Reflection amplifier identification method based on active and passive combination
Technical Field
The invention relates to the technical field of network information security, in particular to a reflection amplifier identification method based on active and passive combination.
Background
In the reflection attack, an attacker controls a controlled host to forge a source IP address to a reflector to be a large number of data packets of an attack target IP address, and after the reflector receives the data packets, the data packets are considered to be the request sent by the attack target, so that response data can be sent to the attacked target. When a large number of response data packets flood to an attack target, network bandwidth resources of the target can be exhausted, and denial of service attack is caused.
At present, reflection amplification attack is one of the most destructive attack forms at present, and is the largest complete threat on the internet, and the reflection amplification attack occupies the dominant position, and the reflection amplifier is an indispensable part in the reflection amplification attack, for the reflection amplification attack, once the flow is amplified, the occupied bandwidth will sharply rise, and no matter what kind of protection method is adopted, the cost and the cost will sharply rise, so the reflection amplification attack can be effectively relieved by treating the reflection point, and the premise that the reflection amplifier is treated by the reflection point is accurately and quickly identified, in the prior art, the reflection amplifier identification generally uses the traditional network scanning method, the method utilizes the characteristics of the reflection amplifier, so different identification methods are provided for different reflection amplifiers, and the method is an active mode, the method has the problems of long time consumption, large consumed bandwidth and high error rate, and in addition, the method cannot identify the unknown type of reflection amplifier because the active scanning method needs the characteristics of the known reflection amplifier.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a reflection amplifier identification method based on active and passive combination, and solves the problems that the traditional reflection amplifier identification network scanning method is long in time consumption, large in consumption bandwidth, high in error rate and difficult in identification of unknown amplifiers.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: a reflection amplifier identification method based on active and passive combination comprises the following operation steps:
s1, constructing an identification system: setting a model training module, an unknown attack detection module, a model updating module, a reflection amplifier data collection module and a reflection amplifier IP library to form an identification system;
s2, constructing an attack detection module: collecting known reflection amplifier data, transmitting the data to a model training module, and training to generate an attack detection model by using a feature selection algorithm;
s3, detecting the type of the reflection amplification attack: inputting the flow into an attack detection module constructed in S2, detecting whether a reflection amplification attack of a known attack type exists, if the attack is detected, entering S6, and if not, entering S4;
s4, unknown attack detection: inputting flow data into an unknown attack detection module, detecting whether unknown attacks exist in the flow by using the size-to-quantity ratio of request response data packets, entering S5 if the unknown attacks exist, and ending system operation if the unknown attacks do not exist;
s5, updating an attack detection model: the flow data characteristics are input into a model updating module, and an attack detection model is updated aiming at the detected flow data of unknown attack, so that the data set updating attack detection model can identify the unidentifiable reflection amplifier;
s6, verifying a reflection amplifier: and inputting the flow data into a data collection module of the reflection amplifier, verifying the detected reflection amplifier in an active mode, confirming the attributes such as amplification factor and the like, and simultaneously recording the data of the reflection amplifier into an IP (Internet protocol) library of the reflection amplifier.
Further, the model training module in S1 mainly generates an attack detection model for the known reflection amplifier, and the attack detection module determines whether there is a reflection amplification attack in the passive traffic by using the generated attack detection model.
Further, the unknown attack detection module in S1 determines that there is no traffic of known type attack for the attack detection model, and detects whether there is an unknown attack by using the ratio of the size to the number of request response packets, and the module update module is mainly used to update the attack detection model so as to identify the reflection amplifier that cannot be identified.
Further, in S1, the reflection amplifier data collection module mainly uses an active detection method to confirm the attributes such as amplification factor of the reflection amplifier, and collects the data of the reflection amplifier.
Furthermore, the reflection amplifier IP library is used for storing and backing up the reflection amplifier data collected by the reflection amplifier data collection module and calling the data at a later period after the data is stored and backed up.
Further, when the model training module in S2 constructs the attack detection module, it autonomously constructs a reflection amplifier of a common protocol, generates traffic data as reflection amplification attack traffic of each protocol portion, collects a large amount of reflection amplification attack traffic data on the internet and normal traffic data, then selects features by using a feature selection algorithm, such as a statistical ranking network traffic feature selection method, extracts features from the traffic data set according to the selected features, and makes labels, and trains and generates the attack detection model by using a machine learning algorithm.
Further, when detecting, the attack detection module in S3 mainly determines whether there is a reflection amplification attack in the passive traffic by using the generated attack detection model, and when a group of traffic data enters the system, extracts the features of the group of traffic according to the feature matching required by the attack detection model, inputs the group of traffic features into the trained attack detection model, and determines whether there is a reflection amplification attack of a known type in the traffic by using the attack detection model.
Further, when detecting, the unknown attack detection module in S4 uses the ratio of the size to the number of the request response packets, and the comparison process is as follows: first, a1 is calculated as the size of a response packet/the size of a request packet, a2 is calculated as the number of response packets/the number of request packets, and if the size of a1 exceeds a certain threshold α 1 or the size of a2 exceeds a certain threshold α 2, it is determined that there is an unknown reflection amplifier, and the method enters a model updating module and a reflection amplifier data collecting module.
Further, in the model update module in S5, during update, a large amount of traffic data of the reflection amplifier that cannot be identified by the attack detection model is collected by using active probing or the like, the collected traffic data set is added to the original traffic data set to form a new data set, and then the attack detection model is retrained by using the new data set to generate an attack detection model that can identify the new type of reflection amplifier.
Further, when the reflection amplifier data collection module in S6 verifies, it first uses the information such as the IP address and the characteristics of the reflection amplifier collected by the previous module to actively detect the detected reflection amplifier, determine the specific amplification factor and other attributes, and then add the detected reflection amplifier data into the reflection amplifier IP library after determining that the reflection amplifier information is correct.
(III) advantageous effects
The invention has the following beneficial effects:
(1) the reflection amplifier identification method based on active and passive combination comprises an identification system consisting of a model training module, an unknown attack detection module, a model updating module, a reflection amplifier data collection module and a reflection amplifier IP library, and is mainly divided into three steps of reflection amplifier identification in passive flow, discovery of an unknown reflection amplifier and reflection amplifier verification based on an active mode during identification, wherein the reflection amplifier can be identified from the passive flow by arranging the attack detection module, a large amount of bandwidth is saved compared with a non-range active reflection amplifier detection method, meanwhile, the unknown attack detection module can be arranged to perform secondary calculation of the ratio of the size and the number of a request response data packet on the passive flow identified as the absence of known type reflection amplification attack, and discover the unknown type of reflection amplifier, the system has the function of automatically identifying the unknown type of reflection amplifier, and has stronger functions and higher safety protection;
(2) according to the reflection amplifier identification method based on active and passive combination, the reflection amplifier identified in passive flow can be actively verified by arranging the reflection amplifier data collection module, the specific amplification factor/attribute of the reflection amplifier is determined, the information of the reflection amplifier is accurately collected, meanwhile, the detection result can be verified again, and the detection accuracy is improved again.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
FIG. 1 is a system diagram of a reflection amplifier identification method based on active and passive combination according to the present invention;
fig. 2 is a basic schematic diagram of a reflection attack in the prior art.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "opening," "upper," "lower," "thickness," "top," "middle," "length," "inner," "peripheral," and the like are used in an orientation or positional relationship that is merely for convenience in describing and simplifying the description, and do not indicate or imply that the referenced component or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be considered as limiting the present invention.
Referring to fig. 1-2, an embodiment of the present invention provides a technical solution: a reflection amplifier identification method based on active and passive combination comprises the following operation steps:
s1, constructing an identification system: setting a model training module, an unknown attack detection module, a model updating module, a reflection amplifier data collection module and a reflection amplifier IP library to form an identification system;
s2, constructing an attack detection module: collecting known reflection amplifier data, transmitting the data to a model training module, and training to generate an attack detection model by using a feature selection algorithm;
s3, detecting the type of the reflection amplification attack: inputting the flow into an attack detection module constructed in S2, detecting whether a reflection amplification attack of a known attack type exists, if the attack is detected, entering S6, and if not, entering S4;
s4, unknown attack detection: inputting flow data into an unknown attack detection module, detecting whether unknown attacks exist in the flow by using the size-to-quantity ratio of request response data packets, entering S5 if the unknown attacks exist, and ending system operation if the unknown attacks do not exist;
s5, updating an attack detection model: the flow data characteristics are input into a model updating module, and an attack detection model is updated aiming at the detected flow data of unknown attack, so that the data set updating attack detection model can identify the unidentifiable reflection amplifier;
s6, verifying a reflection amplifier: and inputting the flow data into a data collection module of the reflection amplifier, verifying the detected reflection amplifier in an active mode, confirming the attributes such as amplification factor and the like, and simultaneously recording the data of the reflection amplifier into an IP (Internet protocol) library of the reflection amplifier.
The model training module in the S1 mainly generates an attack detection model for a known reflection amplifier, and the attack detection module determines whether there is a reflection amplification attack in the passive traffic by using the generated attack detection model.
The unknown attack detection module in S1 determines that there is no traffic of known type attack for the attack detection model, and detects whether there is an unknown attack by using the size-to-number ratio of the request-response packet, and the module update module is mainly used to update the attack detection model, so that it can identify the unidentifiable reflection amplifier.
In S1, the reflection amplifier data collection module mainly uses an active detection method to confirm the attributes such as amplification factor of the reflection amplifier and collect the data of the reflection amplifier.
And the reflection amplifier IP library is used for storing and backing up the reflection amplifier data collected by the reflection amplifier data collection module and calling the data at a later stage after defecation.
When the model training module in the S2 constructs the attack detection module, it autonomously constructs a reflection amplifier of a common protocol, generates traffic data as reflection amplification attack traffic of each protocol portion, collects a large amount of reflection amplification attack traffic data on the internet and normal traffic data, then selects features by using a feature selection algorithm, such as a statistical sorting network traffic feature selection method, extracts features from a traffic data set according to the selected features, makes labels, and trains and generates an attack detection model by using a machine learning algorithm.
When the attack detection module in the S3 detects, it mainly uses the generated attack detection model to determine whether there is a reflection amplification attack in the passive traffic, and when a group of traffic data enters the system, extracts the features of the group of traffic according to the feature matching required by the attack detection model, and inputs the group of traffic features into the trained attack detection model, and uses the attack detection model to determine whether there is a reflection amplification attack of a known type in the traffic.
When the unknown attack detection module in S4 detects, the comparison process is as follows, using the ratio of the size to the number of the request response data packets: first calculate a1Response packet size/request packet size, a2Number of response packets/number of request packets, if a1Is greater than a certain threshold value alpha1Or a is2Is greater than a certain threshold value alpha2Then the unknown reflection amplifier is considered to exist and enters the model update module and the reflection amplifier data collection module.
In the S5 model updating module, during updating, a large amount of flow data of the reflection amplifier that cannot be identified by the attack detection model is collected by means of active detection, the collected flow data set is added to the original flow data set to form a new data set, and then the attack detection model is retrained by using the new data set to generate an attack detection model that can identify the new type of reflection amplifier.
When the data collection module of the reflection amplifier in S6 verifies, it first uses the information such as IP address, characteristics, etc. of the reflection amplifier collected by the previous module to actively detect the detected reflection amplifier, determine its specific attributes such as amplification factor, etc., and then, after determining that the information of the reflection amplifier is correct, add the detected data of the reflection amplifier into the IP library of the reflection amplifier.
The working principle is as follows:
s1, constructing an identification system: setting a model training module, an unknown attack detection module, a model updating module, a reflection amplifier data collection module and a reflection amplifier IP library to form an identification system;
s2, constructing an attack detection module: collecting known reflection amplifier data, transmitting the data to a model training module, and training to generate an attack detection model by using a feature selection algorithm;
s3, detecting the type of the reflection amplification attack: inputting the flow into an attack detection module constructed in S2, detecting whether a reflection amplification attack of a known attack type exists, if the attack is detected, entering S6, and if not, entering S4;
s4, unknown attack detection: inputting flow data into an unknown attack detection module, detecting whether unknown attacks exist in the flow by using the size-to-quantity ratio of request response data packets, entering S5 if the unknown attacks exist, and ending system operation if the unknown attacks do not exist;
s5, updating an attack detection model: the flow data characteristics are input into a model updating module, and an attack detection model is updated aiming at the detected flow data of unknown attack, so that the data set updating attack detection model can identify the unidentifiable reflection amplifier;
s6, verifying a reflection amplifier: and inputting the flow data into a data collection module of the reflection amplifier, verifying the detected reflection amplifier in an active mode, confirming the attributes such as amplification factor and the like, and simultaneously recording the data of the reflection amplifier into an IP (Internet protocol) library of the reflection amplifier.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.