CN114615002B - Controlled identification method and system for key infrastructure of operator - Google Patents

Controlled identification method and system for key infrastructure of operator Download PDF

Info

Publication number
CN114615002B
CN114615002B CN202011415992.6A CN202011415992A CN114615002B CN 114615002 B CN114615002 B CN 114615002B CN 202011415992 A CN202011415992 A CN 202011415992A CN 114615002 B CN114615002 B CN 114615002B
Authority
CN
China
Prior art keywords
consensus
node
consensus node
traffic
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011415992.6A
Other languages
Chinese (zh)
Other versions
CN114615002A (en
Inventor
杜雪涛
赵蓓
郁莲
常玲
张晨
洪东
刘科
马力鹏
张弛
薛姗
吴日切夫
于雷
刘胜兰
于少中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Original Assignee
Peking University
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, China Mobile Communications Group Co Ltd, China Mobile Group Design Institute Co Ltd filed Critical Peking University
Priority to CN202011415992.6A priority Critical patent/CN114615002B/en
Publication of CN114615002A publication Critical patent/CN114615002A/en
Application granted granted Critical
Publication of CN114615002B publication Critical patent/CN114615002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/30Decision processes by autonomous network management units using voting and bidding

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and a system for identifying controlled infrastructure of an operator, wherein the method comprises the following steps: for the public traffic information received by each consensus node cluster, each consensus node in the consensus node cluster selects an abnormal traffic detection method, acquires a detection result of the consensus node and broadcasts the detection result to other consensus nodes in the consensus node cluster; the consensus node cluster identifies whether the data acquisition node sending the public traffic message is controlled or not based on the consensus mechanism and the detection result of each consensus node. According to the method and the system for identifying the controlled key infrastructure of the operator, provided by the embodiment of the invention, the detection result is generated and broadcast by the random selection anomaly detection method, the common identification is carried out in the whole common identification node cluster based on the practical Bayesian protocol algorithm, whether the data acquisition node is controlled or not is identified, the identification efficiency and accuracy can be improved, and the high effectiveness and high reliability of identification and the expandability of the system can be ensured.

Description

运营商关键基础设施被控识别方法及系统Methods and systems for identifying controlled critical infrastructure of operators

技术领域Technical field

本发明涉及通信技术领域,尤其涉及一种运营商关键基础设施被控识别方法及系统。The present invention relates to the field of communication technology, and in particular to a method and system for identifying controlled key infrastructure of an operator.

背景技术Background technique

运营商关键基础设施的安全非常重要,运营商关键基础设施如被控制,则可能造成严重影响。目前,识别关键基础设施被控的方法主要包括基于特征的方法和基于统计的方法。The security of the operator's critical infrastructure is very important. If the operator's critical infrastructure is controlled, it may have serious consequences. Currently, methods for identifying controlled critical infrastructure mainly include feature-based methods and statistical-based methods.

采用基于特征的方法和/或基于统计的方法,可以建立关键基础设施被控识别系统。现有关键基础设施被控识别系统中的各节点采用的识别方法包括:基于统计分析对比的方法、基于机器学习的方法和基于区块链技术的方法。Using feature-based methods and/or statistics-based methods, a critical infrastructure controlled identification system can be established. The identification methods used by each node in the existing critical infrastructure controlled identification system include: methods based on statistical analysis and comparison, methods based on machine learning, and methods based on blockchain technology.

并且,对于传统的单节点系统,当系统遭受攻击或者记录失败时,节点的失效意味着整个系统的失效;对于集群系统,虽然可能有很多节点记录、备份了数据,甚至多重备份,但是这些节点之间是互相信任的,当某些节点被黑客控制或攻击出现叛徒节点时,该集群系统也无法分辨出叛徒节点,导致系统的失效。Moreover, for traditional single-node systems, when the system is attacked or recording fails, the failure of the node means the failure of the entire system; for cluster systems, although there may be many nodes recording, backing up data, or even multiple backups, these nodes There is mutual trust between them. When some nodes are controlled by hackers or a traitor node appears under attack, the cluster system cannot distinguish the traitor node, causing the system to fail.

综上,现有运营商关键基础设施被控识别方法,识别结果的准确性、有效性和可靠性都较低。In summary, the accuracy, validity and reliability of the identification results of existing operators' critical infrastructure controlled identification methods are low.

发明内容Contents of the invention

本发明实施例提供一种运营商关键基础设施被控识别方法及系统,用以解决现有技术中识别结果的准确性较低的缺陷,实现高准确率、高有效性和高可靠性的识别。Embodiments of the present invention provide a method and system for identifying controlled critical infrastructure of an operator to solve the shortcoming of low accuracy of identification results in the existing technology and achieve identification with high accuracy, high effectiveness and high reliability. .

本发明实施例提供一种运营商关键基础设施被控识别方法,包括:The embodiment of the present invention provides a method for identifying controlled critical infrastructure of an operator, including:

对于每一共识节点集群接收的公共流量消息,所述共识节点集群中的每一共识节点选择一种异常流量检测方法,获取所述共识节点的检测结果并向所述共识节点集群中的其他共识节点广播;For the public traffic messages received by each consensus node cluster, each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection result of the consensus node and sends it to other consensus nodes in the consensus node cluster. node broadcast;

所述共识节点集群基于共识机制和各共识节点的检测结果,识别发送所述公共流量消息的数据采集节点是否被控;The consensus node cluster identifies whether the data collection node sending the public traffic message is controlled based on the consensus mechanism and the detection results of each consensus node;

其中,所述共识节点集群包括(3f+1)个不重复的共识节点,f为正整数;所述公共流量消息,携带有目标区域网络的多种流量特征。Wherein, the consensus node cluster includes (3f+1) non-overlapping consensus nodes, f is a positive integer; the public traffic message carries various traffic characteristics of the target area network.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述获取所述共识节点的投票结果并向所述共识节点集群中的其他共识节点广播之后,还包括:According to the method for identifying controlled critical infrastructure of an operator according to an embodiment of the present invention, after obtaining the voting results of the consensus node and broadcasting them to other consensus nodes in the consensus node cluster, the method further includes:

获取各所述共识节点的投票结果的评分;Obtain the score of the voting results of each consensus node;

若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别所述任一共识节点被控。If it is determined that the score of the voting result of any consensus node meets the preset conditions, it is identified that any consensus node is controlled.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述对于每一共识节点集群接收的公共流量消息,所述共识节点集群中的每一共识节点选择一种异常流量检测方法,获取所述共识节点的检测结果并向所述共识节点集群中的其他共识节点广播之前,还包括:According to the method for identifying controlled critical infrastructure of an operator according to one embodiment of the present invention, for the public traffic messages received by each consensus node cluster, each consensus node in the consensus node cluster selects an abnormal traffic detection method, Before obtaining the detection results of the consensus node and broadcasting them to other consensus nodes in the consensus node cluster, it also includes:

根据预设的选举算法,从共识节点池中随机选择若干组共识节点集群;According to the preset election algorithm, several groups of consensus node clusters are randomly selected from the consensus node pool;

其中,任一组共识节点集群中的任一共识节点,不在其他共识节点集群中。Among them, any consensus node in any group of consensus node clusters is not in other consensus node clusters.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述共识节点集群基于共识机制和各共识节点的检测结果,识别发送所述公共流量消息的数据采集节点是否被控的具体步骤包括:According to a method for identifying controlled key infrastructure of an operator according to an embodiment of the present invention, the consensus node cluster is based on the consensus mechanism and the detection results of each consensus node, and the specific steps of identifying whether the data collection node that sends the public traffic message is controlled. include:

所述共识节点接收所述其他共识节点广播的检测结果,根据所述共识节点的检测结果和所述其他共识节点广播的检测结果进行投票,获取所述共识节点的投票结果并向所述共识节点集群中的其他共识节点广播;The consensus node receives the detection results broadcast by the other consensus nodes, votes based on the detection results of the consensus node and the detection results broadcast by the other consensus nodes, obtains the voting results of the consensus node and sends them to the consensus node Broadcast to other consensus nodes in the cluster;

所述共识节点接收所述其他共识节点广播的投票结果,根据所述共识节点的投票结果和所述其他共识节点广播的投票结果,识别发送所述公共流量消息的数据采集节点是否被控。The consensus node receives the voting results broadcast by the other consensus nodes, and identifies whether the data collection node sending the public traffic message is controlled based on the voting results of the consensus node and the voting results broadcast by the other consensus nodes.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别所述任一共识节点被控之后,还包括:According to the method for identifying controlled critical infrastructure of an operator according to one embodiment of the present invention, if it is determined that the score of the voting result of any consensus node meets the preset conditions, then after identifying that any consensus node is controlled, include:

将所述任一共识节点作为失效节点,并从共识节点池中删除所述任一共识节点。Treat any consensus node as an invalid node and delete any consensus node from the consensus node pool.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述共识节点接收所述其他共识节点广播的投票结果,根据所述共识节点的投票结果和所述其他共识节点广播的投票结果,识别发送所述公共流量消息的数据采集节点是否被控之后,还包括:According to a method for identifying controlled critical infrastructure of an operator according to an embodiment of the present invention, the consensus node receives the voting results broadcast by the other consensus nodes, and according to the voting results of the consensus node and the voting results broadcast by the other consensus nodes , after identifying whether the data collection node sending the public traffic message is controlled, it also includes:

若建块节点判断获知接收到的共识节点广播的投票结果的数量不少于(2f+1),则根据识别发送所述公共流量消息的数据采集节点是否被控的结果生成待上链的区块,将所述待上链的区块接入区块队列;If the block-building node determines that the number of voting results broadcast by the received consensus node is not less than (2f+1), the area to be uploaded will be generated based on the result of identifying whether the data collection node that sent the public traffic message is controlled. Block, connect the block to be uploaded to the block queue;

上链节点集群对所述区块队列中的每一待上链的区块进行共识并成功之后,将所述每一待上链的区块添加至区块链中;After the uplink node cluster reaches consensus on each block to be uploaded in the block queue and succeeds, it adds each block to be uploaded to the blockchain;

其中,所述建块节点为根据预设的选取算法,从所述每一共识节点集群中选取的一个共识节点;所述上链节点集群,包括从共识节点池未被选入任一共识节点集群的各共识节点中选取的(3f+1)个不重复的共识节点。Wherein, the block building node is a consensus node selected from each consensus node cluster according to a preset selection algorithm; the uplink node cluster includes any consensus node that has not been selected from the consensus node pool. (3f+1) unique consensus nodes selected from each consensus node in the cluster.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述共识节点集群中的每一共识节点选择一种异常流量检测方法的具体步骤包括:According to a method for identifying controlled critical infrastructure of an operator according to an embodiment of the present invention, the specific steps for each consensus node in the consensus node cluster to select an abnormal traffic detection method include:

根据所述区块链的高度、所述每一共识节点的编号和异常流量检测方法的个数,选择一种异常流量检测方法。According to the height of the blockchain, the number of each consensus node and the number of abnormal traffic detection methods, an abnormal traffic detection method is selected.

根据本发明一个实施例的运营商关键基础设施被控识别方法,所述根据预设的选举算法,从共识节点池中随机选择多组共识节点集群,与所述对于每一共识节点集群接收的公共流量消息,所述共识节点集群中的每一共识节点选择一种异常流量检测方法,获取所述共识节点的检测结果并向所述共识节点集群中的其他共识节点广播之间,还包括:According to a method for identifying controlled critical infrastructure of an operator according to an embodiment of the present invention, multiple groups of consensus node clusters are randomly selected from a consensus node pool according to a preset election algorithm, and the number of consensus node clusters received for each consensus node cluster is Public traffic message, each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection result of the consensus node and broadcasts it to other consensus nodes in the consensus node cluster, and also includes:

所述共识节点集群中的任一共识节点,基于过滤机制,接收预设范围内的数据采集节点发送的流量消息,并向所述共识节点集群中的其他共识节点广播;Any consensus node in the consensus node cluster, based on the filtering mechanism, receives traffic messages sent by data collection nodes within the preset range, and broadcasts them to other consensus nodes in the consensus node cluster;

若所述共识节点集群中的全部共识节点接收到所述流量消息,则将所述流量消息确定为公共流量消息。If all consensus nodes in the consensus node cluster receive the traffic message, the traffic message is determined to be a public traffic message.

本发明实施例还提供一种运营商关键基础设施被控识别系统,包括:Embodiments of the present invention also provide a controlled identification system for operator critical infrastructure, including:

多个共识节点和多个数据采集节点;Multiple consensus nodes and multiple data collection nodes;

所述数据采集节点,用于根据目标区域网络的流量信息,获取所述目标区域网络的多种流量特征,并向共识节点发送携带有所述目标区域网络的多种流量特征的流量消息;The data collection node is configured to obtain multiple traffic characteristics of the target area network based on the traffic information of the target area network, and send traffic messages carrying the multiple traffic characteristics of the target area network to the consensus node;

所述共识节点,用于基于共识机制和所述流量消息,识别数据采集节点是否被控以及其他共识节点是否被控。The consensus node is used to identify whether the data collection node is controlled and whether other consensus nodes are controlled based on the consensus mechanism and the traffic message.

根据本发明一个实施例的运营商关键基础设施被控识别系统,至少包括两层所述数据采集节点;The operator's critical infrastructure controlled identification system according to one embodiment of the present invention includes at least two layers of data collection nodes;

第一层中的每一数据采集节点,用于所述根据对应的第一区域网络的流量信息,获取所述第一区域网络的多种流量特征;Each data collection node in the first layer is used to obtain multiple traffic characteristics of the first regional network based on the traffic information of the corresponding first regional network;

第二层包括至少一个所述数据采集节点;所述第二层中的每一数据采集节点,用于根据预设的轮换算法,分别根据每一第二区域网络的流量信息,获取所述第二区域网络的多种流量特征;The second layer includes at least one data collection node; each data collection node in the second layer is used to obtain the third data collection node according to the traffic information of each second regional network according to a preset rotation algorithm. Various traffic characteristics of the second area network;

其中,所述第二区域为所述第一区域的子区域。Wherein, the second area is a sub-area of the first area.

本发明实施例提供的运营商关键基础设施被控识别方法及系统,通过随机选择异常检测方法产生检测结果并广播,在整个共识节点集群中基于实用拜占庭协议算法进行共识,识别该数据采集节点是否被控,能提高识别效率和准确性,能保证识别的高有效性和高可靠性以及系统的可扩展性。The method and system for identifying controlled key infrastructure of operators provided by the embodiments of the present invention generate and broadcast detection results by randomly selecting anomaly detection methods, and perform consensus based on the practical Byzantine agreement algorithm in the entire consensus node cluster to identify whether the data collection node Controlled, it can improve the identification efficiency and accuracy, ensure the high effectiveness and reliability of identification and the scalability of the system.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without exerting creative efforts.

图1是本发明实施例提供的一种运营商关键基础设施被控识别方法的流程示意图;Figure 1 is a schematic flow chart of a method for identifying controlled critical infrastructure of an operator provided by an embodiment of the present invention;

图2是本发明实施例提供的一种运营商关键基础设施被控识别系统的结构示意图。Figure 2 is a schematic structural diagram of an operator's key infrastructure controlled identification system provided by an embodiment of the present invention.

具体实施方式Detailed ways

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, rather than all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the scope of protection of the present invention.

在本发明实施例的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明实施例和简化描述,而不是指示或暗示所指的系统或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明实施例的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。In the description of the embodiments of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" The orientation or positional relationship indicated by "" is based on the orientation or positional relationship shown in the drawings. It is only for the convenience of describing the embodiments of the present invention and simplifying the description, and does not indicate or imply that the system or component referred to must have a specific orientation. Constructed and operated in specific orientations and therefore should not be construed as limiting the embodiments of the invention. Furthermore, the terms “first”, “second” and “third” are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.

在本发明实施例的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本发明实施例中的具体含义。In the description of the embodiments of the present invention, it should be noted that, unless otherwise clearly stated and limited, the terms "installation", "connection" and "connection" should be understood in a broad sense. For example, it can be a fixed connection or a fixed connection. Detachable connection, or integral connection; it can be a mechanical connection or an electrical connection; it can be a direct connection or an indirect connection through an intermediate medium; it can be an internal connection between two components. For those of ordinary skill in the art, the specific meanings of the above terms in the embodiments of the present invention can be understood in specific situations.

为了克服现有技术的上述问题,本发明实施例提供一种运营商关键基础设施被控识别方法及系统,其发明构思是,基于运营商的网络结构,部署两种节点——数据采集节点和共识节点,这两种节点可以将全网流量信息的采集与检测功能解耦合,从而提高系统的灵活性和可拓展性;网络中的数据采集节点按照特定的部署策略进行部署,采集网络流量数据的特征信息,并将流量消息发送给共识节点;共识节点接收到采集节点发送的流量特征信息后,随机选择异常检测方法产生检测结果,之后检测结果会被广播,并在整个区块链网络中基于PBFT(实用拜占庭协议)算法进行共识,识别该数据采集节点是否被控;提高了识别效率和准确性,保证了识别的有效性和可靠性以及系统的可扩展性。In order to overcome the above problems of the prior art, embodiments of the present invention provide a method and system for identifying controlled critical infrastructure of an operator. The inventive concept is to deploy two types of nodes based on the operator's network structure - data collection nodes and Consensus nodes, these two nodes can decouple the collection and detection functions of the entire network traffic information, thereby improving the flexibility and scalability of the system; the data collection nodes in the network are deployed according to specific deployment strategies to collect network traffic data characteristic information, and sends the traffic message to the consensus node; after receiving the traffic characteristic information sent by the collection node, the consensus node randomly selects an anomaly detection method to generate detection results, and then the detection results will be broadcast and circulated throughout the blockchain network. Based on the PBFT (Practical Byzantine Agreement) algorithm, consensus is carried out to identify whether the data collection node is controlled; the identification efficiency and accuracy are improved, and the effectiveness and reliability of the identification and the scalability of the system are ensured.

图1是本发明实施例提供的一种运营商关键基础设施被控识别方法的流程示意图。下面结合图1描述本发明实施例的运营商关键基础设施被控识别方法。如图1所示,该方法包括:步骤S101、对于每一共识节点集群接收的公共流量消息,共识节点集群中的每一共识节点选择一种异常流量检测方法,获取共识节点的检测结果并向共识节点集群中的其他共识节点广播。Figure 1 is a schematic flowchart of a method for identifying controlled critical infrastructure of an operator provided by an embodiment of the present invention. The method for identifying controlled critical infrastructure of an operator according to the embodiment of the present invention is described below with reference to FIG. 1 . As shown in Figure 1, the method includes: Step S101. For the public traffic messages received by each consensus node cluster, each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection results of the consensus node and sends it to Broadcast to other consensus nodes in the consensus node cluster.

其中,共识节点集群包括(3f+1)个不重复的共识节点,f为正整数;公共流量消息,携带有目标区域网络的多种流量特征。Among them, the consensus node cluster includes (3f+1) unique consensus nodes, f is a positive integer; the public traffic message carries various traffic characteristics of the target area network.

需要说明的是,本发明实施例提供的运营商关键基础设施被控识别方法,适用于运营商关键基础设施被控识别系统。It should be noted that the method for identifying controlled operators' critical infrastructure provided by the embodiment of the present invention is suitable for the operator's critical infrastructure controlled identification system.

该运营商关键基础设施被控识别系统由关键基础设施构成。关键基础设施至少包括两种:多个共识节点和多个数据采集节点。The operator's critical infrastructure controlled identification system consists of critical infrastructure. Key infrastructure includes at least two types: multiple consensus nodes and multiple data collection nodes.

数据采集节点,用于根据目标区域网络的流量信息,获取目标区域网络的多种流量特征,并向共识节点发送携带有目标区域网络的多种流量特征的流量消息。The data collection node is used to obtain various traffic characteristics of the target area network based on the traffic information of the target area network, and send traffic messages carrying various traffic characteristics of the target area network to the consensus node.

一个网络连接定义为在某个时间内从开始到结束的TCP数据包序列,并且在这段时间内,数据在预定义的协议下(如TCP、UDP)从源IP地址到目的IP地址的传递。将每个网络连接被标记为正常(normal)或异常(attack),异常类型被细分为4大类共39种攻击类型。将每个连接记录用41个特征来描述,加上最后的标记(label),一共有42项。其中前41项流量特征分为4大类:A network connection is defined as a sequence of TCP packets from start to end within a certain period of time, and during this period, data is transferred from the source IP address to the destination IP address under a predefined protocol (such as TCP, UDP) . Each network connection is marked as normal (normal) or abnormal (attack), and abnormal types are subdivided into 4 major categories and a total of 39 attack types. Each connection record is described with 41 features, plus the final label, for a total of 42 items. The first 41 traffic characteristics are divided into 4 categories:

1)TCP连接基本特征(共9种)1) Basic characteristics of TCP connections (9 types in total)

2)TCP连接的内容特征(共13种)2) Content characteristics of TCP connections (13 types in total)

3)基于时间的网络流量统计特征(共9种)3) Time-based network traffic statistical characteristics (9 types in total)

4)基于主机的网络流量统计特征(共10种)4) Host-based network traffic statistical characteristics (10 types in total)

4种异常类型分别是:The 4 exception types are:

DOS(denial-of-service),拒绝服务攻击,例如ping-of-death,syn flood,smurf等;具体表现有,制造大流量无用数据,造成通往被攻击主机的网络拥塞,使被攻击主机无法正常和外界通信。利用被攻击主机提供服务或传输协议上处理重复连接的缺陷,反复高频的发出攻击性的重复服务请求,使被攻击主机无法及时处理其它正常的请求。利用被攻击主机所提供服务程序或传输协议的本身实现缺陷,反复发送畸形的攻击数据引发系统错误的分配大量系统资源,使主机处于挂起状态甚至死机。DOS (denial-of-service), denial of service attacks, such as ping-of-death, syn flood, smurf, etc.; specific manifestations include creating a large flow of useless data, causing network congestion leading to the attacked host, causing the attacked host to Unable to communicate with the outside world normally. Taking advantage of the flaws in the service provided by the attacked host or the processing of repeated connections in the transmission protocol, repeated and high-frequency aggressive repeated service requests are issued, making the attacked host unable to process other normal requests in a timely manner. Taking advantage of the implementation flaws of the service program or transmission protocol provided by the attacked host, repeatedly sending malformed attack data causes the system to incorrectly allocate a large amount of system resources, leaving the host in a suspended state or even crashing.

R2L(unauthorized access from a remote machine to a local machine),来自远程主机的未授权访问,例如guessing password;在目标主机上没有账户的攻击者获得该机器的当地访问权限,从机器中过滤出数据、修改数据等的攻击方式。R2L (unauthorized access from a remote machine to a local machine), unauthorized access from a remote host, such as guessing password; an attacker who does not have an account on the target host obtains local access to the machine and filters out data from the machine. Attack methods such as modifying data.

U2R(unauthorized access to local superuser privileges by a localunpivileged user),未授权的本地超级用户特权访问,例如buffer overflow attacks;U2R (unauthorized access to local superuser privileges by a localunpivileged user), unauthorized access to local superuser privileges, such as buffer overflow attacks;

PROBING(surveillance and probing),探针攻击,端口监视或扫描,例如port-scan,ping-sweep等。指对计算机网络或DNS服务器进行扫描,获取有效IP地址、活动端口号、主机操作系统类型和安全弱点的攻击方式。PROBING (surveillance and probing), probe attack, port monitoring or scanning, such as port-scan, ping-sweep, etc. It refers to an attack method that scans a computer network or DNS server to obtain valid IP addresses, active port numbers, host operating system types, and security weaknesses.

当流量采集节点采集到流量的特征数据后,将其封装成一条消息,并附上自身的签名,然后发送给共识节点。After the traffic collection node collects the characteristic data of the traffic, it encapsulates it into a message, attaches its own signature, and then sends it to the consensus node.

每条流量信息可以包含如下字段:Each piece of traffic information can contain the following fields:

srcaddr:源头的IP地址,如119.75.216.20。srcaddr: source IP address, such as 119.75.216.20.

dstaddr:目的地IP地址,如182.254.18.159。dstaddr: destination IP address, such as 182.254.18.159.

srcport:TCP/UDP源头的端口,如60221。srcport: TCP/UDP source port, such as 60221.

dstport:TCP/UDP目的地的端口,如80,443。dstport: TCP/UDP destination port, such as 80, 443.

prot:协议类型,如6=TCP,17=UDP。prot: protocol type, such as 6=TCP, 17=UDP.

First:信息流开始时间。First: Information flow start time.

Last:信息流的最后一个数据包被接收时的时间。Last: The time when the last packet of the information flow was received.

size:信息流传输信息的总大小,单位byte。size: The total size of the information transmitted by the information flow, in byte.

PacketCount:信息流中报的数量。PacketCount: The number of packets reported in the information flow.

共识节点,用于基于共识机制和流量消息,识别数据采集节点是否被控以及其他共识节点是否被控。The consensus node is used to identify whether the data collection node is controlled and whether other consensus nodes are controlled based on the consensus mechanism and traffic messages.

具体地,对于数据采集节点,当数据采集节点被攻击控制后,系统可以通过区块链中不同共识节点之间的共识检测识别出异常。Specifically, for data collection nodes, when the data collection node is controlled by an attack, the system can identify abnormalities through consensus detection between different consensus nodes in the blockchain.

每个共识节点集群里的共识节点来广播自己从数据采集节点收到的流量特征信息<m,d>,投票达成共识筛选出消息的公共集合<m1,m2,m3,m4,...>。其中,m为消息,d为摘要。The consensus nodes in each consensus node cluster broadcast the traffic characteristic information <m,d> they received from the data collection node, vote to reach consensus and filter out the public set of messages <m1,m2,m3,m4,...> . Among them, m is the message and d is the summary.

消息的公共集合中的消息,为公共流量消息。Messages in the public collection of messages are public traffic messages.

每个共识节点独立的对公共集合中的每条流量信息,每条流量信息对应一个vector,用来记录结果。Each consensus node independently processes each piece of traffic information in the public collection, and each piece of traffic information corresponds to a vector to record the results.

共识节点将多种异常流量检测方法集成打包,并可供该共识节点随时调用。异常流量检测方法可以随时升级迭代。每个共识节点在验证异常流量时,会从系统预先设定好的多种异常流量检测方法中随机选择一种方法进行独立验证。The consensus node integrates and packages multiple abnormal traffic detection methods and can be called by the consensus node at any time. Abnormal traffic detection methods can be upgraded and iterated at any time. When verifying abnormal traffic, each consensus node will randomly select a method from a variety of abnormal traffic detection methods preset by the system for independent verification.

异常流量检测方法可以包括:Abnormal traffic detection methods can include:

固定阈值方法:事先由管理员确定一个单位时间内的流量阈值,由管理员手动输入给系统,系统调用API,将参数传给程序。Fixed threshold method: The administrator determines the traffic threshold within a unit time in advance, and the administrator manually inputs it into the system. The system calls the API and passes the parameters to the program.

特征检测:建立所有异常网络行为的特征库,将当前的流量信息特征与特征库进行匹配,根据匹配结果判定当前网络数据是否正常。Feature detection: Establish a feature library of all abnormal network behaviors, match the current traffic information features with the feature library, and determine whether the current network data is normal based on the matching results.

统计分析:针对已有历史数据记录通过分析得出一个判断的基准,在针对新的网络流量数据进行判断。如利用ARIMA模型预测流量方法检测异常流量。Statistical analysis: Analyze existing historical data records to obtain a benchmark for judgment, and then make judgments based on new network traffic data. For example, the ARIMA model is used to predict traffic to detect abnormal traffic.

聚类分析:使用分类方法将网络流量分类,在利用决策树的方法检测异常流量。Cluster analysis: Use classification methods to classify network traffic, and use decision tree methods to detect abnormal traffic.

关联分析:利用模糊关联规则对流量特征信息进行关联匹配,通过构建流量特征之间关联关系来检测异常流量。Correlation analysis: Use fuzzy association rules to correlate and match traffic feature information, and detect abnormal traffic by building correlations between traffic features.

根据选择的方法进行检测分析,投票结果标注为0和1(0代表正常,1代表异常),并记录在一个vector中。将节点编号i,消息编号k、消息哈希h,、结果r(r为0或1)、自己的签名sig合并成一条消息广播出去。Detection analysis is performed according to the selected method, and the voting results are marked as 0 and 1 (0 represents normal, 1 represents abnormal) and recorded in a vector. Combine the node number i, message number k, message hash h, result r (r is 0 or 1), and own signature sig into one message and broadcast it.

步骤S102、共识节点集群基于共识机制和各共识节点的检测结果,识别发送公共流量消息的数据采集节点是否被控。Step S102: The consensus node cluster identifies whether the data collection node that sends the public traffic message is controlled based on the consensus mechanism and the detection results of each consensus node.

具体地,每个共识节点接收到的其他共识节点广播过来的投票结果后,验证sig,sig为真,则将该结果放在vector相应的标号(节点的编号i)上。Specifically, after each consensus node receives the voting results broadcast by other consensus nodes, it verifies sig. If sig is true, the result is placed on the corresponding label of the vector (node number i).

共识节点对每条消息的vector进行投票结果统计,如果1的数目大于2f+1,则该条流量特征信息异常,提取出信息中的ip、端口和时间等信息进行追踪,定位到具体流量采集节点区域。The consensus node counts the voting results for the vector of each message. If the number of 1 is greater than 2f+1, the traffic characteristic information is abnormal. The IP, port, time and other information in the information are extracted for tracking, and the specific traffic collection is located. node area.

需要说明的是,多个共识节点集群对流量特征并行处理保证了系统的性能。每个集群都有开启IPtable过滤机制,只接收特定采集节点发送过来的,避免重复接收,因此每个集群处理的流量特征之间没有交集。当每个集群将区块打包后,直接放入队列,由其他集群对区块上链进行共识。多个集群之间没有干扰,不需要同步等待,提高了整个系统的性能。It should be noted that multiple consensus node clusters process traffic characteristics in parallel to ensure system performance. Each cluster has an IPtable filtering mechanism enabled to only receive traffic sent from specific collection nodes to avoid repeated reception. Therefore, there is no overlap between the traffic characteristics processed by each cluster. After each cluster packages the block, it is directly put into the queue, and other clusters will reach consensus on the block on the chain. There is no interference between multiple clusters and no need to wait for synchronization, which improves the performance of the entire system.

本发明实施例通过随机选择异常检测方法产生检测结果并广播,在整个共识节点集群中基于实用拜占庭协议算法进行共识,识别该数据采集节点是否被控,能提高识别效率和准确性,能保证识别的高有效性和高可靠性以及系统的可扩展性。The embodiment of the present invention generates detection results by randomly selecting anomaly detection methods and broadcasts them, and performs consensus based on a practical Byzantine agreement algorithm in the entire consensus node cluster to identify whether the data collection node is controlled, which can improve identification efficiency and accuracy and ensure identification. High effectiveness and reliability as well as system scalability.

基于上述各实施例的内容,获取共识节点的投票结果并向共识节点集群中的其他共识节点广播之后,还包括:获取各共识节点的投票结果的评分。Based on the contents of the above embodiments, after obtaining the voting results of the consensus node and broadcasting them to other consensus nodes in the consensus node cluster, it also includes: obtaining the score of the voting results of each consensus node.

具体地,对于共识节点,可以通过拜占庭协议以及信誉机制识别出共识节点的作假行为。具有作假行为的共识节点,就是被控的共识节点。Specifically, for consensus nodes, the fraudulent behavior of consensus nodes can be identified through Byzantine agreement and reputation mechanisms. Consensus nodes with fraudulent behavior are the consensus nodes that are accused.

为了确保系统安全,加入节点信用制度,采用信誉机制,配合改进的拜占庭协议,来识别作弊的共识节点。对投票的结果进行投票,判断是否有叛徒节点。信誉系统根据投票打分,然后识别出“叛徒”节点。In order to ensure the security of the system, a node credit system is added, and a reputation mechanism is adopted, combined with an improved Byzantine protocol, to identify cheating consensus nodes. Vote on the voting results to determine whether there are traitor nodes. The reputation system scores votes and then identifies “traitor” nodes.

每次投票结束之后,会对每个共识节点的投票结果进行打分。如果这个共识节点的投票结果都与共识的结果不一致,则这次投票这个共识节点分数会较低;如果这个共识节点与共识结果一致,则这次投票这个共识节点分数会较高。After each vote, the voting results of each consensus node will be scored. If the voting results of this consensus node are inconsistent with the consensus result, the score of this consensus node in this vote will be lower; if the consensus node is consistent with the consensus result, the score of this consensus node in this vote will be higher.

若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别任一共识节点被控。If it is determined that the score of the voting result of any consensus node meets the preset conditions, any consensus node is identified as being controlled.

具体地,记录每一共识节点的评分,通过对评分记录的分析,可以识别出这个共识节点的信用的好坏。Specifically, the score of each consensus node is recorded. By analyzing the score records, the credit quality of this consensus node can be identified.

预设的条件,可以为评分一直非常低。By default, the rating can be very low.

如果某个共识节点信用一直非常低,则可以认为这个为“叛徒”节点,可能被病毒攻击或者被黑客控制,有作假行为,该共识节点被控。If the credibility of a consensus node has always been very low, it can be considered a "traitor" node. It may have been attacked by a virus or controlled by hackers, and has committed fraud, and the consensus node will be charged.

本发明实施例通过对各共识节点的投票结果继续评分,根据多次的评分结果识别出被控的共识节点,能提高识别效率和准确性,能保证识别的高有效性和高可靠性以及系统的可扩展性。The embodiment of the present invention continues to score the voting results of each consensus node, and identifies the controlled consensus node based on multiple scoring results, which can improve the identification efficiency and accuracy, and ensure the high effectiveness and reliability of the identification and system scalability.

基于上述各实施例的内容,对于每一共识节点集群接收的公共流量消息,共识节点集群中的每一共识节点选择一种异常流量检测方法,获取共识节点的检测结果并向共识节点集群中的其他共识节点广播之前,还包括:根据预设的选举算法,从共识节点池中随机选择若干组共识节点集群。Based on the contents of the above embodiments, for the public traffic messages received by each consensus node cluster, each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection result of the consensus node, and sends it to the consensus node cluster. Before other consensus nodes broadcast, it also includes: randomly selecting several groups of consensus node clusters from the consensus node pool according to the preset election algorithm.

其中,任一组共识节点集群中的任一共识节点,不在其他共识节点集群中。Among them, any consensus node in any group of consensus node clusters is not in other consensus node clusters.

具体地,节点池由所有的共识节点组成,数目为M=a(3f+1),不包括由节点信誉机制排除掉的“叛徒节点”,等到作假的共识节点排除故障之后,再重新加入到预选的节点池中。其中,a为正整数Specifically, the node pool consists of all consensus nodes, the number of which is M=a(3f+1), excluding "traitor nodes" excluded by the node reputation mechanism. After the fake consensus nodes are troubleshooted, they can be rejoined. pre-selected node pool. Among them, a is a positive integer

可以采用PRNG算法生成随机数R,选中的节点编号K=R%n(n为当前节点池剩余的节点总数),如此一直重复3f+1次,选出一组共识节点。The PRNG algorithm can be used to generate a random number R, and the selected node number K=R%n (n is the total number of remaining nodes in the current node pool). This is repeated 3f+1 times to select a group of consensus nodes.

重复上述步骤,可以选择出多组共识节点集群。选择出的共识节点集群的组数为(a-1)。Repeat the above steps to select multiple consensus node clusters. The number of groups of selected consensus node clusters is (a-1).

每组共识节点集群分别接收来自于不同的流量采集域的流量消息,进行查证处理。不同的共识节点集群通过设置IPtables来选择接受特定范围的数据采集节点发送的流量消息,过滤掉其余数据采集节点发送的消息,防止不同共识节点组接收到重复的消息。Each group of consensus node clusters receives traffic messages from different traffic collection domains for verification and processing. Different consensus node clusters choose to accept traffic messages sent by a specific range of data collection nodes by setting IPtables, and filter out messages sent by other data collection nodes to prevent different consensus node groups from receiving duplicate messages.

本发明实施例中,通过选出不同的共识节点组,多个共识节点组并行处理流量数据;在同一个共识节点集群内的共识节点在建块节点进行验证同时,可以并行地对公共流量特征消息集S中的每个流量特征消息内容进行验证。In the embodiment of the present invention, by selecting different consensus node groups, multiple consensus node groups process traffic data in parallel; consensus nodes in the same consensus node cluster can verify public traffic characteristics in parallel while building block nodes. The content of each traffic characteristic message in the message set S is verified.

本发明实施例通过选出不同的共识节点组,多个共识节点组并行处理流量数据,能提高整个系统的性能和识别效率。Embodiments of the present invention can improve the performance and identification efficiency of the entire system by selecting different consensus node groups and multiple consensus node groups processing traffic data in parallel.

基于上述各实施例的内容,共识节点集群基于共识机制和各共识节点的检测结果,识别发送公共流量消息的数据采集节点是否被控的具体步骤包括:共识节点接收其他共识节点广播的检测结果,根据共识节点的检测结果和其他共识节点广播的检测结果进行投票,获取共识节点的投票结果并向共识节点集群中的其他共识节点广播。Based on the contents of the above embodiments, the consensus node cluster is based on the consensus mechanism and the detection results of each consensus node. The specific steps to identify whether the data collection node sending the public traffic message is controlled include: the consensus node receives the detection results broadcast by other consensus nodes, Voting is performed based on the detection results of the consensus node and the detection results broadcast by other consensus nodes, and the voting results of the consensus node are obtained and broadcast to other consensus nodes in the consensus node cluster.

具体地,实用拜占庭协议(PBFT)采用密码学相关技术(RSA签名算法、消息验证码和摘要)确保消息传送过程无法被篡改和破坏。Specifically, Practical Byzantine Agreement (PBFT) uses cryptography-related technologies (RSA signature algorithm, message verification code and digest) to ensure that the message transmission process cannot be tampered with and destroyed.

通过随机算法选出组内某个节点为建块节点,此后,只要建块节点不切换,则称为一个视图(View),一个视图代表一轮共识过程。视图是连续编号的整数,保证每个共识节点组内共识的顺序性。每个共识节点的状态都包含了服务的整体状态,共识节点上的消息日志(message log)包含了该节点接受(accepted)的消息,并且使用一个整数表示共识节点的当前视图编号。A node in the group is selected as a block-building node through a random algorithm. After that, as long as the block-building node does not switch, it is called a view, and a view represents a round of consensus process. Views are consecutively numbered integers that ensure the order of consensus within each consensus node group. The status of each consensus node contains the overall status of the service. The message log on the consensus node contains the messages accepted by the node, and an integer is used to represent the current view number of the consensus node.

由多个共识节点集群组成的每一个群组处理过程具体都为如下四个步骤:确定流量特征消息的公共集合、建块节点的确定、投票和转发票。The processing process of each group composed of multiple consensus node clusters is specifically the following four steps: determining a public collection of traffic characteristic messages, determining block building nodes, voting, and transferring invoices.

确定公共流量特征消息集的步骤如下:The steps to determine the common traffic characteristic message set are as follows:

在一段时间内,数据采集节点开始对全网内的流量数据信息进行收集工作,在采集到该时间段内大部分的流量数据信息之后,开始进行广播工作,将流量信息广播给网络内所有的共识节点。每一个接受到数据采集节点发送的流量数据信息的共识节点集群将会先对接收到的流量信息进行存储工作。Within a period of time, the data collection node begins to collect traffic data information in the entire network. After collecting most of the traffic data information within this time period, it starts broadcasting and broadcasts the traffic information to all nodes in the network. Consensus node. Each consensus node cluster that receives the traffic data information sent by the data collection node will first store the received traffic information.

根据当前的网络状态信息和某个共识节点集群接收到的流量数据信息数,对于对应的共识节点集群随机设定一个暂时的动态扫描量N,然后对该集群接收到的流量数据信息进行扫描,扫描出其中的N条流量消息,然后把这N条流量消息广播给其他所有共识节点,其他共识节点集群重复同样的操作。According to the current network status information and the number of traffic data information received by a certain consensus node cluster, a temporary dynamic scanning amount N is randomly set for the corresponding consensus node cluster, and then the traffic data information received by the cluster is scanned. Scan out the N traffic messages, and then broadcast these N traffic messages to all other consensus nodes, and other consensus node clusters repeat the same operation.

在共识节点集群广播了流量消息的一段时间之后,即给予了各个集群相互之间充分的时间来接收其他共识节点集群所发送的流量消息,对应的共识节点集群接着会将自己刚广播的N条流量数据消息与该时间段内接收到的其他共识节点广播的流量消息进行比对,确定出所有共有的流量数据,这些流量数据消息即确定出公共流量特征消息集S。After the consensus node cluster broadcasts the traffic message for a period of time, each cluster is given sufficient time to receive the traffic message sent by other consensus node clusters. The corresponding consensus node cluster then broadcasts the N traffic messages it has just broadcast. The traffic data message is compared with the traffic messages broadcast by other consensus nodes received within the time period to determine all common traffic data. These traffic data messages determine the public traffic characteristic message set S.

每个节点接收到的其他节点广播过来的结果后,验证sig,sig为真,则将该结果放在vector相应的标号(节点的编号i)上。After each node receives the result broadcast by other nodes, it verifies sig. If sig is true, the result is placed on the corresponding label of the vector (node number i).

建块节点将自己的异常流量验证结果以及所采用的异常流量查证方法的MD5广播给其他共识节点,发起共识,其他共识节点收到建块节点的投票并验证签名后,记录在vector中。The block-building node broadcasts its own abnormal traffic verification results and the MD5 of the abnormal traffic verification method used to other consensus nodes to initiate consensus. After other consensus nodes receive the vote of the block-building node and verify the signature, it is recorded in the vector.

建块节点,即从数据采集节点接收流量消息的共识节点。Block building nodes are consensus nodes that receive traffic messages from data collection nodes.

共识节点接收到建块节点广播的信息之后,进行验证并投票,并附加上自己的签名。然后广播自己的投票结果。After receiving the information broadcast by the block-building node, the consensus node verifies and votes, and attaches its own signature. Then broadcast the results of your vote.

具体过程为:The specific process is:

建块节点会分配一个序列号n给自己对一段时间内异常流量的验证结果,然后向组内其他所有共识节点广播自己的验证结果消息,并在其中附加自己的签名,消息向量vector格式为<<PREPARE,view,n,digest,signature,methods>,message>,view为视图编号,n为流量处理序号,digest为流量特征消息及摘要,signature为签名域,包含建块节点的签名,同时为后面共识节点对该消息的签名预留了空间,methods为方法域,包含建块节点对流量进行查证所采用的检测方法的MD5码,同时为后面共识节点的验证所采用的查证方法的MD5码预留了空间,message为流量数据特征和异常查证结果消息。The block-building node will assign a sequence number n to its own verification result of abnormal traffic within a period of time, and then broadcast its own verification result message to all other consensus nodes in the group, and append its own signature to it. The message vector vector format is < <PREPARE,view,n,digest,signature,methods>,message>, view is the view number, n is the traffic processing sequence number, digest is the traffic characteristic message and summary, signature is the signature field, including the signature of the building node, and at the same time The subsequent consensus nodes have reserved space for the signature of the message. methods is the method field, which contains the MD5 code of the detection method used by the block-building node to verify the traffic, and the MD5 code of the verification method used by the subsequent consensus nodes for verification. Space is reserved, and the message is traffic data characteristics and abnormal verification result messages.

组内其他共识节点接收到建块节点的验证结果消息时后,检查消息合法性,并且只有满足以下条件后,每个共识节点才会对建块节点对异常流量的处理结果进行验证,与自己的处理结果比对,最后进行投票。合法性检查条件为:When other consensus nodes in the group receive the verification result message of the block-building node, they check the validity of the message, and only when the following conditions are met, each consensus node will verify the processing results of the abnormal traffic by the block-building node and compare it with its own The processing results are compared and finally voted. The legality check conditions are:

a)消息签名同建块节点一致,并且digest与message的摘要一致a) The message signature is consistent with the block building node, and the digest is consistent with the digest of the message

b)当前视图编号为viewb) The current view number is view

c)该共识节点从未在视图view中接受过序号为n但是摘要digest不同的消息message。c) The consensus node has never received a message with sequence number n but a different digest in the view.

d)消息的序号n必须在水线(watermark)上下限h和H之间(水线存在的意义在于防止一个失效节点使用一个很大的序号消耗序号空间)d) The sequence number n of the message must be between the upper and lower limits h and H of the watermark (the purpose of the watermark is to prevent a failed node from using a large sequence number to consume sequence number space)

验证通过后,共识节点将投票结果添加到message中,在signature签名域中添加自己的签名,同时在methods方法域中添加自己验证所采用的检测方法的MD5码,并将投票结果、查证方法MD5码以及消息信息写入自己的消息日志中。After the verification is passed, the consensus node adds the voting results to the message, adds its own signature in the signature field, and adds the MD5 code of the detection method used for verification in the methods field, and adds the voting results and verification method MD5 Code and message information are written to its own message log.

共识节点接收其他共识节点广播的投票结果,根据共识节点的投票结果和其他共识节点广播的投票结果,识别发送公共流量消息的数据采集节点是否被控。The consensus node receives the voting results broadcast by other consensus nodes, and identifies whether the data collection node sending the public traffic message is controlled based on the voting results of the consensus node and the voting results broadcast by other consensus nodes.

具体地,共识节点对从建块节点送过来的流量特征消息进行投票并广播的同时,也会接收到其他共识节点广播的投票结果。共识节点会转发收到的其他共识节点的投票结果。每个流量特征消息都对应一个vector,这个vector用来存储所有共识节点对该流量特征消息的投票结果。Specifically, while the consensus node votes and broadcasts the traffic characteristic message sent from the block-building node, it will also receive the voting results broadcast by other consensus nodes. Consensus nodes will forward the voting results received from other consensus nodes. Each traffic characteristic message corresponds to a vector, which is used to store the voting results of all consensus nodes for the traffic characteristic message.

共识节点接收到别的共识节点发送的投票结果消息后,也会对消息的签名是否正确,视图编号是否一致,以及消息序号是否满足水线限制这三个条件进行合法性验证,如果验证通过则把这个准备消息写入消息日志中,然后把接收到的其他共识节点的投票结果消息添加自己的签名在signature签名域中,然后广播给其他共识节点。After the consensus node receives the voting result message sent by other consensus nodes, it will also verify the validity of the three conditions of whether the signature of the message is correct, whether the view number is consistent, and whether the message sequence number meets the waterline limit. If the verification passes, Write this preparation message into the message log, then add your own signature to the received voting result message from other consensus nodes in the signature field, and then broadcast it to other consensus nodes.

每个共识节点统计自己收到的投票,至少收到了2f+1个不同共识节点的相同结果,则作为最终结果R。Each consensus node counts the votes it received. If it receives the same result from at least 2f+1 different consensus nodes, it will be regarded as the final result R.

基于上述各实施例的内容,若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别任一共识节点被控之后,还包括:将任一共识节点作为失效节点,并从共识节点池中删除任一共识节点。Based on the contents of the above embodiments, if it is determined that the score of the voting result of any consensus node meets the preset conditions, then after identifying any consensus node to be controlled, it also includes: treating any consensus node as an invalid node, and starting from Delete any consensus node from the consensus node pool.

具体地,一旦发现共识节点的作假行为,立即将其排除在投票节点之外,作为失效节点,并从共识节点池中删除。Specifically, once a consensus node's fraudulent behavior is discovered, it will be immediately excluded from the voting nodes, regarded as an invalid node, and deleted from the consensus node pool.

本发明实施例通过将被控共识节点作为失效节点,并从共识节点池中删除,能提高识别准确性。The embodiment of the present invention can improve the identification accuracy by treating the controlled consensus node as a failed node and deleting it from the consensus node pool.

基于上述各实施例的内容,共识节点接收其他共识节点广播的投票结果,根据共识节点的投票结果和其他共识节点广播的投票结果,识别发送公共流量消息的数据采集节点是否被控之后,还包括:若建块节点判断获知接收到的共识节点广播的投票结果的数量不少于(2f+1),则根据识别发送公共流量消息的数据采集节点是否被控的结果生成待上链的区块,将待上链的区块接入区块队列。Based on the contents of the above embodiments, after the consensus node receives the voting results broadcast by other consensus nodes, and identifies whether the data collection node sending the public traffic message is controlled based on the voting results of the consensus node and the voting results broadcast by other consensus nodes, it also includes : If the block-building node determines that the number of voting results broadcast by the received consensus node is not less than (2f+1), the block to be uploaded will be generated based on the result of identifying whether the data collection node that sent the public traffic message is controlled. , add the block to be uploaded to the block queue.

其中,建块节点为根据预设的选取算法,从每一共识节点集群中选取的一个共识节点。Among them, the building node is a consensus node selected from each consensus node cluster according to the preset selection algorithm.

具体地,区块链是由包含流量特征消息信息的区块从后向前有序链接起来的数据结构。区块体分为块头和块身两部分。每一个区块头都包含它的父区块哈希值。这样把每个区块链接到各自父区块的哈希值序列就创建了一条一直可以追溯到第一个区块的链条。区块是聚合了区块链中流量特征消息信息的数据结果,这里的流量特征消息信息主要是流量数据及其验证结果。Specifically, the blockchain is a data structure composed of blocks containing traffic characteristic message information linked in an orderly manner from back to front. The block body is divided into two parts: block head and block body. Each block header contains the hash of its parent block. This sequence of hashes linking each block to its parent creates a chain that goes all the way back to the first block. A block is a data result that aggregates traffic characteristic message information in the blockchain. The traffic characteristic message information here is mainly traffic data and its verification results.

区块身主要存储数据信息。主要包括数据流量信息,以及共识节点对流量信息是否异常的判断结果,以及共识节点对异常流量查证采用的检测方法的MD5码。The block itself mainly stores data information. It mainly includes data traffic information, as well as the consensus node’s judgment results on whether the traffic information is abnormal, and the MD5 code of the detection method used by the consensus node to verify abnormal traffic.

区块主标识符是它的加密哈希值,一个通过SHA256算法对区块头进行二次哈希计算而得到的数字指纹。产生的哈希值称为区块哈希值,区块哈希值可以唯一、明确地标识一个区块,并且任何节点通过简单地对区块头进行哈希计算都可以独立地获取该区块哈希值。第二种识别区块的方式是通过该区块在区块链中的位置,即“区块高度”。第一个区块,其区块高度为0。因此,区块可以通过两种方式被识别:区块哈希值或者区块高度。The block primary identifier is its cryptographic hash, a digital fingerprint obtained by hashing the block header twice using the SHA256 algorithm. The resulting hash value is called the block hash value. The block hash value can uniquely and clearly identify a block, and any node can independently obtain the block hash by simply hashing the block header. Hope value. The second way to identify a block is by its position in the blockchain, known as the "block height." The first block has a block height of 0. Therefore, blocks can be identified in two ways: block hash or block height.

共识节点在调用异常流量检测方法进行验证的同时,可以获取到该检测方法的MD5码,检测方法的MD5码会同异常流量查证的结果以及节点签名一同广播出去,MD5码可作为检测方法的标识,同流量信息和异常流量查证结果一同存储在区块链中,可供追溯查询。When the consensus node calls the abnormal traffic detection method for verification, it can obtain the MD5 code of the detection method. The MD5 code of the detection method is broadcast together with the abnormal traffic verification results and the node signature. The MD5 code can be used as the identification of the detection method. The traffic information and abnormal traffic verification results are stored in the blockchain and can be traced and queried.

当该共识节点集群里每个共识节点对流量消息的查证结果达成共识后,由建块节点将流量消息及结果打包进区块中。When each consensus node in the consensus node cluster reaches a consensus on the verification results of the traffic message, the block building node packages the traffic message and results into a block.

建块节点的确定的步骤如下:The steps to determine the building block node are as follows:

为了确定建块建块节点,设定一个预选指数T,T同节点信誉系统组合在一起,建立建块节点选取机制。设P(0<P<1)为某个节点在每轮共识之后的信誉评分,e为这个节点被选为建块节点的次数。建立这样的指数关系:In order to determine the block-building nodes, a pre-selection index T is set, and T is combined with the node reputation system to establish a block-building node selection mechanism. Let P(0<P<1) be the reputation score of a node after each round of consensus, and e be the number of times this node is selected as a block-building node. Establish an exponential relationship like this:

T=Pe T=P e

每次选取建块节点时,对组内每个共识节点的预选指数T进行排序,选择预选指数最高的节点作为建块节点。Each time a block-building node is selected, the pre-selection index T of each consensus node in the group is sorted, and the node with the highest pre-selection index is selected as the block-building node.

当某个节点信誉分不变,并且一直都比较高时,当它每成为一次建块节点后,e会增大,则它的预选指数T就会降低。这样就能保证不会每一次选取的建块节点都是相同的信誉良好的节点,让每个信誉良好的节点都有机会被选为建块节点。When a node's reputation score remains unchanged and remains relatively high, e will increase each time it becomes a block-building node, and its preselection index T will decrease. This ensures that the block-building nodes selected each time are not the same reputable nodes, so that every node with good reputation has the opportunity to be selected as a block-building node.

如果某个节点信誉分比较低,则P就比较低,它的预选指数T能保证比较低,被选取为建块节点的概率就比较低。If a node's reputation score is relatively low, then P is relatively low, its preselection index T can be guaranteed to be relatively low, and the probability of being selected as a block-building node is relatively low.

多次共识中信誉分都很差的节点,可能会存在作假。会根据节点信誉机制,识别出作假,不能参与投票,同时不能加入到共识节点组选取的节点池中。等到该共识节点排除故障之后,再重新加入到预选的节点池中。Nodes with poor reputation scores in multiple consensuses may be cheating. Fraud will be identified based on the node reputation mechanism and cannot participate in voting. At the same time, it cannot join the node pool selected by the consensus node group. Wait until the consensus node is out of order and then rejoin the pre-selected node pool.

确定了建块节点之后,节点对流量特征消息信息进行验证,并把验证结果和采用的异常流量检测方法的MD5码一同广播给所有共识节点。After the block-building node is determined, the node verifies the traffic characteristic message information, and broadcasts the verification result and the MD5 code of the abnormal traffic detection method to all consensus nodes.

共识节点集群里的共识节点对该区块进行共识。共识成功后,将该区块作为待上链的区块,放入区块队列中。The consensus nodes in the consensus node cluster consensus on the block. After the consensus is successful, the block will be put into the block queue as a block to be uploaded to the chain.

每个共识节点将R附上签名广播给其他节点自己的commit消息<<COMMIT,view,n,digest(message),signature,methods>message>,建块节点集齐至少2f+1个被共识节点验证过的commit消息,说明本次共识提案顺利通过。Each consensus node attaches a signature to R and broadcasts its own commit message <<COMMIT, view, n, digest(message), signature, methods> message> to other nodes. The block building nodes gather at least 2f+1 consensus nodes. The verified commit message indicates that this consensus proposal was successfully passed.

建块建块节点根据这个结果,建立区块,并将这个区块放入预区块队列中,等待空闲共识节点对每个区块父区块哈希进行共识,建立最终的区块。The block-building node creates a block based on this result, puts the block into the pre-block queue, and waits for the idle consensus node to agree on the parent block hash of each block to establish the final block.

上链节点集群对区块队列中的每一待上链的区块进行共识并成功之后,将每一待上链的区块添加至区块链中。After the chain node cluster reaches consensus on each block to be uploaded in the block queue and succeeds, each block to be uploaded is added to the blockchain.

其中,上链节点集群,包括从共识节点池未被选入任一共识节点集群的各共识节点中选取的(3f+1)个不重复的共识节点。Among them, the on-chain node cluster includes (3f+1) unique consensus nodes selected from the consensus nodes that have not been selected into any consensus node cluster in the consensus node pool.

具体地,从共识节点池的剩余空闲节点中选取的上链节点集群,从队列中取出区块,然后将当前区块链的顶端区块头hash作为该块的PreHash,然后进行共识,并附上签名。共识成功之后,该区块成为区块链新的顶端区块。Specifically, the uplink node cluster is selected from the remaining idle nodes in the consensus node pool, removes the block from the queue, and then uses the top block header hash of the current blockchain as the PreHash of the block, and then performs consensus and attaches sign. After the consensus is successful, the block becomes the new top block of the blockchain.

经过共识确认后的检测结果会被记录到区块链上,可随时进行追溯查询。基于改进的拜占庭共识协议对异常流量进行查证、处理,建立区块链网络记录异常信息,可随时进行追溯查询。The test results confirmed by consensus will be recorded on the blockchain and can be traced back at any time. Based on the improved Byzantine consensus protocol, abnormal traffic is verified and processed, and a blockchain network is established to record abnormal information, which can be traced back at any time.

本发明实施例采用拜占庭区块链系统来记录存储异常信息,区块链结构保证了数据难篡改性和安全性。流量特征信息以及检测结果、检测方法摘要都存储在区块链上,具有极难篡改性,区块链是一种分布式数据库,即使某一个节点丢失了数据,也可以从其他节点恢复。整个共识系统采用拜占庭容错机制,攻击者必须要同时攻击f个以上的节点才能对整个系统造成攻击,难度很高。The embodiment of the present invention uses a Byzantine blockchain system to record and store abnormal information, and the blockchain structure ensures that the data is difficult to tamper with and is safe. Traffic characteristic information, detection results, and detection method summaries are all stored on the blockchain, which is extremely difficult to tamper with. The blockchain is a distributed database. Even if a node loses data, it can be restored from other nodes. The entire consensus system adopts a Byzantine fault-tolerant mechanism. An attacker must attack more than f nodes at the same time to attack the entire system, which is very difficult.

基于上述各实施例的内容,共识节点集群中的每一共识节点选择一种异常流量检测方法的具体步骤包括:根据区块链的高度、每一共识节点的编号和异常流量检测方法的个数,选择一种异常流量检测方法。Based on the contents of the above embodiments, the specific steps for each consensus node in the consensus node cluster to select an abnormal traffic detection method include: based on the height of the blockchain, the number of each consensus node and the number of abnormal traffic detection methods. , select an abnormal traffic detection method.

具体地,共识节点的数据检测模块拥有N种独立的检测方法,编号为1-N。其中,N为正整数。每种方法通过类的方式封装起来,对外只提供一个简单的函数接口。Specifically, the data detection module of the consensus node has N independent detection methods, numbered 1-N. Among them, N is a positive integer. Each method is encapsulated in a class and only provides a simple function interface to the outside world.

共识节点对流量数据进行检测时,为了尽可能让本轮参与投票的共识节点更加平均的使用各种检测方法,检测流量数据信息前首先共识节点通过如下选择方法确定本轮使用的异常流量检测方法:When the consensus node detects the traffic data, in order to make the consensus nodes participating in the voting in this round use various detection methods as evenly as possible, before detecting the traffic data information, the consensus node first determines the abnormal traffic detection method used in this round through the following selection method. :

1)获取当前区块链高度H和节点编号K。1) Get the current blockchain height H and node number K.

2)计算M=(H+K)%N+1,M即是本节点选中的异常流量检测方法编号。2) Calculate M=(H+K)%N+1, M is the abnormal traffic detection method number selected by this node.

本发明实施例根据区块链的高度、每一共识节点的编号和异常流量检测方法的个数,选择一种异常流量检测方法,能提高识别效率和准确性。The embodiment of the present invention selects an abnormal traffic detection method based on the height of the blockchain, the number of each consensus node, and the number of abnormal traffic detection methods, which can improve identification efficiency and accuracy.

基于上述各实施例的内容,根据预设的选举算法,从共识节点池中随机选择多组共识节点集群,与对于每一共识节点集群接收的公共流量消息,共识节点集群中的每一共识节点选择一种异常流量检测方法,获取共识节点的检测结果并向共识节点集群中的其他共识节点广播之间,还包括:共识节点集群中的任一共识节点,基于过滤机制,接收预设范围内的数据采集节点发送的流量消息,并向共识节点集群中的其他共识节点广播。Based on the contents of the above embodiments, according to the preset election algorithm, multiple groups of consensus node clusters are randomly selected from the consensus node pool, and for the public traffic messages received by each consensus node cluster, each consensus node in the consensus node cluster Select an abnormal traffic detection method, obtain the detection results of the consensus node and broadcast them to other consensus nodes in the consensus node cluster. It also includes: any consensus node in the consensus node cluster, based on the filtering mechanism, receives within the preset range The traffic messages sent by the data collection node are broadcast to other consensus nodes in the consensus node cluster.

具体地,数据采集节点接收流量信息采集工具采集的流量信息数据包,通过检查数据包的大小、版本号以及接收到的字节数是否足以容纳头标信息来确保数据包来自有效的流量源头。在接受到有效数据包后,数据采集节点对收到的流量信息流进行处理,将需要的数据打包进入流量特征消息。每隔一段时间,发送至所有共识节点。与一般数据采集不同,本系统数据采集节点会对流量特征消息进行签名,提高数据的有效性。Specifically, the data collection node receives the traffic information packet collected by the traffic information collection tool, and ensures that the data packet comes from a valid traffic source by checking the size of the packet, the version number, and whether the number of bytes received is sufficient to accommodate the header information. After receiving the valid data packet, the data collection node processes the received traffic information stream and packages the required data into the traffic characteristic message. Every once in a while, it is sent to all consensus nodes. Different from general data collection, the data collection nodes of this system will sign the traffic characteristic messages to improve the validity of the data.

若共识节点集群中的全部共识节点接收到流量消息,则将流量消息确定为公共流量消息。If all consensus nodes in the consensus node cluster receive the traffic message, the traffic message will be determined as a public traffic message.

具体地,对于任一流量消息,共识节点集群中的全部共识节点均接收到该流量消息,则该流量消息为公共流量消息。Specifically, for any traffic message, if all consensus nodes in the consensus node cluster receive the traffic message, the traffic message is a public traffic message.

本发明实施例根据全部共识节点接收到流量消息,对发送该流量消息的数据采集节点是否被控进行识别,能提高识别效率和准确性,能保证识别的高有效性和高可靠性。The embodiment of the present invention identifies whether the data collection node sending the traffic message is controlled based on all consensus nodes receiving the traffic message, which can improve the identification efficiency and accuracy and ensure high effectiveness and reliability of identification.

下面对本发明实施例提供的运营商关键基础设施被控识别系统进行描述,下文描述的运营商关键基础设施被控识别系统与上文描述的运营商关键基础设施被控识别方法可相互对应参照。The following is a description of the controlled identification system for operator's critical infrastructure provided by the embodiment of the present invention. The system for identifying controlled operator's critical infrastructure described below and the method for identifying controlled operator's critical infrastructure described above can correspond to each other.

图2是本发明实施例提供的一种运营商关键基础设施被控识别系统的结构示意图。基于上述各实施例的内容,如图2所示,该系统包括多个共识节点202和多个数据采集节点201。Figure 2 is a schematic structural diagram of an operator's key infrastructure controlled identification system provided by an embodiment of the present invention. Based on the contents of the above embodiments, as shown in Figure 2, the system includes multiple consensus nodes 202 and multiple data collection nodes 201.

具体地,该运营商关键基础设施被控识别系统由关键基础设施构成。关键基础设施至少包括两种:多个共识节点202和多个数据采集节点201。Specifically, the operator's critical infrastructure controlled identification system consists of critical infrastructure. Key infrastructure includes at least two types: multiple consensus nodes 202 and multiple data collection nodes 201.

数据采集节点201,用于根据目标区域网络的流量信息,获取目标区域网络的多种流量特征,并向共识节点发送携带有目标区域网络的多种流量特征的流量消息。The data collection node 201 is used to obtain various traffic characteristics of the target area network based on the traffic information of the target area network, and send traffic messages carrying the various traffic characteristics of the target area network to the consensus node.

具体地,一个网络连接定义为在某个时间内从开始到结束的TCP数据包序列,并且在这段时间内,数据在预定义的协议下(如TCP、UDP)从源IP地址到目的IP地址的传递。将每个网络连接被标记为正常(normal)或异常(attack),异常类型被细分为4大类共39种攻击类型。将每个连接记录用41个特征来描述,加上最后的标记(label),一共有42项。其中前41项流量特征分为4大类:Specifically, a network connection is defined as a sequence of TCP packets from start to end within a certain period of time, and during this period of time, data is transferred from the source IP address to the destination IP under a predefined protocol (such as TCP, UDP) Delivery of address. Each network connection is marked as normal (normal) or abnormal (attack), and abnormal types are subdivided into 4 major categories and a total of 39 attack types. Each connection record is described with 41 features, plus the final label, for a total of 42 items. The first 41 traffic characteristics are divided into 4 categories:

1)TCP连接基本特征(共9种)1) Basic characteristics of TCP connections (9 types in total)

2)TCP连接的内容特征(共13种)2) Content characteristics of TCP connections (13 types in total)

3)基于时间的网络流量统计特征(共9种)3) Time-based network traffic statistical characteristics (9 types in total)

4)基于主机的网络流量统计特征(共10种)4) Host-based network traffic statistical characteristics (10 types in total)

4种异常类型分别是:The 4 exception types are:

DOS(denial-of-service),拒绝服务攻击,例如ping-of-death,syn flood,smurf等;具体表现有,制造大流量无用数据,造成通往被攻击主机的网络拥塞,使被攻击主机无法正常和外界通信。利用被攻击主机提供服务或传输协议上处理重复连接的缺陷,反复高频的发出攻击性的重复服务请求,使被攻击主机无法及时处理其它正常的请求。利用被攻击主机所提供服务程序或传输协议的本身实现缺陷,反复发送畸形的攻击数据引发系统错误的分配大量系统资源,使主机处于挂起状态甚至死机。DOS (denial-of-service), denial of service attacks, such as ping-of-death, syn flood, smurf, etc.; specific manifestations include creating a large flow of useless data, causing network congestion leading to the attacked host, causing the attacked host to Unable to communicate with the outside world normally. Taking advantage of the flaws in the service provided by the attacked host or the processing of repeated connections in the transmission protocol, repeated and high-frequency aggressive repeated service requests are issued, making the attacked host unable to process other normal requests in a timely manner. Taking advantage of the implementation flaws of the service program or transmission protocol provided by the attacked host, repeatedly sending malformed attack data causes the system to incorrectly allocate a large amount of system resources, leaving the host in a suspended state or even crashing.

R2L(unauthorized access from a remote machine to a local machine),来自远程主机的未授权访问,例如guessing password;在目标主机上没有账户的攻击者获得该机器的当地访问权限,从机器中过滤出数据、修改数据等的攻击方式。R2L (unauthorized access from a remote machine to a local machine), unauthorized access from a remote host, such as guessing password; an attacker who does not have an account on the target host obtains local access to the machine and filters out data from the machine. Attack methods such as modifying data.

U2R(unauthorized access to local superuser privileges by a localunpivileged user),未授权的本地超级用户特权访问,例如buffer overflow attacks;U2R (unauthorized access to local superuser privileges by a localunpivileged user), unauthorized access to local superuser privileges, such as buffer overflow attacks;

PROBING(surveillance and probing),探针攻击,端口监视或扫描,例如port-scan,ping-sweep等。指对计算机网络或DNS服务器进行扫描,获取有效IP地址、活动端口号、主机操作系统类型和安全弱点的攻击方式。PROBING (surveillance and probing), probe attack, port monitoring or scanning, such as port-scan, ping-sweep, etc. It refers to an attack method that scans a computer network or DNS server to obtain valid IP addresses, active port numbers, host operating system types, and security weaknesses.

当流量采集节点201采集到流量的特征数据后,将其封装成一条消息,并附上自身的签名,然后发送给共识节点。After the traffic collection node 201 collects the characteristic data of the traffic, it encapsulates it into a message, attaches its own signature, and then sends it to the consensus node.

每条流量信息可以包含如下字段:Each piece of traffic information can contain the following fields:

srcaddr:源头的IP地址,如119.75.216.20。srcaddr: source IP address, such as 119.75.216.20.

dstaddr:目的地IP地址,如182.254.18.159。dstaddr: destination IP address, such as 182.254.18.159.

srcport:TCP/UDP源头的端口,如60221。srcport: TCP/UDP source port, such as 60221.

dstport:TCP/UDP目的地的端口,如80,443。dstport: TCP/UDP destination port, such as 80, 443.

prot:协议类型,如6=TCP,17=UDP。prot: protocol type, such as 6=TCP, 17=UDP.

First:信息流开始时间。First: Information flow start time.

Last:信息流的最后一个数据包被接收时的时间。Last: The time when the last packet of the information flow was received.

size:信息流传输信息的总大小,单位byte。size: The total size of the information transmitted by the information flow, in byte.

PacketCount:信息流中报的数量。PacketCount: The number of packets reported in the information flow.

共识节点202,用于基于共识机制和流量消息,识别数据采集节点是否被控以及其他共识节点是否被控。The consensus node 202 is used to identify whether the data collection node is controlled and whether other consensus nodes are controlled based on the consensus mechanism and traffic messages.

具体地,对于每一共识节点集群接收的公共流量消息,共识节点集群中的每一共识节点202选择一种异常流量检测方法,获取共识节点202的检测结果并向共识节点集群中的其他共识节点202广播。Specifically, for the public traffic messages received by each consensus node cluster, each consensus node 202 in the consensus node cluster selects an abnormal traffic detection method, obtains the detection result of the consensus node 202 and sends it to other consensus nodes in the consensus node cluster. 202 broadcast.

共识节点集群基于共识机制和各共识节点的检测结果,识别发送公共流量消息的数据采集节点是否被控。The consensus node cluster identifies whether the data collection node sending the public traffic message is controlled based on the consensus mechanism and the detection results of each consensus node.

本发明实施例提供的运营商关键基础设施被控识别系统,用于执行本发明上述各实施例提供的运营商关键基础设施被控识别方法,该运营商关键基础设施被控识别系统包括的各模块实现相应功能的具体方法和流程详见上述运营商关键基础设施被控识别方法的实施例,此处不再赘述。The operator's critical infrastructure controlled identification system provided by the embodiment of the present invention is used to execute the operator's critical infrastructure controlled identification method provided by the above embodiments of the present invention. The operator's critical infrastructure controlled identification system includes various The specific methods and processes for the module to implement the corresponding functions are detailed in the above-mentioned embodiment of the operator's critical infrastructure controlled identification method, and will not be described again here.

该运营商关键基础设施被控识别系统用于前述各实施例的运营商关键基础设施被控识别方法。因此,在前述各实施例中的运营商关键基础设施被控识别方法中的描述和定义,可以用于本发明实施例中各执行模块的理解。The operator's critical infrastructure controlled identification system is used in the operator's critical infrastructure controlled identification methods of each of the foregoing embodiments. Therefore, the descriptions and definitions in the methods for identifying controlled critical infrastructure of operators in the foregoing embodiments can be used for the understanding of each execution module in the embodiments of the present invention.

本发明实施例通过随机选择异常检测方法产生检测结果并广播,在整个共识节点集群中基于实用拜占庭协议算法进行共识,识别该数据采集节点是否被控,能提高识别效率和准确性,能保证识别的高有效性和高可靠性以及系统的可扩展性。The embodiment of the present invention generates detection results by randomly selecting anomaly detection methods and broadcasts them, and performs consensus based on a practical Byzantine agreement algorithm in the entire consensus node cluster to identify whether the data collection node is controlled, which can improve identification efficiency and accuracy and ensure identification. High effectiveness and reliability as well as system scalability.

基于上述各实施例的内容,运营商关键基础设施被控识别系统至少包括两层数据采集节点。Based on the contents of the above embodiments, the operator's critical infrastructure controlled identification system includes at least two layers of data collection nodes.

具体地,基于运营商的网络结构,可以部署至少两层数据采集节点,对应不同区域的网络。Specifically, based on the operator's network structure, at least two layers of data collection nodes can be deployed, corresponding to the network in different areas.

第一层中的每一数据采集节点,用于根据对应的第一区域网络的流量信息,获取第一区域网络的多种流量特征。Each data collection node in the first layer is used to obtain various traffic characteristics of the first regional network based on the corresponding traffic information of the first regional network.

具体地,第一区域一般为省域,第一区域网络为省域网络(简称“省域网”)。Specifically, the first area is generally a provincial area, and the first area network is a provincial area network (referred to as "provincial area network").

在运营商每一个省内网络中,汇接层上省级节点的交换路由,会与其它所有省内的城域网相连接。在省级节点部署固定数量的数据采集节点,而且运营商网络拓扑结构中省级节点数量十分有限,所以在每一个省级节点路由上部署数据采集节点的经济成本相对较小。In each provincial network of an operator, the switching routes of provincial nodes on the tandem layer will be connected to all other provincial metropolitan area networks. A fixed number of data collection nodes are deployed at provincial nodes, and the number of provincial nodes in the operator's network topology is very limited, so the economic cost of deploying data collection nodes on each provincial node route is relatively small.

第二层包括至少一个数据采集节点;第二层中的每一数据采集节点,用于根据预设的轮换算法,分别根据每一第二区域网络的流量信息,获取第二区域网络的多种流量特征。The second layer includes at least one data collection node; each data collection node in the second layer is used to obtain various data of the second regional network based on the traffic information of each second regional network according to the preset rotation algorithm. traffic characteristics.

其中,第二区域为第一区域的子区域。The second area is a sub-area of the first area.

具体地,第二区域一般为城域,第二区域网络为城域网络(简称“城域网”)。Specifically, the second area is generally a metropolitan area, and the second area network is a metropolitan area network ("metropolitan area network" for short).

每一个运营商的省内网络下方,都会有十个以上的城域网络,在每个城域网上都部署数据采集节点是不现实的,成本很大。基于这样的背景,设计这样的策略:设定一个这样的数据采集节点,它与探测每个城域网对外交换流量信息的路由流量数据监测工具设备相连接,然后采用时间片轮转的方式,数据采集节点选择接受某个特定城域网对外传输的流量信息,这样就能获取到这个城域网对省内其他城域网传输的流量信息。Under each operator's provincial network, there will be more than ten metropolitan area networks. It is unrealistic and costly to deploy data collection nodes on each metropolitan area network. Based on this background, the following strategy is designed: set up a data collection node, which is connected to the routing traffic data monitoring tool equipment that detects the external exchange traffic information of each metropolitan area network, and then uses time slice rotation to collect the data. The collection node chooses to accept the traffic information transmitted by a specific metropolitan area network to the outside world, so that it can obtain the traffic information transmitted by this metropolitan area network to other metropolitan area networks in the province.

时间片轮转算法具体策略为:首先,数据采集节点选择一个较小的时间片t,这个时间段内监测并记录此段时间内网络流量的多少。经过一轮时间片轮转,根据上一轮每个城域网路由对外传输的数据量的大小,给不同城域网划分不同的优先级同时进行时间片流转处理排序,上一轮流量数据多的节点优先级较高,数据采集节点优先检测这个城域网路由对外传输的流量数据。同时,还有辅助策略,设定一个时间片系数L,初始时间片系数为某个特定的值,如果连续很多轮某个城域网路由都有较高的优先级,会将这个城域网路由对应的时间片系数增大一定的数量,让数据采集节点能有较多的时间采集这个拥有较多对外传输数据的路由流量,这样就能保证在某个特定城域网流量在阶段峰值内,能采集较多的流量数据信息。同理,如果连续很多轮,某个特定城域网路由的优先级都较低,适当降低该城域网路由的时间片系数,最低降为初始的时间片系数。每个城域网路由被数据采集节点监测的时间T为:The specific strategy of the time slice rotation algorithm is: first, the data collection node selects a smaller time slice t, and monitors and records the amount of network traffic during this time period. After a round of time slice rotation, according to the amount of data transmitted externally by each metropolitan area network route in the previous round, different priorities are assigned to different metropolitan area networks and the time slice flow processing is sorted. The traffic data in the previous round is large. The node priority is higher, and the data collection node gives priority to detect the traffic data transmitted externally by this metropolitan area network route. At the same time, there is also an auxiliary strategy, which sets a time slice coefficient L. The initial time slice coefficient is a specific value. If a certain metropolitan area network route has a higher priority for many consecutive rounds, this metropolitan area network will be The time slice coefficient corresponding to the route is increased by a certain amount, so that the data collection node can have more time to collect the route traffic with more external transmission data. This can ensure that the traffic of a specific metropolitan area network is within the phase peak value. , can collect more traffic data information. In the same way, if the priority of a specific metropolitan area network route is low for many consecutive rounds, the time slice coefficient of the metropolitan area network route should be appropriately reduced, at least to the initial time slice coefficient. The time T for each metropolitan area network route to be monitored by the data collection node is:

T=t×LT=t×L

时间片轮转部署策略只能保证省内传输的大部分流量被数据采集节点采集到,无法保证所有的流量信息都被采集,在这种情况下,再设计一种合理的随机部署策略,部署一些通过一些随机轮转而被使用的数据采集节点,与时间片轮转策略互相配合,就基本能保证网络中绝大多数流量都被数据采集节点所收集到。The time slice rotation deployment strategy can only ensure that most of the traffic transmitted within the province is collected by the data collection nodes, but cannot guarantee that all traffic information is collected. In this case, design a reasonable random deployment strategy and deploy some By using some data collection nodes through random rotation, and cooperating with the time slice rotation strategy, it can basically ensure that most of the traffic in the network is collected by the data collection nodes.

本发明实施例通过部署两层数据采集节点,能在部署较少的数据采集节点的情况下,采集到更全面的流量数据,从而能对运营商关键基础设施被控继续更准确、更全面的识别。By deploying two layers of data collection nodes, the embodiment of the present invention can collect more comprehensive traffic data while deploying fewer data collection nodes, thereby enabling more accurate and comprehensive control of the operator's key infrastructure. Identify.

以上所描述的系统实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The system embodiments described above are only illustrative. The units described as separate components may or may not be physically separated. The components shown as units may or may not be physical units, that is, they may be located in One location, or it can be distributed across multiple network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. Persons of ordinary skill in the art can understand and implement the method without any creative effort.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and of course, it can also be implemented by hardware. Based on this understanding, the part of the above technical solution that essentially contributes to the existing technology can be embodied in the form of a software product. The computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., including a number of instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or certain parts of the embodiments.

最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that it can still be used Modifications are made to the technical solutions described in the foregoing embodiments, or equivalent substitutions are made to some of the technical features; however, these modifications or substitutions do not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (6)

1.一种运营商关键基础设施被控识别方法,其特征在于,包括:1. A method for identifying controlled critical infrastructure of an operator, which is characterized by including: 根据预设的选举算法,从共识节点池中随机选择若干组共识节点集群;According to the preset election algorithm, several groups of consensus node clusters are randomly selected from the consensus node pool; 其中,任一组共识节点集群中的任一共识节点,不在其他共识节点集群中;每组所述共识节点集群分别接收来自不同的流量采集域的流量消息,不同所述共识节点集群通过设置IPtables选择接受对应范围的数据采集节点发送的流量消息,过滤其余数据采集节点发送的消息;Among them, any consensus node in any group of consensus node clusters is not in other consensus node clusters; each group of the consensus node clusters receives traffic messages from different traffic collection domains, and different consensus node clusters are configured by setting IPtables Select to accept traffic messages sent by data collection nodes in the corresponding range, and filter messages sent by other data collection nodes; 对于每一共识节点集群接收来自数据采集节点的公共流量消息,所述共识节点集群中的每一共识节点选择一种异常流量检测方法,获取所述共识节点的检测结果并向所述共识节点集群中的其他共识节点广播;For each consensus node cluster to receive public traffic messages from data collection nodes, each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection results of the consensus node, and sends the detection results to the consensus node cluster. Broadcast to other consensus nodes in 所述共识节点集群基于共识机制和各共识节点对所述公共流量消息的检测结果,识别发送所述公共流量消息的数据采集节点是否被控;The consensus node cluster identifies whether the data collection node sending the public traffic message is controlled based on the consensus mechanism and the detection results of the public traffic message by each consensus node; 其中,所述共识节点集群包括3f+1个不重复的共识节点,f为正整数;所述公共流量消息,携带有目标区域网络的多种流量特征;Wherein, the consensus node cluster includes 3f+1 non-duplicate consensus nodes, f is a positive integer; the public traffic message carries various traffic characteristics of the target area network; 所述共识节点集群基于共识机制和各共识节点的检测结果,识别发送所述公共流量消息的数据采集节点是否被控的具体步骤包括:The consensus node cluster is based on the consensus mechanism and the detection results of each consensus node. The specific steps to identify whether the data collection node sending the public traffic message is controlled include: 所述共识节点接收所述其他共识节点广播的检测结果,根据所述共识节点的检测结果和所述其他共识节点广播的检测结果进行投票,获取所述共识节点的投票结果并向所述共识节点集群中的其他共识节点广播;The consensus node receives the detection results broadcast by the other consensus nodes, votes based on the detection results of the consensus node and the detection results broadcast by the other consensus nodes, obtains the voting results of the consensus node and sends them to the consensus node Broadcast to other consensus nodes in the cluster; 所述共识节点接收所述其他共识节点广播的投票结果,根据所述共识节点的投票结果和所述其他共识节点广播的投票结果,识别发送所述公共流量消息的数据采集节点是否被控;The consensus node receives the voting results broadcast by the other consensus nodes, and identifies whether the data collection node sending the public traffic message is controlled based on the voting results of the consensus node and the voting results broadcast by the other consensus nodes; 若建块节点判断获知接收到的共识节点广播的投票结果的数量不少于2f+1,则根据识别发送所述公共流量消息的数据采集节点是否被控的结果生成待上链的区块,将所述待上链的区块接入区块队列;If the block-building node determines that the number of voting results broadcast by the received consensus node is not less than 2f+1, the block to be uploaded will be generated based on the result of identifying whether the data collection node that sent the public traffic message is controlled. Connect the block to be uploaded to the block queue; 上链节点集群对所述区块队列中的每一待上链的区块进行共识并成功之后,将所述每一待上链的区块添加至区块链中;After the uplink node cluster reaches consensus on each block to be uploaded in the block queue and succeeds, it adds each block to be uploaded to the blockchain; 其中,所述建块节点为根据预设的选取算法,从所述每一共识节点集群中选取的一个共识节点;所述上链节点集群,包括从共识节点池未被选入任一共识节点集群的各共识节点中选取的3f+1个不重复的共识节点;Wherein, the block building node is a consensus node selected from each consensus node cluster according to a preset selection algorithm; the uplink node cluster includes any consensus node that has not been selected from the consensus node pool. 3f+1 unique consensus nodes selected from each consensus node in the cluster; 所述获取所述共识节点的投票结果并向所述共识节点集群中的其他共识节点广播之后,还包括:After obtaining the voting results of the consensus node and broadcasting them to other consensus nodes in the consensus node cluster, it also includes: 获取各所述共识节点的投票结果的评分;Obtain the score of the voting results of each consensus node; 若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别所述任一共识节点被控;If it is determined that the score of the voting result of any consensus node meets the preset conditions, it is identified that any consensus node is controlled; 其中,对于所述共识节点的投票结果的评分,若所述共识节点的投票结果与共识投票结果不一致则评分低,若所述共识节点的投票结果与共识投票结果一致则评分高。Wherein, regarding the score of the voting result of the consensus node, if the voting result of the consensus node is inconsistent with the consensus voting result, the score is low, and if the voting result of the consensus node is consistent with the consensus voting result, the score is high. 2.根据权利要求1所述的运营商关键基础设施被控识别方法,其特征在于,所述若判断获知任一共识节点的投票结果的评分满足预设的条件,则识别所述任一共识节点被控之后,还包括:2. The method for identifying controlled critical infrastructure of an operator according to claim 1, characterized in that if it is determined that the score of the voting result of any consensus node satisfies the preset conditions, then any consensus node is identified After the node is controlled, it also includes: 将所述任一共识节点作为失效节点,并从共识节点池中删除所述任一共识节点。Treat any consensus node as an invalid node and delete any consensus node from the consensus node pool. 3.根据权利要求1所述的运营商关键基础设施被控识别方法,其特征在于,所述共识节点集群中的每一共识节点选择一种异常流量检测方法的具体步骤包括:3. The method for identifying controlled critical infrastructure of operators according to claim 1, characterized in that the specific steps for each consensus node in the consensus node cluster to select an abnormal traffic detection method include: 根据所述区块链的高度、所述每一共识节点的编号和异常流量检测方法的个数,选择一种异常流量检测方法。According to the height of the blockchain, the number of each consensus node and the number of abnormal traffic detection methods, an abnormal traffic detection method is selected. 4.根据权利要求1所述的运营商关键基础设施被控识别方法,其特征在于,所述根据预设的选举算法,从共识节点池中随机选择若干组共识节点集群,与所述对于每一共识节点集群接收的公共流量消息,所述共识节点集群中的每一共识节点选择一种异常流量检测方法,获取所述共识节点的检测结果并向所述共识节点集群中的其他共识节点广播之间,还包括:4. The method for identifying controlled critical infrastructure of operators according to claim 1, characterized in that, according to the preset election algorithm, several groups of consensus node clusters are randomly selected from the consensus node pool, and the method for each group is A public traffic message received by a consensus node cluster. Each consensus node in the consensus node cluster selects an abnormal traffic detection method, obtains the detection result of the consensus node, and broadcasts it to other consensus nodes in the consensus node cluster. In between, it also includes: 所述共识节点集群中的任一共识节点,基于过滤机制,接收预设范围内的数据采集节点发送的流量消息,并向所述共识节点集群中的其他共识节点广播;Any consensus node in the consensus node cluster, based on the filtering mechanism, receives traffic messages sent by data collection nodes within the preset range, and broadcasts them to other consensus nodes in the consensus node cluster; 若所述共识节点集群中的全部共识节点接收到所述流量消息,则将所述流量消息确定为公共流量消息。If all consensus nodes in the consensus node cluster receive the traffic message, the traffic message is determined to be a public traffic message. 5.一种运营商关键基础设施被控识别系统,其特征在于,包括:多个共识节点和多个数据采集节点;5. A controlled identification system for key infrastructure of an operator, which is characterized by including: multiple consensus nodes and multiple data collection nodes; 所述数据采集节点,用于根据目标区域网络的流量信息,获取所述目标区域网络的多种流量特征,并向共识节点发送携带有所述目标区域网络的多种流量特征的流量消息;The data collection node is configured to obtain multiple traffic characteristics of the target area network based on the traffic information of the target area network, and send traffic messages carrying the multiple traffic characteristics of the target area network to the consensus node; 所述共识节点,用于基于共识机制和所述流量消息,识别数据采集节点是否被控以及其他共识节点是否被控;The consensus node is used to identify whether the data collection node is controlled and whether other consensus nodes are controlled based on the consensus mechanism and the traffic message; 所述运营商关键基础设施被控识别系统能够实现如权利要求1至4任一权利要求所述的运营商关键基础设施被控识别方法。The operator's critical infrastructure controlled identification system can implement the operator's critical infrastructure controlled identification method as described in any one of claims 1 to 4. 6.根据权利要求5所述的运营商关键基础设施被控识别系统,其特征在于,至少包括两层所述数据采集节点;6. The operator's critical infrastructure controlled identification system according to claim 5, characterized in that it includes at least two layers of data collection nodes; 第一层中的每一数据采集节点,用于所述根据对应的第一区域网络的流量信息,获取所述第一区域网络的多种流量特征;Each data collection node in the first layer is used to obtain multiple traffic characteristics of the first regional network based on the traffic information of the corresponding first regional network; 第二层包括至少一个所述数据采集节点;所述第二层中的每一数据采集节点,用于根据预设的轮换算法,分别根据每一第二区域网络的流量信息,获取所述第二区域网络的多种流量特征;The second layer includes at least one data collection node; each data collection node in the second layer is used to obtain the third data collection node according to the traffic information of each second regional network according to a preset rotation algorithm. Various traffic characteristics of the second area network; 其中,所述第二区域为所述第一区域的子区域。Wherein, the second area is a sub-area of the first area.
CN202011415992.6A 2020-12-03 2020-12-03 Controlled identification method and system for key infrastructure of operator Active CN114615002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011415992.6A CN114615002B (en) 2020-12-03 2020-12-03 Controlled identification method and system for key infrastructure of operator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011415992.6A CN114615002B (en) 2020-12-03 2020-12-03 Controlled identification method and system for key infrastructure of operator

Publications (2)

Publication Number Publication Date
CN114615002A CN114615002A (en) 2022-06-10
CN114615002B true CN114615002B (en) 2024-02-27

Family

ID=81857108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011415992.6A Active CN114615002B (en) 2020-12-03 2020-12-03 Controlled identification method and system for key infrastructure of operator

Country Status (1)

Country Link
CN (1) CN114615002B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616534A (en) * 2018-04-28 2018-10-02 中国科学院信息工程研究所 A kind of method and system for protecting internet of things equipment ddos attack based on block chain
CN110289966A (en) * 2019-06-19 2019-09-27 西南交通大学 Consensus method of anti-adaptive attack alliance chain based on Byzantine fault tolerance
CN110363223A (en) * 2019-06-20 2019-10-22 华南理工大学 Industrial flow data processing method, detection method, system, device and medium
CN110569675A (en) * 2019-09-18 2019-12-13 上海海事大学 A multi-agent transaction information protection method based on blockchain technology
CN110677485A (en) * 2019-09-30 2020-01-10 大连理工大学 Dynamic layered Byzantine fault-tolerant consensus method based on credit
TW202017337A (en) * 2018-10-29 2020-05-01 財團法人電信技術中心 Method and system for backbone network flow anomaly detection
CN111262851A (en) * 2020-01-14 2020-06-09 中移(杭州)信息技术有限公司 DDOS attack detection method, device, electronic device and storage medium
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN111988321A (en) * 2020-08-24 2020-11-24 桂林电子科技大学 Alliance chain abnormity detection system based on machine learning and detection method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7680757B2 (en) * 2004-11-10 2010-03-16 Technion Research & Development Foundation Ltd. Association rule mining in peer-to peer systems
US8504504B2 (en) * 2008-09-26 2013-08-06 Oracle America, Inc. System and method for distributed denial of service identification and prevention

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616534A (en) * 2018-04-28 2018-10-02 中国科学院信息工程研究所 A kind of method and system for protecting internet of things equipment ddos attack based on block chain
TW202017337A (en) * 2018-10-29 2020-05-01 財團法人電信技術中心 Method and system for backbone network flow anomaly detection
CN110289966A (en) * 2019-06-19 2019-09-27 西南交通大学 Consensus method of anti-adaptive attack alliance chain based on Byzantine fault tolerance
CN110363223A (en) * 2019-06-20 2019-10-22 华南理工大学 Industrial flow data processing method, detection method, system, device and medium
CN110569675A (en) * 2019-09-18 2019-12-13 上海海事大学 A multi-agent transaction information protection method based on blockchain technology
CN110677485A (en) * 2019-09-30 2020-01-10 大连理工大学 Dynamic layered Byzantine fault-tolerant consensus method based on credit
CN111262851A (en) * 2020-01-14 2020-06-09 中移(杭州)信息技术有限公司 DDOS attack detection method, device, electronic device and storage medium
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN111988321A (en) * 2020-08-24 2020-11-24 桂林电子科技大学 Alliance chain abnormity detection system based on machine learning and detection method thereof

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
4G时代基于网络流量大数据分析的安全预警研究;陈霖;梁坤;;湖南邮电职业技术学院学报(04);全文 *
Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks;Wei She;《IEEE Access》;全文 *
Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain;Kai Lei;《2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)》;全文 *
基于改进极端随机树的异常网络流量分类;韦海宇;王勇;柯文龙;俸皓;;计算机工程(11);全文 *
基于综合评分的DDoS检测分析报告系统;李星;刘骥琛;张千里;;东南大学学报(自然科学版)(S1);全文 *

Also Published As

Publication number Publication date
CN114615002A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN116488939B (en) Computer information security monitoring method, system and storage medium
US11411721B2 (en) Systems and methods for selecting and utilizing a committee of validator nodes in a distributed system
CN110784461B (en) A secure 6LoWPAN communication method and system based on blockchain
CN111343208B (en) Block chain-based data detection method and device and computer-readable storage medium
WO2019178966A1 (en) Network attack defense method and apparatus, and computer device and storage medium
JP6026789B2 (en) Node device for preventing overflow of pending table in name-based network system, and device and method for preventing overflow
JP5581141B2 (en) Management server, communication cutoff device, information processing system, method, and program
KR20000054538A (en) System and method for intrusion detection in network and it&#39;s readable record medium by computer
CN111200605B (en) A malicious identification defense method and system based on Handle system
CN111371735A (en) Botnet detection method, system and storage medium
WO2009135396A1 (en) Network attack processing method, processing device and network analyzing and monitoring center
CN108270722B (en) Attack behavior detection method and device
CN1252555C (en) Cooperative invading testing system based on distributed data dig
CN110266650B (en) Identification method of Conpot industrial control honeypot
CN1684431A (en) Method and device for server denial of service shield
CN1411209A (en) Method of detecting and monitoring malicious user host machine attack
CN111541670A (en) Novel dynamic honeypot system
CN113382011A (en) Method for preventing replay attack by API interface
CN112019330B (en) Intranet security audit data storage method and system based on alliance chain
CN116614251A (en) Data security monitoring system
CN114615002B (en) Controlled identification method and system for key infrastructure of operator
JP2010250607A (en) System, method and program for analysis of unauthorized access
WO2019240054A1 (en) Communication device, packet processing method, and program
CN117040943B (en) Cloud network endophytic security defense method and device based on IPv6 address driving
JP2003258795A (en) Computer aggregate operating method, implementation system therefor, and processing program therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant