CN102185869A - Worm detecting method for BT download network - Google Patents

Worm detecting method for BT download network Download PDF

Info

Publication number
CN102185869A
CN102185869A CN2011101352998A CN201110135299A CN102185869A CN 102185869 A CN102185869 A CN 102185869A CN 2011101352998 A CN2011101352998 A CN 2011101352998A CN 201110135299 A CN201110135299 A CN 201110135299A CN 102185869 A CN102185869 A CN 102185869A
Authority
CN
China
Prior art keywords
alert message
supervising device
client node
network
worm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101352998A
Other languages
Chinese (zh)
Inventor
林怀忠
陈萍
张知临
蒋雨倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN2011101352998A priority Critical patent/CN102185869A/en
Publication of CN102185869A publication Critical patent/CN102185869A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a worm detecting method for a BT download network. In the method, neighbor node cache monitors are arranged at all client-side nodes of the BT network, and each neighbor node cache monitor searches adjacent neighbor node cache monitors by utilizing a neighbor node cache so as to form a monitor network based on the BT network. When monitoring that the node is communicated with an adjacent node, the monitor at the node sends an existed or generated warning message to the monitor of the adjacent node, wherein the warning message comprises a counter and a timer, and the counters are accumulated and the timers are reset when the warning message is sent. When receiving the warning message, each monitor checks whether the number of the counters of the warning message exceeds a normal threshold, if yes, the BT network is considered to appear worm activities, if not, the warning message is discarded when the timer returns to zero. The worm detecting method for the BT download network, disclosed by the invention, overcomes the deficiency that the traditional network worm detecting method is not suitable for being used for detecting worms of the BT network, and can effectively detect worm outbreak of the BT network.

Description

A kind of Worm detection method towards the BT download network
Technical field
The present invention relates to a kind of Worm detection method, belong to the computer security technical field towards the BT download network.
Background technology
But network worm is a kind of rogue program of independent operating, and it finds to exist the computer system or the application service of system vulnerability by scan for networks, infects this computer, and obtains the control of this computer system, propagates; Network worm infection on a large scale can cause information leakage, resource for computer system to cross serious consequences such as consumption, network congestion.Famous Code Red worm, Slammer worm are all at the massive losses that directly causes in a short time after the outburst more than 1,000,000,000 dollars.Network worm has become a present big factors that influences network security.
BT is a P2P host-host protocol emerging on a kind of the Internet, and full name is " BitTorrent ", and Chinese full name: " bit stream " is a kind of open host-host protocol.According to the BitTorrent agreement, file distribution person can generate according to the file that will issue .torrent file, i.e. a seed file are provided.Download person wants the file in download content, need obtain corresponding .torrent file earlier, uses the BT client software to download then.
Prevent that the key that worm is spread unchecked is to find early infected worm main frame, by taking precautions against device the worm main frame is taked counter-measure then, as removing worm file, isolate main frame, filtering worm packet etc.Therefore, detecting worm is the committed step that suppresses worm propagation.Research worm detection technique has become the assurance security of network environment, safeguards pressing for of society and individual interest.
Present detection method and the unusual detection method Network Based two big classes that comprise for the detection of network worm based on condition code.
Detection method based on condition code is more traditional method, and this method is at first analyzed the condition code that the worm sample of catching obtains this worm; In network traffics or Hosts file, carry out characteristic matching according to condition code then, thereby realize that worm detects.This detection method has the good detection result to known worm, but has shortcoming, one of shortcoming: can't obtain the condition code of new worm or mutation worm the very first time, thus bigger to the detection delay that worm newly occurs, do not have forewarning function; Two of shortcoming: can't detect the polymorphic worm of dynamic change code, such worm does not have fixing condition code, can evade the detection method based on condition code.Has higher rate of failing to report.Such detection method can't be prevented outburst BT network worm very fast.
Unusual detection method Network Based is the developing direction of worm detection technique, and this method monitoring particular network index detects the outburst of worm unusually according to index.Method commonly used as: by the statistics linking number, judge whether connect aggregate-value surpasses the threshold value that is provided with and detects worm; Unusually detect the generation of worm by statistics ICMP message; By calculating the failure connection and successfully being connected ratio, judge whether to surpass predetermined threshold value and detect worm etc.This method can detect unknown worm, but also has shortcoming: the present detection method of the feature Network Based that occurs or because amount of calculation is big, it is poor to detect real-time; Perhaps, there is higher rate of false alarm because the detection index is simple.And such detection method is lower to the verification and measurement ratio of BT network worm.
Summary of the invention
The objective of the invention is to overcome the deficiency that prior art is unsuitable for detecting the BT network worm, a kind of Worm detection method towards the BT download network is provided.
Step towards the Worm detection method of BT download network is as follows:
1) at all BT client nodes supervising device is installed, supervising device reads the neighbors cache information of place BT client node, seek adjacent BT client node and connect with supervising device in this BT client node, the adjacent supervising device with all of supervising device connects, each supervising device is initially sampled to the flow number that place BT client node and adjacent BT client node are exchanged, time period m is set, and with m average out to p section, supervising device is monitored the network traffics number that the adjacent BT client node with all of BT client node is exchanged in every m/p time, and this flow number is recorded in the traffic monitoring table of this supervising device, and its distribution of match, each supervising device is set up the alert message collection according to the quantity of adjacent BT client node, and normality threshold α is set;
2) supervising device monitoring place BT client node, wait is from the alert message of adjacent monitoring device, if the alert message of supervising device is concentrated the value that exists alert message then to reduce timer in the alert message according to passage of time, and when making zero, timer abandons this alert message, if this BT client node takes place to continue to communicate by letter with adjacent BT client node, then enter step 3),, then enter step 4) if receive alert message from certain adjacent monitoring device;
3) if do not have alert message in the supervising device, then generate an alert message, the value of count initialized device is 1, the value of timer is t, if there has been alert message, with the counter increase by 1 of alert message, the value of timer resets to t, to generate then or amended alert message sends to supervising device on the BT client node of communicating by letter, enter step 2);
4) check counter in the alert message of receiving, send to the decision center device, if counter is lower than normality threshold α, the alert message that this alert message is stored in supervising device is concentrated, if alert message is concentrated the alert message that has had same source, then only preserve the alert message that has big counter, enter step 2), if counter surpasses normality threshold α, then this supervising device carries out resampling to the flow number that place BT client node and adjacent BT client node are exchanged, and the flow number that obtains sent to the decision center device, the traffic statistics number that traffic statistics number that the decision center device obtains initial sampling and resampling obtain compares, if the flow that twice statistics obtains does not belong to same distribution, then think worm activity to occur in the BT network, send worm and report to the police.
The present invention has overcome existing network worm detection technique can not fast detecting BT internet worm eruption, and there is the shortcoming of higher rate of failing to report in testing result, can detect the worm of breaking out in the BT network accurately, efficiently and in real time.
Description of drawings
Fig. 1 is the general plan figure towards the Worm detection method of BT download network;
Fig. 2 is the basic testing process figure of the Worm detection method of BT download network;
Fig. 3 is the deployment examples figure that is used for the Chord network according to the Worm detection method of BT download network of the present invention;
Fig. 4 is according to routing table monitoring device and the decision center device realization figure that is used for the Chord network of the present invention.
Embodiment
The present invention is based on following theoretical foundation:
(1) in network, the BT client when carrying out download activity, and this network in other clients carry out communication, meet the condition of worm propagation.
(2) the BT client under normal circumstances, the alert message of its supervising device in the unit interval meets specific distribution, and alert message is near certain normal value, under the invermination situation, the access times of its alert message in the unit interval are inevitable to be increased suddenly, obviously surpasses normal value.
Shown in Fig. 1~2, as follows towards the step of the Worm detection method of BT download network:
1) at all BT client nodes supervising device is installed, supervising device reads the neighbors cache information of place BT client node, seek adjacent BT client node and connect with supervising device in this BT client node, the adjacent supervising device with all of supervising device connects, each supervising device is initially sampled to the flow number that place BT client node and adjacent BT client node are exchanged, time period m is set, and with m average out to p section, supervising device is monitored the network traffics number that the adjacent BT client node with all of BT client node is exchanged in every m/p time, and this flow number is recorded in the traffic monitoring table of this supervising device, and its distribution of match, each supervising device is set up the alert message collection according to the quantity of adjacent BT client node, and normality threshold α is set;
2) supervising device monitoring place BT client node, wait is from the alert message of adjacent monitoring device, if the alert message of supervising device is concentrated the value that exists alert message then to reduce timer in the alert message according to passage of time, and when making zero, timer abandons this alert message, if this BT client node takes place to continue to communicate by letter with adjacent BT client node, then enter step 3),, then enter step 4) if receive alert message from certain adjacent monitoring device;
3) if do not have alert message in the supervising device, then generate an alert message, the value of count initialized device is 1, the value of timer is t, if there has been alert message, with the counter increase by 1 of alert message, the value of timer resets to t, to generate then or amended alert message sends to supervising device on the BT client node of communicating by letter, enter step 2);
4) check counter in the alert message of receiving, send to the decision center device, if counter is lower than normality threshold α, the alert message that this alert message is stored in supervising device is concentrated, if alert message is concentrated the alert message that has had same source, then only preserve the alert message that has big counter, enter step 2), if counter surpasses normality threshold α, then this supervising device carries out resampling to the flow number that place BT client node and adjacent BT client node are exchanged, and the flow number that obtains sent to the decision center device, the traffic statistics number that traffic statistics number that the decision center device obtains initial sampling and resampling obtain compares, if the flow that twice statistics obtains does not belong to same distribution, then think worm activity to occur in the BT network, send worm and report to the police.
Embodiment
As shown in Figure 3, dispose BT client and supervising device according to the Worm detection method of BT download network of the present invention, the network that is detected is a kind of P2P network of Chord by name.In this network, dispose the BT download client and can form the BT download network.About 10000 of wherein common Chord network node, about 50 of BT client, supervising device adds the Chord network.
As shown in Figure 4, BT client and the supervising device of implementing according to the Worm detection method of BT download network of the present invention.Supervising device reads the neighbors cache information of place BT client node, seek adjacent BT client node and connect with supervising device in this BT client node, the adjacent supervising device with all of supervising device connects, and each supervising device is set up the alert message collection according to the quantity of adjacent BT client node.Supervising device monitoring place BT client node, wait is from the alert message of adjacent monitoring device, if the alert message of supervising device is concentrated the value that exists alert message then to reduce timer in the alert message according to passage of time, and when making zero, timer abandons this alert message, receive alert message from certain adjacent monitoring device, check the counter in the alert message of receiving, send to the decision center device.If counter surpasses normality threshold α, then think worm activity to occur in the BT network, send worm and report to the police.
This detection method is effectively monitored the unusual of BT download network, the realization cost is low, can detect the worm outburst in the BT download network in real time, and send the worm outburst and report to the police, this warning message can be used in time getting rid of network failure for the network management personnel, or take the precautionary measures, thus realize the detection that BT downloads, detect the outburst that BT downloads worm accurately, efficiently and in real time.

Claims (1)

1. Worm detection method towards the BT download network is characterized in that its step is as follows:
1) at all BT client nodes supervising device is installed, supervising device reads the neighbors cache information of place BT client node, seek adjacent BT client node and connect with supervising device in this BT client node, the adjacent supervising device with all of supervising device connects, each supervising device is initially sampled to the flow number that place BT client node and adjacent BT client node are exchanged, time period m is set, and with m average out to p section, supervising device is monitored the network traffics number that the adjacent BT client node with all of BT client node is exchanged in every m/p time, and this flow number is recorded in the traffic monitoring table of this supervising device, and its distribution of match, each supervising device is set up the alert message collection according to the quantity of adjacent BT client node, and normality threshold α is set;
2) supervising device monitoring place BT client node, wait is from the alert message of adjacent monitoring device, if the alert message of supervising device is concentrated the value that exists alert message then to reduce timer in the alert message according to passage of time, and when making zero, timer abandons this alert message, if this BT client node takes place to continue to communicate by letter with adjacent BT client node, then enter step 3),, then enter step 4) if receive alert message from certain adjacent monitoring device;
3) if do not have alert message in the supervising device, then generate an alert message, the value of count initialized device is 1, the value of timer is t, if there has been alert message, with the counter increase by 1 of alert message, the value of timer resets to t, to generate then or amended alert message sends to supervising device on the BT client node of communicating by letter, enter step 2);
4) check counter in the alert message of receiving, send to the decision center device, if counter is lower than normality threshold α, the alert message that this alert message is stored in supervising device is concentrated, if alert message is concentrated the alert message that has had same source, then only preserve the alert message that has big counter, enter step 2), if counter surpasses normality threshold α, then this supervising device carries out resampling to the flow number that place BT client node and adjacent BT client node are exchanged, and the flow number that obtains sent to the decision center device, the traffic statistics number that traffic statistics number that the decision center device obtains initial sampling and resampling obtain compares, if the flow that twice statistics obtains does not belong to same distribution, then think worm activity to occur in the BT network, send worm and report to the police.
CN2011101352998A 2011-05-24 2011-05-24 Worm detecting method for BT download network Pending CN102185869A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101352998A CN102185869A (en) 2011-05-24 2011-05-24 Worm detecting method for BT download network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101352998A CN102185869A (en) 2011-05-24 2011-05-24 Worm detecting method for BT download network

Publications (1)

Publication Number Publication Date
CN102185869A true CN102185869A (en) 2011-09-14

Family

ID=44571939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101352998A Pending CN102185869A (en) 2011-05-24 2011-05-24 Worm detecting method for BT download network

Country Status (1)

Country Link
CN (1) CN102185869A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095529A (en) * 2013-01-09 2013-05-08 华为技术有限公司 Method and device for detecting engine device, firewall and network transmission file

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095529A (en) * 2013-01-09 2013-05-08 华为技术有限公司 Method and device for detecting engine device, firewall and network transmission file
CN103095529B (en) * 2013-01-09 2016-06-29 华为技术有限公司 The method of detecting and alarm device, fire wall, detection network transmission file and device

Similar Documents

Publication Publication Date Title
EP3577872B1 (en) Method and attack detection function for detection of a distributed attack in a wireless network
US8001601B2 (en) Method and apparatus for large-scale automated distributed denial of service attack detection
CN109962903B (en) Home gateway security monitoring method, device, system and medium
KR100561628B1 (en) Method for detecting abnormal traffic in network level using statistical analysis
CN100531219C (en) A network worm detection method and its system
KR100748246B1 (en) Multi-step integrated security monitoring system and method using intrusion detection system log collection engine and traffic statistic generation engine
CN104506385B (en) A kind of software defined network safety situation evaluation method
CN111049843A (en) Intelligent substation network abnormal flow analysis method
CN104202336A (en) DDoS attack detection method based on information entropy
WO2010093674A2 (en) Multi-tiered scalable network monitoring
CN101980506A (en) Flow characteristic analysis-based distributed intrusion detection method
CN117395076B (en) Network perception abnormality detection system and method based on big data
Neu et al. Lightweight IPS for port scan in OpenFlow SDN networks
CN102104606B (en) Worm detection method of intranet host
CN106685962A (en) System and method for defense of reflective DDOS attack flow
CN113783880A (en) Network security detection system and network security detection method thereof
Lu et al. Detecting network anomalies using CUSUM and EM clustering
CN102185869A (en) Worm detecting method for BT download network
Dalati et al. NGS: mitigating DDoS attacks using SDN-based network gate shield
CN101815076B (en) Method for detecting worm host computer in local area network
Wu et al. Network Traffic Monitoring and Real-time Risk Warning based on Static Baseline Algorithm
CN101820369B (en) Communication traffic-based intranet worm detection method
CN104038372A (en) Power wide area network (WAN) flow monitoring method
Xia et al. Cids: Adapting legacy intrusion detection systems to the cloud with hybrid sampling
Praneeth et al. Remote Packet Monitoring: Real-Time Network Analysis from Anywhere

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110914