CN1719780A - Invasion detecting system and method based on mobile agency - Google Patents

Invasion detecting system and method based on mobile agency Download PDF

Info

Publication number
CN1719780A
CN1719780A CN 200510027781 CN200510027781A CN1719780A CN 1719780 A CN1719780 A CN 1719780A CN 200510027781 CN200510027781 CN 200510027781 CN 200510027781 A CN200510027781 A CN 200510027781A CN 1719780 A CN1719780 A CN 1719780A
Authority
CN
China
Prior art keywords
main frame
network
incident
controller
agency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510027781
Other languages
Chinese (zh)
Other versions
CN100450012C (en
Inventor
郑记
王新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CNB2005100277814A priority Critical patent/CN100450012C/en
Publication of CN1719780A publication Critical patent/CN1719780A/en
Application granted granted Critical
Publication of CN100450012C publication Critical patent/CN100450012C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention relates to an intrusion test system and a method based on a mobile agent, in which, the test system is composed of a monitor, an executor, a controller, a coordinator, a vote agent, a result agent and a response agent (PIDS) when the host of PIDS system discovers some suspicious behaviors, it initiates the vote process, multiple peer hosts vote to decide together if said event is an evil behavior, if so, it informs all hosts in the network to apply suitable measures to avoid loss characterizing that if one host finds out EDV virus, it informs other hosts at once and the load of network is light, it can solve the problem of distributed intrusion.

Description

A kind of intruding detection system and method based on mobile agent
Technical field
The invention belongs to the network security technology field, be specifically related to a kind of intruding detection system and method with equity of self-learning capability.
Background technology
At present, along with the development network information of Internet rapidly expands, people more and more depend on network, but network has created convenience also for the propagation of virus.The propagation velocity of virus and the extent of injury all increase greatly, and the detection of virus is also difficult more.How effectively the important information resources of protection are not stolen and destruction becomes a significant problem.Desirable method is the infection and the hacker attacks of pre-anti-virus, in time upgrade-system.Antivirus software and firewall technology all can not well address this problem, and whether antivirus software can only detect file and infect and repair ruined file, and fire compartment wall can only prevent port to connect, and can not distinguish legal connection and illegal invasion.Traditional intruding detection system adopts the C/S structure, and server load is big, and server becomes object of attack easily, in case server is destroyed the whole system paralysis.Intruding detection system and method based on the equity of mobile proxy technology that we propose can address these problems better.
Summary of the invention
The objective of the invention is to propose a kind of detection system and the method that can initiatively find virus infections and network intrusions, so that other main frames in time take measures to avoid data destroyed or be stolen in the informing network.
The detection system that can initiatively find virus and network intrusions that the present invention proposes, form by monitor, actuator, controller, telegon, ballot agency, result agency and response agent, it is a kind of intruding detection system of the equity based on mobile proxy technology, notes the system into PIDS by abridging.Monitor, actuator, controller, telegon, ballot agency, result agency and response agent all are based on the program assembly that mobile proxy technology is realized, wherein monitor, actuator, controller and telegon are static, ballot agency, result agency and response agent are dynamic, can move in network.Mobile agent is simulating human behavior and relation, have certain intelligence and can independently move and provide the program of respective service between isomorphism or heterogeneous network main frame.The each several part of this system is described below respectively:
(1) monitor is the elementary cell of system, the main responsible security incident that takes place on the main frame that detects.Multiple monitor is arranged in the system, every kind of monitor is responsible for a kind of security incident, comprise surveillance daily record, file change, port connection, system login, search virus signature etc., monitor find security incident take place after immediately Collection Events characteristic information and to controller reporting.
(2) actuator also is the elementary cell of system, mainly is responsible for the relevant task of security incident that implementation controller is appointed processing.Similarly, every kind of responsible a kind of task of actuator comprises removing virus, reparation file, refusal connection, disconnection network etc.With monitor class seemingly, actuator also can increase and upgrade dynamically, to adapt to the needs that virus and invasion constantly change.
(3) controller is the intermediate layer, between monitor, actuator and telegon.Controller is responsible for analyzing the security event information by the monitor report, analyzes this incident according to the security knowledge base of this locality.If controller can be discerned, then directly send order to actuator, monitor is carried out handling procedure according to the order of controller.Otherwise controller extracts the key message of incident and reports to telegon from safety message, and voting process is initiated in request, monitors this type of incident jointly so that make judgement by a plurality of network nodes, takes further action thus.
(4) telegon is system coordination person, is responsible for initiating voting process after receiving the request of controller, and other node is chosen security incident jointly in a vote and whether belonged to malicious act in the request network.If then notify All hosts to take the necessary measures and avoid virus infections or network intrusions.
(5) the ballot agency is dynamic mobile agent.Telegon is realized a plurality of main frame Coordination Decision by sending other nodes acted on behalf of in the network of voting, the ballot agency carries the relevant informations such as feature, source address and ballot time limit of suspicious event, main frame in the network is voted with regard to this suspicious event according to the situation of this machine, and telegon statistics voting results are also made last decision-making.
(6) the result agency is the mobile agent that is used to carry each main frame voting results.Each main frame is filled among the result agency behind the ballot paper, sends the telegon that the result acts on behalf of the event source main frame, because secure context, voting results are through encryption.
(7) response agent is main frame final vote result's all in the informing network a mobile agent.The telegon statistics voting results of event source main frame, if effectively ballot surpasses half then thinks malicious act, and the notice All hosts prepares to respond.
The intrusion detection method based on mobile agent that the present invention proposes at first requires All hosts to add a multicast group, and the All hosts in the group constitutes a peer-to-peer network.The PIDS system discerns virus infections and network intrusions according to the knowledge base on each main frame, removes virus then, resists invasion; If a main frame is found suspicious incident (may be new virus or new invasion mode), then this main frame is initiated a voting process in network, and judges jointly by a plurality of main frames whether this incident belongs to malicious act; The concrete steps of voting process are: extract relevant information earlier, select the main frame of some to formulate a migratory route figure randomly in group, send then and carry the mobile agent of suspicious event information.Mobile agent is moved to each main frame according to route map, and whether each main frame is paid close attention to this type of incident and taken place at this machine, and the frequency that takes place, and makes judgement in the regular hour, sends an agency who carries voting results to the event source main frame.The PIDS system sets a coefficient of safety for each security-related event, this coefficient is according to the incident occurrence frequency and dynamic change, if coefficient of safety surpasses threshold values then thinks malicious act, PIDS votes according to the variation of the coefficient of safety of incident in section sometime.Initiate the main frame statistics voting results of ballot,, then think malicious act if poll surpasses half; As regard as malicious act, then all main frames are taked suitable safety measure in the informing network.
Among the present invention, All hosts adds a multicast group, newly adds main frame and notifies other main frames by multicast message, and the main frame of receiving this message is made and being replied, thus own existence and the interior All hosts of discovery group of statement.
Characteristics of the present invention are: be swift in response, main frame finds that virus then notifies other main frames immediately in the network, avoids losses such as the destroyed or data of file is stolen; Just initiate voting process when having only the suspicious actions of discovery,, can solve the distributed intrusion problem simultaneously so offered load is very little; Time delay and offered load are suitable for large scale network along with the increase variation of network size is smaller.
Description of drawings
Fig. 1 is the PIDS fundamental diagram.
Fig. 2 is the PIDS workflow diagram.
Fig. 3 is the local area network (LAN) system works principle of independently killing virus.
Number in the figure: 1 is monitor, and 2 is actuator, and 3 is controller, and 4 is telegon, and 5 are the ballot agency, and 6 are the result agency, and 7 is response agent.
Embodiment
Among the present invention, assemblies such as monitor, actuator, controller, telegon, ballot agency, result agency and response agent are interrelated, interdepend, and constitute a complete system with level.Monitor 1 and actuator 2 are the most basic unit of PIDS system, monitor is used for the comings and goings on the monitor node, the catching exception incident, actuator is to carry out the assembly of removing virus, reparation file, disconnecting operations such as network connection, and monitor and actuator all are the unit of the bottom under the controller.
As accompanying drawing 1, if the controller 3 in the A main frame has suspicious event to take place to telegon 4 reports, then telegon 4 selects the main frame of some (such as B in network at random, C) formulate a route map, in network, send a ballot agency 5 who carries this suspicious event information then, ballot agency 5 moves in network according to route map, notify other main frames (B, C) monitor the active situation of this type of incident on this machine, dynamically update the coefficient of safety of incident according to the motion frequency of this incident, when this coefficient of safety surmounts threshold values, just assert that this incident is a malicious act.Coefficient of safety is not along with incident occurrence frequency geometric ratio changes, but along with the increase of incident occurrence frequency increases more and more sooner, system is more timely thus promptly makes response.Coefficient of safety dynamic change such as certain incident is { 1/10,1/8,1/6,1/4,1/2,1}, in when, for the first time this type of incident taking place in the certain hour, coefficient of safety is 1/10, just becomes 1/8 for the second time, is 1/6 for the third time, the 4th time is 1/4, become 1/2, the six time for the 5th time and become 1 above the safety system threshold values, malicious act is confirmed.Certainly the frequency of incident generation is successively decreased gradually, and coefficient of safety is then successively decreased thereupon, and it is very fast to successively decrease at first, and the amplitude of successively decreasing subsequently is more and more littler.In the regular hour scope (time range is by ballot agency's requirement decision), other main frames (B, C) send the result who carries vote information to the A main frame and act on behalf of 6, initiate the host A statistics voting results of ballot, then regard as malicious act if surpass the half of number of valid ballots, and transmission response agent 7 notice All hosts take appropriate action in network.
Based on the intrusion detection method of mobile agent, we design one " local area network (LAN) independently kill virus system ".In this case (as accompanying drawing 3), and multiple host (S, A, B, C D) constitutes a simple local area network (LAN), installs on every main frame a cover " local area network (LAN) independently kill virus system " software all is installed, and this software adopts the basic framework as Fig. 1.With this system the autonomous testing process of mutation code red virus is introduced its working mechanism below:
(1) system on the main frame S " code red virus monitor " detects the suspicious event of the condition code information that is similar to code red virus, monitor is collected the characteristic information of suspected virus and is transmitted to the controller on native system upper strata, controller can't be confirmed according to the knowledge base on this machine, so be transmitted to telegon again after the information of collecting simply extracted processing, the telegon A in network, B, C, D main frame immediately sends " ballot agency " request assistance, initiates voting process thus.
Receive that (2) system A, B, C, the D of " ballot agency " monitor the active situation of this type of incident on this machine, (polling hours are set in the ballot agency by the system that initiates voting process) votes to the fail safe of this incident in the regular hour.System's initial factor of safety of suspicious event setting for this reason is { 1/10/1,1/8/2,1/6/3,1/4/4,1/2/5,1/1/6}, (being one minute here) suspicious event takes place 1 time just within a certain period of time, coefficient of safety is 1/10, twice is 1/8, and when taking place six times, coefficient of safety becomes 1, threshold value just, at this moment system throws and confirms ticket.Vote information is included among the result agency, and the result agency passes to the suspicious event source host.
(3) source host system statistics voting results, if surpass the half of effectively ballot then regard as malicious act, each main frame that sends in the response agent informing network is taked corresponding safety measure.In addition, each main frame can be notified and to other main frame transmitting system upgrade patch, finish system upgrade with the fastest speed, avoids the whole network of virus infections.(4) the viral recall rate of test shows system is more than 98%, compare with traditional system have intelligent, reaction fast, offered load is little and advantage such as suitable large scale network.

Claims (2)

1, a kind of intruding detection system based on mobile agent, be designated as the PIDS system, it is characterized in that forming by program assembly monitor, actuator, controller, telegon, ballot agency, result agency and response agent, wherein monitor, actuator, controller and telegon are static, ballot agency, result agency and response agent are dynamic, can move in network, particular content is as follows:
(1) monitor, it is the elementary cell of system, the main responsible security incident that takes place on the main frame that detects, multiple monitor is arranged in the system, every kind of monitor is responsible for a kind of security incident, comprise surveillance daily record, file change, port connection, system login, search virus signature etc., monitor find security incident take place after immediately Collection Events characteristic information and to controller reporting;
(2) actuator also is the elementary cell of system, mainly is responsible for the relevant task of security incident that implementation controller is appointed processing; Every kind of responsible a kind of task of actuator comprises removing virus, reparation file, refusal connection, disconnection network etc.; Actuator also can increase and upgrade dynamically, to adapt to the needs that virus and invasion constantly change;
(3) controller is the intermediate layer, between monitor, actuator and telegon; Controller is responsible for analyzing the security event information by the monitor report, analyzes this incident according to the security knowledge base of this locality; If controller can be discerned, then directly send order to actuator, monitor is carried out handling procedure according to the order of controller; Otherwise controller extracts the key message of incident and reports to telegon from safety message, and voting process is initiated in request, monitors this type of incident jointly so that make judgement by a plurality of network nodes, takes further action thus;
(4) telegon is system coordination person, is responsible for initiating voting process after receiving the request of controller, and other node is chosen security incident jointly in a vote and whether belonged to malicious act in the request network; If then notify All hosts to take the necessary measures and avoid virus infections or network intrusions;
(5) ballot agency, it is dynamic mobile agent, telegon is realized a plurality of main frame Coordination Decision by sending other nodes acted on behalf of in the network of voting, the ballot agency carries the relevant informations such as feature, source address and ballot time limit of suspicious event, main frame in the network is voted with regard to this suspicious event according to the situation of this machine, and telegon statistics voting results are also made last decision-making;
(6) result agency is the mobile agent that is used to carry each main frame voting results, and each main frame is filled among the result agency behind the ballot paper, sends the telegon that the result acts on behalf of the event source main frame;
(7) response agent is main frame final vote result's all in the informing network a mobile agent, the telegon statistics voting results of event source main frame, if effectively ballot surpasses half then thinks malicious act, and the notice All hosts prepares to respond.
2, a kind of intrusion detection method based on mobile agent is characterized in that at first requiring All hosts to add a multicast group, and the All hosts in the group constitutes a peer-to-peer network; The PIDS system discerns virus infections and network intrusions according to the knowledge base on each main frame, removes virus then, resists invasion; If a main frame is found suspicious incident, then this main frame is initiated a voting process in network, and judges jointly by a plurality of main frames whether this incident belongs to malicious act; The concrete steps of voting process are: extract relevant information earlier, and select the main frame of some to formulate a migratory route figure randomly in group, send then and carry the mobile agent of suspicious event information; Mobile agent is moved to each main frame according to route map, and whether each main frame is paid close attention to this type of incident and taken place at this machine, and the frequency that takes place, and makes judgement in the regular hour, sends an agency who carries voting results to the event source main frame; The PIDS system sets a coefficient of safety for each security-related event, this coefficient is according to the incident occurrence frequency and dynamic change, if coefficient of safety surpasses threshold values then thinks malicious act, PIDS votes according to the variation of the coefficient of safety of incident in section sometime; Initiate the main frame statistics voting results of ballot,, then think malicious act if poll surpasses half; As regard as malicious act, then all main frames are taked suitable safety measure in the informing network.
CNB2005100277814A 2005-07-15 2005-07-15 Invasion detecting system and method based on mobile agency Expired - Fee Related CN100450012C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100277814A CN100450012C (en) 2005-07-15 2005-07-15 Invasion detecting system and method based on mobile agency

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100277814A CN100450012C (en) 2005-07-15 2005-07-15 Invasion detecting system and method based on mobile agency

Publications (2)

Publication Number Publication Date
CN1719780A true CN1719780A (en) 2006-01-11
CN100450012C CN100450012C (en) 2009-01-07

Family

ID=35931512

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100277814A Expired - Fee Related CN100450012C (en) 2005-07-15 2005-07-15 Invasion detecting system and method based on mobile agency

Country Status (1)

Country Link
CN (1) CN100450012C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101231682B (en) * 2007-01-26 2011-01-26 李贵林 Computer information safe method
CN101127580B (en) * 2006-08-18 2011-06-22 富士通株式会社 Node device, control device, and control method
CN101685483B (en) * 2008-09-22 2011-07-20 成都市华为赛门铁克科技有限公司 Method and device for extracting virus feature code
CN101621427B (en) * 2008-07-04 2011-12-28 阿尔卡特朗讯 Anti-intrusion method and system for a communication network
CN101674324B (en) * 2009-09-23 2012-05-23 南京邮电大学 Multiple-mobile-agent credible interaction method for information acquisition system in open network
WO2014132157A1 (en) * 2013-02-26 2014-09-04 International Business Machines Corporation Trust-based computing resource authorization in a networked computing environment
CN109729084A (en) * 2018-12-28 2019-05-07 福建工程学院 A kind of network safety event detection method based on block chain technology
CN111052005A (en) * 2017-11-24 2020-04-21 欧姆龙株式会社 Control device and control system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1160899C (en) * 2002-06-11 2004-08-04 华中科技大学 Distributed dynamic network security protecting system
CN100414868C (en) * 2003-06-24 2008-08-27 北京邮电大学 Data merging mechanism for large distributive intrusion inspecting system
JP4201263B2 (en) * 2003-10-27 2008-12-24 日本電信電話株式会社 Intrusion detection system and recording medium
CN1300982C (en) * 2003-12-05 2007-02-14 中国科学技术大学 Hierarchical cooperated network virus and malice code recognition method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127580B (en) * 2006-08-18 2011-06-22 富士通株式会社 Node device, control device, and control method
CN101231682B (en) * 2007-01-26 2011-01-26 李贵林 Computer information safe method
CN101621427B (en) * 2008-07-04 2011-12-28 阿尔卡特朗讯 Anti-intrusion method and system for a communication network
CN101685483B (en) * 2008-09-22 2011-07-20 成都市华为赛门铁克科技有限公司 Method and device for extracting virus feature code
CN101674324B (en) * 2009-09-23 2012-05-23 南京邮电大学 Multiple-mobile-agent credible interaction method for information acquisition system in open network
WO2014132157A1 (en) * 2013-02-26 2014-09-04 International Business Machines Corporation Trust-based computing resource authorization in a networked computing environment
US9813423B2 (en) 2013-02-26 2017-11-07 International Business Machines Corporation Trust-based computing resource authorization in a networked computing environment
CN111052005A (en) * 2017-11-24 2020-04-21 欧姆龙株式会社 Control device and control system
US11516229B2 (en) 2017-11-24 2022-11-29 Omron Corporation Control device and control system
CN109729084A (en) * 2018-12-28 2019-05-07 福建工程学院 A kind of network safety event detection method based on block chain technology
CN109729084B (en) * 2018-12-28 2021-07-16 福建工程学院 Network security event detection method based on block chain technology

Also Published As

Publication number Publication date
CN100450012C (en) 2009-01-07

Similar Documents

Publication Publication Date Title
CN103685575B (en) A kind of web portal security monitoring method based on cloud framework
CN104509034B (en) Pattern merges to identify malicious act
CN100450012C (en) Invasion detecting system and method based on mobile agency
CN100511159C (en) Method and system for addressing intrusion attacks on a computer system
CN103563302B (en) Networked asset information management
US8245297B2 (en) Computer security event management system
CN102594620B (en) Linkable distributed network intrusion detection method based on behavior description
CN108768917B (en) Botnet detection method and system based on weblog
WO2006071985A2 (en) Threat scoring system and method for intrusion detection security networks
CN114584405B (en) Electric power terminal safety protection method and system
Yu et al. TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
CN111049827A (en) Network system safety protection method, device and related equipment
Ghosh et al. Agent-based distributed intrusion alert system
CN100568876C (en) The method and the equipment that is used to handle radio communication that are used for operating data processing system
Victor et al. Intrusion detection systems-analysis and containment of false positives alerts
Goparaju et al. Distributed Denial-of-Service (DDoS) Attack Detection using 1D Convolution Neural Network (CNN) and Decision Tree Model
CN115766235A (en) Network security early warning system and early warning method
AlZoubi et al. The effect of using honeypot network on system security
Wang et al. Network security situation evaluation based on modified DS evidence theory
US20230097370A1 (en) Threat control method and system
Kamatchi et al. An efficient security framework to detect intrusions at virtual network layer of cloud computing
El‐Hajj et al. Updating snort with a customized controller to thwart port scanning
Yange et al. A data analytics system for network intrusion detection using decision tree
CN207612279U (en) A kind of food processing factory's network security management system
Fanfara et al. Autonomous hybrid honeypot as the future of distributed computer systems security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090107

Termination date: 20110715