[go: up one dir, main page]

CN104009870A - WLAN wireless intrusion alarm aggregation method - Google Patents

WLAN wireless intrusion alarm aggregation method Download PDF

Info

Publication number
CN104009870A
CN104009870A CN201410238569.1A CN201410238569A CN104009870A CN 104009870 A CN104009870 A CN 104009870A CN 201410238569 A CN201410238569 A CN 201410238569A CN 104009870 A CN104009870 A CN 104009870A
Authority
CN
China
Prior art keywords
alarm
alarms
attack
wireless
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410238569.1A
Other languages
Chinese (zh)
Other versions
CN104009870B (en
Inventor
陈观林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou City University
Original Assignee
Zhejiang University City College ZUCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University City College ZUCC filed Critical Zhejiang University City College ZUCC
Priority to CN201410238569.1A priority Critical patent/CN104009870B/en
Publication of CN104009870A publication Critical patent/CN104009870A/en
Application granted granted Critical
Publication of CN104009870B publication Critical patent/CN104009870B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种面向WLAN的无线入侵告警聚合方法,包括如下步骤:步骤一、告警格式化:首先对已有无线入侵检测系统捕获的原始安全告警进行格式化处理,改进通用的入侵检测消息交换格式IDMEF的告警格式,引入AP接入点等无线设备信息;步骤二、告警精简:WLAN无线入侵检测系统产生的告警包含了大量的无关告警和重复告警信息,对这些告警进行剔除和精简,提高分析告警的准确率和可靠性;步骤三、告警分类:对于剔除无关告警和重复告警后的告警,将原始告警聚合为超告警,对应某一类具有明显攻击行为特征的安全告警,为后续的入侵防御决策提供前提条件。可以大大减少原始告警中无关告警和重复告警的数量,提高无线入侵检测的性能。

The invention discloses a WLAN-oriented wireless intrusion alarm aggregation method, which includes the following steps: Step 1, alarm formatting: first, format the original security alarm captured by the existing wireless intrusion detection system, and improve the general intrusion detection message The alarm format of the exchange format IDMEF is used to introduce wireless device information such as AP access points; step 2, alarm simplification: the alarm generated by the WLAN wireless intrusion detection system contains a large number of irrelevant alarms and repeated alarm information, and these alarms are eliminated and simplified. Improve the accuracy and reliability of alarm analysis; step 3, alarm classification: For alarms after eliminating irrelevant alarms and repeated alarms, the original alarms are aggregated into super alarms, corresponding to a certain type of security alarms with obvious attack behavior characteristics, for subsequent Provides prerequisites for intrusion prevention decisions. It can greatly reduce the number of irrelevant alarms and repeated alarms in the original alarms, and improve the performance of wireless intrusion detection.

Description

WLAN无线入侵告警聚合方法WLAN wireless intrusion alarm aggregation method

技术领域technical field

本发明涉及无线入侵告警聚合方法,更具体说,它涉及一种面向WLAN的无线入侵告警聚合方法。The invention relates to a wireless intrusion alarm aggregation method, more specifically, it relates to a WLAN-oriented wireless intrusion alarm aggregation method.

背景技术Background technique

随着全世界网民数量的不断增长,使用无线接入的用户也日益攀升,无线局域网(WLAN,Wireless Local Area Network)已成为普遍应用的网络技术。WLAN具有接入速率高、网络部署快、组网灵活、架构简便等特点,具备传统有线网络所无法比拟的优势,已广泛应用于家庭、机场、车站和校园等各种场合,也使得近年来移动互联网、BYOD(Bring Your Own Device,自带设备办公)等迅速普及。With the continuous increase of the number of Internet users all over the world, the number of users using wireless access is also increasing. Wireless Local Area Network (WLAN, Wireless Local Area Network) has become a widely used network technology. WLAN has the characteristics of high access rate, fast network deployment, flexible networking, and simple structure. It has advantages that traditional wired networks cannot match. Mobile Internet, BYOD (Bring Your Own Device, Bring Your Own Device) are rapidly popularizing.

由于WLAN自身的特殊性,攻击者无需进行物理连线就可进行攻击,而且目前国内外普遍使用的WLAN的IEEE802.11系列标准、有线等效加密算法WEP(Wired Equivalent Privacy)和Wi-Fi网络安全存取算法WPA(Wi-Fi Protected Access)等加密算法本身也存在缺陷,使得WLAN安全成为一个突出问题。美国信息安全服务公司Trustwave在《2012年度全球安全报告》中统计了十大网络安全风险(Top 10 Network Risks),其中WLAN相关的风险就占据其二,分别是无线用户自动接入非法AP(排名第五)和使用WEP加密传输无线信息(排名第六)。Due to the particularity of WLAN itself, attackers can attack without physical connection, and the IEEE802.11 series standards of WLAN, the wired equivalent encryption algorithm WEP (Wired Equivalent Privacy) and Wi-Fi network WPA (Wi-Fi Protected Access) and other encryption algorithms also have their own flaws, making WLAN security a prominent issue. Trustwave, an American information security service company, counted the top 10 network security risks (Top 10 Network Risks) in the 2012 Global Security Report, of which WLAN-related risks accounted for the second, namely wireless users automatically accessing illegal APs (ranked fifth) and use WEP encryption to transmit wireless information (ranked sixth).

随着WLAN安全威胁的日益加剧,黑客也越来越多地针对WLAN开展密钥破解、地址欺骗和拒绝服务攻击等多种形式的攻击,给个人家庭以及公共场合的WLAN网络造成了严重的破坏。据报道,在2012年7月召开的世界顶级黑客大会(BlackHat 2012)上,就检测到了1561起独立的WLAN安全事件,包括超过280个非法AP接入点(Rouge APs)、拒绝服务攻击(DoSAttacks)和取消验证广播(Deauth Broadcast)等多种攻击方式。2012年2月,新华网、中国经济网等多家媒体均报道了黑客利用虚假免费Wi-Fi热点获取使用者机密信息的新闻,指出不少公共场所的开放式无线网络都是不法分子伪造,可以轻松获取使用该网络用户的私人信息。2014年3月,国家互联网应急中心发布的《2013年我国互联网网络安全态势综述》显示,D-LINK、Cisco、Linksys、NetGear、Tenda等多家厂商的无线路由器产品均存在后门,黑客可由此直接控制路由器,进一步发起DNS劫持、窃取信息、网络钓鱼等攻击,直接威胁用户网上交易和数据存储安全,这些报道无疑更增加了公众对于使用WLAN的隐忧。With the increasing threats to WLAN security, hackers are increasingly targeting WLANs in various forms of attacks such as key cracking, address spoofing, and denial of service attacks, which have caused serious damage to WLAN networks in personal homes and public places. . According to reports, at the world's top hacker conference (BlackHat 2012) held in July 2012, 1561 independent WLAN security incidents were detected, including more than 280 illegal AP access points (Rouge APs), denial of service attacks (DoSAttacks) ) and deauth broadcast (Deauth Broadcast) and other attack methods. In February 2012, Xinhuanet, China Economic Net and many other media reported that hackers used fake free Wi-Fi hotspots to obtain user confidential information, pointing out that many open wireless networks in public places were forged by criminals. The private information of users using the network can be easily obtained. In March 2014, the "Overview of my country's Internet Network Security Situation in 2013" released by the National Internet Emergency Response Center showed that there are backdoors in the wireless router products of D-LINK, Cisco, Linksys, NetGear, Tenda and other manufacturers, and hackers can directly Control routers, further launch DNS hijacking, information theft, phishing and other attacks, which directly threaten the security of users' online transactions and data storage. These reports undoubtedly increase the public's hidden worries about using WLAN.

国外针对WLAN的入侵检测和防御技术研究开展较早,主要的无线网络入侵检测系统包括以下几款产品:ISS公司的Wireless Scanner、AirMagnet公司的AirMagnet Distributed、AirDefense公司的AirDefense Guard、Cisco公司的Adaptive WIPS、AirTight公司的SpectraGuard、Fatblock工作组的WIDZ、开源的Snort-Wireless以及Kismet等。Foreign research on intrusion detection and defense technology for WLAN was carried out earlier. The main wireless network intrusion detection systems include the following products: Wireless Scanner from ISS, AirMagnet Distributed from AirMagnet, AirDefense Guard from AirDefense, Adaptive WIPS from Cisco , AirTight's SpectraGuard, Fatblock's WIDZ, open source Snort-Wireless, and Kismet.

这些无线网络入侵检测系统都有各自的原始告警格式,并且会产生大量的无关告警和重复告警,对准确实时识别WLAN攻击者的真正意图尤其是多步攻击行为带来了不便。因此,需要对原始告警进行预处理,删除原始告警中的无关和重复告警,转化为超告警类型,这样可以明显减少原始告警数量,降低现有WLAN入侵防御系统的虚警率,从而提升无线局域网入侵检测和防御的性能。These wireless network intrusion detection systems have their own original alarm formats, and will generate a large number of irrelevant alarms and repeated alarms, which brings inconvenience to accurately and real-time identification of the real intention of WLAN attackers, especially multi-step attack behavior. Therefore, it is necessary to preprocess the original alarms, delete irrelevant and repeated alarms in the original alarms, and convert them into super-alarm types, which can significantly reduce the number of original alarms, reduce the false alarm rate of the existing WLAN intrusion prevention system, and improve the WLAN security. Performance of intrusion detection and prevention.

专利200810046788.4“一种减少网络入侵检测系统误告警方法”提供了一种减少网络入侵检测系统误告警的方法,该方法根据网络流量的特性去除背景流量产生的大量冗余告警,再根据告警产生的模式对去除后的告警进行实时聚合分析,从而降低告警的数量。该方法首先收集特征产生告警构成样本集合A,从样本集合A中提取符合特征产生告警比例阈值α的特征和符合IP产生告警阈值β的IP,再根据提取的特征和IP的二元组合构造告警时间序列,采用傅立叶分析方法对告警时间序列进行周期分析,并对得到的周期作假设检,然后根据存在周期的告警时间序列制定去除规则,从样本集合A中去除与规则匹配的特征产生告警,最后对去除后剩余的告警进行聚合分析产生超级告警。Patent 200810046788.4 "A Method for Reducing False Alarms in a Network Intrusion Detection System" provides a method for reducing false alarms in a network intrusion detection system. This method removes a large number of redundant alarms generated by background traffic according to the characteristics of network traffic, and then generates The mode aggregates and analyzes the removed alarms in real time, thereby reducing the number of alarms. This method first collects features to generate alarms to form a sample set A, extracts features that meet the feature-generated alarm ratio threshold α and IPs that meet the IP-generated alarm threshold β from the sample set A, and then constructs an alarm based on the binary combination of the extracted features and IP For time series, the Fourier analysis method is used to analyze the period of the alarm time series, and a hypothetical test is made on the obtained period, and then the removal rule is formulated according to the alarm time series with a period, and the characteristics matching the rule are removed from the sample set A to generate an alarm. Finally, aggregate and analyze the remaining alarms after removal to generate super alarms.

该方法主要利用IP地址作为聚合特征,可以对有线网络的入侵告警进行有效的聚合,降低有线网络入侵告警的数量。但是该方法并不适用于无线网络环境,因为在无线网络入侵过程中,攻击者往往还没有配置IP地址,只是利用物理地址等其它WLAN的属性特征进行攻击,所以并不能对WLAN无线入侵告警进行有效聚合。This method mainly uses the IP address as an aggregation feature, which can effectively aggregate the intrusion alarms of the wired network and reduce the number of intrusion alarms of the wired network. However, this method is not suitable for the wireless network environment, because in the process of wireless network intrusion, the attacker often does not configure the IP address, but only uses the physical address and other attributes of the WLAN to attack, so it cannot detect the WLAN wireless intrusion alarm. effective aggregation.

发明内容Contents of the invention

本发明的目的是克服现有技术中的不足,提供一种适用于WLAN的真实网络环境,实现有效去除大量的WLAN重复告警和无关告警,减少原始告警的数量,提高无线入侵告警分析的准确性的WLAN无线入侵告警聚合方法。The purpose of the present invention is to overcome the deficiencies in the prior art, provide a real network environment suitable for WLAN, realize the effective removal of a large number of WLAN repeated alarms and irrelevant alarms, reduce the number of original alarms, and improve the accuracy of wireless intrusion alarm analysis A WLAN wireless intrusion alarm aggregation method.

这种面向WLAN的无线入侵告警聚合方法,包括如下步骤:This WLAN-oriented wireless intrusion alarm aggregation method includes the following steps:

步骤一、告警格式化:首先对已有无线入侵检测系统(如开源的Snort-Wireless)捕获的原始安全告警进行格式化处理,改进通用的入侵检测消息交换格式IDMEF的告警格式,在其中引入AP接入点等无线设备信息,具体包含AP的SSID、工作信道、MAC地址、信号强度、是否加密以及加密机制等内容,使之能够反映WLAN无线环境的特征信息;Step 1. Alarm formatting: First, format the original security alarms captured by existing wireless intrusion detection systems (such as open source Snort-Wireless), improve the alarm format of the general intrusion detection message exchange format IDMEF, and introduce AP into it Access point and other wireless device information, specifically including AP SSID, working channel, MAC address, signal strength, whether to encrypt, and encryption mechanism, etc., so that it can reflect the characteristic information of the WLAN wireless environment;

步骤二、告警精简:WLAN无线入侵检测系统产生的告警包含了大量的无关告警和重复告警信息,例如对某一WPA加密的AP接入点产生的WEP破解告警,以及针对同一攻击行为连续产生的重复告警等,对这些告警进行剔除和精简,提高分析告警的准确率和可靠性;Step 2. Alarm simplification: The alarm generated by the WLAN wireless intrusion detection system contains a large number of irrelevant alarms and repeated alarm information, such as the WEP cracking alarm generated by a certain WPA-encrypted AP access point, and the consecutive alarms generated for the same attack behavior. Repeated alarms, etc., these alarms are eliminated and simplified to improve the accuracy and reliability of alarm analysis;

步骤三、告警分类:对于剔除无关告警和重复告警后的告警,利用AP的SSID、攻击源的MAC地址、AP的MAC地址等特征进行分类,将原始告警聚合为超告警,对应某一类具有明显攻击行为特征的安全告警,为后续的入侵防御决策提供前提条件。Step 3. Alarm classification: For the alarms after eliminating irrelevant alarms and repeated alarms, classify the alarms based on the SSID of the AP, the MAC address of the attack source, and the MAC address of the AP, and aggregate the original alarms into super alarms, corresponding to a certain type Security alerts with obvious attack behavior characteristics provide prerequisites for subsequent intrusion prevention decisions.

该方法的总体结构如图1所示,具体实现步骤如下:The overall structure of this method is shown in Figure 1, and the specific implementation steps are as follows:

步骤一、告警格式化Step 1. Alarm formatting

告警格式化既要满足WLAN环境中的无线数据特征,又要集成不同无线入侵检测系统产生的告警、日志等信息,因此需要进行统一的格式化处理。考虑到IDMEF标准是Internet工程任务组(IETF)的入侵检测工作组IDWG提出的入侵检测消息交换标准,但此标准主要针对有线网络环境,所以我们提出了一种基于IDMEF标准改进的标准告警格式,它融合了802.11标准的MAC帧结构信息,定义了将原始告警信息转化为超告警的标准格式,从而使得改进后的IDMEF标准也适用于WLAN无线环境。Alarm formatting needs to meet the characteristics of wireless data in the WLAN environment and integrate alarms and logs generated by different wireless intrusion detection systems. Therefore, unified formatting is required. Considering that the IDMEF standard is an intrusion detection message exchange standard proposed by IDWG, an intrusion detection working group of the Internet Engineering Task Force (IETF), but this standard is mainly aimed at wired network environments, so we propose a standard alarm format based on the IDMEF standard improvement. It combines the MAC frame structure information of the 802.11 standard and defines a standard format for converting original alarm information into super alarms, so that the improved IDMEF standard is also applicable to WLAN wireless environments.

由于IDMEF告警格式主要基于有线网络环境提出,缺少对WLAN特殊环境的支持,因此我们在IDMEF告警格式的基础上进行了扩展。图2为对IDMEF中定义的告警Alert类进行改进后的类图,主要改进的思想是在IDMEF告警格式中补充以下三类重要的信息:Since the IDMEF alarm format is mainly proposed based on the wired network environment and lacks support for the special WLAN environment, we have extended it on the basis of the IDMEF alarm format. Figure 2 is an improved class diagram of the alert Alert class defined in IDMEF. The main idea of improvement is to add the following three important types of information to the IDMEF alert format:

(1)增加告警Target的AP类,描述WLAN环境中特有的AP信息属性,主要包括AP的物理地址(MAC_Addr)、AP的SSID(SSID)、AP的BSSID(BSSID)、AP的生产商(Vendor)、工作信道(Channel)、传输速度(Speed)、信号强弱(Signal)、是否加密(Encryption)、加密方式(Encrypt_Type)和IP地址(IP_Addr)等信息。(1) Add the AP category of the alarm Target, which describes the unique AP information attributes in the WLAN environment, mainly including the physical address (MAC_Addr) of the AP, the SSID (SSID) of the AP, the BSSID (BSSID) of the AP, and the manufacturer of the AP (Vendor ), working channel (Channel), transmission speed (Speed), signal strength (Signal), whether to encrypt (Encryption), encryption method (Encrypt_Type) and IP address (IP_Addr) and other information.

(2)扩展告警的AdditionalData类,增加WLAN传输的无线帧的重要信息,主要包括类型域(Type)、子类型域(Subtype)、To DS域(To_DS)、From DS域(From_DS)、More Fragments域(More_Flags)、Retry域(Retry)、Power Management域(Pwr_Mgt)、More Data域(More_Data)、WEP域(WEP)、Order域(Order)、Duration/ID字段(Duration_ID)、帧序号(Seq_Num)、分片序号(Frag_Num)等MAC帧相关的信息。(2) Expand the AdditionalData class of the alarm, and increase the important information of the wireless frame transmitted by WLAN, mainly including the type field (Type), subtype field (Subtype), To DS field (To_DS), From DS field (From_DS), More Fragments Domain (More_Flags), Retry domain (Retry), Power Management domain (Pwr_Mgt), More Data domain (More_Data), WEP domain (WEP), Order domain (Order), Duration/ID field (Duration_ID), frame sequence number (Seq_Num) , Fragment sequence number (Frag_Num) and other MAC frame-related information.

(3)扩展告警的Analyzer类,增加分布式环境中特有的无线采集器属性,主要包括产生告警的采集器类型(Agent_Type)、产生告警的采集器标识(Agent_ID)、采集器特征标识(Agent_SID)、告警在该采集器所有告警中的序号(Agent_CID)等。(3) Expand the Analyzer class of the alarm, and increase the unique wireless collector attributes in the distributed environment, mainly including the collector type (Agent_Type), the collector identifier (Agent_ID) and the collector characteristic identifier (Agent_SID) that generate the alarm. , the serial number (Agent_CID) of the alarm in all the alarms of the collector, etc.

由于WLAN告警绝大部分是针对AP接入点攻击而产生,所以需要统一设置AP接入点的相关信息,并且存储成规范的格式。例如,一个SSID为“wlan1”、生产商为TP-LINK、MAC地址为00-19-E0-BE-1C-86、工作信道为6、传输速度为54Mb/s、信号强度为62%、启用加密传输、加密方式为WEP加密、IP地址为192.168.1.1的AP接入点,其存储格式如图3所示。Since most WLAN alarms are generated for attacks on AP access points, it is necessary to uniformly set the relevant information of AP access points and store them in a standardized format. For example, an SSID is "wlan1", the manufacturer is TP-LINK, the MAC address is 00-19-E0-BE-1C-86, the working channel is 6, the transmission speed is 54Mb/s, the signal strength is 62%, enable Encrypted transmission, the encryption method is WEP encryption, and the AP access point with the IP address of 192.168.1.1, its storage format is shown in Figure 3.

步骤二、告警精简Step 2. Alarm simplification

在对原始告警进行格式化后,还需要统一进行精简处理,达到消除冗余告警、减少告警数量的目的。After the original alarms are formatted, they need to be streamlined to eliminate redundant alarms and reduce the number of alarms.

需要精简的告警主要有以下两类:The alarms that need to be simplified mainly fall into the following two categories:

(1)无关告警:无线采集器识别出某一攻击行为,但该攻击并不适用于实际的无线网络环境,例如针对WPA加密的AP接入点所产生的WEP破解告警等。(1) Irrelevant alarm: The wireless collector recognizes an attack behavior, but the attack is not applicable to the actual wireless network environment, such as WEP cracking alarms generated by WPA-encrypted AP access points.

(2)重复告警:包括不同的无线采集器监测到的由同一攻击源发起针对同一目标的告警,同一无线采集器产生的连续、周期性的同一类型告警等。(2) Repeated alarms: including alarms against the same target initiated by the same attack source detected by different wireless collectors, continuous and periodic alarms of the same type generated by the same wireless collector, etc.

本发明综合利用告警的时间、空间、攻击类型和目标设备信息等四个属性对告警进行精简,从而实现去除无线告警和重复告警的目的。首先,利用告警的空间、攻击类型和目标设备信息等属性实现无关告警的去除,然后利用告警的时间、空间、攻击类型等属性实现重复告警的去除。The present invention comprehensively utilizes four attributes of the alarm, such as time, space, attack type and target device information, to simplify the alarm, so as to achieve the purpose of removing wireless alarms and repeated alarms. Firstly, use attributes such as alarm space, attack type, and target device information to remove irrelevant alarms, and then use alarm attributes such as time, space, and attack type to remove duplicate alarms.

图4描述了告警精简的具体过程。Figure 4 describes the specific process of alarm simplification.

告警精简的第一个环节是无关告警去除,针对格式化后的告警数据,利用WLAN环境的空间特征、攻击类型和目标设备信息,判断该告警是否和攻击目标相关,如果无关则去除该告警,否则转入下一步的重复告警去除环节。The first step in alarm simplification is irrelevant alarm removal. For the formatted alarm data, use the spatial characteristics of the WLAN environment, attack type, and target device information to determine whether the alarm is related to the attack target. If not, remove the alarm. Otherwise, go to the next step of removing duplicate alarms.

本发明采用了一阶谓词逻辑的无关告警精简方法对无关告警进行判断,该方法包括三个层次:数据源、网络环境和相关结果。The present invention adopts an irrelevant alarm simplification method of first-order predicate logic to judge irrelevant alarm, and the method includes three levels: data source, network environment and related result.

(1)数据源:充分利用空间特征,判断格式化的告警数据中无线采集器的类型,包括分布式的Snort-Wireless等无线入侵检测系统产生的告警信息。(1) Data source: Make full use of spatial features to judge the type of wireless collector in the formatted alarm data, including alarm information generated by distributed wireless intrusion detection systems such as Snort-Wireless.

(2)网络环境:获取WLAN环境中的AP接入点、无线终端等目标设备的信息,包括AP接入点的SSID、MAC地址、生产商、是否加密和加密方式等。(2) Network environment: Obtain the information of target devices such as AP access points and wireless terminals in the WLAN environment, including the SSID, MAC address, manufacturer, whether to encrypt and the encryption method of the AP access point, etc.

(3)相关结果:结合数据源和网络环境信息,判断告警描述的攻击类型是否符合攻击需要的条件,最终提供告警是否相关的结果。(3) Correlation results: Combining the data source and network environment information, judge whether the attack type described by the alarm meets the conditions required for the attack, and finally provide the result of whether the alarm is relevant.

无关告警精简方法使用了以下原子谓词公式(公式1):The irrelevant alarm reduction method uses the following atomic predicate formula (Formula 1):

Predicate 1 : Alert _ Type ( SOURCE , DESTINATION ) Predicate 2 : Weakness _ Name ( DESTINATION ) Predicate 3 : Device _ Information ( DESTINATION )    (公式1) Predicate 1 : alert _ type ( SOURCE , DESTINATION ) Predicate 2 : Weakness _ name ( DESTINATION ) Predicate 3 : Device _ Information ( DESTINATION ) (Formula 1)

谓词1表示攻击源SOURCE向目标设备DESTINATION发起的攻击类型是Alert_Type,谓词2表示目标设备DESTINATION存在漏洞信息Weakness_Name,谓词3表示目标设备DESTINATION的设备信息是Device_Information。Predicate 1 indicates that the attack type launched by the attack source SOURCE to the target device DESTINATION is Alert_Type, predicate 2 indicates that the target device DESTINATION has vulnerability information Weakness_Name, and predicate 3 indicates that the device information of the target device DESTINATION is Device_Information.

无关告警精简方法的具体判断过程如下:The specific judgment process of the irrelevant alarm simplification method is as follows:

(1)首先定义无线攻击类型的集合为AT={at1,...,ati},无线设备的漏洞集合为WN={wn1,...,wni},无线设备信息的集合为DI={di1,...,din};(1) First define the set of wireless attack types as AT={at 1 ,...,at i }, the set of wireless device vulnerabilities as WN={wn 1 ,...,wn i }, the set of wireless device information is DI={di 1 ,...,di n };

(2)将三个集合中的元素分别用谓词1、谓词2和谓词3的逻辑组合表示,每个元素的值域为{1,0},其中1代表该谓词取值为TRUE,0代表FALSE;(2) The elements in the three sets are represented by the logical combination of predicate 1, predicate 2 and predicate 3, and the value range of each element is {1,0}, where 1 means that the predicate value is TRUE, and 0 means FALSE;

(3)然后定义告警相关性判断函数,对产生的告警和目标设备是否相关做出判断,并输出结果进行告警精简处理。(3) Then define the alarm correlation judgment function to make a judgment on whether the generated alarm is related to the target device, and output the result for alarm simplification.

告警相关性判断函数见如下公式2:The alarm correlation judgment function is shown in the following formula 2:

   (公式2) (Formula 2)

其中,at∈AT,wn∈WN,di∈DI,如果根据告警相关性判断函数得到的结果为0,即告警描述的攻击类型和目标设备的漏洞信息不匹配或者和目标信息不匹配,说明该告警是无关告警,则将该告警去除;如果结果为1,则输出到下一个步骤进行重复性判断。Among them, at∈AT, wn∈WN, di∈DI, if the result obtained according to the alarm correlation judgment function is 0, that is, the attack type described in the alarm does not match the vulnerability information of the target device or does not match the target information, indicating that the If the alarm is irrelevant, the alarm will be removed; if the result is 1, it will be output to the next step for repeatability judgment.

经过无关告警处理之后,虽然去除了对无线网络环境和目标设备无效的无关告警,但是仍存在大量的重复告警数据,包括同一采集器在一段时间之内重复产生的同一类型告警,以及不同采集器输出的同一攻击源针对同一目标产生的相同告警,这些重复告警占据了告警数据中的很大部分比例,而且将影响后续攻击意图识别的效率和准确性,因此还需要对这部分重复告警进行去除。After irrelevant alarm processing, although irrelevant alarms that are invalid for the wireless network environment and target devices are removed, there are still a large amount of repeated alarm data, including the same type of alarm repeatedly generated by the same collector within a period of time, and different collectors The output of the same attack source for the same target generates the same alarms. These repeated alarms occupy a large proportion of the alarm data and will affect the efficiency and accuracy of subsequent attack intent identification. Therefore, these repeated alarms need to be removed. .

定义1给定一个不同采集器产生的所有告警的集合A={a1,...,an},a为一个告警五元组a=(sensorID,alertType,srcMAC,dstMAC,timestamp),其中,sensorID表示采集器标识,alertType表示告警类型,srcMAC和dstMAC分别表示源物理地址和目标物理地址,timestamp表示产生告警的时间戳,如果两个告警ai和aj满足以下条件之一,则称这两个告警为重复告警。Definition 1 Given a collection of all alarms generated by different collectors A={a 1 ,...,a n }, a is an alarm quintuple a=(sensorID, alertType, srcMAC, dstMAC, timestamp), where , sensorID indicates the identifier of the collector, alertType indicates the type of alarm, srcMAC and dstMAC indicate the source physical address and target physical address respectively, timestamp indicates the timestamp when the alarm is generated, if two alarms a i and a j meet one of the following conditions, it is called These two alarms are duplicate alarms.

(1)条件一:告警ai和告警aj的sensorID、alertType、srcMAC和dstMAC均相同,并且告警aj产生于告警ai输出后的一定单位时间△t1内,其中,△t1=timestampj-timestampi,该类告警实际代表了同一采集器产生的具有趋势性特征的重复告警;(1) Condition 1: The sensorID, alertType, srcMAC and dstMAC of the alarm a i and the alarm a j are the same, and the alarm a j is generated within a certain unit time △t1 after the output of the alarm a i , where △t1=timestamp j -timestamp i , this type of alarm actually represents repeated alarms with trend characteristics generated by the same collector;

(2)条件二:告警ai和告警aj的sensorID不同,但alertType、srcMAC和dstMAC均相同,并且告警ai和告警aj产生在一定时间间隔△t2内,其中,△t2=|timestampj-timestampi|,该类告警实际代表了不同采集器产生的针对同一攻击行为的重复告警。(2) Condition 2: The sensorIDs of alarm a i and alarm a j are different, but the alertType, srcMAC and dstMAC are the same, and alarm a i and alarm a j are generated within a certain time interval △t2, where △t2=|timestamp j -timestamp i |, this type of alarm actually represents repeated alarms for the same attack behavior generated by different collectors.

重复告警精简方法的具体过程如下:The specific process of the repetitive alarm simplification method is as follows:

(1)首先定义一定的时间间隔阈值△t1和△t2,可以结合实际攻击检测的统计均值进行设置;(1) First define certain time interval thresholds △t1 and △t2, which can be set in combination with the statistical mean value of actual attack detection;

(2)对于告警集合A,将具有相同alertType、srcMAC和dstMAC的告警进行聚类,产生若干个Ai(2) For the alarm set A, cluster the alarms with the same alertType, srcMAC and dstMAC to generate several A i ;

(3)对于需要进行重复性判断的新告警a,如果该告警不在告警集合Ai中,说明其为某一类新的告警,直接添加到告警聚类中,如果该告警属于某个告警聚类Ai,则利用告警重复判断函数进行判断,得出是否属于重复告警的结果;(3) For a new alarm a that needs to be judged repeatedly, if the alarm is not in the alarm set A i , it means that it is a new type of alarm, and it is directly added to the alarm cluster. If the alarm belongs to a certain alarm cluster Class A i , use the alarm repetition judging function to judge whether it belongs to the result of repeated alarm;

(4)如果判断结果属于重复告警,则对告警进行合并处理,否则,将新告警添加到告警聚类中。(4) If the judgment result belongs to repeated alarms, the alarms are merged, otherwise, new alarms are added to the alarm cluster.

对具有相同alertType、srcMAC和dstMAC的告警a进行告警重复判断的函数见公式3:The function for judging the repetition of alarms for alarm a with the same alertType, srcMAC and dstMAC is shown in formula 3:

redundant ( a ∈ A i ) = 1 , ( a . s ∈ A i , S ) and ( a . t - A i . t ≤ Δt 1 ) 1 , ( a . s ∉ A i . S ) and ( a . t - A i . t ≤ Δt 2 ) 0 , otherwise    (公式3) redundant ( a ∈ A i ) = 1 , ( a . the s ∈ A i , S ) and ( a . t - A i . t ≤ Δt 1 ) 1 , ( a . the s ∉ A i . S ) and ( a . t - A i . t ≤ Δt 2 ) 0 , otherwise (Formula 3)

其中,a.s表示产生告警a的采集器标识sensorID,a.t表示告警a产生的时间戳timestamp,Ai.S表示产生告警聚类Ai的采集器集合,Ai.S表示告警聚类Ai中最新产生告警的时间戳。如果根据告警重复判断函数得到的结果为1,说明该告警是重复告警,属于同一采集器产生的具有趋势性的重复告警或者不同采集器产生的针对相同攻击的重复告警,则会将该告警合并到告警聚类中,并更新产生告警的时间戳;如果结果为0,表示该告警不属于重复告警,将直接添加到告警聚类。Among them, as represents the sensor ID of the collector that generates alarm a, at represents the timestamp timestamp generated by alarm a, A i .S represents the collection of collectors that generate alarm cluster A i , and A i .S represents the alarm cluster A i The timestamp of the latest alarm generated. If the result obtained according to the alarm repetition judgment function is 1, it means that the alarm is a repeated alarm, which belongs to a trending repeated alarm generated by the same collector or a repeated alarm for the same attack generated by different collectors, and the alarm will be merged Go to the alarm cluster and update the time stamp of the alarm; if the result is 0, it means that the alarm is not a duplicate alarm and will be directly added to the alarm cluster.

步骤三、告警分类Step 3. Alarm classification

经过上述告警精简处理以后,将去除采集器产生的大量无关、重复的告警信息,为了达到更好的聚合和识别效果,还将使用告警分类对告警进行进一步的聚合处理,以超告警(HyperAlert)的形式输出。After the above-mentioned alarm simplification processing, a large number of irrelevant and repetitive alarm information generated by the collector will be removed. In order to achieve better aggregation and identification effects, the alarm classification will be used to further aggregate the alarms to achieve HyperAlert. output in the form of .

超告警主要考虑以下四个关键属性:alertType、srcMAC、dstMAC和timestamp,在一定的时间窗口内,我们将超告警分为以下三类:Over-alarms mainly consider the following four key attributes: alertType, srcMAC, dstMAC, and timestamp. Within a certain time window, we divide over-alarms into the following three categories:

(1)第一类超告警:将具有相同alertType、srcMAC和dstMAC属性的告警归为一类,表示同一攻击源针对同一目标持续开展的同一攻击类型;(1) The first type of super alarm: the alarms with the same alertType, srcMAC and dstMAC attributes are classified into one category, indicating that the same attack source continues to carry out the same attack type against the same target;

(2)第二类超告警:将具有相同alertType和srcMAC、不同dstMAC属性的告警归为一类,表示同一攻击源针对不同目标开展的同一攻击类型;(2) The second type of super alarm: classify the alarms with the same alertType and srcMAC and different dstMAC attributes into one category, indicating the same attack type carried out by the same attack source against different targets;

(3)第三类超告警:将具有相同alertType和dstMAC、不同srcMAC属性的告警归为一类,表示不同攻击源针对同一目标开展的同一攻击类型。(3) The third category of super-alerts: the alarms with the same alertType and dstMAC and different srcMAC attributes are classified into one category, indicating the same attack type carried out by different attack sources against the same target.

针对这三类超告警的相关定义如下。The relevant definitions for these three types of super alarms are as follows.

定义2告警时间窗口WA(Alert Time Window)。假设描述同一攻击行为的第一个告警和最后一个告警分别为a1和an,该攻击行为在a1和an中间产生的任一告警为aj,其中1<j<n,a1.alertType=aj.alertType=…=an.alertType,则对于所有的a1、aj、an∈A,如果满足以下条件:Definition 2: Alert Time Window W A (Alert Time Window). Assuming that the first alarm and the last alarm describing the same attack behavior are a 1 and a n respectively, any alarm generated by the attack behavior between a 1 and a n is a j , where 1<j<n, a 1 .alertType=a j .alertType=...=a n .alertType, then for all a 1 , a j , a n ∈A, if the following conditions are satisfied:

MIN(aj.timestamp-a1.timestamp)≤WA≤MAX(an.timestamp-a1.timestamp)MIN(a j .timestamp-a 1 .timestamp)≤W A ≤MAX(a n .timestamp-a 1 .timestamp)

则称WA为针对告警A的告警时间窗口。Then W A is called the alarm time window for alarm A.

定义3第一类超告警HA(Hyper Alert Ⅰ)。假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 3 The first type of hyper-alarm HA (Hyper Alert Ⅰ). Suppose all alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n > are located in the alarm time window W A , where 1<j<n, for all a 1 , a j , a n ∈A, if the following conditions are satisfied:

a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id

a1.srcMAC=…=aj.srcMAC=…=an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC=…=a j .srcMAC=…=a n .srcMAC, srcMAC∈SMAC(1<j<n)

a1.dstMAC=…=aj.dstMAC=…=an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC=…=a j .dstMAC=…=a n .dstMAC, dstMAC∈DMAC(1<j<n)

则称HA=sig_id(1,SMAC,DMAC,EID,T)为第一类超告警,其中,sig_id是具体的某一种无线攻击类型,SMAC是攻击源的物理地址集合,DMAC是目标物理地址集合,EID是产生该攻击告警的事件ID集合,T是第一个告警a1产生的时间戳。Then HA =sig_id(1,SMAC,DMAC,EID,T) is called the first type of super alarm, wherein, sig_id is a specific type of wireless attack, SMAC is the physical address set of the attack source, and DMAC is the physical address set of the target A set of addresses, EID is the set of event IDs that generate the attack alarm, and T is the timestamp when the first alarm a 1 is generated.

定义4第二类超告警HA(Hyper Alert Ⅱ)。假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 4 The second type of hyper-alarm HA (Hyper Alert Ⅱ). Suppose all alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n > are located in the alarm time window W A , where 1<j<n, for all a 1 , a j , a n ∈A, if the following conditions are met:

a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id

a1.srcMAC=…=aj.srcMAC=…=an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC=…=a j .srcMAC=…=a n .srcMAC, srcMAC∈SMAC(1<j<n)

a1.dstMAC≠…≠aj.dstMAC≠…≠an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC≠…≠a j .dstMAC≠…≠a n .dstMAC, dstMAC∈DMAC(1<j<n)

则称HA=sig_id(2,SMAC,DMAC,EID,T)为第二类超告警,其中,sig_id、SMAC、DMAC、EID和T代表的含义同定义3所定义。Then HA II =sig_id(2, SMAC, DMAC, EID, T) is called the second type of super alarm, wherein, the meanings represented by sig_id, SMAC, DMAC, EID and T are the same as those defined in Definition 3.

定义5第三类超告警HA(Hyper AlertⅢ)。假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 5 The third type of hyper-alarm HA (Hyper Alert Ⅲ). Suppose all alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n > are located in the alarm time window W A , where 1<j<n, for all a 1 , a j , a n ∈A, if the following conditions are satisfied:

a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id

a1.srcMAC≠…≠aj.srcMAC≠…≠an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC≠…≠a j .srcMAC≠…≠a n .srcMAC, srcMAC∈SMAC(1<j<n)

a1.dstMAC=…=aj.dstMAC=…=an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC=…=a j .dstMAC=…=a n .dstMAC, dstMAC∈DMAC(1<j<n)

则称HA=sig_id(3,SMAC,DMAC,EID,T)为第三类超告警,其中,sig_id、SMAC、DMAC、EID和T代表的含义也和定义3定义的相同。Then HA III =sig_id(3, SMAC, DMAC, EID, T) is called the third type of super alarm, wherein, the meanings represented by sig_id, SMAC, DMAC, EID and T are also the same as those defined in Definition 3.

本发明提出了一种针对WLAN无线网络攻击的超告警分类算法,算法的主要思想如下:在一定的告警时间窗口内,综合考虑告警类型、攻击源物理地址和目标物理地址等信息,并设置不同超告警的优先级(HA高于HA高于HA),实现将告警分类为三类超告警中的某一类。The present invention proposes a super-alarm classification algorithm for WLAN wireless network attacks. The main idea of the algorithm is as follows: within a certain alarm time window, comprehensively consider information such as alarm type, attack source physical address, and target physical address, and set different The priority of the super alarm (HA is higher than HA II is higher than HA ), and the alarm can be classified into one of the three types of super alarm.

超告警分类算法的具体步骤如下:The specific steps of the super-alarm classification algorithm are as follows:

(1)首先定义一个告警时间窗口WA内的告警序列WA(i,j),其中i和j分别代表开始告警和结束告警的标识cid;(1) First define an alarm sequence W A (i, j) within an alarm time window W A , where i and j represent the identifier cid of the start alarm and the end alarm respectively;

(2)设置超告警集合HA、HA和HA的初始化状态分别为空集合φ;(2) Set the initialization states of super-alarm sets HA , HA and HA to empty set φ respectively;

(3)当产生一条新告警ak时,针对是否满足HA、HA或HA超告警的特征,并按照HA高于HA高于HA的优先级顺序,将新告警ak分类到HA、HA或HA超告警。(3) When a new alarm a k is generated, according to whether it meets the characteristics of HA I , HA II or HA III , and according to the priority order of HA I higher than HA II higher than HA III , the new alarm a k Classify as HA I , HA II , or HA III hyperalarm.

本发明的有益效果是:本发明提出了一种新的WLAN无线入侵告警聚合方法,该方法基于AP设备信息,对入侵检测消息交换格式IDMEF的告警格式进行了改进,对原始告警进行统一的格式化处理,然后对原始告警中的无关告警和重复告警进行去除,最后精简为三类超告警。该方法能适用于WLAN的真实网络环境,经过该方法聚合之后,可以大大减少原始告警中无关告警和重复告警的数量,提高无线入侵检测的性能。The beneficial effects of the present invention are: the present invention proposes a new WLAN wireless intrusion alarm aggregation method, which is based on AP device information, improves the alarm format of the intrusion detection message exchange format IDMEF, and unifies the original alarm format Then remove the irrelevant alarms and repeated alarms in the original alarms, and finally simplify them into three types of super alarms. This method can be applied to the real network environment of WLAN, and after aggregation by this method, the number of irrelevant alarms and repeated alarms in the original alarms can be greatly reduced, and the performance of wireless intrusion detection can be improved.

附图说明Description of drawings

图1是本发明提出的WLAN无线入侵告警聚合方法的总体结构图;Fig. 1 is the overall structural diagram of the WLAN wireless intrusion alarm aggregation method proposed by the present invention;

图2是本发明提出的对IDMEF告警格式中Alert类进行改进后的类图;Fig. 2 is the improved class diagram of the Alert class in the IDMEF alarm format proposed by the present invention;

图3是本发明描述的无线AP接入点的存储结构图;Fig. 3 is a storage structure diagram of the wireless AP access point described in the present invention;

图4是本发明提出的告警精简的具体过程图;Fig. 4 is the specific process diagram of the alarm simplification proposed by the present invention;

图5是本发明实施中搭建的无线网络攻防实验环境;Fig. 5 is the wireless network attack and defense experimental environment built in the implementation of the present invention;

图6是本发明实施后无线告警数量的对比情况。Fig. 6 is a comparison of the number of wireless alarms after the implementation of the present invention.

具体实施方式Detailed ways

下面结合附图和实施例对本发明做进一步描述。虽然本发明将结合较佳实施例进行描述,但应知道,并不表示本发明限制在所述实施例中。相反,本发明将涵盖可包含在有附后权利要求书限定的本发明的范围内的替换物、改进型和等同物。The present invention will be further described below in conjunction with the accompanying drawings and embodiments. While the invention will be described in conjunction with the preferred embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, the invention is to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims.

本发明的实施方式涉及一种面向WLAN的无线入侵告警聚合方法。具体实现步骤如下:The embodiment of the present invention relates to a WLAN-oriented wireless intrusion alarm aggregation method. The specific implementation steps are as follows:

步骤一、实施环境搭建Step 1. Implementation environment construction

我们在校网环境内搭建了无线网络攻防实验平台,该平台包括以下五个部分构成:We built a wireless network attack and defense experiment platform in the school network environment, which consists of the following five parts:

(1)校园无线局域网WLAN环境,覆盖整个校园,使用开放系统认证,不需要密码即可连接,建立关联后再通过校园统一身份验证系统访问互联网。(1) Campus wireless local area network WLAN environment, covering the entire campus, using open system authentication, you can connect without a password, and then access the Internet through the campus unified identity verification system after establishing an association.

(2)网络攻防实验室自行搭建的WLAN环境,包括若干台没有设置加密或使用WEP加密和WPA加密的AP接入点,以及若干台配置无线网卡的台式电脑和笔记本等合法终端,AP接入点和部分终端设备直接接入校园有线局域网。(2) The WLAN environment built by the network attack and defense laboratory, including several AP access points without encryption or using WEP encryption and WPA encryption, and several legal terminals such as desktop computers and notebooks equipped with wireless network cards, AP access Points and some terminal devices are directly connected to the campus wired LAN.

(3)无线采集器环境,包括一台配有USB无线网卡且安装Snort-Wireless的台式电脑、一台配有内置无线芯片且安装Snort-Wireless的笔记本电脑,负责采集无线网络环境中的传输数据,并输出告警。(3) Wireless collector environment, including a desktop computer equipped with a USB wireless network card and Snort-Wireless installed, a notebook computer equipped with a built-in wireless chip and installed Snort-Wireless, responsible for collecting the transmission data in the wireless network environment , and output a warning.

(4)模拟攻击环境,包括若干台分别安装配置BackTrack5和Beini无线攻击工具的笔记本,可以实施无线探测、WEP破解、WPA破解、伪装欺骗、拒绝服务和会话劫持等主流的无线攻击方法。(4) Simulated attack environment, including several laptops equipped with BackTrack5 and Beini wireless attack tools, which can implement mainstream wireless attack methods such as wireless detection, WEP cracking, WPA cracking, masquerading, denial of service, and session hijacking.

(5)控制中心环境,包括若干台控制服务器,负责无线入侵告警聚类以及后续的多步攻击意图识别等的处理。(5) The control center environment, including several control servers, is responsible for the processing of wireless intrusion alarm clustering and subsequent multi-step attack intention identification.

搭建的无线网络攻防实验环境如图5所示。The wireless network attack and defense experiment environment built is shown in Figure 5.

步骤二、攻击数据采集Step 2. Attack data collection

利用搭建的无线网络攻防实验环境,我们进行了为期一周的攻击测试和数据采集,获取了大量的无线数据包以及安全告警信息。Using the wireless network attack and defense experimental environment we built, we conducted a week-long attack test and data collection, and obtained a large number of wireless data packets and security alarm information.

攻击测试和数据采集的过程如下:The process of attack testing and data collection is as follows:

(1)将无线采集器环境中两台电脑的无线网卡模式均设置为监听模式(Monitor Mode),安装配置Snort-Wireless无线安全工具,不间断、全方位地采集无线数据包。(1) Set the wireless network card modes of the two computers in the wireless collector environment to monitor mode (Monitor Mode), install and configure the Snort-Wireless wireless security tool, and collect wireless data packets in an uninterrupted and comprehensive manner.

(2)利用模拟攻击环境进行无线攻击测试,攻击者分别使用BackTrack5和Beini等无线网络攻击平台集成的攻击工具向校园WLAN、实验室的AP接入点发起攻击,攻击类型包括War Driving、DoS Attack、MAC Spoofing、Rogue AP、Evil Twin和WEP破解等。(2) Use the simulated attack environment to conduct wireless attack tests. The attackers use the attack tools integrated by wireless network attack platforms such as BackTrack5 and Beini to launch attacks on campus WLANs and AP access points in laboratories. The attack types include War Driving and DoS Attack , MAC Spoofing, Rogue AP, Evil Twin and WEP cracking, etc.

(3)无线采集器捕获到和预先定义的攻击类型相匹配的数据包,输出原始告警信息,同时将告警信息保存到控制中心的服务器中,这些原始告警信息中的绝大部分来源于模拟攻击环境,也包括少量非模拟攻击环境产生的外部告警。(3) The wireless collector captures data packets that match the predefined attack types, outputs original alarm information, and saves the alarm information to the server in the control center. Most of these original alarm information come from simulated attacks environment, including a small number of external alarms generated by non-simulated attack environments.

步骤三、实施结果分析Step 3. Implementation result analysis

在为期一周的攻击测试过程中,由于模拟攻击者实施了各类无线攻击工具对WLAN进行攻击,使得两个无线采集器捕获到了海量的无线数据包,并产生了大量的原始告警信息,共计采集到原始告警10多万条,详细统计结果见表1所示。During the one-week attack test, because the simulated attacker implemented various wireless attack tools to attack the WLAN, the two wireless collectors captured a large number of wireless data packets and generated a large amount of original alarm information. There are more than 100,000 original alarms, and the detailed statistical results are shown in Table 1.

表1 原始告警信息统计表Table 1 Original alarm information statistics table

由于两个无线采集器采集到的告警信息包含了大量同一攻击行为的重复告警,同时每个采集器本身也产生了较多的无关告警,例如对校网WLAN中使用开放系统认证的AP接入点使用WEP破解攻击等。The alarm information collected by the two wireless collectors contains a large number of repeated alarms of the same attack behavior, and each collector itself also generates a lot of irrelevant alarms, for example, for AP access using open system authentication in the school network WLAN Points to use WEP cracking attacks, etc.

经过告警精简后的统计结果如表2所示。Table 2 shows the statistical results after alarm simplification.

表2 精简后的告警信息统计表Table 2 Simplified alarm information statistics table

从表2中可以看出,经过告警精简之后,去除了大量的重复和无关数据,精简后的告警条数降到约2.5万条,7天的精简率为75.4%到77.4%不等,平均精简率为76.5%。It can be seen from Table 2 that after the alarm simplification, a large number of duplicate and irrelevant data were removed, and the number of alarms after simplification dropped to about 25,000. The 7-day simplification rate ranged from 75.4% to 77.4%. The streamlining rate is 76.5%.

然后再对精简后的告警进行分类,聚合为超告警,告警分类后的统计结果如表3所示。Then classify the simplified alarms and aggregate them into super alarms. Table 3 shows the statistical results after alarm classification.

表3 分类后的告警信息统计表Table 3 Statistical table of alarm information after classification

从表3中可以看出,经过告警分类之后,再次大大降低了告警的条数,共计输出超告警3204条,分类率为86.9%到88.2%不等,平均分类率为87.5%。It can be seen from Table 3 that after the alarm classification, the number of alarms is greatly reduced again, a total of 3204 alarms are output, the classification rate ranges from 86.9% to 88.2%, and the average classification rate is 87.5%.

在攻击测试和数据采集过程中,共采集到原始告警总数为108903条,进行告警精简后,得到精简后告警25553条,再经过告警分类处理后,共输出超告警数3204条。In the process of attack testing and data collection, a total of 108,903 original alarms were collected. After the alarms were simplified, 25,553 alarms were obtained. After alarm classification, a total of 3,204 excess alarms were output.

图6描述了聚合前后告警数量的对比情况。Figure 6 describes the comparison of the number of alarms before and after aggregation.

从以上的统计数据可以计算得出,总聚合率达到了97.1%,较好地实现了预处理的目标,这也验证了本发明提出的面向WLAN的无线入侵告警聚合方法是有效的。It can be calculated from the above statistical data that the total aggregation rate reaches 97.1%, which better achieves the goal of preprocessing, which also verifies that the WLAN-oriented wireless intrusion alarm aggregation method proposed by the present invention is effective.

Claims (5)

1.一种WLAN无线入侵告警聚合方法,其特征在于:包括如下步骤:1. A WLAN wireless intrusion alarm aggregation method is characterized in that: comprising the steps: 步骤一、告警格式化:首先对已有无线入侵检测系统捕获的原始安全告警进行格式化处理,改进通用的入侵检测消息交换格式IDMEF的告警格式,在其中引入AP接入点等无线设备信息,具体包含AP的SSID、工作信道、MAC地址、信号强度、是否加密以及加密机制等内容,使之能够反映WLAN无线环境的特征信息;Step 1. Alarm formatting: First, format the original security alarms captured by the existing wireless intrusion detection system, improve the alarm format of the general intrusion detection message exchange format IDMEF, and introduce wireless device information such as AP access points into it. It specifically includes the AP's SSID, working channel, MAC address, signal strength, whether to encrypt, and the encryption mechanism, etc., so that it can reflect the characteristic information of the WLAN wireless environment; 步骤二、告警精简:WLAN无线入侵检测系统产生的告警包含了大量的无关告警和重复告警信息,对这些告警进行剔除和精简,提高分析告警的准确率和可靠性;Step 2. Alarm simplification: The alarm generated by the WLAN wireless intrusion detection system contains a large number of irrelevant alarms and repeated alarm information. These alarms are eliminated and simplified to improve the accuracy and reliability of alarm analysis; 步骤三、告警分类:对于剔除无关告警和重复告警后的告警,利用AP的SSID、攻击源的MAC地址、AP的MAC地址等特征进行分类,将原始告警聚合为超告警,对应某一类具有明显攻击行为特征的安全告警,为后续的入侵防御决策提供前提条件。Step 3. Alarm classification: For the alarms after eliminating irrelevant alarms and repeated alarms, classify the alarms based on the SSID of the AP, the MAC address of the attack source, and the MAC address of the AP, and aggregate the original alarms into super alarms, corresponding to a certain type Security alerts with obvious attack behavior characteristics provide prerequisites for subsequent intrusion prevention decisions. 2.根据权利要求1所述的WLAN无线入侵告警聚合方法,其特征在于:所述步骤一中的改进通用的入侵检测消息交换格式IDMEF的告警格式具体步骤为:2. WLAN wireless intrusion alarm aggregation method according to claim 1, is characterized in that: the alarm format specific steps of the improved general intrusion detection message exchange format IDMEF in said step 1 are: 在IDMEF告警格式的基础上进行了扩展;在IDMEF告警格式中补充以下三类重要的信息:Based on the IDMEF alarm format, the following three types of important information are added to the IDMEF alarm format: (1)增加告警Target的AP类,描述WLAN环境中特有的AP信息属性,主要包括AP的物理地址(MAC_Addr)、AP的SSID(SSID)、AP的BSSID(BSSID)、AP的生产商(Vendor)、工作信道(Channel)、传输速度(Speed)、信号强弱(Signal)、是否加密(Encryption)、加密方式(Encrypt_Type)和IP地址(IP_Addr)等信息;(1) Add the AP category of the alarm Target, which describes the unique AP information attributes in the WLAN environment, mainly including the physical address (MAC_Addr) of the AP, the SSID (SSID) of the AP, the BSSID (BSSID) of the AP, and the manufacturer of the AP (Vendor ), working channel (Channel), transmission speed (Speed), signal strength (Signal), whether to encrypt (Encryption), encryption method (Encrypt_Type) and IP address (IP_Addr); (2)扩展告警的AdditionalData类,增加WLAN传输的无线帧的重要信息,主要包括类型域(Type)、子类型域(Subtype)、To DS域(To_DS)、From DS域(From_DS)、More Fragments域(More_Flags)、Retry域(Retry)、Power Management域(Pwr_Mgt)、More Data域(More_Data)、WEP域(WEP)、Order域(Order)、Duration/ID字段(Duration_ID)、帧序号(Seq_Num)、分片序号(Frag_Num)等MAC帧相关的信息;(2) Expand the AdditionalData class of the alarm, and increase the important information of the wireless frame transmitted by WLAN, mainly including the type field (Type), subtype field (Subtype), To DS field (To_DS), From DS field (From_DS), More Fragments Domain (More_Flags), Retry domain (Retry), Power Management domain (Pwr_Mgt), More Data domain (More_Data), WEP domain (WEP), Order domain (Order), Duration/ID field (Duration_ID), frame sequence number (Seq_Num) , Fragment sequence number (Frag_Num) and other MAC frame-related information; (3)扩展告警的Analyzer类,增加分布式环境中特有的无线采集器属性,主要包括产生告警的采集器类型(Agent_Type)、产生告警的采集器标识(Agent_ID)、采集器特征标识(Agent_SID)、告警在该采集器所有告警中的序号(Agent_CID)等。(3) Expand the Analyzer class of the alarm, and increase the unique wireless collector attributes in the distributed environment, mainly including the collector type (Agent_Type), the collector identifier (Agent_ID) and the collector characteristic identifier (Agent_SID) that generate the alarm. , the serial number (Agent_CID) of the alarm in all the alarms of the collector, etc. 3.根据权利要求1所述的WLAN无线入侵告警聚合方法,其特征在于:所述步骤二包含具体步骤为:3. The WLAN wireless intrusion alarm aggregation method according to claim 1, characterized in that: said step 2 includes specific steps of: 需要精简的告警主要有以下两类:The alarms that need to be simplified mainly fall into the following two categories: (1)无关告警:无线采集器识别出某一攻击行为,但该攻击并不适用于实际的无线网络环境,例如针对WPA加密的AP接入点所产生的WEP破解告警等;(1) Irrelevant alarm: The wireless collector recognizes an attack behavior, but the attack is not applicable to the actual wireless network environment, such as WEP cracking alarms generated by WPA-encrypted AP access points; (2)重复告警:包括不同的无线采集器监测到的由同一攻击源发起针对同一目标的告警,同一无线采集器产生的连续、周期性的同一类型告警等;(2) Repeated alarms: including alarms against the same target initiated by the same attack source detected by different wireless collectors, continuous and periodic alarms of the same type generated by the same wireless collector, etc.; 告警精简的第一个环节是无关告警去除,针对格式化后的告警数据,利用WLAN环境的空间特征、攻击类型和目标设备信息,判断该告警是否和攻击目标相关,如果无关则去除该告警,否则转入下一步的重复告警去除环节;The first step in alarm simplification is irrelevant alarm removal. For the formatted alarm data, use the spatial characteristics of the WLAN environment, attack type, and target device information to determine whether the alarm is related to the attack target. If not, remove the alarm. Otherwise, go to the next step to remove duplicate alarms; 本发明采用了一阶谓词逻辑的无关告警精简方法对无关告警进行判断,该方法包括三个层次:数据源、网络环境和相关结果;The present invention adopts an irrelevant alarm simplification method of first-order predicate logic to judge irrelevant alarms, and the method includes three levels: data source, network environment and related results; (1)数据源:充分利用空间特征,判断格式化的告警数据中无线采集器的类型,包括分布式的Snort-Wireless等无线入侵检测系统产生的告警信息;(1) Data source: make full use of spatial features to judge the type of wireless collector in the formatted alarm data, including alarm information generated by distributed wireless intrusion detection systems such as Snort-Wireless; (2)网络环境:获取WLAN环境中的AP接入点、无线终端等目标设备的信息,包括AP接入点的SSID、MAC地址、生产商、是否加密和加密方式等;(2) Network environment: Obtain the information of target devices such as AP access points and wireless terminals in the WLAN environment, including the SSID, MAC address, manufacturer, whether to encrypt and the encryption method of the AP access point, etc.; (3)相关结果:结合数据源和网络环境信息,判断告警描述的攻击类型是否符合攻击需要的条件,最终提供告警是否相关的结果;(3) Correlation results: Combining the data source and network environment information, judge whether the attack type described by the alarm meets the conditions required for the attack, and finally provide the result of whether the alarm is relevant; 无关告警精简方法使用了以下原子谓词公式(公式1):The irrelevant alarm reduction method uses the following atomic predicate formula (Formula 1): Predicate 1 : Alert _ Type ( SOURCE , DESTINATION ) Predicate 2 : Weakness _ Name ( DESTINATION ) Predicate 3 : Device _ Information ( DESTINATION )    (公式1) Predicate 1 : alert _ type ( SOURCE , DESTINATION ) Predicate 2 : Weakness _ name ( DESTINATION ) Predicate 3 : Device _ Information ( DESTINATION ) (Formula 1) 谓词1表示攻击源SOURCE向目标设备DESTINATION发起的攻击类型是Alert_Type,谓词2表示目标设备DESTINATION存在漏洞信息Weakness_Name,谓词3表示目标设备DESTINATION的设备信息是Device_Information;Predicate 1 indicates that the attack type launched by the attack source SOURCE to the target device DESTINATION is Alert_Type, predicate 2 indicates that the target device DESTINATION has vulnerability information Weakness_Name, and predicate 3 indicates that the device information of the target device DESTINATION is Device_Information; 无关告警精简方法的具体判断过程如下:The specific judgment process of the irrelevant alarm simplification method is as follows: (1)首先定义无线攻击类型的集合为AT={at1,...,ati},无线设备的漏洞集合为WN={wn1,...,wni},无线设备信息的集合为DI={di1,...,din};(1) First define the set of wireless attack types as AT={at 1 ,...,at i }, the set of wireless device vulnerabilities as WN={wn 1 ,...,wn i }, the set of wireless device information is DI={di 1 ,...,di n }; (2)将三个集合中的元素分别用谓词1、谓词2和谓词3的逻辑组合表示,每个元素的值域为{1,0},其中1代表该谓词取值为TRUE,0代表FALSE;(2) The elements in the three sets are represented by the logical combination of predicate 1, predicate 2 and predicate 3, and the value range of each element is {1,0}, where 1 means that the predicate value is TRUE, and 0 means FALSE; (3)然后定义告警相关性判断函数,对产生的告警和目标设备是否相关做出判断,并输出结果进行告警精简处理;(3) Then define the alarm correlation judgment function, make a judgment on whether the generated alarm is related to the target device, and output the result for alarm simplification; 告警相关性判断函数见如下公式2:The alarm correlation judgment function is shown in the following formula 2:    (公式2) (Formula 2) 其中,at∈AT,wn∈WN,di∈DI,如果根据告警相关性判断函数得到的结果为0,即告警描述的攻击类型和目标设备的漏洞信息不匹配或者和目标信息不匹配,说明该告警是无关告警,则将该告警去除;如果结果为1,则输出到下一个步骤进行重复性判断;Among them, at∈AT, wn∈WN, di∈DI, if the result obtained according to the alarm correlation judgment function is 0, that is, the attack type described in the alarm does not match the vulnerability information of the target device or does not match the target information, indicating that the If the alarm is an irrelevant alarm, the alarm will be removed; if the result is 1, it will be output to the next step for repeatability judgment; 经过无关告警处理之后,对重复告警进行去除;After irrelevant alarm processing, remove duplicate alarms; 定义1给定一个不同采集器产生的所有告警的集合A={a1,...,an},a为一个告警五元组a=(sensorID,alertType,srcMAC,dstMAC,timestamp),其中,sensorID表示采集器标识,alertType表示告警类型,srcMAC和dstMAC分别表示源物理地址和目标物理地址,timestamp表示产生告警的时间戳,如果两个告警ai和aj满足以下条件之一,则称这两个告警为重复告警;Definition 1 Given a collection of all alarms generated by different collectors A={a 1 ,...,a n }, a is an alarm quintuple a=(sensorID, alertType, srcMAC, dstMAC, timestamp), where , sensorID indicates the identifier of the collector, alertType indicates the type of alarm, srcMAC and dstMAC indicate the source physical address and target physical address respectively, timestamp indicates the timestamp when the alarm is generated, if two alarms a i and a j meet one of the following conditions, it is called These two alarms are repeated alarms; (1)条件一:告警ai和告警aj的sensorID、alertType、srcMAC和dstMAC均相同,并且告警aj产生于告警ai输出后的一定单位时间△t1内,其中,△t1=timestampj-timestampi,该类告警实际代表了同一采集器产生的具有趋势性特征的重复告警;(1) Condition 1: The sensorID, alertType, srcMAC and dstMAC of the alarm a i and the alarm a j are the same, and the alarm a j is generated within a certain unit time △t1 after the output of the alarm a i , where △t1=timestamp j -timestamp i , this type of alarm actually represents repeated alarms with trend characteristics generated by the same collector; (2)条件二:告警ai和告警aj的sensorID不同,但alertType、srcMAC和dstMAC均相同,并且告警ai和告警aj产生在一定时间间隔△t2内,其中,△t2=|timestampj-timestampi|,该类告警实际代表了不同采集器产生的针对同一攻击行为的重复告警;(2) Condition 2: The sensorIDs of alarm a i and alarm a j are different, but the alertType, srcMAC and dstMAC are the same, and alarm a i and alarm a j are generated within a certain time interval △t2, where △t2=|timestamp j -timestamp i |, this type of alarm actually represents repeated alarms for the same attack behavior generated by different collectors; 重复告警精简方法的具体过程如下:The specific process of the repetitive alarm simplification method is as follows: (1)首先定义一定的时间间隔阈值△t1和△t2,可以结合实际攻击检测的统计均值进行设置;(1) First define certain time interval thresholds △t1 and △t2, which can be set in combination with the statistical mean value of actual attack detection; (2)对于告警集合A,将具有相同alertType、srcMAC和dstMAC的告警进行聚类,产生若干个Ai(2) For the alarm set A, cluster the alarms with the same alertType, srcMAC and dstMAC to generate several A i ; (3)对于需要进行重复性判断的新告警a,如果该告警不在告警集合Ai中,说明其为某一类新的告警,直接添加到告警聚类中,如果该告警属于某个告警聚类Ai,则利用告警重复判断函数进行判断,得出是否属于重复告警的结果;(3) For a new alarm a that needs to be judged repeatedly, if the alarm is not in the alarm set A i , it means that it is a new type of alarm, and it is directly added to the alarm cluster. If the alarm belongs to a certain alarm cluster Class A i , use the alarm repetition judging function to judge whether it belongs to the result of repeated alarm; (4)如果判断结果属于重复告警,则对告警进行合并处理,否则,将新告警添加到告警聚类中;(4) If the judgment result belongs to repeated alarms, the alarms are merged, otherwise, new alarms are added to the alarm cluster; 对具有相同alertType、srcMAC和dstMAC的告警a进行告警重复判断的函数见公式3:The function for judging the repetition of alarms for alarm a with the same alertType, srcMAC and dstMAC is shown in formula 3: redundant ( a &Element; A i ) = 1 , ( a . s &Element; A i , S ) and ( a . t - A i . t &le; &Delta;t 1 ) 1 , ( a . s &NotElement; A i . S ) and ( a . t - A i . t &le; &Delta;t 2 ) 0 , otherwise    (公式3) redundant ( a &Element; A i ) = 1 , ( a . the s &Element; A i , S ) and ( a . t - A i . t &le; &Delta;t 1 ) 1 , ( a . the s &NotElement; A i . S ) and ( a . t - A i . t &le; &Delta;t 2 ) 0 , otherwise (Formula 3) 其中,a.s表示产生告警a的采集器标识sensorID,a.t表示告警a产生的时间戳timestamp,Ai.S表示产生告警聚类Ai的采集器集合,Ai.S表示告警聚类Ai中最新产生告警的时间戳;如果根据告警重复判断函数得到的结果为1,说明该告警是重复告警,属于同一采集器产生的具有趋势性的重复告警或者不同采集器产生的针对相同攻击的重复告警,则会将该告警合并到告警聚类中,并更新产生告警的时间戳;如果结果为0,表示该告警不属于重复告警,将直接添加到告警聚类。Among them, as represents the sensor ID of the collector that generates alarm a, at represents the timestamp timestamp generated by alarm a, A i .S represents the collection of collectors that generate alarm cluster A i , and A i .S represents the alarm cluster A i The timestamp of the latest alarm; if the result of the alarm repetition judgment function is 1, it means that the alarm is a repeated alarm, which belongs to the trending repeated alarm generated by the same collector or the repeated alarm for the same attack generated by different collectors , the alarm will be merged into the alarm cluster and the time stamp of the alarm will be updated; if the result is 0, it means that the alarm is not a duplicate alarm and will be directly added to the alarm cluster. 4.根据权利要求1所述的WLAN无线入侵告警聚合方法,其特征在于:所述步骤三包含具体步骤为:4. The WLAN wireless intrusion alarm aggregation method according to claim 1, characterized in that: said step 3 includes specific steps of: 将使用告警分类对告警进行进一步的聚合处理,以超告警(Hyper Alert)的形式输出;Alarm classification will be used to further aggregate the alarms and output in the form of Hyper Alerts; 超告警主要考虑以下四个关键属性:alertType、srcMAC、dstMAC和timestamp,在一定的时间窗口内,将超告警分为以下三类:The super alarm mainly considers the following four key attributes: alertType, srcMAC, dstMAC, and timestamp. Within a certain time window, the super alarm is divided into the following three categories: (1)第一类超告警:将具有相同alertType、srcMAC和dstMAC属性的告警归为一类,表示同一攻击源针对同一目标持续开展的同一攻击类型;(1) The first type of super alarm: the alarms with the same alertType, srcMAC and dstMAC attributes are classified into one category, indicating that the same attack source continues to carry out the same attack type against the same target; (2)第二类超告警:将具有相同alertType和srcMAC、不同dstMAC属性的告警归为一类,表示同一攻击源针对不同目标开展的同一攻击类型;(2) The second type of super alarm: the alarms with the same alertType and srcMAC and different dstMAC attributes are classified into one category, indicating the same attack type carried out by the same attack source against different targets; (3)第三类超告警:将具有相同alertType和dstMAC、不同srcMAC属性的告警归为一类,表示不同攻击源针对同一目标开展的同一攻击类型;(3) The third type of super alarm: the alarms with the same alertType and dstMAC and different srcMAC attributes are classified into one category, indicating the same attack type carried out by different attack sources against the same target; 针对这三类超告警的相关定义如下;The relevant definitions for these three types of super-alarms are as follows; 定义2告警时间窗口WA(Alert Time Window);假设描述同一攻击行为的第一个告警和最后一个告警分别为a1和an,该攻击行为在a1和an中间产生的任一告警为aj,其中1<j<n,a1.alertType=aj.alertType=…=an.alertType,则对于所有的a1、aj、an∈A,如果满足以下条件:Definition 2 Alert Time Window W A (Alert Time Window); Assuming that the first alert and the last alert describing the same attack behavior are a 1 and a n respectively, any alert generated between a 1 and a n by the attack behavior is a j , where 1<j<n, a 1 .alertType=a j .alertType=...=a n .alertType, then for all a 1 , a j , a n ∈A, if the following conditions are met: MIN(aj.timestamp-a1.timestamp)≤WA≤MAX(an.timestamp-a1.timestamp)MIN(a j .timestamp-a 1 .timestamp)≤W A ≤MAX(a n .timestamp-a 1 .timestamp) 则称WA为针对告警A的告警时间窗口;Then W A is called the alarm time window for alarm A; 定义3第一类超告警HA(Hyper Alert Ⅰ);假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 3 The first type of hyper-alert HA (Hyper Alert Ⅰ); assume that all alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n> are located in the alarm time window W A , where 1<j<n, for all a 1 , a j , a n ∈A, if the following conditions are satisfied: a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id a1.srcMAC=…=aj.srcMAC=…=an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC=…=a j .srcMAC=…=a n .srcMAC, srcMAC∈SMAC(1<j<n) a1.dstMAC=…=aj.dstMAC=…=an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC=…=a j .dstMAC=…=a n .dstMAC, dstMAC∈DMAC(1<j<n) 则称HA=sig_id(1,SMAC,DMAC,EID,T)为第一类超告警,其中,sig_id是具体的某一种无线攻击类型,SMAC是攻击源的物理地址集合,DMAC是目标物理地址集合,EID是产生该攻击告警的事件ID集合,T是第一个告警a1产生的时间戳;Then HA =sig_id(1,SMAC,DMAC,EID,T) is called the first type of super alarm, wherein, sig_id is a specific type of wireless attack, SMAC is the physical address set of the attack source, and DMAC is the physical address set of the target Address set, EID is the event ID set that generates the attack alarm, T is the timestamp when the first alarm a 1 is generated; 定义4第二类超告警HA(Hyper Alert Ⅱ);假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 4 The second type of hyper-alert HA (Hyper Alert Ⅱ); assume that all alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n> are located in the alarm time window W A , where 1<j<n, for all a 1 , a j , a n ∈A, if the following conditions are met: a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id a1.srcMAC=…=aj.srcMAC=…=an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC=…=a j .srcMAC=…=a n .srcMAC, srcMAC∈SMAC(1<j<n) a1.dstMAC≠…≠aj.dstMAC≠…≠an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC≠…≠a j .dstMAC≠…≠a n .dstMAC, dstMAC∈DMAC(1<j<n) 则称HA=sig_id(2,SMAC,DMAC,EID,T)为第二类超告警,其中,sig_id、SMAC、DMAC、EID和T代表的含义同定义3所定义;Then HA II = sig_id (2, SMAC, DMAC, EID, T) is the second type of super alarm, wherein, the meanings represented by sig_id, SMAC, DMAC, EID and T are the same as those defined in Definition 3; 定义5第三类超告警HA(Hyper AlertⅢ);假设告警序列A=<a1,…,aj,…,an>中的所有告警都位于告警时间窗口WA内,其中1<j<n,对于所有的a1、aj、an∈A,如果满足以下条件:Definition 5 The third type of hyper-alert HA (Hyper Alert Ⅲ); assume that all the alarms in the alarm sequence A= <a 1 ,…,a j ,…,a n> are located in the alarm time window W A , where 1<j <n, for all a 1 , a j , a n ∈A, if the following conditions are satisfied: a1.alertType=…=aj.alertType=…=an.alertType=sig_ida 1 .alertType=...=a j .alertType=...=a n .alertType=sig_id a1.srcMAC≠…≠aj.srcMAC≠…≠an.srcMAC,srcMAC∈SMAC(1<j<n)a 1 .srcMAC≠…≠a j .srcMAC≠…≠a n .srcMAC, srcMAC∈SMAC(1<j<n) a1.dstMAC=…=aj.dstMAC=…=an.dstMAC,dstMAC∈DMAC(1<j<n)a 1 .dstMAC=…=a j .dstMAC=…=a n .dstMAC, dstMAC∈DMAC(1<j<n) 则称HA=sig_id(3,SMAC,DMAC,EID,T)为第三类超告警,其中,sig_id、SMAC、DMAC、EID和T代表的含义也和定义3定义的相同。Then HA III =sig_id(3, SMAC, DMAC, EID, T) is called the third type of super alarm, wherein, the meanings represented by sig_id, SMAC, DMAC, EID and T are also the same as those defined in Definition 3. 5.根据权利要求4所述的WLAN无线入侵告警聚合方法,其特征在于:所述超告警分类算法的具体步骤如下:5. The WLAN wireless intrusion alarm aggregation method according to claim 4, characterized in that: the specific steps of the super alarm classification algorithm are as follows: (1)首先定义一个告警时间窗口WA内的告警序列WA(i,j),其中i和j分别代表开始告警和结束告警的标识cid;(1) First define an alarm sequence W A (i, j) within an alarm time window W A , where i and j represent the identifier cid of the start alarm and the end alarm respectively; (2)设置超告警集合HA、HA和HA的初始化状态分别为空集合φ;(2) Set the initialization states of super-alarm sets HA , HA and HA to empty set φ respectively; (3)当产生一条新告警ak时,针对是否满足HA、HA或HA超告警的特征,并按照HA高于HA高于HA的优先级顺序,将新告警ak分类到HA、HA或HA超告警。(3) When a new alarm a k is generated, according to whether it meets the characteristics of HA I , HA II or HA III , and according to the priority order of HA I higher than HA II higher than HA III , the new alarm a k Classify as HA I , HA II , or HA III hyperalarm.
CN201410238569.1A 2014-05-30 2014-05-30 WLAN wireless invasive Alert aggregation methods Active CN104009870B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410238569.1A CN104009870B (en) 2014-05-30 2014-05-30 WLAN wireless invasive Alert aggregation methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410238569.1A CN104009870B (en) 2014-05-30 2014-05-30 WLAN wireless invasive Alert aggregation methods

Publications (2)

Publication Number Publication Date
CN104009870A true CN104009870A (en) 2014-08-27
CN104009870B CN104009870B (en) 2017-03-15

Family

ID=51370366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410238569.1A Active CN104009870B (en) 2014-05-30 2014-05-30 WLAN wireless invasive Alert aggregation methods

Country Status (1)

Country Link
CN (1) CN104009870B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104880056A (en) * 2015-06-23 2015-09-02 湖州师范学院 Safety control method based on snort for wood drying
CN105207822A (en) * 2015-10-14 2015-12-30 国网四川省电力公司信息通信公司 Electric power communication equipment alarm information processing method and device
CN106658509A (en) * 2016-10-31 2017-05-10 迈普通信技术股份有限公司 Countering method and equipment for invalid wireless access points and wireless local area network
CN106899435A (en) * 2017-02-21 2017-06-27 浙江大学城市学院 A kind of complex attack identification technology towards wireless invasive detecting system
CN110136406A (en) * 2019-05-28 2019-08-16 上海闻泰信息技术有限公司 Abnormal prompt device and method for common equipment
CN112087465A (en) * 2020-09-17 2020-12-15 北京微步在线科技有限公司 A method and device for determining threat events based on aggregated information
CN112200603A (en) * 2020-09-25 2021-01-08 微梦创科网络科技(中国)有限公司 An alarm method and system for social advertisement placement
CN113438653A (en) * 2021-06-01 2021-09-24 紫光华山科技有限公司 Equipment classification method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562537A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed self-optimized intrusion detection alarm associated system
CN101778112A (en) * 2010-01-29 2010-07-14 中国科学院软件研究所 Network attack detection method
US7849185B1 (en) * 2006-01-10 2010-12-07 Raytheon Company System and method for attacker attribution in a network security system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7849185B1 (en) * 2006-01-10 2010-12-07 Raytheon Company System and method for attacker attribution in a network security system
CN101562537A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed self-optimized intrusion detection alarm associated system
CN101778112A (en) * 2010-01-29 2010-07-14 中国科学院软件研究所 Network attack detection method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104880056A (en) * 2015-06-23 2015-09-02 湖州师范学院 Safety control method based on snort for wood drying
CN104880056B (en) * 2015-06-23 2017-12-08 湖州师范学院 The method of controlling security of the drying of wood based on snort
CN105207822A (en) * 2015-10-14 2015-12-30 国网四川省电力公司信息通信公司 Electric power communication equipment alarm information processing method and device
CN106658509A (en) * 2016-10-31 2017-05-10 迈普通信技术股份有限公司 Countering method and equipment for invalid wireless access points and wireless local area network
CN106658509B (en) * 2016-10-31 2020-02-04 迈普通信技术股份有限公司 Method and equipment for countering illegal wireless access point and wireless local area network
CN106899435A (en) * 2017-02-21 2017-06-27 浙江大学城市学院 A kind of complex attack identification technology towards wireless invasive detecting system
CN106899435B (en) * 2017-02-21 2019-10-29 浙江大学城市学院 A kind of complex attack recognition methods towards wireless invasive detection system
CN110136406A (en) * 2019-05-28 2019-08-16 上海闻泰信息技术有限公司 Abnormal prompt device and method for common equipment
CN112087465A (en) * 2020-09-17 2020-12-15 北京微步在线科技有限公司 A method and device for determining threat events based on aggregated information
CN112200603A (en) * 2020-09-25 2021-01-08 微梦创科网络科技(中国)有限公司 An alarm method and system for social advertisement placement
CN113438653A (en) * 2021-06-01 2021-09-24 紫光华山科技有限公司 Equipment classification method and device

Also Published As

Publication number Publication date
CN104009870B (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN104009870B (en) WLAN wireless invasive Alert aggregation methods
Latha et al. Deauthentication Attack Detection in the Wi-Fi network by Using ML Techniques
Agarwal et al. An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks
Lu et al. Research on WiFi penetration testing with Kali Linux
US7971253B1 (en) Method and system for detecting address rotation and related events in communication networks
CN101800989B (en) Anti-replay-attack system for industrial wireless network
CN108289088A (en) Abnormal traffic detection system and method based on business model
WO2016086763A1 (en) Wireless access node detecting method, wireless network detecting system and server
CN101631026A (en) Method and device for defending against denial-of-service attacks
CN107197456A (en) A kind of client-based identification puppet AP detection method and detection means
US20140344931A1 (en) Systems and methods for extracting cryptographic keys from malware
Lu et al. SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
Alsadhan et al. Detecting NDP distributed denial of service attacks using machine learning algorithm based on flow-based representation
Choi et al. Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack
CN105471879B (en) Novel based on rough set prevents wireless disassociation frame DoS attack method
Gu et al. Null data frame: A double-edged sword in IEEE 802.11 WLANs
Lu et al. Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames
Nie et al. Intrusion detection using a graphical fingerprint model
Meng et al. Building a wireless capturing tool for WiFi
CN102164140A (en) Method for intrusion detection based on negative selection and information gain
Chen et al. An intelligent WLAN intrusion prevention system based on signature detection and plan recognition
Ratnayake et al. An intelligent approach to detect probe request attacks in IEEE 802.11 networks
Lu A position self-adaptive method to detect fake access points
US11997133B2 (en) Algorithmically detecting malicious packets in DDoS attacks
Al-Sarawi et al. Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant