CN109218321A - A kind of network inbreak detection method and system - Google Patents

A kind of network inbreak detection method and system Download PDF

Info

Publication number
CN109218321A
CN109218321A CN201811116207.XA CN201811116207A CN109218321A CN 109218321 A CN109218321 A CN 109218321A CN 201811116207 A CN201811116207 A CN 201811116207A CN 109218321 A CN109218321 A CN 109218321A
Authority
CN
China
Prior art keywords
data
cluster
terminal behavior
terminal
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811116207.XA
Other languages
Chinese (zh)
Inventor
曾毅
孙加光
喻波
王志海
董爱华
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201811116207.XA priority Critical patent/CN109218321A/en
Publication of CN109218321A publication Critical patent/CN109218321A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of network inbreak detection methods, comprising the following steps: (1) carries out data processing to history terminal behavior data;(2) Kmeans Clustering Model is judged whether there is, if it does not, establishing the Kmeans Clustering Model based on spark according to history terminal behavior data, enters step (3), if it does, directly carrying out step (3);(3) the terminal behavior data newly received are analyzed according to the Kmeans Clustering Model;(4) network intrusions and suspicious connection behavior are detected, and carries out attack chain map and shows.Function Extension and timeliness are improved, rate of failing to report is reduced, keeps man-machine interface more friendly.

Description

A kind of network inbreak detection method and system
Technical field
The invention belongs to technical field of the computer network, are related to a kind of terminal abnormal behavior analysis method.
Background technique
Analysing terminal abnormal behaviour, detection network intrusions are to find normally to connect different connections from the past seen, It is most important to guaranteeing network security.The method of existing common detection network intrusions is based on abnormal network invasion monitoring system It unites (A-NIDS).A-NIDS is divided into the intrusion detection based on abnormal data packet and the intrusion detection based on Abnormal network traffic again. In intrusion detection based on abnormal data packet, data source is obtained from network, it is right according to the feature of abnormal data packet feature database The data packet captured is analyzed in real time, if data packet matches with a certain feature in abnormal data packet feature database, then it is assumed that It is an abnormal data packet.The shortcomings that intrusion detection based on abnormal data packet is to need to constantly update abnormal data packet feature Library is then difficult to abnormal data packet else if the feature of abnormal data packet is not collected in abnormal data packet feature database.It is based on In the intrusion detection of Abnormal network traffic, the flow of current network is predicted according to obtained sample is sampled, if current network Flow has larger difference compared with prediction, is embodied in sudden network flow and increases sharply, it is believed that network flow occurs different Often.When being determined as invasion extremely, alarm will be generated.The shortcomings that intrusion detection based on Abnormal network traffic is under small flow Invasion cannot be detected, and if normal discharge behavior increases suddenly, will lead to system erroneous judgement.
Cluster is exactly the data set to a large amount of unknown marks, and data set is divided into multiple classes by the inherent similitude of data Not, make that the data similarity in classification is larger and the data similarity between classification is smaller.Cluster is most notable unsupervised learning Algorithm, Kmeans are most widely used clustering algorithms, it attempts to find out k cluster in data set.In Kmeans algorithm, The feature vector that data point is made of all numeric type features, abbreviation vector.Data point mutual distance generally use Euclidean away from From such as 1 (x11, x12, x13 ..., x1n) of point, the distance between 2 (x21, x22, x23 ..., x2n) of point calculate as follows:
Cluster is substantially a point in Kmeans algorithm, that is, forms the center (referred to as mass center) of all the points of the cluster, It is the arithmetic mean of instantaneous value of all the points in cluster, therefore algorithm is named Kmeans.K number strong point is randomly choosed when algorithm starts to make For the mass center of cluster, then each data point is distributed to nearest mass center, all numbers of the cluster then are calculated to each cluster The average value at strong point, and as the new mass center of the cluster, it then constantly repeats the process and no longer changes until mass center is stable, Thus k cluster is obtained.It is three-dimensional with data acquisition system, is two o'clock in cluster, two o'clock is respectively X=(x1, x2, x3), Y=(y1, Y2, y3) for, central point Z becomes Z=(z1, z2, z3), wherein z1=(x1+y1)/2, z2=(x2+y2)/2, z3=(x3+ y3)/2.Kmeans clustering algorithm has the advantage that 1. as a kind of classic algorithm for solving clustering problem, has simple, quick The characteristics of;2. a pair processing large data sets have scalability and high efficiency;3. effect is preferable when result cluster is intensive.Although at present Has the method (such as CN 107895171A) that Kmeans model is used for network invasion monitoring, but this method passes through depth confidence Network and Kmeans algorithm combining classification, algorithm is complicated, and the training data of Kmeans model is the exception of several attack types Data, when abnormal data collects imperfect in the presence of there is the risk failed to report.
Summary of the invention
The problem of for existing intrusion detection method, is based on Kmeans algorithm characteristic, and the present invention provides one kind The terminal abnormal behavior analysis method of machine learning Kmeans analysis model based on spark.Detect network intrusions and suspicious company The essence connect is to find normally to connect different connections from what is met in the past, and the present invention is according to the statistics category of each network connection Property is clustered, and the result cluster of cluster defines normal history connection type, defines the region normally connected, any in area Point except domain be all it is abnormal, suspicious, the point except normal join domain is regarded as into network intrusions.The present invention will also Terminal behavior analyzes the attack chain of result by map denotation, and provides corresponding analysis system.
In order to solve the above technical problems, one embodiment of the invention provides a kind of network inbreak detection method, including following Step: (1) data processing are carried out to history terminal behavior data;(2) Kmeans Clustering Model is judged whether there is, if It is not present, establishes the Kmeans Clustering Model based on spark according to history terminal behavior data, enter step (3), if In the presence of directly progress step (3);(3) according to the Kmeans Clustering Model to the terminal behavior data newly received into Row analysis;(4) network intrusions and suspicious connection behavior are detected, and carries out attack chain map and shows.
With the method for the invention it is preferred to, wherein the terminal behavior data of step (1) are recorded often using log mode The case where primary network connected reference, the primary fields in log include: source IP address, purpose IP address, destination slogan, ask Interface, action type, the time of request generation, operation duration are asked, the log can characterize the behavioural characteristic of access, can use The data identify the attribute of terminal access.
With the method for the invention it is preferred to, the terminal behavior data of access server are acquired, and to acquisition Data are normalized to be handled with vectorization, converts a terminal row relevant to request for every terminal behavior record For vector.
With the method for the invention it is preferred to, wherein step (2) establishes the Kmeans Clustering Model based on spark For, model is trained using history terminal behavior vector as input data, obtains convergent cluster result, it will be trained The step of Clustering Model preserves, and is trained to Clustering Model is as follows: step a: selecting the number k of cluster simultaneously The data that training vector is concentrated are normalized and vectorization is handled;Step b: randomly select the k of training vector concentration to Amount is used as cluster centre;Step c: it calculates training vector and concentrates each vector at a distance from k cluster centre, and the vector is divided With it is given apart from nearest cluster centre, to obtain k cluster;Step d: all data of the cluster are calculated to each cluster The average value of point, and as the new cluster centre of the cluster;Step e: step c-d is repeated, until cluster centre no longer changes Become, thus to obtain k cluster;
Wherein k >=1.
With the method for the invention it is preferred to, step (3) are as follows: to new collected terminal behavior data, calculate its with it is each The distance at clustering center is judged as that the new collected terminal behavior data are suspicious row when distance is more than the threshold values For data.
With the method for the invention it is preferred to, step (4) specifically, to the suspicious actions data found in step (3) into Row analysis, finds the suspicious actions data address corresponding source ip and the address purpose ip, by the source address ip and the address purpose ip with Corresponding location information association, is shown on map in the form of attacking chain.
In order to solve the above technical problems, further embodiment of this invention provides a kind of Network Intrusion Detection System, comprising:
Data processing unit, for carrying out data processing to terminal behavior data;
Judging unit judges whether there is Kmeans Clustering Model;
Clustering Model establishes unit, poly- for establishing the Kmeans based on spark according to history terminal behavior data Alanysis model;
Data analysis unit, for analyzing the terminal behavior data newly received;
Abnormal behaviour analysis result display unit is attacked when for detecting network intrusions and suspicious connection behavior Chain map is shown.
The system according to the present invention, it is preferred that wherein data processing unit is used to take access by data acquisition module Business device terminal behavior data be acquired, and the data of acquisition are normalized and vectorization processing, by every end End behavior record is converted into a terminal behavior vector relevant to request.
The system according to the present invention, it is preferred that wherein Clustering Model establish unit for history terminal behavior to Amount is used as input data, is trained by a large amount of training datas to Clustering Model, obtains convergent cluster result, saves Trained Clustering Model.
The system according to the present invention, it is preferred that data analysis unit is for analyzing terminal behavior data, specially To new collected terminal behavior data vector, it is calculated at a distance from each clustering center, a threshold values is set, works as distance When more than the threshold values, it is judged as that the terminal behavior data are suspicious actions data.
The system according to the present invention, it is preferred that abnormal behaviour analyzes result display unit to finding in data analysis unit Suspicious data analyzed, find the suspicious actions data address corresponding source ip and the address purpose ip, by the source address ip and The address purpose ip is associated with corresponding location information, is shown on map in the form of attacking chain.
The present invention achieve it is following the utility model has the advantages that
1. Function Extension and timeliness: the machine learning threat detection method based on terminal behavior data on flows can be quick It was found that the abnormal behaviour data in network are alarmed to user in time, are mentioned so that the analysis of data is completed with intimate speed in real time High disposal threatens discovery treatment effeciency, enhances the timeliness of system audit function and alarm function.
2. rate of failing to report is low: modeling to history terminal data, be greater than the set value with cluster centre distance threshold as abnormal number According to rate of failing to report can be substantially reduced.
3. man-machine interface friendly: being shown entire attack chain in map by the location information of the address ip with intuitive way On, so that user quickly navigates to the place of problem.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is network invasion monitoring flow and method flow chart of the invention;
Fig. 2 is that network invasion monitoring flow system of the invention forms figure;
Fig. 3 is the establishment process schematic diagram of the Kmeans Clustering Model based on spark.
Specific embodiment
Below in conjunction with Figure of description, preferred embodiment of the present invention will be described, it should be understood that described herein Preferred embodiment only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention, and in the absence of conflict, this hair The feature in embodiment and embodiment in bright can be combined with each other.
The essence for detecting network intrusions and suspicious connection is to find the connection different from the connection met in the past.It can basis The statistical attribute of each network connection is clustered, and as a result cluster defines history connection type, us is helped to define normal connection Region.Any point except region be all it is abnormal, it is suspicious.
Terminal behavior records the case where accessing each time, primary fields in log using log mode are as follows: source IP address, Time, the operation duration etc. that purpose IP address, destination slogan, request interface, action type, request occur.Output Log can characterize the behavioural characteristic of access well, and the attribute of terminal access can be identified with the data.
Kmeans attempts to find out k cluster in data set, and the point in data set is exactly by all numeric type features in fact The feature vector of composition, abbreviation vector.Cluster is a point in fact in Kmeans algorithm, that is, in all the points for forming the cluster The heart.Such as: data acquisition system is three-dimensional, is clustered with two o'clock: X=(x1, x2, x3), Y=(y1, y2, y3).Central point Z becomes Z= (z1, z2, z3), wherein z1=(x1+y1)/2, z2=(x2+y2)/2, z3=(x3+y3)/2.
Embodiment 1
The foundation of Kmeans analysis model and behavioural analysis deterministic process are as shown in Figure 1, comprising the following steps:
(1) terminal historical behavior data are carried out with the process of data processing
Terminal historical behavior records the case where accessing each time, primary fields in log are as follows: source IP using log mode Time, the operation duration etc. that address, purpose IP address, destination slogan, request interface, action type, request occur.It is right The terminal historical behavior data of acquisition are normalized, and treated, and message field is as follows:
type TerminalAction struct{
Var treceived string//server receives the time of terminal request
Var duration int//operation duration
The val sip string//address terminal i p
Val dip string//terminal request address ip
Val dport string//terminal request port numbers
Val interface string//interface name
Var action int//action type (0: increasing, 1: deleting, 2: looking into, 3: changing)
Val reqLen int64//request packet length (byte number)
Val resLen int64//response bag length (byte number)
(2) vectorization processing is carried out for the terminal historical behavior data after normalized
By every terminal historical behavior record (TerminalAction) be converted into a vector relevant to request (to Amount),
(terminalId,deviceId,dport,action,interface,treceived,duration, resLen,reqLen)。
The specific creation rule of vector is as follows:
TerminalId (terminal number)
It is associated with out corresponding terminal i d according to the sip field in data (unique number for identifying the sip is numbered). The number is Custom Number, as long as being used for one terminal of unique identification or server.
DestinationIp (purpose ip)
It is associated with out corresponding server id according to the dip field in data (unique number for identifying the dip is numbered). The number is Custom Number, as long as being used for one terminal of unique identification or server.
DestinationPort (destination port)
Use the dport field in data.
Time of day (time)
Use the treceived field in data.The corresponding hour numerical value for generating time when operating.
Request Bytes (size of required parameter)
Use the number of respective bins corresponding to the resLen field respective value in data.As follows [0,512, 1024,2048,4096 ...], unit is byte number.That is corresponding 1, the 512-1024 corresponding 2 of 0-512, and so on, if ResLen is equal to 256 bytes, then corresponding value is 1;If resLen is equal to 760 bytes, corresponding value is 2.
Response Bytes (sizes of response results)
Use the number of respective bins corresponding to the reqLen field respective value in data.As follows [0,512, 1024,2048,4096 ...], unit is byte number.That is corresponding 1, the 512-1024 corresponding 2 of 0-512, and so on, if ResLen is equal to 256 bytes, then corresponding value is 1;If resLen is equal to 760 bytes, corresponding value is 2.
Interface (action type)
The corresponding coding of interface name of access.Relationship between interface and coding defines according to the actual situation.Such as
/ szga/login is corresponding to be encoded to 0001;/ terminals/create is corresponding to be encoded to 0002..
Action (action type)
0 corresponding increase;1 corresponding deletion;2 corresponding inquiries;3 corresponding modifications.
Duration (operation duration)
The number in section where time of the whole operation from request to response is corresponding, as follows [0,10,20,30,40, 50,60,70 ...], unit is the second, i.e. corresponding 1, the 10-20 corresponding 2 of 0-10, and so on, if duration is equal to 10 seconds, Corresponding value is 2.
Following terminal behavior data after being normalized for one,
Sip:192.168.130.241dip:192.168.131.125, dport:3306, trhour:10, resLen: 1026,reqLen:10,interface:0001,action:0,duration:10
Its vector generated are as follows:
(1,1,3306,0,0001,10,12,4)。
(3) foundation of the Kmeans Clustering Model based on spark
Such as Fig. 3, historical behavior vector set is as shown in Figure 3a.Step a: the number for selecting cluster is 4, and to training dataset In data be normalized and vectorization processing;Step b: 4 vectors of training vector concentration are randomly selected as in cluster The heart, the cluster centre randomly selected is as shown in "+" in Fig. 3 b;Step c: it calculates training data and concentrates each vector and 4 clusters The distance at center, and the vector is distributed to it apart from nearest cluster centre, to obtain 4 clusters;Step d: to every A cluster calculates the average value of all data points of the cluster, and as the new cluster centre of the cluster;Step e: c- is repeated D stablizes 4 points in such as Fig. 3 c, thus to obtain 4 clusters until cluster centre no longer changes.
Judge that Kmeans Clustering Model whether there is, if it does not, with the terminal historical behavior data of input (to Amount) it is used as input data, model is trained by mass data, obtains convergent cluster result, establishes Kmeans cluster Analysis model.
Trained Kmeans Clustering Model is preserved, to new collected terminal behavior data calculate its with The distance at each clustering center sets a threshold values, when distance is more than the threshold values, is judged as that the sip and dip is suspicious row For data.
(4) the attack chain map of abnormal behaviour analysis result is shown
The suspicious data found in (3) step is analyzed, the ip address chain of the suspicious address sip, dip is found, and The address ip is associated with corresponding location information, and the attack chain is shown on map.
Embodiment 2
Such as Fig. 2, the invention discloses a kind of Network Intrusion Detection System, comprising:
Data processing unit, for carrying out data processing to terminal behavior data;
Judging unit judges whether there is Kmeans Clustering Model;
Clustering Model establishes unit, poly- for establishing the Kmeans based on spark according to history terminal behavior data Alanysis model;
Data analysis unit, for analyzing the terminal behavior data newly received;
Abnormal behaviour analysis result display unit is attacked when for detecting network intrusions and suspicious connection behavior Chain map is shown.
Wherein data processing unit is used to adopt by terminal behavior data of the data acquisition module to access server Collection, and the data of acquisition are normalized and vectorization processing, by every terminal behavior record be converted into one with ask Seek relevant terminal behavior vector.
Wherein Clustering Model is established unit and is used for using history terminal behavior vector as input data, by largely instructing Practice data to be trained Clustering Model, obtains convergent cluster result, save trained Clustering Model.
Data analysis unit is for analyzing terminal behavior data, specially to new collected terminal behavior data Vector calculates it at a distance from each clustering center, sets a threshold values, when distance is more than the threshold values, is judged as the end End behavioral data is suspicious actions data.
Abnormal behaviour analysis result display unit analyzes the suspicious data found in data analysis unit, and finding can The behavioral data address corresponding source ip and the address purpose ip are doubted, by the source address ip and the address purpose ip and corresponding location information Association is shown on map in the form of attacking chain.
The threat detection based on terminal behavior data on flows is analyzed in the big data analysis system of certain financial institution In applied, alarm effectively has been carried out to abnormal flow and attack chain has been shown based on geographical location information.
It is obvious to a person skilled in the art that the embodiment of the present invention is not limited to the details of above-mentioned exemplary embodiment, And without departing substantially from the spirit or essential attributes of the embodiment of the present invention, this hair can be realized in other specific forms Bright embodiment.Therefore, in all respects, the present embodiments are to be considered as illustrative and not restrictive, this The range of inventive embodiments is indicated by the appended claims rather than the foregoing description, it is intended that being equal for claim will be fallen in All changes in the meaning and scope of important document are included in the embodiment of the present invention.It should not be by any attached drawing mark in claim Note is construed as limiting the claims involved.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for Plural number.Multiple units, module or the device stated in system, device or terminal claim can also be by the same units, mould Block or device are implemented through software or hardware.The first, the second equal words are used to indicate names, and are not offered as any specific Sequence.
Finally it should be noted that embodiment of above is only to illustrate the technical solution of the embodiment of the present invention rather than limits, Although the embodiment of the present invention is described in detail referring to the above better embodiment, those skilled in the art should Understand, can modify to the technical solution of the embodiment of the present invention or equivalent replacement should not all be detached from the skill of the embodiment of the present invention The spirit and scope of art scheme.

Claims (11)

1. a kind of network inbreak detection method, comprising the following steps: (1) carry out data processing to history terminal behavior data;(2) Kmeans Clustering Model is judged whether there is, if it does not, establishing according to history terminal behavior data based on spark's Kmeans Clustering Model enters step (3), if it does, directly carrying out step (3);(3) it is clustered according to the Kmeans Analysis model analyzes the terminal behavior data newly received;(4) network intrusions and suspicious connection behavior are detected, are gone forward side by side Row attack chain map is shown.
2. the method as described in claim 1, wherein the terminal behavior data of step (1) are recorded each time using log mode The case where network connection access, the primary fields in log include: that source IP address, purpose IP address, destination slogan, request connect Mouth, action type, the time of request generation, operation duration, the log can characterize the behavioural characteristic of access, can use the number According to come the attribute that identifies terminal access.
3. the method according to claim 1, the terminal behavior data of access server are acquired, and to adopting The data of collection are normalized to be handled with vectorization, converts an end relevant to request for every terminal behavior record End behavior vector.
4. the method according to claim 1, wherein step (2) establishes the Kmeans clustering based on spark Model is to be trained using history terminal behavior vector as input data to model, obtain convergent cluster result, will train The step of good Clustering Model is preserved, is trained to Clustering Model is as follows: step a: selecting of cluster Number k and the data concentrated to training vector are normalized and vectorization is handled;Step b: the k of training vector concentration is randomly selected A vector is as cluster centre;Step c: calculate training vector concentrate each vector at a distance from k cluster centre, and by this to Amount is distributed to it apart from nearest cluster centre, to obtain k cluster;Step d: it is all that the cluster is calculated to each cluster The average value of data point, and as the new cluster centre of the cluster;Step e: repeat step c-d, until cluster centre not Change again, thus to obtain k cluster;
Wherein k >=1.
5. method according to any of claims 1-4, step (3) are as follows: to new collected terminal behavior data, calculate it At a distance from each clustering center, when distance is more than the threshold values, being judged as that the new collected terminal behavior data are can Doubt behavioral data.
6. the method according to claim 1 to 5, step (4) is specifically, to the suspicious actions number found in step (3) According to being analyzed, the suspicious actions data address corresponding source ip and the address purpose ip are found, by the source address ip and purpose ip Location is associated with corresponding location information, is shown on map in the form of attacking chain.
7. a kind of Network Intrusion Detection System, comprising:
Data processing unit, for carrying out data processing to terminal behavior data;
Judging unit judges whether there is Kmeans Clustering Model;
Clustering Model establishes unit, for establishing the Kmeans cluster point based on spark according to history terminal behavior data Analyse model;
Data analysis unit, for analyzing the terminal behavior data newly received;
Abnormal behaviour analyzes result display unit, when for detecting network intrusions and suspicious connection behavior, with carrying out attack chain Figure is shown.
8. system as claimed in claim 7, wherein data processing unit is used for through data acquisition module to access server Terminal behavior data be acquired, and the data of acquisition are normalized and vectorization processing, by every terminal row A terminal behavior vector relevant to request is converted into for record.
9. wherein Clustering Model establishes unit for history terminal row such as the described in any item systems of claim 7-8 It is vector as input data, Clustering Model is trained by a large amount of training datas, obtains convergent cluster result, Save trained Clustering Model.
10. such as claim 7-9 described in any item systems, data analysis unit is used to analyze terminal behavior data, Specially to new collected terminal behavior data vector, it is calculated at a distance from each clustering center, sets a threshold values, When distance is more than the threshold values, it is judged as that the terminal behavior data are suspicious actions data.
11. abnormal behaviour analyzes result display unit to data analysis unit such as claim 7-10 described in any item systems The suspicious data of middle discovery is analyzed, and the suspicious actions data address corresponding source ip and the address purpose ip are found, by source ip Address and the address purpose ip are associated with corresponding location information, are shown on map in the form of attacking chain.
CN201811116207.XA 2018-09-25 2018-09-25 A kind of network inbreak detection method and system Pending CN109218321A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811116207.XA CN109218321A (en) 2018-09-25 2018-09-25 A kind of network inbreak detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811116207.XA CN109218321A (en) 2018-09-25 2018-09-25 A kind of network inbreak detection method and system

Publications (1)

Publication Number Publication Date
CN109218321A true CN109218321A (en) 2019-01-15

Family

ID=64985186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811116207.XA Pending CN109218321A (en) 2018-09-25 2018-09-25 A kind of network inbreak detection method and system

Country Status (1)

Country Link
CN (1) CN109218321A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276195A (en) * 2019-04-25 2019-09-24 北京邮电大学 A kind of smart machine intrusion detection method, equipment and storage medium
CN110493176A (en) * 2019-07-02 2019-11-22 北京科东电力控制系统有限责任公司 A kind of user's suspicious actions analysis method and system based on non-supervisory machine learning
CN110493264A (en) * 2019-09-18 2019-11-22 北京工业大学 It is a kind of that method is found based on the inside threat of Intranet entity relationship and behavioral chain
CN110505202A (en) * 2019-07-12 2019-11-26 中国科学院信息工程研究所 A kind of attack tissue discovery method and system
CN110753065A (en) * 2019-10-28 2020-02-04 国网河南省电力公司信息通信公司 Network behavior detection method, device, equipment and storage medium
CN110944016A (en) * 2019-12-25 2020-03-31 中移(杭州)信息技术有限公司 DDoS attack detection method, device, network equipment and storage medium
CN111107102A (en) * 2019-12-31 2020-05-05 上海海事大学 Real-time network flow abnormity detection method based on big data
CN111935175A (en) * 2020-09-14 2020-11-13 华芯生物科技(武汉)有限公司 Data encryption transmission method of detection equipment
CN117614746A (en) * 2024-01-23 2024-02-27 湖南恒茂信息技术有限公司 Switch defense attack method based on historical statistics for judging deviation behaviors

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208040A (en) * 2015-10-12 2015-12-30 北京神州绿盟信息安全科技股份有限公司 Network attack detection method and device
CN105376255A (en) * 2015-12-08 2016-03-02 国网福建省电力有限公司 Android platform intrusion detection method based on K-means cluster
CN106330906A (en) * 2016-08-23 2017-01-11 上海海事大学 Method for detecting DDoS (Distributed Denial of Service) attack in big data environment
CN107895171A (en) * 2017-10-31 2018-04-10 天津大学 A kind of intrusion detection method based on K averages Yu depth confidence network
CN108040053A (en) * 2017-12-13 2018-05-15 北京明朝万达科技股份有限公司 A kind of network security threats analysis method and system based on DNS daily record datas
CN108173818A (en) * 2017-12-13 2018-06-15 北京明朝万达科技股份有限公司 A kind of network security threats analysis method and system based on Proxy daily record datas
CN108509793A (en) * 2018-04-08 2018-09-07 北京明朝万达科技股份有限公司 A kind of user's anomaly detection method and device based on User action log data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208040A (en) * 2015-10-12 2015-12-30 北京神州绿盟信息安全科技股份有限公司 Network attack detection method and device
CN105376255A (en) * 2015-12-08 2016-03-02 国网福建省电力有限公司 Android platform intrusion detection method based on K-means cluster
CN106330906A (en) * 2016-08-23 2017-01-11 上海海事大学 Method for detecting DDoS (Distributed Denial of Service) attack in big data environment
CN107895171A (en) * 2017-10-31 2018-04-10 天津大学 A kind of intrusion detection method based on K averages Yu depth confidence network
CN108040053A (en) * 2017-12-13 2018-05-15 北京明朝万达科技股份有限公司 A kind of network security threats analysis method and system based on DNS daily record datas
CN108173818A (en) * 2017-12-13 2018-06-15 北京明朝万达科技股份有限公司 A kind of network security threats analysis method and system based on Proxy daily record datas
CN108509793A (en) * 2018-04-08 2018-09-07 北京明朝万达科技股份有限公司 A kind of user's anomaly detection method and device based on User action log data

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276195A (en) * 2019-04-25 2019-09-24 北京邮电大学 A kind of smart machine intrusion detection method, equipment and storage medium
CN110493176A (en) * 2019-07-02 2019-11-22 北京科东电力控制系统有限责任公司 A kind of user's suspicious actions analysis method and system based on non-supervisory machine learning
CN110505202A (en) * 2019-07-12 2019-11-26 中国科学院信息工程研究所 A kind of attack tissue discovery method and system
CN110493264B (en) * 2019-09-18 2021-12-24 北京工业大学 Internal threat discovery method based on internal network entity relationship and behavior chain
CN110493264A (en) * 2019-09-18 2019-11-22 北京工业大学 It is a kind of that method is found based on the inside threat of Intranet entity relationship and behavioral chain
CN110753065B (en) * 2019-10-28 2022-03-01 国网河南省电力公司信息通信公司 Network behavior detection method, device, equipment and storage medium
CN110753065A (en) * 2019-10-28 2020-02-04 国网河南省电力公司信息通信公司 Network behavior detection method, device, equipment and storage medium
CN110944016A (en) * 2019-12-25 2020-03-31 中移(杭州)信息技术有限公司 DDoS attack detection method, device, network equipment and storage medium
CN110944016B (en) * 2019-12-25 2022-06-14 中移(杭州)信息技术有限公司 DDoS attack detection method, device, network equipment and storage medium
CN111107102A (en) * 2019-12-31 2020-05-05 上海海事大学 Real-time network flow abnormity detection method based on big data
CN111935175A (en) * 2020-09-14 2020-11-13 华芯生物科技(武汉)有限公司 Data encryption transmission method of detection equipment
CN117614746A (en) * 2024-01-23 2024-02-27 湖南恒茂信息技术有限公司 Switch defense attack method based on historical statistics for judging deviation behaviors
CN117614746B (en) * 2024-01-23 2024-04-05 湖南恒茂信息技术有限公司 Switch defense attack method based on historical statistics for judging deviation behaviors

Similar Documents

Publication Publication Date Title
CN109218321A (en) A kind of network inbreak detection method and system
CN109615116B (en) Telecommunication fraud event detection method and system
Gogoi et al. MLH-IDS: a multi-level hybrid intrusion detection method
Janarthanan et al. Feature selection in UNSW-NB15 and KDDCUP'99 datasets
Sahu et al. Network intrusion detection system using J48 Decision Tree
CN111935170B (en) Network abnormal flow detection method, device and equipment
CN107517216B (en) Network security event correlation method
US20070289013A1 (en) Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms
CN104660594A (en) Method for identifying virtual malicious nodes and virtual malicious node network in social networks
CN103441982A (en) Intrusion alarm analyzing method based on relative entropy
CN109150859B (en) Botnet detection method based on network traffic flow direction similarity
CN112153221B (en) Communication behavior identification method based on social network diagram calculation
CN109951462B (en) Application software flow anomaly detection system and method based on holographic modeling
CN113420802B (en) Alarm data fusion method based on improved spectral clustering
CN105635085A (en) Security big data analysis system and method based on dynamic health degree model
CN109325232A (en) A kind of user behavior exception analysis method, system and storage medium based on LDA
Xu et al. [Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN
Perona et al. Service-independent payload analysis to improve intrusion detection in network traffic
Corchado et al. Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition
CN115085948A (en) Network security situation assessment method based on improved D-S evidence theory
Martins et al. Automatic detection of computer network traffic anomalies based on eccentricity analysis
KR102609592B1 (en) Method and apparatus for detecting abnormal behavior of IoT system
CN114362972B (en) Botnet hybrid detection method and system based on flow abstract and graph sampling
CN116527307A (en) Botnet detection algorithm based on community discovery
Sulaiman et al. Big data analytic of intrusion detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190115

RJ01 Rejection of invention patent application after publication