Movatterモバイル変換


[0]ホーム

URL:


CN112085039B - ICMP hidden channel detection method based on random forest - Google Patents

ICMP hidden channel detection method based on random forest
Download PDF

Info

Publication number
CN112085039B
CN112085039BCN201910503725.5ACN201910503725ACN112085039BCN 112085039 BCN112085039 BCN 112085039BCN 201910503725 ACN201910503725 ACN 201910503725ACN 112085039 BCN112085039 BCN 112085039B
Authority
CN
China
Prior art keywords
icmp
data packets
interval time
packets
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910503725.5A
Other languages
Chinese (zh)
Other versions
CN112085039A (en
Inventor
刘亮
胡星高
郑荣锋
周安民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan UniversityfiledCriticalSichuan University
Priority to CN201910503725.5ApriorityCriticalpatent/CN112085039B/en
Publication of CN112085039ApublicationCriticalpatent/CN112085039A/en
Application grantedgrantedCritical
Publication of CN112085039BpublicationCriticalpatent/CN112085039B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明涉及机器学习算法和隐蔽通道检测领域,旨在提供一种基于随机森林机器学习算法的ICMP隐蔽通道检测方法。该技术首先捕获网络间通信的数据包,提取数据包中与数据包相关的基本信息(源IP地址,目的IP地址等),将信息归类,根据这些信息形成ICMP报文流,利用本方法特有的规则从对应的ICMP报文流中提取特征,将得到关于源IP地址和目的IP地址之间ICMP报文通信的数据流的特征,再将特征利用基于随机森林的机器学习方法进行训练,最后获得检测ICMP隐蔽通道的分类器。利用本方法进行ICMP隐蔽通道检测,计算成本和时间成本低,所生成的ICMP流特征,针对性强,可信度高,能有效地检测出ICMP隐蔽通道。

Figure 201910503725

The invention relates to the field of machine learning algorithm and covert channel detection, and aims to provide an ICMP covert channel detection method based on random forest machine learning algorithm. The technology first captures the data packets communicated between the networks, extracts the basic information related to the data packets (source IP address, destination IP address, etc.) The unique rules extract features from the corresponding ICMP message flow, and obtain the features of the data flow of the ICMP message communication between the source IP address and the destination IP address, and then use the machine learning method based on random forest to train the features. Finally, a classifier for detecting ICMP covert channels is obtained. Using the method to detect the ICMP covert channel, the calculation cost and time cost are low, the generated ICMP flow feature has strong pertinence and high reliability, and can effectively detect the ICMP covert channel.

Figure 201910503725

Description

Translated fromChinese
一种基于随机森林的ICMP隐蔽通道检测方法A Random Forest-based ICMP Covert Channel Detection Method

技术领域technical field

本发明涉及网络流量监测技术,旨在利用ICMP流量的特征和随机森林算法对ICMP数据包进行检测,核心是从捕获到的正常的ICMP报文和异常的ICMP报文中提取特征,通过特定生成规则和机器学习方法生成的分类模型来识别ICMP隐蔽通道通信行为。The invention relates to a network flow monitoring technology, and aims to use the characteristics of ICMP flow and random forest algorithm to detect ICMP data packets. Classification models generated by rules and machine learning methods to identify ICMP covert channel communication behavior.

背景技术Background technique

随着计算机网络技术的迅速发展,越来越多的先进技术相应诞生,与此同时,信息安全问题的出现也随之严重。隐蔽隧道问题是目前较为严重的一类信息安全问题,隐蔽隧道是基于网络协议的漏洞问题而产生的一种利用各种网络协议的冗余来秘密进行数据的传输信息、攻击网络的手段。尽管入侵检测系统、防火墙等安全工具被广泛的使用,但伴随着协议本身的漏洞问题,秘密数据的传输、数据泄露、通过恶意软件绕过防火墙获取信息等安全事件层出不穷。利用隐蔽通道的相关特点,数据在网络中被秘密传送而不被发现,这对于黑客窃取信息更为便利。With the rapid development of computer network technology, more and more advanced technologies are born accordingly, and at the same time, the emergence of information security problems is also serious. Covert tunnel problem is a serious information security problem at present. Covert tunnel is a means of secretly transmitting data and attacking the network by using the redundancy of various network protocols based on the vulnerability of network protocols. Although security tools such as intrusion detection systems and firewalls are widely used, with the vulnerability of the protocol itself, security incidents such as transmission of secret data, data leakage, and bypassing firewalls to obtain information through malware emerge in an endless stream. Using the relevant characteristics of covert channels, data is secretly transmitted in the network without being discovered, which is more convenient for hackers to steal information.

在面对复杂数量庞大的ICMP报文时,为了判断是否存在ICMP隐蔽通道,首要面对的就是以下几个问题:In the face of complex and huge ICMP packets, in order to determine whether there is an ICMP covert channel, the first problem to face is the following:

1)庞大的数据量使得数据捕获模块可能无法完全捕获内网中全部的数据包,因而产生漏抓ICMP报文的数据包的情况;1) Due to the huge amount of data, the data capture module may not be able to completely capture all the data packets in the intranet, resulting in the situation that the data packets of the ICMP packets are missed;

2)处理所有的数据包,会消耗大量资源,如果是在内网的条件下将所有数据包进行保存,在极大地消耗网络中的带宽资源的同时也会消耗大量的存储硬件资源;2) Processing all data packets will consume a lot of resources. If all data packets are stored under the condition of the intranet, it will consume a lot of storage hardware resources while greatly consuming the bandwidth resources in the network;

3)防火墙对于ICMP报文的数据包几乎不做任何过滤;3) The firewall hardly filters the data packets of ICMP packets;

4)已有的检测ICMP隐蔽通道的方法需要的时间长,计算复杂,且缺乏实时性。4) The existing methods for detecting ICMP covert channels require a long time, are computationally complex, and lack real-time performance.

为了解决以上的问题,提高ICMP隐蔽通道的检测效率和减少对网络资源的消耗,本发明提出了一种基于随机森林的ICMP隐蔽通道检测方法,可以有效地减少对网络资源的占用,并提高ICMP隐蔽通道的检测准确率。In order to solve the above problems, improve the detection efficiency of ICMP covert channel and reduce the consumption of network resources, the present invention proposes an ICMP covert channel detection method based on random forest, which can effectively reduce the occupation of network resources and improve ICMP. Covert channel detection accuracy.

发明内容SUMMARY OF THE INVENTION

“一种基于随机森林的ICMP隐蔽通道检测方法”是对网络流量中含有ICMP报文的数据包的检测过程中所提出来的发明,本发明的一个目的是针对现有的ICMP隐蔽通道检测计算复杂,检测准确度不高,消耗资源过多等缺点,提出的一种基于随机森林分类的ICMP隐蔽通道检测方法。利用机器学习算法来实现ICMP隐蔽通道的检测是一种很好的弥补现有的ICMP检测不足之处的方法,但是该方法对于ICMP的检测主要依靠两点:1)样本是否足够广泛2)用于机器学习的特征是否足够典型,冗余度是否足够小。"An ICMP covert channel detection method based on random forest" is an invention proposed in the process of detecting data packets containing ICMP messages in network traffic. Due to the disadvantages of complexity, low detection accuracy, and excessive resource consumption, an ICMP covert channel detection method based on random forest classification is proposed. Using machine learning algorithms to detect ICMP covert channels is a good way to make up for the shortcomings of existing ICMP detection, but this method mainly relies on two points for ICMP detection: 1) Whether the sample is wide enough 2) Using Whether the features of machine learning are typical enough and the redundancy is small enough.

本发明提供了一种新的ICMP隐蔽通道检测方法,通过采用本发明特有的ICMP报文的特征,利用随机森林方法进行机器学习,从而实现高效率,高准确率的具有高针对性的ICMP隐蔽通道检测。该方法包括四个模块:数据捕获处理模块,通过多线程技术捕获数据包,并将其中含有ICMP报文的数据包保留下来;预处理模块,将含有ICMP报文的数据包进行整合分类,形成以源IP地址和目的IP地址以及一定时间为依据的ICMP报文数据流;数据处理模块,将预处理模块得到的ICMP报文数据流根据特征生成规则生成ICMP数据流特征;机器学习模块,将数据流特征数值化、标准化,再通过随机森林的方法,生成一个具有高准确、高效率的分类器,从而通过这个分类器能够有效地检测ICMP隐蔽通道。The present invention provides a new ICMP covert channel detection method. By adopting the characteristics of the unique ICMP message of the present invention, the random forest method is used for machine learning, so as to achieve high efficiency and high accuracy and highly targeted ICMP covert Channel detection. The method includes four modules: a data capture and processing module, which captures data packets through multi-threading technology, and retains the data packets containing ICMP messages; a preprocessing module, which integrates and classifies the data packets containing ICMP messages to form ICMP message data stream based on source IP address, destination IP address and a certain time; data processing module, which generates ICMP data stream features based on the ICMP message data stream obtained by the preprocessing module according to the feature generation rules; The data flow features are quantified and standardized, and then a random forest method is used to generate a classifier with high accuracy and efficiency, so that the ICMP covert channel can be effectively detected by this classifier.

附图说明Description of drawings

为了更进一步描述本发明的实现目标、实现方法和特性,下面将要结合附图进行详细描述,以便更加清楚地理解本发明的目标、实现方法、优点和特性。In order to further describe the objectives, implementation methods and characteristics of the present invention, the following will be described in detail with reference to the accompanying drawings, so as to more clearly understand the objectives, implementation methods, advantages and characteristics of the present invention.

图1是一个展示本发明的一个整体流程的框架图。FIG. 1 is a frame diagram showing an overall flow of the present invention.

图2是一个说明本发明的数据捕获预处理模块的流程图。Figure 2 is a flow chart illustrating the data capture preprocessing module of the present invention.

图3是一个说明本发明的预处理模块的流程图。Figure 3 is a flow chart illustrating the preprocessing module of the present invention.

图4是一个说明本发明的数据处理模块的流程图。Figure 4 is a flow chart illustrating the data processing module of the present invention.

图5是一个说明本发明的机器学习模块的流程图。Figure 5 is a flow diagram illustrating the machine learning module of the present invention.

具体实施方式Detailed ways

本发明分为四个模块,第一个模块的目的在于减少其他协议或者与隐蔽通道检测无关的流量,从而提高检测效率,精准度和减少干扰。第二个模块的目的在于获得只属于通信双方的ICMP数据包。第三个模块的目的在于获得具有更强针对性的ICMP报文流特征。第四个模块的目的在于通过机器学习算法,在模块三的特征基础上,形成高效率、高准确度的分类器,从而实现能够快速、精准的进行ICMP隐蔽通道检测。The present invention is divided into four modules, the purpose of the first module is to reduce other protocols or traffic irrelevant to covert channel detection, thereby improving detection efficiency, accuracy and reducing interference. The purpose of the second module is to obtain the ICMP data packets belonging to only the two communicating parties. The purpose of the third module is to obtain more targeted ICMP message flow characteristics. The purpose of the fourth module is to form a high-efficiency and high-accuracy classifier based on the features of module three through machine learning algorithms, so as to achieve fast and accurate ICMP covert channel detection.

下面结合附图对本发明做进一步说明。The present invention will be further described below with reference to the accompanying drawings.

如图1所示,是描述本发明的技术架构图,以分层模型架构。每一层具有不同的功能划分,且每一层的输入数据都来自于上一层的输出数据。最上层的数据来自于路由器镜像口的数据包,现在对每一层的功能和流程作详细的描述。As shown in FIG. 1, it is a technical architecture diagram describing the present invention, which is structured in a layered model. Each layer has different functional divisions, and the input data of each layer comes from the output data of the previous layer. The data of the top layer comes from the data packets of the mirror port of the router. Now the function and process of each layer are described in detail.

如图2所示,为数据捕获模块,其主要的工作是负责将网络中的通信流量捕获,再将其中所需要的ICMP报文筛选提取出来。As shown in Figure 2, it is a data capture module, whose main job is to capture the communication traffic in the network, and then filter and extract the required ICMP packets.

紧接着,如图3,执行预处理模块,将ICMP报文按照源IP地址和目的IP地址,以及发送的时间在一定规则下进行分类,最终得到一定时间内的两个IP之间的ICMP报文流。这里的规则如下所示:从收到的第一个ICMP报文的数据包开始,在接下来的60s内两个IP之间交互产生的所有ICMP包,将其称为一个ICMP报文数据流。这里的ICMP报文只考虑请求回显报文(类型8)和回显应答报文(类型0)。Then, as shown in Figure 3, the preprocessing module is executed to classify the ICMP packets according to the source IP address, destination IP address, and the sending time under certain rules, and finally obtain the ICMP packet between the two IPs within a certain period of time. text flow. The rules here are as follows: starting from the data packet of the first ICMP packet received, all ICMP packets generated by the interaction between the two IPs in the next 60s are called an ICMP packet data flow . The ICMP message here only considers the request echo message (type 8) and the echo response message (type 0).

然后,如图4,开始处理ICMP报文流的信息,ICMP报文流的信息来自于图3中的预处理模块,根据规则从图3中所得到的ICMP报文数据流提取所需要的各项ICMP数据流统计特征。其中规则已经在图4中一一列出,按照这些规则,最终生成属于ICMP报文流的特征。Then, as shown in Figure 4, start processing the information of the ICMP message flow. The information of the ICMP message flow comes from the preprocessing module in Figure 3, and according to the rules, the required ICMP message data flow is extracted from Item ICMP data flow statistical characteristics. The rules have been listed one by one in Figure 4. According to these rules, the characteristics belonging to the ICMP message flow are finally generated.

将ICMP报文流特征提取完毕后,根据原始数据来源,给ICMP报文流信息打上正负标记,存入数据库。After the feature extraction of the ICMP message flow is completed, according to the original data source, the ICMP message flow information is marked with positive and negative marks and stored in the database.

最后就是将提取完成的数据利用机器学习算法进行学习,最后生成一个可以高效率、高准确率的ICMP隐蔽通道检测器,其具体过程如图5所示。The last step is to use the machine learning algorithm to learn the extracted data, and finally generate an ICMP covert channel detector with high efficiency and high accuracy. The specific process is shown in Figure 5.

先将数据从数据库中提取出来,将数据进行标准化处理,得到一组符合随机森林输入的数据,然后利用随机森林的算法,最终生成ICMP隐蔽通道检测器。First, extract the data from the database, standardize the data, and obtain a set of data that matches the random forest input, and then use the random forest algorithm to finally generate the ICMP covert channel detector.

Claims (3)

Translated fromChinese
1.一种基于随机森林的ICMP隐蔽通道检测方法,其特征在于,所述方法包括如下步骤:1. an ICMP covert channel detection method based on random forest, is characterized in that, described method comprises the steps:A、对大量正常的和异常的网络流量分析得出,所需要的流量信息,随机森林机器学习算法所需要的ICMP报文数据包的数据流特征;A. From the analysis of a large number of normal and abnormal network traffic, the required traffic information and the data flow characteristics of the ICMP packet data packets required by the random forest machine learning algorithm are obtained;B、利用预处理数据得到基于一定时间内的两个IP地址之间的ICMP报文流;在预处理数据中,利用2元组信息,将相同流时的存在ICMP报文交流的两个IP地址的ICMP报文的数据包进行组流,在将组流后的ICMP报文按照时间60s进行切片处理,最后将ICMP报文中的类型8和0的数据包提取出来,形成在一定时间内将两个IP地址之间的含有ICMP报文的中类型为8和0的数据包ICMP报文流pcap数据包;B. Use the preprocessing data to obtain the ICMP message flow between two IP addresses within a certain period of time; in the preprocessing data, use the 2-tuple information to convert the two IP addresses that exist in the same flow to the ICMP message exchange The data packets of the ICMP packets of the address are grouped, and the ICMP packets after the group flow are sliced according to the time of 60s. Finally, the data packets of types 8 and 0 in the ICMP packets are extracted, and formed within a certain period of time. Flow pcap packets of ICMP packets containing ICMP packets of type 8 and 0 between the two IP addresses;C、在ICMP报文流的基础上,通过分析得出的规则,获取随机森林所需要的ICMP报文流的特征;C. On the basis of the ICMP message flow, the characteristics of the ICMP message flow required by the random forest are obtained by analyzing the rules;D、将ICMP报文流特征标准化,利用随机森林算法进行训练,最终得到ICMP隐蔽通道检测器;D. Standardize the characteristics of the ICMP message flow, use the random forest algorithm for training, and finally obtain the ICMP covert channel detector;所述的步骤A进一步包括如下步骤:Described step A further comprises the steps:A1、通过分析正常的ICMP报文,得出生成ICMP隐蔽通道检测方法所需基于流量的信息,包括:源IP、目的IP、特定标志位、负载大小、ICMP生成时间间隔;A1. By analyzing normal ICMP packets, obtain the traffic-based information required to generate the ICMP covert channel detection method, including: source IP, destination IP, specific flag bit, load size, and ICMP generation time interval;A2、基于A1中的数据分析,得出特征的生成规则,包括:正向数据包数量、正向数据包的平均间隔时间、正向数据包最大间隔时间、正向数据包最小间隔时间、逆向数据包数量、逆向数据包的平均间隔时间、逆向数据包最大间隔时间,逆向数据包最小间隔时间、非固定负载长度数据包个数、回复请求之差、固定负载字符出现次数、异常固定负载字符出现次数。A2. Based on the data analysis in A1, the generation rules of the features are obtained, including: the number of forward data packets, the average interval time of forward data packets, the maximum interval time of forward data packets, the minimum interval time of forward data packets, and the reverse direction Number of data packets, average interval time of reverse data packets, maximum interval time of reverse data packets, minimum interval time of reverse data packets, number of data packets with non-fixed payload length, difference between reply requests, occurrences of fixed payload characters, abnormal fixed payload characters The number of occurrences.2.根据权利要求1所述的一种基于随机森林的ICMP隐蔽通道检测方法,其特征在于,所述的步骤C中规则的生成,进一步详细描述:2. a kind of ICMP covert channel detection method based on random forest according to claim 1, is characterized in that, the generation of rule in described step C is described in further detail:C1、C中利用所有规则生成的属于ICMP报文流的特征必须都基于一定时间内(60s);The features belonging to the ICMP message flow generated by all the rules in C1 and C must be based on a certain period of time (60s);C2、规定,第一次接到的ICMP报文的源IP到目的IP为该ICMP报文流的正向的数据包;与第一次接到的ICMP报文的源IP到目的IP的位置相反为该ICMP报文流的逆向的数据包;C2. It is stipulated that the source IP to destination IP of the ICMP packet received for the first time is the forward data packet of the ICMP packet flow; and the position from the source IP to the destination IP of the ICMP packet received for the first time On the contrary, it is the reverse data packet of the ICMP packet flow;C3、正向数据包数量,第一次接到的ICMP报文的源IP到目的IP为该ICMP报文流的正向的数据包的总个数;C3, the number of forward data packets, the source IP to destination IP of the first received ICMP message is the total number of forward data packets of the ICMP message flow;C4、正向数据包的平均间隔时间,正向数据包的平均间隔时间,即是60s内源IP到目的IP的含有ICMP报文的数据包的平均间隔时间;C4, the average interval time of forward data packets, the average interval time of forward data packets, that is, the average interval time of data packets containing ICMP packets from source IP to destination IP within 60s;C5、正向数据包的最大间隔时间,即是比较所有方向为正向的ICMP报文数据包间的间隔时间,取最大间隔时间;C5. The maximum interval time of forward data packets, which is to compare the interval time between ICMP packet data packets with all directions being forward, and take the maximum interval time;C6、正向数据包的最小间隔时间,即是比较所有方向为正向的ICMP报文数据包间的间隔时间,取最小间隔时间;C6. The minimum interval time of forward data packets, that is, to compare the interval time between ICMP packet data packets with all directions being forward, and take the minimum interval time;C7、逆向数据包数量,与第一次接到的ICMP报文的源IP到目的IP的位置相反为该ICMP报文流的逆向的数据包的总个数;C7. The number of reverse data packets, which is opposite to the position from the source IP to the destination IP of the ICMP packet received for the first time is the total number of reverse packets of the ICMP packet flow;C8、逆向数据包的平均间隔时间,逆向数据包的平均间隔时间,即是60s内源IP到目的IP的位置相反的数据包的平均间隔时间;C8. The average interval time of reverse data packets, the average interval time of reverse data packets, that is, the average interval time of data packets whose positions are opposite from source IP to destination IP within 60s;C9、逆向数据包的最大间隔时间,即是比较所有方向为逆向的ICMP报文数据包间的间隔时间,取最大间隔时间;C9. The maximum interval time of reverse data packets, that is, comparing the interval time between ICMP packet data packets in all directions in the reverse direction, and taking the maximum interval time;C10、逆向数据包的最小间隔时间,即是比较所有方向为逆向的ICMP报文数据包间的间隔时间,取最小间隔时间;C10. The minimum interval time of reverse data packets, that is, comparing the interval time between all ICMP packets whose directions are reverse directions, and taking the minimum interval time;C11、非固定负载长度数据包个数,规定,ICMP报文的负载无人为干涉情况下为48或者36;非固定负载长度数据包个数,统计ICMP报文流中负载长度不等于48或者36的个数;C11. The number of data packets with non-fixed payload length, it is stipulated that the payload of the ICMP message is 48 or 36 without human interference; the number of data packets with non-fixed payload length, the payload length in the statistics ICMP message flow is not equal to 48 or 36 the number of;C12、回复请求之差,ICMP报文中请求回显报文的个数减去回显应答报文的个数;C12. The difference between the reply requests, the number of echo request messages in the ICMP message minus the number of echo response messages;C13、固定负载字符出现次数,规则,每个ICMP报文流中负载固定出现“abcdefghijklmnopqrstuvwabcdefghi”或者“!”#$%&’()+,-./01234567”,计算上述字符在ICMP流里出现的ICMP报文的数据包个数;C13. The number of occurrences of fixed load characters, rules, the load in each ICMP packet stream is fixed to appear "abcdefghijklmnopqrstuvwabcdefghi" or "!"#$%&'()+,-./01234567", calculate the above characters appear in the ICMP stream The number of data packets of the ICMP message;C14、异常固定负载字符出现次数,ICMP报文流中的负载中出现的固定的异常的字符串的数据包个数。C14. The number of occurrences of abnormal fixed payload characters, the number of data packets of fixed abnormal character strings that appear in the payload of the ICMP packet flow.3.根据权利要求1所述的一种基于随机森林的ICMP隐蔽通道检测方法,其特征在于,所述的步骤D中规则的生成,进一步详细描述:3. a kind of ICMP covert channel detection method based on random forest according to claim 1, is characterized in that, in described step D, the generation of rules is described in further detail:D1、将数据库中的样本标准化的过程中,必须保证样本不失真,且原样本的值域必须为实数;D1. In the process of standardizing the samples in the database, it is necessary to ensure that the samples are not distorted, and the value range of the original samples must be real numbers;D2、在进行机器学习的过程中,必须要设置一个交叉验证的比例,用以保证最后得出的模型真实有效。D2. In the process of machine learning, a cross-validation ratio must be set to ensure that the final model is true and effective.
CN201910503725.5A2019-06-122019-06-12ICMP hidden channel detection method based on random forestActiveCN112085039B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910503725.5ACN112085039B (en)2019-06-122019-06-12ICMP hidden channel detection method based on random forest

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910503725.5ACN112085039B (en)2019-06-122019-06-12ICMP hidden channel detection method based on random forest

Publications (2)

Publication NumberPublication Date
CN112085039A CN112085039A (en)2020-12-15
CN112085039Btrue CN112085039B (en)2022-08-16

Family

ID=73733169

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910503725.5AActiveCN112085039B (en)2019-06-122019-06-12ICMP hidden channel detection method based on random forest

Country Status (1)

CountryLink
CN (1)CN112085039B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10270794B1 (en)2018-02-092019-04-23Extrahop Networks, Inc.Detection of denial of service attacks
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US10965702B2 (en)2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
WO2022066910A1 (en)2020-09-232022-03-31Extrahop Networks, Inc.Monitoring encrypted network traffic
CN112929364B (en)*2021-02-052023-03-24上海观安信息技术股份有限公司Data leakage detection method and system based on ICMP tunnel analysis
CN113179278B (en)*2021-05-202023-04-18北京天融信网络安全技术有限公司Abnormal data packet detection method and electronic equipment
CN113364793A (en)*2021-06-172021-09-07北京天融信网络安全技术有限公司ICMP hidden tunnel detection method, device and storage medium
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
CN114124834B (en)*2021-10-202024-06-28南京中新赛克科技有限责任公司Integrated learning device and method for ICMP hidden tunnel detection in industrial control network
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
CN115174265B (en)*2022-08-032024-01-30上海欣诺通信技术股份有限公司ICMP hidden tunnel detection method based on flow characteristics

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105827662A (en)*2016-06-022016-08-03江苏科技大学ON-OFF time type covert communication detection method based on DCT
CN107332723A (en)*2016-04-282017-11-07华为技术有限公司The detection method and detection device of convert channel
CN108183917A (en)*2018-01-162018-06-19中国人民解放军国防科技大学DDoS attack cross-layer cooperative detection method based on software defined network
CN108833360A (en)*2018-05-232018-11-16四川大学 A Malicious Encrypted Traffic Identification Technology Based on Machine Learning
CN109074454A (en)*2016-02-292018-12-21帕洛阿尔托网络公司 Automatic grouping of malware based on artifacts
CN109309673A (en)*2018-09-182019-02-05南京方恒信息技术有限公司A kind of DNS private communication channel detection method neural network based
CN109858510A (en)*2018-11-282019-06-07南京知常容信息技术有限公司A kind of detection method for http protocol ETag value covert communications

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9401932B2 (en)*2012-12-042016-07-26Cyber Adapt, Inc.Device and method for detection of anomalous behavior in a computer network
CN104391856A (en)*2014-10-162015-03-04江苏博智软件科技有限公司Covert channel searching method based on information flow context network
CN106453225B (en)*2016-07-182019-07-05北龙中网(北京)科技有限责任公司Realize the method and client, server of secret communication
CN107733851B (en)*2017-08-232020-05-01刘胜利DNS tunnel Trojan detection method based on communication behavior analysis
CN107483458A (en)*2017-08-292017-12-15杭州迪普科技股份有限公司The recognition methods of network attack and device, computer-readable recording medium
CN107786575B (en)*2017-11-112020-07-10北京信息科技大学DNS flow-based self-adaptive malicious domain name detection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109074454A (en)*2016-02-292018-12-21帕洛阿尔托网络公司 Automatic grouping of malware based on artifacts
CN107332723A (en)*2016-04-282017-11-07华为技术有限公司The detection method and detection device of convert channel
CN105827662A (en)*2016-06-022016-08-03江苏科技大学ON-OFF time type covert communication detection method based on DCT
CN108183917A (en)*2018-01-162018-06-19中国人民解放军国防科技大学DDoS attack cross-layer cooperative detection method based on software defined network
CN108833360A (en)*2018-05-232018-11-16四川大学 A Malicious Encrypted Traffic Identification Technology Based on Machine Learning
CN109309673A (en)*2018-09-182019-02-05南京方恒信息技术有限公司A kind of DNS private communication channel detection method neural network based
CN109858510A (en)*2018-11-282019-06-07南京知常容信息技术有限公司A kind of detection method for http protocol ETag value covert communications

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DNS隐蔽通道检测技术研究;徐琨;《中国优秀硕士学位论文全文数据库 信息科技辑》;20180315(第03期);I139-203*
基于支持向量机进行流量识别的研究和实现;王哲;《中国优秀硕士学位论文全文数据库 信息科技辑》;20150415(第04期);I140-93*
徐琨.DNS隐蔽通道检测技术研究.《中国优秀硕士学位论文全文数据库 信息科技辑》.2018,(第03期),I139-203.*

Also Published As

Publication numberPublication date
CN112085039A (en)2020-12-15

Similar Documents

PublicationPublication DateTitle
CN112085039B (en)ICMP hidden channel detection method based on random forest
CN106713371B (en) A Fast Flux Botnet Detection Method Based on DNS Anomaly Mining
CN107733851A (en)DNS tunnels Trojan detecting method based on communication behavior analysis
CN112468347B (en) A cloud platform security management method, device, electronic device and storage medium
CN112804253B (en)Network flow classification detection method, system and storage medium
CN113206860B (en) A DRDoS attack detection method based on machine learning and feature selection
CN111245860A (en) A method and system for detecting encrypted malicious traffic based on two-dimensional features
TW202019127A (en)Abnormal flow detection device and abnormal flow detection method thereof
CN113259943B (en) A method and system for analyzing and blocking abnormal traffic in a power wireless private network
CN113328985B (en) A method, system, medium and device for passive IoT device identification
CN112491894A (en)Internet of things network attack flow monitoring system based on space-time feature learning
CN113221113B (en) IoT DDoS detection, defense method, detection device and storage medium based on distributed machine learning and blockchain
CN113382039B (en)Application identification method and system based on 5G mobile network flow analysis
CN111669354A (en) Machine Learning-Based Threat Intelligence Industrial Firewall
CN114091020A (en) Adversarial attack defense method and system based on feature grouping and multi-model fusion
CN118573594A (en)Performance monitoring system based on cloud computing
CN108833430B (en) A topology protection method for software-defined networks
CN118353660A (en) A network traffic anomaly detection algorithm based on multimodal feature fusion
US20150150132A1 (en)Intrusion detection system false positive detection apparatus and method
CN116132095A (en) A Covert Malicious Traffic Detection Method Fused with Statistical Features and Graph Structure Features
CN111182002A (en)Zombie network detection device based on HTTP (hyper text transport protocol) first question-answer packet clustering analysis
Zou et al.Using explainable AI for neural network-based network attack detection
CN114884704A (en)Network traffic abnormal behavior detection method and system based on involution and voting
CN119652559A (en) A train communication network intrusion detection method based on multi-scale residual network
CN114124834A (en)Integrated learning device and method for ICMP (information control network protocol) hidden tunnel detection in industrial control network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp