CN111641628B - Monitoring and early warning method for DDoS attack in subnet deception - Google Patents

Monitoring and early warning method for DDoS attack in subnet deception Download PDF

Info

Publication number
CN111641628B
CN111641628B CN202010456650.2A CN202010456650A CN111641628B CN 111641628 B CN111641628 B CN 111641628B CN 202010456650 A CN202010456650 A CN 202010456650A CN 111641628 B CN111641628 B CN 111641628B
Authority
CN
China
Prior art keywords
tcp
subnet
alarm
state
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010456650.2A
Other languages
Chinese (zh)
Other versions
CN111641628A (en
Inventor
冯钊
曹立
高才
郭晓冬
唐锡南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Radio And Television Research Institute Co ltd
Original Assignee
Nanjing Clearcloud Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Clearcloud Software Technology Co ltd filed Critical Nanjing Clearcloud Software Technology Co ltd
Priority to CN202010456650.2A priority Critical patent/CN111641628B/en
Publication of CN111641628A publication Critical patent/CN111641628A/en
Application granted granted Critical
Publication of CN111641628B publication Critical patent/CN111641628B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Abstract

The invention relates to a monitoring and early warning method for a subnet spoofing DDoS attack, which comprises the steps of receiving user network flow through a bypass mirror image of a switch and separating TCP flow; carrying out aggregation according to the source address, the destination port and the TCP ending state; and extracting the number of the alarm source addresses of the same subnet from the alarm information, if the number of the alarm source addresses of a certain subnet exceeds a threshold value, sending an alarm, otherwise, retrieving the number of the source addresses of the subnet with unsuccessful TCP three-way handshake and the corresponding total number of unsuccessful connections from the TCP aggregated data, and if the source addresses and the total number of connections both exceed the threshold value, sending the alarm. The invention uses multi-level rules to carry out pipeline type combination, extracts the sub-network number from the low-level alarm information, and retrieves the DDoS attack flow from the TCP full-flow data by the extracted sub-network number, thereby generating a higher-level subnet deception DDoS alarm, greatly reducing the computation amount and the complexity of the rules, and improving the identification accuracy.

Description

Monitoring and early warning method for DDoS attack in subnet deception
Technical Field
The invention relates to the technical field of network equipment security management, in particular to a monitoring and early warning method for DDoS attack in subnet deception.
Background
Distributed denial-of-service attack (DDoS) is one of the most important threats of the internet today. DDoS attack means that an attacker consumes computing resources of an attack target through a puppet host mass request to prevent the target from providing service for a legal user. The Web server and the DNS server are the most common attack targets, and the consumable computing resources can be a CPU, a memory, a bandwidth and the like; both domestic and foreign websites such as Amazon, eBay, Yahoo, Sina, Baidu have been attacked by DDoS. DDoS attacks can not only achieve a specific objective, such as attacks on a WEB server or a DNS server, but also attack on network infrastructure, such as routers. By using huge attack flow, the infrastructure of the internet regional network obtained by an attack target can be overloaded, so that the network performance is greatly reduced, and the service borne by the network is influenced.
IP spoofing, or source IP address spoofing, refers to a technique that lies around the return address (i.e., source address) of a packet. Using IP spoofing, an attacker can gain unauthorized access to a computer or network by "spoofing" the computer's IP address, making it appear as if it were a message from some trusted computer. In subnet spoofing, addresses are generated from an address space corresponding to the subnet in which the agent computer is located. For example, a computer belonging to the 143.89.124.0/24 network may spoof any address between 143.89.124.0 and 143.89.124.255. Strictly speaking, IP spoofing is not an attack per se, but it is merely a scheme for DDoS attacks.
TCP-based flooding attacks are a common form of distributed denial of service (DDoS) attacks that abuse network resources and may pose a serious threat to the Internet. Incorporating IP spoofing makes it more difficult to defend against such attacks. Subnet spoofing is the most problematic type among different IP spoofing techniques, including random spoofing, subnet spoofing, and fixed spoofing.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a subnet deception DDoS attack monitoring and early warning method which has the advantages that the identification does not depend on manual registration identification, the problems that a server is established in a network privately and is difficult to find after a system is reinstalled or a new network address is allocated are avoided, the identification is rapid, and the accuracy is high.
The Chinese corresponding to English referred in the following documents is explained as follows: DDoS refers to distributed denial of service attacks; TCP refers to transmission control protocol messages; dip refers to the destination address; sip refers to the source address; dip refers to the destination address; timeout _ state refers to the ending state of the current TCP connection; flow refers to the number of TCP streams; info refers to a message or message; war refers to warning or vigilance.
In order to achieve the purpose, the invention adopts the following technical scheme.
A monitoring and early warning method for DDoS attack in subnet deception specifically comprises the following steps:
step S1: capturing network flow data from a switch mirror image through bypass monitoring equipment, separating TCP flow from the network flow data, and then performing classification and aggregation according to a source address, a destination port and a TCP ending state;
step S2: cleaning the data aggregated in the step S1, and collecting four features including an extracted source address (sip), a destination address (dip), a current end state (timeout _ state) of the TCP connection, and a TCP flow number (flow);
step S3: collecting four characteristic values of step S2 of each device communication data, then judging whether the source address belongs to an address for initiating DDoS attack according to a set trigger condition, and generating an info alarm if the source address accords with the trigger condition;
step S4: counting the number of source addresses belonging to the same subnet and corresponding subnet numbers according to the info alarm information of the step S3, and if the number of the info alarm source addresses of a certain subnet exceeds a preset threshold, sending a war alarm; otherwise, performing subsequent further judgment analysis on the subnet;
step S5: the further decision analysis in step S4 includes retrieving, from the TCP aggregate data, the number of source addresses of the TCP unsuccessful connections and the corresponding total number of unsuccessful connections existing in the subnet, and if both the number of source addresses and the total number of unsuccessful connections exceed a preset threshold, issuing a war alarm, otherwise, not issuing a war alarm.
As a further improvement of the present invention, the step S2 extracts characteristic data of the ending state (timeout _ state) of the TCP connection from the aggregated TCP data, where the characteristic data includes various state parameters occurring in the TCP communication process, including an unconnected state, a connected state, an unfinished state, and an ended state.
As a further improvement of the present invention, the triggering condition in step S3 is specifically that data of "the number of TCP flows is greater than or equal to 60 per minute and the ending state characteristic value of the current TCP connection is any one of 1, 2, 10, and 11" exists in the TCP traffic data, which indicates that the source address is initiating a syn flood attack, and issues an info alarm and gives a message prompt to the administrator that a syn flood attack currently exists.
As a further improvement of the present invention, the step S5 of presetting the threshold and the alarm feedback specifically includes retrieving, from the TCP aggregate data, the source address number and the total number of flow of the ending state feature data timeout _ state of the TCP connection of the subnet, which is any one of 1, 2, 10, and 11, and if both the source address number and the total number of flow exceed preset values, issuing a war alarm.
Due to the application of the technical scheme, the technical scheme of the invention has the following beneficial effects: according to the technical scheme, the network flow is obtained through the switch mirror image, the purpose of bypass detection is achieved, the performance of a backbone network is not influenced, the data state is judged through the separated TCP flow through state aggregation analysis according to a source address, a destination port and TCP ending, and if the data state meets a trigger condition, an info alarm is generated for subsequent analysis and use again, so that a primary screening effect is achieved; according to the technical scheme, the number of the source addresses belonging to the same subnet and the corresponding subnet number are counted in the alarm information through analysis, if the number of the alarm source addresses of a certain subnet exceeds a threshold value, a war alarm is sent out, and abnormal data classification is realized; the technical scheme also extracts the sub-network number from the alarm information and judges whether the sub-network number is a sub-network spoofing DDoS attack or not, thereby greatly reducing the rule complexity and the operation amount; according to the technical scheme, the sub-network numbers counted in the alarm information are used for rechecking the TCP data, so that the identification accuracy is improved; according to the technical scheme, the mirror flow is only required to be acquired from the switch, the configuration operation is simple and convenient, the identification and judgment process is accelerated by analyzing the technical characteristic information of the flow, corresponding early warning information is immediately sent out after the identification and judgment, and managers are prompted to carry out technical treatment, so that the working efficiency of system managers is greatly improved, and the communication safety is greatly improved.
Detailed Description
The present invention will be described in further detail with reference to specific examples.
A monitoring and early warning method for DDoS attack in subnet deception specifically comprises the following steps: step S1: capturing network flow data from a switch mirror image through bypass monitoring equipment, separating TCP flow from the network flow data, and then performing classification and aggregation according to a source address, a destination port and a TCP ending state; step S2: cleaning the data aggregated in the step S1, and collecting four features including an extracted source address (sip), a destination address (dip), a current end state (timeout _ state) of the TCP connection, and a TCP flow number (flow); step S3: collecting four characteristic values of step S2 of each device communication data, then judging whether the source address belongs to an address for initiating DDoS attack according to a set trigger condition, and generating an info alarm if the source address accords with the trigger condition; step S4: counting the number of source addresses belonging to the same subnet and corresponding subnet numbers according to the info alarm information of the step S3, and if the number of the info alarm source addresses of a certain subnet exceeds a preset threshold, sending a war alarm; otherwise, performing subsequent further judgment analysis on the subnet; step S5: the further decision analysis in step S4 includes retrieving, from the TCP aggregate data, the number of source addresses of the TCP unsuccessful connections and the corresponding total number of unsuccessful connections existing in the subnet, and if both the number of source addresses and the total number of unsuccessful connections exceed a preset threshold, issuing a war alarm, otherwise, not issuing a war alarm.
For the value of the data feature timeout _ state and the corresponding meaning, see the following table of the corresponding meaning of the timeout _ state:
Figure DEST_PATH_IMAGE001
the step S2 extracts characteristic data of the ending state (timeout _ state) of the TCP connection from the aggregated TCP data, which includes various state parameters occurring in the TCP communication process, including an unconnected state, a connected state, an unfinished state, and a finished state.
The triggering condition in step S3 is specifically that data "the number of TCP flows is greater than or equal to 60 per minute and the end state characteristic value of the current TCP connection is any one of 1, 2, 10, and 11" exists in the TCP traffic data, which indicates that the source address is initiating a syn flood attack, and issues an info alarm and gives an administrator a message prompt that a syn flood attack currently exists.
The step S5 of presetting the threshold and the alarm feedback specifically includes retrieving, from the TCP aggregate data, that the ending state feature data timeout _ state of the TCP connection of the subnet is the source address number of any one of 1, 2, 10, and 11 and the total number of the corresponding flow, and if both the source address number and the total number of the flow exceed preset values, sending a war alarm.
The above is only a specific application example of the present invention, and the protection scope of the present invention is not limited in any way. All the technical solutions formed by equivalent transformation or equivalent replacement fall within the protection scope of the present invention.

Claims (4)

1. A monitoring and early warning method for DDoS attack in subnet deception is characterized by comprising the following steps:
step S1: capturing network flow data from a switch mirror image through bypass monitoring equipment, separating TCP flow from the network flow data, and then performing classification and aggregation according to a source address, a destination port and a TCP ending state;
step S2: cleaning the data aggregated in the step S1, and collecting four features including an extracted source address (sip), a destination address (dip), a current end state (timeout _ state) of the TCP connection, and a TCP flow number (flow);
step S3: collecting four characteristic values of step S2 of each device communication data, then judging whether the source address belongs to an address for initiating DDoS attack according to a set trigger condition, and generating an info alarm if the source address accords with the trigger condition;
step S4: counting the number of source addresses belonging to the same subnet and corresponding subnet numbers according to the info alarm information of the step S3, and if the number of the info alarm source addresses of a certain subnet exceeds a preset threshold, sending a war alarm; otherwise, performing subsequent further judgment analysis on the subnet;
step S5: the further decision analysis in step S4 includes retrieving, from the TCP aggregate data, the number of source addresses of the TCP unsuccessful connections and the corresponding total number of unsuccessful connections existing in the subnet, and if both the number of source addresses and the total number of unsuccessful connections exceed a preset threshold, issuing a war alarm, otherwise, not issuing a war alarm.
2. The method for monitoring and warning the DDoS attack of subnet spoofing as recited in claim 1, wherein the method comprises the following steps: the step S2 extracts characteristic data of the ending state (timeout _ state) of the TCP connection from the aggregated TCP data, which includes various state parameters occurring in the TCP communication process, including an unconnected state, a connected state, an unfinished state, and a finished state.
3. The method for monitoring and warning the DDoS attack of subnet spoofing as recited in claim 1, wherein the method comprises the following steps: the triggering condition in step S3 is specifically that data "the number of TCP flows is greater than or equal to 60 per minute and the end state characteristic value of the current TCP connection is any one of 1, 2, 10, and 11" exists in the TCP traffic data, which indicates that the source address is initiating a syn flood attack, and issues an info alarm and gives an administrator a message prompt that a syn flood attack currently exists.
4. The method for monitoring and warning the DDoS attack of subnet spoofing as recited in claim 1, wherein the method comprises the following steps: the step S5 of presetting the threshold and the alarm feedback specifically includes retrieving, from the TCP aggregate data, that the ending state feature data timeout _ state of the TCP connection of the subnet is the source address number of any one of 1, 2, 10, and 11 and the total number of the corresponding flow, and if both the source address number and the total number of the flow exceed preset values, sending a war alarm.
CN202010456650.2A 2020-05-26 2020-05-26 Monitoring and early warning method for DDoS attack in subnet deception Active CN111641628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010456650.2A CN111641628B (en) 2020-05-26 2020-05-26 Monitoring and early warning method for DDoS attack in subnet deception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010456650.2A CN111641628B (en) 2020-05-26 2020-05-26 Monitoring and early warning method for DDoS attack in subnet deception

Publications (2)

Publication Number Publication Date
CN111641628A CN111641628A (en) 2020-09-08
CN111641628B true CN111641628B (en) 2022-04-19

Family

ID=72330969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010456650.2A Active CN111641628B (en) 2020-05-26 2020-05-26 Monitoring and early warning method for DDoS attack in subnet deception

Country Status (1)

Country Link
CN (1) CN111641628B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583850B (en) * 2020-12-27 2023-02-24 杭州迪普科技股份有限公司 Network attack protection method, device and system
CN113645256B (en) * 2021-10-13 2021-12-28 成都数默科技有限公司 Aggregation method without reducing TCP session data value density

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743134B2 (en) * 2000-09-07 2010-06-22 Riverbed Technology, Inc. Thwarting source address spoofing-based denial of service attacks
CN101383812A (en) * 2007-09-03 2009-03-11 电子科技大学 IP spoofing DDoS attack defense method based on active IP record
CN107864155A (en) * 2017-12-12 2018-03-30 蔡昌菊 A kind of DDOS attack detection method of high-accuracy
CN109587179B (en) * 2019-01-28 2021-04-20 南京云利来软件科技有限公司 SSH (Single sign indicating) protocol behavior pattern recognition and alarm method based on bypass network full flow

Also Published As

Publication number Publication date
CN111641628A (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN107018084B (en) DDOS attack defense network security method based on SDN framework
Phan et al. OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks
EP1844596B1 (en) Method and system for mitigating denial of service in a communication network
US7478429B2 (en) Network overload detection and mitigation system and method
Prasad et al. An efficient detection of flooding attacks to Internet Threat Monitors (ITM) using entropy variations under low traffic
KR102088299B1 (en) Apparatus and method for detecting drdos
Sanmorino et al. DDoS attack detection method and mitigation using pattern of the flow
Haris et al. Detecting TCP SYN flood attack based on anomaly detection
TWI492090B (en) System and method for guarding against dispersive blocking attacks
CN101631026A (en) Method and device for defending against denial-of-service attacks
CN108683686B (en) Random sub-domain DDoS attack detection method
KR20120126674A (en) Method of defending a spoofing attack using a blocking server
CN111641628B (en) Monitoring and early warning method for DDoS attack in subnet deception
Foroushani et al. TDFA: traceback-based defense against DDoS flooding attacks
Song et al. Flow-based statistical aggregation schemes for network anomaly detection
Shen et al. Mitigating SYN Flooding and UDP Flooding in P4-based SDN
KR101209214B1 (en) Denial of Service Prevention Method and Apparatus based on Session State Tracking
Wang et al. Efficient and low‐cost defense against distributed denial‐of‐service attacks in SDN‐based networks
Mopari et al. Detection and defense against DDoS attack with IP spoofing
Siregar et al. Intrusion prevention system against denial of service attacks using genetic algorithm
WO2009064114A2 (en) Protection method and system for distributed denial of service attack
Satrya et al. The detection of DDOS flooding attack using hybrid analysis in IPv6 networks
CN113765849A (en) Abnormal network traffic detection method and device
Yen et al. Defending application DDoS with constraint random request attacks
Park et al. An effective defense mechanism against DoS/DDoS attacks in flow-based routers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230328

Address after: Room 101, No. 163, Pingyun Road, Tianhe District, Guangzhou City, Guangdong Province 510000 Room 103, self-made

Patentee after: GUANGZHOU RADIO AND TELEVISION RESEARCH INSTITUTE Co.,Ltd.

Address before: 210000 room 1-2-1, No.1, Guanghua East Street, Qinhuai District, Nanjing City, Jiangsu Province

Patentee before: NANJING CLEARCLOUD SOFTWARE TECHNOLOGY CO.,LTD.