CN107566320A - A kind of network kidnaps detection method, device and network system - Google Patents

A kind of network kidnaps detection method, device and network system Download PDF

Info

Publication number
CN107566320A
CN107566320A CN201610509488.XA CN201610509488A CN107566320A CN 107566320 A CN107566320 A CN 107566320A CN 201610509488 A CN201610509488 A CN 201610509488A CN 107566320 A CN107566320 A CN 107566320A
Authority
CN
China
Prior art keywords
network
address
source
port
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610509488.XA
Other languages
Chinese (zh)
Other versions
CN107566320B (en
Inventor
王凯
肖耀高
李嵘
杨波
刘洪波
彭滔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201610509488.XA priority Critical patent/CN107566320B/en
Publication of CN107566320A publication Critical patent/CN107566320A/en
Application granted granted Critical
Publication of CN107566320B publication Critical patent/CN107566320B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of network to kidnap detection method, device and network system, is related to communication technical field, method therein includes:Gather the netflow data bag that routing device is sent in objective network;Obtain the routing iinformation of routing device in objective network;Judge whether netflow data bag is abnormal network data according to routing iinformation;If netflow data bag is abnormal network data, whether the routing device for determining to send abnormal network data based on abduction judgment rule is holding equipment of being robbed.The method, apparatus and network system of the present invention, detection method is kidnapped using multistage network, whether collection netflow data Preliminary detection first there is Abnormal network traffic, the traffic policy function of the network equipment is recycled to carry out real-time traffic statistics and carry out packet capturing analysis in real time using the image feature of network equipment port, network can be accurately positioned and kidnap point, and the Efficiency and accuracy of detection can be improved, reduce computing cost and improve Consumer's Experience.

Description

A kind of network kidnaps detection method, device and network system
Technical field
The present invention relates to communication technical field, more particularly to a kind of network to kidnap detection method, device With network system.
Background technology
Network kidnaps the request of the usually monitoring users in customer access network, some when matching During specified conditions, return to one in the forward direction user of destination server and redirect response, redirect user The purpose network address accessed to other network address rather than user.The webpage redirected is probably fishing website, Or include wooden horse, bullet frame advertisement etc..As shown in figure 1, P is provided with Metropolitan Area Network (MAN) 11st, 12, the access request of user equipment 13,14 is sent to P 11,12, and from P 11,12 receives the network response data returned.Disposed on the side of P 12 The equipment 15 of one bypass, equipment 15, which gathers spectral fluxes information and monitored, all flows through key road By the flow of device 12.The light splitting collection position of equipment 15 can be divided in Metropolitan Area Network (MAN) egress router It can also be divided in P, gather user's surfing flow information, if DNS is exported It is User DN S solicited messages to be divided then gather, if RADIUS outlets then gather be User's RADIUS request information.
Equipment 15 carries out specially treated according to certain rule or strategy for some requests.Work as user When P 12 is flowed through in the request that equipment 14 is sent, if Transmission Control Protocol, then Equipment 15 according to the seq and ack of the request, as response wrap, and passes through key road by generation data User equipment 14 is sent to by device 12.If udp protocol, then equipment 15 directly generates number According to as bag is responded, user equipment 14 is sent to.Because the response bag that equipment 15 generates compares user The normal bag that the server end that equipment 14 accesses is sent is sent in advance, therefore works as real server , can be by the message as mistake without being received when end data sends over.What equipment 15 was sent False data bag commonly 302 redirects instruction, and guiding client jumps to new link, such as Advertisement etc., influence the usage experience of user and economic loss may be brought to user.
The content of the invention
In view of this, the invention solves a technical problem be to provide a kind of network and kidnap detection Method, apparatus and network system.
According to an aspect of the present invention, there is provided a kind of network kidnaps detection method, including:Collection The netflow data bag that routing device is sent in objective network;Obtain and route in the objective network The routing iinformation of equipment;Judge whether the netflow data bag is different according to the routing iinformation Normal network data;If the netflow data bag is abnormal network data, sentenced based on abduction Whether the routing device that disconnected rule determines to send the abnormal network data is holding equipment of being robbed.
Alternatively, it is described to judge whether the netflow data bag is different according to the routing iinformation Normal network data includes:Source address information is extracted from the netflow data bag;Obtain and send The route table items of the routing device of the netflow data bag;By the source address information with it is described Source address in route table items matches, if source address identical route table items can not be matched, It is abnormal network data then to determine the netflow data bag.
Alternatively, the source address information of being extracted from the netflow data bag includes:From institute State and source IP address and source port number are extracted in netflow data bag;It is described to believe the source address Breath with the routing table match including:Before the source IP address or the source IP address Sew, source port number is carried out with the source address in the route table items or source address prefix, source port number Matching.
Alternatively, based on the routing device for kidnapping the judgment rule determination transmission abnormal network data Whether it is that holding equipment of being robbed includes:It is determined that send routing device and the end of the abnormal network data Mouthful;Count the number with the abnormal network data with same source information that the port is sent According to the flow of bag;When the flow is more than default flow threshold, it is determined that the port is quilt Kidnap the abduction port of equipment.
Alternatively, when the flow is less than default flow threshold, then capture the port and send There is the packet of same source information with the abnormal network data, and obtained from packet Access network address and target is taken to redirect network address;Record is redirected according to network address and determines that the target redirects network address Whether it is to redirect network address safely, if it is not, then determining that the port is the abduction end of holding equipment of being robbed Mouthful.
Alternatively, when the flow is less than default flow threshold, then capture the port and send There is the packet of same source information with the abnormal network data, and obtained from packet Take domain name and IP address;Pair of domain name and the IP address is determined according to the domain name rule of correspondence Should be related to it is whether correct, if it is not, then determining that the port is the abduction port of holding equipment of being robbed.
According to another aspect of the present invention, there is provided a kind of network kidnaps detection means, including:Data Acquisition module, for gathering the netflow data bag that routing device is sent in objective network;Route Acquisition module, for obtaining the routing iinformation of routing device in the objective network;It is abnormal to determine mould Block, for judging whether the netflow data bag is abnormal network number according to the routing iinformation According to;Locating module is kidnapped, if being abnormal network data for the netflow data bag, Whether the routing device for determining to send the abnormal network data based on abduction judgment rule is to be held as a hostage Equipment.
Alternatively, the abnormal determining module, including:Source address extraction unit, for from described Source address information is extracted in netflow data bag;Route table items determining unit, sent for obtaining The route table items of the routing device of the netflow data bag, route table items matching unit, are used for The source address information and the source address in the route table items are matched, if can not match Source address identical route table items, it is determined that the netflow data bag is abnormal network data.
Alternatively, the source address extraction unit, for being extracted from the netflow data bag Source IP address and source port number;The route table items matching unit, for by the source IP address Or the prefix of the source IP address, source port number are with the source address in the route table items or source Location prefix, source port number are matched.
Alternatively, the abduction locating module, including:Equipment determining unit, for determining to send The routing device of the abnormal network data and port;Traffic statistics unit, for counting the end The flow for the packet with the abnormal network data with same source information that mouth is sent;End Mouth positioning unit, for when the flow is more than default flow threshold, it is determined that the port For the abduction port for holding equipment of being robbed.
Alternatively, the abduction locating module, including:Data grabber unit is redirected, for working as When stating flow and being less than default flow threshold, then it is sending with the abnormal network to capture the port Data have the packet of same source information, and are obtained from packet and access network address and target Redirect network address;Data detecting unit is redirected, determines that the target is jumped for redirecting record according to network address Turn whether network address is to redirect network address safely, if it is not, then determining that the port is holding equipment of being robbed Kidnap port.
Alternatively, the abduction locating module, including:Domain name data placement unit, for working as When stating flow and being less than default flow threshold, then it is sending with the abnormal network to capture the port Data have the packet of same source information, and from packet with obtaining domain name and IP Location;Domain name data detection unit, for determining domain name and the IP according to the domain name rule of correspondence Whether the corresponding relation of address is correct, if it is not, then determining that the port is the misfortune of holding equipment of being robbed Hold port.
According to another aspect of the invention, there is provided a kind of network system, including network as described above Kidnap detection means.
The network of the present invention kidnaps detection method, device and network system, is kidnapped using multistage network Detection method, netflow data is gathered first and detects whether abnormal, the recycling network equipment occur Traffic policy function carry out real-time traffic statistics and real using the image feature of network equipment port Shi Jinhang packet capturings are analyzed, and can be accurately positioned network abduction point and be reached monitoring and prevent network and kidnap Effect.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will The required accompanying drawing used in embodiment or description of the prior art is briefly described, it is aobvious and easy Insight, drawings in the following description are only some embodiments of the present invention, common for this area , without having to pay creative labor, can also be according to these accompanying drawings for technical staff Obtain other accompanying drawings.
Fig. 1 is the network topological diagram of the prior art for including holding equipment of being robbed;
Fig. 2 is that the flow of the one embodiment for kidnapping detection method according to the network of the present invention is illustrated Figure;
Fig. 3 is that the module of the one embodiment for kidnapping detection means according to the network of the present invention is illustrated Figure;
Fig. 4 is that the abnormal determination in one embodiment of detection means is kidnapped according to the network of the present invention The module diagram of module;
Fig. 5 is that the abduction kidnapped according to the network of the present invention in one embodiment of detection means positions The module diagram of module.
Embodiment
The present invention is described more fully with reference to the accompanying drawings, wherein illustrating the example of the present invention Property embodiment.Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the skill in the embodiment of the present invention Art scheme is clearly and completely described, it is clear that described embodiment is only the present invention one Section Example, rather than whole embodiments.It is general based on the embodiment in the present invention, this area The every other embodiment that logical technical staff is obtained under the premise of creative work is not made, all Belong to the scope of protection of the invention.With reference to each figure and embodiment to technical scheme Carry out many descriptions.
Fig. 2 is that the flow of the one embodiment for kidnapping detection method according to the network of the present invention is illustrated Figure, as shown in Figure 2:
Step 201, the netflow data bag that routing device is sent in objective network is gathered.
NetFlow is a kind of data exchange ways, there is provided the session level view of network traffics, record The information of each TCP/IP affairs.Netflow systems include detector and collector, detector For monitoring network data, collector is collected the data that detector transmits, can adopted by collector Collect the netflow data bag that the routing device in objective network is sent.Objective network can be metropolitan area Net, provincial net, whole nation net etc., routing device can be edge router, core router etc..
Step 202, the routing iinformation of routing device in objective network is obtained.
Routing iinformation in objective network can be configured in advance, and routing iinformation can be route Routing table in equipment etc., routing iinformation can be obtained from OSS.In usual the whole network IP address is divided and distributed, and can determine which net is this IP address belong to by IP address Network or area.
Step 203, judge whether netflow data bag is abnormal network number according to routing iinformation According to.
The netflow data bag of collection can be stored in netflow data storehouse, used Initial data is organized into normalized data by NetFlow preprocess methods.Sentenced according to routing iinformation Whether the data in disconnected netflow data storehouse are abnormal network data.
Step 204, if netflow data bag is abnormal network data, judged based on kidnapping Whether the routing device that rule determines to send abnormal network data is holding equipment of being robbed.
Network in above-described embodiment kidnaps detection method, and router device in a network is switched on NetFlow detection functions, collection netflow data bag is simultaneously analyzed, preliminary to judge Whether netflow data bag is abnormal data bag, and further determines that holding equipment of being robbed.
For example, open NetFlow and send to acquisition system, in Cisco GSR routers The configuration order example that Netflow is opened on GigabitEthernet10/0 ports is as follows:
ip flow-export source Loopback0;
ip flow-export destination*.*.*.61 9995;
ip flow-sampling-mode packet-interval 100;
interface GigabitEthernet10/0;
ip route-cache flow sampled。
The Netflow data for being flowed into GigabitEthernet10/0 are sent to by the configuration NetFlow collector * .*.*.61, using sampled patterns, sampling interval 100:1.
Source address information is extracted from netflow data bag, obtains and sends netflow data bag The route table items of routing device.Source address information and the source address in route table items are matched, such as Fruit can not match source address identical route table items, it is determined that netflow data bag is abnormal net Network data.
Netflow data include source IP address, purpose IP address, source port, destination Mouth, protocol type, bag quantity, byte number etc..The extraction source IP from netflow data bag Location and source port number, by the prefix of source IP address or source IP address, source port number and route table items In source address or source address prefix, source port number matched.
For example, collecting the edge router B that A is saved in core net sends netflow data Bag, gets the configuration informations such as edge router B routing table and routing link.From Source IP address and source port number are extracted in netflow data bag, by the prefix of source IP address and source Port numbers are matched with the source address prefix in edge router B routing table, source port number, When the match is successful, it is determined that be abnormal network data.For example, sent from edge router B Netflow data bag in the source IP address that extracts the IP address of distribution, edge road are saved for D There is no the prefix of the IP address of D provinces distribution by the source address prefix of device B route table items, then have Be probably miscellaneous equipment generation false data bag and be sent to edge router B.
When it is determined that there is abnormal network data, can be opened on routing device real-time traffic count into One step is confirmed, must remove statistics strategy after statistics.It is determined that send abnormal network number According to routing device and port, statistics port send there is same source with abnormal network data The flow of the packet of information, when flow is more than default flow threshold, it is determined that this port is It is robbed the abduction port of holding equipment.
For example, determine that edge router B have received false network data, false network data Source address is the IP address that D saves distribution, statistics edge router B each port send with D saves the flow that the IP address distributed has the packet of same source information.When edge is route When device B C-terminal mouth flow is more than default flow threshold, it is determined that C-terminal mouth sets to be held as a hostage Standby abduction port, i.e. miscellaneous equipment send false data by edge router B C-terminal mouth Bag, then edge router B is is robbed holding equipment, and C-terminal mouth is the abduction port of holding equipment of being robbed.
When flow is more than default flow threshold, it can directly determine that port is holding equipment of being robbed Kidnap port.And flow then needs to further determine that, and adopt when being less than default flow threshold Used in the mode of routing device Port Mirroring packet capturing, be accurately positioned network kidnap point and reach monitoring and Prevent the effect that network is kidnapped.
For false network data, dns address and main website can be monitored, such as Www.baidu.com, www.qq.com, www.163.com etc..When flow is less than default During flow threshold, then capture port transmission has same source information with abnormal network data Packet, and acquisition accesses network address from packet and target redirects network address.Note is redirected according to network address Record determines that target redirects whether network address is to redirect network address safely, if it is not, then determining port to be robbed The abduction port of holding equipment.
For example, obtaining current access network address in current network address access instruction and target redirects net Location, record can be redirected according to network address and determines that the safety of current access network address redirects network address.Network address Redirect record can according to the configuration of operator, or by history access data counted and It is determined that network address redirect be provided with record it is corresponding with accessing network address it is safe redirect network address, or jump Turn the white list of network address.Record is redirected according to network address and determines that safety redirects network address, and then according to safety Redirect network address and judge that target redirects whether network address is held as a hostage, can find to kidnap immediately.
In one embodiment, when flow is less than default flow threshold, then capture port and send There is the packet of same source information with abnormal network data, and domain is obtained from packet Name and IP address.Whether just the corresponding relation of domain name and IP address is determined according to the domain name rule of correspondence Really, if it is not, then determining that port is the abduction port of holding equipment of being robbed.
For example, abc.com is a TLD, can there are second level domain, three under TLD Level domain name, if news.abc.com is a second level domain.DNS(Domain Name System, computer domain name system) it is made up of resolver and name server, domain name service Device refers to preserve the domain name of All hosts and corresponding IP address in the network, and has domain name Be converted to the server of IP address function.By DNS people can be made more easily to access interconnection Net, without spending, remember can be by IP address digit string that machine is directly read.
The correct corresponding relation of domain name and IP address is provided with the domain name rule of correspondence.Domain name and IP The correct corresponding relation of address can be counted by historical data to it, can also be by operator It is configured.Domain name and IP address are obtained from packet, judges whether its corresponding relation occurs In the domain name rule of correspondence, if it is not, then can be concluded that the web page access of user receives DNS Kidnap, i.e., miscellaneous equipment imitates dns server and returns to a wrong analysis result, domain name solution Analyse abnormal, user is had access to other webpages.
Network in above-described embodiment kidnaps detection method, is carried out just using NetFlow functions are opened Step judges whether exception occur, recycles the Traffic policy traffic policies of the network equipment and enters Row Port mirror mirror images packet capturing analysis carries out navigating to abduction point, can be accurately positioned network misfortune Hold a little and have the function that to monitor and prevent network and kidnap, and the efficiency of detection and accurate can be improved Degree.
Include as shown in figure 3, the present invention provides a kind of network abduction detection means 30:Data are adopted Collect module 31, route acquisition module 32, abnormal determining module 33 and kidnap locating module 34.Number The netflow data bag that routing device is sent in objective network is gathered according to acquisition module 31.Route Acquisition module 32 obtains the routing iinformation of routing device in objective network.Abnormal determining module 33 Judge whether netflow data bag is abnormal network data according to routing iinformation.If NetFlow numbers It is abnormal network data according to bag, then kidnaps locating module 34 and determine to send based on judgment rule is kidnapped Whether the routing device of abnormal network data is holding equipment of being robbed.
As shown in figure 4, abnormal determining module 33 includes:Source address extraction unit 331, routing table Item determining unit 332 and route table items matching unit 333.Source address extraction unit 331 from Source address information is extracted in netflow data bag.Route table items determining unit 332, which obtains, to be sent The route table items of the routing device of netflow data bag, route table items matching unit 333 is by source Location information matches with the source address in route table items, if source address identical road can not be matched By list item, it is determined that netflow data bag is abnormal network data.
Source address extraction unit 331 extracts source IP address and source port from netflow data bag Number.Route table items matching unit 333 is by the prefix of source IP address or source IP address, source port number Matched with the source address in route table items or source address prefix, source port number.
As shown in figure 5, kidnapping locating module 34 includes:Equipment determining unit 341, traffic statistics Unit 342, port locations unit 343, redirect data grabber unit 344, redirect Data Detection list Member 345, domain name data placement unit 346 and domain name data detection unit 347.
Equipment determining unit 341 determines to send routing device and the port of abnormal network data.Flow Statistic unit 342 counts the number with abnormal network data with same source information that port is sent According to the flow of bag.Port locations unit 343 is when flow is more than default flow threshold, it is determined that Port is the abduction port of holding equipment of being robbed.
Data grabber unit 344 is redirected when flow is less than default flow threshold, then captures port What is sent has the packet of same source information with abnormal network data, and is obtained from packet Access network address and target is taken to redirect network address.Redirect data detecting unit 345 and record is redirected according to network address Determine that target redirects whether network address is to redirect network address safely, if it is not, then determining port to be held as a hostage The abduction port of equipment.
Domain name data placement unit 346 then captures port when flow is less than default flow threshold What is sent has the packet of same source information with abnormal network data, and is obtained from packet Take domain name and IP address.Domain name data detection unit 347 determines domain name according to the domain name rule of correspondence It is whether correct with the corresponding relation of IP address, if it is not, then determining that port is holding equipment of being robbed Kidnap port.
In one embodiment, the present invention provides a kind of network system, including network abduction as above Detection means.
The network provided in above-described embodiment kidnaps detection method, device and network system, using more Level network kidnaps detection method, gathers netflow data first and detects whether abnormal network stream occur Amount, primarily determines that false data, recycles the traffic policy function of the network equipment to carry out real-time traffic Count and carry out packet capturing analysis in real time using the image feature of network equipment port, can accurately determine Position network kidnaps point and has the function that to monitor and prevent network and kidnaps, and can improve the effect of detection Rate and accuracy, reduce computing cost and improve Consumer's Experience.
The method and system of the present invention may be achieved in many ways.For example, can be by soft Part, hardware, firmware or software, hardware, firmware any combinations come realize the present invention side Method and system.The said sequence of the step of for method is of the invention merely to illustrate The step of method, is not limited to order described in detail above, unless specifically stated otherwise. In addition, in certain embodiments, the present invention can be also embodied as recording journey in the recording medium Sequence, these programs include being used for the machine readable instructions for realizing the method according to the invention.Cause And the record that the present invention also covering storage is used to perform the program of the method according to the invention is situated between Matter.
Description of the invention provides for the sake of example and description, and is not exhaustively Or limit the invention to disclosed form.Common skill of many modifications and variations for this area It is obvious for art personnel.Selection and description embodiment are to more preferably illustrate the principle of the present invention And practical application, and make one of ordinary skill in the art it will be appreciated that the present invention is suitable so as to design In the various embodiments with various modifications of special-purpose.

Claims (13)

1. a kind of network kidnaps detection method, it is characterised in that including:
Gather the netflow data bag that routing device is sent in objective network;
Obtain the routing iinformation of routing device in the objective network;
Judge whether the netflow data bag is abnormal network data according to the routing iinformation;
If the netflow data bag is abnormal network data, based on kidnapping, judgment rule is true Whether the routing device for sending the abnormal network data surely is holding equipment of being robbed.
2. the method as described in claim 1, it is characterised in that described to be believed according to the route Breath judges whether the netflow data bag is that abnormal network data include:
Source address information is extracted from the netflow data bag;
Obtain the route table items for the routing device for sending the netflow data bag;
The source address information and the source address in the route table items are matched, if can not It is fitted on source address identical route table items, it is determined that the netflow data bag is abnormal network number According to.
3. method as claimed in claim 2, it is characterised in that described from the NetFlow Source address information is extracted in packet to be included:
Source IP address and source port number are extracted from the netflow data bag;
It is described by the source address information and the routing table match including:
By the prefix of the source IP address or the source IP address, source port number and the routing table Source address or source address prefix, source port number in are matched.
4. method as claimed in claim 2 or claim 3, it is characterised in that judge rule based on kidnapping Whether the routing device for then determining to send the abnormal network data is that holding equipment of being robbed includes:
It is determined that send routing device and the port of the abnormal network data;
Count the number with the abnormal network data with same source information that the port is sent According to the flow of bag;
When the flow is more than default flow threshold, it is determined that the port is holding equipment of being robbed Abduction port.
5. method as claimed in claim 4, it is characterised in that including:
When the flow is less than default flow threshold, then capture that the port sends with it is described Abnormal network data have the packet of same source information, and are obtained from packet and access net Location and target redirect network address;
Record is redirected according to network address and determines that the target redirects whether network address is to redirect network address safely, such as Fruit is no, it is determined that the port is the abduction port of holding equipment of being robbed.
6. method as claimed in claim 4, it is characterised in that including:
When the flow is less than default flow threshold, then capture that the port sends with it is described Abnormal network data have a packet of same source information, and obtain from packet domain name and IP address;
Whether just the corresponding relation of domain name and the IP address is determined according to the domain name rule of correspondence Really, if it is not, then determining that the port is the abduction port of holding equipment of being robbed.
7. a kind of network kidnaps detection means, it is characterised in that including:
Data acquisition module, for gathering the netflow data that routing device is sent in objective network Bag;
Route acquisition module, for obtaining the routing iinformation of routing device in the objective network;
Abnormal determining module, for judging that the netflow data bag is according to the routing iinformation No is abnormal network data;
Locating module is kidnapped, if being abnormal network data for the netflow data bag, Whether the routing device for determining to send the abnormal network data based on abduction judgment rule is to be held as a hostage Equipment.
8. device as claimed in claim 7, it is characterised in that:
The abnormal determining module, including:
Source address extraction unit, for extracting source address information from the netflow data bag;
Route table items determining unit, the routing device of the netflow data bag is sent for obtaining Route table items,
Route table items matching unit, for by the source in the source address information and the route table items Addresses match, if source address identical route table items can not be matched, it is determined that described Netflow data bag is abnormal network data.
9. device as claimed in claim 8, it is characterised in that:
The source address extraction unit, for the extraction source IP from the netflow data bag Location and source port number;
The route table items matching unit, for by the source IP address or the source IP address Prefix, source port number and the source address in the route table items or source address prefix, source port number are entered Row matching.
10. device as claimed in claim 8 or 9, it is characterised in that:
The abduction locating module, including:
Equipment determining unit, for determining routing device and the end of the transmission abnormal network data Mouthful;
Traffic statistics unit, for counting having with the abnormal network data for the port transmission The flow of the packet of same source information;
Port locations unit, for when the flow is more than default flow threshold, it is determined that institute It is the abduction port of holding equipment of being robbed to state port.
11. method as claimed in claim 10, it is characterised in that:
The abduction locating module, including:
Data grabber unit is redirected, for when the flow is less than default flow threshold, then grabbing The packet with the abnormal network data with same source information for taking the port to send, And acquisition accesses network address from packet and target redirects network address;
Data detecting unit is redirected, determines that the target redirects network address for redirecting record according to network address Whether it is to redirect network address safely, if it is not, then determining that the port is the abduction end of holding equipment of being robbed Mouthful.
12. device as claimed in claim 11, it is characterised in that:
The abduction locating module, including:
Domain name data placement unit, for when the flow is less than default flow threshold, then grabbing The packet with the abnormal network data with same source information for taking the port to send, And domain name and IP address are obtained from packet;
Domain name data detection unit, for determining domain name and the IP according to the domain name rule of correspondence Whether the corresponding relation of address is correct, if it is not, then determining that the port is the misfortune of holding equipment of being robbed Hold port.
A kind of 13. network system, it is characterised in that:
Detection means is kidnapped including the network as described in any one of claim 7 to 12.
CN201610509488.XA 2016-06-30 2016-06-30 Network hijacking detection method, device and network system Active CN107566320B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610509488.XA CN107566320B (en) 2016-06-30 2016-06-30 Network hijacking detection method, device and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610509488.XA CN107566320B (en) 2016-06-30 2016-06-30 Network hijacking detection method, device and network system

Publications (2)

Publication Number Publication Date
CN107566320A true CN107566320A (en) 2018-01-09
CN107566320B CN107566320B (en) 2020-05-26

Family

ID=60968832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610509488.XA Active CN107566320B (en) 2016-06-30 2016-06-30 Network hijacking detection method, device and network system

Country Status (1)

Country Link
CN (1) CN107566320B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108920589A (en) * 2018-06-26 2018-11-30 百度在线网络技术(北京)有限公司 Browsing kidnaps recognition methods, device, server and storage medium
CN109639793A (en) * 2018-12-10 2019-04-16 广东浪潮大数据研究有限公司 A kind of cluster NAS system monitoring method, device, equipment and medium
WO2019136954A1 (en) * 2018-01-15 2019-07-18 深圳市联软科技股份有限公司 Method for detecting network compliance, apparatus, device and medium
CN112287252A (en) * 2020-10-26 2021-01-29 平安科技(深圳)有限公司 Website domain name hijacking detection method, device, equipment and storage medium
CN112398699A (en) * 2020-12-01 2021-02-23 杭州迪普科技股份有限公司 Network traffic packet capturing method, device and equipment
CN114006803A (en) * 2021-09-29 2022-02-01 中盈优创资讯科技有限公司 Burst alarm method of netflow based on AS and prefix
CN114124464A (en) * 2021-10-27 2022-03-01 中盈优创资讯科技有限公司 Automatic unsealing method and device for hijacked route
CN115021984A (en) * 2022-05-23 2022-09-06 绿盟科技集团股份有限公司 Network security detection method and device, electronic equipment and storage medium
CN115664833A (en) * 2022-11-03 2023-01-31 天津大学 Network hijacking detection method based on local area network security equipment
CN116346774A (en) * 2023-02-16 2023-06-27 北京有元科技有限公司 Network flow data query system based on DNS (Domain name System) route

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897541A (en) * 2005-07-15 2007-01-17 华为技术有限公司 Method for realizing network sampling
CN101562534A (en) * 2009-05-26 2009-10-21 中山大学 Network behavior analytic system
CN101848160A (en) * 2010-05-26 2010-09-29 钱叶魁 Method for detecting and classifying all-network flow abnormity on line
CN102130800A (en) * 2011-04-01 2011-07-20 苏州赛特斯网络科技有限公司 Device and method for detecting network access abnormality based on data stream behavior analysis
CN105100061A (en) * 2015-06-19 2015-11-25 小米科技有限责任公司 Method and device for detecting hijacking of website
CN105429975A (en) * 2015-11-11 2016-03-23 上海斐讯数据通信技术有限公司 Data safety defense system and method based on cloud terminal, and cloud terminal safety system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897541A (en) * 2005-07-15 2007-01-17 华为技术有限公司 Method for realizing network sampling
CN101562534A (en) * 2009-05-26 2009-10-21 中山大学 Network behavior analytic system
CN101848160A (en) * 2010-05-26 2010-09-29 钱叶魁 Method for detecting and classifying all-network flow abnormity on line
CN102130800A (en) * 2011-04-01 2011-07-20 苏州赛特斯网络科技有限公司 Device and method for detecting network access abnormality based on data stream behavior analysis
CN105100061A (en) * 2015-06-19 2015-11-25 小米科技有限责任公司 Method and device for detecting hijacking of website
CN105429975A (en) * 2015-11-11 2016-03-23 上海斐讯数据通信技术有限公司 Data safety defense system and method based on cloud terminal, and cloud terminal safety system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WUSOFTIGER: "使用NetFlow分析网络异常流量", 《百度文库》 *
杨波,王凯: "一种分光劫持干扰的定位处理方法", 《信息安全与技术》 *
蒋琰: "基于Netflow的网络数据流量分析与异常检测系统的研究与实现", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019136954A1 (en) * 2018-01-15 2019-07-18 深圳市联软科技股份有限公司 Method for detecting network compliance, apparatus, device and medium
CN108920589A (en) * 2018-06-26 2018-11-30 百度在线网络技术(北京)有限公司 Browsing kidnaps recognition methods, device, server and storage medium
CN109639793A (en) * 2018-12-10 2019-04-16 广东浪潮大数据研究有限公司 A kind of cluster NAS system monitoring method, device, equipment and medium
CN112287252A (en) * 2020-10-26 2021-01-29 平安科技(深圳)有限公司 Website domain name hijacking detection method, device, equipment and storage medium
CN112287252B (en) * 2020-10-26 2023-07-21 平安科技(深圳)有限公司 Method, device, equipment and storage medium for detecting website domain name hijacking
CN112398699B (en) * 2020-12-01 2022-11-25 杭州迪普科技股份有限公司 Network traffic packet capturing method, device and equipment
CN112398699A (en) * 2020-12-01 2021-02-23 杭州迪普科技股份有限公司 Network traffic packet capturing method, device and equipment
CN114006803A (en) * 2021-09-29 2022-02-01 中盈优创资讯科技有限公司 Burst alarm method of netflow based on AS and prefix
CN114006803B (en) * 2021-09-29 2024-01-05 中盈优创资讯科技有限公司 Burst alarm method of netflow flow based on AS and prefix
CN114124464A (en) * 2021-10-27 2022-03-01 中盈优创资讯科技有限公司 Automatic unsealing method and device for hijacked route
CN114124464B (en) * 2021-10-27 2023-08-08 中盈优创资讯科技有限公司 Automatic unpacking method and device for hijacked route
CN115021984A (en) * 2022-05-23 2022-09-06 绿盟科技集团股份有限公司 Network security detection method and device, electronic equipment and storage medium
CN115021984B (en) * 2022-05-23 2024-02-13 绿盟科技集团股份有限公司 Network security detection method and device, electronic equipment and storage medium
CN115664833A (en) * 2022-11-03 2023-01-31 天津大学 Network hijacking detection method based on local area network security equipment
CN115664833B (en) * 2022-11-03 2024-04-02 天津大学 Network hijacking detection method based on local area network safety equipment
CN116346774A (en) * 2023-02-16 2023-06-27 北京有元科技有限公司 Network flow data query system based on DNS (Domain name System) route

Also Published As

Publication number Publication date
CN107566320B (en) 2020-05-26

Similar Documents

Publication Publication Date Title
CN107566320A (en) A kind of network kidnaps detection method, device and network system
CN101924757B (en) Method and system for reviewing Botnet
KR101010302B1 (en) Security management system and method of irc and http botnet
CN103442008B (en) A kind of routing safety detecting system and detection method
US8307441B2 (en) Log-based traceback system and method using centroid decomposition technique
CN108063765B (en) SDN system suitable for solving network security
JP4556981B2 (en) Network monitoring apparatus and network monitoring method
CN101247217B (en) Method, unit and system for preventing address resolution protocol flux attack
CN108429761B (en) DDoS attack detection and defense method for resource adaptation analysis server in intelligent cooperative network
CN108701187A (en) Mixed hardware software distribution threat analysis
US20140047543A1 (en) Apparatus and method for detecting http botnet based on densities of web transactions
CN109951459A (en) A kind of ARP spoofing attack detection method based on local area network
CN107888605A (en) A kind of Internet of Things cloud platform traffic security analysis method and system
CN107948199A (en) A kind of method and device being used for quickly detecting to terminal shared access
CN110225062A (en) A kind of method and apparatus monitoring network attack
CN102984003A (en) Network access detection system and network access detection method
CN106790073B (en) Blocking method and device for malicious attack of Web server and firewall
CN104486320A (en) Intranet sensitive information disclosure evidence collection system and method based on honeynet technology
CN105812324B (en) The method, apparatus and system of IDC information security management
CN101159636A (en) System and method for detecting illegal access
KR102211503B1 (en) Harmful ip determining method
KR20030057269A (en) IP Public ownership flag detection system and the method
WO2017070965A1 (en) Data processing method based on software defined network and related device
CN102957581A (en) Network access detection system and network access detection method
CN109040137A (en) For detecting the method, apparatus and electronic equipment of man-in-the-middle attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant