CN101605067A - Network behavior active analysis diagnostic method - Google Patents

Network behavior active analysis diagnostic method Download PDF

Info

Publication number
CN101605067A
CN101605067A CNA2009100315119A CN200910031511A CN101605067A CN 101605067 A CN101605067 A CN 101605067A CN A2009100315119 A CNA2009100315119 A CN A2009100315119A CN 200910031511 A CN200910031511 A CN 200910031511A CN 101605067 A CN101605067 A CN 101605067A
Authority
CN
China
Prior art keywords
analysis
message
feature
protocol
agreement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100315119A
Other languages
Chinese (zh)
Other versions
CN101605067B (en
Inventor
钱鋆
谢晖
刘继明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ITIBIA TECHNOLOGIES
Original Assignee
ITIBIA TECHNOLOGIES
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ITIBIA TECHNOLOGIES filed Critical ITIBIA TECHNOLOGIES
Priority to CN2009100315119A priority Critical patent/CN101605067B/en
Publication of CN101605067A publication Critical patent/CN101605067A/en
Application granted granted Critical
Publication of CN101605067B publication Critical patent/CN101605067B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a kind of network behavior active analysis diagnostic method, at first, the message Preliminary detection is mated message and known protocol storehouse, rejects known protocol massages; Then, unknown message protocol analysis: to the message of the unknown, designated port, Ip, period information are extracted the automatic analysis process of agreement with message and are analyzed; At last, analysis result output, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, and analysis result is exported.Can carry out analysis and judgement to the agreement of the unknown based on the inventive method, being combined on the prior protocols analytical model is useful replenishing, can carry out the active analysis diagnosis to network condition and emerging network application and other network behaviors of user's interest of burst, avoid the hysteresis quality of passive tracking.

Description

Network behavior active analysis diagnostic method
Technical field
The present invention relates to a kind of network behavior active analysis diagnostic method, be applicable to open network application scene.
Background technology
Present procotol recognition technology has mostly broken away from traditional " five-tuple " coupling, is based upon on the analysis foundation of application layer content.And application is the most general in the application layer analysis, is exactly these two kinds of technology of DPI (DeepPacket Inspection, deep-packet detection) and DFI (Deep Flow Inspection, deep stream detects).
The DPI technology is on the basis of analyzing packet header, increased analysis to application layer, be a kind of flow detection and recognition technology based on the application layer message, when the network data newspaper is flowed through utilization DPI equipment, equipment splits according to 7 layer protocols automatically, and take different processing methods according to different agreements in application layer, except general analysis, the part agreement needs the DPI equipment self to safeguard that the protocol state machine of simplifying uses identification and flow detection.According to this thinking, the DPI technology is divided into two classes:
The one, the recognition technology of feature string: different agreements is suitable for different interactive modes, these modes generally all have its characteristic, the specific port of the general use of early stage agreement, the part agreement is also used the interactive mode of fixing command word or oneself regulation, and these can find characteristic of correspondence in the data communication message.Based on the recognition technology of feature string, basic thought is based upon based on these features, seeks the corresponding relation of handling message and feature, uses the purpose of controlling thereby reach identification.
Two are based on the mutual recognition technology of application: a part of agreement has been used the mode of control channel and data channel combination, and promptly data message separates with the control message, at this time just control message and data message need be combined the relation that just can find correspondence.Have some simply not find corresponding relation from one or two message, but can find some features from data mutual, such as length, the fixedly variation of corresponding relation etc. also can be discerned.
DFI is a kind of based on application type Feature Recognition technology, and different being applied in embodies different features on the network behavior.For example, general p2p has data message length longer, and Session Time is long, features such as frequency height.DFI analyzes the message length of data flow by setting up the application characteristic model, and the relations such as temporal frequency feature of transmission rate, bag transmission are searched.By with relatively judging of DFI model be what application.
At present similar amalgamation gateway product mostly has the control and the analytic function of network behavior, has all used the technology of DFI and DPI, can analyze hundreds of application and controls.Product also all compares number of protocols when competition as a crucial index.But this method has a defective, is exactly that this mode depends on passive image data and analyzes, and the method for this passive type has a significant defective: no matter carry out upgrade maintenance in which way, always have hysteresis quality.Current new network application emerges in an endless stream, and passive maintaining method can't the fast adaptation current demand, so need be based upon the protocal analysis technology on the active mode.
Summary of the invention
The objective of the invention is to overcome the deficiency that prior art exists, a kind of network behavior active analysis diagnostic method is provided.
Purpose of the present invention is achieved through the following technical solutions:
Network behavior active analysis diagnostic method, characteristics are: may further comprise the steps---
1. the message Preliminary detection is mated message and known protocol storehouse, rejects known protocol massages; Only need analyze, if desired, can also take sample mode to analyze a part Unidentified agreement;
2. unknown message protocol analysis: to the message of the unknown, designated port, Ip, period information are extracted the automatic analysis process of agreement with message and are analyzed;
Unknown protocol is classified, the unknown protocol data that special object is initiated are analyzed;
3. analysis result output, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, and analysis result is exported.
Further, above-mentioned network behavior active analysis diagnostic method, wherein, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, promptly enters DPI and DFI pattern matching flow process, carries out modeling for feature string or feature flow; For feature string, carry out pattern matching study, analyze classification for feature string, if can extract the character string feature, then agreement study finishes, and adds in the protocal analysis storehouse; For the situation that feature string can't be analyzed, enter the network behavior analysis module, size and the transmission feature that wraps extracted, the analytic statistics feature, analysis finishes, and adds network behavior and analyzes the storehouse.
Substantive distinguishing features and obvious improvement that technical solution of the present invention is outstanding are mainly reflected in:
The present invention combines the mainstream technology of current agreement identification, and passive agreement recognition technology and protocal analysis technology are initiatively combined, and better adapts to the requirement of network applications evolve.Can carry out analysis and judgement to the agreement of the unknown based on the inventive method, being combined on the prior protocols analytical model is useful replenishing, can carry out the active analysis diagnosis to network condition and emerging network application and other network behaviors of user's interest of burst, avoid the hysteresis quality of passive tracking.
Description of drawings
Below in conjunction with accompanying drawing technical solution of the present invention is described further:
Fig. 1: active protocols is analyzed the schematic flow sheet that message is handled.
The implication of each Reference numeral sees the following form among the figure:
Reference numeral Implication Reference numeral Implication Reference numeral Implication
1 Message 11 Basic agreement is analyzed 3 The active protocols analytic unit
12 Automatically DPI analyzes 13 Automatically DFI analyzes 14 Analysis result output
Embodiment
Active protocols analysis module of the present invention comprises basic agreement analysis, unknown message protocol analysis, analysis result output three big steps.Message through the basic agreement analysis was analyzed if be not identified as known applications, can selectively send to message unknown message analysis module, and the protocol characteristic in the message analysis module searching message also returns the result.
The method that network data is automatically analyzed, analysis certain protocol data that can be initiatively, and corresponding analysis result is provided.Detailed process is: at first, the message Preliminary detection is mated message and known protocol storehouse, rejects known protocol massages; Only need analyze, if desired, can also take sample mode to analyze a part Unidentified agreement; Then, unknown message protocol analysis: to the message of the unknown, designated port, Ip, period information are extracted the automatic analysis process of agreement with message and are analyzed; Unknown protocol is classified, the unknown protocol data that special object is initiated are analyzed; At last, analysis result output, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, and analysis result is exported; Wherein, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, promptly enters DPI and DFI pattern matching flow process, carries out modeling for feature string or feature flow; For feature string, carry out pattern matching study, analyze classification for feature string, if can extract the character string feature, then agreement study finishes, and adds in the protocal analysis storehouse; For the situation that feature string can't be analyzed, enter the network behavior analysis module, size and the transmission feature that wraps extracted, the analytic statistics feature, analysis finishes, and adds network behavior and analyzes the storehouse.Be a storehouse of dynamically expanding, can accomplish inherent filtration the known protocol that does not need to analyze.Be the process of a convergence, when the agreement of analyzing is comprehensive more, then the workload of Fen Xiing is more little, and the result is accurate more.
Fig. 1 has illustrated a concise and to the point message to handle the path, network message 1 carries out anticipation by basic network protocal analysis 11, message for the unknown, specifying message to enter active protocols analytic unit 3 according to conditions such as user's interest main frame, port or periods analyzes automatically, comprising DPI analysis 12 and DFI analysis 13 automatically automatically, initiatively DPI is according to the treaty shopping feature string, and the DFI model is sought the stream feature; Export 14 parts at analysis result then the result is carried out the legitimacy judgement, if the requirement that protocol compliant is analyzed and and prior protocols analyze the storehouse not significantly conflict issue as analysis result, this result can be used in real time, and directly judges whether to reach the purpose of identifying and diagnosing.
The present invention is to using the mode that agreement is analyzed dynamically and controlled, and in conjunction with the result that the feature extraction and the behavioral statistics of agreement are initiatively analyzed, dynamic the abnormal behaviour of current network behavior is diagnosed and controlled.
Can carry out analysis and judgement to the agreement of the unknown based on the inventive method, being combined on the prior protocols analytical model is useful replenishing, can carry out the active analysis diagnosis to network condition and emerging network application and other network behaviors of user's interest of burst, avoid the hysteresis quality of passive tracking.
Below only be concrete exemplary applications of the present invention, protection scope of the present invention is not constituted any limitation.All employing equivalents or equivalence are replaced and the technical scheme of formation, all drop within the rights protection scope of the present invention.

Claims (2)

1. network behavior active analysis diagnostic method is characterized in that: may further comprise the steps---
1. the message Preliminary detection is mated message and known protocol storehouse, rejects known protocol massages;
2. unknown message protocol analysis: to the message of the unknown, designated port, Ip, period information are extracted the automatic analysis process of agreement with message and are analyzed;
3. analysis result output, the automatic protocol analysis process carries out the establishment of DPI and DFI model to specifying message, and analysis result is exported.
2. network behavior active analysis diagnostic method according to claim 1, it is characterized in that: step 3. automatic protocol analysis process is carried out the establishment of DPI and DFI model to specifying message, promptly enter DPI and DFI pattern matching flow process, carry out modeling for feature string or feature flow; For feature string, carry out pattern matching study, analyze classification for feature string, if extract the character string feature, then agreement study finishes, and adds in the protocal analysis storehouse; For the situation that feature string can't be analyzed, enter the network behavior analysis module, size and the transmission feature that wraps extracted, the analytic statistics feature, analysis finishes, and adds network behavior and analyzes the storehouse.
CN2009100315119A 2009-04-22 2009-04-22 Network behaviour active analyzing and diagnosing method Active CN101605067B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100315119A CN101605067B (en) 2009-04-22 2009-04-22 Network behaviour active analyzing and diagnosing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100315119A CN101605067B (en) 2009-04-22 2009-04-22 Network behaviour active analyzing and diagnosing method

Publications (2)

Publication Number Publication Date
CN101605067A true CN101605067A (en) 2009-12-16
CN101605067B CN101605067B (en) 2011-09-21

Family

ID=41470627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100315119A Active CN101605067B (en) 2009-04-22 2009-04-22 Network behaviour active analyzing and diagnosing method

Country Status (1)

Country Link
CN (1) CN101605067B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025623A (en) * 2010-12-07 2011-04-20 苏州迈科网络安全技术股份有限公司 Intelligent network flow control method
CN101741744B (en) * 2009-12-17 2011-12-14 东南大学 Network flow identification method
CN102347949A (en) * 2011-09-28 2012-02-08 上海西默通信技术有限公司 Application protocol analysis method based on DPI (Distributed Protocol Interface)
CN101764754B (en) * 2009-12-28 2012-07-25 东南大学 Sample acquiring method in business identifying system based on DPI and DFI
CN102710504A (en) * 2012-05-16 2012-10-03 华为技术有限公司 Application identification method and application identification device
CN102868638A (en) * 2012-08-16 2013-01-09 苏州迈科网络安全技术股份有限公司 Method and system for dynamically regulating bandwidth
CN103905261A (en) * 2012-12-26 2014-07-02 中国电信股份有限公司 Protocol characteristic library online updating method and system
CN104468252A (en) * 2013-09-23 2015-03-25 重庆康拜因科技有限公司 Intelligent network service identification method based on positive transfer learning
CN106603278A (en) * 2016-11-29 2017-04-26 任子行网络技术股份有限公司 Network application audit management method based on audit data management model and apparatus thereof
CN107404459A (en) * 2016-05-19 2017-11-28 华为技术有限公司 Obtain the method and the network equipment of the fingerprint characteristic of network attack message
CN107819646A (en) * 2017-10-23 2018-03-20 国网冀北电力有限公司信息通信分公司 A kind of net flow assorted system and method for distributed transmission
CN110445750A (en) * 2019-06-18 2019-11-12 国家计算机网络与信息安全管理中心 A kind of car networking protocol traffic recognition methods and device
CN110519257A (en) * 2019-08-22 2019-11-29 北京天融信网络安全技术有限公司 A kind of processing method and processing device of the network information
CN110958160A (en) * 2019-11-25 2020-04-03 睿哲科技股份有限公司 Website detection method, device and system and computer readable storage medium
CN111865724A (en) * 2020-07-28 2020-10-30 公安部第三研究所 Information acquisition control implementation method for video monitoring equipment
CN114640611A (en) * 2022-03-09 2022-06-17 西安电子科技大学 Unknown heterogeneous industrial protocol detection and identification method, system, equipment and medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100542176C (en) * 2006-11-24 2009-09-16 杭州华三通信技术有限公司 The analysis and processing method of packet content and system
CN101060492B (en) * 2007-05-29 2010-08-11 杭州华三通信技术有限公司 Talk detection method and talk detection system
CN101035111B (en) * 2007-04-13 2010-10-13 北京启明星辰信息技术股份有限公司 Intelligent protocol parsing method and device

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741744B (en) * 2009-12-17 2011-12-14 东南大学 Network flow identification method
CN101764754B (en) * 2009-12-28 2012-07-25 东南大学 Sample acquiring method in business identifying system based on DPI and DFI
CN102025623B (en) * 2010-12-07 2013-03-20 苏州迈科网络安全技术股份有限公司 Intelligent network flow control method
CN102025623A (en) * 2010-12-07 2011-04-20 苏州迈科网络安全技术股份有限公司 Intelligent network flow control method
CN102347949A (en) * 2011-09-28 2012-02-08 上海西默通信技术有限公司 Application protocol analysis method based on DPI (Distributed Protocol Interface)
CN102347949B (en) * 2011-09-28 2014-07-02 上海西默通信技术有限公司 Application protocol analysis method based on DPI (Distributed Protocol Interface)
CN102710504A (en) * 2012-05-16 2012-10-03 华为技术有限公司 Application identification method and application identification device
CN102868638A (en) * 2012-08-16 2013-01-09 苏州迈科网络安全技术股份有限公司 Method and system for dynamically regulating bandwidth
CN103905261A (en) * 2012-12-26 2014-07-02 中国电信股份有限公司 Protocol characteristic library online updating method and system
CN104468252A (en) * 2013-09-23 2015-03-25 重庆康拜因科技有限公司 Intelligent network service identification method based on positive transfer learning
CN107404459B (en) * 2016-05-19 2020-09-04 华为技术有限公司 Method for acquiring fingerprint characteristics of network attack message and network equipment
CN107404459A (en) * 2016-05-19 2017-11-28 华为技术有限公司 Obtain the method and the network equipment of the fingerprint characteristic of network attack message
CN106603278A (en) * 2016-11-29 2017-04-26 任子行网络技术股份有限公司 Network application audit management method based on audit data management model and apparatus thereof
CN107819646A (en) * 2017-10-23 2018-03-20 国网冀北电力有限公司信息通信分公司 A kind of net flow assorted system and method for distributed transmission
CN110445750A (en) * 2019-06-18 2019-11-12 国家计算机网络与信息安全管理中心 A kind of car networking protocol traffic recognition methods and device
CN110519257A (en) * 2019-08-22 2019-11-29 北京天融信网络安全技术有限公司 A kind of processing method and processing device of the network information
CN110519257B (en) * 2019-08-22 2022-04-01 北京天融信网络安全技术有限公司 Network information processing method and device
CN110958160A (en) * 2019-11-25 2020-04-03 睿哲科技股份有限公司 Website detection method, device and system and computer readable storage medium
CN111865724A (en) * 2020-07-28 2020-10-30 公安部第三研究所 Information acquisition control implementation method for video monitoring equipment
CN111865724B (en) * 2020-07-28 2022-02-08 公安部第三研究所 Information acquisition control implementation method for video monitoring equipment
CN114640611A (en) * 2022-03-09 2022-06-17 西安电子科技大学 Unknown heterogeneous industrial protocol detection and identification method, system, equipment and medium

Also Published As

Publication number Publication date
CN101605067B (en) 2011-09-21

Similar Documents

Publication Publication Date Title
CN101605067B (en) Network behaviour active analyzing and diagnosing method
CN102315974B (en) Stratification characteristic analysis-based method and apparatus thereof for on-line identification for TCP, UDP flows
CN104320304B (en) A kind of core network user flow application recognition methods of the multimode fusion easily extended
CN101645806B (en) Network flow classifying system and network flow classifying method combining DPI and DFI
CN101741744B (en) Network flow identification method
CN102420701B (en) Method for extracting internet service flow characteristics
CN102045363B (en) Establishment, identification control method and device for network flow characteristic identification rule
CN102164049B (en) Universal identification method for encrypted flow
CN106921637A (en) The recognition methods of the application message in network traffics and device
CN107623754B (en) WiFi acquisition system and method based on authenticity MAC identification
CN110768933A (en) Network flow application identification method, system and equipment and storage medium
CN103023670A (en) Message service type identifying method and message service type identifying device based on data processing installation (DPI)
CN103905261A (en) Protocol characteristic library online updating method and system
CN109768936B (en) Refined shunting system and shunting method
CN109495508A (en) Firewall configuration method based on service access data
CN102624878B (en) Method and system for identifying P2P (peer-to-peer) protocol on basis of DNS (domain name server) protocol
CN105302885A (en) Full-text data extraction method and device
CN105847250A (en) VoIP stream media multi-dimensional information steganography real time detection method
CN111586075B (en) Hidden channel detection method based on multi-scale stream analysis technology
CN109660656A (en) A kind of intelligent terminal method for identifying application program
CN111294342A (en) Method and system for detecting DDos attack in software defined network
Dudin et al. Resource allocation with automated QoE assessment in 5G/B5G wireless systems
CN113283498A (en) VPN flow rapid identification method facing high-speed network
CN112073988A (en) Detection method for hidden camera in local area network
CN111654486A (en) Server equipment judgment and identification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant