CN107454039A - The method of network attack detection system and detection network attack - Google Patents

The method of network attack detection system and detection network attack Download PDF

Info

Publication number
CN107454039A
CN107454039A CN201610373881.0A CN201610373881A CN107454039A CN 107454039 A CN107454039 A CN 107454039A CN 201610373881 A CN201610373881 A CN 201610373881A CN 107454039 A CN107454039 A CN 107454039A
Authority
CN
China
Prior art keywords
unit
network request
network
counting unit
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610373881.0A
Other languages
Chinese (zh)
Other versions
CN107454039B (en
Inventor
闫国旗
都海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huadu Jingdong Smart City Digital Technology Co.,Ltd.
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610373881.0A priority Critical patent/CN107454039B/en
Publication of CN107454039A publication Critical patent/CN107454039A/en
Application granted granted Critical
Publication of CN107454039B publication Critical patent/CN107454039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Abstract

The invention discloses a kind of network attack detection system and the method for detection network attack.The system includes:Network Data Capture unit, it is configured as receiving network request packet from external data source;Data dispatch unit, the Network Data Capture unit is connected to, is configured as distributing network request packet;At least one counting unit, it is connected to the data dispatch unit, it is configured as the combination based on different network request parameter or network request parameter to count the network request packet received from the data dispatch unit within the specified time cycle, and generates and close rule;And closing management unit, it is connected at least one counting unit, be configured as receiving respectively from least one counting unit generated close rule, and determine whether to be applied to the rule of closing received, wherein, the data dispatch unit carries out load balancing by the combination based on the source IP address in network request packet and purpose IP address, by the network request packet corresponding with the source IP address closed is not distributed at least one counting unit in the network request packet.

Description

The method of network attack detection system and detection network attack
Technical field
The present invention relates to network safety filed, more particularly to network attack detection system and passes through net The method that network attack detection system detects network attack.
Background technology
With the rapid development of Internet, network security have become one it is increasingly notable the problem of, Hacker makes many companies pay the cost of bitterness by the data of stealing or revenge attack.It is near several DDOS attack turns into each IT companies by most attacks over year, public especially for Large-Scale Interconnected net For department, because the challenging dose being subjected to is larger, energy is born beyond single hardware firewall Power.In order to solve this problem, while in order to reduce the cost of attack detecting, many internets public affairs Department's beginning analyzes and processes cluster by means of such as x86 and comes assist process, wherein Storm real-time streams in real time It is to use more framework to handle framework.
Although the hardware firewall hardware firewall nowadays generally used can be identified and resisted necessarily The DDOS attack of degree, but the storage capacity limitation of equipment itself is in order at, we can not see More detailed attack data.In addition, although hardware firewall itself possesses hardware-accelerated advantage, But for large-scale computer room, its disposal ability still has bottleneck.
The content of the invention
In order to solve the above-mentioned problems in the prior art, the present invention proposes a kind of network attack Detecting system and the method for detecting network attack.
According to an aspect of the present invention, it is proposed that a kind of network attack detection system.The system Including:Network Data Capture unit, it is configured as receiving network request packet from external data source; Data dispatch unit, the Network Data Capture unit is connected to, is configured as to network request number According to being distributed;At least one counting unit, the data dispatch unit is connected to, is configured as Combination based on different network request parameter or network request parameter is within the specified time cycle The network request packet received from the data dispatch unit is counted, and is generated and closed rule; And closing management unit, be connected at least one counting unit, be configured as from it is described to Few counting unit receives the rule of closing generated respectively, and determines whether the envelope to being received Prohibit rule to be applied, wherein, the data dispatch unit passes through based in network request packet The combination of source IP address and purpose IP address carries out load balancing, by the network request packet not The network request packet corresponding with the source IP address closed distributes single at least one counting Member.
Preferably, the system also includes:Configuration management element, it is configured as from configuration server Configuration information update is pulled, and resulting configuration information update is accordingly sent to the data Dispatch unit, at least one counting unit and/or the closing management unit.
Preferably, the system also includes:Counting unit is intercepted, the data is connected to and distributes list Member, it is configured as counting the network request packet received from the data dispatch unit, its In, the data dispatch unit is configured as the source IP in the network request packet with being closed The corresponding network request packet in address distributes the interception counting unit.
Preferably, when at least one counting unit includes the combination based on network request parameter During the counting unit counted, the system also includes:Secondary counting unit, it is connected to described The counting unit that combination based on network request parameter is counted, is configured as from the meter connected Counting unit obtains count results, and the network request ginseng in the combination based on the network request parameter One of number, secondary counting is carried out using acquired count results, and generate and close rule, it is described Closing management unit is additionally configured to close rule from what secondary counting unit reception was generated, And determine whether to be applied to the rule of closing received.
Preferably, the system also includes:Data outputting unit, it is configured as from described at least one Individual counting unit distinguishes count pick up result, and the count results write into Databasce that will be received.
Preferably, the network request packet is with including request URL, source IP address and/or purpose IP It is at least one in location, wherein, the request URL includes host machine part, path sections and attribute Part.
Preferably, the network request parameter includes at least one in the following:Request URL Host machine part, the path sections of request URL, the attribute section of request URL, source IP address and/ Or purpose IP address.
Preferably, the time cycle specified is the previous unit interval for terminating at current time Time cycle with the duration specified.
According to another aspect of the present invention, there is provided one kind passes through network attack detection system detectio net The method of network attack.The network attack detection system includes Network Data Capture unit, data are sent Bill is first, at least one counting unit and closing management unit.Methods described includes:The network Data capture unit receives network request packet from external data source;The data dispatch unit passes through Combination based on the source IP address in network request packet and purpose IP address carries out load balancing, will The network request packet corresponding with the source IP address closed does not distribute in the network request packet To at least one counting unit;At least one counting unit is based on different network requests The combination of parameter or network request parameter within the specified time cycle from the data dispatch unit The network request packet of reception is counted, and is generated and closed rule;And the closing management list Member receives the rule of closing generated from least one counting unit respectively, and determines whether pair The rule of closing received is applied.
Preferably, the system also includes configuration management element, and methods described also includes:Institute State configuration management element and pull configuration information update from configuration server, and resulting is matched somebody with somebody into confidence Breath renewal is accordingly sent to the data dispatch unit, at least one counting unit and/or institute State closing management unit.
Preferably, the system, which also includes the system, also includes intercepting counting unit, and described Method also includes:The data dispatch unit is by the source IP in the network request packet with being closed The corresponding network request packet in address distributes the interception counting unit;Described intercept counts list Member counts to the network request packet received from the data dispatch unit.
Preferably, when at least one counting unit includes the combination based on network request parameter During the counting unit counted, the system also includes secondary counting unit, and methods described Also include:The secondary counting unit obtains count results from the counting unit connected, and is based on One of network request parameter in the combination of the network request parameter, utilize acquired counting knot Fruit carries out secondary counting, and generates and close rule;The closing management unit is from the secondary counting What unit reception was generated closes rule, and determines whether to be applied to the rule of closing received.
Preferably, the system also includes data outputting unit, and methods described also includes:Institute Data outputting unit is stated from least one counting unit difference count pick up result, and will be connect The count results write into Databasce of receipts.
Preferably, the network request packet is with including request URL, source IP address and/or purpose IP It is at least one in location, wherein, the request URL includes host machine part, path sections and attribute Part.
Preferably, the network request parameter includes at least one in the following:Request URL Host machine part, the path sections of request URL, the attribute section of request URL, source IP address and/ Or purpose IP address.
By using network attack detection system proposed by the invention and the side of detection network attack Method, when website is brushed by force by such as DDOS attack or malicious user, it can lead to by this algorithm Cross the attack of various dimensions early warning net to threaten, so as to realize the intercept attack at web portal, after protection Hold service server normal operation.
Brief description of the drawings
Fig. 1 shows the structural frames of network attack detection system according to an embodiment of the invention Figure;
Fig. 2 shows according to an embodiment of the invention by network attack detection system detectio The flow chart of the method for network attack;
Fig. 3 shows the schematic diagram of the sliding window according to one particular embodiment of the present invention;
Fig. 4 is shown in the counter in the counting unit according to one particular embodiment of the present invention Deposit the schematic diagram of structure.
Embodiment
It is pointed out that in the description of the detailed description below of the present invention, for convenience For the sake of, partial content may be directed to specific network frame (for example, Storm frameworks, one kind are increased income Real-time streaming Computational frame) be illustrated, it is understood that, embodiments of the invention It is not limited to these specific frameworks.A kind of solution of the term " load balancing " occurred in the present invention Release the front end forwarding including being carried out to balance backend services server access pressure.It should be appreciated that , explanation of the above to the term of the present invention, which indicate that, to be easy to enter technical scheme Row details, and be not used to limit the solution of the present invention.
The present invention is specifically described below with reference to accompanying drawing.
First, Fig. 1 shows network attack detection system 100 according to an embodiment of the invention Structured flowchart.The network attack defending system 100 includes Network Data Capture unit 110, number According to dispatch unit 120, at least one counting unit 130 (3 counting units 130 are merely illustrated in Fig. 1, Here quantity is not limited) and closing management unit 140.
In one embodiment, the Network Data Capture unit 110 is configured as from external data source Receive network request packet.Preferably, the Network Data Capture unit 110 from data source (such as Message queue) newest network access data is persistently pulled, and transmit to data dispatch unit.
The network request packet is included in request URL, source IP address and/or purpose IP address extremely It is few one, wherein, the request URL includes host machine part (Host), path sections (Path) With attribute section (Param).For example, it is directed to URL:http://search.jd.com /Book/SearchKeyword=cpu, its host machine part are:Search.jd.com, its path sections For/Book/Search, its attribute section is keyword=cpu.
In one embodiment, the data dispatch unit 120 is connected to the Network Data Capture list Member 110, is configured as distributing network request packet.In the network request packet received, Including corresponding to the data for closing source IP address and corresponding to the data for not closing source IP address, corresponding to Accordingly close, rear end will not be impacted due to having employed in the data for closing source IP address, Therefore it need not be taken in again when detecting and attacking, and need to only considers to correspond to not close source The data of IP address.Specifically, the data dispatch unit 120 is by based in network request packet Source IP address and purpose IP address combination carry out load balancing, by the network request packet The network request packet corresponding with the source IP address closed is not distributed at least one counting Unit.
Certainly, still the data for the source IP address closed can be counted, the counting can For verifying system interception rate.Specifically, the system may also include:Counting unit is intercepted, even The data dispatch unit is connected to, being configured as please to the network received from the data dispatch unit Data are asked to be counted, wherein, the data dispatch unit is configured as the network request number The network request packet corresponding with the source IP address closed distributes to described intercept and counts list in Member.
It is by the meaning of data dispatch unit progress load bridging, a topology in system framework Data processing unit (such as counting unit, closing management unit etc.) and data acquisition in structure Unit (such as Network Data Capture unit etc.) may be dispersed on different server or JVM and transport OK, therefore, to can be according to the key of stream data definition when distributing data between data processing unit Value carries out load bridging, and an extra data dispatch unit is defined in topological structure.Data The combination that dispatch unit is based on " source IP address+purpose IP address " carries out data distribution as key assignments. Because the combination key assignments of " source IP address+purpose IP address " is more, so data dispatch unit is based on The combination of " source IP address+purpose IP address " carries out data distribution as key assignments can realize using more Thin granularity shunts to data payload, increases efficiency and the flexibility of shunting.
In one embodiment, at least one counting unit 130 is connected to the data dispatch unit 120, the combination based on different network request parameter or network request parameter is configured as to specifying Time cycle in from the data dispatch unit 120 receive network request packet counted, and Rule is closed in generation.Specifically, each counting unit 130 is directed to different network request parameter or net The combination of network required parameter is counted, and the network request parameter includes at least one in the following It is individual:The host machine part of request URL, the path sections of request URL, request URL attribute section, Source IP address and/or purpose IP address.For example, each counting unit 130 can be to source IP address, main frame Part and three dimensions of path sections carry out separate counts respectively, and are produced within each time cycle Count results and close rule.
Preferably, in one embodiment, when after a time cycle, counting unit 130 Counting reset, counting unit 130 restarts to count to the data in next time cycle.
Preferably, in another embodiment, the time cycle specified is when terminating at current The time cycle with the duration specified for the previous unit interval carved.Specifically, for this feelings Condition, counting unit 130 can be counted using time slip-window, and the time window corresponds to eventually The slip in cycle specified time, over time window of the unit interval terminated in before current time, meter Counting unit 130 can count to the enumeration data in a nearest time cycle at any time, and base In this rule is closed to generate.This scheme will hereinafter be carried out detailed with reference to specific embodiment Thin description.
Preferably, during rule is closed in generation, counting unit 130 will can ask for network The count results of the particular value of parameter are sought compared with the threshold value specified, and are sealed based on this to generate Prohibit rule.
For example, when the network request parameter is target ip address, corresponding counting unit The purpose IP address corresponding to network request packet received in 130 pairs of time cycles specified is carried out Count, when the counting for a purpose IP address exceedes the threshold value specified, the counting unit 130 pairs of network request numbers corresponding with the purpose IP address being counted within the time cycle Counted according to corresponding source IP address, and by the one or more (numbers of statistical magnitude highest Amount can also be preassigned) source IP address add close rule.
For another example when the network request parameter is source IP address, corresponding counting unit 130 Source IP address corresponding to the network request packet that is received in the specified time cycle is counted, When the counting for source IP address exceedes the threshold value specified, the counting unit is by the source IP Address adds and closes rule.
Preferably, counting unit 130 can be to add the source IP address appointment penalty coefficient for closing rule, The penalty coefficient of the higher source IP address of statistical magnitude is also higher.For example, penalty coefficient can be with Corresponding to closing duration, so as to the higher source IP address of statistical magnitude to close duration longer.Example again Such as, penalty coefficient may correspond to user and ask reject rate, the higher source IP address of statistical magnitude Request reject rate it is higher.
In one embodiment, it is single to be connected at least one counting for the closing management unit 140 Member 130, be configured as receiving respectively from least one counting unit 130 generated close rule Then, and determine whether to be applied to the rule of closing received.
The rule of closing of the generation of at least one counting unit 130 is uniformly sent to closing management list Member, and decide whether to be issued to such as intercept server by it and applied.The reason for so doing it One is, each closing rule has a term of validity, before the deadline It is not necessary to one Source IP address repeats to close, and otherwise can influence the efficiency of intercept server.It is further, it is possible that a certain Specific source IP address has been identified as that rear end will not be attacked that (that is, the source IP address is in In white list), then closing management unit 140 also will not be by closing under rule for the source IP address It is dealt into server.
In one embodiment, the system 100 also includes configuration management element.The configuration management Unit is configured as pulling configuration information update from configuration server, and by resulting configuration information Renewal is accordingly sent to the data dispatch unit, at least one counting unit and/or described Closing management unit.
In one embodiment, when at least one counting unit 130 includes being based on network request During the counting unit 130 that the combination of parameter is counted, the system also includes secondary counting unit. The secondary counting unit is connected to the counting that the combination based on network request parameter is counted Unit 130, and be configured as obtaining count results from the counting unit 130 connected, and be based on One of network request parameter in the combination of the network request parameter, utilize acquired counting knot Fruit carries out secondary counting, and generates and close rule.
For example, if host machine part and path sections of a certain counting unit 130 based on URL this Two network request parameters are counted, i.e. for any one host machine part and path sections Combination is counted, then the system 100 may also include the secondary counting unit for host machine part, The secondary counting unit obtains its count results from the counting unit 130, and is directed to the main frame Partial any particular value, to for the host machine part particular value and either path part particular value The count results summation of combination, as the count results for the host machine part particular value.When for After each host machine part particular value is summed respectively, the progress of Intrusion Detection based on host part has just been obtained The result of counting.
The granularity counted for parameter combination is smaller, in one embodiment, its granularity ng12 N can be expressed asg12=ng1×ng2/ N, wherein ng1It is the granularity counted just for host machine part, ng2It is the granularity with being counted just for path sections, N is total in the specified time cycle Data volume (visible, ng12Less than ng1And ng2In any one).
Using this configuration of secondary counting unit, rather than in the combination of network request parameter Each parameter independently sets a counting unit 130, can reduce the data transfer between node Amount, so as to improve the level of resources utilization.
Preferably, the closing management unit 140 is additionally configured to receive from the secondary counting unit What is generated closes rule, and determines whether to be applied to the rule of closing received.
In one embodiment, the system 100 also includes data outputting unit.The data output Unit is configured as from least one counting unit difference count pick up result, and will be received Count results write into Databasce.
Next, referring to Fig. 2.Fig. 2, which is shown, according to an embodiment of the invention passes through network The flow chart of the method 200 of attack detection system detection network attack.The network attack detection system Including Network Data Capture unit, data dispatch unit, at least one counting unit and closing management Unit.Methods described 200 starts from providing step S210, and the Network Data Capture unit is from outer Portion's data sources network request packet.Next, in step S220, the data distribute list Member is by based on the source IP address in network request packet and the combination of purpose IP address load Weighing apparatus, by network request number not corresponding with the source IP address closed in the network request packet According to distributing at least one counting unit.Next, in step S230, described at least one Combination of the individual counting unit based on different network request parameter or network request parameter is to specified The network request packet received in time cycle from the data dispatch unit is counted, and is generated Close rule.Finally, in step S240, the closing management unit is from least one meter Counting unit receives the rule of closing generated respectively, and determines whether to add the rule of closing received With application.
Preferably, the system also includes configuration management element, and methods described also includes:Institute State configuration management element and pull configuration information update from configuration server, and resulting is matched somebody with somebody into confidence Breath renewal is accordingly sent to the data dispatch unit, at least one counting unit and/or institute State closing management unit.
Preferably, the system, which also includes the system, also includes intercepting counting unit, and described Method also includes:The data dispatch unit is by the source IP in the network request packet with being closed The corresponding network request packet in address distributes the interception counting unit;Described intercept counts list Member counts to the network request packet received from the data dispatch unit.
Preferably, when at least one counting unit includes the combination based on network request parameter During the counting unit counted, the system also includes secondary counting unit, and methods described Also include:The secondary counting unit obtains count results from the counting unit connected, and is based on One of network request parameter in the combination of the network request parameter, utilize acquired counting knot Fruit carries out secondary counting, and generates and close rule;The closing management unit is from the secondary counting What unit reception was generated closes rule, and determines whether to be applied to the rule of closing received.
Preferably, the system also includes data outputting unit, and methods described also includes:Institute Data outputting unit is stated from least one counting unit difference count pick up result, and will be connect The count results write into Databasce of receipts.
Preferably, the network request packet is with including request URL, source IP address and/or purpose IP It is at least one in location, wherein, the request URL includes host machine part, path sections and attribute Part.
Preferably, the network request parameter includes at least one in the following:Request URL Host machine part, the path sections of request URL, the attribute section of request URL, source IP address and/ Or purpose IP address.
Preferably, methods described 200 is performed by the system 100 shown in Fig. 1.Above for Fig. 1 In the system 100 various specific descriptions and explanation that carry out, be equally applicable to each step of method 200 Suddenly, will not be repeated here.
Next a specific embodiment is directed to, to the counting unit counted using sliding window The algorithm and internal storage structure corresponding with used algorithm used in 130 is described in detail.
Specifically, an access counter will be safeguarded in each counting unit 130, is examined for counting For method of determining and calculating, sampling the data of a certain second merely correctly can not effectively judge to attack IP, therefore This algorithm uses the data in a nearest period as sampling interval (also referred to as data window). Simultaneously as the timeline of sampling always in continuous displacement, causes data window also in continuous displacement, Our data windows of this constantly displacement are referred to as " sliding window ", inside each counting unit 130 Counter be to possess the characteristic of sliding window.Specifically, for Java, can use embedding The mode for covering Map realizes sliding window.
Fig. 3 shows the schematic diagram of the sliding window according to one particular embodiment of the present invention.Fig. 3 Top show by the lint-long integer time multiple time points of time shaft for indicating.Thereunder, The progress of time window over time, is constantly slided along timeline, form for it is multiple not Sliding time window (1-10) in the same time.
Specifically, the counter internal storage structure of counting unit corresponding with the sliding time window can In a manner of using two-dimensional storage.Specifically, Fig. 4 shows a particular implementation according to the present invention The schematic diagram of counter internal storage structure in the counting unit of example.Correspond to the master based on URL in Fig. 4 The situation that the combination of machine part (host) and path sections (path) is counted.Wherein, from a left side Scheme visible, for each specific host and path combination, all store a sliding window counter, Have in the sliding window counter for (such as lint-long integer time point per second during sliding window 1456475226 and source IP access count list 1456475227) (referring to right figure).Each list Include each source IP address and its corresponding access times.
By each moment of identical source IP address in the list for sliding time window stored Access times are added, and have just obtained total access of the source IP address during the sliding time window time Number.Total access count in for a certain sliding window threshold value of dynamic configuration, then can Rule is closed for its generation.
Specifically, can be according to following Algorithm Analysis Host/Path access situation, and produce envelope Prohibit rule:
First, source IP address is corresponded to Host/Path according to access count descending to be ranked up (quickly Sequence, insertion sort scheduling algorithm are all suitable for);
Then, take visit capacity highest top n IP to be used as according to configuration and close punishment object (white name Except single IP), specific algorithm is as follows:Calculate top n IP access count summation;Successively to preceding N Individual IP, IP access counts/top n IP is counted into summation, so as to calculate the penalty coefficient for obtaining the source IP, The bigger source IP of visit capacity, its penalty coefficient are higher.
It should be appreciated that still, in the counting unit described above counted using sliding window The algorithm of use and internal storage structure corresponding with used algorithm are exemplary, are not used in The limitation present invention, the scheme that other are counted using sliding window are equally applicable.
Although combined the preferred embodiments of the present invention show the present invention, this area above Technical staff will be understood that, without departing from the spirit and scope of the present invention, can be right The present invention carries out various modifications, replaces and change.Therefore, the present invention should not by above-described embodiment Lai Limit, and should be limited by appended claims and its equivalent.

Claims (16)

1. a kind of network attack detection system, including:
Network Data Capture unit, it is configured as receiving network request packet from external data source;
Data dispatch unit, the Network Data Capture unit is connected to, being configured as please to network Data are asked to be distributed;
At least one counting unit, the data dispatch unit is connected to, be configured as based on difference Network request parameter or network request parameter combination within the specified time cycle from the number The network request packet received according to dispatch unit is counted, and is generated and closed rule;And
Closing management unit, be connected at least one counting unit, be configured as from it is described to Few counting unit receives the rule of closing generated respectively, and determines whether the envelope to being received Prohibit rule to be applied,
Wherein, the data dispatch unit passes through based on the source IP address and mesh in network request packet The combination of IP address carry out load balancing, by the not source with being closed in the network request packet The corresponding network request packet of IP address distributes at least one counting unit.
2. system according to claim 1, in addition to:
Configuration management element, it is configured as pulling configuration information update from configuration server, and by institute Obtained configuration information update is accordingly sent to the data dispatch unit, at least one meter Counting unit and/or the closing management unit.
3. system according to claim 1, in addition to:
Counting unit is intercepted, is connected to the data dispatch unit, is configured as to from the data The network request packet that dispatch unit receives is counted,
Wherein, the data dispatch unit be configured as by the network request packet with being closed The corresponding network request packet of source IP address distribute the interception counting unit.
4. system according to claim 1, when at least one counting unit includes base When the counting unit that the combination of network request parameter is counted, the system also includes:
Secondary counting unit, it is connected to the meter that the combination based on network request parameter is counted Counting unit, it is configured as obtaining count results from the counting unit connected, and is based on the network One of network request parameter in the combination of required parameter, two are carried out using acquired count results Secondary counting, and generate and close rule,
The closing management unit is additionally configured to receive generated envelope from the secondary counting unit Prohibit rule, and determine whether to be applied to the rule of closing received.
5. system according to claim 1, in addition to:
Data outputting unit, it is configured as from least one counting unit difference count pick up knot Fruit, and the count results write into Databasce that will be received.
6. according to the system described in any one of claim 1-5, wherein, the network request Data include request URL, source IP address and/or purpose IP address in it is at least one, wherein, institute Stating request URL includes host machine part, path sections and attribute section.
7. system according to claim 6, wherein, the network request parameter includes following It is at least one in items:The host machine part of request URL, the path sections of request URL, request URL attribute section, source IP address and/or purpose IP address.
8. according to the system described in any one of claim 1-5, wherein, it is described specify when Between the cycle be the previous unit interval for terminating at current time the time cycle with the duration specified.
9. a kind of method by network attack detection system detectio network attack, the network attack Detecting system include Network Data Capture unit, data dispatch unit, at least one counting unit and Closing management unit, methods described include:
The Network Data Capture unit receives network request packet from external data source;
The data dispatch unit by based on the source IP address in network request packet and purpose IP The combination of location carries out load balancing, by the not source IP address with being closed in the network request packet Corresponding network request packet distributes at least one counting unit;
At least one counting unit is based on different network request parameter or network request parameter Combine and the network request packet received within the specified time cycle from the data dispatch unit is entered Row counts, and generates and close rule;And
The closing management unit receives closing of being generated from least one counting unit respectively Rule, and determine whether to be applied to the rule of closing received.
10. according to the method for claim 9, wherein, the system also includes configuration management list Member, and methods described also include:
The configuration management element pulls configuration information update from configuration server, and will be resulting Configuration information update is accordingly sent to the data dispatch unit, at least one counting unit And/or the closing management unit.
11. according to the method for claim 9, wherein, the system also includes intercepting counting list Member, and methods described also include:
The data dispatch unit will be relative with the source IP address closed in the network request packet The network request packet answered distributes the interception counting unit;
The counting unit that intercepts is carried out to the network request packet received from the data dispatch unit Count.
12. according to the method for claim 9, when at least one counting unit includes base When the counting unit that the combination of network request parameter is counted, the system also includes secondary meter Counting unit, and methods described also include:
The secondary counting unit obtains count results from the counting unit connected, and based on described One of network request parameter in the combination of network request parameter, entered using acquired count results Row secondary counting, and generate and close rule;
The closing management unit receives the rule of closing generated from the secondary counting unit, and Determine whether to be applied to the rule of closing received.
13. according to the method for claim 9, wherein, the system also includes data output list Member, and methods described also include:
The data outputting unit distinguishes count pick up result from least one counting unit, and The count results write into Databasce that will be received.
14. according to the method described in any one of claim 9-13, wherein, the network please Data are asked to include at least one in request URL, source IP address and/or purpose IP address, wherein, The request URL includes host machine part, path sections and attribute section.
15. according to the method for claim 14, wherein, the network request parameter include with It is at least one in lower items:The host machine part of request URL, the path sections of request URL, ask Seek URL attribute section, source IP address and/or purpose IP address.
16. according to the method described in any one of claim 9-13, wherein, it is described to specify Time cycle is the week time with the duration specified for the previous unit interval for terminating at current time Phase.
CN201610373881.0A 2016-05-31 2016-05-31 Network attack detection system, method and computer readable storage medium Active CN107454039B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610373881.0A CN107454039B (en) 2016-05-31 2016-05-31 Network attack detection system, method and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610373881.0A CN107454039B (en) 2016-05-31 2016-05-31 Network attack detection system, method and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107454039A true CN107454039A (en) 2017-12-08
CN107454039B CN107454039B (en) 2020-05-01

Family

ID=60485002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610373881.0A Active CN107454039B (en) 2016-05-31 2016-05-31 Network attack detection system, method and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107454039B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667505A (en) * 2018-04-20 2018-10-16 广州亿航智能技术有限公司 The data processing method and computer readable storage medium of UAV Communication link
CN109194612A (en) * 2018-07-26 2019-01-11 北京计算机技术及应用研究所 A kind of network attack detecting method based on depth confidence network and SVM
WO2020088144A1 (en) * 2018-10-30 2020-05-07 扬州凤凰网络安全设备制造有限责任公司 Physical-level security server
CN111241543A (en) * 2020-01-07 2020-06-05 中国搜索信息科技股份有限公司 Method and system for intelligently resisting DDoS attack by application layer
CN111741021A (en) * 2020-08-03 2020-10-02 北京翼鸥教育科技有限公司 Detection and protection system for CC attack access service cluster
CN113810358A (en) * 2021-02-05 2021-12-17 京东科技控股股份有限公司 Access limiting method, device, computer equipment and storage medium
CN114389856A (en) * 2021-12-23 2022-04-22 南京理工大学 Network attack detection system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1527543A (en) * 2003-03-06 2004-09-08 华为技术有限公司 Network access controlling method based on virtual LAN
CN1625151A (en) * 2003-12-01 2005-06-08 华为技术有限公司 Method for realizing IPv6 message flow sorting
US20060174337A1 (en) * 2005-02-03 2006-08-03 International Business Machines Corporation System, method and program product to identify additional firewall rules that may be needed
CN102932380A (en) * 2012-11-30 2013-02-13 网宿科技股份有限公司 Distributed method and distributed system for preventing malicious attacks based on content distribution network
CN103152284A (en) * 2013-03-18 2013-06-12 神州数码网络(北京)有限公司 Method for balancing multipath output intelligent loads of router and router
CN103916389A (en) * 2014-03-19 2014-07-09 汉柏科技有限公司 Method for preventing HttpFlood attack and firewall
CN104125313A (en) * 2014-07-11 2014-10-29 广州华多网络科技有限公司 Network voting method and device
CN104137513A (en) * 2012-09-17 2014-11-05 华为技术有限公司 Protection method and device against attacks
CN104243209A (en) * 2014-09-10 2014-12-24 赛尔网络有限公司 IP address content provider label coverage statistics method
CN105471882A (en) * 2015-12-08 2016-04-06 中国电子科技集团公司第三十研究所 Behavior characteristics-based network attack detection method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1527543A (en) * 2003-03-06 2004-09-08 华为技术有限公司 Network access controlling method based on virtual LAN
CN1625151A (en) * 2003-12-01 2005-06-08 华为技术有限公司 Method for realizing IPv6 message flow sorting
US20060174337A1 (en) * 2005-02-03 2006-08-03 International Business Machines Corporation System, method and program product to identify additional firewall rules that may be needed
CN104137513A (en) * 2012-09-17 2014-11-05 华为技术有限公司 Protection method and device against attacks
CN102932380A (en) * 2012-11-30 2013-02-13 网宿科技股份有限公司 Distributed method and distributed system for preventing malicious attacks based on content distribution network
CN103152284A (en) * 2013-03-18 2013-06-12 神州数码网络(北京)有限公司 Method for balancing multipath output intelligent loads of router and router
CN103916389A (en) * 2014-03-19 2014-07-09 汉柏科技有限公司 Method for preventing HttpFlood attack and firewall
CN104125313A (en) * 2014-07-11 2014-10-29 广州华多网络科技有限公司 Network voting method and device
CN104243209A (en) * 2014-09-10 2014-12-24 赛尔网络有限公司 IP address content provider label coverage statistics method
CN105471882A (en) * 2015-12-08 2016-04-06 中国电子科技集团公司第三十研究所 Behavior characteristics-based network attack detection method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667505A (en) * 2018-04-20 2018-10-16 广州亿航智能技术有限公司 The data processing method and computer readable storage medium of UAV Communication link
CN109194612A (en) * 2018-07-26 2019-01-11 北京计算机技术及应用研究所 A kind of network attack detecting method based on depth confidence network and SVM
CN109194612B (en) * 2018-07-26 2021-05-18 北京计算机技术及应用研究所 Network attack detection method based on deep belief network and SVM
WO2020088144A1 (en) * 2018-10-30 2020-05-07 扬州凤凰网络安全设备制造有限责任公司 Physical-level security server
CN111241543A (en) * 2020-01-07 2020-06-05 中国搜索信息科技股份有限公司 Method and system for intelligently resisting DDoS attack by application layer
CN111741021A (en) * 2020-08-03 2020-10-02 北京翼鸥教育科技有限公司 Detection and protection system for CC attack access service cluster
CN113810358A (en) * 2021-02-05 2021-12-17 京东科技控股股份有限公司 Access limiting method, device, computer equipment and storage medium
CN114389856A (en) * 2021-12-23 2022-04-22 南京理工大学 Network attack detection system

Also Published As

Publication number Publication date
CN107454039B (en) 2020-05-01

Similar Documents

Publication Publication Date Title
CN107454039A (en) The method of network attack detection system and detection network attack
Xuan et al. Detecting application denial-of-service attacks: A group-testing-based approach
Xie et al. Monitoring the application-layer DDoS attacks for popular websites
CN105338061B (en) A kind of implementation method and system of lightweight messages middleware
CN104252458B (en) Data analysing method and device
CN109951500A (en) Network attack detecting method and device
Al-Haidari et al. Evaluation of the impact of EDoS attacks against cloud computing services
US20120011590A1 (en) Systems, methods and devices for providing situational awareness, mitigation, risk analysis of assets, applications and infrastructure in the internet and cloud
US9900090B1 (en) Inter-packet interval prediction learning algorithm
CN113347156B (en) Intelligent flow confusion method and system for website fingerprint defense and computer storage medium
CN106357685A (en) Method and device for defending distributed denial of service attack
Fu et al. On effectiveness of link padding for statistical traffic analysis attacks
CN107454120A (en) The method of network attack defending system and defending against network attacks
CN104092588B (en) A kind of exception flow of network detection method combined based on SNMP with NetFlow
CN102638474A (en) Application layer DDOS (distributed denial of service) attack and defense method
Nehinbe Log Analyzer for Network Forensics and Incident Reporting
CN110493043B (en) Distributed situation awareness calling method and device
JP2022521833A (en) Graph stream mining pipeline for efficient subgraph detection
US9344384B2 (en) Inter-packet interval prediction operating algorithm
CN110471975B (en) Internet of things situation awareness calling method and device
Liu et al. A clusterized firewall framework for cloud computing
Hsiao et al. Constructing an ARP attack detection system with SNMP traffic data mining
CN109246157A (en) A kind of HTTP requests at a slow speed the association detection method of dos attack
Yang et al. Anomaly detection and diagnosis in grid environments
EP2749001A2 (en) Determining validity of sip messages without parsing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221019

Address after: Room 431E, 4/F, Transportation Bureau Building, No. 95, Yingbin Avenue, Huacheng Street, Huadu District, Guangzhou, Guangdong 510800

Patentee after: Guangzhou Huadu Jingdong Smart City Digital Technology Co.,Ltd.

Address before: 100080 Haidian District, Beijing, 65 Xing Shu Kou Road, 11C, west section of the western part of the building, 1-4 stories West 1-4 story.

Patentee before: BEIJING JINGDONG SHANGKE INFORMATION TECHNOLOGY Co.,Ltd.

Patentee before: BEIJING JINGDONG CENTURY TRADING Co.,Ltd.