CN102238047B - Denial-of-service attack detection method based on external connection behaviors of Web communication group - Google Patents

Denial-of-service attack detection method based on external connection behaviors of Web communication group Download PDF

Info

Publication number
CN102238047B
CN102238047B CN 201110199063 CN201110199063A CN102238047B CN 102238047 B CN102238047 B CN 102238047B CN 201110199063 CN201110199063 CN 201110199063 CN 201110199063 A CN201110199063 A CN 201110199063A CN 102238047 B CN102238047 B CN 102238047B
Authority
CN
China
Prior art keywords
attack
address
web
communication group
outreaches
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 201110199063
Other languages
Chinese (zh)
Other versions
CN102238047A (en
Inventor
王风宇
郭山清
林丰波
龚斌
胡毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN 201110199063 priority Critical patent/CN102238047B/en
Publication of CN102238047A publication Critical patent/CN102238047A/en
Application granted granted Critical
Publication of CN102238047B publication Critical patent/CN102238047B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a distributed denial-of-service attack detection method based on the external connection behaviors of a Web communication group. The method comprises the following steps of: 1) setting a port mirror image on network equipment, and copying and transmitting all network messages passing through the equipment to an attach detection front-end processor; 2) extracting the communication group of a given Web server and the external connection behaviors of the communication group, and transmitting the communication group and the external connection behaviors thereof to an attack detection server by using the attack detection front-end processor; 3) counting external connection behavior parameters comprising the number CN_MLN of clients connected with a plurality of external connection nodes and a total client number CN of the Web communication group, and monitoring the offset of ratio of the two parameters by using an improved cumulative sum (CUSUM) algorithm to judge the occurrence of an application layer distributed denial-of-service (DDoS) attack according to the offset by using the attack detection server; and 4) reporting whether the application layer DDoS attack occurs to the given Web server or not to a network monitoring terminal at the end of each time period.

Description

Denial of Service attack detection method based on the external behavior of Web communication group
Technical field
The present invention relates to a kind of network security technology, relate in particular to a kind of Denial of Service attack detection method based on the external behavior of Web communication group.
Background technology
Web service is most widely used application type in the Internet, yet because its important society and commercial value, Web server also becomes in the Internet topmost by target of attack simultaneously.Denial of Service attack (Distributed Denial-of-Service attack, DDoS) be one of most important threat of facing of Web server, ddos attack refers to that the assailant passes through puppet's main frame, consumes the computational resource of target of attack, stops target to provide service for validated user.Consumable computational resource can be CPU, internal memory, bandwidth, database server etc.In recent years, ddos attack is emerge in an endless stream [1-5], Amazon, and eBay, Yahoo, Sina, the domestic and international famous website such as Baidu all once was subject to ddos attack, had caused great economic loss.
Detect and control and carried out large quantity research [6] for ddos attack.Yet, detect and control technology in order to evade constantly perfect DDoS, reach desirable attack effect, the assailant is also updating its attack technology.Ddos attack is varied, Mirkovic[6] etc. the people according to attributes such as the address validity of attack packets, attack rate ddos attack has been carried out exhaustive division.The present invention continues to use Xie[7] and the people's [8] such as Xiao Jun sorting technique ddos attack is divided into two large classes: a class is the network layer ddos attack, by sending a large amount of rubbish bags, consume the victim host processor resource, block the victim host inbound link, such as SYN Flooding; Another kind of is the application layer ddos attack, by setting up normal connection, submits a large amount of legal service requests to destination server, consumes the server computational resource, such as HTTP Flooding and CyberSlam[9].Current, the means that detect and control the network layer ddos attack are abundanter, make this class attack pattern obtain more effectively containment.When the network layer ddos attack can't be obtained promising result, the assailant tended to adopt the application layer ddos attack to evade detection.
In the application layer ddos attack, attack end and set up TCP by target of attack and be connected, and legal request on the transmission exhibiting high surface, traditional network layer ddos attack detection method is no longer applicable.Although the application layer ddos attack can make flow increase rapidly, unfortunately, the Flash Crowd that is produced by a large number of users central access has similar traffic characteristic, and the two is difficult to distinguish.At present existing researcher detects for the application layer ddos attack and some researchs have been carried out in filtration, but more these detection methods be fit to be deployed in and attacked end, can not avoid the application layer ddos attack to the impact of basic network bandwidth.If can attacking end border router or trunk link detecting and filtering and attack data flow, can effectively reduce the infringement that attack causes.
Summary of the invention
Purpose of the present invention provides a kind of Denial of Service attack detection method based on the external behavior of Web communication group exactly for remedying the deficiencies in the prior art.This detection method is regarded Web server and its client as an integral body (the present invention is called the colony that communicates by letter), by analyzing the interbehavior in this communication colony and the external world, discovery outreaches the unusual of cybernetics control number, and detects accordingly the generation of application layer ddos attack.The method does not need message load is analyzed, and computation complexity is low, is fit to be deployed in backbone network.
For achieving the above object, the present invention adopts following technical scheme:
Based on the Denial of Service attack detection method of the external behavior of Web communication group, the detecting step of the method is as follows:
Step1: Port Mirroring is set at the network equipment, the all-network message of this network equipment of flowing through is replicated sends to network monitoring front, extract the communication colony of particular Web server and outreach behavior in network monitoring front, be sent to the detection server;
Step2: the feature that outreaches of in detecting server, extracting the web server communication colony described in the Step1: client terminal quantity CN with the client terminal quantity CN_MLN that outreaches node more and be connected; With sequence { x nRepresent that access outreaches the client terminal quantity of node and the ratio of client sum, { y more in the different time sections nThe interior client sum of expression different time sections and the ratio of accessing the client terminal quantity that outreaches node, { C more nExpression client sum, { M nRepresent that access outreaches the client terminal quantity of node more, is calculated as follows sequence { x nAnd { y nValue x in n Δ t nWith y n:
x n = M n C n , y n = C n M n , n = 1,2,3 . . .
Step3: in detecting server, utilize improved CUSUM Algorithm Analysis Web colony to outreach feature, judge whether to have occured attack; Calculate respectively { x nAnd { y nN corresponding detected value Z n xAnd Z n y, its recurrence formula is as follows:
Z n x = max { 0 , Z n - 1 x + x n - δ n x - d x } , n = 1,2,3 , . . .
Z n y = max { 0 , Z n - 1 y + y n - δ n y - d y } , n = 1,2,3 , . . .
Wherein,
Figure BDA0000076183340000025
Be respectively { x nAnd { y nExponentially weighted moving average (EWMA), d x, d yMake respectively
Figure BDA0000076183340000026
Under normal circumstances less than 0 deviant,
Figure BDA0000076183340000027
Be sequence { x nN-1 detected value,
Figure BDA0000076183340000028
Be sequence { y nN-1 detected value,
Figure BDA0000076183340000029
Be sequence { x nN detected value, it is used for the detection with the attack that outreaches the access behavior,
Figure BDA00000761833400000210
Be sequence { y nN detected value, it is used for detecting without the ddos attack that outreaches access;
Step4: to Z n x, Z n yWith corresponding threshold value
Figure BDA00000761833400000211
Figure BDA00000761833400000212
Compare respectively, judge whether to have occured the Ddos attack;
Step5: when each time period finishes, whether occured for the application layer ddos attack of specifying Web server to the network monitoring terminal report.
Among the described Step1, the described colony that communicates by letter refers to mutual correspondence closely and has the set of one group of main frame of identical load characteristic.
Among the described Step2, the process of extracting communication colony is as follows:
A. monitor network link, find a new message after, extract its source IP address, purpose IP address and destination interface thereof;
B. judge the whether web server address of appointment of destination address, and destination interface is the SYN message of 80 ports, then changes in this way step C over to and carry out, carry out otherwise change step e over to;
C. judge that its source IP address whether in client records, then returns in this way steps A and continues to carry out, otherwise increase a client records then for this web server, then return steps A and continue to carry out;
D. judge whether its source IP address or purpose IP address are client address, then change in this way step e over to and continue to carry out, continue to carry out otherwise return steps A;
E. judge whether source IP address and purpose IP address occur in outreaching the limit record, if without then increasing a record, return A.
Among the described Step3, δ nAs follows with the computational methods of d:
δ n x = ( 1 - α ) δ n - 1 x + α x n , δ 0 x = x 0 d x = μδ n x ,
δ n y = ( 1 - α ) δ n - 1 y + αx n , δ 0 y = y 0 d y = μδ n y ,
Wherein, Represent respectively the weighted moving average initial value, x 0, y 0Represent that respectively { xn} is with { initial value of yn}, α are the exponentially weighted moving average (EWMA) coefficient to sequence, and scope is 0.01~0.03, and parameter μ obtains by the statistics of real data.
Among the described Step4, deterministic process is as follows: for Z n xAnd Z n yCorresponding threshold value
Figure BDA0000076183340000038
(1) if
Figure BDA00000761833400000310
And
Figure BDA00000761833400000311
The CUSUM of n detected value accumulates and is not offset before illustrating, detected object is normal condition;
(2) if
Figure BDA00000761833400000312
Perhaps
Figure BDA00000761833400000313
Then detected object has occured unusually at n detected value, application layer DDos has namely occured attacked.
Beneficial effect of the present invention: this paper is characterized as the basis with outreaching of colony of Web communication, utilize the CUSUM method to detect the ANOMALOUS VARIATIONS that outreaches characteristic parameter, not only can judge the generation of abnormal behaviour, and can accurately distinguish Flash Crowd and ddos attack, network layer ddos attack and application layer ddos attack are all had detect preferably effect.Simultaneously, the present invention outreach by conversion message proportion grading the existing blind area of algorithm, and provided effective solution, namely a plurality of nodes that outreach are carried out single-point and detect simultaneously.The advantage of this detection method do not need to be message load is analyzed, and only need to construct the figure of UNICOM of Web colony and get final product.The method is suitable at backbone network or attacks the end border networks and detect, and can more effectively be contained attacking, and reduces and attacks the impact that basic network is caused.
Description of drawings
Fig. 1 is application scenarios figure;
Fig. 2 is the logical schematic diagram of Web communication group sports association;
Fig. 3 is the flow chart of statistics of the present invention web colony communication feature;
Fig. 4 is detection method flow chart of the present invention.
Wherein: 1. router, 2. network monitoring front, 3. server, 4. monitor terminal.
Embodiment
The invention will be further described below in conjunction with drawings and Examples:
In order more effectively to tackle the application layer ddos attack, designed a kind of application layer ddos attack detection method that is deployed in backbone network.The application scenarios of this detection method is as shown in Figure 1: at network equipments such as router one or switches Port Mirroring is set, the all-network message of this equipment of flowing through is replicated sends to network monitoring front 2; Front end processor is sent to according to correspondence structure Web communication colony and detects server 3; Server 3 extracts Web colony and outreaches behavioural characteristic, detects the skew that outreaches behavioral parameters, judges the application layer ddos attack, and reports the generation of attacking to network monitoring terminal 4.
Detect the application layer ddos attack at backbone network and face challenge aspect two, on the one hand, drop into a large amount of computational resources and resolve infeasible to Web communications applications layer data; On the other hand, the Internet adopts the dynamic routing strategy, and same user's visit data may pass through different paths, and this causes can not observing complete communication data a monitoring point.Therefore, the fine granularity DDoS detection method of analysing in depth telex network is unsuitable for being deployed in backbone network, and the present invention is from a higher level-communication colony-detection application layer ddos attack.
(1) measures Web communication colony
Communication colony refer to mutual correspondence closely and have identical load characteristic the set of one group of main frame.The client of Web server and this server of access is common to consist of Web colony that communicates by letter.The part client is in the access Web server, and the host node communication outside the colony that can communicate by letter with Web inevitably, the present invention are called these external host nodes and outreach node, client and outreach connection between the node and be called and outreach.The present invention further is divided into and outreaches node more and singly outreach node outreaching node, outreach node if there are a plurality of Web clients to be connected to certain, this node is to outreach node one more so, and this category node generally includes by other server of same website, related other close website and forms; Outreach node if only have a Web client to be connected to certain, this node is one and singly outreaches node so, usually by user's individual access behavior generation.Be called the degree of connection of this node with the number of the node of a certain node (Web server, client or outreach node) communication.
Fig. 2 is UNICOM's schematic diagram of a small-sized Web communication colony, the logical figure of Web communication group sports association is a non-directed graph, connecting maximum core points among the figure is Web server, round dot represents to be connected to the client of Web server, annulus represents the main frame that client outreaches, and the main frame of identical ip addresses can not repeat in the drawings.As can see from Figure 2, when a computer access Web server, also may produce simultaneously the flow with other compunications, the present invention calls this communication and outreaches communication.
The Web amount of communication data is large in the backbone network, needs therefrom to extract the communication colony that specifies Web server.Concrete steps (seeing flow chart 3):
A. monitor network link, find a new message after, extract its source IP address, purpose IP address and destination interface thereof;
B. judge the whether web server address of appointment of destination address, and destination interface is the SYN message of 80 ports, then changes in this way step C over to and carry out, carry out otherwise change step e over to;
C. judge that its source IP address whether in client records, then returns in this way steps A and continues to carry out, otherwise increase a client records then for this web server, then return steps A and continue to carry out;
D. judge whether its source IP address or purpose IP address are client address, then change in this way step e over to and continue to carry out, continue to carry out otherwise return steps A;
E. judgement<source IP address, purpose IP address〉whether in outreaching the limit record, occur, if without then increasing a record, return A.
(2) extract Web colony and outreach feature
Detect ddos attack and need to extract the characteristic parameter that to distinguish normal access and abnormal access.The communication data of DDoS puppet main frame in attack process is comprised of two parts, to the attack message that destination host sends, the individual access behavior of the actual user of puppet's main frame.And user's individual access behavior usually can form and singly outreach node, and seldom can consist of the node that outreaches of Web colony more.When attack occuring, the client terminal quantity of Web colony can roll up, and is similar in proportion increase with singly outreaching the client terminal quantity that node is connected, and with outreach the client terminal quantity that node is connected more and substantially can not increase.With sequence { x nRepresent that access outreaches the client terminal quantity of node and the ratio of client sum, { C more in the different time sections nExpression client sum, { M nExpression access outreaches the client terminal quantity of node more, suppose from n+1 (implication of all n is identical in the present invention, and n is natural number, and n=1,2,3...) attack has occured in the moment, attack terminal number amount is A, normal client quantity is R N+1Then have
x n = M n C n
x n + 1 = M n + 1 C n + 1 = M n + 1 R n + 1 + A
Certainly do not get rid of the assailant that has yet and kept a small amount of access request that outreaches that is mingled with between the request message for hiding attack behavior better, this access behavior is except causing Web colony client terminal quantity significantly to increase, also can significantly increase the quantity that access outreaches the client of node more, use L N+1The expression access outreaches the quantity of the attack end of node more, then has
x n + 1 = L n + 1 M A R n + 1 + A
The variation that this moment access outreaches the ratio of the client terminal quantity of node and client sum more is uncertain, is subject to outreaching the impact of the factors such as the time interval of the occurrence frequency of access behavior and measurement.Work as M A/ A is greater than L N+1/ R N+1, sequence generation is skew upwards, works as M A/ A is less than L N+1/ R N+1, then occur offseting downward.
Comprehensive above the analysis, the present invention detects respectively sequence
x n = M n C n With y n = C n M n , n = 1,2,3 . . .
Upwards skew, { x nUpwards offset table be shown with the attack that outreaches the access behavior { y occur nMaking progress to be offset has then represented to have occured the ddos attack that nothing outreaches.
(3) utilize improved CUSUM algorithm to carry out abnormality detection
The CUSUM algorithm belongs to the sequential detection method in the change point detection method, can detect the variation of a statistic processes average.In the particular Web communication colony, and outreach client terminal quantity M that node is connected and the sequence of ratio values { x of the total C of client more n=M n/ C nAnd { y n=C n/ M nCan be used as the present invention and carry out the foundation that ddos attack detects.For the ease of calculating, reduce the online expense that detects, the present invention uses the recurrence formula (wherein replacing δ/2 with indefinite parameter k) of Non-parametric CUSUM Algorithm:
Z n=max{0,Z n-1+X n-k},n=1,2,3,...
If select in advance threshold value h>0, Z N-1The average of n-1 detected value is not offset before≤h the explanation, and detected object is normal condition.If certain Z n>h, then detected object has occured unusually.
Realize rate of false alarm and the balance between detection time by selection parameter k and h in the Non-parametric CUSUM Algorithm.The k that selects is larger, at { Z nIn occur on the occasion of possibility just less, thereby be accumulated to a larger value and find that the possibility of attacking is less.H attacks thresholding, and h is larger, and rate of false alarm is lower, but detection time is longer.For the complexity and the dynamic that adapt to better network environment, the present invention improves the CUSUM algorithm, and upwards the recurrence formula of skew is:
Z n=max{0,Z n-1+X nn-d},n=1,2,3,...
Wherein, δ nBe { x nExponentially weighted moving average (EWMA) EWMA, d makes Z nUnder normal circumstances less than 0 deviant, δ nComputational methods as follows
δ n=(1-α)δ n-1+αX n,δ 0=X 0
In order to adapt to the dynamic change of network, can not cause again the raising of rate of failing to report, the value of EWMA factor alpha is less, and scope is 0.01~0.03.{ the x that causes according to attack nAnd { y nJitter conditions, can set d=μ δ n, h=λ δ n, the parameter μ in the formula can obtain by the statistics of real data.And the value of parameter lambda really rule depend on the user to the tolerance of rate of false alarm, and detection time of user expectation, span can be in (1~10).For example, if make λ=2, then can within no more than 4 time intervals, detect the attack more than 50% that degrees of offset reaches average, and in no more than 20 time slots, detect the attack more than 10% that degrees of offset reaches average.
Detect unusual method treatment step (seeing flow chart 4):
1). at the network equipment Port Mirroring is set, the all-network message of this equipment of flowing through is replicated sends to the attack detecting front end processor;
2). the attack detecting front end processor extracts the communication colony of particular Web server and outreaches behavior, is sent to the attack detecting server;
3). the attack detecting server is added up the behavioral parameters that outreaches of Web communication colony, namely with outreach client terminal quantity CN_MLN and the client sum CN that node is connected more, and with the skew of two parameter ratios of improved CUSUM algorithm monitors, judge accordingly the generation of application layer ddos attack behavior;
4). when each time period finishes, whether occured for the application layer ddos attack of specifying Web server to the network monitoring terminal report.
Described step 3) with the skew of two parameter ratios of improved CUSUM algorithm monitors, judges that accordingly the process of generation of application layer ddos attack behavior is as follows in: calculating { x respectively nAnd { y nN detected value Z n xAnd Z n y, its recurrence formula is as follows:
Z n x = max { 0 , Z n - 1 x + x n - δ n x - d x } , n = 1,2,3 , . . .
Z n y = max { 0 , Z n - 1 y + y n - δ n y - d y } , n = 1,2,3 , . . .
To Z n x, Z n yWith corresponding threshold value
Figure BDA0000076183340000074
Compare respectively,
(1) if
Figure BDA0000076183340000075
And
Figure BDA0000076183340000076
The CUSUM accumulation of n detected value and not being offset before illustrating, detected object is normal condition, proceeds detection;
(2) if Perhaps
Figure BDA0000076183340000078
Then detected object has occured unusually at n detected value, and the Ddos attack has namely occured.
The list of references of using herein:
[1]Wortham,Jenna,Kramer,Andrew?E.Professor?Main?Target?of?Assault?on?Twitter,New?York?Times,2009-08-07;
[2]Garda?inquiry?under?way?into?alleged?attacks?on?CAO?website,The?Irish?Times,2010-08-28;
[3]Shachtman,Norah,Activists?Launch?Hack?Attacks?on?Tehran?Regime,Wired,2009-06-15;
[4]Factsheet-Root?server?attack?on?6?February?2007.ICANN.2007-03-01.Retrieved?2009-08-01;
[5] http://net.chinabyte.com/519DNS/
[6]J.Mirkovic,P.Reiher,A?Taxonomy?of?DDoS?Attack?and?DDoS?Defense?Mechanisms,ACM?SIGCOMM?Computer?Communication?Review,2004,34(2):39-54;
[7]Y.Xie?and?S.Yu.A?large-scale?hidden?semi-Markov?model?for?anomaly?detection?on?user?browsing?behaviors.IEEE/ACM?transaction?on?networking,17(1):54-65,2009;
[8] Xiao Jun, Yun Xiaochun, Zhang Yongzheng, the application layer distributed denial of service attack of dialogue-based abnormality degree model filters, Chinese journal of computers, 2010,33 (9);
[9]S.Kandula,D.Katabi,M.Jacob,and?A.W.Berger,Botz-4-Sale:Surviving?Organized?DDoS?Attacks?that?Mimic?Flash?Crowds,MIT,Tech.Rep.TR-969,2004[Online].Available:
http://www.usenix.org/events/nsdi05/tech/kandula/kandula.pdf。

Claims (5)

1. based on the Denial of Service attack detection method of the external behavior of Web communication group, it is characterized in that the detecting step of the method is as follows:
Step1: Port Mirroring is set at the network equipment, the all-network message of this network equipment of flowing through is replicated sends to network monitoring front, extract the communication colony of Web server and outreach behavior in network monitoring front, be sent to the detection server;
Step2: the feature that outreaches of in detecting server, extracting the web server communication colony described in the Step1: client terminal quantity CN with the client terminal quantity CN_MLN that outreaches node more and be connected; With sequence { x nRepresent that access outreaches the client terminal quantity of node and the ratio of client sum, { y more in the different time sections nThe interior client sum of expression different time sections and the ratio of accessing the client terminal quantity that outreaches node, { C more nExpression client sum, { M nRepresent that access outreaches the client terminal quantity of node more, is calculated as follows sequence { x nAnd { y nValue x in n Δ t nWith y n:
Figure FDA00003302734000011
Step3: in detecting server, utilize improved CUSUM Algorithm Analysis Web colony to outreach feature, judge whether to have occured attack;
Calculate respectively { x nAnd { y nN detected value Z n xAnd Z n y, its recurrence formula is as follows:
Figure FDA00003302734000013
Figure FDA00003302734000014
Wherein,
Figure FDA00003302734000015
Figure FDA00003302734000016
Be respectively { x nAnd { y nExponentially weighted moving average (EWMA), d x, d yMake respectively
Figure FDA000033027340000116
Under normal circumstances less than 0 deviant,
Figure FDA00003302734000019
Be sequence { x nN-1 detected value,
Figure FDA000033027340000110
Be sequence { y nN-1 detected value,
Figure FDA000033027340000111
Be sequence { x nN detected value, it is used for the detection with the attack that outreaches the access behavior,
Figure FDA000033027340000112
Be sequence { y nN detected value, it is used for detecting without the ddos attack that outreaches access;
Step4: to Z n x, Z n yWith corresponding threshold value
Figure FDA000033027340000113
Figure FDA000033027340000114
Compare respectively, judge whether to have occured the DDos attack;
Step5: when each time period finishes, whether occured for the application layer ddos attack of specifying Web server to the network monitoring terminal report.
2. the Denial of Service attack detection method based on the external behavior of Web communication group as claimed in claim 1 is characterized in that, among the described Step1, the described colony that communicates by letter refers to mutual correspondence closely and has the set of one group of main frame of identical load characteristic.
3. the Denial of Service attack detection method based on the external behavior of Web communication group as claimed in claim 1 is characterized in that, among the described Step2, the process of extracting communication colony is as follows:
A. monitor network link, find a new message after, extract its source IP address, purpose IP address and destination interface thereof;
B. judge the whether web server address of appointment of destination address, and destination interface is the SYN message of 80 ports, then changes in this way step C over to and carry out, carry out otherwise change step e over to;
C. judge that its source IP address whether in client records, then returns in this way steps A and continues to carry out, otherwise increase a client records then for this web server, then return steps A and continue to carry out;
D. judge whether its source IP address or purpose IP address are client address, then change in this way step e over to and continue to carry out, continue to carry out otherwise return steps A;
E. judge whether source IP address and purpose IP address occur in outreaching the limit record, if without then increasing a record, return A.
4. the Denial of Service attack detection method based on the external behavior of Web communication group as claimed in claim 1 is characterized in that, among the described Step3,
Figure FDA00003302734000021
Figure FDA00003302734000022
With d x, d yComputational methods as follows:
Figure FDA00003302734000023
Wherein,
Figure FDA00003302734000025
Figure FDA00003302734000026
Represent respectively the weighted moving average initial value, x 0, y 0Represent respectively sequence { x nAnd { y nInitial value, α is the exponentially weighted moving average (EWMA) coefficient, scope is 0.01~0.03, the statistics of parameter μ by real data obtains.
5. the Denial of Service attack detection method based on the external behavior of Web communication group as claimed in claim 1 is characterized in that among the described Step4, deterministic process is as follows: for Z n xAnd Z n yCorresponding threshold value
Figure FDA00003302734000027
Figure FDA00003302734000028
(1) if
Figure FDA000033027340000212
And
Figure FDA00003302734000029
The CUSUM of n detected value accumulates and is not offset before illustrating, detected object is normal condition;
(2) if
Figure FDA000033027340000210
Perhaps
Figure FDA000033027340000211
Then detected object has occured unusually at n detected value, application layer DDos has namely occured attacked.
CN 201110199063 2011-07-15 2011-07-15 Denial-of-service attack detection method based on external connection behaviors of Web communication group Expired - Fee Related CN102238047B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110199063 CN102238047B (en) 2011-07-15 2011-07-15 Denial-of-service attack detection method based on external connection behaviors of Web communication group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110199063 CN102238047B (en) 2011-07-15 2011-07-15 Denial-of-service attack detection method based on external connection behaviors of Web communication group

Publications (2)

Publication Number Publication Date
CN102238047A CN102238047A (en) 2011-11-09
CN102238047B true CN102238047B (en) 2013-10-16

Family

ID=44888292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110199063 Expired - Fee Related CN102238047B (en) 2011-07-15 2011-07-15 Denial-of-service attack detection method based on external connection behaviors of Web communication group

Country Status (1)

Country Link
CN (1) CN102238047B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027577B (en) * 2016-08-04 2019-04-30 四川无声信息技术有限公司 A kind of abnormal access behavioral value method and device
CN108337254B (en) * 2018-01-30 2020-12-29 杭州迪普科技股份有限公司 Method and device for protecting hybrid DDoS attack
CN109257384B (en) * 2018-11-14 2020-12-04 济南百纳瑞信息技术有限公司 Application layer DDoS attack identification method based on access rhythm matrix

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547129A (en) * 2009-05-05 2009-09-30 中国科学院计算技术研究所 Method and system for detecting distributed denial of service attack
WO2009140878A1 (en) * 2008-05-23 2009-11-26 成都市华为赛门铁克科技有限公司 Method, network apparatus and network system for defending distributed denial of service ddos attack
CN102123136A (en) * 2010-12-26 2011-07-13 广州大学 Method for identifying DDoS (distributed denial of service) attack flow

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980506B (en) * 2010-10-29 2013-08-14 北京航空航天大学 Flow characteristic analysis-based distributed intrusion detection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009140878A1 (en) * 2008-05-23 2009-11-26 成都市华为赛门铁克科技有限公司 Method, network apparatus and network system for defending distributed denial of service ddos attack
CN101547129A (en) * 2009-05-05 2009-09-30 中国科学院计算技术研究所 Method and system for detecting distributed denial of service attack
CN102123136A (en) * 2010-12-26 2011-07-13 广州大学 Method for identifying DDoS (distributed denial of service) attack flow

Non-Patent Citations (12)

* Cited by examiner, † Cited by third party
Title
&gt *
&lt *
.2007,21-27. *
.2010,第33卷(第9期),1713-1724. *
DDoS攻击检测和控制;张永铮等;《软件学报》;20120521 *
张永铮等.DDoS攻击检测和控制.《软件学报》.2012,
王风宇等.多时间尺度同步的网络异常检测方法.&lt *
王风宇等.多时间尺度同步的网络异常检测方法.<<通信学报>>.2007,21-27.
肖军等.基于会话异常模型的应用层分布式拒绝服务攻击过滤.&lt *
肖军等.基于会话异常模型的应用层分布式拒绝服务攻击过滤.<<计算机学报>>.2010,第33卷(第9期),1713-1724.
计算机学报&gt *
通信学报&gt *

Also Published As

Publication number Publication date
CN102238047A (en) 2011-11-09

Similar Documents

Publication Publication Date Title
Zhijun et al. Low-rate DoS attacks, detection, defense, and challenges: a survey
Li et al. Detection and defense of DDoS attack–based on deep learning in OpenFlow‐based SDN
Zhou et al. Detection and defense of application-layer DDoS attacks in backbone web traffic
Cao et al. Detecting and mitigating DDoS attacks in SDN using spatial-temporal graph convolutional network
Kemp et al. Utilizing netflow data to detect slow read attacks
CN102271068A (en) Method for detecting DOS/DDOS (denial of service/distributed denial of service) attack
CN103078897A (en) System for implementing fine grit classification and management of Web services
Eslahi et al. An efficient false alarm reduction approach in HTTP-based botnet detection
Cai et al. Detecting HTTP botnet with clustering network traffic
Meng et al. Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
Hung et al. A botnet detection system based on machine-learning using flow-based features
Chwalinski et al. Detection of application layer DDoS attacks with clustering and Bayes factors
CN102238047B (en) Denial-of-service attack detection method based on external connection behaviors of Web communication group
Chen et al. LDDoS Attack Detection by Using Ant Colony Optimization Algorithms.
Liu et al. Real-time diagnosis of network anomaly based on statistical traffic analysis
Bin et al. A NetFlow based flow analysis and monitoring system in enterprise networks
Singh et al. Impact analysis of application layer DDoS attacks on web services: a simulation study
Xie et al. Online anomaly detection based on web usage mining
El-Kadhi et al. A Mobile Agents and Artificial Neural Networks for Intrusion Detection.
Kashyap et al. A DDoS attack detection mechanism based on protocol specific traffic features
Li et al. A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms
Zhang et al. An amplification DDoS attack defence mechanism using reinforcement learning
Ishibashi et al. Detecting anomalous traffic using communication graphs
Mathews et al. CoAP-DoS: An IoT network intrusion data set
Luo et al. Optimizing the pulsing denial-of-service attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131016

Termination date: 20140715

EXPY Termination of patent right or utility model