CN104104675A - Internet control message protocol camouflage capture and analysis technology - Google Patents

Internet control message protocol camouflage capture and analysis technology Download PDF

Info

Publication number
CN104104675A
CN104104675A CN201410312275.9A CN201410312275A CN104104675A CN 104104675 A CN104104675 A CN 104104675A CN 201410312275 A CN201410312275 A CN 201410312275A CN 104104675 A CN104104675 A CN 104104675A
Authority
CN
China
Prior art keywords
packet
icmp
camouflage
protocol
data packets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410312275.9A
Other languages
Chinese (zh)
Inventor
赖洪昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410312275.9A priority Critical patent/CN104104675A/en
Publication of CN104104675A publication Critical patent/CN104104675A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to an Internet control message protocol camouflage capture and analysis technology. The technology comprises the following operation steps: (1) data packet decoding and filtering, (2) data packet recombination, (3) ICMP scanning attack detection, and (4) protocol camouflage detection. According to the technology, IP data packets with the protocol type of ICMP are captured via decoding and filtering network data packets, and the complete IP data packets are obtained via recombination of the data packets. The complete IP data packets are filtered by an ICMP scanning attack detection module and then transmitted to a protocol camouflage detection module which analyzes the data packets according to different types, codes and contents in ICMP protocol heads so that a result that whether the data packets are camouflage protocol data packets is obtained. Compared with technologies in the prior art, the technology is closely combined with practical application situations and easy to realize so that large data can be detected in a high-speed and high-efficiency way, the hidden ICMP protocol data can be timely discovered and the requirement for practical application can be met.

Description

Internet Control Message Protocol camouflage is caught and analytical technology
Technical field
The present invention relates to Internet Control Message Protocol camouflage and catch and analytical technology, belong to Computer Applied Technology field.
Background technology
Along with develop rapidly and the expansion of computer networking technology, the particularly fast development of Internet in recent years, increasing people have felt the importance of network security.Simultaneously in the world, for the intrusion behavior of important information resource and network infrastructure and the quantity of attempt intrusion behavior still in constant increase.In addition, prism door event, allows complexity, the threat hidden and tool destructive power that people face for network security have understanding more clearly.
Along with lost network attack and invasion row are constantly exposed the impact causing of national security, economy, social life, effectively the information security communication technology also becomes very important problem.So a kind of novel Cyberthreat recognition technology is arisen at the historic moment, it has realized analysis and the identification of agreement camouflage on traditional network invasion monitoring basis, and it can find to be hidden in the network intrusions behavior of the proper communication agreement that disguises oneself as in mass data.So far,, in order better to find hidden Internet Control Message Protocol Camouflaged data, we have invented " Internet Control Message Protocol camouflage is caught and analytical technology ".
Summary of the invention
In order effectively to find to be hidden in the ICMP agreement camouflage intrusion behavior in mass data, lower loss and impact that concealed intrusion behavior brings.The embodiment of the present invention provides Internet Control Message Protocol camouflage to catch and analytical technology.Improve energetically described in secret communication behavior ability of discovery technical scheme with this as follows:
1.Internet Internet Control Message Protocol (ICMP) camouflage is caught and analytical technology, its feature is mainly manifested in packet restructuring and pretends with agreement the core process of analyzing, ICMP packet can be caught and be obtained by bottom packet capturing technology: (1) filters out IP protocol data bag from network packet, whether analyzing IP packet is packet segment, if the packet of burst, transfer to so the processing of packet recombination module, not the packet of burst, transfer to the processing of agreement camouflage analysis module; (2) whether the analysis of packet recombination module is current is last IP fragmentation packet, if current all IP fragmentation packets are recombinated, so the complete IP bag after reconfiguring is transferred to the processing of agreement camouflage analysis module; (3) decoding ICMP protocol header part, analyzes ICMP request or acknowledgement type, ICMP command code, data packet length, draws whether be the ICMP packet of camouflage; Its concrete operation step is as follows:
(1) Packet Filtering
1. filter Ethernet data bag: from nautical mile packet, filter out IP packet;
2. whether burst IP bag judges: detect whether current IP packet is fragment packets, if fragment packets is transferred to the processing of packet recombination module; If not fragment packets, transfer to the processing of agreement camouflage detection module;
(2) packet recombination module processing
Whether 1. search is new packet grouping: by source IP, come source port, object IP, destination interface and do HASH computing and draw a HASH value, whether search in packet grouping chained list by this HASH value is new grouping, if, create a new grouping and add grouping chained list to, if not, be so just inserted in the burst chained list of existing grouping according to the cheap amount order in burst flag bit;
Whether finish receiving: check whether current IP packet is last fragment packets, and if so, that just represents that current group has received all fragment packets, can carry out the restructuring of packet if 2. detecting packet data package;
3. packet restructuring: all fragment packets of current group are synthesized to a new IP packet according to the side-play amount der group in burst flag bit;
(3) camouflage of ICMP agreement is analyzed
1. the ICMP packet of decoding: according to ICMP protocol header structure decoding current I CMP packet, obtain ICMP type, code, verification and and different content dissimilar and that code is corresponding,
2. inspect-type type corresponding different code and the content different from code corresponding relation: ICMP; If type is not mated with code, it is exactly the packet of camouflage so;
3. scope of examination length: check whether PING order length exceedes 64 bytes, error message and whether be less than whether 8 byte errors headings, time inquiring message are less than 20 byte headings, whether mask query message is less than 12 byte headings, if so, it is exactly the packet of camouflage;
Below that technology of the present invention is further described:
Described packet restructuring, refer to the MTU (MTU) that exceedes Ethernet due to data packet length, IP layer will carry out Fragmentation to packet so, make the length of every a slice all be less than or equal to MTU, and packet restructuring is exactly by the IP packet of burst arrival is carried out to buffer memory, by the time after gathering all packet segments, it is reconfigured, generate a new complete packet, because its flow is conventionally larger, the impact of recombinating on performance in order to reduce packet, therefore the technology of the present invention has adopted memory pool reuse technology, the way that HASH table fast finding technology is combined with buffer memory linked list order memory technology.Organizational form when IP fragmentation and reassembly is stored by a hash table, and the grouping chained list of different headings is stored in hash table, does not have a grouping storage of linked list to have the burst chained list of identical heading.
Described ICMP agreement camouflage is analyzed:
1) to IP decoded packet data, obtain type in ICMP protocol header, code, verification and and content-data, due to different types, the corresponding different content of code, whether type of detection mates with code the ICMP packet that can find that part is pretended.
2) check ICMP data packet length.Whether by whether dissimilar, code check content-length are met to normal behaviour uninterrupted, detecting is agreement Camouflaged data.Such as normal type 0, code 0 represent the echo order of PING, its normal size can not exceed 64 bytes, and if there is the PING packet that exceedes 64 bytes, it may be just that the PING program of pretending is informed user so.
The present invention compares with existing Intrusion Detection, has following outstanding feature and remarkable advantage:
(1), for traditional Intrusion Detection, the protocol contents to packet and behavior have been carried out analyzing targetedly, can effectively detect hidden intrusion behavior.
(2) adopt various protocols camouflage test point to combine, greatly strengthened the practicality of function.
Brief description of the drawings:
Fig. 1 is the decoded packet data flow chart of the technology of the present invention.
Fig. 2 is the IP packet restructuring flow chart of the technology of the present invention.
Fig. 3 is the ICMP agreement camouflage overhaul flow chart of the technology of the present invention.
Fig. 4 is organization chart when IP packet is recombinated in the technology of the present invention.
Concrete practice mode:
Embodiment:
Technical scheme for a better understanding of the present invention, existing chart in by reference to the accompanying drawings just concrete implement to be explained in further detail as follows:
The camouflage of operation accompanying drawing Internet Control Message Protocol is caught with the concrete operation step of analytical technology as follows:
(1) decoded packet data---(Packet Filtering operating procedure, as shown in Figure 1)
1. the ether bag of decoding: filter Ethernet data bag according to data link.
2. decoded ip packet: according to network type decoded ip packet, ARP packet, other packet.
3. verification and inspection: calculate IP verification and whether normal.
4. decoding network layer data bag: according to protocol type decoding tcp data bag, UDP message bag, ICMP packet
(2) packet restructuring---(packet reorganization operation step, as shown in Figure 2)
1. judge whether fragment packets: detect IP fragmentation standard for whether being fragment packets, and cheaply whether amount is greater than zero.
2. judge that whether IP packet is overtime: when transmission data block, detect current IP packet and whether be less than minimum life span.
3. search heading: in existing grouping hash table, search and whether have congenial heading grouping, do not find and just create new grouping, be inserted into hash table, be just inserted in burst chained list by side-play amount if existed.Hash table structure as shown in Figure 4.
4. determine whether last burst: whether detect current packet segment is last fragment data of identical heading, if last burst just reconfigures current burst chained list, generate a new complete IP packet.
(3) agreement camouflage detects---and (agreement camouflage detects operating procedure, as shown in Figure 3)
1. the ICMP protocol header of decoding: decode ICMP type, code, verification and, data content field value.
2. whether inspect-type mates with code: check whether ICMP type mates with code value, the error message code value that is 3 such as type is less than 15, type is that 0 query message is PING packet etc., type is 13,14 time inquiring message, code value is 0, and content-length is greater than 20 bytes; Type be 17,18 mask query message code value be 0 and content-length be greater than 12 bytes.

Claims (1)

1.Internet Internet Control Message Protocol (ICMP) camouflage is caught and analytical technology, its feature is mainly manifested in packet restructuring and pretends with agreement the core process of analyzing, ICMP packet can be caught and be obtained by bottom packet capturing technology: (1) filters out IP protocol data bag from network packet, whether analyzing IP packet is packet segment, if the packet of burst, transfer to so the processing of packet recombination module, not the packet of burst, transfer to the processing of agreement camouflage analysis module; (2) whether the analysis of packet recombination module is current is last IP fragmentation packet, if current all IP fragmentation packets are recombinated, so the complete IP bag after reconfiguring is transferred to the processing of agreement camouflage analysis module; (3) decoding ICMP protocol header part, analyzes ICMP request or acknowledgement type, ICMP command code, data packet length, draws whether be the ICMP packet of camouflage; Its concrete operation step is as follows:
(1) Packet Filtering
1. filter Ethernet data bag: from nautical mile packet, filter out IP packet;
2. whether burst IP bag judges: detect whether current IP packet is fragment packets, if fragment packets is transferred to the processing of packet recombination module: if not fragment packets, transfer to the processing of agreement camouflage detection module;
(2) packet recombination module processing
Whether 1. search is new packet grouping: by source IP, come source port, object IP, destination interface and do HASH computing and draw a HASH value, whether search in packet grouping chained list by this HASH value is new grouping, if, create a new grouping and add grouping chained list to, if not, be so just inserted in the burst chained list of existing grouping according to the cheap amount order in burst flag bit;
Whether finish receiving: check whether current IP packet is last fragment packets, and if so, that just represents that current group has received all fragment packets, can carry out the restructuring of packet if 2. detecting packet data package;
3. packet restructuring: all fragment packets of current group are synthesized to a new IP packet according to the side-play amount der group in burst flag bit;
(3) camouflage of ICMP agreement is analyzed
1. the ICMP packet of decoding: according to ICMP protocol header structure decoding current I CMP packet, obtain ICMP type, code, verification and and different content dissimilar and that code is corresponding;
2. inspect-type type corresponding different code and the content different from code corresponding relation: ICMP; If type is not mated with code, it is exactly the packet of camouflage so;
3. scope of examination length: check whether PING order length exceedes 64 bytes, error message and whether be less than whether 8 byte errors headings, time inquiring message are less than 20 byte headings, whether mask query message is less than 12 byte headings, if so, it is exactly the packet of camouflage.
CN201410312275.9A 2014-06-24 2014-06-24 Internet control message protocol camouflage capture and analysis technology Pending CN104104675A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410312275.9A CN104104675A (en) 2014-06-24 2014-06-24 Internet control message protocol camouflage capture and analysis technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410312275.9A CN104104675A (en) 2014-06-24 2014-06-24 Internet control message protocol camouflage capture and analysis technology

Publications (1)

Publication Number Publication Date
CN104104675A true CN104104675A (en) 2014-10-15

Family

ID=51672476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410312275.9A Pending CN104104675A (en) 2014-06-24 2014-06-24 Internet control message protocol camouflage capture and analysis technology

Country Status (1)

Country Link
CN (1) CN104104675A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324210A (en) * 2019-08-06 2019-10-11 杭州安恒信息技术股份有限公司 The detection method and device of private communication channel communication are carried out based on ICMP agreement
CN110677497A (en) * 2019-10-23 2020-01-10 中国工商银行股份有限公司 Network medium distribution method and device
CN112929364A (en) * 2021-02-05 2021-06-08 上海观安信息技术股份有限公司 Data leakage detection method and system based on ICMP tunnel analysis
CN114095265A (en) * 2021-11-24 2022-02-25 中国南方电网有限责任公司超高压输电公司昆明局 ICMP hidden tunnel detection method, device and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6513122B1 (en) * 2001-06-29 2003-01-28 Networks Associates Technology, Inc. Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
CN1435977A (en) * 2002-02-01 2003-08-13 联想(北京)有限公司 Method for detecting and responding of fire wall invasion
CN101789931A (en) * 2009-12-31 2010-07-28 暨南大学 Network intrusion detection system and method based on data mining
CN103281336A (en) * 2013-06-19 2013-09-04 上海众恒信息产业股份有限公司 Network intrusion detection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6513122B1 (en) * 2001-06-29 2003-01-28 Networks Associates Technology, Inc. Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
CN1435977A (en) * 2002-02-01 2003-08-13 联想(北京)有限公司 Method for detecting and responding of fire wall invasion
CN101789931A (en) * 2009-12-31 2010-07-28 暨南大学 Network intrusion detection system and method based on data mining
CN103281336A (en) * 2013-06-19 2013-09-04 上海众恒信息产业股份有限公司 Network intrusion detection method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324210A (en) * 2019-08-06 2019-10-11 杭州安恒信息技术股份有限公司 The detection method and device of private communication channel communication are carried out based on ICMP agreement
CN110677497A (en) * 2019-10-23 2020-01-10 中国工商银行股份有限公司 Network medium distribution method and device
CN112929364A (en) * 2021-02-05 2021-06-08 上海观安信息技术股份有限公司 Data leakage detection method and system based on ICMP tunnel analysis
CN114095265A (en) * 2021-11-24 2022-02-25 中国南方电网有限责任公司超高压输电公司昆明局 ICMP hidden tunnel detection method, device and computer equipment
CN114095265B (en) * 2021-11-24 2024-04-05 中国南方电网有限责任公司超高压输电公司昆明局 ICMP hidden tunnel detection method and device and computer equipment

Similar Documents

Publication Publication Date Title
CN101656634B (en) Intrusion detection method based on IPv6 network environment
CN1330131C (en) System and method for detecting network worm in interactive mode
EP2434689B1 (en) Method and apparatus for detecting message
CN102594625B (en) White data filtering method in a kind of APT intelligent detection and analysis platform and system
EP3135018B1 (en) Policy-based payload delivery for transport protocols
CN101640666B (en) Device and method for controlling flow quantity facing to target network
CN106330584B (en) A kind of recognition methods of Business Stream and identification device
US9917783B2 (en) Method, system and non-transitory computer readable medium for profiling network traffic of a network
CN103780610A (en) Network data recovery method based on protocol characteristics
CN104104675A (en) Internet control message protocol camouflage capture and analysis technology
CN102739473A (en) Network detecting method using intelligent network card
US20080291912A1 (en) System and method for detecting file
CN107666486A (en) A kind of network data flow restoration methods and system based on message protocol feature
CN103997489A (en) Method and device for recognizing DDoS bot network communication protocol
US20170155668A1 (en) Identifying malicious communication channels in network traffic by generating data based on adaptive sampling
CN102833263A (en) Method and device for intrusion detection and intrusion protection
CN112532642A (en) Industrial control system network intrusion detection method based on improved Suricata engine
CN112532614A (en) Safety monitoring method and system for power grid terminal
CN105847250A (en) VoIP stream media multi-dimensional information steganography real time detection method
CN106789728A (en) A kind of voip traffic real-time identification method based on NetFPGA
CN103685221A (en) A network invasion detection method
CN103580956A (en) Method and device for detecting data integrity
CN103746869A (en) Data/mask and regular expression combined multistage deep packet detection method
CN114327833A (en) Efficient flow processing method based on software-defined complex rule
CN104660584A (en) Trojan virus analysis technique based on network conversation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141015