CN109660518A - Communication data detection method, device and the machine readable storage medium of network - Google Patents

Communication data detection method, device and the machine readable storage medium of network Download PDF

Info

Publication number
CN109660518A
CN109660518A CN201811399478.0A CN201811399478A CN109660518A CN 109660518 A CN109660518 A CN 109660518A CN 201811399478 A CN201811399478 A CN 201811399478A CN 109660518 A CN109660518 A CN 109660518A
Authority
CN
China
Prior art keywords
payload
cluster
length
clustered
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811399478.0A
Other languages
Chinese (zh)
Other versions
CN109660518B (en
Inventor
王高杰
李思齐
王智民
何志福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Liufang Lingan Network Technology Co Ltd
Beijing 6Cloud Technology Co Ltd
Original Assignee
Beijing Liufang Lingan Network Technology Co Ltd
Beijing 6Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Liufang Lingan Network Technology Co Ltd, Beijing 6Cloud Technology Co Ltd filed Critical Beijing Liufang Lingan Network Technology Co Ltd
Priority to CN201811399478.0A priority Critical patent/CN109660518B/en
Publication of CN109660518A publication Critical patent/CN109660518A/en
Application granted granted Critical
Publication of CN109660518B publication Critical patent/CN109660518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The embodiment of the present invention provides communication data detection method, device and the machine readable storage medium of a kind of network, belongs to technical field of network security.This method comprises: receiving communication data, which includes the data message with payload;It based at least one Data Detection model, is successively matched with the variable field of the length of the payload, the fixed field of the payload and the payload, when there is any matching unsuccessful, judges data message exception.Communication data detection method, device and the machine readable storage medium of the network without analyzing network protocol in advance, so that it may the exception of real-time detection communication data.

Description

Communication data detection method, device and the machine readable storage medium of network
Technical field
The present invention relates to network security technologies, more particularly to communication data detection method, device and the machine of network Readable storage medium storing program for executing.
Background technique
Industrial control system (Industrial Control System, ICS) is a kind of The general designation of system.It includes monitoring control and data collection system (Supervisory Control and Data Acquisition, SCADA), dcs and some other be common in the small-sized of industrial department and critical infrastructures Control system (such as programmable logic controller (PLC)).In recent years, Network Intrusion technology is more and more in industrial control system network, from And the concern of industry is also increasingly obtained for the discovery warning technology of the attack data message in industrial control network.
There are two types of now commonly used technologies.First, being the IDS Framework based on white list study mechanism.The skill Art is divided into industrial control system operation white list study and generates and industrial control system operation exception two stages of detection.It is generating Stage filters out industrial control system data packet from the data packet of web-based history flow, from the application layer load of data packet Extract the variable fields location information conducts such as the fixed character code of particular industry control system agreement, operation code, access address Protocol knowledge library, is loaded into appliance arrangement to be put into again in industry control business network and is learnt.And, it is assumed that web-based history flow Not comprising there is abnormal data, the datagram for meeting above-mentioned protocol knowledge library and defining that will occur in industrial control system data packet Text parses its variable field such as operation code and access address etc. as legal industrial control system operation field, and generates work Industry control system operation white list regular collection is stored.In the abnormality detection stage, the white list generated according to generation phase Rule accuses illegal format message, illegal operation code and the illegal address access for failing to match these white lists rule Alert or inhibition processing.
The above-mentioned Intrusion Detection Technique specific implementation based on white list mechanism is upper mainly to detect (Deep using deep message Packet Inspection, DPI) technology, based on analyze in advance come " tagged word " first identify industrial control system data Industrial control system agreement used in packet identifies each industrial control system data Bao Zhong according further to " tagged word " The load (information such as operation code and access address) of carrying.But because every kind of different industrial control system data agreement has Its unique format, therefore artificial ex ante analysis and its message format will be understood for each agreement, it is artificial fixed in advance Different " tagged word " is made, to identify the operation code and access address in industrial control system data packet.Its defect has three: First is that being extracted by manually carrying out protocal analysis and " tagged word ", working efficiency is low.Second is that for private proprietary protocol without Method is analyzed and extracts accurate format, and subsequent abnormality detection accuracy is influenced.Third is that Industry Control once occurs in the application System protocol edition upgrading, the above-mentioned detection system based on white list also must be to the industrial control system agreements after upgrading again Manual analysis is carried out, and software release upgrade is carried out to said detecting system, could effectively be supported.
Second, passing through the pure statistics of data message in the network that pursues one's vocational study based entirely on the modeling technique of machine learning Feature, such as message length, time interval, character in message load, the frequency etc. that n-gram occurs are established model and are detected. The disadvantage is that not high based on the model accuracy that these statistical natures are established, the infected information for being easy to be forged is cheated easily.It is this kind of Technology based on statistical nature modeling has Payl, the typical machines learning model building technology such as Macpad.
Summary of the invention
The purpose of the embodiment of the present invention is that providing a kind of communication data detection method of network, device and machine readable depositing Storage media, communication data detection method, device and the machine readable storage medium of the network without dividing network protocol in advance Analysis, so that it may the exception of real-time detection communication data.
To achieve the goals above, the embodiment of the present invention provides a kind of communication data detection side of industrial control system network Method, this method comprises: receiving communication data, which includes the data message with payload;Based at least one Data Detection model, successively with the length of the payload, the fixed field of the payload and the payload Variable field matched, have it is any matching it is unsuccessful when, judge the data message exception.
Preferably, the Data Detection model is established in the following manner: receiving multiple sample communications data, multiple sample Each sample communications data in this communication data include the sample data message with payload;According to the sample data The multiple sample data message is divided at least one length model by the length of the payload of message;For it is described at least Each length model in one length model, is gathered according to the similarity of the payload of the multiple sample data message Class forms at least one set of payload clustered;Every group in payload clustered for at least one set gathers The variable field of the payload of class calculates and stores regular expression to generate the Data Detection model.
Preferably, it includes: to build that the similarity of the payload according to the multiple sample data message, which carries out cluster, A class cluster is found, one of payload of multiple payload is stored to such cluster, and the cluster sequence as such cluster Column;To operation below remaining each payload execution of the multiple payload to generate at least one class cluster, as The payload that at least one set is clustered: successively the cluster sequence with current each class cluster calculates similarity;It is effective at this When the similarity of load and any one class cluster is more than or equal to threshold value, which is stored to such cluster, and by effective load The longest common subsequence of the cluster sequence of lotus and such cluster replaces with the cluster sequence of such cluster;In the payload and currently When the similarity of the cluster sequence of each class cluster is respectively less than threshold value, new class cluster is established, and the payload is stored to this newly Class cluster, and the cluster sequence of the class cluster new as this.
Preferably, the similarity d of the payload and the cluster sequence is calculated by the following formula:
Wherein, L is the length of the payload or the cluster sequence, and len (s) is institute State the length of the longest common subsequence of payload and the cluster sequence.
Preferably, this method further include: clustered every group of the payload that at least one set is clustered effective The fixed field for the payload that the longest common subsequence of load is clustered as every group.
It is preferably based at least one Data Detection model, successively with the length of the payload, the payload Fixed field and the payload variable field carry out matching include: by the length of the payload and it is described extremely The length of the payload of a few length model is matched, and matched length model is found;Based on matched length model, The fixed field of the payload is matched with the fixed field of every group of payload clustered, finds matching The payload clustered;Based on matched clustered payload, by the variable field of the payload with it is described Regular expression is matched.
Preferably, this method further include: receive the input for averagely reporting number in the first predetermined time by mistake;Detect the data Detection model, when the Data Detection model reports message in number and second predetermined time by mistake within second scheduled time Ratio, which was less than in first predetermined time, averagely reports number by mistake and in first predetermined time when ratio of message, establishes institute State the completion of Data Detection model.
The embodiment of the present invention also provides a kind of communication data detection device of industrial control system network, which includes: Receiving module and processing module, wherein for the receiving module for receiving communication data, which includes having effectively The data message of load;The processing module is used to be based at least one Data Detection model, successively with the payload The variable field of length, the fixed field of the payload and the payload is matched, and is having any matching not When success, data message exception is judged.
Preferably, the Data Detection model is established in the following manner: receiving multiple sample communications data, multiple sample Each sample communications data in this communication data include the sample data message with payload;According to the sample data The multiple sample data message is divided at least one length model by the length of the payload of message;For it is described at least Each length model in one length model, is gathered according to the similarity of the payload of the multiple sample data message Class forms at least one set of payload clustered;Every group in payload clustered for at least one set gathers The variable field of the payload of class calculates and stores regular expression to generate the Data Detection model.
The embodiment of the present invention also provides a kind of machine readable storage medium, and readable storage medium storing program for executing is stored with finger on the machine It enables, which is used for so that machine executes method as discussed above.
Through the above technical solutions, receiving communication data first, which includes the datagram with payload Text;It is then based at least one Data Detection model, successively with the length of the payload, the fixed word of the payload The variable field of section and the payload is matched, and when there is any matching unsuccessful, judges data message exception. Data Detection model of the present invention, which does not depend on, manually carries out analysis and " tagged word " formulation to industrial control system agreement in advance, finally Industrial control system Network anomaly detection is carried out based on Data Detection model, without being analyzed in advance network protocol, so that it may real-time detection The exception of communication data.
The other feature and advantage of the embodiment of the present invention will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is to further understand for providing to the embodiment of the present invention, and constitute part of specification, under The specific embodiment in face is used to explain the present invention embodiment together, but does not constitute the limitation to the embodiment of the present invention.Attached In figure:
Fig. 1 is the communication data detection method for the industrial control system network that one embodiment of the invention provides;
Fig. 2 is the communication data testing process frame signal for the industrial control system network that one embodiment of the invention provides Figure;
Fig. 3 is the Data Detection method for establishing model that one embodiment of the invention provides;
Fig. 4 is the clustering method that one embodiment of the invention provides;
Fig. 5 is the matching process that one embodiment of the invention provides;And
Fig. 6 is the structural representation of the communication data detection device for the industrial control system network that one embodiment of the invention provides Figure.
Description of symbols
1 receiving module, 2 processing module.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the embodiment of the present invention.It should be understood that this Locate described specific embodiment and be merely to illustrate and explain the present invention embodiment, is not intended to restrict the invention embodiment.
Fig. 1 is the communication data detection method for the industrial control system network that one embodiment of the invention provides.Such as Fig. 1 institute Show, this method comprises:
Step S11 receives communication data, which includes the data message with payload;
Step S12 is based at least one Data Detection model, successively with the length of the payload, effective load The variable field of the fixed field of lotus and the payload is matched, and when there is any matching unsuccessful, judges the number According to message exception.
In embodiments of the present invention, Data Detection model can be the security strategy selected according to user, to Industry Control The whole of the data message transmitted in grid, or according to acl rule filtering policy, according to network layer information (IP, end Mouthful etc.) or application layer message (domain name, URL information, to application type etc.) to the data of part of service or application in network What message was established.On the basis of Data Detection model, the communication data of any agreement for receiving (including is requested or answered Answer), it can successively match: the length of payload (essence can be considered character string), the fixed field of payload and effectively The variable field of load judges data message exception when there is any matching unsuccessful;When all matchings are successful, sentence The data message that breaks is normal.
Fig. 2 is the communication data testing process frame signal for the industrial control system network that one embodiment of the invention provides Figure.As shown in Fig. 2, in the present invention, can totally be divided into line modeling (modeling method is detailed below) and abnormality detection two Stage.In the line modeling stage, system carries out the payload of the data message mirror image transmitted in industrial control system network Capture, is then automatically analyzed and is learnt the inherent law in normal message load, the model or baseline as normal behaviour. Stop study and preservation model after the completion of modelling phase, the abnormality detection stage starts.Anomaly detector captures the Industry Control system Its normal behaviour model established with the modelling phase is compared, appoints by the payload of the data message transmitted in system network What data message too wide in the gap with model is all taken as exception, and triggers alarm, and trigger other possible measures to answer It is right.
This system carries out modeling to the data message transmitted in industrial control system network and uses online Real-time modeling set mode. System can be connected in series in the industrial control system network being currently running, to the data message of transmission carry out the modeling of flow relaying and Abnormality detection.It can also be connected in parallel in the industrial control system network being currently running, flow mirror is carried out to the data message of transmission As modeling and abnormality detection.
Fig. 3 is the Data Detection method for establishing model that one embodiment of the invention provides.As shown in figure 3, this method comprises:
Step S31 receives multiple sample communications data, each sample communications data packet in multiple sample communications data Include the sample data message with payload;
Step S32 draws the multiple sample data message according to the length of the payload of the sample data message Assign at least one length model;
Step S33, for each length model at least one described length model, according to the multiple sample data The similarity of the payload of message is clustered, and at least one set of payload clustered is formed;
Step S34, every group of payload clustered in the payload clustered for at least one set can Mutilation section calculates and stores regular expression to generate the Data Detection model.
Before establishing model, can first to sample data message carry out L34/L7 layer filtering, intrusion detection filter and Signaling message filtering, these filter types are the filter types that present those skilled in the art can choose as needed, herein Seldom repeat.
In terms of the message transmissions in industrial control system network, the message of different length, content and purpose difference are larger.System System can be divided according to the length of payload first.If transport layer protocol is based on TCP, single network message has Effect loaded length range can be 1~1460.If transport layer protocol is based on UDP, the payload of single network message is long Degree range can be 1~1472.According to transport layer protocol, the payload length of all messages is divided into first for system In 1460 or 1472 different length models.
In each length model, system is further divided according to the similitude of payload.Here stroke Point method can be based on unsupervised clustering, such as hierarchical clustering, the cluster based on division and density clustering, shape The payload clustered at least one set.
Then, after the completion of cluster, for each cluster, the longest common subsequence for obtaining sample in the cluster (such as has Effect load acdfg is adf with the longest common subsequence for clustering sequence aedfc) and store, it is substantially the effective of such cluster Load fixed field.The other positions of longest common subsequence are substantially the payload variable fields of such cluster, this is System is concluded (type such as letter/number etc., whole possible values etc.) to its codomain range of variable field, so as to shape It at regular expression and stores, to generate Data Detection model.Therefore Data Detection model is divided twice by length, cluster Afterwards, regeneration regular expression obtains.
In order to avoid modeling process by malicious attack is influenced and influenced the accuracy of abnormality detection, which can be with fire prevention Wall, the technologies such as intrusion prevention system (IPS) or equipment are integrated, and are maliciously attacked just when to avoid this system modeling Hit message loading effect.
The payload of each data message transmitted in network is substantially a series of byte, the load of different application The format rule that lotus has its different.This system, can also be first according to L34 layers of information (such as IP information, port letter in the modelling phase Breath, TCP/UDP protocol information etc.) and L7 layers of information (such as MODBUS protocol information, OPC protocol information etc.) difference, data Message is first divided into different models, such as the content of a certain model only has TCP/UDP protocol information and OPC protocol information.Again It is individually modeled using above-mentioned length division mode for each model, learns the inherent law of load.System is just for message Payload is learnt, and the signaling message (such as ACK message) and response message of not payload are ignored.
Adaptive modeling process is polluted by malicious traffic stream in order to prevent, it is therefore desirable to after the completion of modeling, be stopped and be stored Modeling result.It is existing it is most need manually to stop the process or pre-set certain modeling time, timing stops adaptive Modeling process.The embodiment of the present invention can synchronize progress " examination detection " mechanism during modeling, and according to " examination detects " As a result it is automatically stopped modeling process.The present invention provides a configuration item in user interface, and the receptible wrong report number of user is arranged, It can be the number averagely alerted daily, be also possible to percentage.A wrong report number can be set in user, indicates that first is predetermined Allow the wrong report number (such as 2 wrong reports) of average appearance in time (such as every 24 hours).So (24 is small within one day for system statistics When) message that occurs tries testing number, such as 10000 messages, if the second predetermined time (it is pre- much smaller than first to can configure the time Fix time 24 hours) in discovery 99.98% ((10000-2)/10000) communication data can meet learning model, then automatically Stop modeling process, and stores modeling result.
Fig. 4 is the clustering method that one embodiment of the invention provides.As shown in figure 4, this method comprises:
Step S41 establishes a class cluster, and one of payload of multiple payload is stored to such cluster, and Cluster sequence as such cluster;
Step S42, it is successively poly- with current each class cluster to remaining each payload of the multiple payload Class sequence calculates similarity;
Step S43, the similarity for judging whether there is any one class cluster and payload are more than or equal to threshold value;
Step S44 deposits the payload when the payload and the similarity of any one class cluster are more than or equal to threshold value It stores up to such cluster, and the longest common subsequence of the payload He the cluster sequence of such cluster is replaced with to the cluster of such cluster Sequence;
Step S45 is established when the similarity of the payload and the cluster sequence of current each class cluster is respectively less than threshold value New class cluster, and the payload is stored to the new class cluster, and the cluster sequence of the class cluster new as this.
Not accurate enough, the inefficiency such as hierarchical clustering, the cluster based on division and density clustering described above, It is not suitable with the line modeling of high speed network message.It is specific as follows the embodiment of the invention provides a kind of preferred clustering method:
A final class cluster chained list is initialized, a class cluster is established, is initially empty;
One of payload of multiple payload is stored to such cluster, and the cluster sequence as such cluster (can first be ranked up herein to multiple payload will not reprocess to guarantee payload in subsequent processing);
To remaining each payload of multiple payload, successively the cluster sequence with current each class cluster calculates phase Like degree.If at this time class cluster only one, similarity only is calculated to the cluster sequence of such cluster;
A load similarity threshold is initialized, similarity is more than that the load of threshold value belongs to a class cluster;
When payload and the similarity of any one class cluster are more than or equal to threshold value, which is stored to such Cluster, and the longest common subsequence of the payload He the cluster sequence of such cluster is replaced with to the cluster sequence of such cluster, this The digit of Shi Ruguo longest common subsequence is fewer than the digit of payload, then is supplied using any label, such as payload The longest common subsequence of acdfg and cluster sequence aedfc are adf, then carry out clustering sequence after digit is supplied being a*df*, so Replace the cluster sequence of such cluster again afterwards;
When the similarity of the payload and the cluster sequence of current each class cluster is respectively less than threshold value, new class is established Cluster, and the payload is stored to the new class cluster, and the cluster sequence of the class cluster new as this.
When all class clusters are no longer changed in a period of time threshold value, illustrate that all payload are disposed, obtain At least one class cluster can be used as at least one set of payload clustered, terminate cluster.
Similarity calculation described above can be obtained by using calculating character string distance.Such as two character strings (s1, The distance between acdfg and s2, aedfc, length L), exactly find out longest common subsequence s3, such as above-mentioned character string s1 Longest common subsequence with s2 is adf, and the distance between they areSimilarity is according to formulaIt calculates, wherein L is the length of the payload or the cluster sequence, and len (s) has to be described Imitate the length of the longest common subsequence of load and the cluster sequence.That is, obtaining distance is (5-3)/5=0.4, similarity is 1-0.4=0.6.
Fig. 5 is the matching process that one embodiment of the invention provides.As shown in figure 5, this method comprises:
Step S51, by the length of the length of the payload and the payload of at least one length model into Row matching, finds matched length model;
Step S52 is based on matched length model, and the fixed field of the payload is clustered with described every group The fixed field of payload is matched, and matched clustered payload is found;
Step S53, based on matched clustered payload, by the variable field of the payload and the canonical Expression formula is matched.
In conclusion in modeling process, the payload and regular expressions that have respectively obtained length model, clustered Formula, therefore, for the message of new communication data, progress length matching first sees which length is the payload of the message belong to Model is spent, corresponding length model is found.Then in the length model, according to the payload of each cluster stored before Fixed field matched, see the fixed field of which equivalent cluster of the fixed field of the payload, and find and meet Cluster.Finally according to the variable field of the regular expression matching payload of cluster storage.If length matching, cluster Match and regular expression matching have one it is unsuccessful (length matching or cluster match it is for example unsuccessful, then will not carry out subsequent Matching), then be determined as exception message, carry out alarm and further responsive to.
This system does not depend on any " feature database ", without analyzing in advance industrial control system network protocol, i.e., Communication data in industrial control system network can be measured in real time, the known and even unknown attack of discovery, The communication data feature in real network environment can be automatically extracted, and sets up baseline, the foundation as abnormality detection.When with Normal upgrading or adjustment occur for family network, when variation has occurred in communication data, can also re-start study, realize and update mould Type.
Fig. 6 is the structural representation of the communication data detection device for the industrial control system network that one embodiment of the invention provides Figure.As shown in fig. 6, the device includes: receiving module 1 and processing module 2, wherein the receiving module 1 is for receiving communication Data, the communication data include the data message with payload;The processing module 2 is used to examine based at least one data Model is surveyed, successively with the variable of the length of the payload, the fixed field of the payload and the payload Field is matched, and when there is any matching unsuccessful, judges data message exception.
Preferably, the Data Detection model is established in the following manner: receiving multiple sample communications data, multiple sample Each sample communications data in this communication data include the sample data message with payload;According to the sample data The multiple sample data message is divided at least one length model by the length of the payload of message;For it is described at least Each length model in one length model, is gathered according to the similarity of the payload of the multiple sample data message Class forms at least one set of payload clustered;Every group in payload clustered for at least one set gathers The variable field of the payload of class calculates and stores regular expression to generate the Data Detection model.
Preferably, it includes: to build that the similarity of the payload according to the multiple sample data message, which carries out cluster, A class cluster is found, one of payload of multiple payload is stored to such cluster, and the cluster sequence as such cluster Column;To operation below remaining each payload execution of the multiple payload to generate at least one class cluster, as The payload that at least one set is clustered: successively the cluster sequence with current each class cluster calculates similarity;It is effective at this When the similarity of load and any one class cluster is more than or equal to threshold value, which is stored to such cluster, and by effective load The longest common subsequence of the cluster sequence of lotus and such cluster replaces with the cluster sequence of such cluster;In the payload and currently When the similarity of the cluster sequence of each class cluster is respectively less than threshold value, new class cluster is established, and the payload is stored to this newly Class cluster, and the cluster sequence of the class cluster new as this.
Preferably, the similarity d of the payload and the cluster sequence is calculated by the following formula:
Wherein, L is the length of the payload or the cluster sequence, and len (s) is institute State the length of the longest common subsequence of payload and the cluster sequence.
Preferably, the similarity d of cluster sequence described above can pass through all characters or partial character of payload The relative frequency of appearance is distributed, and is compared and calculates Euclidean distance or mahalanobis distance.
Preferably, the processing module 2 is also used to: every group of the payload that at least one set is clustered is clustered Payload the fixed field of payload that is clustered as every group of longest common subsequence.
It is preferably based at least one Data Detection model, successively with the length of the payload, the payload Fixed field and the payload variable field carry out matching include: by the length of the payload and it is described extremely The length of the payload of a few length model is matched, and matched length model is found;Based on matched length model, The fixed field of the payload is matched with the fixed field of every group of payload clustered, finds matching The payload clustered;Based on matched clustered payload, by the variable field of the payload with it is described Regular expression is matched.
Preferably, the processing module 2 is also used to: receiving the input for averagely reporting number in the first predetermined time by mistake;Detection The Data Detection model, when the Data Detection model reports number and second predetermined time by mistake within second scheduled time The ratio of interior message be less than first predetermined time in averagely report by mistake number and in first predetermined time message ratio When, it establishes the Data Detection model and completes.
The embodiment of above-mentioned apparatus and the embodiment of method as discussed above are similar, and details are not described herein.
The embodiment of the present invention also provides a kind of machine readable storage medium, and readable storage medium storing program for executing is stored with finger on the machine It enables, which is used for so that machine executes method as discussed above.
Through the above technical solutions, receiving communication data first, which includes the datagram with payload Text;It is then based at least one Data Detection model, successively with the length of the payload, the fixed word of the payload The variable field of section and the payload is matched, and when there is any matching unsuccessful, judges data message exception. Data Detection model of the present invention, which does not depend on, manually carries out analysis and " tagged word " formulation to industrial control system agreement in advance, finally Industrial control system Network anomaly detection is carried out based on Data Detection model, without being analyzed in advance network protocol, so that it may real-time detection The exception of communication data.
The optional embodiment of the embodiment of the present invention is described in detail in conjunction with attached drawing above, still, the embodiment of the present invention is simultaneously The detail being not limited in above embodiment can be to of the invention real in the range of the technology design of the embodiment of the present invention The technical solution for applying example carries out a variety of simple variants, these simple variants belong to the protection scope of the embodiment of the present invention.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the embodiment of the present invention pair No further explanation will be given for various combinations of possible ways.
It will be appreciated by those skilled in the art that implementing the method for the above embodiments is that can pass through Program is completed to instruct relevant hardware, which is stored in a storage medium, including some instructions are used so that single Piece machine, chip or processor (processor) execute all or part of the steps of each embodiment the method for the application.And it is preceding The storage medium stated includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), magnetic or disk.
In addition, any combination can also be carried out between a variety of different embodiments of the embodiment of the present invention, as long as it is not The thought of the embodiment of the present invention is violated, equally should be considered as disclosure of that of the embodiment of the present invention.

Claims (10)

1. a kind of communication data detection method of industrial control system network, which is characterized in that this method comprises:
Communication data is received, which includes the data message with payload;
Based at least one Data Detection model, successively with the length of the payload, the fixed field of the payload And the variable field of the payload is matched, and when there is any matching unsuccessful, judges data message exception.
2. the communication data detection method of industrial control system network according to claim 1, which is characterized in that the number It is established in the following manner according to detection model:
Multiple sample communications data are received, each sample communications data in multiple sample communications data include having effectively to carry The sample data message of lotus;
The multiple sample data message is divided at least one according to the length of the payload of the sample data message Length model;
For each length model at least one described length model, according to effective load of the multiple sample data message The similarity of lotus is clustered, and at least one set of payload clustered is formed;
The variable field of the every group of payload clustered in payload clustered for at least one set calculates simultaneously Regular expression is stored to generate the Data Detection model.
3. the communication data detection method of industrial control system network according to claim 2, which is characterized in that described Carrying out cluster according to the similarity of the payload of the multiple sample data message includes:
A class cluster is established, one of payload of multiple payload is stored to such cluster, and as such cluster Cluster sequence;
To operation below remaining each payload execution of the multiple payload to generate at least one class cluster, as The payload that at least one set is clustered:
Successively the cluster sequence with current each class cluster calculates similarity;
When the payload and the similarity of any one class cluster are more than or equal to threshold value, which is stored to such cluster, And the longest common subsequence of the payload He the cluster sequence of such cluster is replaced with to the cluster sequence of such cluster;
When the similarity of the payload and the cluster sequence of current each class cluster is respectively less than threshold value, new class cluster is established, and The payload is stored to the new class cluster, and the cluster sequence of the class cluster new as this.
4. the communication data detection method of industrial control system network according to claim 3, which is characterized in that described to have The similarity d of effect load and the cluster sequence is calculated by the following formula:
Wherein, L is the length of the payload or the cluster sequence, and len (s) has to be described Imitate the length of the longest common subsequence of load and the cluster sequence.
5. the communication data detection method of industrial control system network according to claim 2 or 3, which is characterized in that should Method further include:
The longest common subsequence of every group of payload clustered of the payload that at least one set is clustered as The fixed field of every group of payload clustered.
6. the communication data detection method of industrial control system network according to claim 5, which is characterized in that based on extremely A few data detection model successively with the length of the payload, the fixed field of the payload and described has The variable field of effect load carries out matching
The length of the payload is matched with the length of the payload of at least one length model, is found The length model matched;
Based on matched length model, by consolidating for the fixed field of the payload and every group of payload clustered Determine field to be matched, finds matched clustered payload;
Based on matched clustered payload, by the variable field of the payload and regular expression progress Match.
7. the communication data detection method of industrial control system network according to claim 2, which is characterized in that this method Further include:
Receive the input for averagely reporting number in the first predetermined time by mistake;
The Data Detection model is detected, when the Data Detection model reports number and described second by mistake within second scheduled time The ratio of message, which was less than in first predetermined time, in predetermined time averagely reports report in number and first predetermined time by mistake When the ratio of text, establishes the Data Detection model and complete.
8. a kind of communication data detection device of industrial control system network, which is characterized in that the device includes:
Receiving module and processing module, wherein
For the receiving module for receiving communication data, which includes the data message with payload;
The processing module is used to be based at least one Data Detection model, successively with the length of the payload, described have The variable field of the fixed field and the payload of imitating load is matched, when there is any matching unsuccessful, judgement The data message is abnormal.
9. the communication data detection device of industrial control system network according to claim 8, which is characterized in that the number It is established in the following manner according to detection model:
Multiple sample communications data are received, each sample communications data in multiple sample communications data include having effectively to carry The sample data message of lotus;
The multiple sample data message is divided at least one according to the length of the payload of the sample data message Length model;
For each length model at least one described length model, according to effective load of the multiple sample data message The similarity of lotus is clustered, and at least one set of payload clustered is formed;
The variable field of the every group of payload clustered in payload clustered for at least one set calculates simultaneously Regular expression is stored to generate the Data Detection model.
10. a kind of machine readable storage medium, which is characterized in that readable storage medium storing program for executing is stored with instruction on the machine, the instruction For making machine execute method described in any one of the claim of this application 1-7 claim.
CN201811399478.0A 2018-11-22 2018-11-22 Communication data detection method and device of network and machine-readable storage medium Active CN109660518B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811399478.0A CN109660518B (en) 2018-11-22 2018-11-22 Communication data detection method and device of network and machine-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811399478.0A CN109660518B (en) 2018-11-22 2018-11-22 Communication data detection method and device of network and machine-readable storage medium

Publications (2)

Publication Number Publication Date
CN109660518A true CN109660518A (en) 2019-04-19
CN109660518B CN109660518B (en) 2020-12-18

Family

ID=66112151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811399478.0A Active CN109660518B (en) 2018-11-22 2018-11-22 Communication data detection method and device of network and machine-readable storage medium

Country Status (1)

Country Link
CN (1) CN109660518B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311925A (en) * 2019-07-30 2019-10-08 百度在线网络技术(北京)有限公司 Detection method and device, computer equipment and the readable medium of DDoS reflection-type attack
CN110912927A (en) * 2019-12-09 2020-03-24 北京神州绿盟信息安全科技股份有限公司 Method and device for detecting control message in industrial control system
CN111800312A (en) * 2020-06-23 2020-10-20 中国核动力研究设计院 Message content analysis-based industrial control system anomaly detection method and system
CN112272184A (en) * 2020-10-29 2021-01-26 杭州迪普科技股份有限公司 Industrial flow detection method, device, equipment and medium
CN112910797A (en) * 2021-01-20 2021-06-04 中国科学院计算技术研究所 I2P flow identification method and system based on feature matching
CN115314252A (en) * 2022-07-06 2022-11-08 北京神州慧安科技有限公司 Protection method, system, terminal and storage medium applied to industrial firewall
CN116582363A (en) * 2023-07-12 2023-08-11 江苏政采数据科技有限公司 Industrial protocol based detection method for transmission flow abnormal attack

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078897A (en) * 2012-11-29 2013-05-01 中山大学 System for implementing fine grit classification and management of Web services
US20160012235A1 (en) * 2014-02-10 2016-01-14 Vivo Security Inc. Analysis and display of cybersecurity risks for enterprise data
US20160177304A1 (en) * 2014-12-18 2016-06-23 Integrated Dna Technologies, Inc. Crispr-based compositions and methods of use
CN106375295A (en) * 2016-08-30 2017-02-01 四川新环佳科技发展有限公司 Data storage monitoring method
CN107612905A (en) * 2017-09-15 2018-01-19 广西电网有限责任公司电力科学研究院 The malicious code monitoring method of equipment oriented monitoring distributed system main website

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078897A (en) * 2012-11-29 2013-05-01 中山大学 System for implementing fine grit classification and management of Web services
US20160012235A1 (en) * 2014-02-10 2016-01-14 Vivo Security Inc. Analysis and display of cybersecurity risks for enterprise data
US20160177304A1 (en) * 2014-12-18 2016-06-23 Integrated Dna Technologies, Inc. Crispr-based compositions and methods of use
CN106375295A (en) * 2016-08-30 2017-02-01 四川新环佳科技发展有限公司 Data storage monitoring method
CN107612905A (en) * 2017-09-15 2018-01-19 广西电网有限责任公司电力科学研究院 The malicious code monitoring method of equipment oriented monitoring distributed system main website

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ISTVÁN KISS等: ""Data Clustering-based Anomaly Detection in Industrial Control Systems"", 《2014 IEEE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP)》 *
尚文利等: ""工业控制系统入侵检测技术的研究及发展综述"", 《计算机应用研究》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311925A (en) * 2019-07-30 2019-10-08 百度在线网络技术(北京)有限公司 Detection method and device, computer equipment and the readable medium of DDoS reflection-type attack
CN110311925B (en) * 2019-07-30 2022-06-28 百度在线网络技术(北京)有限公司 DDoS reflection type attack detection method and device, computer equipment and readable medium
CN110912927A (en) * 2019-12-09 2020-03-24 北京神州绿盟信息安全科技股份有限公司 Method and device for detecting control message in industrial control system
CN111800312A (en) * 2020-06-23 2020-10-20 中国核动力研究设计院 Message content analysis-based industrial control system anomaly detection method and system
CN111800312B (en) * 2020-06-23 2021-08-24 中国核动力研究设计院 Message content analysis-based industrial control system anomaly detection method and system
CN112272184A (en) * 2020-10-29 2021-01-26 杭州迪普科技股份有限公司 Industrial flow detection method, device, equipment and medium
CN112272184B (en) * 2020-10-29 2022-07-01 杭州迪普科技股份有限公司 Industrial flow detection method, device, equipment and medium
CN112910797A (en) * 2021-01-20 2021-06-04 中国科学院计算技术研究所 I2P flow identification method and system based on feature matching
CN112910797B (en) * 2021-01-20 2023-04-11 中国科学院计算技术研究所 I2P flow identification method and system based on feature matching
CN115314252A (en) * 2022-07-06 2022-11-08 北京神州慧安科技有限公司 Protection method, system, terminal and storage medium applied to industrial firewall
CN116582363A (en) * 2023-07-12 2023-08-11 江苏政采数据科技有限公司 Industrial protocol based detection method for transmission flow abnormal attack

Also Published As

Publication number Publication date
CN109660518B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN109660518A (en) Communication data detection method, device and the machine readable storage medium of network
US20220150267A1 (en) Cognitive information security using a behavior recognition system
CN106131071B (en) A kind of Web method for detecting abnormality and device
CN107154950B (en) Method and system for detecting log stream abnormity
CN111262722B (en) Safety monitoring method for industrial control system network
CN106778259B (en) Abnormal behavior discovery method and system based on big data machine learning
CN104509034B (en) Pattern merges to identify malicious act
CN108200030A (en) Detection method, system, device and the computer readable storage medium of malicious traffic stream
CN111309565B (en) Alarm processing method and device, electronic equipment and computer readable storage medium
CN105376193B (en) The intelligent association analysis method and device of security incident
JP2019110513A (en) Anomaly detection method, learning method, anomaly detection device, and learning device
CN108512841A (en) A kind of intelligent system of defense and defence method based on machine learning
CN106685984A (en) Network threat analysis system and method based on data pocket capture technology
CN105260662A (en) Detection device and method of unknown application bug threat
CN110460611B (en) Machine learning-based full-flow attack detection technology
CN109768952A (en) A kind of industry control network anomaly detection method based on trust model
CN107111609A (en) Lexical analyzer for neural language performance identifying system
CN111049827A (en) Network system safety protection method, device and related equipment
CN112511351A (en) Security situation prediction method and system based on MES identification data intercommunication system
CN110445766A (en) Ddos attack method for situation assessment and device
US11297082B2 (en) Protocol-independent anomaly detection
EP4009586A1 (en) A system and method for automatically neutralizing malware
CN110598959A (en) Asset risk assessment method and device, electronic equipment and storage medium
CN107896229A (en) A kind of method, system and the mobile terminal of computer network abnormality detection
KR102433830B1 (en) System and method for security threats anomaly detection based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room C202, floor 2, building 1, No. 12, Shangdi Information Road, Haidian District, Beijing 100085

Applicant after: Beijing Liufang cloud Information Technology Co., Ltd

Applicant after: BEIJING 6CLOUD TECHNOLOGY Co.,Ltd.

Address before: 100085 Beijing Haidian District Information Road No. 7 3 Floor 18-1-3017, 18-1-3018

Applicant before: BEIJING LIUFANG LING'AN NETWORK TECHNOLOGY Co.,Ltd.

Applicant before: BEIJING 6CLOUD TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant