CN102769549A - Network security monitoring method and device - Google Patents

Network security monitoring method and device Download PDF

Info

Publication number
CN102769549A
CN102769549A CN201110115158XA CN201110115158A CN102769549A CN 102769549 A CN102769549 A CN 102769549A CN 201110115158X A CN201110115158X A CN 201110115158XA CN 201110115158 A CN201110115158 A CN 201110115158A CN 102769549 A CN102769549 A CN 102769549A
Authority
CN
China
Prior art keywords
terminal use
monitoring period
request
request number
triggers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110115158XA
Other languages
Chinese (zh)
Other versions
CN102769549B (en
Inventor
梁可结
张富春
张红梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Tengyun Information Industry Co.,Ltd.
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201110115158.XA priority Critical patent/CN102769549B/en
Publication of CN102769549A publication Critical patent/CN102769549A/en
Application granted granted Critical
Publication of CN102769549B publication Critical patent/CN102769549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a network security monitoring method and device, belonging to the field of internet. The method comprises the steps of: acquiring the requesting information of a terminal user; calculating the requesting times within the monitoring time interval before any triggering time; judging whether the requesting times surpass the predetermined access upper limit; if yes, transmitting the plugging information, and refusing the subsequent request of the terminal user in the predetermined time. The requesting times within the monitoring time before any triggering time can be calculated, so that the malicious attack object can be accurately judged and can blocked to protect the core data of the network resource.

Description

The method and apparatus of network security monitoring
Technical field
The present invention relates to internet arena, particularly a kind of method and apparatus of network security monitoring.
Background technology
Along with the development of Web (the Internet) service, the user is increasing to participate in the network event, and user's participation is more stressed in the particularly proposition of Web2.0 in recent years.Simultaneously, as the side that Web service provides, also bearing more and more Cyberthreats from different aspect.Wherein, malicious requests is a kind of attack that must take precautions against, relates to the protection of core data.Under the situation of magnanimity request, how could find efficiently and malicious user is made respective limits, can protect normal users interference-free again simultaneously, need a limiting access scheme to the different user request.
The scheme of restricting user access is in the prior art: to the request of (as T minute) in the certain hour, the request that surpasses setpoint frequency is implemented shutoff through the mode of blacklist.Concrete, be that unit is divided into a plurality of time periods with 24 hours of every day with T, the request number that statistics receives in each time period; Wherein, for Web service, url (the Uniform/Universal ResourceLocator that each request all can a corresponding request; URL), receive the requested service device and carry out direct count according to the url that is asked or to the ip (Internet Protocol, net association) that asks; And judge whether this request number has surpassed preset request number of times; If surpass request number of times, then this user is drawn in blacklist, limit this user's request within a certain period of time.
After prior art is analyzed; The inventor finds that prior art has following shortcoming at least: can only make statistics according to the request in certain time period, the hacker possibly test out the upper limit of each gate time point, and each request all is no more than ceiling restriction; Continuous a spot of the request; Possibly can not go wrong from the counting aspect like this, still, just possibly cause the loss of core data from the amount of integral body.Such as: the T that operates in that limits certain ip+url LimBe no more than N time in minute, if but each<T LimTime in, ask M time (1~N-1), just can pull (24*60/T every day like this Lim) record of * M.If T LimIf must be too low, the operation that server detects be frequent more, influences the performance of server, and it is higher to report probability simultaneously by mistake; If but T LimIf De Taigao has reduced the correctness that detects again, be difficult to distinguish normal running and malicious operation.
Summary of the invention
In order to solve the problems of the prior art, the embodiment of the invention provides a kind of method and apparatus of network security monitoring.Said technical scheme is following:
On the one hand, a kind of method of network security monitoring is provided, said method comprises:
Obtain terminal use's solicited message;
Calculating is triggering T monitoring period T before constantly arbitrarily wInterior said terminal use's request number of times;
Judge whether the described request number of times surpasses the preset visit upper limit;
If then issue shutoff message, the said terminal use's of refusal subsequent request in Preset Time.
Said calculating is triggering T monitoring period T before constantly arbitrarily wInterior said terminal use's request number of times comprises:
According to said terminal use's solicited message, obtain the corresponding record item of described request information, said record item comprises, monitoring period T w, the final updating time T LastWith the circulation array, said circulation array is used to store the said access times of monitoring the said terminal use in the period of said final updating times prior;
According to any triggering moment T and T Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
Said basis triggers T and T constantly arbitrarily Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times comprises:
Calculate and trigger T and T constantly arbitrarily LastDifference, obtain T LastThe moment and said any T ' blanking time between the T constantly that triggers;
Judge that whether said T ' is smaller or equal to said monitoring period T w
If, basis then
Figure BDA0000059312180000021
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether said T ' is more than or equal to 2T w
If then empty loop-around data, with said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times is designated as zero;
Otherwise, according to
Figure BDA0000059312180000022
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
Said solicited message according to said terminal use is obtained the corresponding record item of described request information, also comprises before:
Judge the record item that whether has said solicited message corresponding in the buffer memory;
If have then continue execution in step; Otherwise be the new record item of described request information creating, and with the zero setting of circulation array.
Different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set, then said method also comprises:
In the said different monitoring period, the request number of times of adding up said terminal use;
Whether the request number of times of judging said terminal use surpasses the visit upper limit of said monitored item in the said monitoring period;
If, the shutoff policy distribution shutoff message that then triggers, the said terminal use's of refusal subsequent request in Preset Time according to said terminal use.
Said different monitored item type comprises:
Request that request or the said terminal use of said terminal use through ip and url passes through uin and url or said terminal use are through the request of url.
On the other hand, a kind of device of network security monitoring is provided, said device comprises:
Acquisition module is used to obtain terminal use's solicited message;
Computing module is used to calculate and is triggering T monitoring period T before constantly arbitrarily wInterior said terminal use's request number of times;
First judge module is used to judge whether the described request number of times surpasses the preset visit upper limit; If then issue shutoff message, the said terminal use's of refusal subsequent request in Preset Time.
Said computing module comprises:
Acquiring unit is used for the solicited message according to said terminal use, obtains the corresponding record item of described request information, and said record item comprises, monitoring period T w, the final updating time T LastWith the circulation array, said circulation array is used to store the said access times of monitoring the said terminal use in the period of said final updating times prior;
Computing unit is used for according to triggering T and T constantly arbitrarily Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
Said computing unit specifically is used for:
Calculate and trigger T and T constantly arbitrarily LastDifference, obtain T LastThe moment and said any T ' blanking time between the T constantly that triggers;
Judge that whether said T ' is smaller or equal to said monitoring period T w
If, basis then
Figure BDA0000059312180000041
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether said T ' is more than or equal to 2T w
If then empty loop-around data, with said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times is designated as zero;
Otherwise, according to
Figure BDA0000059312180000042
Obtain said any T monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
Said device also comprises:
Second judge module is used for the solicited message of said acquiring unit according to said terminal use, obtains before the corresponding record item of described request information, judges the record item that whether has said solicited message corresponding in the buffer memory; If have then continue execution in step; Otherwise be the new record item of described request information creating, and with the zero setting of circulation array.
Said device also comprises:
The various dimensions monitoring module is used for different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set, in the said different monitoring period, and the request number of times of adding up said terminal use; Whether the request number of times of judging said terminal use surpasses the visit upper limit of said monitored item in the said monitoring period; If, the shutoff policy distribution shutoff message that then triggers, follow-up all requests of the said terminal use of refusal in Preset Time according to said terminal use.
Said device also comprises:
The hypertext link extraction module is used for directly grasping the HTTP packet from network interface card with the mode of bypass, and after said HTTP packet handled, the result after the said processing is sent to said acquisition module.
The technical scheme that the embodiment of the invention provides through calculating any request number of times that triggers in the moment monitoring period section before, can be judged the object of malicious attack accurately, and it is implemented shutoff, thus the core data of protecting network resource.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work property, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the method for a kind of network security monitoring of providing of the embodiment of the invention 1;
Fig. 2 is the flow chart of the method for a kind of network security monitoring of providing of the embodiment of the invention 2;
Fig. 3 is a kind of circulation array that the embodiment of the invention 2 provides;
Fig. 4 is the schematic representation of apparatus of a kind of network security monitoring of providing of the embodiment of the invention 3;
Fig. 5 is the schematic representation of apparatus of the another kind of network security monitoring that provides of the embodiment of the invention 3.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, embodiment of the present invention is done to describe in detail further below in conjunction with accompanying drawing.
Before introducing the method for network security monitoring provided by the invention, at first rudimentary knowledge of the present invention is carried out concise and to the point introduction:
Memcache: be a high performance distributed memory object caching system, through safeguard the huge hash table of a unification at internal memory, it can be used for storing the data of various forms, comprises the result of image, video, file and database retrieval etc.Its buffer memory is a kind of distributed, just can allow a plurality of users on the different main frames to visit this caching system simultaneously, and it can only be the drawback of unit that this method has solved shared drive, and biggest advantage is to have improved the speed of obtaining data of visiting.
Embodiment 1
Referring to Fig. 1, the embodiment of the invention provides a kind of method of network security monitoring, comprising:
Step 101: the solicited message of obtaining the terminal use;
Step 102: calculate and triggering T monitoring period T before constantly arbitrarily wIn, terminal use's request number of times;
Step 103: judge whether request number of times surpasses the preset visit upper limit; If then issue shutoff message, refusal terminal use's subsequent request in Preset Time.
Wherein, calculate at any T monitoring period T before constantly that triggers wInterior request number of times comprises:
According to terminal use's solicited message, obtain the corresponding record item of solicited message, the record item comprises monitoring period T w, the final updating time T LastWith the circulation array, the circulation array is used to store the terminal use's in monitoring period of final updating times prior access times;
According to any triggering moment T and T Last, calculate and triggering T monitoring period T before constantly arbitrarily wInterior request number of times.
In the present embodiment, according to T and T Last, calculate and triggering T monitoring period T before constantly arbitrarily wInterior request number of times comprises:
Calculate T and T LastDifference, obtain T LastT ' blanking time between the request of request constantly and T;
Judge that whether T ' is smaller or equal to T w
If, basis then
Figure BDA0000059312180000061
Obtain T T before wInterior request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether T ' is more than or equal to 2T w
If then empty loop-around data, with triggering T monitoring period T before constantly arbitrarily wInterior request number of times is designated as zero;
Otherwise, according to
Figure BDA0000059312180000062
Triggered T monitoring period T before constantly arbitrarily wInterior request number of times.
Alternatively, in the present embodiment,, obtain the corresponding record item of solicited message, also comprise before based on terminal use's solicited message:
Judge the record item that whether has solicited message corresponding in the buffer memory;
If have then continue execution in step; Otherwise for solicited message is created new record item, and with the zero setting of circulation array.
In the present embodiment, method also comprises:
Different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set;
In the different monitoring periods, statistics terminal use's request number of times;
Whether the request number of times of judging the terminal use surpasses the visit upper limit of monitored item in the monitoring period;
If, the shutoff policy distribution shutoff message that then triggers, follow-up all requests of refusal terminal use in Preset Time according to the terminal use.
Wherein, different monitored item comprises:
Request that request or the terminal use of terminal use through ip and url passes through uin and url or terminal use are through the request of url.
The technical scheme that the embodiment of the invention provides through calculating any request number of times that triggers in the moment monitoring period section before, can be judged the object of malicious attack accurately, and it is implemented shutoff, thus the core data of protecting network resource.
Embodiment 2
Referring to Fig. 2, the embodiment of the invention provides a kind of method of network security monitoring, comprising:
Step 201: statistical server obtains terminal use's solicited message.
In the present embodiment, the HttpDump Server of Servers-all arrangement (hypertext link extraction module) receiving user's request is used for the mode with bypass, directly grasps the HTTP packet from network interface card.Be in order to detect the url that all ask server, to comprise legal and illegal request like this.In the present embodiment,, changed the drawback that single dependence ip monitors counting, avoided the situation of reporting by mistake (in claim, not embodying) to greatest extent through monitoring the monitored item of ip+url, uin+url, three kinds of different rules types of url simultaneously.Wherein uin is a Subscriber Number sign, the Subscriber Number of Tencent QQ software sign for example, and by the numeral more than one 5 figure place, as unique identity of user, all business all are with the difference of uin as different user.HttpDump Server forms the request msg that grabs a tlv triple <uin, ip, url>and is aggregated into UDPProxy Server (acting server), is forwarded to StatisticServer (statistical server) by UDPProxy again.
Wherein, when statistical server starts, read in the policy configurations file, therefore after configuration file upgraded, statistical server can both upgrade in time.Wherein, the description of the policing rule of policy configurations file can be adopted as giving a definition:
< rule name, url, monitoring period, the visit upper limit, binding hours, shutoff type >
Rule name: identify this configured strategy rule name, be used for rule searching.
Url: the detailed chained address of user's request.
Monitoring period/visit the upper limit: refer to that in the monitoring period access times can not surpass visits the upper limit, otherwise will trigger this rule.
Binding hours: after this rule triggers, implement shutoff the binding hours that will be provided with, in the time of this setting, the same request of same subscriber will be rejected.
The shutoff type: after this rule triggers, implement the type of shutoff, the front end request returns to the user according to the shutoff type.
Step 202: judge the record item that whether has solicited message corresponding in the buffer memory; If then obtain this record item and execution in step 203; Otherwise for solicited message is created new record item, and with the zero setting of circulation array.
In the present embodiment,, the record item that saves as the key/value form is set to the request of each url, as shown in table 1:
Table 1
Figure BDA0000059312180000081
Wherein, comprise in the record item: monitoring period, final updating time and circulation array.Wherein, the monitoring period: the monitoring period strategy of setting in the multidimensional monitoring table according to table 1 introduction, set the statistics of this record count and monitor the period; The final updating time: the last record of a record time of upgrading; Circulation array: the interior request number of times of monitoring period that is used to be recorded in the final updating times prior.The core method of counting of present embodiment is exactly through being provided with a circulation array A; Use the mode of sliding window; Calculate the request sum in the nearest monitoring period, circulation array as shown in Figure 3 leaves in the user's of the statistics in the Preset Time request number of times in the sequential cells of an array by clockwise order; Among Fig. 3 access times with statistics in each minute; Leaving in by clockwise order in the sequential cells of circulation array, is 16 times like first minute access times, and second minute access times are 34 times.What sequential cells the needs of concrete circulation array are divided into was decided with concrete needs according to the monitoring period, and the embodiment of the invention is not done concrete qualification to this.
In the present embodiment; All statistical informations are kept in the middle of the memcache, and the statistical server that makes many tablecloths affix one's name to can be shared information, avoid being confined to the visit of this machine; Carry out horizontal extension easily, so that the user who provides the mode of cluster to tackle magnanimity asks counting.
Wherein, if there is the respective record item of this request type in the buffer memory, then obtain this record item; If in buffer memory, do not obtain corresponding record entry, then be the newly-built list item structure of this solicited message, and the circulation array is put 0, deposit buffer memory in.Wherein, new record item is based on the policy configurations file and creates, and can choose different request types, is used as the key in the buffer memory like ip, url or ip+url, and based on the different request types of choosing, sets the different monitoring periods.
Step 203: statistical server calculates and is triggering T monitoring period T before constantly arbitrarily wInterior request number of times.
In the present embodiment, in triggering arbitrarily constantly T, receive certain url request of user after, from buffer memory, obtain the corresponding record item earlier, in the present embodiment, the final updating time in the record is T Last, the monitoring period is T w, the circulation array is A.
Wherein, according to final updating time T in the record item LastAnd T, calculate the T before T wRequest number of times in minute.Concrete:
1) calculates T and T LastDifference, obtain T LastThe moment and the blanking time T ' of T between the moment;
2) judge that whether T ' is smaller or equal to T w
3) if, then from subscript (T '-1+T w) mod T wBeginning, according to Obtain the request number of times of T in the monitoring period before, wherein A is the circulation array, and i is a natural number; Otherwise, judge that whether T ' is more than or equal to 2T w
4) if, then empty loop-around data, the request number of times in the monitoring period before the T is designated as zero, again counting; Otherwise, obtain the request number of times of T in the monitoring period before according to
Figure BDA0000059312180000092
.
Step 204: judge whether request number of times surpasses the preset visit upper limit; If then execution in step 205; Otherwise return step 201.
In the present embodiment, every kind of request type is provided with the visit upper limit, in order to monitor the whether triggering shutoff rule of this request type; If but do not trigger the shutoff rule, then return step 201, continue the next request of statistics.
Step 205: issue shutoff message, follow-up all requests of refusal terminal use in Preset Time.
In the present embodiment, when detecting the policing rule that triggers shutoff, relevant shutoff information is sent to Block Server (shutoff module).Block Server also need be deployed into each and accept user's requested service device simultaneously.Block Server writes shared drive with the user uin/ip that needs shutoff when receiving shutoff message.Like this, be deployed in other business service on the same server, when each request that receives the user, through searching shared drive, whether the uin/ip that judges this user is by shutoff, to confirm to continue to provide perhaps denial of service.Wherein, alternatively, the shutoff binding hours according on every shutoff information band that issues automatically terminates behind overstepping the time limit.
Alternatively, in the present embodiment, different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set, in the different monitoring periods, statistics terminal use's request number of times; Whether the request number of times of judging the terminal use surpasses the visit upper limit of request type in the monitoring period; If, the shutoff policy distribution shutoff message that then triggers, follow-up all requests of the said terminal use of refusal in Preset Time according to said terminal use.Concrete, can the monitoring of various dimensions be provided according to the demand of different business, as shown in table 2:
Table 2
Figure BDA0000059312180000101
Monitored item through ip+url, uin+url, three kinds of different rules types of url; Dispose different monitoring period points: 10 minutes; 60 minutes, 1440 minutes (monitoring period can according to policy configurations file flexible configuration) be provided with the corresponding visit upper limit for every kind of composite type simultaneously; As long as any one control point of request trigger of user; The capital issues shutoff message immediately to Block Server server, and in binding hours, refuses this user's subsequent request, thereby reaches the purpose that malicious requests is limited.Based on the mode that Policy Table's coupling is put, also can adjust strategy neatly to different monitoring, carry out frequency limitation comprehensively and accurately.
The beneficial effect of the technical scheme that the embodiment of the invention provides is: through calculating any request number of times that triggers in the moment monitoring period section before; Can judge the object of malicious attack accurately; And can be according to dissimilar different collocation strategies, the monitor network user of various dimensions, detection of malicious user; And to its enforcement shutoff, thereby the core data of protecting network resource.
Embodiment 3
Referring to Fig. 4, the embodiment of the invention provides a kind of device of network security monitoring, comprising: acquisition module 301, computing module 302, first judge module 303.
Acquisition module 301 is used to obtain terminal use's solicited message;
Computing module 302 is used to calculate and is triggering T monitoring period T before constantly arbitrarily wInterior terminal use's request number of times;
First judge module 303 is used to judge whether request number of times surpasses the preset visit upper limit; If then issue shutoff message, refusal terminal use's subsequent request in Preset Time.
Referring to Fig. 5, in the present embodiment, computing module 302 comprises:
Acquiring unit 302a is used for the solicited message according to the terminal use, obtains the corresponding record item of solicited message, and the record item comprises, monitoring period T w, the final updating time T LastWith the circulation array, the circulation array is used to store the terminal use's in monitoring period of final updating times prior access times;
Computing unit 302b is used for according to triggering T and T constantly arbitrarily Last, calculate and triggering T monitoring period T before constantly arbitrarily wInterior terminal use's request number of times.
Wherein, computing unit specifically is used for:
Calculate and trigger T and T constantly arbitrarily LastDifference, obtain T LastT ' blanking time between the request of request constantly and any triggering moment T;
Judge that whether T ' is smaller or equal to monitoring period T w
If, basis then
Figure BDA0000059312180000111
Obtain T monitoring period T before wInterior terminal use's request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether T ' is more than or equal to 2T w
If then empty loop-around data, with triggering T monitoring period T before constantly arbitrarily wInterior terminal use's request number of times is designated as zero;
Otherwise, according to
Figure BDA0000059312180000112
Triggered T monitoring period T before constantly arbitrarily wInterior terminal use's request number of times.
Referring to Fig. 5, device also comprises in the present embodiment:
Second judge module 304 is used for the solicited message of acquiring unit according to the terminal use, obtains before the corresponding record item of solicited message, judges the record item that whether has solicited message corresponding in the buffer memory; If have then continue execution in step; Otherwise for solicited message is created new record item, and with the zero setting of circulation array.
Referring to Fig. 5, device also comprises in the present embodiment:
Various dimensions monitoring module 305 is used for different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set, in the said different monitoring period, and statistics terminal use's request number of times; Whether the request number of times of judging the terminal use surpasses the visit upper limit of monitored item in the monitoring period; If, the shutoff policy distribution shutoff message that then triggers, follow-up all requests of refusal terminal use in Preset Time according to the terminal use.
Referring to Fig. 5, device also comprises in the present embodiment:
Hypertext link extraction module 306 is used for directly grasping the HTTP packet from network interface card with the mode of bypass, and after the HTTP packet handled, the result after handling is sent to acquisition module.
The technical scheme that the embodiment of the invention provides through calculating any request number of times that triggers in the moment monitoring period section before, can be judged the object of malicious attack accurately, and it is implemented shutoff, thus the core data of protecting network resource.
The device that present embodiment provides, specifically can, belong to same design with method embodiment, its concrete implementation procedure sees method embodiment for details, repeats no more here.
The all or part of of the technique scheme that the embodiment of the invention provides can be accomplished through the relevant hardware of program command; Said program can be stored in the storage medium that can read, and this storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. the method for a network security monitoring is characterized in that, said method comprises:
Obtain terminal use's solicited message;
Calculating is triggering T monitoring period T before constantly arbitrarily wIn, said terminal use's request number of times;
Judge whether the described request number of times surpasses the preset visit upper limit;
If then issue shutoff message, the said terminal use's of refusal subsequent request in Preset Time.
2. method according to claim 1 is characterized in that, said calculating is triggering T monitoring period T before constantly arbitrarily wIn, said terminal use's request number of times specifically comprises:
According to said terminal use's solicited message, obtain the corresponding record item of described request information, said record item comprises, monitoring period T w, the final updating time T LastWith the circulation array, said circulation array is used to store said final updating time T LastSaid monitoring period T before wIn, said terminal use's access times;
According to any triggering moment T and final updating time T Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
3. method according to claim 2 is characterized in that, said basis triggers T and update time T constantly arbitrarily Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times comprises:
Calculate and trigger T and said final updating time T constantly arbitrarily LastDifference, obtain said T LastAnd the T ' blanking time between the said T;
Judge that whether said T ' is smaller or equal to said T w
If, basis then
Figure FDA0000059312170000011
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether said T ' is more than or equal to 2T w
If then empty the circulation array, with said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times is designated as zero;
Otherwise, according to
Figure FDA0000059312170000012
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
4. method according to claim 2 is characterized in that, said solicited message according to said terminal use is obtained the corresponding record item of described request information, also comprises before:
Judge the record item that whether has said solicited message corresponding in the buffer memory;
If have then continue execution in step; Otherwise be the new record item of described request information creating, and with the zero setting of circulation array.
5. method according to claim 1 is characterized in that, said method also comprises:
Different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set;
In the said different monitoring period, the request number of times of adding up said terminal use respectively;
Whether the request number of times of judging said terminal use surpasses the visit upper limit of said monitored item in the said monitoring period;
If then issue shutoff message, the said terminal use's of refusal subsequent request in Preset Time.
6. method according to claim 5 is characterized in that, said different monitored item comprises:
Request that request or the said terminal use of said terminal use through ip of net association and URL url passes through user identification code uin and url or said terminal use are through the request of url.
7. the device of a network security monitoring is characterized in that, said device comprises:
Acquisition module is used to obtain terminal use's solicited message;
Computing module is used to calculate and is triggering T monitoring period T before constantly arbitrarily wInterior said terminal use's request number of times;
First judge module is used to judge whether the described request number of times surpasses the preset visit upper limit; If then issue shutoff message, the said terminal use's of refusal subsequent request in Preset Time.
8. device according to claim 7 is characterized in that, said computing module comprises:
Acquiring unit is used for the solicited message according to said terminal use, obtains the corresponding record item of described request information, and said record item comprises, monitoring period T w, the final updating time T LastWith the circulation array, said circulation array is used to store the said access times of monitoring the said terminal use in the period of said final updating times prior;
Computing unit is used for according to triggering T and T constantly arbitrarily Last, calculate at said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times.
9. device according to claim 8 is characterized in that, said computing unit specifically is used for:
Calculate and trigger T and T constantly arbitrarily LastDifference, obtain T LastThe moment and said any T ' blanking time between the T constantly that triggers;
Judge that whether said T ' is smaller or equal to said monitoring period T w
If, basis then
Figure FDA0000059312170000031
Obtain said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times, wherein A is the circulation array, i is a natural number;
Otherwise, judge that whether said T ' is more than or equal to 2T w
If then empty loop-around data, with said any T said monitoring period T before constantly that triggers wInterior said terminal use's request number of times is designated as zero;
Otherwise, according to
Figure FDA0000059312170000032
Obtain the said any moment said monitoring period T before that triggers wInterior said terminal use's request number of times.
10. device according to claim 8 is characterized in that, said device also comprises:
Second judge module is used for the solicited message of said acquiring unit according to said terminal use, obtains before the corresponding record item of described request information, judges the record item that whether has said solicited message corresponding in the buffer memory; If have then continue execution in step; Otherwise be the new record item of described request information creating, and with the zero setting of circulation array.
11. device according to claim 7 is characterized in that, said device also comprises:
The various dimensions monitoring module is used for different monitored item is provided with the different monitoring periods, and the visit upper limit of each monitoring period is set, in the said different monitoring period, and the request number of times of adding up said terminal use; Whether the request number of times of judging said terminal use surpasses the visit upper limit of said monitored item in the said monitoring period; If, the shutoff policy distribution shutoff message that then triggers, the said terminal use's of refusal subsequent request in Preset Time according to said terminal use.
12. device according to claim 7 is characterized in that, said device also comprises:
The hypertext link extraction module is used for directly grasping HTTP HTTP packet from network interface card with the mode of bypass, and after said HTTP packet handled, the result after the said processing is sent to said acquisition module.
CN201110115158.XA 2011-05-05 2011-05-05 The method and apparatus of network security monitoring Active CN102769549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110115158.XA CN102769549B (en) 2011-05-05 2011-05-05 The method and apparatus of network security monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110115158.XA CN102769549B (en) 2011-05-05 2011-05-05 The method and apparatus of network security monitoring

Publications (2)

Publication Number Publication Date
CN102769549A true CN102769549A (en) 2012-11-07
CN102769549B CN102769549B (en) 2016-02-17

Family

ID=47096807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110115158.XA Active CN102769549B (en) 2011-05-05 2011-05-05 The method and apparatus of network security monitoring

Country Status (1)

Country Link
CN (1) CN102769549B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117997A (en) * 2012-11-19 2013-05-22 苏州亿倍信息技术有限公司 Method and system achieving communication safety control
CN103632085A (en) * 2013-08-28 2014-03-12 广州品唯软件有限公司 Blacklist management method and system
CN104253687A (en) * 2013-06-26 2014-12-31 深圳市腾讯计算机系统有限公司 Method for reducing verification efficiency, method for generating captcha, correlated system, and server
CN104486298A (en) * 2014-11-27 2015-04-01 小米科技有限责任公司 Method and device for user behavior recognition
CN104519069A (en) * 2014-12-27 2015-04-15 广州华多网络科技有限公司 Method and device for intercepting resource requests
CN104580228A (en) * 2015-01-16 2015-04-29 北京京东尚科信息技术有限公司 System and method for generating blacklist for access requests from network
CN104754645A (en) * 2013-12-25 2015-07-01 中国移动通信集团公司 Network connection control method and device
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service
CN105282047A (en) * 2015-09-25 2016-01-27 小米科技有限责任公司 Access request processing method and device
CN105681353A (en) * 2016-03-22 2016-06-15 浙江宇视科技有限公司 Method and device of defending port scanning invasion
CN105939326A (en) * 2016-01-18 2016-09-14 杭州迪普科技有限公司 Message processing method and device
CN106101059A (en) * 2016-05-23 2016-11-09 微梦创科网络科技(中国)有限公司 A kind of web-page requests processing method and processing device
CN106294529A (en) * 2015-06-29 2017-01-04 阿里巴巴集团控股有限公司 A kind of identification user's abnormal operation method and apparatus
CN107704761A (en) * 2017-09-27 2018-02-16 北京小度信息科技有限公司 Data processing method, device, electronic equipment and storage medium
CN108134803A (en) * 2018-01-29 2018-06-08 杭州迪普科技股份有限公司 A kind of URL attack guarding methods and device
CN108694074A (en) * 2017-04-07 2018-10-23 腾讯科技(深圳)有限公司 A kind of method and server obtaining count information
CN108833450A (en) * 2018-08-22 2018-11-16 网宿科技股份有限公司 A kind of realization server anti-attack method and device
CN108874948A (en) * 2018-06-05 2018-11-23 中国农业银行股份有限公司 A kind of site resource access method and device
CN109275145A (en) * 2018-09-21 2019-01-25 腾讯科技(深圳)有限公司 Equipment behavior detection and barrier processing method, medium and electronic equipment
CN109639674A (en) * 2018-12-11 2019-04-16 广州猎萌网络科技有限公司 A kind of access safety control method
CN109756528A (en) * 2017-11-01 2019-05-14 广州腾讯科技有限公司 Control method for frequency and device, equipment, storage medium, server
CN110336881A (en) * 2019-07-10 2019-10-15 北京三快在线科技有限公司 The method and apparatus for executing business processing request
CN111294412A (en) * 2018-12-06 2020-06-16 贵州白山云科技股份有限公司 Processing method and device for exception of content distribution network node server
CN111355626A (en) * 2018-12-24 2020-06-30 中移(杭州)信息技术有限公司 Request processing method and device
CN111585914A (en) * 2019-02-15 2020-08-25 阿里巴巴集团控股有限公司 Service current limiting method and device and electronic equipment
CN112839008A (en) * 2019-11-22 2021-05-25 北京沃东天骏信息技术有限公司 Access monitoring method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816215A (en) * 2005-01-12 2006-08-09 株式会社Ntt都科摩 A data communication restriction method, data communication restriction system and mobile terminal
CN101203052A (en) * 2007-12-24 2008-06-18 华为技术有限公司 Method and apparatus for preventing malice business request
CN101572701A (en) * 2009-02-10 2009-11-04 中科正阳信息安全技术有限公司 Security gateway system for resisting DDoS attack for DNS service

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1816215A (en) * 2005-01-12 2006-08-09 株式会社Ntt都科摩 A data communication restriction method, data communication restriction system and mobile terminal
CN101203052A (en) * 2007-12-24 2008-06-18 华为技术有限公司 Method and apparatus for preventing malice business request
CN101572701A (en) * 2009-02-10 2009-11-04 中科正阳信息安全技术有限公司 Security gateway system for resisting DDoS attack for DNS service

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117997A (en) * 2012-11-19 2013-05-22 苏州亿倍信息技术有限公司 Method and system achieving communication safety control
CN104253687A (en) * 2013-06-26 2014-12-31 深圳市腾讯计算机系统有限公司 Method for reducing verification efficiency, method for generating captcha, correlated system, and server
CN104253687B (en) * 2013-06-26 2018-08-03 深圳市腾讯计算机系统有限公司 It reduces verification efficiency method, generate identifying code method, related system and server
CN103632085A (en) * 2013-08-28 2014-03-12 广州品唯软件有限公司 Blacklist management method and system
CN104754645A (en) * 2013-12-25 2015-07-01 中国移动通信集团公司 Network connection control method and device
CN104754645B (en) * 2013-12-25 2018-10-23 中国移动通信集团公司 A kind of network connection control method and device
JP2017503293A (en) * 2014-11-27 2017-01-26 シャオミ・インコーポレイテッド User action identification method, user action identification device, program, and recording medium
CN104486298A (en) * 2014-11-27 2015-04-01 小米科技有限责任公司 Method and device for user behavior recognition
WO2016082462A1 (en) * 2014-11-27 2016-06-02 小米科技有限责任公司 Method and device for recognizing user behavior
CN104486298B (en) * 2014-11-27 2018-03-09 小米科技有限责任公司 Identify the method and device of user behavior
CN104519069A (en) * 2014-12-27 2015-04-15 广州华多网络科技有限公司 Method and device for intercepting resource requests
CN104580228A (en) * 2015-01-16 2015-04-29 北京京东尚科信息技术有限公司 System and method for generating blacklist for access requests from network
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service
CN106294529A (en) * 2015-06-29 2017-01-04 阿里巴巴集团控股有限公司 A kind of identification user's abnormal operation method and apparatus
CN105282047A (en) * 2015-09-25 2016-01-27 小米科技有限责任公司 Access request processing method and device
CN105939326B (en) * 2016-01-18 2020-12-04 杭州迪普科技股份有限公司 Method and device for processing message
CN105939326A (en) * 2016-01-18 2016-09-14 杭州迪普科技有限公司 Message processing method and device
CN105681353B (en) * 2016-03-22 2019-06-11 浙江宇视科技有限公司 Defend the method and device of port scan invasion
CN105681353A (en) * 2016-03-22 2016-06-15 浙江宇视科技有限公司 Method and device of defending port scanning invasion
CN106101059A (en) * 2016-05-23 2016-11-09 微梦创科网络科技(中国)有限公司 A kind of web-page requests processing method and processing device
CN106101059B (en) * 2016-05-23 2019-05-17 微梦创科网络科技(中国)有限公司 A kind of web-page requests processing method and processing device
CN108694074A (en) * 2017-04-07 2018-10-23 腾讯科技(深圳)有限公司 A kind of method and server obtaining count information
CN107704761B (en) * 2017-09-27 2020-09-01 北京星选科技有限公司 Data processing method and device, electronic equipment and storage medium
CN107704761A (en) * 2017-09-27 2018-02-16 北京小度信息科技有限公司 Data processing method, device, electronic equipment and storage medium
CN109756528B (en) * 2017-11-01 2022-03-11 广州腾讯科技有限公司 Frequency control method and device, equipment, storage medium and server
CN109756528A (en) * 2017-11-01 2019-05-14 广州腾讯科技有限公司 Control method for frequency and device, equipment, storage medium, server
CN108134803B (en) * 2018-01-29 2021-02-26 杭州迪普科技股份有限公司 URL attack protection method and device
CN108134803A (en) * 2018-01-29 2018-06-08 杭州迪普科技股份有限公司 A kind of URL attack guarding methods and device
CN108874948A (en) * 2018-06-05 2018-11-23 中国农业银行股份有限公司 A kind of site resource access method and device
CN108874948B (en) * 2018-06-05 2021-04-02 中国农业银行股份有限公司 Website resource access method and device
CN108833450B (en) * 2018-08-22 2020-07-10 网宿科技股份有限公司 Method and device for preventing server from being attacked
CN108833450A (en) * 2018-08-22 2018-11-16 网宿科技股份有限公司 A kind of realization server anti-attack method and device
WO2020037781A1 (en) * 2018-08-22 2020-02-27 网宿科技股份有限公司 Anti-attack method and device for server
CN109275145A (en) * 2018-09-21 2019-01-25 腾讯科技(深圳)有限公司 Equipment behavior detection and barrier processing method, medium and electronic equipment
CN111294412A (en) * 2018-12-06 2020-06-16 贵州白山云科技股份有限公司 Processing method and device for exception of content distribution network node server
CN111294412B (en) * 2018-12-06 2022-09-23 贵州白山云科技股份有限公司 Processing method and device for exception of content distribution network node server
CN109639674A (en) * 2018-12-11 2019-04-16 广州猎萌网络科技有限公司 A kind of access safety control method
CN111355626A (en) * 2018-12-24 2020-06-30 中移(杭州)信息技术有限公司 Request processing method and device
CN111585914A (en) * 2019-02-15 2020-08-25 阿里巴巴集团控股有限公司 Service current limiting method and device and electronic equipment
CN111585914B (en) * 2019-02-15 2024-03-22 阿里巴巴集团控股有限公司 Service current limiting method and device and electronic equipment
CN110336881A (en) * 2019-07-10 2019-10-15 北京三快在线科技有限公司 The method and apparatus for executing business processing request
CN110336881B (en) * 2019-07-10 2020-11-20 北京三快在线科技有限公司 Method and device for executing service processing request
CN112839008A (en) * 2019-11-22 2021-05-25 北京沃东天骏信息技术有限公司 Access monitoring method, device and system
CN112839008B (en) * 2019-11-22 2024-02-06 北京沃东天骏信息技术有限公司 Access monitoring method, device and system

Also Published As

Publication number Publication date
CN102769549B (en) 2016-02-17

Similar Documents

Publication Publication Date Title
CN102769549A (en) Network security monitoring method and device
EP2563062B1 (en) Long connection management apparatus and link resource management method for long connection communication
US20190222603A1 (en) Method and apparatus for network forensics compression and storage
US8938534B2 (en) Automatic provisioning of new users of interest for capture on a communication network
CN102999716B (en) virtual machine monitoring system and method
CN106972985B (en) Method for accelerating data processing and forwarding of DPI (deep packet inspection) equipment and DPI equipment
CN108337652B (en) Method and device for detecting flow fraud
CN108259425A (en) The determining method, apparatus and server of query-attack
CN112016030B (en) Message pushing method, device, server and computer storage medium
CN104253714A (en) Monitoring method, system, browser and server
CN108900374A (en) A kind of data processing method and device applied to DPI equipment
CN110944016B (en) DDoS attack detection method, device, network equipment and storage medium
CN114268957B (en) Abnormal business data processing method, device, server and storage medium
CN109561051A (en) Content distributing network safety detection method and system
CN106790299B (en) Wireless attack defense method and device applied to wireless Access Point (AP)
CN111065061A (en) Short message request sending system and method based on multiple channels and storage medium
CN108924159B (en) Verification method and device of message feature recognition library
US20170149821A1 (en) Method And System For Protection From DDoS Attack For CDN Server Group
CN107959696A (en) A kind of daily record bill processing method and system
CN109600395A (en) A kind of device and implementation method of terminal network access control system
CN115801305B (en) Network attack detection and identification method and related equipment
CN111901199A (en) Mass data-based quick early warning matching implementation method
CN106254375B (en) A kind of recognition methods of hotspot equipment and device
CN109495544A (en) A kind of message data treating method and apparatus and computer equipment
CN115333791A (en) Cloud-based vehicle safety protection method and related equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211223

Address after: Room 19F, Kungang science and technology building, 777 Huancheng South Road, Xishan District, Kunming City, Yunnan Province, 650000

Patentee after: Yunnan Tengyun Information Industry Co.,Ltd.

Address before: 2 East 403 room, SEG science and technology garden, Futian District, Guangdong, Shenzhen 518000, China

Patentee before: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd.

TR01 Transfer of patent right