CN103166926A - A SIP DDoS attack distributed defense system and its load balancing method - Google Patents
A SIP DDoS attack distributed defense system and its load balancing method Download PDFInfo
- Publication number
- CN103166926A CN103166926A CN2011104184301A CN201110418430A CN103166926A CN 103166926 A CN103166926 A CN 103166926A CN 2011104184301 A CN2011104184301 A CN 2011104184301A CN 201110418430 A CN201110418430 A CN 201110418430A CN 103166926 A CN103166926 A CN 103166926A
- Authority
- CN
- China
- Prior art keywords
- load
- defense
- sip
- node
- detection node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007123 defense Effects 0.000 title claims abstract description 177
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000001514 detection method Methods 0.000 claims abstract description 149
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 45
- 238000012545 processing Methods 0.000 claims abstract description 18
- 230000004044 response Effects 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 8
- 238000011084 recovery Methods 0.000 claims description 5
- 238000011895 specific detection Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000001914 filtration Methods 0.000 description 4
- 230000002265 prevention Effects 0.000 description 3
- 230000001186 cumulative effect Effects 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域 technical field
本发明涉及VoIP网络安全和IP通信领域,具体地说是一种SIP DDoS攻击分布式防御系统及其负载均衡方法。The invention relates to the fields of VoIP network security and IP communication, in particular to a SIP DDoS attack distributed defense system and a load balancing method thereof.
背景技术 Background technique
随着人们对通信需求的多样化,IP通信的范畴已经大大扩展,开始从简单的VoIP系统(Voice Over IP)向统一通信(EoIP,Everything Over IP)演进。SIP(session initiation protocol,应用层的信令控制协议)用于建立、修改和终止IP网络上的双方或多方多媒体会话。它以结构简单、使用方便的特点已成为VoIP、IMS、IPTV的核心协议,ETSI及ITU-T定义的NGN架构中也都采用了SIP。SIP协议在设计之初充分考虑了协议的易用性和灵活性,没有将安全性作为重点,使其在安全性方面存在一定缺陷,DoS(Denial of Service,拒绝服务)攻击是SIP协议面临的主要安全威胁之一。美国标准与技术研究院NIST将DoS攻击作为VoIP网络架构中一种严重安全威胁,在融合网络的安全威胁分析中,DoS攻击已成为融合网络考虑的首要安全问题。德国固网运营商Arcor正在大规模部署基于SIP的NGN网络,他们声称DoS攻击的防御已成为服务提供商的一个紧迫需求。With the diversification of people's communication needs, the scope of IP communication has been greatly expanded, and it has begun to evolve from a simple VoIP system (Voice Over IP) to a unified communication (EoIP, Everything Over IP). SIP (session initiation protocol, the signaling control protocol of the application layer) is used to establish, modify and terminate two-party or multi-party multimedia sessions on the IP network. It has become the core protocol of VoIP, IMS, and IPTV because of its simple structure and convenient use. SIP is also used in the NGN architecture defined by ETSI and ITU-T. At the beginning of the design, the SIP protocol fully considered the ease of use and flexibility of the protocol, and did not focus on security, which made it have certain defects in security. DoS (Denial of Service, denial of service) attacks are the most serious problems faced by the SIP protocol. One of the main security threats. NIST, the American Institute of Standards and Technology, regards DoS attack as a serious security threat in the VoIP network architecture. In the security threat analysis of converged networks, DoS attacks have become the primary security issue considered in converged networks. German fixed-line operator Arcor, which is deploying SIP-based NGN networks on a large scale, claims that defense against DoS attacks has become an urgent need for service providers.
DDoS(Distributed Denial of Service,分布式拒绝服务)攻击由于防御难度高,攻击危害大,对SIP协议的应用造成的威胁更大。DDoS攻击中攻击者使用多台主机向服务器发送大量攻击消息,面对大量的网络流量,防御系统检测效率会大大降低,系统本身也可能成为DDoS攻击的对象。DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks are more difficult to defend and cause more damage, which poses a greater threat to the application of the SIP protocol. In a DDoS attack, the attacker uses multiple hosts to send a large number of attack messages to the server. Faced with a large amount of network traffic, the detection efficiency of the defense system will be greatly reduced, and the system itself may become the target of the DDoS attack.
对于SIP DDoS攻击防御模型的研究很少,现有的SIP DDoS防御系统主要可以分为四类:通过限制消息请求速率来实现防御的防御系统、基于SIP网络的状态防火墙的防御系统、基于流的分布式防御系统和SIP代理服务器自防御系统。通过限制消息请求速率来实现防御的系统无法区分正常消息和攻击消息,只能减弱攻击强度;于SIP网络的状态防火墙系统防御效率依赖设定的安全规则,只能防御已知攻击;基于流的分布式防御系统由于没有考虑SIP消息的特点,导致大多数的检测算法无法使用同时会产生较高的误报和漏报;SIP代理服务器自防御系统嵌入到SIP代理服务器中,加重了SIP代理服务器的处理负担,在面对大量攻击消息时会导致服务器崩溃。There are very few studies on the defense model of SIP DDoS attacks. The existing SIP DDoS defense systems can be divided into four categories: the defense system that achieves defense by limiting the message request rate, the defense system based on the stateful firewall of the SIP network, and the flow-based defense system. Distributed defense system and SIP proxy server self-defense system. A system that achieves defense by limiting the message request rate cannot distinguish between normal messages and attack messages, and can only weaken the attack intensity; the defense efficiency of the state firewall system on the SIP network depends on the set security rules, and can only defend against known attacks; flow-based Since the distributed defense system does not consider the characteristics of SIP messages, most of the detection algorithms cannot be used and high false positives and false negatives will be generated; the self-defense system of the SIP proxy server is embedded in the SIP proxy server, which increases the processing load, which can cause the server to crash in the face of a large number of attack messages.
现有的SIP DDoS防御模型都无法在高效防御的同时实现对未知攻击积极、主动的检测。同时一些主要的SIP DDoS攻击检测算法,如累加和算法和基于SIP事务状态机的检测方法等,虽然有较高的检测准确度,但是由于检测消耗资源大、检测速率慢等原因在单一主机的防御系统中无法用于防御。若防御系统采用分布式的体系结构,将检测任务分配到多台主机同时执行,能够使这些算法用于实时防御成为可能。None of the existing SIP DDoS defense models can actively and proactively detect unknown attacks while effectively defending. At the same time, some main SIP DDoS attack detection algorithms, such as the cumulative sum algorithm and the detection method based on the SIP transaction state machine, etc., have high detection accuracy, but due to the large consumption of resources and slow detection speed, etc. Cannot be used for defense in the defense system. If the defense system adopts a distributed architecture and assigns detection tasks to multiple hosts for simultaneous execution, it will be possible to use these algorithms for real-time defense.
发明内容 Contents of the invention
针对现有SIP DDoS攻击的入侵防御系统存在的缺陷,本发明要解决的技术问题是提供一种能够在高效防御SIP DDoS攻击的同时使用检测算法检测未知攻击的分布式防御系统,并为此防御系统提供一种能够满足检测算法要求的负载均衡方法。For the defects existing in the intrusion prevention system of the existing SIP DDoS attack, the technical problem to be solved in the present invention is to provide a distributed defense system that can use detection algorithms to detect unknown attacks while efficiently defending against the SIP DDoS attack, and for this defense The system provides a load balancing method that can meet the requirements of the detection algorithm.
本发明为实现上述目的所采用的技术方案是:一种SIP DDoS攻击分布式防御系统,包括The technical solution adopted by the present invention for realizing the above object is: a kind of SIP DDoS attack distributed defense system, comprising
防御检测节点,与负载均衡器相连,用于将负载信息实时通报给负载均衡器,共享规则库;The defense detection node is connected to the load balancer and is used to report the load information to the load balancer in real time and share the rule base;
负载均衡器,与多个防御检测节点相连,用于将SIP消息分发到各个防御检测节点,根据防御检测节点发来的负载信息更新防御节点负载表。The load balancer is connected with multiple defense detection nodes, and is used for distributing SIP messages to each defense detection node, and updating the defense node load table according to the load information sent by the defense detection nodes.
所述防御检测节点包括The defense detection node includes
SIP防火墙模块,对SIP消息进行解析并匹配规则库,决定对SIP消息的下一步处理;The SIP firewall module parses the SIP message and matches the rule base to determine the next step of processing the SIP message;
检测算法模块,对可疑SIP消息使用特定的检测算法进行检测,决定对可疑SIP消息的处理,对发现的攻击生成规则添加到规则库;The detection algorithm module uses a specific detection algorithm to detect suspicious SIP messages, determines the processing of suspicious SIP messages, and adds the found attack generation rules to the rule base;
流量转发模块,将判定为正常的SIP消息发往目标服务器;The traffic forwarding module sends the normal SIP message to the target server;
负载更新模块,将防御检测节点负载信息实时发送给负载均衡器。The load update module sends the load information of the defense detection node to the load balancer in real time.
所述负载均衡器包括The load balancer includes
SIP消息过滤器,只将SIP消息转发给接入速率控制器,对其它消息一律放过;SIP message filter, only forwards SIP messages to the access rate controller, and ignores all other messages;
接入速率控制器,检测SIP请求到达速率,若高于防御系统能够处理的速率阈值,则丢弃SIP消息;The access rate controller detects the arrival rate of SIP requests, and discards SIP messages if it is higher than the rate threshold that the defense system can handle;
负载均衡算法模块,查询防御节点负载表和历史记录表,决定SIP消息的分发去向;The load balancing algorithm module queries the defense node load table and history table to determine the distribution destination of SIP messages;
流量分发模块,根据负载均衡算法模块决定的分发去向将SIP消息发送到相应的防御检测节点。The traffic distribution module sends the SIP message to the corresponding defense detection node according to the distribution direction determined by the load balancing algorithm module.
所述负载均衡器采用主从机冗余备份,活跃的负载均衡器和待机的负载均衡器共享历史记录表和防御检测节点负载表;The load balancer adopts master-slave redundancy backup, and the active load balancer and the standby load balancer share the history record table and the defense detection node load table;
所述历史记录表包括Call-ID历史记录表和源IP地址对历史记录表;The historical record table includes a Call-ID historical record table and a source IP address pair historical record table;
所述历史记录表只记录一段时间内的历史记录。The historical record table only records historical records within a period of time.
一种SIP DDoS攻击分布式防御系统的负载均衡方法,包括以下步骤:A load balancing method of a SIP DDoS attack distributed defense system, comprising the following steps:
将SIP消息转发给接入速率控制器,放过其它消息;Forward the SIP message to the access rate controller, and let go of other messages;
检测SIP请求到达速率,若高于防御系统能够处理的速率阈值,则丢弃SIP消息;Detect the arrival rate of SIP requests, and discard SIP messages if it is higher than the rate threshold that the defense system can handle;
查询防御节点负载表和历史记录表,决定SIP消息的分发去向;Query the defense node load table and history table to determine the distribution destination of SIP messages;
根据两级负载均衡算法模块决定的分发去向将SIP消息发送到相应的防御检测节点;Send the SIP message to the corresponding defense detection node according to the distribution direction determined by the two-level load balancing algorithm module;
防御检测节点对SIP消息的处理;The defense detection node processes the SIP message;
根据防御检测节点发来的负载信息更新防御节点负载表。Update the defense node load table according to the load information sent by the defense detection node.
所述负载均衡算法为两级负载均衡算法,具体为:The load balancing algorithm is a two-level load balancing algorithm, specifically:
对SIP消息进行解析,提取Call-ID头域和源IP地址对头域;Parsing the SIP message, extracting the Call-ID header field and the source IP address matching header field;
一级负载均衡模块根据Call-ID历史记录表进行分发;The first-level load balancing module distributes according to the Call-ID history record table;
对于Call-ID历史记录表中没有记录的消息,一级负载均衡模块根据源IP地址对头域历史记录表进行分发;For messages that are not recorded in the Call-ID history record table, the first-level load balancing module distributes the header domain history record table according to the source IP address;
对于一级负载均衡模块没有分发的消息,二级负载均衡模块根据负载分发方法发送给合适的防御检测节点;For messages not distributed by the first-level load balancing module, the second-level load balancing module sends them to the appropriate defense detection node according to the load distribution method;
根据分发结果对历史记录表进行更新。The history table is updated according to the distribution results.
所述负载分发方法用Round-Robin算法对SIP消息进行分发。The load distribution method uses a Round-Robin algorithm to distribute SIP messages.
在将消息发送到某个防御检测节点前,所述负载分发方法要根据负载表对该防御检测节点进行可用性检查,具体为:Before sending the message to a certain defense detection node, the load distribution method needs to check the availability of the defense detection node according to the load table, specifically:
检测防御检测节点负载,若该防御检测节点负载大于二级转发负载上限,则停止向该防御检测节点的二级负载转发;Detect the load of the defense detection node. If the load of the defense detection node is greater than the upper limit of the secondary forwarding load, stop forwarding the secondary load to the defense detection node;
检测防御检测节点负载,若该防御检测节点负载大于一级转发负载上限,则停止向该防御检测节点的一级负载转发;Detect the load of the defense detection node. If the load of the defense detection node is greater than the upper limit of the first-level forwarding load, stop forwarding the first-level load to the defense detection node;
计算恢复转发下限,若该防御检测节点负载小于恢复转发下限,则恢复向该防御检测节点转发消息。Calculate the lower limit of recovery forwarding, and if the load of the defense detection node is less than the lower limit of recovery forwarding, resume forwarding messages to the defense detection node.
所述防御检测节点对SIP消息的处理具体为:The processing of the SIP message by the defense detection node is specifically:
SIP防火墙模块对消息进行解析并匹配规则库,决定对消息的下一步处理,丢弃攻击消息,将可疑消息发送到检测算法模块,将正常消息交给流量转发模块;The SIP firewall module parses the message and matches the rule base, decides the next step to process the message, discards the attack message, sends the suspicious message to the detection algorithm module, and sends the normal message to the traffic forwarding module;
流量转发模块将判定为正常的消息发往目标服务器;The traffic forwarding module sends the messages determined to be normal to the target server;
检测算法模块对可疑消息使用特定的检测算法进行检测,决定对可疑消息的处理,对发现的攻击生成规则添加到规则库。The detection algorithm module uses a specific detection algorithm to detect suspicious messages, determines the processing of suspicious messages, and adds the found attack generation rules to the rule base.
所述根据防御检测节点发来的负载信息更新防御节点负载表的方法为:The method for updating the defense node load table according to the load information sent by the defense detection node is:
负载均衡器等待所有防御检测节点的负载信息;The load balancer waits for the load information of all defensive detection nodes;
若在响应周期内没有收到来自某个防御检测节点的SIP消息,该防御检测节点的未应答次数加1;If no SIP message from a defense detection node is received within the response period, the number of non-response times of the defense detection node is increased by 1;
若某个防御检测节点的未应答次数大于未应答上限,则该节点的可用性置为否;If the non-response times of a defense detection node is greater than the upper limit of non-response, the availability of the node is set to No;
若收到某个不可用的防御检测节点的负载信息,则将该节点的可用性置为是,将未应答次数置为零,并在防御节点负载表中更新该节点的负载信息。If the load information of an unavailable defense detection node is received, the availability of the node is set to yes, the number of non-responses is set to zero, and the load information of the node is updated in the defense node load table.
本发明具有以下优点:The present invention has the following advantages:
1.本发明建立了一种分布式防御检测系统用于抵御SIP DDoS攻击,建立了一种防御检测节点数目可扩展的SIP DDoS攻击防御体系,使本系统具有较高的消息处理能力和较好的可扩展性。1. The present invention has set up a kind of distributed defense detection system to be used to resist SIP DDoS attack, set up a kind of SIP DDoS attack defense system that the number of defense detection nodes can be expanded, make this system have higher message processing ability and better scalability.
2.本发明建立了一种基于规则过滤和规则添加的防御检测方法,使本系统具有较高的防御效率和较低的处理延迟。2. The present invention establishes a defense detection method based on rule filtering and rule addition, so that the system has higher defense efficiency and lower processing delay.
3.本发明建立了一种基于检测算法负载均衡方法,满足检测算法对检测消息的要求,使本系统具有较高的攻击检测率和较低的误报率。3. The present invention establishes a load balancing method based on a detection algorithm, which meets the requirements of the detection algorithm for detection messages, and makes the system have a higher attack detection rate and a lower false alarm rate.
4.本发明建立了一种用于二级负载均衡模块的负载分发算法,按照防御检测节点的负载进行消息的分发,使本系统的防御检测节点具有良好的负载均衡特性。4. The present invention establishes a load distribution algorithm for the secondary load balancing module, and distributes messages according to the load of the defense detection nodes, so that the defense detection nodes of the system have good load balancing characteristics.
附图说明 Description of drawings
图1为本发明网络拓扑结构图;Fig. 1 is a network topology structure diagram of the present invention;
图2为本发明系统体系结构图;Fig. 2 is a system structure diagram of the present invention;
图3为本发明防御检测节点负载更新处理流程图;Fig. 3 is a flow chart of the load update processing of the defense detection node in the present invention;
图4为本发明两级负载均衡方法处理流程图;Fig. 4 is the processing flowchart of the two-level load balancing method of the present invention;
图5为本发明负载分发方法处理流程图;Fig. 5 is a processing flow chart of the load distribution method of the present invention;
图6为仿真实验环境示意图;Fig. 6 is the schematic diagram of simulation experiment environment;
图7为两个防御检测节点的系统负载图;Fig. 7 is a system load diagram of two defense detection nodes;
图8为四个防御检测节点的系统负载图。Fig. 8 is a system load diagram of four defense detection nodes.
具体实施方式 Detailed ways
下面结合附图及实施例对本发明做进一步的详细说明。The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
本发明SIP DDoS攻击分布式防御系统包括负载均衡器(Load Balacer,LB),与多个防御检测节点相连,对网络流量进行初步处理并使用负载均衡算法分发给各个防御检测节点;防御检测节点(Defending and Detecting Node,DDN),对分配到其上的SIP消息进行处理,过滤掉攻击消息,将正常消息发送给服务器。The SIP DDoS attack distributed defense system of the present invention includes a load balancer (Load Balacer, LB), which is connected to a plurality of defense detection nodes, performs preliminary processing on network traffic and distributes it to each defense detection node using a load balancing algorithm; the defense detection node ( Defending and Detecting Node, DDN), process the SIP messages assigned to it, filter out attack messages, and send normal messages to the server.
本发明的系统是用于抵御SIP DDoS攻击的入侵防御系统。本实施例运行于SIP服务器集群前端,处理发往服务器的SIP消息,防御SIP DDoS攻击,使SIP服务器免于攻击的危害。如图1所示系统中的负载均衡器与多个防御检测节点相连,防御检测节点除共享规则库外,只与负载均衡器相连。负载均衡器采用主从机冗余备份,活跃的负载均衡器和待机的负载均衡器共享历史记录表和防御检测节点负载表。The system of the present invention is an intrusion prevention system for resisting SIP DDoS attacks. This embodiment runs on the front end of the SIP server cluster, processes SIP messages sent to the server, defends against SIP DDoS attacks, and protects the SIP server from the harm of the attack. As shown in Figure 1, the load balancer in the system is connected to multiple defense detection nodes, and the defense detection nodes are only connected to the load balancer except for the shared rule base. The load balancer adopts master-slave redundancy backup, and the active load balancer and the standby load balancer share the history record table and the defense detection node load table.
本系统的历史记录表包括Call-ID历史记录表和源IP地址对历史记录表。本系统Call-ID历史记录表如表1所示,记录一条Call-ID的历史记录发往的防御检测节点的编号和虚拟IP地址。The historical record table of this system includes a Call-ID historical record table and a source IP address pair historical record table. The Call-ID history record table of this system is shown in Table 1, which records the number and virtual IP address of the defense detection node sent to by a Call-ID history record.
表1Table 1
本系统源IP地址对历史记录表如表2所示,记录一条源IP地址对的历史记录发往的防御检测节点的编号和虚拟IP地址。The source IP address pair history record table of this system is shown in Table 2, which records the number and virtual IP address of the defense detection node sent to by a source IP address pair history record.
表2Table 2
本系统防御检测节点负载表如表3所示,记录系统防御检测节点编号、虚拟IP地址、可用性和CPU负载率。The system defense detection node load table is shown in Table 3, which records the system defense detection node number, virtual IP address, availability and CPU load rate.
表3table 3
本系统只记录一段时间内(如24小时)的历史记录,保证历史记录表的查找效率。This system only records historical records within a period of time (such as 24 hours) to ensure the search efficiency of the historical record table.
如图2所示,本系统的防御检测节点采用相同结构,并用相同方式与负载均衡器相连。负载均衡器将SIP消息分发到各个防御检测节点,防御检测节点将负载信息实时通报给负载均衡器。As shown in Figure 2, the defense detection nodes of this system adopt the same structure and are connected to the load balancer in the same way. The load balancer distributes the SIP message to each defense detection node, and the defense detection node notifies the load balancer of the load information in real time.
所述负载均衡器包括SIP消息过滤器,只将SIP消息转发给接入速率控制器,对其它消息一律放过;接入速率控制器,检测SIP请求到达速率,若高于防御系统能够处理的速率阈值,则丢弃SIP消息;负载均衡算法模块,查询防御节点负载表和历史记录表,决定SIP消息的分发去向;流量分发模块,根据负载均衡算法模块决定的分发去向将SIP消息发送到相应的防御检测节点;历史记录表;防御检测节点负载表。历史记录表和防御检测节点负载表如上所述。The load balancer includes a SIP message filter, which only forwards SIP messages to the access rate controller, and ignores all other messages; the access rate controller detects the arrival rate of SIP requests, and if it is higher than the rate that the defense system can handle Rate threshold, then discard the SIP message; load balancing algorithm module, query the defense node load table and history table, determine the distribution destination of the SIP message; traffic distribution module, according to the distribution destination determined by the load balancing algorithm module, send the SIP message to the corresponding Defense detection node; history table; defense detection node load table. History table and defense detection node load table are as above.
所述防御检测节点包括SIP防火墙模块,对消息进行解析并匹配规则库,决定对消息的下一步处理,丢弃攻击消息,将可疑消息发送到检测算法模块,将正常消息交给流量转发模块;检测算法模块,对可疑消息使用特定的检测算法(如累加和算法、有限状态机算法等)进行检测,决定对可疑消息的处理,对发现的攻击生成规则添加到规则库;流量转发模块,将判定为正常的消息发往目标服务器;负载更新模块,将防御检测节点负载信息实时发送给负载均衡器;规则库,记录SIP消息的过滤规则。The defense detection node includes a SIP firewall module, which parses the message and matches the rule base, determines the next step of processing the message, discards the attack message, sends the suspicious message to the detection algorithm module, and delivers the normal message to the traffic forwarding module; Algorithm module, using specific detection algorithms (such as cumulative sum algorithm, finite state machine algorithm, etc.) The normal message is sent to the target server; the load update module sends the load information of the defense detection node to the load balancer in real time; the rule base records the filtering rules of the SIP message.
所述负载更新模块与负载均衡器交互,将防御检测节点的可用性和负载信息实时报告给负载均衡器,负载均衡器在负载表中对防御检测节点的可用性和负载信息进行更新。如图3所示,负载均衡器等待所有防御检测节点的负载消息,若在响应周期内没有收到来自某个防御检测节点的消息,该防御检测节点的未应答次数加一;若某个防御检测节点的未应答次数大于未应答上限,则该节点的可用性置为否;若收到某个不可用防御检测节点的负载信息,则将该节点的可用性置为是,将未应答次数置为零,并在负载表中更新该节点的负载信息。The load update module interacts with the load balancer, and reports the availability and load information of the defense detection nodes to the load balancer in real time, and the load balancer updates the availability and load information of the defense detection nodes in the load table. As shown in Figure 3, the load balancer waits for load messages from all defense detection nodes. If no message is received from a certain defense detection node within the response period, the number of non-responses of the defense detection node is increased by one; If the number of non-responses of the detection node is greater than the upper limit of non-responses, the availability of the node is set to No; if the load information of an unavailable defense detection node is received, the availability of the node is set to Yes, and the number of non-responses is set to zero, and update the load information of the node in the load table.
所述负载均衡器使用两级负载分发方法将SIP消息分发到各防御检测节点。如图4所示,所述两级负载均衡方法包括一级负载均衡模块和二级负载均衡模块。所述一级负载均衡模块包括SIP消息解析模块,解析SIP消息,提取Call-ID头域和源IP地址对头域;Call-ID匹配模块,查找Call-ID历史记录表,将Call-ID相同的SIP消息发往同一个防御检测节点;源IP地址对匹配模块,查找源IP地址对历史记录表,将源IP地址对相同的SIP消息发往同一个防御检测节点。所述二级负载均衡模块包括负载分发算法模块,查询防御检测节点负载表,对一级负载均衡模块未能分发的消息使用负载分发方法进行分发;防御检测节点可用性查询模块,对消息发往的防御检测节点进行可用性检查;流量分发模块,将SIP流量发往相应防御检测节点;历史记录更新模块,转发后更新历史记录表。The load balancer uses a two-level load distribution method to distribute SIP messages to each defense detection node. As shown in FIG. 4, the two-level load balancing method includes a first-level load balancing module and a second-level load balancing module. Described one-level load balancing module comprises SIP message parsing module, parses SIP message, extracts Call-ID header domain and source IP address pair header domain; The SIP message is sent to the same defense detection node; the source IP address pair matching module searches the source IP address pair history record table, and sends the SIP message with the same source IP address pair to the same defense detection node. The secondary load balancing module includes a load distribution algorithm module, querying the load table of the defense detection node, and distributing the messages that the primary load balancing module fails to distribute using the load distribution method; the availability query module of the defense detection node, to the The defense detection node performs an availability check; the traffic distribution module sends the SIP traffic to the corresponding defense detection node; the history record update module updates the history record table after forwarding.
所述负载分发方法用Round-Robin算法对SIP消息进行分发。在将消息发送到某个防御检测节点前,所述负载分发方法要根据负载表对该防御检测节点进行可用性检查。The load distribution method uses a Round-Robin algorithm to distribute SIP messages. Before sending the message to a certain defense detection node, the load distribution method needs to check the availability of the defense detection node according to the load table.
如图5所示,所述可用性检查方法在负载表中查找防御检测节点的负载,若该防御检测节点负载大于二级转发负载上限α2,则停止向该防御检测节点的二级负载转发。若该防御检测节点负载大于一级转发负载上限α1,则停止向该防御检测节点的一级负载转发。若有停止转发情况发生,则计算恢复转发下限β,恢复转发下限β计算方法如公式1,其中n为防御检测节点的数目,cpu_loadingi为第i个节点的CPU负载。若该防御检测节点负载小于恢复转发下限,则恢复向该防御检测节点转发消息。As shown in FIG. 5 , the availability checking method looks up the load of the defense detection node in the load table, and if the load of the defense detection node is greater than the upper limit α2 of the secondary forwarding load, the forwarding of the secondary load to the defense detection node is stopped. If the load of the defense detection node is greater than the upper limit α1 of the first-level forwarding load, the forwarding of the first-level load to the defense detection node is stopped. If there is a situation of stopping forwarding, calculate the lower limit β of resuming forwarding. The calculation method of the lower limit β of resuming forwarding is as in
所述两级负载均衡方法性能进行仿真实验。如图6所示,所述实验环境如下:用一台负载均衡器与四个防御检测节点相连,负载均衡器运行添加了两级负载分发方法的开源SIP服务器opensips,opensips按照两级负载均衡方法对SIP消息进行分发;四个防御检测节点运行添加了规则过滤机制的opensips,模拟对SIP消息的过滤和检测过程;用一台主机运行SIP消息生成工具SIPp生成SIP消息,模拟正常情况下的网络流量和发生攻击时的网络流量。实验实时记录防御检测节点的CPU负载和两级负载均衡方法各级发放消息数目。The performance of the two-level load balancing method is simulated. As shown in Figure 6, the experimental environment is as follows: a load balancer is connected to four defense detection nodes, and the load balancer runs the open source SIP server opensips with a two-level load distribution method added, and opensips follows the two-level load balancing method Distribute SIP messages; four defense detection nodes run opensips with a rule filtering mechanism added to simulate the filtering and detection process of SIP messages; use a host to run the SIP message generation tool SIPp to generate SIP messages, simulating the network under normal conditions traffic and network traffic at the time of the attack. The experiment records the CPU load of the defense detection node and the number of messages sent at each level of the two-level load balancing method in real time.
SIPp生成100000个用户模拟无攻击时的网络流量,用户每秒发起呼叫的概率为0.09%~0.11%且相互独立;同时生成1000个IP,模拟攻击者进行DDoS攻击。为简化SIP消息的处理过程,我们只模拟INVITE、200OK、ACK和BYE消息。α1取95%,α2取85%。SIPp generates 100,000 users to simulate the network traffic when there is no attack. The probability of a user initiating a call per second is 0.09% to 0.11% and is independent of each other; at the same time, 1,000 IPs are generated to simulate an attacker carrying out a DDoS attack. To simplify the processing of SIP messages, we only simulate INVITE, 200OK, ACK and BYE messages. α1 takes 95%, and α2 takes 85%.
两个防御检测节点的防御系统正常情况下和发生攻击时的CPU负载如图7所示,其中横坐标表示时间,纵坐标表示CPU使用率,上图是正常情况下防御检测节点的负载,下图表示发生攻击时的防御检测节点负载。可以看出在正常情况下,两个防御检测节点的负载都保持在40%左右且相差不大;发生攻击时两个节点的负载都达到85%以上,基本达到满负载。四个防御检测节点的系统正常情况下和发生攻击时的CPU负载如图8所示,上图是正常情况下节点的负载,下图表示发生攻击时的节点负载。可以看出在正常情况下,四个检测节点的负载都保持在25%左右且相差不大;发生攻击时四个节点的负载都达到50%以上。无论是正常情况下还是发生攻击时,算法都表现出较好的负载均衡特性。The CPU load of the defense system of the two defense detection nodes under normal conditions and when an attack occurs is shown in Figure 7, where the abscissa represents the time, and the ordinate represents the CPU usage rate. The upper figure shows the load of the defense detection node under normal conditions, and the lower The graph represents the defense detection node load when an attack occurs. It can be seen that under normal circumstances, the loads of the two defense detection nodes are maintained at about 40% and the difference is not large; when an attack occurs, the loads of the two nodes reach more than 85%, basically reaching full load. Figure 8 shows the CPU load of the four defense detection nodes under normal conditions and when an attack occurs. The upper figure shows the node load under normal conditions, and the lower figure shows the node load when an attack occurs. It can be seen that under normal circumstances, the loads of the four detection nodes are maintained at about 25% with little difference; when an attack occurs, the loads of the four nodes all reach more than 50%. The algorithm exhibits good load balancing characteristics both under normal conditions and when attacks occur.
在仿真实验中各级消息分发的百分比如表4所示。The percentages of message distribution at all levels in the simulation experiment are shown in Table 4.
表4Table 4
可以看出大多数消息由一级负载均衡机制转发,大多数消息在一级转发,保证了SIP会话的完整性,满足了检测算法的检测要求。对于同样强度的攻击,两个节点的系统已经无法处理,产生了较高的丢包率,而四个节点的系统依然可以处理所有消息并且每个节点有更低的CPU负载。因此在系统无法满足防御和检测要求时,可以考虑增加节点来提高系统的防御和检测能力。It can be seen that most messages are forwarded by the first-level load balancing mechanism, and most messages are forwarded at the first level, which ensures the integrity of the SIP session and meets the detection requirements of the detection algorithm. For an attack of the same strength, the system with two nodes can no longer handle it, resulting in a higher packet loss rate, while the system with four nodes can still process all messages and each node has a lower CPU load. Therefore, when the system cannot meet the defense and detection requirements, you can consider adding nodes to improve the defense and detection capabilities of the system.
本发明的负载均衡方法除了用于SIP DDoS入侵防御系统外,还可以用于SIP分布式机群服务器对SIP流量的分发。In addition to being used in the SIP DDoS intrusion prevention system, the load balancing method of the present invention can also be used in the distribution of SIP traffic by the SIP distributed cluster server.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110418430.1A CN103166926B (en) | 2011-12-14 | SIP DDoS attack distributed defense system and load balancing method thereof |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110418430.1A CN103166926B (en) | 2011-12-14 | SIP DDoS attack distributed defense system and load balancing method thereof |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN103166926A true CN103166926A (en) | 2013-06-19 |
| CN103166926B CN103166926B (en) | 2016-12-14 |
Family
ID=
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104579841A (en) * | 2015-01-09 | 2015-04-29 | 北京京东尚科信息技术有限公司 | System for generating statistical result for specific statistic data items according to received UDP messages |
| CN106790310A (en) * | 2017-03-31 | 2017-05-31 | 网宿科技股份有限公司 | Distributed denial of service attack protects the method and system integrated with load balancing |
| CN107147585A (en) * | 2017-03-31 | 2017-09-08 | 北京奇艺世纪科技有限公司 | A kind of flow control methods and device |
| CN108028828A (en) * | 2015-08-29 | 2018-05-11 | 华为技术有限公司 | A kind of distributed denial of service ddos attack detection method and relevant device |
| CN108040057A (en) * | 2014-12-17 | 2018-05-15 | 朱保生 | Suitable for guaranteeing network security, the SDN systems of network communication quality |
| CN109040126A (en) * | 2018-09-18 | 2018-12-18 | 中国人民解放军战略支援部队信息工程大学 | The detection device and method of IMS network SIP flood attack |
| CN110290156A (en) * | 2019-07-26 | 2019-09-27 | 太仓红码软件技术有限公司 | A kind of defence for Scattered Attack and network security device based on big data |
| CN111049849A (en) * | 2019-12-23 | 2020-04-21 | 深圳市永达电子信息股份有限公司 | Network intrusion detection method, device, system and storage medium |
| CN113452676A (en) * | 2021-05-27 | 2021-09-28 | 鹏城实验室 | Detector allocation method and Internet of things detection system |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080040801A1 (en) * | 2004-11-29 | 2008-02-14 | Luca Buriano | Method and System for Managing Denial of Service Situations |
| CN101729573A (en) * | 2009-12-18 | 2010-06-09 | 四川长虹电器股份有限公司 | Dynamic load balancing method of network intrusion detection |
| CN101815033A (en) * | 2010-03-12 | 2010-08-25 | 成都市华为赛门铁克科技有限公司 | Method, device and system for load balancing |
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080040801A1 (en) * | 2004-11-29 | 2008-02-14 | Luca Buriano | Method and System for Managing Denial of Service Situations |
| CN101729573A (en) * | 2009-12-18 | 2010-06-09 | 四川长虹电器股份有限公司 | Dynamic load balancing method of network intrusion detection |
| CN101815033A (en) * | 2010-03-12 | 2010-08-25 | 成都市华为赛门铁克科技有限公司 | Method, device and system for load balancing |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108040057B (en) * | 2014-12-17 | 2021-08-06 | 江西武大扬帆科技有限公司 | Working method of SDN system suitable for guaranteeing network security and network communication quality |
| CN108040057A (en) * | 2014-12-17 | 2018-05-15 | 朱保生 | Suitable for guaranteeing network security, the SDN systems of network communication quality |
| CN104579841A (en) * | 2015-01-09 | 2015-04-29 | 北京京东尚科信息技术有限公司 | System for generating statistical result for specific statistic data items according to received UDP messages |
| CN108028828B (en) * | 2015-08-29 | 2020-10-27 | 华为技术有限公司 | Distributed denial of service (DDoS) attack detection method and related equipment |
| CN108028828A (en) * | 2015-08-29 | 2018-05-11 | 华为技术有限公司 | A kind of distributed denial of service ddos attack detection method and relevant device |
| CN106790310A (en) * | 2017-03-31 | 2017-05-31 | 网宿科技股份有限公司 | Distributed denial of service attack protects the method and system integrated with load balancing |
| CN107147585B (en) * | 2017-03-31 | 2020-02-18 | 北京奇艺世纪科技有限公司 | Flow control method and device |
| CN106790310B (en) * | 2017-03-31 | 2021-02-02 | 网宿科技股份有限公司 | Method and system for integrating distributed denial of service attack protection and load balancing |
| CN107147585A (en) * | 2017-03-31 | 2017-09-08 | 北京奇艺世纪科技有限公司 | A kind of flow control methods and device |
| CN109040126A (en) * | 2018-09-18 | 2018-12-18 | 中国人民解放军战略支援部队信息工程大学 | The detection device and method of IMS network SIP flood attack |
| CN109040126B (en) * | 2018-09-18 | 2020-10-30 | 中国人民解放军战略支援部队信息工程大学 | Detection device and method for SIP flooding attack of IMS network |
| CN110290156A (en) * | 2019-07-26 | 2019-09-27 | 太仓红码软件技术有限公司 | A kind of defence for Scattered Attack and network security device based on big data |
| CN110290156B (en) * | 2019-07-26 | 2021-09-24 | 济南法诺商贸有限公司 | Big data-based defense and network security device for distributed attack |
| CN111049849A (en) * | 2019-12-23 | 2020-04-21 | 深圳市永达电子信息股份有限公司 | Network intrusion detection method, device, system and storage medium |
| CN113452676A (en) * | 2021-05-27 | 2021-09-28 | 鹏城实验室 | Detector allocation method and Internet of things detection system |
| CN113452676B (en) * | 2021-05-27 | 2022-05-10 | 鹏城实验室 | A detector allocation method and Internet of things detection system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mehr et al. | An SVM based DDoS attack detection method for Ryu SDN controller | |
| US20190364067A1 (en) | Methods for detecting and mitigating malicious network behavior and devices thereof | |
| CN101958883B (en) | Bloom Filter and open-source kernel-based method for defensing SYN Flood attack | |
| CN102111394A (en) | Network attack protection method, equipment and system | |
| EP2772021A2 (en) | Network self-protection | |
| CN103297433A (en) | HTTP botnet detection method and system based on net data stream | |
| US10581902B1 (en) | Methods for mitigating distributed denial of service attacks and devices thereof | |
| EP2594049B1 (en) | Sip-based call session server and message-routing method | |
| Gupta et al. | Vm profile based optimized network attack pattern detection scheme for ddos attacks in cloud | |
| CN104113559A (en) | Method for resisting tcp full-link attack | |
| CN102882880A (en) | Detection method and detection system of distributed denial of service (DDoS) attack aiming at domain name server (DNS) service | |
| Liu et al. | Accuracy or delay? A game in detecting interest flooding attacks | |
| Wang et al. | AI‐enabled blockchain and SDN‐integrated IoT security architecture for cyber‐physical systems | |
| CN102075535B (en) | Application layer distributed denial of service attack filtering method and system | |
| CN112702347A (en) | SDN-based intrusion detection technology | |
| Gaurav et al. | Super-router: A collaborative filtering technique against ddos attacks | |
| CN103166926B (en) | SIP DDoS attack distributed defense system and load balancing method thereof | |
| Song et al. | Using FDAD to prevent DAD attack in secure neighbor discovery protocol | |
| Li et al. | The new threat to internet: DNP attack with the attacking flows strategizing technology | |
| CN103166926A (en) | A SIP DDoS attack distributed defense system and its load balancing method | |
| CN107612876A (en) | The detection method of service request bag extensive aggression in wisdom contract network | |
| CN115250193B (en) | DoS attack detection method, device and medium for SDN network | |
| SA et al. | In-network probabilistic monitoring primitives under the influence of adversarial network inputs | |
| Xie et al. | Research on LDoS attack detection and defense mechanism in software defined networks | |
| CN105099939A (en) | Method and device for implementing flow control among different data centers |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |