CN108521413A - A kind of network of Future Information war is resisted and defence method and system - Google Patents

A kind of network of Future Information war is resisted and defence method and system Download PDF

Info

Publication number
CN108521413A
CN108521413A CN201810284068.5A CN201810284068A CN108521413A CN 108521413 A CN108521413 A CN 108521413A CN 201810284068 A CN201810284068 A CN 201810284068A CN 108521413 A CN108521413 A CN 108521413A
Authority
CN
China
Prior art keywords
unit
data packet
network
hash
traffic statistics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810284068.5A
Other languages
Chinese (zh)
Inventor
何华
张洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Central Control Security Information Safe Technology Ltd
Original Assignee
Jiangsu Central Control Security Information Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Central Control Security Information Safe Technology Ltd filed Critical Jiangsu Central Control Security Information Safe Technology Ltd
Priority to CN201810284068.5A priority Critical patent/CN108521413A/en
Publication of CN108521413A publication Critical patent/CN108521413A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of resistance of the network of Future Information war and defence methods, include the following steps:S1, source port and source IP pass through protocol access destination interface and destination IP;S2, traffic statistics unit count data and flow;S3, traffic statistics cellular convection amount are handled, and cryptographic Hash is obtained;Cryptographic Hash is inserted into Hash bucket by S4, traffic statistics unit, and information and flow are passed to assessment unit;S5, assessment unit carry out statistical estimation to data traffic;S6, execution unit can be handled and alerted to the network equipment of destination IP according to assessment result;Network is resisted and system of defense, including traffic statistics unit, traffic statistics unit communication are connected with master pattern unit, and master pattern unit communication is connected with assessment unit, and assessment unit communication link is connected to execution unit.The invention enables systems of defense with more intelligence, automatic decision can cope with complicated network attack with various defense schemes are disposed on network.

Description

A kind of network of Future Information war is resisted and defence method and system
Technical field
The present invention relates to field of computer technology more particularly to a kind of network of Future Information war is resisted and defence method And system.
Background technology
Botnet has the characteristics that attack method is simple, is affected and is difficult to trace so that distribution refusal clothes Business attack (Distributed Denial of Service, DDoS) obtains quickly growing and increasingly spreading unchecked.Thousands of hosts The Botnet of composition provides required bandwidth and host for ddos attack, forms huge attack and network flow Amount, to causing great injury by attacking network.Since the harm of DDOS attack is huge, can not only make to be attacked soon The server hit can not normally provide service, or even also whole network can be caused congestion occur, and network but will be enabled to fall into when serious Enter paralysis, influence other servers being in together in the network, is even more important so the timely attack found out in network seems.
Current attack detection method is generally using fixed threshold or the method for establishing flow dynamics baseline, both sides Method has the shortcomings that apparent.Fixed threshold can be because the setting of threshold value be excessive or too small cause to judge by accident and fail to judge;And if Using flow dynamics baseline, the target of original flow very little causes to miss because of radix small the case where being easy to will appear burst Sentence, the big target of flow can may less fail to judge again because of amplitude of variation.For reporting the burst flow of regular traffic by mistake, it is The common defects of both methods.And flow dynamics baseline is in the starting stage established for each fresh target, is that can not detect Attack, and if establishing baseline with the flow of attack, in some instances it may even be possible to will appear can not all detect generation herein again backward Attack in target proposes more computer network defense at present in the fast changing network environment of computer network defense Big challenge is based particularly on the defence method of artificial intelligence and provides more strategies and method for defence, i.e., on network certainly The various defense schemes of decisions and arrangements are moved to cope with complicated network attack.
Invention content
The purpose of the present invention is to solve disadvantages existing in the prior art, and a kind of Future Information war proposed Network resistance and defence method and system.
To achieve the goals above, present invention employs following technical solutions:
A kind of network of Future Information war is resisted and defence method, includes the following steps:
S1, source port and source IP can be flowed by protocol access destination interface and destination IP, destination interface and destination IP Measure data;
S2, traffic statistics unit count the data and flow that access destination interface and destination IP, extract source port Characteristic information;
S3, traffic statistics unit are handled flow by Hash operation, obtain the cryptographic Hash of data packet messages, Hash The process of operation is:The depth for presetting Hash bucket, according to source IP, source port, destination IP, destination interface and agreement to Hash The depth complementation operation of bucket obtains the cryptographic Hash of the data packet messages, a data packet messages is often received in the unit interval, then Its corresponding counter values cumulative 1;
The cryptographic Hash of data packet messages is inserted into the corresponding position of Hash bucket by S4, traffic statistics unit within the unit interval, And corresponding information and flow are passed into assessment unit;
S5, assessment unit carry out statistical estimation to data traffic, and assessment result are sent to execution unit, evaluation process It is:After counter values are more than the threshold value of setting, assessment unit judges the corresponding destination IP of data packet messages and destination interface Generate abnormal flow;
S6, execution unit can according to assessment result to data to generate abnormal flow data source port locating source IP, and The network equipment of destination IP is handled and alerted.
Preferably, the agreement includes Transmission Control Protocol, one kind in three kinds of agreements of udp protocol and ICMP agreements.
Preferably, the process of the counter values cumulative 1 is:Worked as according to the header packet information of current data packet voice The cryptographic Hash of preceding data packet messages, by the cryptographic Hash of current data packet voice compared with the cryptographic Hash of historical data packet voice, if When the cryptographic Hash of current data packet voice is identical as one of the cryptographic Hash of historical data packet voice, history is found in Hash bucket The unique corresponding data packet messages of the cryptographic Hash of data packet messages, the cryptographic Hash of the historical data packet voice in Hash bucket is unique The counter of corresponding data packet messages cumulative 1.
Preferably, the unit interval is 1s, and updates a Hash bucket per unit time.
The invention also provides a kind of network of Future Information war is resisted and system of defense, including traffic statistics unit, The traffic statistics unit communication is connected with master pattern unit, and master pattern unit communication is connected with assessment unit, and assessment is single First communication link is connected to execution unit.
Preferably, the traffic statistics unit carries out traffic statistics using raw data packets header information.
Preferably, the master pattern unit establishes each Business Stream the master pattern formation Hash of standard data stream Bucket, and utilize the cryptographic Hash of Hash bucket store historical data packet voice.
The beneficial effects of the invention are as follows:
1, of the invention, pass through the processing of comparison and assessment unit between counter values and fixed threshold so that defence System automatic decision can cope with complicated network attack on network with more intelligence with various defense schemes are disposed.
2, of the invention, by the way that the flow of access is converted to cryptographic Hash vertically and compared with the cryptographic Hash in Hash bucket, is made Last data result has a uniqueness, and process safety is simply and conveniently, and the reliability of data is high.
Description of the drawings
Fig. 1 is the flow chart of the network resistance and defence method and system of a kind of Future Information war proposed by the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Embodiment:Referring to Fig.1, a kind of network resistance of Future Information war and defence method, include the following steps:
S1, source port and source IP can be flowed by protocol access destination interface and destination IP, destination interface and destination IP Data are measured, agreement includes Transmission Control Protocol, one kind in three kinds of agreements of udp protocol and ICMP agreements;
S2, traffic statistics unit count the data and flow that access destination interface and destination IP, extract source port Characteristic information;
S3, traffic statistics unit are handled flow by Hash operation, obtain the cryptographic Hash of data packet messages, Hash The process of operation is:The depth for presetting Hash bucket, according to source IP, source port, destination IP, destination interface and agreement to Hash The depth complementation operation of bucket obtains the cryptographic Hash of the data packet messages, a data packet messages is often received in the unit interval, then The process of its corresponding counter values cumulative 1, counter values cumulative 1 is obtained according to the header packet information of current data packet voice The cryptographic Hash for obtaining current data packet messages, by the cryptographic Hash ratio of the cryptographic Hash of current data packet voice and historical data packet voice Compared with if the cryptographic Hash of current data packet voice is identical as one of the cryptographic Hash of historical data packet voice, being searched in Hash bucket To the unique corresponding data packet messages of cryptographic Hash of historical data packet voice, by the Hash of the historical data packet voice in Hash bucket The counter cumulative 1 of the unique corresponding data packet messages of value;
The cryptographic Hash of data packet messages is inserted into the corresponding position of Hash bucket by S4, traffic statistics unit within the unit interval, And corresponding information and flow are passed into assessment unit, unit interval 1s, and a Hash bucket is updated per unit time;
S5, assessment unit carry out statistical estimation to data traffic, and assessment result are sent to execution unit, evaluation process It is:After counter values are more than the threshold value of setting, assessment unit judges the corresponding destination IP of data packet messages and destination interface Generate abnormal flow;
S6, execution unit can according to assessment result to data to generate abnormal flow data source port locating source IP, and The network equipment of destination IP is handled and alerted.
A kind of network of Future Information war is resisted and system of defense, including traffic statistics unit, traffic statistics unit profit Traffic statistics are carried out with raw data packets header information, traffic statistics unit communication is connected with master pattern unit, standard The master pattern that model unit establishes each Business Stream standard data stream forms Hash bucket, and stores history number using Hash bucket According to the cryptographic Hash of packet voice, master pattern unit communication is connected with assessment unit, and assessment unit communication link is connected to execution unit.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

1. a kind of network of Future Information war is resisted and defence method, which is characterized in that include the following steps:
S1, source port and source IP can obtain flow number by protocol access destination interface and destination IP, destination interface and destination IP According to;
S2, traffic statistics unit count the data and flow that access destination interface and destination IP, extract the spy of source port Reference ceases;
S3, traffic statistics unit are handled flow by Hash operation, obtain the cryptographic Hash of data packet messages, Hash operation Process be:The depth for presetting Hash bucket, according to source IP, source port, destination IP, destination interface and agreement to Hash bucket Depth complementation operation obtains the cryptographic Hash of the data packet messages, and a data packet messages are often received in the unit interval, then its is right The counter values cumulative 1 answered;
The cryptographic Hash of data packet messages is inserted into the corresponding position of Hash bucket by S4, traffic statistics unit within the unit interval, and will Corresponding information passes to assessment unit with flow;
S5, assessment unit carry out statistical estimation to data traffic, and assessment result are sent to execution unit, and evaluation process is: After counter values are more than the threshold value of setting, assessment unit judges that the corresponding destination IP of data packet messages and destination interface generate Abnormal flow;
S6, execution unit can according to assessment result to data to generating the data source port locating source IP of abnormal flow, and to mesh The network equipment of IP handled and alerted.
2. a kind of network of Future Information war according to claim 1 is resisted and defence method, which is characterized in that described Agreement includes Transmission Control Protocol, one kind in three kinds of agreements of udp protocol and ICMP agreements.
3. a kind of network of Future Information war according to claim 1 is resisted and defence method, which is characterized in that described The process of counter values cumulative 1 is:The Hash of current data packet voice is obtained according to the header packet information of current data packet voice Value, by the cryptographic Hash of current data packet voice compared with the cryptographic Hash of historical data packet voice, if the Kazakhstan of current data packet voice When uncommon value is identical as one of the cryptographic Hash of historical data packet voice, the cryptographic Hash of historical data packet voice is found in Hash bucket Unique corresponding data packet messages, by the unique corresponding data packet messages of the cryptographic Hash of the historical data packet voice in Hash bucket Counter cumulative 1.
4. a kind of network of Future Information war according to claim 1 is resisted and defence method, which is characterized in that described Unit interval is 1s, and updates a Hash bucket per unit time.
5. a kind of network of Future Information war is resisted and system of defense, including traffic statistics unit, which is characterized in that the stream Amount statistic unit communication link is connected to master pattern unit, and master pattern unit communication is connected with assessment unit, assessment unit communication It is connected with execution unit.
6. a kind of network of Future Information war according to claim 5 is resisted and system of defense, which is characterized in that described Traffic statistics unit carries out traffic statistics using raw data packets header information.
7. a kind of network of Future Information war according to claim 5 is resisted and system of defense, which is characterized in that described The master pattern that master pattern unit establishes each Business Stream standard data stream forms Hash bucket, and is gone through using Hash bucket storage The cryptographic Hash of history data packet messages.
CN201810284068.5A 2018-04-02 2018-04-02 A kind of network of Future Information war is resisted and defence method and system Pending CN108521413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810284068.5A CN108521413A (en) 2018-04-02 2018-04-02 A kind of network of Future Information war is resisted and defence method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810284068.5A CN108521413A (en) 2018-04-02 2018-04-02 A kind of network of Future Information war is resisted and defence method and system

Publications (1)

Publication Number Publication Date
CN108521413A true CN108521413A (en) 2018-09-11

Family

ID=63431558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810284068.5A Pending CN108521413A (en) 2018-04-02 2018-04-02 A kind of network of Future Information war is resisted and defence method and system

Country Status (1)

Country Link
CN (1) CN108521413A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145037A (en) * 2018-11-03 2020-05-12 广州市明领信息科技有限公司 Big data analysis system
CN117857222A (en) * 2024-03-07 2024-04-09 国网江西省电力有限公司电力科学研究院 Dynamic IP-based network dynamic defense system and method for new energy centralized control station

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729389A (en) * 2008-10-21 2010-06-09 北京启明星辰信息技术股份有限公司 Flow control device and method based on flow prediction and trusted network address learning
JP2011176586A (en) * 2010-02-24 2011-09-08 Nippon Telegr & Teleph Corp <Ntt> Packet sampling apparatus and method, and program
CN105553974A (en) * 2015-12-14 2016-05-04 中国电子信息产业集团有限公司第六研究所 Prevention method of HTTP slow attack
US9705908B1 (en) * 2016-06-12 2017-07-11 Apple Inc. Emoji frequency detection and deep link frequency
CN107231384A (en) * 2017-08-10 2017-10-03 北京科技大学 A kind of ddos attack detection defence method cut into slices towards 5g networks and system
CN107770113A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of accurate flood attack detection method for determining attack signature

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729389A (en) * 2008-10-21 2010-06-09 北京启明星辰信息技术股份有限公司 Flow control device and method based on flow prediction and trusted network address learning
JP2011176586A (en) * 2010-02-24 2011-09-08 Nippon Telegr & Teleph Corp <Ntt> Packet sampling apparatus and method, and program
CN105553974A (en) * 2015-12-14 2016-05-04 中国电子信息产业集团有限公司第六研究所 Prevention method of HTTP slow attack
US9705908B1 (en) * 2016-06-12 2017-07-11 Apple Inc. Emoji frequency detection and deep link frequency
CN107770113A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of accurate flood attack detection method for determining attack signature
CN107231384A (en) * 2017-08-10 2017-10-03 北京科技大学 A kind of ddos attack detection defence method cut into slices towards 5g networks and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111145037A (en) * 2018-11-03 2020-05-12 广州市明领信息科技有限公司 Big data analysis system
CN117857222A (en) * 2024-03-07 2024-04-09 国网江西省电力有限公司电力科学研究院 Dynamic IP-based network dynamic defense system and method for new energy centralized control station

Similar Documents

Publication Publication Date Title
US8966627B2 (en) Method and apparatus for defending distributed denial-of-service (DDoS) attack through abnormally terminated session
CN108063765B (en) SDN system suitable for solving network security
Li et al. Distinguishing DDoS attacks from flash crowds using probability metrics
CN104836702B (en) Mainframe network unusual checking and sorting technique under a kind of large traffic environment
Shamsolmoali et al. Statistical-based filtering system against DDOS attacks in cloud computing
CN109587167B (en) Message processing method and device
CN104135474B (en) Intrusion Detection based on host goes out the Network anomalous behaviors detection method of in-degree
CN106534068B (en) Method and device for cleaning counterfeit source IP in DDOS defense system
CN106357685A (en) Method and device for defending distributed denial of service attack
Akilandeswari et al. Probabilistic neural network based attack traffic classification
US11190543B2 (en) Method and system for detecting and mitigating a denial of service attack
Ireland Intrusion detection with genetic algorithms and fuzzy logic
CN111092900A (en) Method and device for monitoring abnormal connection and scanning behavior of server
CN106357660A (en) Method and device for detecting IP (internet protocol) of spoofing source in DDOS (distributed denial of service) defense system
Aizuddin et al. DNS amplification attack detection and mitigation via sFlow with security-centric SDN
Andropov et al. Network anomaly detection using artificial neural networks
KR20110037645A (en) Apparatus and method for protecting ddos
CN110213254A (en) A kind of method and apparatus that Internet protocol IP packet is forged in identification
Song et al. Flow-based statistical aggregation schemes for network anomaly detection
CN106487790A (en) Cleaning method and system that a kind of ACK FLOOD is attacked
CN108521413A (en) A kind of network of Future Information war is resisted and defence method and system
Shamsolmoali et al. C2DF: High rate DDOS filtering method in cloud computing
CN104883362A (en) Method and device for controlling abnormal access behaviors
RU2307392C1 (en) Method (variants) for protecting computer networks
CN107864110A (en) Botnet main control end detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180911

RJ01 Rejection of invention patent application after publication