CN104270373B - A kind of Web server anonymous access flow rate testing methods based on temporal characteristics - Google Patents

A kind of Web server anonymous access flow rate testing methods based on temporal characteristics Download PDF

Info

Publication number
CN104270373B
CN104270373B CN201410535015.8A CN201410535015A CN104270373B CN 104270373 B CN104270373 B CN 104270373B CN 201410535015 A CN201410535015 A CN 201410535015A CN 104270373 B CN104270373 B CN 104270373B
Authority
CN
China
Prior art keywords
web server
temporal characteristics
access flow
alpha
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410535015.8A
Other languages
Chinese (zh)
Other versions
CN104270373A (en
Inventor
何高峰
张涛
张波
马媛媛
陈亚东
楚杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Smart Grid Research Institute of SGCC
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Global Energy Interconnection Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI, Global Energy Interconnection Research Institute filed Critical State Grid Corp of China SGCC
Priority to CN201410535015.8A priority Critical patent/CN104270373B/en
Publication of CN104270373A publication Critical patent/CN104270373A/en
Application granted granted Critical
Publication of CN104270373B publication Critical patent/CN104270373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of Web server anonymous access flow rate testing methods based on temporal characteristics, comprises the following steps:Temporal characteristics are extracted;Based on one-class support vector machines setup time characteristic model;Temporal characteristics are substituted into and detected in temporal characteristics model;Testing result is confirmed.The present invention provides a kind of Web server anonymous access flow rate testing methods based on temporal characteristics, solves test problems of the Web server to anonymous access flow, it is possible to achieve quick, the accurate detection of anonymous web access flow, improves the security of Web server.

Description

A kind of Web server anonymous access flow rate testing methods based on temporal characteristics
Technical field
The present invention relates to a kind of detection method, a kind of Web server anonymous access stream based on temporal characteristics of specific design Quantity measuring method.
Background technology
With Internet and mobile Internet fast development and widely use, network has incorporated people's daily life Every aspect.At the same time, the security and privacy problem that network service is brought is also of increased attention.To protect The privacy information of the network user is protected, researcher proposes anonymous communication concept and correlation technique is realized.
Anonymous communication technology was proposed first in 1981 by Chaum, and the technology passes through in the logical of sender and recipients One or more intermediate nodes (Mix nodes) are inserted on letter path to realize hiding for user identity and correspondence.User exists When sending data, it is first determined the address information of Mix nodes and recipient on forward-path, then using each on forward-path The public key of Mix nodes is encrypted layer by layer to data and address information, formed " Onion Loaf ", and should " Onion Loaf " send extremely turn Send out first Mix node on path.Receive after " Onion Loaf ", the Mix nodes it are decrypted operation to obtain next-hop Address, and " Onion Loaf " after decryption is sent to next-hop node, other nodes are operated until last by initial data successively It is forwarded to recipient.Then carried out during returned data by corresponding reverse order, data are back to by recipient to be directly connected Mix nodes (last Mix node i.e. on forward-path), then on path each Mix nodes utilize the private key pair of oneself Data carry out encryption layer by layer and opposite direction forwarding, and finally performing multiple decryption oprerations by user draws Content of Communication.Based on this Technology, researcher devises a variety of anonymous communication schemes such as onion routing agreement etc., and develops some realities on this basis With anonymous communication system, such as Tor, JAP.
While network user identity privacy information is protected, the abuse of anonymous communication system also gives network security and network Management brings grave danger.Such as German Government has arrested the supplier of several Tor Egress nodes in 2007 successively, and actual The supplier of these upper Tor Egress nodes is the illegal scapegoat for browsing the such network crime such as pornography.When anonymous crime When molecule utilizes Tor Network Capture child porn information, corresponding network traffics will be first sent to Tor Egress nodes, then By these Egress nodes anonymous criminal is given by related data through Tor forwardeds.IP address information according to network traffics is only capable of These Tor Egress nodes are traced, and really cybercriminal can not learn.In addition, Botnet (Botnet) has started to Come hidden command and control (C&C) server using Tor anonymous communication networks, each Bot nodes are entered by Tor and C&C servers Row communication, conceals the relevance between the true identity of C&C servers and Bot nodes so as to the detection of Botnet more Plus it is difficult.More seriously, some popular network attack instruments, are such as directed to the DoS attack instrument of Web server Torshammer, SQL injection attack tool sqlmap etc. provide config option so that attack traffic turns by Tor Anonymizing networks Hair is detected and followed the trail of so as to hide.In view of the widespread deployment of Web applications and it is important in the national economy such as electric power field Status, it is necessary to supervised to anonymous web access, prevents anonymous attack, lifts the security of Web server.And anonymous visit The detection for asking flow is to perform the premise further supervised and basis.
Current Web server passes through inquiring client terminal to the detection Main Basiss IP address information of anonymous access flow Whether IP address detects anonymous access flow, but this method has obvious limitation in disclosed anonymous node listing. Specifically, there is following three points deficiency in existing method:
If 1) client is hidden anonymous node, and its underground IP address, then Web server can not detect anonymity Flowing of access;
2) if client is double netcard, one piece of network interface card accesses anonymous communication system, and second piece of network interface card access is normal Internet, anonymous access flow is sent to Web server by second piece of network interface card, due to there was only the IP address of first piece of network interface card In disclosed anonymous node listing, and the IP address for second piece of network interface card that Web server is checked, thus can not detect Its anonymous access flow produced;
If 3) be anonymous node before client, and close its anonymous service now, but anonymous node listing fail and Shi Gengxin, then server will determine that the flowing of access of active client is anonymous access, thus there is erroneous judgement situation.
The content of the invention
In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a kind of Web server anonymity based on temporal characteristics Flowing of access detection method, solves test problems of the Web server to anonymous access flow, it is possible to achieve anonymous web access Quick, the accurate detection of flow, improves the security of Web server.
In order to realize foregoing invention purpose, the present invention is adopted the following technical scheme that:
The present invention provides a kind of Web server anonymous access flow rate testing methods based on temporal characteristics, methods described bag Include following steps:
Step 1:Temporal characteristics are extracted;
Step 2:Based on one-class support vector machines setup time characteristic model;
Step 3:Temporal characteristics are substituted into and detected in temporal characteristics model;
Step 4:Testing result is confirmed.
, GET request and POST request respective arrival time in Web server record http protocol, will in the step 1 Time interval between the GET request or POST request that continuously occur is as temporal characteristics.
The step 1 specifically includes following steps:
Step 1-1:According to IP address, for the client of each connection Web server, Web server sets up database Search index;
Step 1-2:The arrival time of GET request and POST request in Web server record http protocol, and for identical Multiple GET request or POST request, Web server only records the arrival time of first time GET request or POST request;
Step 1-3:From the GET request and POST request of record reach time series in extraction time feature.
In the step 1-1, for the client ip address of IPv4 types, Web server is according to itself operating system Byte order, 4 byte INT types are saved as by the IP address of client, and Web server calculates corresponding numerical value afterwards, and with this Numerical value as client search index;
For the client ip address of IPv6 types, Web server as character string, uses the IPv6 addresses of client BKDRHash hash functions calculate hash values, and using result of calculation as database index, while with preserving IPv6 in database Location information.
In the step 1-3, Web server is calculated according to GET request and the POST request respective arrival time of record Go out the time interval that GET request and POST request reach, and time interval is ranked up according to descending order, extract At least 20% time interval, saves as characteristic vector to be used as temporal characteristics.
In the step 2, the temporal characteristics of extraction are saved as into characteristic vector, model is carried out using one-class support vector machines Training, draws temporal characteristics model.
In the step 2, if the length of characteristic vector is l, and characteristic vector formalization representation is P={ p1,p2,…, pm,…pl, pmFor m-th of time interval;If having k characteristic vector, PiFor ith feature vector, pass through single class branch The training pattern for holding vector machine foundation is as follows:
Wherein, w is the normal vector of Optimal Separating Hyperplane;ρ is setting constant, and it determines distance of the origin with respect to hyperplane;εi It is slack variable, the point to punish classification error;V is the balance parameters of largest interval and penalty term, and v ∈ (0,1];φ (Pi) it is to represent ith feature DUAL PROBLEMS OF VECTOR MAPPING to higher dimensional space;
Introduce Lagrange multiplier αiAnd βi, have:
Following dual function can be obtained by substituting into kernel function:
Wherein, αjFor Lagrange multiplier, φ (Pj) represent j-th of maps feature vectors to higher dimensional space;PjFor jth Individual characteristic vector, j=1,2 ..., k;K(Pi,Pj)=φ (Pj)·φ(Pj) it is kernel function, it is corresponding to use RBF Kernel function, K (Pi,Pj) be expressed as:
K(Pi, Pj)=exp (- γ | | Pi-Pj||2)
K (Pi, Pj)=exp (- γ Pi-Pj)
Wherein, γ is Control Radius parameter, γ > 0;
Supporting vector collection SV and corresponding α are obtained finally by dual function is solvediValue, as temporal characteristics model.
The balance parameters v of largest interval and penalty term optimal value is determined as follows:
1) be step-length with 0.01, (0,1] between test the discriminations of different v values, the corresponding v values of meter maximum discrimination score are v′;
2) (v ' -0.1, v '+0.1] between, be step-length with 0.001, test the discrimination of different v values, and finally with maximum The corresponding value v of discriminationmaxIt is used as balance parameters v optimal value.
In the step 3, the supporting vector collection SV and corresponding α obtained using calculatingiValue, discriminant function Y (P) is represented For:
Wherein, sign () is sign function, is defined as:
When differentiating to network traffics to be detected, the temporal characteristics of network traffics to be detected are brought into discriminant function In, if testing result is 1, proceed the confirmation of anonymous access flow;If testing result is -1, it is determined as normal access and flows Amount.
The step 4 specifically includes following steps:
Step 4-1:Web server jumps to certification page;
Step 4-2:According to the identifying code for producing particular size, it is desirable to the identifying code shown in user input webpage;
To detect Tor and JAP anonymous access flows simultaneously, identifying code is sized to 990 bytes;
Step 4-3:Identifying code is sent back to Web server;
Step 4-4:Web server is confirmed whether it is anonymous access flow according to the corresponding message length of identifying code;
If the corresponding network message of identifying code is divided into two messages, and corresponding message length is respectively 498,492 Byte or 989,1 byte, then confirm as anonymous access flow, be otherwise judged as normal flowing of access.
Compared with prior art, the beneficial effects of the present invention are:
1. the present invention distinguishes anonymous access flow and normal flowing of access using temporal characteristics, the general of method is enhanced Property, expand the scope of application of method;
2. modeling the temporal characteristics model of anonymous access flow using one-class support vector machines, anonymous visit is only needed in modeling The learning sample of flow is asked, is easy to use in practice;
3. when finding suspicious anonymous access, the identifying code of particular size is produced to anonymity by jumping to the checking page Flowing of access is further verified, reduces the rate of false alarm of detection method;
4. present invention is mainly used for solve test problems of the Web server to anonymous access flow, it is possible to achieve anonymous Web Quick, the accurate detection of flowing of access, strengthens the security of Web server.
Brief description of the drawings
Fig. 1 is the Web server anonymous access flow rate testing methods function knot based on temporal characteristics in the embodiment of the present invention Composition;
Fig. 2 is that the Web server anonymous access flow rate testing methods based on temporal characteristics specifically flow in the embodiment of the present invention Cheng Tu.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Such as Fig. 1 and Fig. 2, the present invention provides a kind of Web server anonymous access flow rate testing methods based on temporal characteristics, It the described method comprises the following steps:
Step 1:Temporal characteristics are extracted;
Step 2:Based on one-class support vector machines setup time characteristic model;
Step 3:Temporal characteristics are substituted into and detected in temporal characteristics model;
Step 4:Testing result is confirmed.
, GET request and POST request respective arrival time in Web server record http protocol, will in the step 1 Time interval between the GET request or POST request that continuously occur is as temporal characteristics.
The step 1 specifically includes following steps:
Step 1-1:According to IP address, for the client of each connection Web server, Web server sets up database Search index;
Step 1-2:The arrival time of GET request and POST request in Web server record http protocol, and for identical Multiple GET request or POST request, Web server only records the arrival time of first time GET request or POST request;
Step 1-3:From the GET request and POST request of record reach time series in extraction time feature.
In the step 1-1, for the client ip address of IPv4 types, Web server is according to itself operating system Byte order, 4 byte INT types are saved as by the IP address of client, and Web server calculates corresponding numerical value afterwards, and with this Numerical value as client search index;
For the client ip address of IPv6 types, Web server as character string, uses the IPv6 addresses of client BKDRHash hash functions calculate hash values, and using result of calculation as database index, while with preserving IPv6 in database Location information.
In the step 1-3, Web server is calculated according to GET request and the POST request respective arrival time of record Go out the time interval that GET request and POST request reach, and time interval is ranked up according to descending order, extract At least 20% time interval, saves as characteristic vector to be used as temporal characteristics.
In the step 2, the temporal characteristics of extraction are saved as into characteristic vector, model is carried out using one-class support vector machines Training, draws temporal characteristics model.
In the step 2, if the length of characteristic vector is l, and characteristic vector formalization representation is P={ p1,p2,…, pm,…pl, pmFor m-th of time interval;If having k characteristic vector, PiFor ith feature vector, pass through single class branch The training pattern for holding vector machine foundation is as follows:
Wherein, w is the normal vector of Optimal Separating Hyperplane;ρ is setting constant, and it determines distance of the origin with respect to hyperplane;εi It is slack variable, the point to punish classification error;V is the balance parameters of largest interval and penalty term, and v ∈ (0,1];φ (Pi) it is to represent ith feature DUAL PROBLEMS OF VECTOR MAPPING to higher dimensional space;
Introduce Lagrange multiplier αiAnd βi, have:
Following dual function can be obtained by substituting into kernel function:
Wherein, αjFor Lagrange multiplier, φ (Pj) represent j-th of maps feature vectors to higher dimensional space;PjFor jth Individual characteristic vector, j=1,2 ..., k;K(Pi,Pj)=φ (Pj)·φ(Pj) it is kernel function, it is corresponding to use RBF Kernel function, K (Pi,Pj) be expressed as:
K(Pi, Pj)=exp (- γ | | Pi-Pj||2)
K (Pi, Pj)=exp (- γ Pi-Pj)
Wherein, γ is Control Radius parameter, γ > 0;
Supporting vector collection SV and corresponding α are obtained finally by dual function is solvediValue, as temporal characteristics model.
The balance parameters v of largest interval and penalty term optimal value is determined as follows:
1) be step-length with 0.01, (0,1] between test the discriminations of different v values, the corresponding v values of meter maximum discrimination score are v′;
2) (v ' -0.1, v '+0.1] between, be step-length with 0.001, test the discrimination of different v values, and finally with maximum The corresponding value v of discriminationmaxIt is used as balance parameters v optimal value.
In the step 3, the supporting vector collection SV and corresponding α obtained using calculatingiValue, discriminant function Y (P) is represented For:
Wherein, sign () is sign function, is defined as:
When differentiating to network traffics to be detected, the temporal characteristics of network traffics to be detected are brought into discriminant function In, if testing result is 1, proceed the confirmation of anonymous access flow;If testing result is -1, it is determined as normal access and flows Amount.
The step 4 specifically includes following steps:
Step 4-1:Web server jumps to certification page;
Step 4-2:According to the identifying code for producing particular size, it is desirable to the identifying code shown in user input webpage;
To detect Tor and JAP anonymous access flows simultaneously, identifying code is sized to 990 bytes;
Step 4-3:Identifying code is sent back to Web server;
Step 4-4:Web server is confirmed whether it is anonymous access flow according to the corresponding message length of identifying code;
If the corresponding network message of identifying code is divided into two messages, and corresponding message length is respectively 498,492 Byte or 989,1 byte, then confirm as anonymous access flow, be otherwise judged as normal flowing of access.
Embodiment
A Web server is disposed in its information outer net, the server carries out data interaction with Intranet background data base. To obtain the data content of background data base, hacker carries out sql injection attacks using sqlmaq instruments, and configures sqlmap and make Obtain attack traffic to forward by Tor anonymous communication systems, so as to hide the real IP address of itself, hide network trace.Pass through Anonymous access flow is detected, anonymous access flow can be found in time and network connection is disconnected, it is ensured that power information Intranet information The security of data, and then ensure whole electrical power system network safety.
Its specific embodiment is:
First, server managers are by the Web server in Tor anonymous communication system access information outer nets, and The arrival time of http protocol GET request and POST request is recorded in the preposition fire wall of Web server.It is more sufficient to obtain Learning sample, server admin will repeatedly access Web server content, then be reached from the GET request and POST request of record Extraction time feature in time, saves as learning sample.After learning sample data are obtained, Web server manager will make The temporal characteristics of anonymous access flow are modeled with one-class support vector machines, determined during modeling using network search method Optimal value of the parameter, and generate final model file.
Complete after above-mentioned steps, anonymous access flow detection function can be disposed in Web server frontend firewall.For Each new access link, fire wall records the arrival time of its HTTP GET request and POST request, and for same The multiple access of individual Web object, the time that only record is accessed for the first time.After a number of arrival time is counted, fire wall Allocating time feature extractor, produces the temporal characteristics of current accessed flow, and this feature is updated in model file, counts Calculate and differentiate result.If it is -1 to differentiate result, for normal flowing of access, it is allowed to continue to access.Otherwise, if differentiating, result is 1, For suspicious anonymous access flow, current accessed is forwarded to the server authentication page by fire wall.
The identifying code that picture is shown is shown in the checking page, it is desirable to the user input verification code information.Meanwhile, in the page Embedded JavaScript code is filled verification code information to 990 bytes by increasing identification field and random digit, and will The information is back to server.Fire wall detects the Internet message length of return information, if length is respectively 498,492 words Section, then it is the anonymous access forwarded by Tor anonymous systems to judge current access, interrupts network connection.On this basis, may be used Take further measures, current IP address is such as added into blacklist, it is ensured that the security of Web server.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention rather than its limitations, institute The those of ordinary skill in category field with reference to above-described embodiment still can to the present invention embodiment modify or Equivalent, these any modifications or equivalent without departing from spirit and scope of the invention are applying for this pending hair Within bright claims.

Claims (9)

1. a kind of Web server anonymous access flow rate testing methods based on temporal characteristics, it is characterised in that:Methods described includes Following steps:
Step 1:Temporal characteristics are extracted;
Step 2:Based on one-class support vector machines setup time characteristic model;
Step 3:Temporal characteristics are substituted into and detected in temporal characteristics model;
Step 4:Testing result is confirmed;
The step 4 specifically includes following steps:
Step 4-1:Web server jumps to certification page;
Step 4-2:According to the identifying code for producing particular size, it is desirable to the identifying code shown in user input webpage;
To detect Tor and JAP anonymous access flows simultaneously, identifying code is sized to 990 bytes;
Step 4-3:Identifying code is sent back to Web server;
Step 4-4:Web server is confirmed whether it is anonymous access flow according to the corresponding message length of identifying code;
If the corresponding network message of identifying code is divided into two messages, and corresponding message length is respectively 498,492 bytes Or 989,1 byte, then anonymous access flow is confirmed as, is otherwise judged as normal flowing of access.
2. the Web server anonymous access flow rate testing methods according to claim 1 based on temporal characteristics, its feature exists In:, GET request and POST request respective arrival time in Web server record http protocol, will be continuous in the step 1 Time interval between the GET request or POST request of appearance is used as temporal characteristics.
3. the Web server anonymous access flow rate testing methods according to claim 1 or 2 based on temporal characteristics, it is special Levy and be:The step 1 specifically includes following steps:
Step 1-1:According to IP address, for the client of each connection Web server, Web server sets up database retrieval Index;
Step 1-2:The arrival time of GET request and POST request in Web server record http protocol, and it is many for identical Secondary GET request or POST request, Web server only record the arrival time of first time GET request or POST request;
Step 1-3:From the GET request and POST request of record reach time series in extraction time feature.
4. the Web server anonymous access flow rate testing methods according to claim 3 based on temporal characteristics, its feature exists In:In the step 1-1, for the client ip address of IPv4 types, Web server is suitable according to the byte of itself operating system Sequence, 4 byte INT types are saved as by the IP address of client, and Web server calculates corresponding numerical value afterwards, and is made with the numerical value For the search index of client;
For the client ip address of IPv6 types, Web server as character string, uses the IPv6 addresses of client BKDRHash hash functions calculate hash values, and using result of calculation as database index, while with preserving IPv6 in database Location information.
5. the Web server anonymous access flow rate testing methods according to claim 3 based on temporal characteristics, its feature exists In:In the step 1-3, Web server calculates GET according to GET request and the POST request respective arrival time of record The time interval that request and POST request reach, and time interval is ranked up according to descending order, extract at least 20% time interval, saves as characteristic vector to be used as temporal characteristics.
6. the Web server anonymous access flow rate testing methods according to claim 1 based on temporal characteristics, its feature exists In:In the step 2, the temporal characteristics of extraction are saved as into characteristic vector, model training is carried out using one-class support vector machines, Draw temporal characteristics model.
7. the Web server anonymous access flow rate testing methods based on temporal characteristics according to claim 1 or 6, it is special Levy and be:In the step 2, if the length of characteristic vector is l, and characteristic vector formalization representation is P={ p1,p2,…, pm,…pl, pmFor m-th of time interval;If having k characteristic vector, PiFor ith feature vector, pass through single class branch The training pattern for holding vector machine foundation is as follows:
min w , ρ , ϵ i 1 2 | | w | | 2 + 1 v l Σ i = 1 k ϵ i - ρ s . t . w · φ ( P i ) ≥ ρ - ϵ i ϵ i ≥ 0 , i = 1 , 2 , ... , k
Wherein, w is the normal vector of Optimal Separating Hyperplane;ρ is setting constant, and it determines distance of the origin with respect to hyperplane;εiIt is loose Variable, the point to punish classification error;V is the balance parameters of largest interval and penalty term, and v ∈ (0,1];φ(Pi) it is table Show ith feature DUAL PROBLEMS OF VECTOR MAPPING to higher dimensional space;
Introduce Lagrange multiplier αiAnd βi, have:
L ( w , ϵ i , ρ , α i , β i ) = 1 2 | | w | | 2 + 1 v l Σ i = 1 k ϵ i - ρ - Σ i = 1 k α i ( ( w · φ ( P i ) ) - ρ + ϵ i ) - Σ i = 1 k β i ϵ i
Following dual function can be obtained by substituting into kernel function:
min α i 1 2 Σ i = 1 k Σ j = 1 k α i α j φ ( P i ) · φ ( P j ) = min α 1 2 Σ i = 1 k Σ j = 1 k α i α j K ( P i , P j ) s . t . 0 ≤ α i ≤ 1 v k Σ i = 1 k α i = 1
Wherein, αjFor Lagrange multiplier, φ (Pj) represent j-th of maps feature vectors to higher dimensional space;PjIt is special for j-th Levy vector, j=1,2 ..., k;K(Pi,Pj)=φ (Pj)·φ(Pj) it is kernel function, RBF is used for corresponding core Function, K (Pi,Pj) be expressed as:
K(Pi,Pj)=exp (- γ | | Pi-Pj||2)
Wherein, γ is Control Radius parameter, γ > 0;
Supporting vector collection SV and corresponding α are obtained finally by dual function is solvediValue, as temporal characteristics model.
8. the Web server anonymous access flow rate testing methods according to claim 7 based on temporal characteristics, its feature exists In:The balance parameters v of largest interval and penalty term optimal value is determined as follows:
1) be step-length with 0.01, (0,1] between test the discriminations of different v values, the corresponding v values of meter maximum discrimination score are v ';
2) (v ' -0.1, v '+0.1] between, be step-length with 0.001, test the discrimination of different v values, and final recognized with maximum The corresponding value v of ratemaxIt is used as balance parameters v optimal value.
9. the Web server anonymous access flow rate testing methods according to claim 8 based on temporal characteristics, its feature exists In:In the step 3, the supporting vector collection SV and corresponding α obtained using calculatingiValue, discriminant function y (P) is expressed as:
y ( P ) = s i g n [ Σ p i ∈ S V α i K ( P i , P j ) - ρ ]
Wherein, sign () is sign function, is defined as:
s i g n &lsqb; &Sigma; p i &Element; S V &alpha; i K ( P i , P j ) - &rho; &rsqb; = - 1 i f &Sigma; p i &Element; S V &alpha; i K ( P i , P j ) - &rho; < 0 1 i f &Sigma; p i &Element; S V &alpha; i K ( P i , P j ) - &rho; &GreaterEqual; 0
When differentiating to network traffics to be detected, the temporal characteristics of network traffics to be detected are brought into discriminant function, if Testing result is 1, then proceeds the confirmation of anonymous access flow;If testing result is -1, normal flowing of access is determined as.
CN201410535015.8A 2014-10-11 2014-10-11 A kind of Web server anonymous access flow rate testing methods based on temporal characteristics Active CN104270373B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410535015.8A CN104270373B (en) 2014-10-11 2014-10-11 A kind of Web server anonymous access flow rate testing methods based on temporal characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410535015.8A CN104270373B (en) 2014-10-11 2014-10-11 A kind of Web server anonymous access flow rate testing methods based on temporal characteristics

Publications (2)

Publication Number Publication Date
CN104270373A CN104270373A (en) 2015-01-07
CN104270373B true CN104270373B (en) 2017-07-14

Family

ID=52161863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410535015.8A Active CN104270373B (en) 2014-10-11 2014-10-11 A kind of Web server anonymous access flow rate testing methods based on temporal characteristics

Country Status (1)

Country Link
CN (1) CN104270373B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919579B (en) * 2015-12-24 2020-11-06 腾讯科技(深圳)有限公司 Information processing method, device and equipment
CN113382405A (en) * 2021-04-24 2021-09-10 胡志成 Network space information security control method and application

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005244429A (en) * 2004-02-25 2005-09-08 Intelligent Cosmos Research Institute Feature quantity extracting method for detecting abnormality of network, program for allowing computer to execute the method, feature quantity extracting apparatus, and network abnormality detecting system
CN101635658A (en) * 2009-08-26 2010-01-27 中国科学院计算技术研究所 Method and system for detecting abnormality of network secret stealing behavior
CN101950464A (en) * 2010-09-17 2011-01-19 中国科学院深圳先进技术研究院 Method and system for fall monitoring and warning
CN102435910A (en) * 2011-09-14 2012-05-02 南京航空航天大学 Power electronic circuit health monitoring method based on support vector classification
CN103001805A (en) * 2012-12-17 2013-03-27 重庆邮电大学 Web user flow producing method based on user behavior analysis
CN103078856A (en) * 2012-12-29 2013-05-01 大连环宇移动科技有限公司 Method for detecting and filtering application layer DDoS (Distributed Denial of Service) attack on basis of access marking

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005244429A (en) * 2004-02-25 2005-09-08 Intelligent Cosmos Research Institute Feature quantity extracting method for detecting abnormality of network, program for allowing computer to execute the method, feature quantity extracting apparatus, and network abnormality detecting system
CN101635658A (en) * 2009-08-26 2010-01-27 中国科学院计算技术研究所 Method and system for detecting abnormality of network secret stealing behavior
CN101950464A (en) * 2010-09-17 2011-01-19 中国科学院深圳先进技术研究院 Method and system for fall monitoring and warning
CN102435910A (en) * 2011-09-14 2012-05-02 南京航空航天大学 Power electronic circuit health monitoring method based on support vector classification
CN103001805A (en) * 2012-12-17 2013-03-27 重庆邮电大学 Web user flow producing method based on user behavior analysis
CN103078856A (en) * 2012-12-29 2013-05-01 大连环宇移动科技有限公司 Method for detecting and filtering application layer DDoS (Distributed Denial of Service) attack on basis of access marking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于支持向量机的网络流量分类检测系统的研究与实现;刘健男;《中国优秀硕士学位论文全文数据库信息科技辑》;20120915;摘要部分 *

Also Published As

Publication number Publication date
CN104270373A (en) 2015-01-07

Similar Documents

Publication Publication Date Title
Azeez et al. Identifying phishing attacks in communication networks using URL consistency features
CN104333562B (en) Data pack transmission method and device
CN110519298A (en) A kind of Tor method for recognizing flux and device based on machine learning
CN107046468A (en) A kind of physical layer certification thresholding determines method and system
Li et al. Demographic information inference through meta-data analysis of Wi-Fi traffic
CN102710770A (en) Identification method for network access equipment and implementation system for identification method
CN107733863A (en) Daily record adjustment method and device under a kind of distributed hadoop environment
CN102281337A (en) destination address access control method and system
CN112929390A (en) Network intelligent monitoring method based on multi-strategy fusion
Folorunso et al. Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach
CN106789945A (en) A kind of network equipment and network log-in management method
Zhong et al. Stealthy malware traffic-not as innocent as it looks
Nouh et al. Towards designing a multipurpose cybercrime intelligence framework
CN104270373B (en) A kind of Web server anonymous access flow rate testing methods based on temporal characteristics
Pastor-Galindo et al. Nothing to hide? On the security and privacy threats beyond open data
US20160127324A1 (en) Privacy protected internet networks, subnetworks and sub-subnetworks
CN109858510A (en) A kind of detection method for http protocol ETag value covert communications
CN110414594A (en) A kind of encryption traffic classification method determined based on dual-stage
CN109257384A (en) Application layer ddos attack recognition methods based on access rhythm matrix
US11038921B1 (en) Detecting malicious actors
Kadam et al. Various approaches for intrusion detection system: an overview
Aqeel Internet of things: Systematic literature review of security and future research
CN109615418A (en) A kind of two melt the method for digging of account client
Hang et al. Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception
Smith Hiding in the noise: Creation and detection analysis of modern covert channels

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160425

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: State Grid Smart Grid Institute

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant before: State Grid Corporation of China

Applicant before: China Electric Power Research Institute

CB02 Change of applicant information

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant before: State Grid Corporation of China

Applicant before: China Electric Power Research Institute

Applicant before: State Grid Smart Grid Institute

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant