CN107277005A - A kind of distributed operation flow detection method - Google Patents

A kind of distributed operation flow detection method Download PDF

Info

Publication number
CN107277005A
CN107277005A CN201710444007.6A CN201710444007A CN107277005A CN 107277005 A CN107277005 A CN 107277005A CN 201710444007 A CN201710444007 A CN 201710444007A CN 107277005 A CN107277005 A CN 107277005A
Authority
CN
China
Prior art keywords
message
detection
stream
business stream
operational chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710444007.6A
Other languages
Chinese (zh)
Inventor
戚建淮
伍贤云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Y&D Electronics Information Co Ltd
Original Assignee
Shenzhen Y&D Electronics Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Y&D Electronics Information Co Ltd filed Critical Shenzhen Y&D Electronics Information Co Ltd
Priority to CN201710444007.6A priority Critical patent/CN107277005A/en
Publication of CN107277005A publication Critical patent/CN107277005A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The invention discloses a kind of operation flow detection method, comprise the following steps:When network data flow or message reach fire prevention cloud, condition code or critical field are extracted;Matching detection is carried out with white list in data dictionary, is detected not by then being intercepted, detection passes through, then the context session information of analyze data stream or message;If having produced associated context session information, the condition code or critical field for extracting current data stream or message are added in associated context information table;The Business Stream or operational chain defined again with standard is analyzed;If the Business Stream or operational chain that do not match, are intercepted to packet.The present invention detects that the security protection of significant increase operation system, using distributed hierarchical concurrent operation, solves performance bottleneck of the existing application firewall in deep message detection based on Business Stream and operational chain.

Description

A kind of distributed operation flow detection method
Technical field
The present invention relates to a kind of operation flow detection method, especially a kind of application firewall white list detection technique is adopted With distributed computing technology, based on Business Stream, the context such as operational chain carries out one kind of safety detection to data flow or message Efficiently, the method for identification and the control data of becoming more meticulous.
Background technology
Protocol recognition method based on character string feature is extension of the deep bag detection in application-level protocol identification field, due to It not only checks port numbers, is detected also directed to user's payload, therefore has than the method based on port numbers higher knowledge Not other rate.Matching process computation complexity based on character string feature is high, storage consumption is big, and market selling software method is generally only capable of Reach 100,000,000 rank disposal abilities.And the operation flow, portfolio being continually changing rapid growth, continuously emerge new threat and The occupation mode of procotol and the transmission means of data are attacked and change, product on the market is all based on single message at present Keyword match is carried out with data stream, there is very big peaceful leak and hidden danger.
The content of the invention
The problem to be solved in the present invention is to provide a kind of distributed operation flow detection method, not only white in service feature On the basis of list content matching, detected with reference to business or workflow, fire prevention cloud is flowed into data message or data Row analysis, is intercepted to the data flow or message for not meeting operation flow, realizes the real safety of application detection, and adopt With distributed node parallel computation mode, solve single node and calculate the performance bottleneck brought.
In order to solve the above technical problems, the technical scheme is that:
A kind of operation flow detection method, comprises the following steps:
1. network data flow or message reach fire prevention cloud, condition code or critical field are extracted;
2. carrying out matching detection with white list in data dictionary, detect not by then being intercepted, detection passes through, then analyzes The context session information of data flow or message;
If 3. having produced associated context session information, extracting condition code or the pass of current data stream or message Key field is added in associated context information table;
4. the Business Stream or operational chain that are defined again with standard are analyzed;
If 5. the Business Stream or operational chain that do not match, are intercepted to packet.
Complete some Business Stream or operational chain exemplary step is as follows:Log in, inquiry table 1, inquiry table 2, update table 1, more New table 2, is exited.
Cleaning Principle:By taking operational chain above as an example, when first stream is matched according to stream or message with logging in, it is legal to detect, And this operational chain is matched, second associated data flow or message are only that inquiry table 1 is just legal, inquiry table occur 2 or other data flows be all illegal, all messages are differentiated in strict accordance with workflow order, to the data of unauthorized access Stream or message are intercepted.
Fire prevention cloud uses matrix computations, is detected using multistage parallel, and per one-level parallel processing, operational chain is by a plurality of instruction structure Into different instruction shares different nodes with different ranks, and Distributed Calculation is detected using hierarchical approaches, is first carried out 1 grade of detection, goes to 2 grades of detections according to testing result, next stage is given to successively and is detected, until detection is completed.
Beneficial effects of the present invention:Detected based on Business Stream and operational chain, the security protection of significant increase operation system, Using distributed hierarchical concurrent operation, performance bottleneck of the existing application firewall in deep message detection is solved.
Brief description of the drawings
The embodiment to the present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 shows the flow chart of the present invention.
Fig. 2 shows the operational chain schematic diagram of the present invention.
Fig. 3 shows the distributed matrix detects schematic diagram of the present invention.
Embodiment
In order that present invention solves the technical problem that, use technical scheme, obtain technique effect it can be readily appreciated that below With reference to specific accompanying drawing, the embodiment to the present invention is described further.
As shown in figure 1, a kind of operation flow detection method, comprises the following steps:
1. network data flow or message reach fire prevention cloud, condition code or critical field are extracted;
2. carrying out matching detection with white list in data dictionary, detect not by then being intercepted, detection passes through, then analyzes The context session information of data flow or message;
If 3. having produced associated context session information, extracting condition code or the pass of current data stream or message Key field is added in associated context information table;
4. the Business Stream or operational chain that are defined again with standard are analyzed;
If 5. the Business Stream or operational chain that do not match, are intercepted to packet.
As shown in Fig. 2 being Business Stream or operational chain example, some business is completed by sequentially needing several steps to complete, As logged in, inquiry table 1, inquiry table 2 updates table 1, updates table 2, exits, and constitutes a complete operation chain.
Cleaning Principle:By taking operational chain above as an example, when first stream is matched according to stream or message with logging in, it is legal to detect, And this operational chain is matched, second associated data flow or message are only that inquiry table 1 is just legal, inquiry table occur 2 or other data flows be all illegal, all messages are differentiated in strict accordance with workflow order, to the data of unauthorized access Stream or message are intercepted.
As shown in figure 3, fire prevention cloud uses matrix computations, detected using multistage parallel, per one-level parallel processing, operational chain by A plurality of instruction is constituted, and different instruction is entered with different nodes, Distributed Calculation is shared with different ranks using hierarchical approaches Row detection, first carries out 1 grade of detection, goes to 2 grades of detections according to testing result, next stage is given to successively and is detected, until detection Complete.
Specifically, the construction step of operation flow detecting system is as follows:
Step 1:Get out input block, main control unit, detection unit hardware device;
Step 2:To input block, main control unit, detection unit installation operation system;
Step 3:Main control unit installation database system;
Step 4:Deployment program, main control unit deployment primary control program, detection unit deployment detection program, input block deployment Distributed-computation program;
Step 5:Calculate and configured by multistage matrix distribution formula, build Distributed Detection array;
Step 6:Build and import or study white list rule base, operational chain storehouse;
Step 7:Build abnormal data stream and access attack, the number to not meeting white list rule and operational chain workflow sequence Intercepted according to stream or message.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art the invention discloses technical scope in, the change or replacement that can be readily occurred in, It should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims It is defined.

Claims (3)

1. a kind of distributed operation flow detection method, it is characterised in that:Comprise the following steps:
1) when network data flows or message reach fire prevention cloud, condition code or critical field are extracted;
2) carries out matching detection with white list in data dictionary, detects not by then being intercepted, detection passes through, then analyzes number According to the context session information of stream or message;
If 3) has produced associated context session information, the condition code or key of current data stream or message are extracted Field is added in associated context information table;
4) Business Stream or operational chain that is defined with standard again are analyzed;
If 5) Business Stream or operational chain that is not matched, are intercepted to packet.
2. distributed operation flow detection method according to claim 1, it is characterised in that:The Business Stream or behaviour The exemplary operations step for making chain is as follows:Log in, inquiry table 1, inquiry table 2, update table 1, update table 2, exit.
3. distributed operation flow detection method according to claim 1, it is characterised in that:The fire prevention cloud uses square Battle array is calculated, and is detected using multistage parallel, per one-level parallel processing, and operational chain is made up of a plurality of instruction, and different instruction is with different Rank is shared on different nodes, and Distributed Calculation is detected using hierarchical approaches, 1 grade of detection is first carried out, according to detection As a result 2 grades of detections are gone to, next stage is given to successively and is detected, until detection is completed.
CN201710444007.6A 2017-06-13 2017-06-13 A kind of distributed operation flow detection method Pending CN107277005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710444007.6A CN107277005A (en) 2017-06-13 2017-06-13 A kind of distributed operation flow detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710444007.6A CN107277005A (en) 2017-06-13 2017-06-13 A kind of distributed operation flow detection method

Publications (1)

Publication Number Publication Date
CN107277005A true CN107277005A (en) 2017-10-20

Family

ID=60067551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710444007.6A Pending CN107277005A (en) 2017-06-13 2017-06-13 A kind of distributed operation flow detection method

Country Status (1)

Country Link
CN (1) CN107277005A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345902A (en) * 2018-01-24 2018-07-31 深圳市永达电子信息股份有限公司 Self study white list model library structure based on transaction characteristics and white list detection method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799960A (en) * 2012-06-18 2012-11-28 北京大学 Parallel operation flow anomaly detection method oriented to data model
US20140222522A1 (en) * 2013-02-07 2014-08-07 Ibms, Llc Intelligent management and compliance verification in distributed work flow environments
CN104239144A (en) * 2014-09-22 2014-12-24 珠海许继芝电网自动化有限公司 Multilevel distributed task processing system
CN104392297A (en) * 2014-10-27 2015-03-04 普元信息技术股份有限公司 Method and system for realizing non-business process irregularity detection in large data environment
CN104598300A (en) * 2014-12-24 2015-05-06 北京奇虎科技有限公司 Distributive business process customization method and system
CN105429791A (en) * 2015-11-03 2016-03-23 国网技术学院 Distributed service state detection device and method
CN105991587A (en) * 2015-02-13 2016-10-05 中国移动通信集团山西有限公司 Intrusion detection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799960A (en) * 2012-06-18 2012-11-28 北京大学 Parallel operation flow anomaly detection method oriented to data model
US20140222522A1 (en) * 2013-02-07 2014-08-07 Ibms, Llc Intelligent management and compliance verification in distributed work flow environments
CN104239144A (en) * 2014-09-22 2014-12-24 珠海许继芝电网自动化有限公司 Multilevel distributed task processing system
CN104392297A (en) * 2014-10-27 2015-03-04 普元信息技术股份有限公司 Method and system for realizing non-business process irregularity detection in large data environment
CN104598300A (en) * 2014-12-24 2015-05-06 北京奇虎科技有限公司 Distributive business process customization method and system
CN105991587A (en) * 2015-02-13 2016-10-05 中国移动通信集团山西有限公司 Intrusion detection method and system
CN105429791A (en) * 2015-11-03 2016-03-23 国网技术学院 Distributed service state detection device and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345902A (en) * 2018-01-24 2018-07-31 深圳市永达电子信息股份有限公司 Self study white list model library structure based on transaction characteristics and white list detection method
CN108345902B (en) * 2018-01-24 2021-08-17 深圳市永达电子信息股份有限公司 Self-learning white list model base construction and white list detection method based on transaction characteristics

Similar Documents

Publication Publication Date Title
CN106778259B (en) Abnormal behavior discovery method and system based on big data machine learning
CN109547409B (en) Method and system for analyzing industrial network transmission protocol
CN112738015B (en) Multi-step attack detection method based on interpretable convolutional neural network CNN and graph detection
US10187401B2 (en) Hierarchical feature extraction for malware classification in network traffic
CN103733590B (en) Compiler for regular expressions
CN109818976A (en) A kind of anomalous traffic detection method and device
CN106133740B (en) Log Analysis System
Barbosa et al. Exploiting traffic periodicity in industrial control networks
CN112468347B (en) Security management method and device for cloud platform, electronic equipment and storage medium
CN106104556B (en) Log Analysis System
CN109660518B (en) Communication data detection method and device of network and machine-readable storage medium
Vidal et al. Alert correlation framework for malware detection by anomaly-based packet payload analysis
Amoli et al. Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets
CN105743880A (en) Data analysis system
CN104135385A (en) Method of application classification in Tor anonymous communication flow
Folorunso et al. Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach
Han et al. Covert timing channel detection method based on time interval and payload length analysis
CN110768946A (en) Industrial control network intrusion detection system and method based on bloom filter
Harbola et al. Improved intrusion detection in DDoS applying feature selection using rank & score of attributes in KDD-99 data set
Sharma et al. Feature ranking using statistical techniques for computer networks intrusion detection
Yang et al. Cloud-edge coordinated traffic anomaly detection for industrial cyber-physical systems
CN105429817A (en) Illegal business identification device and illegal business identification method based on DPI and DFI
CN107277005A (en) A kind of distributed operation flow detection method
Ogawa et al. Malware originated http traffic detection utilizing cluster appearance ratio
Nandal et al. Cyber security against ddos malware spoofing attacks using machine learning with genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171020

WD01 Invention patent application deemed withdrawn after publication