtained, and the system includes:

基于CPP的负荷分块模块,利用CPP算法对待检测数据包进行分块,然后将前N块数据交给特征提取模块处理,其中,N为小于数据包分块总数的整数;The load block module based on CPP utilizes the CPP algorithm to block the data packet to be detected, and then hands the firstN blocks of data to the feature extraction module for processing, whereinN is an integer less than the total number of blocks of the data packet;

特征提取模块,用于提取分块后的待检测数据包的前N块数据的特征,并将提取的特征发送给检测模块;所述特征提取采用

Figure 934643DEST_PATH_IMAGE007
方法,具体为:按照一组变化的整数v值,计算在数据包负荷中相距v字节的字符对的发生频率,得到该数据包在多个特征空间的特征,一个v值对应一个特征空间;The feature extraction module is used to extract the feature of the firstN block data of the data packet to be detected after the block, and sends the extracted feature to the detection module; the feature extraction adopts
Figure 934643DEST_PATH_IMAGE007
The method is specifically: according to a set of changing integerv values, calculate the occurrence frequency of character pairs that are apart fromv bytes in the data packet load, and obtain the characteristics of the data packet in multiple feature spaces, onev value corresponds to one feature space ;

检测模块,根据特征提取模块提取的特征,利用预先训练得到的正常通信行为轮廓来对待检测数据包进行分类,如果将待检测数据包分类为异常,则把该数据包发送给响应模块处理;否则,进行下一个数据包的检测;所述正常通信轮廓由多个与所述特征空间一一对应的单类分类器构成,每个单类分类器均通过在其所对应的特征空间上训练得到;所述单类分类器具体按照以下方法训练得到:首先对从该单类分类器所对应的特征空间中提取的特征样本进行聚类;然后在每一个簇内挑选距簇中心较近的特征样本;以挑选出的特征样本为训练样本集对该单类分类器进行训练;The detection module, according to the features extracted by the feature extraction module, uses the pre-trained normal communication behavior profile to classify the data packets to be detected, if the data packets to be detected are classified as abnormal, the data packets are sent to the response module for processing; otherwise , to detect the next data packet; the normal communication profile is composed of a plurality of single-class classifiers corresponding to the feature space one by one, and each single-class classifier is obtained by training on its corresponding feature space ; The single-class classifier is specifically trained according to the following method: first, the feature samples extracted from the feature space corresponding to the single-class classifier are clustered; then in each cluster, select the feature closer to the center of the cluster Sample; the single-class classifier is trained with the selected feature samples as the training sample set;

响应模块,用于对检测模块判定为异常的数据包做出响应,记录数据包的相应信息,发出报警。The response module is used to respond to the data packets judged to be abnormal by the detection module, record corresponding information of the data packets, and issue an alarm.

相比现有技术,本发明具有以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:

本发明由于采用了CPP算法对数据包进行分块,并且仅使用部分负荷进行检测,所以减少了数据处理量,提高检测速度,对高速网络的监视有更好的适应性;同时,由于采用多分类器系统构建正常通信轮廓,提高了检测的准确率。Since the present invention adopts the CPP algorithm to block the data packet and only uses part of the load for detection, the amount of data processing is reduced, the detection speed is improved, and the monitoring of the high-speed network has better adaptability; at the same time, due to the use of multiple The classifier system constructs the normal communication profile, which improves the detection accuracy.

附图说明Description of drawings

图1为本发明的异常入侵检测系统的结构示意图;Fig. 1 is a schematic structural diagram of an abnormal intrusion detection system of the present invention;

图2为CPP算法流程图;Fig. 2 is the flow chart of CPP algorithm;

图3为本发明中正常通信轮廓的构建原理图;Fig. 3 is a construction principle diagram of a normal communication profile in the present invention;

图4为改进的ISUC算法流程图。Figure 4 is a flowchart of the improved ISUC algorithm.

具体实施方式Detailed ways

下面结合附图对本发明的技术方案进行详细说明:The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

本发明的基于负荷的异常入侵检测系统,如图1所示,包括:The load-based abnormal intrusion detection system of the present invention, as shown in Figure 1, includes:

基于CPP的负荷分块模块,利用CPP算法对待检测数据包进行分块,然后将前N块数据交给特征提取模块处理,其中,N为小于数据包分块总数的整数;The load block module based on CPP utilizes the CPP algorithm to block the data packet to be detected, and then hands the firstN blocks of data to the feature extraction module for processing, whereinN is an integer less than the total number of blocks of the data packet;

特征提取模块,用于提取分块后的待检测数据包的前N块数据的特征,并将提取的特征发送给检测模块;所述特征提取采用方法,具体为:按照一组变化的整数v值,计算在数据包负荷中相距v字节的字符对的发生频率,得到该数据包在多个特征空间的特征,一个v值对应一个特征空间;The feature extraction module is used to extract the feature of the firstN block data of the data packet to be detected after the block, and sends the extracted feature to the detection module; the feature extraction adopts The method is specifically: according to a set of changing integerv values, calculate the occurrence frequency of character pairs that are apart fromv bytes in the data packet load, and obtain the characteristics of the data packet in multiple feature spaces, onev value corresponds to one feature space ;

检测模块,根据特征提取模块提取的特征,利用预先训练得到的正常通信行为轮廓来对待检测数据包进行分类,如果将待检测数据包分类为异常,则把该数据包发送给响应模块处理;否则,进行下一个数据包的检测;所述正常通信轮廓由多个与所述特征空间一一对应的单类分类器构成,每个单类分类器均通过在其所对应的特征空间上训练得到;所述单类分类器具体按照以下方法训练得到:首先对从该单类分类器所对应的特征空间中提取的特征样本进行聚类;然后在每一个簇内挑选距簇中心较近的特征样本;以挑选出的特征样本为训练样本集对该单类分类器进行训练;The detection module, according to the features extracted by the feature extraction module, uses the pre-trained normal communication behavior profile to classify the data packets to be detected, if the data packets to be detected are classified as abnormal, the data packets are sent to the response module for processing; otherwise , to detect the next data packet; the normal communication profile is composed of a plurality of single-class classifiers corresponding to the feature space one by one, and each single-class classifier is obtained by training on its corresponding feature space ; The single-class classifier is specifically trained according to the following method: first, the feature samples extracted from the feature space corresponding to the single-class classifier are clustered; then in each cluster, select the feature closer to the center of the cluster Sample; the single-class classifier is trained with the selected feature samples as the training sample set;

响应模块,用于对检测模块判定为异常的数据包做出响应,记录数据包的相应信息,发出报警。The response module is used to respond to the data packets judged to be abnormal by the detection module, record corresponding information of the data packets, and issue an alarm.

     下面结合上述异常入侵检测系统对本发明的异常检测方法进行进一步说明。Below, the anomaly detection method of the present invention will be further described in conjunction with the above-mentioned anomaly intrusion detection system.

  基于CPP的负荷分块模块:进行分块的目的是减少特征提取阶段所处理的数据量,将负荷分块后就可以只使用部分分块来提取特征。本发明采用CPP算法来对数据包进行分块。CPP算法为现有技术,详细内容可参考见文献(Athicha Muthitacharoen, Benjie Chen and David Mazieres. A low-bandwidth network file system. Symposium on Operating Systems Principles, 2001, 174-187.),其流程如图4所示。CPP根据负荷的内容来决定分块边界,它使用莱宾指纹(Rabin fingerprinting)来判定一个分块的结束;在一个长为

Figure 2011104246134100002DEST_PATH_IMAGE011
字节的滑动窗口上,CPP计算一系列的莱宾指纹
Figure 196921DEST_PATH_IMAGE012
,它从有效负荷的前
Figure 148827DEST_PATH_IMAGE011
字节开始计算,然后向着负荷的尾部每次滑动一个字节,以计算后续的莱宾指纹。当
Figure 43840DEST_PATH_IMAGE012
的值等于预先设定的停止标准
Figure 2011104246134100002DEST_PATH_IMAGE013
时,就判定当前分块结束,并开始下一分块的计算。这一过程可以描述如下,假设有一个字节序列
Figure 916725DEST_PATH_IMAGE014
,则对于一个长度为的子序列
Figure 715048DEST_PATH_IMAGE016
,它的莱宾指纹可由(1)式来计算:CPP-based load block module: The purpose of block is to reduce the amount of data processed in the feature extraction stage. After the load is block, only part of the block can be used to extract features. The invention adopts the CPP algorithm to divide the data packets into blocks. The CPP algorithm is an existing technology. For details, please refer to the literature (Athicha Muthitacharoen, Benjie Chen and David Mazieres. A low-bandwidth network file system. Symposium on Operating Systems Principles, 2001, 174-187.), the flow chart is shown in Figure 4 shown. CPP determines the block boundary according to the content of the load. It uses Rabin fingerprinting (Rabin fingerprinting) to determine the end of a block;
Figure 2011104246134100002DEST_PATH_IMAGE011
Over a sliding window of bytes, the CPP computes a series of Lebin fingerprints
Figure 196921DEST_PATH_IMAGE012
, which starts from the payload's previous
Figure 148827DEST_PATH_IMAGE011
The bytes start counting, and then slide toward the end of the payload one byte at a time to compute subsequent Lebin fingerprints. when
Figure 43840DEST_PATH_IMAGE012
The value of is equal to the preset stopping criterion
Figure 2011104246134100002DEST_PATH_IMAGE013
When , it is judged that the current block is over, and the calculation of the next block is started. This process can be described as follows, assuming a sequence of bytes
Figure 916725DEST_PATH_IMAGE014
, then for a length of subsequence of
Figure 715048DEST_PATH_IMAGE016
, its Lebbing fingerprint It can be calculated by formula (1):

Figure 398708DEST_PATH_IMAGE018
                   (1)
Figure 398708DEST_PATH_IMAGE018
(1)

其中的

Figure 2011104246134100002DEST_PATH_IMAGE019
Figure 781016DEST_PATH_IMAGE020
都是常量,滑动窗口的长度需要通过实验寻找最优值,在本发明方法中,
Figure 549569DEST_PATH_IMAGE011
的值取32时,实验结果会较好。当
Figure 2011104246134100002DEST_PATH_IMAGE021
的值在550~600(选取的停止标准
Figure 365251DEST_PATH_IMAGE013
)时,就结束当前的分块,然后开始一个新的分块;否则,就把当前的比特加入到当前分块,并把窗口向后滑动一个比特,来计算新的莱宾指纹。one of them
Figure 2011104246134100002DEST_PATH_IMAGE019
and
Figure 781016DEST_PATH_IMAGE020
are constants, the length of the sliding window Need to find the optimal value by experiment, in the method of the present invention,
Figure 549569DEST_PATH_IMAGE011
When the value of is 32, the experimental results will be better. when
Figure 2011104246134100002DEST_PATH_IMAGE021
The value is between 550~600 (chosen stop standard
Figure 365251DEST_PATH_IMAGE013
), end the current block, and then start a new block; otherwise, add the current bit to the current block, and slide the window back one bit to calculate a new Lebin fingerprint.

特征提取模块:对从基于CPP的负荷分块模块获得的数据包的前

Figure 595375DEST_PATH_IMAGE022
块后,就进行特征提取,特征提取采用
Figure 2011104246134100002DEST_PATH_IMAGE023
方法,
Figure 764057DEST_PATH_IMAGE023
方法计算负荷中相距为
Figure 396027DEST_PATH_IMAGE024
(=0, 1, 2, …)字节的字符对的发生频率,在不同
Figure 359172DEST_PATH_IMAGE024
值下得到的
Figure 342172DEST_PATH_IMAGE026
分布率,给出了关于一个数据包不同的结构信息,通过融合使用不同的
Figure 675064DEST_PATH_IMAGE025
值提取的信息,我们可以重构(或者部分重构)直接使用
Figure DEST_PATH_IMAGE027
技术在
Figure 535442DEST_PATH_IMAGE028
时所提取的信息。对于一个固定的
Figure 561167DEST_PATH_IMAGE025
值,
Figure 264418DEST_PATH_IMAGE023
计算字母对的发生频率时,使用的是一个长度为
Figure DEST_PATH_IMAGE029
的滑动窗口,但是并不关心首字节和尾字节之间的
Figure 276368DEST_PATH_IMAGE025
个字节的值,把这
Figure 115885DEST_PATH_IMAGE025
字节看成空白。假设有一个数据包负荷
Figure 312512DEST_PATH_IMAGE030
,这里
Figure DEST_PATH_IMAGE031
Figure 942207DEST_PATH_IMAGE032
中位置
Figure DEST_PATH_IMAGE033
处的字节值;则一个g,
Figure 451872DEST_PATH_IMAGE034
(
Figure DEST_PATH_IMAGE035
)在
Figure 193301DEST_PATH_IMAGE032
中的发生频率可以由(2)式来计算:Feature extraction module: For the front of the data packet obtained from the CPP-based payload block module
Figure 595375DEST_PATH_IMAGE022
After the block, feature extraction is performed, and the feature extraction uses
Figure 2011104246134100002DEST_PATH_IMAGE023
method,
Figure 764057DEST_PATH_IMAGE023
The method calculates the distance in the load as
Figure 396027DEST_PATH_IMAGE024
( =0, 1, 2, ...) The occurrence frequency of character pairs of bytes, in different
Figure 359172DEST_PATH_IMAGE024
value obtained under
Figure 342172DEST_PATH_IMAGE026
distribution rate, which gives information about the different structures of a packet, by fusing different
Figure 675064DEST_PATH_IMAGE025
Value extraction information, we can reconstruct (or partially reconstruct) directly use
Figure DEST_PATH_IMAGE027
technology in
Figure 535442DEST_PATH_IMAGE028
information extracted at the time. for a fixed
Figure 561167DEST_PATH_IMAGE025
value,
Figure 264418DEST_PATH_IMAGE023
When calculating the frequency of letter pairs, a length of
Figure DEST_PATH_IMAGE029
sliding window, but don't care about the gap between the first byte and the last byte
Figure 276368DEST_PATH_IMAGE025
byte value, put this
Figure 115885DEST_PATH_IMAGE025
Bytes are treated as blanks. Suppose there is a packet payload
Figure 312512DEST_PATH_IMAGE030
,here
Figure DEST_PATH_IMAGE031
yes
Figure 942207DEST_PATH_IMAGE032
middle position
Figure DEST_PATH_IMAGE033
the byte value at; then a g,
Figure 451872DEST_PATH_IMAGE034
(
Figure DEST_PATH_IMAGE035
)exist
Figure 193301DEST_PATH_IMAGE032
The frequency of occurrence in can be calculated by formula (2):

Figure 107030DEST_PATH_IMAGE036
                        (2)
Figure 107030DEST_PATH_IMAGE036
(2)

Figure DEST_PATH_IMAGE037
Figure 959317DEST_PATH_IMAGE032
中的出现次数,由长度为
Figure 540471DEST_PATH_IMAGE011
的滑动窗口来计算;
Figure 311856DEST_PATH_IMAGE038
是窗口在
Figure 916144DEST_PATH_IMAGE032
上总共滑行的次数,可以看作是对概率
Figure 368860DEST_PATH_IMAGE040
(在
Figure 804520DEST_PATH_IMAGE032
中找到
Figure 248271DEST_PATH_IMAGE037
的概率)的估计;这样,
Figure 402172DEST_PATH_IMAGE023
Figure DEST_PATH_IMAGE041
的发生频率就可以由(3)式来计算:
Figure DEST_PATH_IMAGE037
exist
Figure 959317DEST_PATH_IMAGE032
The number of occurrences in , given by length
Figure 540471DEST_PATH_IMAGE011
The sliding window to calculate;
Figure 311856DEST_PATH_IMAGE038
is the window in
Figure 916144DEST_PATH_IMAGE032
The total number of slides on the can be viewed as a probability
Figure 368860DEST_PATH_IMAGE040
(exist
Figure 804520DEST_PATH_IMAGE032
found in
Figure 248271DEST_PATH_IMAGE037
The probability of ) is estimated; thus,
Figure 402172DEST_PATH_IMAGE023
Figure DEST_PATH_IMAGE041
The frequency of occurrence can be calculated by formula (3):

Figure DEST_PATH_IMAGE043
                    (3)
Figure DEST_PATH_IMAGE043
(3)

(3)式可以这样解释:在有效负荷中相距字节的字母对

Figure 322647DEST_PATH_IMAGE041
的发生频率,是以开始
Figure DEST_PATH_IMAGE045
结尾的所有的
Figure 952397DEST_PATH_IMAGE046
的发生频率的和。根据
Figure 310697DEST_PATH_IMAGE025
值的不同,可以得到对一个数据包在不同的特征空间的描述;假设
Figure 720950DEST_PATH_IMAGE025
的取值分别为
Figure DEST_PATH_IMAGE047
,则就得到在
Figure 880405DEST_PATH_IMAGE048
个特征空间上对数据包的描述,也就是得到在
Figure 743319DEST_PATH_IMAGE048
个特征空间中的特征。Equation (3) can be interpreted as follows: In the payload, the distance letter pairs of bytes
Figure 322647DEST_PATH_IMAGE041
The frequency of occurrence is start
Figure DEST_PATH_IMAGE045
all at the end
Figure 952397DEST_PATH_IMAGE046
and the frequency of occurrence. according to
Figure 310697DEST_PATH_IMAGE025
With different values, you can get a description of a data packet in different feature spaces; assuming
Figure 720950DEST_PATH_IMAGE025
The values are respectively
Figure DEST_PATH_IMAGE047
, then you get in
Figure 880405DEST_PATH_IMAGE048
A description of the data packet in a feature space, that is, obtained in
Figure 743319DEST_PATH_IMAGE048
features in a feature space.

 检测模块:根据特征提取模块提取的特征,利用预先训练得到的正常通信行为轮廓来对待检测数据包进行分类,如果将待检测数据包分类为异常,则把该数据包发送给响应模块处理;否则,进行下一个数据包的检测。本发明的正常通信轮廓采用多分类器系统。当融合的多个分类器是“多样化”的分类器时,多分类器系统就能获得准确率的提高。一种产生多样化的方法是使多分类器系统的每个分类器基于对模式在不同特征空间上的描述。本发明中得到对一个数据包在不同特征空间上的描述,即特征提取,是通过

Figure DEST_PATH_IMAGE049
方法来实现的。在使用
Figure 279211DEST_PATH_IMAGE023
进行特征提取之后,根据
Figure 941309DEST_PATH_IMAGE025
值(假设有
Figure 163343DEST_PATH_IMAGE050
个不同的值)的不同,可以得到对同一个数据包进行描述的个不同的特征空间;在每一个特征空间上训练得到一个单类分类器,本具体实施方式中采用支持向量机(SVM),这样就得到个在不同特征空间上描述的正常通信轮廓,其原理如图3所示。其中多分类器中的每一个单类分类器由改进的ISUC算法训练得到。本发明对ISUC算法(参见文献李晓黎, 刘继敏, 史忠植. 基于支持向量机与无监督聚类相结合的中文网页分类器. 计算机学报, 2001, 24(1):62-68.)的改进主要有以下两个方面:(1)放弃使用两个分类器来进行检测,仅使用单类SVM来构建正常通信轮廓,这是因为异常入侵检测中较高的虚警率是不可接受的,因此放弃使用分类准确率较低的UC分类。(2)使用k-means、CURE、模糊K-均值等聚类算法对训练样本进行聚类,本具体实施方式中采用UC算法聚类;然后使用簇中心来对训练样本进行挑选,在每一个簇内挑选距簇中心较近的样本来训练单类SVM,挑选规则如下:
Figure DEST_PATH_IMAGE051
选取距簇中心较近的样本进行训练;同时考虑簇的大小,并根据簇的大小,合理调整每个簇挑选出的样本数目,较大的簇选出较多的样本,而较小的簇挑选较少的样本。具体而言,就是在每一个簇内挑选距簇中心较近的特征样本时,按照以下方法:判断该簇中的样本数是否大于一预先设定的阈值,如是,选择该簇中距离中心较近的前
Figure 473659DEST_PATH_IMAGE008
个样本;如否,则选择该簇中距离中心较近的前
Figure 311165DEST_PATH_IMAGE009
个样本;其中
Figure 814959DEST_PATH_IMAGE008
均为预设的整数,且
Figure 851103DEST_PATH_IMAGE010
。当然,也可以采用更简单的不考虑簇的大小,从每个簇中挑选相同数目的距簇中心较近的特征样本。如图4所示,本发明改进的ISUC算法流程如下:Detection module: According to the features extracted by the feature extraction module, the pre-trained normal communication behavior profile is used to classify the data packets to be detected. If the data packets to be detected are classified as abnormal, the data packets are sent to the response module for processing; otherwise , to detect the next data packet. The normal communication profile of the present invention employs a multi-classifier system. When the multiple classifiers fused are "diversified" classifiers, the multi-classifier system can achieve an increase in accuracy. One way to generate diversity is to base each classifier of a multi-classifier system on a description of the pattern on a different feature space. In the present invention, the description of a data packet in different feature spaces, that is, feature extraction, is obtained through
Figure DEST_PATH_IMAGE049
method to achieve. In use
Figure 279211DEST_PATH_IMAGE023
After feature extraction, according to
Figure 941309DEST_PATH_IMAGE025
value (assuming
Figure 163343DEST_PATH_IMAGE050
different values), you can get the description of the same data packet different feature spaces; a single-class classifier is trained on each feature space, and a support vector machine (SVM) is used in this specific implementation, so that it is obtained A normal communication profile described on different feature spaces, the principle of which is shown in Figure 3. Each single-class classifier in the multi-classifier is trained by the improved ISUC algorithm. The present invention improves the ISUC algorithm (see literature Li Xiaoli, Liu Jimin, Shi Zhongzhi. Chinese web page classifier based on the combination of support vector machine and unsupervised clustering. Journal of Computer Science, 2001, 24(1):62-68.) mainly includes The following two aspects: (1) Abandon the use of two classifiers for detection, and only use a single-class SVM to construct the normal communication profile. This is because the high false alarm rate in abnormal intrusion detection is unacceptable, so the use of UC classification with low classification accuracy. (2) Clustering algorithms such as k-means, CURE, fuzzy K-means are used to cluster the training samples, in this embodiment, the UC algorithm is used for clustering; then the cluster centers are used to select the training samples, and in each Select samples closer to the cluster center in the cluster to train the single-class SVM. The selection rules are as follows:
Figure DEST_PATH_IMAGE051
Select samples closer to the cluster center for training; At the same time, the size of the clusters is considered, and according to the size of the clusters, the number of samples selected by each cluster is reasonably adjusted. Larger clusters select more samples, while smaller clusters select fewer samples. Specifically, when selecting feature samples that are closer to the center of each cluster in each cluster, the following method is used: determine whether the number of samples in the cluster is greater than a preset threshold, and if so, select the feature sample that is closer to the center of the cluster. near front
Figure 473659DEST_PATH_IMAGE008
samples; if not, select the top of the cluster that is closer to the center
Figure 311165DEST_PATH_IMAGE009
samples; of which
Figure 814959DEST_PATH_IMAGE008
and are preset integers, and
Figure 851103DEST_PATH_IMAGE010
. Of course, it is also possible to select the same number of feature samples closer to the center of the cluster from each cluster without considering the size of the cluster. As shown in Figure 4, the improved ISUC algorithm process of the present invention is as follows:

Step1.,

Figure 113588DEST_PATH_IMAGE054
.Step1. ,
Figure 113588DEST_PATH_IMAGE054
.

Step2. 如果, 执行Step6, 其中为聚簇后的簇中心数目.Step2. If , execute Step6, where is the number of cluster centers after clustering.

Step3. 在簇

Figure DEST_PATH_IMAGE057
中寻找据簇中心
Figure 59471DEST_PATH_IMAGE058
较近的所有样本
Figure DEST_PATH_IMAGE059
, 如果簇的样本数大于
Figure 278411DEST_PATH_IMAGE020
(指定的判断较大簇的标准), 则判断样本距
Figure 888122DEST_PATH_IMAGE058
较近的标准为
Figure DEST_PATH_IMAGE061
, 否则,判断标准为
Figure 774169DEST_PATH_IMAGE062
, 其中
Figure 679808DEST_PATH_IMAGE010
.Step3. In the cluster
Figure DEST_PATH_IMAGE057
Find the data cluster center
Figure 59471DEST_PATH_IMAGE058
All recent samples
Figure DEST_PATH_IMAGE059
, if the cluster The sample size is greater than
Figure 278411DEST_PATH_IMAGE020
(the specified criterion for judging larger clusters), then judge the sample distance
Figure 888122DEST_PATH_IMAGE058
The closest standard is
Figure DEST_PATH_IMAGE061
, otherwise, the judgment standard is
Figure 774169DEST_PATH_IMAGE062
, in
Figure 679808DEST_PATH_IMAGE010
.

Step4.

Figure DEST_PATH_IMAGE063
.Step4.
Figure DEST_PATH_IMAGE063
.

Step5.

Figure 87525DEST_PATH_IMAGE064
, 执行Step2.Step5.
Figure 87525DEST_PATH_IMAGE064
, Execute Step2.

Step6. 用挑选的样本集

Figure DEST_PATH_IMAGE065
训练得到最终的单类SVM.Step6. Use the selected sample set
Figure DEST_PATH_IMAGE065
Train to get the final one-class SVM.

具体的检测过程为:将在不同

Figure 907451DEST_PATH_IMAGE024
值下提取的特征空间中的特征,交给正常通信轮廓中相应的单类SVM(即在不同特征空间上训练得到的正常通信轮廓)进行分类,最后融合多个单类分类器对数据包的分类结果做出数据包异常与否的最终判定。The specific detection process is: will be in different
Figure 907451DEST_PATH_IMAGE024
The features in the feature space extracted under the value are given to the corresponding single-class SVM in the normal communication profile (that is, the normal communication profile trained on different feature spaces) for classification, and finally multiple single-class classifiers are fused to classify the data packets. The classification result makes the final judgment of whether the data packet is abnormal or not.

响应模块:对检测模块判定为异常的数据包做出响应,记录数据包的相应信息,并发出报警。Response module: respond to the data packets judged to be abnormal by the detection module, record the corresponding information of the data packets, and issue an alarm.

Claims (6)

Translated fromChinese
1.一种基于负荷的异常入侵检测方法,包括以下步骤:步骤A、预先训练得到正常通信轮廓;步骤B、对待检测数据包进行特征提取;步骤C、利用正常通信轮廓,根据待检测数据包的特征进行检测,判断待检测数据包是否为异常数据包;其特征在于,1. A load-based abnormal intrusion detection method, comprising the following steps: step A, pre-training to obtain a normal communication profile; step B, performing feature extraction on a data packet to be detected; step C, utilizing the normal communication profile, The feature is detected, and it is judged whether the data packet to be detected is an abnormal data packet; it is characterized in that,在训练得到正常通信轮廓时,首先利用CPP算法对训练数据包进行分块;然后仅对分块后的前N块进行特征提取;然后根据提取出的特征样本,训练得到正常通信轮廓;When training to obtain the normal communication profile, first use the CPP algorithm to block the training data packet; then only perform feature extraction on the firstN blocks after the block; then, according to the extracted feature samples, train to obtain the normal communication profile;在对待检测数据包进行特征提取前,先利用CPP算法对待检测数据包进行分块,然后仅使用分块后的前N块来提取特征;Before performing feature extraction on the data packet to be detected, first use the CPP algorithm to block the data packet to be detected, and then only use the firstN blocks after the block to extract features;其中,N为小于数据包分块总数的整数。Wherein,N is an integer less than the total number of data packet blocks.2.如权利要求1所述基于负荷的异常入侵检测方法,其特征在于,所述特征提取采用
Figure 2011104246134100001DEST_PATH_IMAGE002
方法,具体为:按照一组变化的整数v值,计算在数据包负荷中相距v字节的字符对的发生频率,得到该数据包在多个特征空间的特征,一个v值对应一个特征空间;所述正常通信轮廓由多个与所述特征空间一一对应的单类分类器构成,每个单类分类器均通过在其所对应的特征空间中训练得到。2. the abnormal intrusion detection method based on load as claimed in claim 1, is characterized in that, described feature extraction adopts
Figure 2011104246134100001DEST_PATH_IMAGE002
The method is specifically: according to a set of changing integerv values, calculate the occurrence frequency of character pairs that are apart fromv bytes in the data packet load, and obtain the characteristics of the data packet in multiple feature spaces, onev value corresponds to one feature space ; The normal communication profile is composed of a plurality of single-class classifiers corresponding to the feature space one by one, and each single-class classifier is obtained by training in its corresponding feature space.3.如权利要求2所述基于负荷的异常入侵检测方法,其特征在于,所述单类分类器具体按照以下方法训练得到:首先对从该单类分类器所对应的特征空间中提取的特征样本进行聚类;然后在每一个簇内挑选距簇中心较近的特征样本;以挑选出的特征样本为训练样本集对该单类分类器进行训练。3. load-based abnormal intrusion detection method as claimed in claim 2, is characterized in that, described single-class classifier specifically obtains according to following method training: first extracting from the feature space corresponding to this single-class classifier The samples are clustered; then in each cluster, select the feature samples that are closer to the center of the cluster; use the selected feature samples as the training sample set to train the single-class classifier.4.如权利要求3所述基于负荷的异常入侵检测方法,其特征在于,所述在每一个簇内挑选距簇中心较近的特征样本,具体按照以下方法:判断该簇中的样本数是否大于一预先设定的阈值,如是,选择该簇中距离中心较近的前个样本;如否,则选择该簇中距离中心较近的前
Figure 2011104246134100001DEST_PATH_IMAGE006
个样本;其中
Figure 264658DEST_PATH_IMAGE004
Figure 341199DEST_PATH_IMAGE006
均为预设的整数,且
Figure 2011104246134100001DEST_PATH_IMAGE008
4. The abnormal intrusion detection method based on load as claimed in claim 3, is characterized in that, in each cluster, select the feature samples closer to the center of the cluster, specifically according to the following method: judge whether the number of samples in the cluster is is greater than a preset threshold, if so, select the front of the cluster that is closer to the center samples; if not, select the top of the cluster that is closer to the center
Figure 2011104246134100001DEST_PATH_IMAGE006
samples; of which
Figure 264658DEST_PATH_IMAGE004
and
Figure 341199DEST_PATH_IMAGE006
are preset integers, and
Figure 2011104246134100001DEST_PATH_IMAGE008
.
5.如权利要求1-4任一项所述基于负荷的异常入侵检测方法,其特征在于,在利用CPP算法对数据包进行分块时,滑动窗口的长度取值为32。5. The load-based abnormal intrusion detection method according to any one of claims 1-4, wherein the length of the sliding window is 32 when the data packet is divided into blocks using the CPP algorithm.6.一种基于负荷的异常入侵检测系统,其特征在于,该系统包括:6. A load-based abnormal intrusion detection system, characterized in that the system comprises:基于CPP的负荷分块模块,利用CPP算法对待检测数据包进行分块,然后将前N块数据交给特征提取模块处理,其中,N为小于数据包分块总数的整数;The load block module based on CPP utilizes the CPP algorithm to block the data packet to be detected, and then hands the firstN blocks of data to the feature extraction module for processing, whereinN is an integer less than the total number of blocks of the data packet;特征提取模块,用于提取分块后的待检测数据包的前N块数据的特征,并将提取的特征发送给检测模块;所述特征提取采用
Figure 298528DEST_PATH_IMAGE002
方法,具体为:按照一组变化的整数v值,计算在数据包负荷中相距v字节的字符对的发生频率,得到该数据包在多个特征空间的特征,一个v值对应一个特征空间;
The feature extraction module is used to extract the feature of the firstN block data of the data packet to be detected after the block, and sends the extracted feature to the detection module; the feature extraction adopts
Figure 298528DEST_PATH_IMAGE002
The method is specifically: according to a set of changing integerv values, calculate the occurrence frequency of character pairs that are apart fromv bytes in the data packet load, and obtain the characteristics of the data packet in multiple feature spaces, onev value corresponds to one feature space ;
检测模块,根据特征提取模块提取的特征,利用预先训练得到的正常通信行为轮廓来对待检测数据包进行分类,如果将待检测数据包分类为异常,则把该数据包发送给响应模块处理;否则,进行下一个数据包的检测;所述正常通信轮廓由多个与所述特征空间一一对应的单类分类器构成,每个单类分类器均通过在其所对应的特征空间上训练得到;所述单类分类器具体按照以下方法训练得到:首先对从该单类分类器所对应的特征空间中提取的特征样本进行聚类;然后在每一个簇内挑选距簇中心较近的特征样本;以挑选出的特征样本为训练样本集对该单类分类器进行训练;The detection module, according to the features extracted by the feature extraction module, uses the pre-trained normal communication behavior profile to classify the data packets to be detected, if the data packets to be detected are classified as abnormal, the data packets are sent to the response module for processing; otherwise , to detect the next data packet; the normal communication profile is composed of a plurality of single-class classifiers corresponding to the feature space one by one, and each single-class classifier is obtained by training on its corresponding feature space ; The single-class classifier is specifically trained according to the following method: first, the feature samples extracted from the feature space corresponding to the single-class classifier are clustered; then in each cluster, select the feature closer to the center of the cluster Sample; the single-class classifier is trained with the selected feature samples as the training sample set;响应模块,用于对检测模块判定为异常的数据包做出响应,记录数据包的相应信息,发出报警。The response module is used to respond to the data packets judged to be abnormal by the detection module, record corresponding information of the data packets, and issue an alarm.
CN2011104246134A2011-12-192011-12-19Load-based anomaly intrusion detection method and systemWithdrawnCN102457525A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2011104246134ACN102457525A (en)2011-12-192011-12-19Load-based anomaly intrusion detection method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2011104246134ACN102457525A (en)2011-12-192011-12-19Load-based anomaly intrusion detection method and system

Publications (1)

Publication NumberPublication Date
CN102457525Atrue CN102457525A (en)2012-05-16

Family

ID=46040181

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2011104246134AWithdrawnCN102457525A (en)2011-12-192011-12-19Load-based anomaly intrusion detection method and system

Country Status (1)

CountryLink
CN (1)CN102457525A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103490992A (en)*2013-10-102014-01-01沈阳航空航天大学Instant messaging worm detection method
CN106452829A (en)*2016-01-212017-02-22华南师范大学Intelligent operation and maintenance method and system for cloud computation center based on BCC-KNN
CN110351220A (en)*2018-04-022019-10-18蓝盾信息安全技术有限公司One kind realizing gateway efficient data scanning technique based on packet filtering
CN111294362A (en)*2020-03-162020-06-16湖南大学LDoS attack real-time detection method based on fractal residual error
CN112749035A (en)*2019-10-312021-05-04阿里巴巴集团控股有限公司Anomaly detection method, device and computer readable medium
CN113037553A (en)*2021-03-112021-06-25湖南大学IEC102 protocol communication behavior abnormity detection method and system based on IA-SVM
CN113516162A (en)*2021-04-262021-10-19湖南大学 A traffic anomaly detection method and system for industrial control system based on OCSVM and K-means algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101789885A (en)*2009-01-232010-07-28英业达股份有限公司 Network Intrusion Detection System
CN102201948A (en)*2011-05-272011-09-28北方工业大学Quick matching method for network intrusion detection system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101789885A (en)*2009-01-232010-07-28英业达股份有限公司 Network Intrusion Detection System
CN102201948A (en)*2011-05-272011-09-28北方工业大学Quick matching method for network intrusion detection system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ATHICHA MUTHITACHAROEN等: "A Low-bandwidth Network File System", 《SOSP"01 PROCEEDINGS OF THE EIGHTEENTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES 》, 31 December 2001 (2001-12-31), pages 174 - 187*
ROBERTO PERDISCI等: "McPAD: A multiple classifier system for accurate payload-based anomaly detection", 《COMPUTER NETWORKS》, vol. 53, no. 6, 31 December 2009 (2009-12-31), pages 864 - 881*

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103490992A (en)*2013-10-102014-01-01沈阳航空航天大学Instant messaging worm detection method
CN103490992B (en)*2013-10-102016-10-19沈阳航空航天大学 Instant Messaging Worm Detection Method
CN106452829A (en)*2016-01-212017-02-22华南师范大学Intelligent operation and maintenance method and system for cloud computation center based on BCC-KNN
CN106452829B (en)*2016-01-212019-07-19华南师范大学 A method and system for intelligent operation and maintenance of cloud computing center based on BCC-KNN
CN110351220A (en)*2018-04-022019-10-18蓝盾信息安全技术有限公司One kind realizing gateway efficient data scanning technique based on packet filtering
CN112749035A (en)*2019-10-312021-05-04阿里巴巴集团控股有限公司Anomaly detection method, device and computer readable medium
CN112749035B (en)*2019-10-312024-06-11阿里巴巴集团控股有限公司Abnormality detection method, abnormality detection device, and computer-readable medium
CN111294362A (en)*2020-03-162020-06-16湖南大学LDoS attack real-time detection method based on fractal residual error
CN113037553A (en)*2021-03-112021-06-25湖南大学IEC102 protocol communication behavior abnormity detection method and system based on IA-SVM
CN113516162A (en)*2021-04-262021-10-19湖南大学 A traffic anomaly detection method and system for industrial control system based on OCSVM and K-means algorithm

Similar Documents

PublicationPublication DateTitle
Meidan et al.ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis
CN102457525A (en)Load-based anomaly intrusion detection method and system
CN103530367B (en)A kind of fishing website identification system and method
CN113283476B (en)Internet of things network intrusion detection method
Hao et al.Variant gated recurrent units with encoders to preprocess packets for payload-aware intrusion detection
CN110572382A (en) Malicious Traffic Detection Method Based on SMOTE Algorithm and Integrated Learning
CN108932535A (en)Edge computing clone node identification method based on machine learning
CN109726553B (en) A slow denial of service attack detection method based on SNN-LOF algorithm
CN106992965A (en) A Trojan Horse Detection Method Based on Network Behavior
CN115086060B (en)Flow detection method, device, equipment and readable storage medium
CN107070930B (en) A host-oriented method for identifying suspicious network connections
CN103607391A (en)SQL injection attack detection method based on K-means
CN113660267B (en) A system, method and storage medium for botnet detection in IoT environment
CN109951462A (en) A system and method of application software traffic anomaly detection based on holographic modeling
CN116260565A (en)Chip electromagnetic side channel analysis method, system and storage medium
Shi et al.Three-layer hybrid intrusion detection model for smart home malicious attacks
CN116938507A (en) A power Internet of Things security defense terminal and its control system
CN117579324A (en) Intrusion detection method based on gated temporal convolutional network and graph
US20160127290A1 (en)Method and system for detecting spam bot and computer readable storage medium
Zheng et al.Preprocessing method for encrypted traffic based on semisupervised clustering
Stiawan et al.IoT botnet attack detection using deep autoencoder and artificial neural networks
Zang et al.Detection and mitigation of label-flipping attacks in fl systems with kl divergence
CN113765921B (en)Abnormal flow grading detection method for industrial Internet of things
CN101719849B (en)Pattern clustering-based parallel network flow characteristic detection method
Lu et al.A novel timing-based network covert channel detection method

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication
WW01Invention patent application withdrawn after publication

Application publication date:20120516


[8]ページ先頭

©2009-2025 Movatter.jp