CN1658576A - Detection and defence method for data flous of large network station - Google Patents

Detection and defence method for data flous of large network station Download PDF

Info

Publication number
CN1658576A
CN1658576A CN 200510033423 CN200510033423A CN1658576A CN 1658576 A CN1658576 A CN 1658576A CN 200510033423 CN200510033423 CN 200510033423 CN 200510033423 A CN200510033423 A CN 200510033423A CN 1658576 A CN1658576 A CN 1658576A
Authority
CN
China
Prior art keywords
sigma
model
detection
probability
data flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510033423
Other languages
Chinese (zh)
Other versions
CN100352208C (en
Inventor
余顺争
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CNB2005100334234A priority Critical patent/CN100352208C/en
Publication of CN1658576A publication Critical patent/CN1658576A/en
Application granted granted Critical
Publication of CN100352208C publication Critical patent/CN100352208C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention discloses a statistical abnormality detection and anti-attack method applied to large scale of network station. It includes founding module method of posting latent semi-Markov model of accident current, highly efficient model training and normal detecting calculation of the current, and the corresponding priority alignment service and current amount control measure. This invention is suitable for establishing a statistical abnormality detection and defending system that provides normal service to the normal current and filters the DDoS flood-type attacking current, and fits to the large network stations such as sports, news, entertainment, business networks.

Description

A kind of detection of data flous of large network station and defence method
Technical field
The invention belongs to the network security technology field, particularly relate to a kind of detection and defence method of data flous of large network station.
The safety of technical background large-scale website has and the different characteristics in general website.The peak traffic of large-scale website is very huge, attacks in the easiest flood formula that suffers of peak value period.So the flood formula that the most direct effective attack to large-scale website will be DDoS (the distributed denial of service of Distributed Denial-of-Service) is attacked.The traffic carrying capacity of large-scale website also has paroxysmal characteristics, and than the traffic carrying capacity of general website, its easier attack with the flood formula is obscured mutually.The common statistics method for detecting abnormality of resisting invasion for the foundation of general website might be attack stream to normal, precipitate stream erroneous judgement, thereby become inapplicable.Therefore, the safety problem of large-scale website is a kind of new technological challenge.
The security strategy that existing large-scale website adopts mainly is by the server array that adopts vast capacity, the network insertion and distributed multistage, the multipoint configuration of super large bandwidth, with reliability that improves the website and the attack of dissolving flood formula flow.The subject matter of this security strategy is that people can not unfailingly increase power system capacity, to resist the ddos attack of any degree; Excessive power system capacity also might can not get actual utilization.So, take effective the detection and the measure of resisting ddos attack, under rational input and configuration condition, the safety that improves large-scale website is very important.
The variation of large-scale website traffic carrying capacity is an astable random process.The user of common website is subjected to the influence of user's daily schedule bigger to the visit of website, thereby the traffic carrying capacity on the server, and having is the variation in cycle with day, week significantly.Macroscopical variation characteristic of this traffic carrying capacity is used to carry out the dynamic load leveling of traffic carrying capacity between the different time zone server, to the classification of website with to the prediction of flow.This macroscopic properties of common website can remain unchanged in a few hours, thereby common website traffic model often is confined to the model peak value period, that be assumed to steady-state process.The influence that the user behavior of large-scale website is arranged by large-scale activity is bigger, flow peak before and after activity is held and during carrying out (continuing tens to dozens of minutes).Variation on this macroscopic view makes the peak value stream of large-scale website have the unstable state variation characteristic.
Many studies show that over past ten years, actual stream has second order self-similarity (second orderself-similarity) and long correlation (long-range dependence).So,, still to describe with random process with second order self-similarity or long correlation for the change at random of the traffic carrying capacity of large-scale website.Consider the broad applicability of model and the validity of parameter estimation algorithm, the present invention will adopt hiddensemi-Markov model (HSMM) to describe the change at random process of traffic carrying capacity.Hidden Markovmodel (HMM) has obtained extensive and successful application at many key areas such as speech recognition, handwritten form/literal identification, digital communication encoding and decoding, dna sequence dna classification.Compare with HMM, HSMM is more suitable for distributing in describing unstable state and non-Markovian.HSMM can (but HMM can not) describe the second order self-similarity/long correlation of actual flow and dynamic variation characteristic in time, can estimate to be used to weigh the Hurst parameter of self-similarity.So, utilize HSMM can detect professional quantitative statistics abnormal conditions, determine the size of traffic carrying capacity, or the like.
Summary of the invention
The objective of the invention is to overcome the deficiencies in the prior art, provide the fine differentiation of a kind of energy to arrive the precipitate a large amount of normal flows and the attack stream of large-scale website and shield the detection and the defence method of a kind of data flous of large network station of attack stream.
The technical solution used in the present invention is as follows:
A kind of detection of data flous of large network station and defence method, set up detection model and utilize the normal flow of large-scale website to train described detection model by adopting hidden semi-Markov model, again described detection model is applied in real time detect the data flow that arrives large-scale website, concrete detection method is to calculate the probable probability of the observation sequence of each data flow with respect to detection model, carry out priority queueing according to the distribution and the size of the probable probability of data flow then, the data flow that priority is high more is just preferential more to be obtained serving the then back more acquisition service of the data flow that priority is low more.
The modeling method and the model training method of detection model hidden semi-Markov model of the present invention comprise:
(1) sets up model: establish the data flow that large-scale website detecting and have M discrete state, be expressed as 1,2 respectively, ..., M, and remember that the set of these states is S, the state transitions relation is described with the Markov chain with M state, and matrix A is represented state transition probability, its element a MnThe transition probability of representative from state m to state n, the transfer between the state are the processes that changes step by step from low to high or from high to low, i.e. a when | m-n|>1 Mn=0;
Adopt b m(k) expression arrives the probability of k entity for given state m in the unit interval, and it meets the Poisson distribution, promptly b m ( k ) = P ( X = k | state m ) = μ m k - 1 ( k - 1 ) ! e - μ m , Wherein, k=1,2 ..., ∞, μ m>0, m ∈ S, μ 1≤ μ 2≤ ...≤μ M
Make p again m(d) represent the discrete probability distribution of the duration of state m, it represents that the time difference between former and later two states is the probability of d, and it meets Pareto and distributes, promptly p m ( d ) = d - λ m - ( d + 1 ) - λ m , Wherein, d=1,2 ..., ∞, λ m>0, m ∈ S,
Use set omega={ A, π, λ, the μ } of parameter to represent hidden semi-Markov model, wherein π=(π then 1, π 2..., π M), be initial condition probability distribution vector, λ=(λ 1, λ 2..., λ M), μ=(μ 1, μ 2..., μ M);
(2) model training: promptly iterate utilization forward direction algorithm, inverse algorithms and parameter estimation algorithm formula as described below, converge to one group of fixing value up to model parameter, form a perfect detection model.
Forward direction-inverse algorithms is as follows:
Make o tRepresent t observation vector, comprise that the entity that t criticizes arrival counts r tWith from the time interval q the zero hour to the zero hour that t criticizes that t-1 criticizes T-1, i.e. o t=(q T-1, r t), o a bRepresentative is individual to b observation vector sequence from a, o 1 TThen represent whole observation sequence, its length is T, s tThe state of representative stream when arriving for t batch, 1≤t≤T defines following variable again,
α t ( m ) = Pr [ o 1 t , s t = m | Ω ] ,
β t ( m ) = Pr [ o t + 1 T | s t = m , Ω ] ,
γ t ( m ) = Pr [ s t = m | o 1 T , Ω ] = α t ( m ) β t ( m ) Pr [ o 1 T | Ω ] ,
ξ t ( m , n ) = Pr [ s t = m , s t + 1 = n | o 1 T , Ω ] = α t ( m ) p m ( q t ) a mn b n ( r t + 1 ) β t + 1 ( n ) Pr [ o 1 T | Ω ] ,
The forward direction algorithm is as follows:
α 1(m)=π mb m(r 1),
α t ( m ) = ( Σ M ≥ n = m - 1 , m , m + 1 ≥ 1 α t - 1 ( n ) p n ( q t - 1 ) a nm ) b m ( r t ) , t = 2 , . . . , T , m ∈ S ,
Inverse algorithms is as follows:
β T(m)=1,
β t ( m ) = Σ M ≥ n = m - 1 , m , m + 1 ≥ 1 p m ( q t ) a mn β t + 1 ( n ) b n ( r t + 1 ) , t = T - 1 , T - 2 , . . . , 1 , m ∈ S ,
Parameter estimation algorithm is as follows:
Parameter lambda mMaximum probable estimation λ ^ m = arg max λ m Σ d ≥ 1 p ^ m ( d ) ln ( d - λ m - ( d + 1 ) - λ m ) ,
Or approximate obtaining λ ^ m ≈ Σ t = 1 T γ t ( m ) Σ t = 1 T γ t ( m ) ( ln q t + 1 2 ln q t + 1 q t ) = 2 Σ t = 1 T γ t ( m ) Σ t = 1 T γ t ( m ) ( ln q t ( q t + 1 ) ) ,
Parameter μ mMaximum probable estimation μ ^ m = Σ t = 1 T γ t ( m ) ( r t - 1 ) Σ t = 1 T γ t ( m ) ,
Initial condition probability distribution π mMaximum probable estimation π ^ m = γ 1 ( m ) Σ m = 1 M γ 1 ( m ) ,
State transition probability a MnMaximum probable estimation a ^ mn = Σ t = 1 T - 1 ξ t ( m , n ) Σ n = 1 M Σ t = 1 T - 1 ξ t ( m , n ) ,
But the training off-line of detection model of the present invention carries out, also can onlinely train, off-line training is that off line utilizes normal flow to the detection model training, model after guaranteeing to train can accurately calculate the probable probability of normal flow, described online training is then carried out when concrete work synchronously, earlier the current value of the detection model parameter that can come into operation behind the off-line training as initial value, and collection in real time arrives the data flow of website, when data flow is detected as just often, utilization repeatedly " forward direction-oppositely " algorithm and parameter estimation algorithm, till model parameter converges to one group of fixing value.
Of the present invention detection model is applied to detect the data flow that arrives large-scale website in real time, promptly calculates the probable probability of the observation sequence of each data flow with respect to detection model, the concrete computational methods of its probable probability be employing forward direction algorithm earlier,
α 1(m)=π mb m(r 1),
α t ( m ) = ( Σ M ≥ n = m - 1 , m , m + 1 ≥ 1 α t - 1 ( n ) p n ( q t - 1 ) a nm ) b m ( r t ) , t = 2 , . . . , T , m ∈ S ,
Adopt following formula to calculate again: Pr [ o 1 t | Ω ] = Σ m = 1 M α t ( m ) .
In the technique scheme, described data flow refers to that per second arrives the request number of website or the data volume of packet count or byte number or linking number or session number or page number or number of users or above-mentioned combination in any, and described data flow comprise the stream that comes from unique user or come from acting server representative the gathering stream or arrive the stream that gathers of large-scale website of a group user's convergence flow or all new users.
The present invention sets up detection model by hidden semi-Markov model; Again by normal flow training detection model; Arrive the data flow of large-scale website again with this detection model real-time testing; Carry out priority queueing by data flow with respect to the size and the distribution of the probable probability of detection model, thereby the probable probability distribution that normal flow will have bigger probable probability and meet normal flow is endowed higher priority, thereby attack stream will not meet the normal flow model and have lower probable probability or exceed outside the probable probability distribution of normal flow and be endowed lower priority.Therefore, normal flow will obtain the normal service that the website provides with high priority, the minimum data flow of priority is when Internet resources are in short supply, to be abandoned, thereby realize well distinguishing precipitate a large amount of normal flows and attack stream, reaching normal stream provides normal service and prevents the purpose that attack stream is attacked large-scale website.
Description of drawings
Fig. 1 is a structural representation of the present invention.
Embodiment
The present invention is described further below in conjunction with accompanying drawing.
Structural representation of the present invention as shown in Figure 1.At first the stream under the normal operating position of network is gathered, through necessary processing, as format transformation and the unwanted information of filtering, after be saved in the normal user data collection 1. in.2. be HSMM model parameter estimation module, it comprises the iteration estimation formulas of HSMM forward direction-inverse algorithms and parameter, and this module is at first given the model parameter initialize according to default value, even a for the first time to the model training time 1,1=a 1,2=a M, M=a M, M-1=1/2, a M, m=a M, m-1=a M, m+1=1/3 (1<m<M), π m=1/M, 1<λ m=1.5<2, μ m=max (r t) * m/M, M=10 carries out forward direction-inverse iteration computing then, and tries to achieve all model parameter estimation values, repeats this iterative process, up to probable probability P r[o 1 T| Ω] no longer increase or increase when very little till.It is standby in 3. that the model parameter that obtains of training and normal flow will be saved in the HSMM model parameter with respect to the distribution of the entropy of this model, 4. the forward direction algoritic module comprises the forward direction algorithm of HSMM, 3. their needed model parameters are taken from the HSMM model parameter, and 4. the forward direction algoritic module will be used for the statistics abnormality detection of the stream of real-time online.
When practical application needed, the present invention also can carry out online updating to model parameter.At this moment normal user data adfluxion data 1. come from the stream of real-time collection, when the data of real-time collection are detected as just often, promptly can be input to the normal user data adfluxion and be used for real-time update in 1. model parameter, the data sequence length that is used for the model parameter real-time update can be limited to dozens of minutes to hour, so that model is suitable for the dynamic change of flow and reduces the required time of training.When carrying out the model parameter real-time update, HSMM model parameter estimation module 2. will be the current value of model parameter as initial value (rather than default value), forward direction-inverse algorithms of utilization HSMM through after the iteration repeatedly, obtains the updating value of model parameter.Upgrade the result be saved in the HSMM model parameter 3. in, 4. call in order to the forward direction algoritic module.
5. be the collection and the discriminating module of stream, when this module received a grouping, by the differentiation that its order IP address, source, agreement, port or cookies etc. flow, the entity that this stream that adds up then arrived in the current unit interval was counted r tWhen the current unit interval finishes, calculate and criticized last time the time difference q between the arrival T-1, and from database, extract the forward variable value { α of this stream T-1(m) }, send into the forward direction algoritic module and 4. calculate forward variable { α t(m) }, calculate entropy ln (Pr[o again 1 t| Ω])/t, the probability that is occurred in the normal flow entropy distributes by this entropy obtains this stream " normally " degree with respect to given model parameter, size according to normal degree, with this flow down the grouping that arrives in the unit interval send into classify and list in order of importance and urgency control module 6. in the corresponding formation service of ranking, normal degree is big more, and then priority is high more; Otherwise then low more, the grouping of lowest priority when Internet resources are not enough, will be filtered.Reach the purpose of protection normal flow and filtering attack stream thus, when monitored stream is total flow or total new number of users, classify and list in order of importance and urgency control module 6. only abnormal conditions to be reported to the police.
Present embodiment: at first by one group of observation sequence, to the model training:
A) provide the initial value of model parameter set omega.Can adopt the way of various suitable initializes.But a kind of method of simple and rational initialize is a writ attitude transition probability is that equiprobability distributes, even a 1,1=a 1,2=a M, M=a M, M-1=1/2, a M, m=a M, m-1=a M, m+1=1/3 (1<m<M), π m=1/M; The duration distribution p of writ attitude m(d) be heavy-tailed Pareto distribution, i.e. 1<λ m=1.5<2; Make the arrival rate difference of the entity of different given states, i.e. μ m=max (r t) * m/M.M can be the arbitrary integer between 10~30.
B) utilization forward direction algorithm and inverse algorithms interative computation are asked forward variable { α tAnd { β (m) } t(m) }.。
C) the utilization parameter estimation algorithm is tried to achieve the estimated value of model parameter set omega.
D) repeating step b) with c) up to probable probability P r[o 1 T| Ω] converge to certain value.
E) entropy with this group observation sequence (is lnPr[o 1 T| Ω]/T) frequency distribution is as the distribution of the entropy of normal flow.
Because model training can carry out by off-line, so can not influence the on-line operation performance of system.In fact the time of model training is not long yet.If practical application needs, this model also can onlinely be trained, and the sequence length that is used to train can be limited to dozens of minutes to hour, so that model is suitable for the dynamic change of flow and reduces the required time of training.The problem that online training may face is how to guarantee that the stream that is used to train is normal flow and do not comprise attack stream.
The statistics abnormality detection that model after will training then is applied to flow, promptly calculate the probable probability of each stream for given model parameter:
A) when detection system is received the entity that comes from certain stream (differentiation of being flowed by order IP address, source, agreement, port or cookies) for the first time, add up the entity number that it arrives in this unit interval (for example 1 second), and calculate the initial value α of forward variable 1(m), m ∈ S; Make t=1, τ 0It is the zero hour of this unit interval.
B) current unit interval (be τ second its zero hour),, then make t=t+1, and add up the entity that this stream arrives and count r in this unit interval if receive the entity of this stream t, and and criticized time difference q between the arrival last time T-1=τ-τ 0Make τ then 0
C) calculate forward variable α t(m), m ∈ S calculates entropy ln (Pr[o again 1 t| Ω])/t.
D) probability that in the normal flow entropy distributes, occurs of this entropy exactly this stream with respect to " normally " degree of given model parameter (having represented all normal users common traits).
E) repeating step b) and d).
In probable probability calculation, the topmost time may be that from memory each stream of search is at the preceding forward variable value { α that once criticizes when arriving T-1(m), m ∈ S}.This search time can by to the Hash computing of IP address, set up search tree, shunting and handle etc. and to significantly reduce.In addition, utilize the time locality (source IP address that promptly occurred recently has very big probability to occur once more) of the IP grouping that arrives a certain website, pass through storehouse, make the IP address that occurred recently on the storehouse top, thereby make reduce the average time of search address tabulation.In fact, do not need each stream is detected separately, several stream can be gathered together and detect.For example, with the IP address of 32bit be abbreviated as 10bit the sign indicating number, " convergence flow " number that then needs to detect has only 1024.When detection system finds that wherein certain convergence flow is unusual, can carry out finer analysis to this convergence flow, promptly wherein each stream is detected and analyzes, find out and cause those unusual streams.
Calculating the entropy ln (Pr[o of a stream 1 t| Ω])/t after, just can the corresponding formation service of ranking be sent in the follow-up grouping of this stream according to the size of this value probability of occurrence in the normal flow entropy distributes.The probability that this value occurs is big more, and then priority is high more; Otherwise it is then low more.The entity of lowest priority when Internet resources are not enough, will be filtered.Reach the protection normal flow thus and dissolve the purpose that ddos attack flows.
In addition, the stream that large-scale website is attacked can be the stream that produces arbitrarily, also can be the normal stream of camouflage, the normal stream of perhaps resetting.Tackling one of the stream of any generation, the stream of camouflage source address, effective way of utilizing the stream of other server reflection and the normal stream of resetting is to adopt cookies.Do not carry the grouping of the instant cookies that produces of server, can be found at an easy rate, thereby be treated with a certain discrimination.For example, for the grouping that does not have cookies,, then can filter out simply if its source IP address or port were visited this website in the recent period.Otherwise, can be used as possible new user, the service (speed that new user occurs only accounts for the very little ratio of total arrival rate of customers usually) of rate-constrained is provided by special formation even special server.So the stream that is difficult to detect and filter is those attack streams with normal address, port and cookies.This attack stream must adopt the flow of super large or coordinate numerous attack streams, thereby show " unusually " on statistical property in order to reach the attack to " flood " formula of website.Thisly can detect by detection technique module proposed by the invention unusually, and filtered out by corresponding defense technique module.

Claims (6)

1, a kind of detection of data flous of large network station and defence method, it is characterized in that adopting hidden semi-Markov model to set up detection model and utilize the normal flow of large-scale website to train described detection model, again described detection model is applied in real time detect the data flow that arrives large-scale website, concrete detection method is to calculate the probable probability of the observation sequence of each data flow with respect to detection model, carry out priority queueing, the back more acquisition service of the data flow that priority is low more according to the distribution and the size of the probable probability of data flow then.
2, the detection of data flous of large network station according to claim 1 and defence method is characterized in that the modeling method of described hidden semi-Markov model and model training method comprise:
(1) sets up model, establish the data flow that large-scale website detecting and have M discrete state, be expressed as 1,2 respectively, ..., M, and remember that the set of these states is S, the state transitions relation is described with the Markov chain with M state, and matrix A is represented state transition probability, its element a MnThe transition probability of representative from state m to state n, the transfer between the state are the processes that changes step by step from low to high or from high to low, i.e. a when | m-n|>1 Mn=0;
Adopt b m(k) expression arrives the probability of k entity for given state m in the unit interval, and it meets the Poisson distribution, promptly b m ( k ) = P ( X = k | statem ) = μ m k - 1 e - μ m / ( k - 1 ) ! , Wherein, k=1,2 ..., ∞, μ m>0, m ∈ S, μ 1≤ μ 2≤ ...≤μ M
Make p again m(d) represent the discrete probability distribution of the duration of state m, it represents that the time difference between former and later two states is the probability of d, and it meets Pareto and distributes, promptly p m ( d ) = d - λ m - ( d + 1 ) - λ m , Wherein, d=1,2 ..., ∞, λ m>0, m ∈ S,
Use set omega={ A, π, λ, the μ } of parameter to represent hidden semi-Markov model, wherein π=(π then 1, π 2..., π M), be initial condition probability distribution vector, λ=(λ 1, λ 2..., λ M), μ=(μ 1, μ 2..., μ M);
(2) model training comprises that main forward direction-inverse algorithms is as follows:
Make o tRepresent t observation vector, it comprises that the entity that t criticizes arrival counts r tWith from the time interval q the zero hour to the zero hour that t criticizes that t-1 criticizes T-1, i.e. o t=(q T-1, r t), o a bRepresentative is individual to b observation vector sequence from a, o l TThen represent whole observation sequence, its length is T, s tThe state of representative stream when arriving for t batch, 1≤t≤T defines following variable again,
α t ( m ) = Pr [ o 1 t , s t = m | Ω ] ,
β t ( m ) = Pr [ o t + 1 T | s t = m , Ω ] ,
γ t ( m ) = Pr [ s t = m | o 1 T , Ω ] = α t ( m ) β t ( m ) / Pr [ o 1 T | Ω ] ,
ξ t ( m , n ) = Pr [ s t = m , s t + 1 = n | o 1 T , Ω ] = α t ( m ) p m ( q t ) a mn b n ( r t + 1 ) β t + 1 ( n ) / Pr [ o 1 T | Ω ] ,
The forward direction algorithm is as follows: α 1(m)=π mb m(r 1),
α t ( m ) = ( Σ m ≥ n = m - 1 , m , m + 1 ≥ 1 α t - 1 ( n ) p n ( q t - 1 ) a nm ) b m ( r t ) , t = 2 , . . . , T , m ∈ S ,
Inverse algorithms is as follows: β T(m)=1,
β t ( m ) = Σ m ≥ n = m - 1 , m , m + 1 ≥ 1 p m ( q t ) a mn β t + 1 ( n ) b n ( r t + 1 ) , t = T - 1 , T - 2 , . . . , 1 , m ∈ S ,
And then the estimated value by following parameter estimation algorithm computation model parameter: parameter lambda mMaximum probable estimation λ ^ m = arg max λ m Σ d ≥ 1 p ^ m ( d ) ln ( d - λ m - ( d + 1 ) - λ m ) , Or approximate obtaining λ ^ m ≈ Σ t = 1 T γ t ( m ) Σ t = 1 T γ t ( m ) ( ln q t + 1 2 ln q t + 1 q t ) = 2 Σ t = 1 T γ t ( m ) Σ t = 1 T γ t ( m ) ( ln q t ( q t + 1 ) , Parameter μ mMaximum probable estimation μ ^ m = Σ t = 1 T γ t ( m ) ( r t - 1 ) Σ t = 1 T γ t ( m ) , Initial condition probability distribution π mMaximum probable estimation π ^ m = γ 1 ( m ) Σ m = 1 m γ 1 ( m ) , State transition probability a MnMaximum probable estimation a ^ mn = Σ t = 1 T - 1 ξ t ( m , n ) Σ n = 1 M Σ t = 1 T - 1 ξ t ( m , n ) ,
Last iteration utilization forward direction algorithm, inverse algorithms and parameter estimation algorithm formula converge to one group of fixing value up to model parameter, form a perfect detection model.
3, the detection of data flous of large network station according to claim 2 and defence method, the concrete computational methods that it is characterized in that described probable probability adopt following formula to calculate for adopting the forward direction algorithm earlier again:
Pr [ o 1 t | Ω ] = Σ m = 1 M α t ( m ) .
4, according to the detection and the defence method of claim 1 or 2 or 3 described data flous of large network station, it is characterized in that described data flow refers to that per second arrives the request number of website or the data volume of packet count or byte number or linking number or session number or page number or number of users or above-mentioned combination in any, and described data flow comprise the stream that comes from unique user or come from acting server representative the gathering stream or arrive the stream that gathers of large-scale website of a group user's convergence flow or all new users.
5, the detection of data flous of large network station according to claim 4 and defence method, but the training off-line that it is characterized in that described detection model carries out, also can onlinely train, described online training the current value of detection model parameter as initial value, and collection in real time arrives the data flow of website, when data flow is detected as just often, use " forward direction-reverse " algorithm and parameter Estimation formula repeatedly, till model parameter converges to one group of fixing value.
6, the detection of data flous of large network station according to claim 5 and defence method, it is characterized in that carrying out priority queueing according to the distribution and the size of the probable probability of data flow, the stream that priority is high is served normally, the data flow that priority is minimum can be filtered when Internet resources are not enough.
CNB2005100334234A 2005-03-09 2005-03-09 Detection and defence method for data flous of large network station Expired - Fee Related CN100352208C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100334234A CN100352208C (en) 2005-03-09 2005-03-09 Detection and defence method for data flous of large network station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100334234A CN100352208C (en) 2005-03-09 2005-03-09 Detection and defence method for data flous of large network station

Publications (2)

Publication Number Publication Date
CN1658576A true CN1658576A (en) 2005-08-24
CN100352208C CN100352208C (en) 2007-11-28

Family

ID=35007841

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100334234A Expired - Fee Related CN100352208C (en) 2005-03-09 2005-03-09 Detection and defence method for data flous of large network station

Country Status (1)

Country Link
CN (1) CN100352208C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008131667A1 (en) * 2007-04-28 2008-11-06 Huawei Technologies Co., Ltd. Method, device for identifying service flows and method, system for protecting against a denial of service attack
CN101022403B (en) * 2006-09-08 2010-05-12 中山大学 State application blind identifying method
CN102438025A (en) * 2012-01-10 2012-05-02 中山大学 Indirect distributed denial of service attack defense method and system based on Web agency
CN101702720B (en) * 2009-10-28 2012-09-05 中国科学院计算技术研究所 Model training method and detecting method in detection of impersonation attack
CN101517967B (en) * 2005-09-19 2013-07-10 谷歌公司 Traffic prediction for web sites
CN104123312A (en) * 2013-04-28 2014-10-29 国际商业机器公司 Data mining method and device
CN106961444A (en) * 2017-04-26 2017-07-18 广东亿荣电子商务有限公司 A kind of hostile network reptile detection method based on hidden Markov model
CN108989411A (en) * 2018-07-05 2018-12-11 中山大学 A method of the Web user based on network flow clicks target identification
CN110012009A (en) * 2019-04-03 2019-07-12 华南师范大学 Internet of Things intrusion detection method based on decision tree and self similarity models coupling

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3996428B2 (en) * 2001-12-25 2007-10-24 松下電器産業株式会社 Abnormality detection device and abnormality detection system
US6868325B2 (en) * 2003-03-07 2005-03-15 Honeywell International Inc. Transient fault detection system and method using Hidden Markov Models

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101517967B (en) * 2005-09-19 2013-07-10 谷歌公司 Traffic prediction for web sites
US8670319B2 (en) 2005-09-19 2014-03-11 Google, Inc. Traffic prediction for web sites
CN101022403B (en) * 2006-09-08 2010-05-12 中山大学 State application blind identifying method
WO2008131667A1 (en) * 2007-04-28 2008-11-06 Huawei Technologies Co., Ltd. Method, device for identifying service flows and method, system for protecting against a denial of service attack
CN101702720B (en) * 2009-10-28 2012-09-05 中国科学院计算技术研究所 Model training method and detecting method in detection of impersonation attack
CN102438025B (en) * 2012-01-10 2015-03-25 中山大学 Indirect distributed denial of service attack defense method and system based on Web agency
CN102438025A (en) * 2012-01-10 2012-05-02 中山大学 Indirect distributed denial of service attack defense method and system based on Web agency
CN104123312A (en) * 2013-04-28 2014-10-29 国际商业机器公司 Data mining method and device
CN104123312B (en) * 2013-04-28 2018-02-16 国际商业机器公司 A kind of data digging method and device
CN106961444A (en) * 2017-04-26 2017-07-18 广东亿荣电子商务有限公司 A kind of hostile network reptile detection method based on hidden Markov model
CN108989411A (en) * 2018-07-05 2018-12-11 中山大学 A method of the Web user based on network flow clicks target identification
CN108989411B (en) * 2018-07-05 2021-10-08 中山大学 Web user click target identification method based on network flow
CN110012009A (en) * 2019-04-03 2019-07-12 华南师范大学 Internet of Things intrusion detection method based on decision tree and self similarity models coupling
CN110012009B (en) * 2019-04-03 2021-05-28 华南师范大学 Internet of things intrusion detection method based on combination of decision tree and self-similarity model

Also Published As

Publication number Publication date
CN100352208C (en) 2007-11-28

Similar Documents

Publication Publication Date Title
CN100352208C (en) Detection and defence method for data flous of large network station
CN101686235B (en) Device and method for analyzing abnormal network flow
CN101267313B (en) Flooding attack detection method and detection device
CN111614627B (en) SDN-oriented cross-plane cooperation DDOS detection and defense method and system
CN107770132B (en) Method and device for detecting algorithmically generated domain name
CN111131260B (en) Mass network malicious domain name identification and classification method and system
CN104660464B (en) A kind of network anomaly detection method based on non-extension entropy
CN102420723A (en) Anomaly detection method for various kinds of intrusion
CN113114694B (en) DDoS attack detection method oriented to high-speed network packet sampling data acquisition scene
CN102882881A (en) Special data filtering method for eliminating denial-of-service attacks to DNS (domain name system) service
US11706114B2 (en) Network flow measurement method, network measurement device, and control plane device
CN106411829A (en) LDoS attack detection method based on wavelet energy spectrum and combined neural network
CN111600876A (en) Slow denial of service attack detection method based on MFOPA algorithm
CN113872962B (en) Low-speed port scanning detection method for high-speed network sampling data acquisition scene
CN112733170B (en) Active trust evaluation method based on evidence sequence extraction
CN103139206B (en) The detection method of a kind of zombie host and device
CN110381074B (en) Distributed attack defense method aiming at DHCP framework based on big data
CN115695041B (en) DDOS attack detection and protection method and application based on SDN
Yang et al. Botnet detection based on machine learning
CN100589423C (en) The method and the device of identification data streams in multi-person online role playing game
Lu et al. An unsupervised approach for detecting DDoS attacks based on traffic-based metrics
CN115913721A (en) HTTP malicious communication traffic detection method and system based on layered space-time characteristics
CN115987599A (en) Malicious encrypted flow detection method and system based on multi-level attention mechanism
CN111447169A (en) Method and system for identifying malicious webpage in real time on gateway
CN111586052B (en) Multi-level-based crowd sourcing contract abnormal transaction identification method and identification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071128

Termination date: 20140309