CN109088903A - A kind of exception flow of network detection method based on streaming - Google Patents
A kind of exception flow of network detection method based on streaming Download PDFInfo
- Publication number
- CN109088903A CN109088903A CN201811315984.7A CN201811315984A CN109088903A CN 109088903 A CN109088903 A CN 109088903A CN 201811315984 A CN201811315984 A CN 201811315984A CN 109088903 A CN109088903 A CN 109088903A
- Authority
- CN
- China
- Prior art keywords
- data
- value
- network
- flow
- entry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The exception flow of network detection method based on streaming that the present invention relates to a kind of utilizes the abnormal flow in flow sorter and interpreter detection network.The method comprise the steps that the intercept network data on flows from network, imports database;Data are extracted from database, design data frame constructs set of data points;For design data Feature Conversion mechanism;Data point in data framework is detected, sort operation, is classified using flow sorter operator to network flow data;Reservoir algorithm process stream data is damped using adaptation;Sorted data are explained, analyze risk-ratio using explanation operator;Classification explanation results are shown to user in the form of static report.Its process is as shown in Figure 1.This method being capable of the detection based on streaming network abnormal flow data and classification and the explanation and analysis of abnormal data in fact.
Description
Technical field
The present invention relates to the analyses of the abnormal data of big data field, more particularly to the detection of exception flow of network.Specifically
It is related to a kind of exception flow of network detection method based on streaming, utilizes the exception in flow sorter and interpreter detection network
Flow.
Background technique
With the fast development of Internet of Things, mobile Internet, social network, data rapid development is semi-structured and non-
The data of structuring are increased with exponential speed, and the channel of data source also gradually increases.Nowadays, with data huge explosion,
The mankind are substituted into a new epoch --- big data era again by the development of information technology.So-called big data, referring to can not
The data acquisition system that its content is grabbed, managed and handled with conventional software tool within a certain period of time has 4 V features:
The big Volume of data volume, the fast Velocity of pace of change, polymorphic type Variety and the low Value of value density.In fact, big number
Relatively accurately saying according to concept refer to big data technology, refer to mass data carry out it is different from the past, completely new, low at
This processing technique and the big data industry to grow up on this basis.The most representative property of big data be collect and
The user information from each Terminal Type and application is analyzed, by tissue or the intellectual analysis of research team, discovery is more valuable
Information.
Network flow is a kind of now common large data collection, becomes more and more difficult for the analysis of network flow.
Especially when occurring abnormal in network, the detection of abnormal flow has very big challenge.The exception of network flow can be net
The generation of network failure, the attack of safety provide good information to realize monitoring, alarm.Nowadays, network security problem has been
It is very important.On the whole, the abnormal flow that generating makes network that significant trouble occur has following some aspects: refusing first
Exhausted service attack, this is a kind of very harmful, extremely common attack pattern, referred to as DoS.It furthermore is distributed refusal clothes
Business attack, is also referred to as DDoS.Followed by network worm virus flow, and corresponding other abnormal flow.These networks
Abnormal flow, can cause backbone network deceleration, paralysis, have huge harm and destructive power.Main forms are
The obstruction of the occupancy of bandwidth, network can not send regular packet loss phenomenon etc. caused by normal data.For network, each
For server computer or even terminal system, exception flow of network will lead to the occupancy of a large amount of CPU time slices and memory headroom,
It can not normal response Demand and service.It for these problems, needs to construct the analysis system of exception of network traffic, carries out good pre-
Alert, alarm and flow processing function.
With being continuously increased for data volume, manually check more and more hard to carry on.Twitter, LinkedIn and
The current record per second of Facebook is more than the event of 12M.These quantity are increasing always, and are becoming increasingly prevalent,
The dynamic data source that machine generates, such as sensor, process and automated system are estimated to increase by 40% for data volume every year.But
Manual analysis and detectability are still limited, become increasingly can not by manually checking and analyzing these dynamic data sources.
Although the mankind cannot check these huge data flows manually, machine can be with.In order to provide to dynamic data
The response analysis in source, machine can use the data analysing method based on streaming, data be filtered, highlight and summarize, in number
Data are screened and summarized according to before reaching user.Since terminal user does not have each of manual analysis large data
As a result ability, therefore can be by playing the effectiveness of each result to the maximum extent using computing resource, to facilitate
Terminal user analyzes.That is, large data needs a kind of to help to identify number based on the data analysing method of streaming
According to and data trend.Nowadays, machine learning and statistical progress show to construct such data analysis side based on streaming
Method is possible.
Summary of the invention
The present invention is directed to current explosive growth, by the data volume of artificial detection more difficult, proposes a kind of streaming
Data exception detection method, by abnormality detection and data analysis combine, provide the flow sorter of data automatic classification with
And the interpreter of data characteristics is explained to user.On the other hand, stream data detection method is also contributed to the exception in network
Flow is detected.The exception flow of network detection method based on streaming that the present invention provides a kind of, described method and step is such as
Fig. 1, comprising:
1. data are extracted
Data extraction is divided into the following steps:
(1) the intercept network data on flows from network can use the tools such as tcpdump, WireShark, Tcptrace
It extracts.
(2) network flow data is stored in database, it is recommended to use postgreSQL database.
(3) connection with database is established, calling interface extracts data flow from database and analyzed.
(4) data set called in is handled, designs per-column data framework D, retain database table column name and
Column are extracted as array and directly operated to array by type, realize that data are transmitted automatically.
(5) set of data points to be processed is constructed, each data point includes measurement and attribute two parts.Measurement, which corresponds to, closes
Key performance indicator, such as source IP address, purpose IP address etc.;Attribute corresponds to metadata attributes, such as protocol type, source port
Number, destination slogan etc..
(6) utilization measure is to detect abnormal flow, and explains abnormal behaviour using attribute.
2. data characteristics is converted
After data extract completion, design feature transformation mechanism carries out series of features to the data in data framework D and turns
It changes, so that user can analyze various types of data.For example, IP address is converted to numeric type, statistical number by character string type
According to the probability for concentrating the source of each network flow, purpose IP address combination to occur, it is stored in times column.It is special that data are set
Levying conversion function allows user to carry out Coded Analysis to the data set of specific area, without modify subsequent classifier and
Interpreter enhances the practicability of anomalous traffic detection method.
3. sort operation
After data conversion, design flow sorter come the data point in data framework D is detected, sort operation.
The sort operation mark data points specified according to user, identify the abnormal flow in network, damp reservoir algorithm using adaptation
Realize the data analysis based on streaming.The present invention provides two kinds of classifiers, percentile classifier and Predicate Classification device.Percentile
The excessive data traffic of frequency of occurrence in network flow can be identified as exceptional value by number classifier;Predicate Classification device can be by net
A certain attribute data traffic identical with particular value is identified as exceptional value in network flow.Sort operation concrete methods of realizing is as follows:
(1) percentile classifier
Percentile in statistics refers to, one group of data is sorted from small to large, and calculates accumulative percentile accordingly,
Then the value of a certain percentile corresponding data is known as the percentile of this percentile.For example, pth percentile is such a
Value, it makes at least data item of p% be less than or equal to this value, and the data item of at least (100-p) % is greater than or waits
In this value.
Percentile classifier realizes process:
1) select single row as one group of metric first, select IP move towards the number times occurred here and arrange, to its into
Row percentile calculates.
2) each group of IP secondary numerical value for moving towards to occur is classified according to high and low value by specified percentile.It calculates
Obtain a high threshold and a Low threshold.
If 3) specify using high level as module, the value more than high threshold is set as 1.0, residual value 0.0.
If 4) specify using low value as module, the value that will be less than Low threshold is set as 1.0, residual value 0.0.
5) due to abnormal flow Producing reason first is that, a large amount of requests generate the obstructions of the occupancy of bandwidth, network, can not
It sends normal data and therefore sets high level as module.If it is excessive that one group of IP moves towards the number occurred, marked
For exceptional value.
6) it finally returns that a new data framework, increases by a column on the basis of data framework D, indicate the classification of every row
State: 1.0 be exceptional value, and 0.0 is normal value.
Citing is applied to network flow data collection: it is 0.7 that a judgement percentile is arranged first;Secondly selection times
Column are used as metric, calculate the percentile of each entry;Judge the percentile of data entry one by one again, is greater than 0.7
Data item be identified as exceptional value, be set as 1.0, the data item less than 0.7 is identified as normal value, is set as 0.0;Finally by contingency table
Knowledge is integrated into a column, is added to after last column of data framework, forms a new data framework, saves and in report
It shows.
(2) Predicate Classification device
Predicate Classification device is to be classified according to the mark value of predicate to data, and predicate, which has, to be equal to, is less than, being greater than.
Unlike percentile classifier, the exceptional value of Predicate Classification device label is not based in module column
Value is determining, but by user in configuration file self-defining, such as:
This will instantiate a Predicate Classification device, by " sa " column in each IP be equal to " 42.219.159.85 " be set to it is different
Constant value.Currently, Predicate Classification device temporarily only supports six kinds of different predicates: "==", "!=", " < ", " > ", " <=" and " >
=".
Citing is applied to network flow data and integrates: selecting source IP address as metric first;Secondly selection predicate "=
=", setting threshold value is specified IP address: " 42.219.159.85 ";Judge the source IP address of data entry one by one again, be equal to "
42.219.159.85 data item " is identified as exceptional value, is set as 1.0, and the data item not equal to " 42.219.159.85 " identifies
For normal value, it is set as 0.0;Class indication finally will be integrated into a column, be added to after last column of data framework, formed
One new data framework is saved and is shown in report.
(3) data distribution in addition in data flow changes over time, and the parameter in classifier should also update therewith.In order to
The Dynamic Response of streaming data is provided, proposes a kind of algorithm: adapting to damping reservoir algorithm, specific algorithm such as Fig. 2.Algorithm
The insertion process of data entry in data framework and decaying decision are separated, the decaying plan based on the time and based on tuple is allowed
Slightly, the Data Detection based on streaming is realized.Specific implementation step is as follows:
1) reservoir that an algorithm size given first is k, retains the data strip for being up to the present inserted into reservoir
Mesh operation counts cw。
2) it is inserted into data entry.When being inserted into data entry, if reservoir space is enough, then cwIncrease by 1, otherwise (3).
3) when being inserted into data entry, if reservoir insufficient space, entry is with k/cwRatio be put into reservoir, and will be with
Machine entry is evicted from from reservoir.
4) attenuation process.When decaying, algorithm, which counts operation, multiplies decay factor, cw:=(1- α) cw.It is stored up using damping is adapted to
Layer algorithm can maintain the stability of input data, realize the analysis detection of stream data, enhance practicability.
4. explaining operation
After data sorting operation, operation is explained, explains that operation is grouped and summarizes to multiple data points.It explains
The normal and abnormal behaviour of each set of properties.Relatively common set of properties in exceptional value is identified using relative risk ratio
It closes.Specifically, a combinations of attributes is given, a occurs in exceptional value entry0It is secondary, there is a in normal value entryiIt is secondary,
There is b in exceptional value entry in other combinations of attributes0It is secondary, there is b in normal value entryiIt is secondary, Hazard ratio is defined as:
Ratio=[a0/(a0+ai)]/[b0/(b0+bi)]
A possibility that if data point belongs to particular community combination, and the ratio data point of risk becomes exceptional value.Separately
Outside, the probability that a certain combinations of attributes occurs in exceptional value entry is described using abnormal support, explains operation specific implementation
Steps are as follows:
(1) all exceptional value entries and normal value entry are searched.
(2) combinations of attributes with minimum abnormal support is searched, and records minimum abnormal support.
(3) Hazard ratio of single attribute value is calculated, and records minimum risk ratio.
(4) find the combinations of attributes for meeting following condition: the abnormal support of its member property is greater than or equal to most small difference
Normal support, Hazard ratio are greater than or equal to minimum risk ratio.
(5) combinations of attributes in (4) is utilized to construct prefix trees in exceptional value entry.Prefix trees be it is a kind of comprising base and
The structure of two arrays of check.One attribute node of each element representation of base array, referred to as a state;Check array
Indicate forerunner's state of some state.Determine that finite automaton algorithm realizes the building of combinations of attributes using DFA, here prefix trees
It is presented in such a way that attribute successively decreases.
(6) combinations of attributes of (5) risk than being less than minimum risk ratio is filtered out.Finally obtain the wind of every attribute combination
Dangerous ratio.
It is operated by explaining, analyzing most probable becomes the combinations of attributes of exceptional value, and most unlikely becomes exceptional value
Combinations of attributes.
Citing is applied to network flow data collection: assuming that there is 1000000 datas, explaining that operation may find that label
Entry for exceptional value is 7860, and the entry labeled as normal value is 992140.With wherein having 4000 IP in exceptional value entry
Location is 42.219.159.85, then showing that the abnormal support of this IP address is 4000/7860*100%=50.9%;Normally
Having 816680 IP address in value entry is 42.219.159.85, then showing that the normal support of this IP address is 816680/
992140*100%=82.3%.Hazard ratio are as follows:
[4000/ (4000+816680)]/[3860/ (3860+175460)]=0.2264
It is low-risk ratio, therefore is construed to the entry that IP address is 42.219.159.85 that can not become exceptional value
Entry.By single attribute extension to multiple combinations of attributes, the risk-ratio of every attribute combination is finally obtained.
5. output report
It explains that the quantity that operation generates is still very big, is explained by the data that statistical interpretation operation generates, provide one
The explanation list of a sequence is sorted according to the degree that anomalous event occurs, and is generated static report and is shown to user.
Detailed description of the invention
Fig. 1: system flow chart
Fig. 2: damping reservoir algorithm is adapted to
Fig. 3: network flow data format sample figure
Specific embodiment
Hardware environment of the invention is mainly a PC host.Wherein, the CPU of PC host is Intel (R) Core (TM)
I5-4570,3.20GHz inside save as 4GB RAM, 64 bit manipulation systems.
Software realization of the invention under Eclipse environment, is opened using ubuntu 16.04.1 as platform using Java language
Hair.Database uses postgreSQL.Java version is 1.8.0_161, and Eclipse version is 4.4.2, postgreSQL data
Library version is 10.4.
Experimental data is network flow header information, data memory format csv, tables of data format are as follows:
Flow the timestamp terminated | te | The duration of stream | td |
Source IP address | sa | Target IP | da |
Source port | sp | Destination port | dp |
Agreement | pr | Mark | flg |
Forwarding state | fwd | Service type | stos |
The data packet exchanged in stream | pkt | Corresponding byte number | byt |
The number that every group of IP flows away to appearance | times |
Specific example is as shown in Figure 3.
Detailed process is broadly divided into two parts, and first part is data sorting operation part, and second part is data explanation
Operation part.
1. sort operation part
(1) percentile classifier
Algorithm description
Algorithm input: M, Pe
Algorithm output: S
Illustrate: M is the module that user specifies, and is set as number times, P that every group of IP flows away to appearance hereeIt is hundred
Quantile, S are new data frameworks, the column comprising every row classification state.
Algorithm steps:
1) data and specified metric column M are passed to;
2) percentile P is utilizedeAlgorithm for estimating calculates the high threshold and Low threshold of measure column;
3) each of measure column value is compared with threshold value, if specified high level is standard, will be above high threshold
Value be set as abnormal 1.0, if specified low value position standard, the value that will be less than Low threshold is set as abnormal;
4) column that classification results deposit is new, and be added in data structure, return to new data framework S.
Its pseudocode is as follows:
(2) Predicate Classification device
Algorithm description
Algorithm input: M, Pr、L
Algorithm output: S
Illustrate: M is the module that user specifies, and is set as IP address, P hererIt is specified predicate, L is module
Value, S is new data framework, the column comprising every row classification state.
Algorithm steps:
1) data are passed to;
2) judge the data type of module value L;
3) according to specified predicate, each of module column value is compared with module value, meets item
Part is set as exceptional value 1.0;
4) column that classification results deposit is new, and be added in data structure, return to new data framework S
Its pseudocode is as follows:
2. explaining operation part
(1) operator is explained
Algorithm description
Algorithm input: r, s, O, I
Algorithm output: A, F, Ex
Illustrate: r is minimum risk ratio, and s is the minimum support of abnormal attribute combination, and O is abnormal entry set, and I is just
Normal entry set, A are combinations of attributes, and F is attribute prefix trees, ExIt is explanation results set.
Algorithm steps:
1) the exceptional value entry set O and normal value entry set I being passed to after classification;
2) minimum risk ratio r, minimum exception support s are set;
3) the combinations of attributes A of the condition of satisfaction is found;
4) combinations of attributes in 2) is utilized to construct prefix trees F;
5) explanation results set E is exportedx。
Its pseudocode is as follows:
Claims (4)
1. a kind of exception flow of network detection method based on streaming, it is characterised in that implementation steps are as follows:
(1) data are extracted, including are intercepted data on flows from network, deposit database, extracted data, design data frame, structure
Make set of data points, setting six steps of metric and attribute value;
(2) data of extraction are subjected to Feature Conversion;
(3) sort operation is carried out to the data after conversion, identifies the exception item in network flow data, use percentile point
Two kinds of flow sorters of class device and Predicate Classification device;
(4) sorted normal data and abnormal data analyzed, illustrated, application risk compares interpreter.
2. the exception flow of network detection method according to claim 1 based on streaming, it is characterised in that this method is in number
Following six step is carried out according to the extraction stage:
(1) the intercept network data on flows from network;
(2) network flow data is stored in database;
(3) connection with database is established, calling interface extracts data flow from database and analyzed;
(4) data set called in is handled, designs per-column data framework;
(5) set of data points to be processed is constructed, each data point includes measurement and attribute two parts;
(6) utilization measure is to detect abnormal flow, and explains abnormal behaviour using attribute.
3. the exception flow of network detection method according to claim 1 based on streaming, it is characterised in that this method uses
Flow sorter detects data stream, sort operation.The data based on streaming point are realized using damping reservoir algorithm is adapted to
Analysis.The specific implementation step of classifier:
(1) the excessive data traffic of frequency of occurrence in network flow is identified as exceptional value using percentile classifier, specifically
Implementation steps: selecting single row as one group of metric, carries out percentile calculating to it;It will be each by specified percentile
The secondary numerical value that group IP moves towards to occur is classified according to high and low value, and a high threshold and a Low threshold is calculated;If specified
Using high level as module, then the value more than high threshold is set as 1.0, residual value 0.0;If specified marked with low value for measurement
Standard, the then value that will be less than Low threshold are set as 1.0, residual value 0.0;High level is set as module, if one group of IP is moved towards out
Existing number is excessive, then is marked as exceptional value;
(2) attribute a certain in network flow data traffic identical with particular value is identified as exceptional value using Predicate Classification device,
Specific implementation step: select single row as one group of metric;Predicate is selected, threshold value is set;The degree of data entry is judged one by one
Magnitude, the data item to match with selected predicate and threshold value are identified as exceptional value, are set as 1.0, unmatched data item is identified as
Normal value is set as 0.0;Class indication finally will be integrated into a column, be added to after last column of data framework, forms one
A new data framework is saved and is shown in report;
(3) realize that the data based on streaming are analyzed using adaptation damping reservoir algorithm, specific implementation step: one size one of setting
Fixed reservoir retains the entry for being inserted into reservoir;When being inserted into data entry, if reservoir space is enough, then entry
Increase by 1;When being inserted into data entry, if reservoir insufficient space, entry is put into reservoir with certain ratio, and at random will
Existing entry is evicted from from reservoir.
4. the exception flow of network detection method according to claim 1 or 3 based on streaming, it is characterised in that this method is adopted
Multiple network flow data points after classification are grouped and are summarized with explaining to operate, each set of properties of analysis interpretation is just
Normal and abnormal behaviour identifies relatively common combinations of attributes in exceptional value using risk-ratio, explains operation specific implementation
Step:
(1) all exceptional value entries and normal value entry in network flow data are searched after classification;
(2) combinations of attributes in data on flows with minimum abnormal support is searched, and records minimum abnormal support;
(3) Hazard ratio of the single attribute value of data on flows is calculated, and records minimum risk ratio;
(4) find the combinations of attributes for meeting following condition: the abnormal support of its member property is greater than or equal to minimum abnormal branch
Degree of holding, Hazard ratio are greater than or equal to minimum risk ratio;
(5) combinations of attributes in (4) is utilized to construct prefix trees in exceptional value entry, prefix trees are in such a way that attribute successively decreases here
It presents;
(6) combinations of attributes of (5) risk than being less than minimum risk ratio is filtered out.Finally obtain the every attribute of network flow data
Combined risk-ratio.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811315984.7A CN109088903A (en) | 2018-11-07 | 2018-11-07 | A kind of exception flow of network detection method based on streaming |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811315984.7A CN109088903A (en) | 2018-11-07 | 2018-11-07 | A kind of exception flow of network detection method based on streaming |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109088903A true CN109088903A (en) | 2018-12-25 |
Family
ID=64844806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811315984.7A Pending CN109088903A (en) | 2018-11-07 | 2018-11-07 | A kind of exception flow of network detection method based on streaming |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109088903A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026740A (en) * | 2019-12-03 | 2020-04-17 | 厦门市美亚柏科信息股份有限公司 | Data reconciliation method, system and data system based on data fingerprints |
CN111710373A (en) * | 2020-07-20 | 2020-09-25 | 中科三清科技有限公司 | Method, device, equipment and medium for detecting volatile organic compound observation data |
CN113132392A (en) * | 2021-04-22 | 2021-07-16 | 苏州联电能源发展有限公司 | Industrial control network flow abnormity detection method, device and system |
CN114221858A (en) * | 2021-12-15 | 2022-03-22 | 中山大学 | SDN network fault positioning method, device, equipment and readable storage medium |
CN115604040A (en) * | 2022-12-16 | 2023-01-13 | 国网江苏省电力有限公司信息通信分公司(Cn) | Abnormal access behavior identification method based on IP access sequence |
WO2023173343A1 (en) * | 2022-03-17 | 2023-09-21 | Huawei Technologies Co., Ltd. | Device and method for multiflow quantiles extraction and reconstruction |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794661A (en) * | 2005-12-26 | 2006-06-28 | 北京交通大学 | Network performance analysis report system based on IPv6 and its implementing method |
CN105376248A (en) * | 2015-11-30 | 2016-03-02 | 睿峰网云(北京)科技股份有限公司 | Method and device for identifying abnormal flow |
CN106060043A (en) * | 2016-05-31 | 2016-10-26 | 北京邮电大学 | Abnormal flow detection method and device |
WO2017072356A1 (en) * | 2015-10-29 | 2017-05-04 | Opt/Net Consulting B.V. | Anomaly detection in a data stream |
-
2018
- 2018-11-07 CN CN201811315984.7A patent/CN109088903A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794661A (en) * | 2005-12-26 | 2006-06-28 | 北京交通大学 | Network performance analysis report system based on IPv6 and its implementing method |
WO2017072356A1 (en) * | 2015-10-29 | 2017-05-04 | Opt/Net Consulting B.V. | Anomaly detection in a data stream |
CN105376248A (en) * | 2015-11-30 | 2016-03-02 | 睿峰网云(北京)科技股份有限公司 | Method and device for identifying abnormal flow |
CN106060043A (en) * | 2016-05-31 | 2016-10-26 | 北京邮电大学 | Abnormal flow detection method and device |
Non-Patent Citations (2)
Title |
---|
唐录洁,李怀颖: "《基于大数据的网络异常流量检测综述》", 《电脑知识与技术》 * |
李洪成等: "《基于改进聚类分析的网络流量异常检测方法》", 《网络与信息安全学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026740A (en) * | 2019-12-03 | 2020-04-17 | 厦门市美亚柏科信息股份有限公司 | Data reconciliation method, system and data system based on data fingerprints |
CN111026740B (en) * | 2019-12-03 | 2022-07-12 | 厦门市美亚柏科信息股份有限公司 | Data reconciliation method and system based on data fingerprints |
CN111710373A (en) * | 2020-07-20 | 2020-09-25 | 中科三清科技有限公司 | Method, device, equipment and medium for detecting volatile organic compound observation data |
CN113132392A (en) * | 2021-04-22 | 2021-07-16 | 苏州联电能源发展有限公司 | Industrial control network flow abnormity detection method, device and system |
CN113132392B (en) * | 2021-04-22 | 2022-05-06 | 苏州联电能源发展有限公司 | Industrial control network flow abnormity detection method, device and system |
CN114221858A (en) * | 2021-12-15 | 2022-03-22 | 中山大学 | SDN network fault positioning method, device, equipment and readable storage medium |
WO2023173343A1 (en) * | 2022-03-17 | 2023-09-21 | Huawei Technologies Co., Ltd. | Device and method for multiflow quantiles extraction and reconstruction |
CN115604040A (en) * | 2022-12-16 | 2023-01-13 | 国网江苏省电力有限公司信息通信分公司(Cn) | Abnormal access behavior identification method based on IP access sequence |
CN115604040B (en) * | 2022-12-16 | 2023-03-10 | 国网江苏省电力有限公司信息通信分公司 | Abnormal access behavior identification method based on IP access sequence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109088903A (en) | A kind of exception flow of network detection method based on streaming | |
US11301778B2 (en) | Method and system for training and validating machine learning in network environments | |
CN111565205B (en) | Network attack identification method and device, computer equipment and storage medium | |
Vlăduţu et al. | Internet traffic classification based on flows' statistical properties with machine learning | |
US8676965B2 (en) | Tracking high-level network transactions | |
CN112866023B (en) | Network detection method, model training method, device, equipment and storage medium | |
US10187412B2 (en) | Robust representation of network traffic for detecting malware variations | |
CN105637519A (en) | Cognitive information security using a behavior recognition system | |
EP2415229A1 (en) | Method and system for alert classification in a computer network | |
CN107370752B (en) | Efficient remote control Trojan detection method | |
CN109842588B (en) | Network data detection method and related equipment | |
WO2023093100A1 (en) | Method and apparatus for identifying abnormal calling of api gateway, device, and product | |
US20230092159A1 (en) | Label guided unsupervised learning based network-level application signature generation | |
CN105471670A (en) | Flow data classification method and device | |
CN115277113A (en) | Power grid network intrusion event detection and identification method based on ensemble learning | |
CN107832611B (en) | Zombie program detection and classification method combining dynamic and static characteristics | |
Li et al. | A lightweight intrusion detection model based on feature selection and maximum entropy model | |
CN109660656A (en) | A kind of intelligent terminal method for identifying application program | |
CN112257076A (en) | Vulnerability detection method based on random detection algorithm and information aggregation | |
WO2018047027A1 (en) | A method for exploring traffic passive traces and grouping similar urls | |
Oudah et al. | A novel features set for internet traffic classification using burstiness | |
CN110008701A (en) | Static detection Rules extraction method and detection method based on ELF file characteristic | |
CN117914599A (en) | Mobile network malicious traffic identification method based on graph neural network | |
CN110650157B (en) | Fast-flux domain name detection method based on ensemble learning | |
CN111447169B (en) | Method and system for identifying malicious webpage in real time on gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181225 |
|
WD01 | Invention patent application deemed withdrawn after publication |