CN103944783B - Stream recognition method based on posteriority feature - Google Patents

Stream recognition method based on posteriority feature Download PDF

Info

Publication number
CN103944783B
CN103944783B CN201410165425.8A CN201410165425A CN103944783B CN 103944783 B CN103944783 B CN 103944783B CN 201410165425 A CN201410165425 A CN 201410165425A CN 103944783 B CN103944783 B CN 103944783B
Authority
CN
China
Prior art keywords
packet
posteriority
strategy
stream
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410165425.8A
Other languages
Chinese (zh)
Other versions
CN103944783A (en
Inventor
王雨
张风雨
赵靓
申娟
李玉峰
姜鲲鹏
朱圣平
周锟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201410165425.8A priority Critical patent/CN103944783B/en
Publication of CN103944783A publication Critical patent/CN103944783A/en
Application granted granted Critical
Publication of CN103944783B publication Critical patent/CN103944783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of stream recognition method based on posteriority feature, contain the following steps:1:Posteriority strategy is set;2:Derivation strategy and ageing time T are setr;3:Build and derive from flow table;4:Build backtracking data pool;5:The matching of posteriority strategy is carried out to packet;6:The stream characteristic information contained by the packet of hit posteriority strategy is extracted, the list item for deriving from flow table is set up, time stamp T when complete stream characteristic information occurs with matching is stored in the table entrym;7:The packet write-in backtracking data pool of entrance is carried out into delay process, the packet after time delay is read and is extracted stream characteristic information, flow table is derived from the hash values retrieval according to the stream characteristic information, and records current time for TnIf stream characteristic information is matched with the stream characteristic information of the packet after time delay in deriving from flow table, and meets Tn‑Tm<Tr, then it is hit packet to mark current packet;The present invention realizes that simple, reliability is high.

Description

Stream recognition method based on posteriority feature
(1), technical field:The present invention relates to a kind of stream recognition method, more particularly to a kind of stream based on posteriority feature Recognition methods.
(2), background technology:Realized to the classification treatment of different business stream existing using Business Stream identification and sorting technique Having in the network equipment has very universal application.In current network device, stream identification in real time is equal with the realization of sorting technique Carried out based on specific priori strategy, i.e. after strategy matching occurs, extract traffic characteristic, then subsequent flow is processed.
The treatment logic of this priori strategy, when needing to extract complete flow data, before occurring for strategy matching Packet cannot carry out effective identification and classification in stream through reaching.So as to complete flow data or cannot be to complete cannot be obtained Flow data take action.
(3), the content of the invention:
The technical problem to be solved in the present invention is:A kind of stream recognition method based on posteriority feature is provided, the method can be real Now the complete message packet to data flow carries out backtracking process, and realizes that simple, reliability is high.
Technical scheme:
A kind of stream recognition method based on posteriority feature, contains the following steps:
Step 1:Posteriority strategy is set;
Step 2:Derivation strategy and ageing time T are setr, ageing time TrThe effective acting time of correspondence derivation strategy;
Step 3:Build and derive from flow table;
Step 4:Build backtracking data pool;
Step 5:Packet to entering identifying system carries out the matching of posteriority strategy, if a packet P Match hit, then show that data flow now meets posteriority policy condition, marks and export all packets of the data flow;
Step 6:The stream characteristic information contained by the packet of hit posteriority strategy is extracted, convection current characteristic information is carried out Hash computings, are set to hash values search key and set up the list item for deriving from flow table, complete stream are stored in the table entry special Time stamp T when reference ceases and matching occursm, flow table is derived from into list item write-in;
Step 7:The packet write-in backtracking data pool of identifying system will be entered, entered in the memory of backtracking data pool A length of T during rowdDelay process, be then read out the packet P after time delayd, extract the packet P after time delaydStream feature Flow table is derived from information, the hash values retrieval according to the stream characteristic information, and records current time for TnIf deriving from stream in flow table Characteristic information is matched with the stream characteristic information of the packet after time delay, then compare time stamp TmIf meeting Tn-Tm<Tr, then mark The current packet of note is hit packet.
Posteriority strategy has following feature:A moment in data flow durations, a packet and the posteriority plan During the characteristic matching omited, the treatment action request after the match is successful is that the packet reached before the data flow is recalled;
Derivation strategy is extracted and derived from by the packet of hit posteriority strategy, and derivation strategy correspondence one is only Any packet in one data flow and data flow;
Contain N number of derivation strategy in derivation flow table, N is the natural number more than or equal to 1, derive from the index entry of flow table to derive from The hash values of characteristic information are flowed, the generation time of the complete characterization information containing derivation stream and derivation strategy in flow table is derived from;
Backtracking data pool stores and reads packet respectively using dual-memory ping-pong.
All packets in step 5 contain the packet that match hit advances into identifying system.
Stream characteristic information in step 6 contains five-tuple.
Duration T in step 7dThe average duration of designed capacity, data flow according to identifying system, data entry rate are big Small these indexs are dynamically determined, or are appointed as fixed value, the fixed value less than identifying system designed capacity can bear when It is long.Delay process is to realize posterior key means, it is ensured that generate derivation strategy in advance before packet arrival.
To solve hash collision problems, hash barrels of depth can be set and is more than 2, when there is conflict to produce, by relatively more different The time stamp T of list itemmTo determine to cover list item earlier.
A kind of flow identification system based on posteriority feature, the system based on FPGA/CAM/SRAM/DDR-II realize, wherein CAM is the abbreviation of Content Addressable Memory.The system includes:
Prescreening engine:The module uses the logic realization of tabling look-up based on CAM, for being flowed into specific according to known conditions Row prescreening, is lowered into the data traffic of posteriority strategy flow identification system, so that for system provides longer specific duration Td
Posteriority strategy matching engine:The module using based on CAM logic realization of tabling look-up, for carry out posteriority strategy Match somebody with somebody;
Derive from flow table maintenance module:The module is used for the maintenance of the derivation flow table item generated after posteriority strategy matching, and will Flow table item write-in SRAM is stored;
Backtracking data pool module:The mode that the module is based on double DDR-II storages/reading switchings is realized to packet Time delay, for system provides backdating capability;
Derive from flow table search engine:The module is used to carry out the packet after time delay flow table item matching, and according to It is marked with result team message.
Beneficial effects of the present invention:
1st, the present invention can carry out posteriority strategy matching in any packet of data flow, and posteriority strategy matching occurs The characteristic information of stream, and the characteristic action that will be extracted are extracted afterwards in packet in it for the previous period stream of interior arrival, Realize carrying out backtracking process to the packet of the complete message of data flow, the backtracking process can utilize posteriority strategy to reaching before Message is identified classification, largely ensures the integrated degree of hit stream.
2nd, the present invention realizes simple, it is not necessary to large-scale External memory equipment, and institute is functional can be real in single circuit plate It is existing, therefore, reliability is high.
3rd, flexibility of the present invention is good, by the parameter, Ke Yidong such as dynamic adjustment prescreening strategy and tactful ageing time The tenability of time is recalled in state adjustment convection current.
(4), illustrate:
Fig. 1 is the structural representation of the flow identification system based on posteriority feature;
Fig. 2 is the keyword extraction schematic diagram of posteriority strategy matching in the flow identification system based on posteriority feature;
Fig. 3 is the contents in table schematic diagram of posteriority strategy keyword in the flow identification system based on posteriority feature;
Fig. 4 is the flow table content schematic diagram of posteriority strategy matching engine generation in the flow identification system based on posteriority feature;
Fig. 5 is that the backtracking data pool in the flow identification system based on posteriority feature using dual-memory PPD pingpong delay structure shows It is intended to.
(5), specific embodiment:
Stream recognition method based on posteriority feature contains the following steps:
Step 1:Posteriority strategy is set;
Step 2:Derivation strategy and ageing time T are setr, ageing time TrThe effective acting time of correspondence derivation strategy;
Step 3:Build and derive from flow table;
Step 4:Build backtracking data pool;
Step 5:Packet to entering identifying system carries out the matching of posteriority strategy, if a packet P Match hit, then show that data flow now meets posteriority policy condition, marks and export all packets of the data flow;
Step 6:The stream characteristic information contained by the packet of hit posteriority strategy is extracted, convection current characteristic information is carried out Hash computings, are set to hash values search key and set up the list item for deriving from flow table, complete stream are stored in the table entry special Time stamp T when reference ceases and matching occursm, flow table is derived from into list item write-in;
Step 7:The packet write-in backtracking data pool of identifying system will be entered, entered in the memory of backtracking data pool A length of T during rowdDelay process, be then read out the packet P after time delayd, extract the packet P after time delaydStream feature Flow table is derived from information, the hash values retrieval according to the stream characteristic information, and records current time for TnIf deriving from stream in flow table Characteristic information is matched with the stream characteristic information of the packet after time delay, then compare time stamp TmIf meeting Tn-Tm<Tr, then mark The current packet of note is hit packet.
Posteriority strategy has following feature:A moment in data flow durations, a packet and the posteriority plan During the characteristic matching omited, the treatment action request after the match is successful is that the packet reached before the data flow is recalled;
Derivation strategy is extracted and derived from by the packet of hit posteriority strategy, and derivation strategy correspondence one is only Any packet in one data flow and data flow;
Contain N number of derivation strategy in derivation flow table, N is the natural number more than or equal to 1, derive from the index entry of flow table to derive from The hash values of characteristic information are flowed, the generation time of the complete characterization information containing derivation stream and derivation strategy in flow table is derived from;
Backtracking data pool stores and reads packet respectively using dual-memory ping-pong.
All packets in step 5 contain the packet that match hit advances into identifying system.
Stream characteristic information in step 6 contains five-tuple.
Duration T in step 7dThe average duration of designed capacity, data flow according to identifying system, data entry rate are big Small these indexs are dynamically determined, or are appointed as fixed value, the fixed value less than identifying system designed capacity can bear when It is long.Delay process is to realize posterior key means, it is ensured that generate derivation strategy in advance before packet arrival.
To solve hash collision problems, hash barrels of depth can be set and is more than 2, when there is conflict to produce, by relatively more different The time stamp T of list itemmTo determine to cover list item earlier.
A kind of flow identification system based on posteriority feature, the system based on FPGA/CAM/SRAM/DDR-II realize, wherein CAM is the abbreviation of Content Addressable Memory.The system includes:
Prescreening engine:The module uses the logic realization of tabling look-up based on CAM, for being flowed into specific according to known conditions Row prescreening, is lowered into the data traffic of posteriority strategy flow identification system, so that for system provides longer specific duration Td
Posteriority strategy matching engine:The module using based on CAM logic realization of tabling look-up, for carry out posteriority strategy Match somebody with somebody;
Derive from flow table maintenance module:The module is used for the maintenance of the derivation flow table item generated after posteriority strategy matching, and will Flow table item write-in SRAM is stored;
Backtracking data pool module:The mode that the module is based on double DDR-II storages/reading switchings is realized to packet Time delay, for system provides backdating capability;
Derive from flow table search engine:The module is used to carry out the packet after time delay flow table item matching, and according to It is marked with result team message.
For a better understanding of the present invention, with reference to the flow identification system based on posteriority feature proposed by the invention, Technical scheme is illustrated.
As shown in figure 1, the message into system first passes around prescreening engine and is filtered.The purpose of prescreening is to reduce Into the data traffic size of system, so as to provide the longer backtracking time using limited memory.Prescreening can pass through The stream feature critical word being stored in CAM is carried out, it is also possible to by certain interface/branch road or symbol in directly specified initial data The data of certain feature are closed to carry out.
The data that Pre-screening module is sent out are respectively fed to message delay module and enter line delay, send into posteriority characteristic matching engine Matched.
Posteriority characteristic matching engine completes the posteriority strategy matching of data flow.
Posteriority strategy is typically the sensitive words in data flow text, occurs more in the form of character string.The system uses CAM Chip realizes the lookup of sensitive words in packet.As shown in Fig. 2 the sensitive word width for setting support is CL bytes, list item is wide It is PL bytes to spend, then from the start of text of data message, interval PL-CL+1 bytes carry out lookup key and extract and deliver to CAM Chip is searched.For a sensitive words, according to the deviation post that it is likely to occur in lookup key, in CAM chips In should derive PL-CL band mask list items.As shown in Figure 3.
The stream characteristic information of the packet for the treatment of of currently tabling look-up is carried out HASH by posteriority characteristic matching engine.Work as inspection Measure in message after the sensitive words containing posteriority strategy, CAM chips return hit indicate and hit tactful ID.Posteriority feature Matching engine is indicated according to hit, and flow table is read by index of HASH values, and the structure of flow table is as shown in Figure 4.Have in flow table Whole stream characteristic information, and timestamp during last time match hit.If HASH barrels of depth is if 2, from two tables of flow table An empty list item and the stream characteristic information and hit time write-in list item that are grouped notebook data are searched out in;If without empty table , then choose the list item generated at first in two list items and covered.Then carry out flow table renewal.
The complete paired data packet of message delay module enters the function of line delay.The system uses dual-memory table tennis side Formula stores respectively/read message.As shown in figure 5, setting data message is injected into single memory as the full time is t1, system can connect The maximum message segment output time delay received is t2, then when timing to Min (t1,t2) when, switching is written and read to memory.Assuming that data When full gear is injected, single memory most multipotency storage T0Time, and t2>T0, then obviously, Min (t1,t2)>T0.That is, system is minimum T can be provided0The time delay of time.In fact, due to the effect of front end prescreening engine, the delay duration that system can be provided is remote More than T0.The delay duration that system can be provided corresponds to the backtracking tenability to packet.
Flow table search engine is responsible for carrying out the packet after time delay the matching based on stream based on flow table.After time delay Packet is calculated according to consistent HASH algorithms are the same as those described above, then in the reading flow table according to HASH, and and list item The stream characteristic information of middle storage carries out precise alignment.If consistent, the generation time T of correspondence list item is taken outm, it is with current time Tn, derivation strategy ageing time is TrIf then meeting Tn–Tm<Tr, that is, judge that flow table is hit in the packet, and carry out corresponding Exported after mark.

Claims (5)

1. a kind of stream recognition method based on posteriority feature, it is characterized in that:Contain the following steps:
Step 1:Posteriority strategy is set, and the posteriority strategy has following feature:A moment in data flow durations, one During the characteristic matching of packet and the posteriority strategy, the treatment action request after the match is successful is to being reached before the data flow Packet recalled;
Step 2:Derivation strategy and ageing time T are setr, ageing time TrThe effective acting time of correspondence derivation strategy;
Step 3:Build and derive from flow table;
Step 4:Build backtracking data pool;
Step 5:Packet to entering carries out the matching of posteriority strategy, if a packet match hit, then table Bright data flow now meets posteriority policy condition, marks and export all packets of the data flow;
Step 6:The stream characteristic information contained by the packet of hit posteriority strategy is extracted, convection current characteristic information carries out hash fortune Calculate, hash values are set to search key and the list item for deriving from flow table is set up, complete stream characteristic information is stored in the table entry Time stamp T when occurring with matchingm, flow table is derived from into list item write-in;
Step 7:The packet write-in backtracking data pool that will enter, a length of T when being carried out in the memory for recalling data poold's Delay process, is then read out the packet after time delay, extracts the stream characteristic information of the packet after time delay, special according to the stream Flow table is derived from the hash values retrieval of reference breath, and records current time for TnIf deriving from stream characteristic information and time delay in flow table The stream characteristic information matching of packet afterwards, then compare time stamp TmIf meeting Tn-Tm<Tr, then current message point is marked Group is hit packet.
2. the stream recognition method based on posteriority feature according to claim 1, it is characterized in that:The derivation strategy is by ordering What the packet of middle posteriority strategy was extracted and derived from, in derivation strategy one unique data flow of correspondence and data flow Any packet;
Contain N number of derivation strategy in the derivation flow table, N is the natural number more than or equal to 1, derive from the index entry of flow table to derive from The hash values of characteristic information are flowed, the generation time of the complete characterization information containing derivation stream and derivation strategy in flow table is derived from;
The backtracking data pool stores and reads packet respectively using dual-memory ping-pong.
3. the stream recognition method based on posteriority feature according to claim 1, it is characterized in that:It is all in the step 5 Packet contains the packet that match hit is advanced into.
4. the stream recognition method based on posteriority feature according to claim 1, it is characterized in that:Stream in the step 6 is special Reference breath contains five-tuple.
5. the stream recognition method based on posteriority feature according to claim 1, it is characterized in that:Duration T in the step 7d It is dynamically determined, or is appointed as according to identification designed capacity, the average duration of data flow, data entry rate size these index Fixed value, the fixed value is less than the duration that identification designed capacity can bear.
CN201410165425.8A 2014-04-23 2014-04-23 Stream recognition method based on posteriority feature Active CN103944783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410165425.8A CN103944783B (en) 2014-04-23 2014-04-23 Stream recognition method based on posteriority feature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410165425.8A CN103944783B (en) 2014-04-23 2014-04-23 Stream recognition method based on posteriority feature

Publications (2)

Publication Number Publication Date
CN103944783A CN103944783A (en) 2014-07-23
CN103944783B true CN103944783B (en) 2017-06-09

Family

ID=51192276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410165425.8A Active CN103944783B (en) 2014-04-23 2014-04-23 Stream recognition method based on posteriority feature

Country Status (1)

Country Link
CN (1) CN103944783B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301812B (en) * 2021-12-29 2024-06-25 北京物芯科技有限责任公司 Method, device, equipment and storage medium for monitoring message processing result

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459554A (en) * 2008-12-30 2009-06-17 成都市华为赛门铁克科技有限公司 Method and apparatus for data stream detection
CN102959543A (en) * 2010-05-04 2013-03-06 沙扎姆娱乐有限公司 Methods and systems for processing sample of media stream

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380506B2 (en) * 2006-01-27 2013-02-19 Georgia Tech Research Corporation Automatic pattern recognition using category dependent feature selection
US8725666B2 (en) * 2010-02-26 2014-05-13 Lawrence Livermore National Security, Llc. Information extraction system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459554A (en) * 2008-12-30 2009-06-17 成都市华为赛门铁克科技有限公司 Method and apparatus for data stream detection
CN102959543A (en) * 2010-05-04 2013-03-06 沙扎姆娱乐有限公司 Methods and systems for processing sample of media stream

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
IPTV媒体流识别技术的研究与实现;江军等;《通信市场》;20120831;全文 *
一种基于SVM后验概率的网络流量识别方法;刘三民等;《计算机工程》;20120930;第38卷(第17期);全文 *

Also Published As

Publication number Publication date
CN103944783A (en) 2014-07-23

Similar Documents

Publication Publication Date Title
Xue et al. Detecting fake news by exploring the consistency of multimodal data
US20220368703A1 (en) Method and device for detecting security based on machine learning in combination with rule matching
SG11201909887RA (en) Methods and apparatuses for recognizing video and training, electronic device and medium
CN105791128B (en) A kind of IP packet receiving handling method and device
CN107070852A (en) Network attack detecting method and device
CN105337991B (en) A kind of integrated message flow is searched and update method
CN108365960B (en) Random number providing method and device
CN105824825B (en) A kind of sensitive data recognition methods and device
KR20100116458A (en) Signature searching method according to signature location in packet
CN107657706A (en) A kind of gate control system based on RFID and recognition of face and combine recognition methods
CN106709853A (en) Image retrieval method and system
CN104376108B (en) A kind of destructuring natural language information abstracting method based on the semantic marks of 6W
CN103905452A (en) Credible network attack filter device and method
CN107895036A (en) One kind is based on the online analysis and processing method that cheats at one&#39;s exam of safety encryption
CN106815204A (en) The segmentation method and device of judgement document
CN103944783B (en) Stream recognition method based on posteriority feature
CN104021179B (en) The Fast Recognition Algorithm of similarity data under a kind of large data sets
CN107679152A (en) Data processing method based on multi-layer information joint index
CN110956123A (en) Rich media content auditing method and device, server and storage medium
CN105119876B (en) A kind of detection method and system of the domain name automatically generated
CN103823868B (en) Event recognition method and event relation extraction method oriented to on-line encyclopedia
CN108055227B (en) WAF unknown attack defense method based on site self-learning
CN102984242A (en) Automatic identification method and device of application protocols
US9398040B2 (en) Intrusion detection system false positive detection apparatus and method
CN103856370A (en) Application flow recognition method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant