[go: up one dir, main page]

CN1996888A - A detection method and detection device for exceptional network traffic - Google Patents

A detection method and detection device for exceptional network traffic Download PDF

Info

Publication number
CN1996888A
CN1996888A CN 200610168173 CN200610168173A CN1996888A CN 1996888 A CN1996888 A CN 1996888A CN 200610168173 CN200610168173 CN 200610168173 CN 200610168173 A CN200610168173 A CN 200610168173A CN 1996888 A CN1996888 A CN 1996888A
Authority
CN
China
Prior art keywords
detection
wavelet packet
signal
module
alarm threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610168173
Other languages
Chinese (zh)
Other versions
CN100486179C (en
Inventor
胡光岷
高军
姚兴苗
杨松
李宗林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
University of Electronic Science and Technology of China
Original Assignee
Huawei Technologies Co Ltd
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd, University of Electronic Science and Technology of China filed Critical Huawei Technologies Co Ltd
Priority to CNB200610168173XA priority Critical patent/CN100486179C/en
Publication of CN1996888A publication Critical patent/CN1996888A/en
Application granted granted Critical
Publication of CN100486179C publication Critical patent/CN100486179C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明涉及一种网络流量异常的检测方法及检测装置,本发明提出的检测方法,考虑到流量异常信号具有多尺度特性,根据异常信号本身的频率特征,进行自适应分解,采用双门限判决机制,只对小于报警门限且大于分解门限的频带,继续分解,提高了检测的灵活性;另外可以对存在异常的分解频带进行自适应重构后的确认异常检测,提高了检测的可靠性。本发明还提出了基于异常流量频率特征的自适应窗口调整机制,克服了传统检测方法基于经验统计确定时窗大小的盲目性。本发明提出的检测装置包括:小波包变换模块、初期异常检测模块、还可以进一步包括小波包重构模块和确认异常检测模块。本发明对各个频段异常具有同样的检测能力,实现了全面、准确的检测。

Figure 200610168173

The present invention relates to a detection method and detection device for network traffic anomalies. The detection method proposed in the present invention takes into account the multi-scale characteristics of traffic anomaly signals, performs adaptive decomposition according to the frequency characteristics of the abnormal signal itself, and adopts a double-threshold judgment mechanism , only continue to decompose the frequency bands that are less than the alarm threshold and greater than the decomposition threshold, which improves the flexibility of detection; in addition, it can perform adaptive reconstruction on abnormally decomposed frequency bands to confirm anomaly detection, which improves the reliability of detection. The invention also proposes an adaptive window adjustment mechanism based on the frequency characteristics of abnormal traffic, which overcomes the blindness of determining the time window size based on empirical statistics in traditional detection methods. The detection device proposed by the present invention includes: a wavelet packet transformation module, an initial anomaly detection module, and may further include a wavelet packet reconstruction module and a confirmation anomaly detection module. The invention has the same detection ability for abnormality of each frequency band, and realizes comprehensive and accurate detection.

Figure 200610168173

Description

一种网络流量异常的检测方法及检测装置A method and device for detecting network traffic anomalies

技术领域technical field

本发明涉及一种网络流量异常的检测方法及检测装置,尤其是一种利用小波包变换进行多尺度的网络流量异常的检测方法及检测装置。The invention relates to a detection method and a detection device for network traffic anomalies, in particular to a detection method and a detection device for multi-scale network traffic anomalies by using wavelet packet transformation.

背景技术Background technique

网络流量异常指的是网络的流量行为偏离其正常行为的情形,引起网络流量异常的原因是多种多样的,例如网络设备的不良运行、网络操作异常、突发访问(flash crowd)、网络入侵等。异常流量的特点是发作突然,先兆特征未知,可以在短时间内给网络或网络上的计算机带来极大的危害(例如由特定的攻击程序或蠕虫爆发所引起的突发流量行为),因此准确、快速地检测网络流量的异常行为,并做出合理的响应是保证网络有效运行的前提之一。传统的网络安全技术侧重于企业用户网络的系统入侵检测、防病毒软件或防火墙,这类安全措施通常并不能检测运营商网络中的非正常流量和行为,对于企业用户网络的许多异常行为和流量也难以准确地检测和识别。为了及时地检测网络中的异常流量,减少或消除用户所遭受的各种网络危害,网络与路由交换设备需要具备对异常流量的检测与识别能力,并采用一定的干预规则,比如禁止某些端口的流量或者降低来自某一端口地址的带宽,对这些非法流量进行抑制或者拒绝。Abnormal network traffic refers to the situation where the traffic behavior of the network deviates from its normal behavior. There are various reasons for abnormal network traffic, such as bad operation of network equipment, abnormal network operation, flash crowd, network intrusion, etc. wait. Abnormal traffic is characterized by sudden onset and unknown aura characteristics, which can bring great harm to the network or computers on the network in a short period of time (such as burst traffic behavior caused by specific attack programs or worm outbreaks), so Accurately and quickly detecting abnormal behavior of network traffic and making a reasonable response is one of the prerequisites to ensure the effective operation of the network. Traditional network security technologies focus on system intrusion detection, anti-virus software or firewalls of enterprise user networks. Such security measures are usually unable to detect abnormal traffic and behaviors in operator networks. For many abnormal behaviors and traffic of enterprise user networks It is also difficult to detect and identify accurately. In order to detect abnormal traffic in the network in a timely manner and reduce or eliminate various network hazards suffered by users, network and routing switching devices need to have the ability to detect and identify abnormal traffic, and adopt certain intervention rules, such as prohibiting certain ports traffic or reduce the bandwidth from a certain port address, and suppress or reject these illegal traffic.

通常情况下,路由器尤其是主干网络路由器数据流量都是很大的,并且处于不断变化中,而异常流量相对于正常流量来说是很小的,甚至相对于正常流量的变化来说也是很小的。流量异常检测算法的最终目标是要从相对很大且处于不断变化的正常流量中,检测到相对很小的异常流量(可以说是“大海捞针”),而且要满足实时性的要求,因而系统设计和实现的难度很大,也使异常流量检测成为目前学术界和工业界共同关注的前沿课题之一。Usually, routers, especially backbone network routers, have a large amount of data traffic and are constantly changing, while abnormal traffic is very small compared to normal traffic, or even relatively small to changes in normal traffic of. The ultimate goal of the traffic anomaly detection algorithm is to detect relatively small abnormal traffic from the relatively large and constantly changing normal traffic (it can be said to be "finding a needle in a haystack"), and to meet the real-time requirements, so the system design And it is very difficult to implement, which also makes abnormal traffic detection one of the frontier topics of common concern in academia and industry.

作为一种新兴的技术,近年来受到了国外理论界的高度重视,特别是从2002年以来,各种杂志和会议发表了大量的文章,其中绝大多数的讨论是针对DDoS攻击的检测。归纳起来有基于规则的方法(参见:文献[1]L.Lewisand G.Dreo,“Extending trouble ticket systems to fault diagnosis,”IEEENetwork;文献[2],L.Lewis,“A case based reasoning approach to themanagement of faults in communication networks,”in Proc.IEEE INFOCOM,vol.3,SanFrancisco,CA,Mar.1993,pp.1422-1429.vol.7,pp.44-51,Nov.1993.)、有限状态机的方法(参见:文献[3],I.Katzela and M.Schwarz,“Schemes for fault identification in communication networks,”IEEE/ACMTrans.Networking,vol.3,pp.753-764,Dec.1995;文献[4],I.Rouvellouand G.Hart,“Automatic alarm correlation for faultidentification,”in Proc.IEEE INFOCOM,Boston,MA,Apr.1995,pp.553-561.)、模式匹配的方法(参见:文献[5],F.Feather and R.Maxion,“Fault detectionin an ethernet network using anomaly signature matching,”in Proc.ACMSIGCOMM,vol.23,SanFrancisco,CA,Sept.1993,pp.279-288;文献[6],S.Papavassiliou,M.Pace,A.Zawadzki,and L.Ho,“Implementingenhanced network maintenance for transaction access services:Toolsand applications,”Proc.IEEE Int.Contr.Conf.,vol.1,pp.2 11-215,2000.)、统计分析的方法(参见:文献[7],Marina Thottan and ChuanyiJi,“Anomaly Detection in IP Networks”IEEE TRANSACTIONS ON SIGNALPROCESSING,VOL.51,NO.8,AUGUST 2003;文献[8],Chen-Mou Cheng,H.T.Kung,Koan-Sin Tan,“Use of Spectral Analysis in Defense Against DoSAttacks”,Proceedings of IEEE GLOBECOM 2002.)、Hurst系数分析方法(参见:文献[9],William H.Allen and Gerald A.Marin,“On theSelf-similarity of Synthetic Traffic for the Evaluation of IntrusionDetection Systems”,Proceedings of the 2003 Symposium onApplications and the Internet(SAINT’03);文献[10],向渝,“IP网络QoS和安全技术研究”,电子科技大学博士论文(2003年).)、子空间方法(参见:文献[11],A.Lakhina,M.Crovella,and C.Diot.“DiagnosingNetwork-Wide Traffic Anomalies”.In ACM SIGCOMM,Portland,August2004;文献[12],A.Lakhina,K.Papagiannaki,M.Crovella,C.Diot,E.D.Kolaczyk,and N.Taft.“Structural Analysis of Network TrafficFlows”.In ACM SIGMETRICS,New York,June 2004;文献[13],A.Lakhina,M.Crovella,and C.Diot.Characterization of Network-Wide Anomaliesin Tfaffic Flows.Technical Report BUCS-2004-020,Boston University,2004.)和小波分析方法(参见:文献[14],V.Alarcon-Aquino,J.A.Barria.“Anomaly Detection in Communication Networks Using Wavelets”.IEEEProc-Commun.Vol.148.No.6.December 2001;文献[15],P.Barford,J.Kline,D.Plonka,and A.Ron.“A signal analysis of networkt rafficanomalies”.In Proceedings of the ACM SIGCOMM Internet MeasurementWorkshop,Marseille,France,November 2002;文献[16],P.Barford andD.Plonka,“Characteristics of networkt raffic flow anomalies”.InInternet MeasurementWorkshop,2001;文献[17],Seong Soo Kim,A.L.Narasimha Reddy,”Detecting Traffic Anomalies at the Source throughaggregate analysis of packet header data”http://dropzone.tamu.edu/techpubs/2003/TAMU-ECE-2003-03.pdf;文献[18],Lan Li and Gyungho Lee,“DDoS Attack Detection and Wavelets”.Computer Communications andNetworks,2003.ICCCN 2003.Proceedings.The 12th InternationalConference on,20-22 Oct.2003 Pages:421-427;Anu Ramanathan,“WADeS:A Tool for Distributed Denial of Service Attack Detection”,TAMU-ECE-2002-02,Master of Science Thesis,August 2002.)等。结合几乎所有来自实际网络中的数据,在本质上是具有多尺度性质的这一特性(参见:文献[19],Bakshi.B.R.Multi-scale analysis and modeling usingwavelets.Journal of Chemometrics,13,(3),1999.),且正常网络流量的时变信号与异常网络流量的时变信号相比,其频带范围一定是有区别的,也就是说背景流量一般是宽频带的,异常流量的频带相对较窄。而小波变换就像是数学显微镜,能放大信号的细节,提取出任意时间、频率的信号特征,因此很适合于探测正常信号中夹带的瞬态反常现象并展示其成分。As an emerging technology, it has been highly valued by foreign theoretical circles in recent years, especially since 2002, a large number of articles have been published in various magazines and conferences, and most of the discussions are aimed at the detection of DDoS attacks. In summary, there are rule-based methods (see: literature [1] L.Lewisand G.Dreo, "Extending trouble ticket systems to fault diagnosis," IEEENetwork; literature [2], L.Lewis, "A case based reasoning approach to the management of faults in communication networks," in Proc.IEEE INFOCOM, vol.3, San Francisco, CA, Mar.1993, pp.1422-1429.vol.7, pp.44-51, Nov.1993.), finite state machine The method (see: literature [3], I.Katzela and M.Schwarz, "Schemes for fault identification in communication networks," IEEE/ACMTrans.Networking, vol.3, pp.753-764, Dec.1995; literature [ 4], I.Rouvellouand G.Hart, "Automatic alarm correlation for fault identification," in Proc.IEEE INFOCOM, Boston, MA, Apr.1995, pp.553-561.), pattern matching method (see: literature [5 ], F.Feather and R.Maxion, "Fault detection in an ethernet network using anomaly signature matching," in Proc.ACMSIGCOMM, vol.23, San Francisco, CA, Sept.1993, pp.279-288; Literature [6], S. Papavassiliou, M. Pace, A. Zawadzki, and L. Ho, "Implementing enhanced network maintenance for transaction access services: Tools and applications," Proc.IEEE Int.Contr.Conf., vol.1, pp.2 11-215 , 2000.), statistical analysis methods (see: literature [7], Marina Thottan and ChuanyiJi, "Anomaly Detection in IP Networks" IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL.51, NO.8, AUGUST 2003; literature [8], Chen-Mou Cheng, H.T.Kung, Koan-Sin Tan, "Use of Spectral Analysis in Defense Against DoSAtacks", Proceedings of IEEE GLOBECOM 2002.), Hurst coefficient analysis method (see: literature [9], William H.Allen and Gerald A.Marin, "On the Self-similarity of Synthetic Traffic for the Evaluation of IntrusionDetection Systems", Proceedings of the 2003 Symposium on Applications and the Internet (SAINT'03); Literature [10], Xiang Yu, "IP Network QoS and Security Technology Research", University of Electronic Science and Technology of China doctoral dissertation (2003).), subspace method (see: literature [11], A.Lakhina, M.Crovella, and C.Diot. "DiagnosingNetwork-Wide Traffic Anomalies".In ACM SIGCOMM , Portland, August2004; Literature [12], A.Lakhina, K.Papagiannaki, M.Crovella, C.Diot, E.D.Kolaczyk, and N.Taft. "Structural Analysis of Network TrafficFlows".In ACM SIGMETRICS, New York, June 2004; Literature [13], A.Lakhina, M.Crovella, and C.Diot.Characterization of Network-Wide Anomalies in Tfaffic Flows.Technical Report BUCS-2004-020, Boston University, 2004.) and wavelet analysis method (see: Literature [14], V.Alarcon-Aquino, J.A.Barria. "Anomaly Detection in Communication Networks Using Wavelets". IEEEProc-Commun.Vol.148.No.6.December 2001; Literature [15], P.Barford, J. Kline, D.Plonka, and A.Ron. "A signal analysis of networkt rafficanomalies". In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, Marseille, France, November 2002; literature [16], P.Barford and D.Plonka, "Characteristics of network traffic flow anomalies".InInternet MeasurementWorkshop, 2001; literature [17], Seong Soo Kim, A.L.Narasimha Reddy,"Detecting Traffic Anomalies at the Source through aggregate analysis of packet header data"http://dropzone.tamu.edu/techpubs /2003/TAMU-ECE-2003-03.pdf; Literature [18], Lan Li and Gyungho Lee, "DDoS Attack Detection and Wavelets". Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on, 20- 22 Oct.2003 Pages: 421-427; Anu Ramanathan, "WADeS: A Tool for Distributed Denial of Service Attack Detection", TAMU-ECE-2002-02, Master of Science Thesis, August 2002.), etc. Combining almost all data from actual networks is inherently multi-scale (see: literature [19], Bakshi.B.R.Multi-scale analysis and modeling using wavelets.Journal of Chemometrics, 13, (3) , 1999.), and the time-varying signal of normal network traffic and the time-varying signal of abnormal network traffic must have a different frequency band range, that is to say, the background traffic is generally wide-band, and the frequency band of abnormal traffic is relatively narrow narrow. The wavelet transform is like a mathematical microscope, which can amplify the details of the signal and extract the signal features at any time and frequency, so it is very suitable for detecting transient abnormal phenomena in normal signals and displaying their components.

在基于小波分析的异常网络流量检测方法中,2001年V.Alarcon-Aquino等就提出了一种基于UDWT(undecimated discrete wavelett ransform,无抽取离散小波变换)和贝叶斯分析的算法(参见文献[14])。该算法能够检测和定位给定的时间序列在方差和频率上微弱的改变,但是该算法选取的尺度有限并且算法思想复杂。随后Anu Ramanathan提出了一种基于小波分析的WADeS(Wavelet based Attack Detection Signatures)机制(参见文献[20])检测DDoS攻击,将流量信号做小波变换,并对小波系数直接计算方差判断攻击点。该方法不具备实时检测能力。与此同时,P.Barford等提出了一种把网络流量进行多尺度二进小波分解并重构综合成高、中、低三个频段分别用偏离分数(deviation score)进行检测的方法(参见文献[15])。在前两者的基础上,Seong Soo Kim等也提出了一种通过分析在边界路由器中出口流量的目的IP地址来进行流量异常检测的技术(参见文献[17]),该技术可以事后或者实时的检测出口网络流量,但是它不能对所有频率的异常具有相同检测能力因为它是基于多分辨分析的。其他的还包括Lan Li提出的一种基于小波分析的能量分布方法(参见文献[18])来检测DDoS攻击,研究发现当流量被DDoS攻击影响时能量分布的方差产生明显的“尖刺”。In the abnormal network traffic detection method based on wavelet analysis, in 2001, V.Alarcon-Aquino et al. proposed an algorithm based on UDWT (undecimated discrete wavelet transform) and Bayesian analysis (see literature [ 14]). The algorithm can detect and locate the slight changes in variance and frequency of a given time series, but the scale selected by the algorithm is limited and the algorithm idea is complicated. Then Anu Ramanathan proposed a WADeS (Wavelet based Attack Detection Signatures) mechanism based on wavelet analysis (see literature [20]) to detect DDoS attacks, perform wavelet transform on the traffic signal, and directly calculate the variance of the wavelet coefficients to judge the attack point. This method does not have real-time detection capability. At the same time, P.Barford et al. proposed a method to decompose network traffic by multi-scale dyadic wavelet and reconstruct it into three frequency bands of high, medium and low, respectively, and use the deviation score (deviation score) to detect the method (see literature [15]). On the basis of the former two, Seong Soo Kim et al. also proposed a technology for traffic anomaly detection by analyzing the destination IP address of the egress traffic in the border router (see literature [17]). detects egress network traffic, but it cannot detect all frequencies of anomalies equally because it is based on multiresolution analysis. Others include an energy distribution method based on wavelet analysis proposed by Lan Li (see literature [18]) to detect DDoS attacks. The study found that when the traffic is affected by DDoS attacks, the variance of the energy distribution produces obvious "spikes".

下面着重介绍一下文献[15]中记载的技术方案,该技术方案主要分为二部分:The technical solution recorded in the document [15] is mainly introduced below, and the technical solution is mainly divided into two parts:

(1)小波分析模块(1) Wavelet analysis module

使用一定的小波通过多分辨分析(Multi-Resolution Analysis,MRA)对该时间级数信号进行分解,再从中选取不同的尺度重构为高、中、低三个频段,然后将这分解出的三个频段的信号送入到检测模块中。其中高频、中频、低频部分分别代表持续时间、较短、一般、较长的异常流量信号。Use a certain wavelet to decompose the time series signal through multi-resolution analysis (Multi-Resolution Analysis, MRA), and then select different scales to reconstruct it into high, medium and low frequency bands, and then decompose the three frequency bands The signals of the frequency bands are sent to the detection module. Among them, the high-frequency, medium-frequency, and low-frequency parts represent duration, short, general, and long abnormal flow signals, respectively.

(2)检测模块(2) Detection module

检测模块所使用的检测算法为偏离分数算法(deviation score)。The detection algorithm used by the detection module is a deviation score algorithm (deviation score).

首先,归一化待检测的低频、中频和高频频段的方差为一。然后分别计算低频、中频和高频频段落在一个事先指定大小的滑动窗口内的数据的方差,从而得到对应频段的偏离分数。这些滑动窗的大小取决于想捕获的异常的时限大小。如果用t0表示异常持续的时限,t1表示滑动窗的大小,则在理想情况下q=t0/t1≈1。若比值q太小,则所检测的异常会模糊甚至丢失;若比值太大,我们可能会被不感兴趣的所谓“异常”给淹没掉,而不能找到真正感兴趣的异常。因此,在选择t1时,一般应使得比值q趋近于1。并且高频段、低频段和中频段滑动窗口的大小一般是不同的。然后,将上一步计算的三个频段的偏离分数使用一个加权和来进行结合,从而产生一个结合的偏离分数信号。最后,通过检测偏离分数是否超过一个给定的门限,来判断是否发生了异常。First, normalize the variance of the low-frequency, mid-frequency and high-frequency bands to be detected to be one. Then calculate the variance of the data in the low frequency, middle frequency and high frequency segments within a sliding window of a predetermined size, respectively, so as to obtain the deviation scores of the corresponding frequency bands. The size of these sliding windows depends on the timing of the exceptions you want to catch. If t 0 is used to represent the duration of the abnormality, and t 1 represents the size of the sliding window, then q=t 0 /t 1 ≈1 under ideal conditions. If the ratio q is too small, the detected anomalies will be blurred or even lost; if the ratio is too large, we may be overwhelmed by so-called "abnormalities" that are not of interest, and we cannot find the anomalies that are really interesting. Therefore, when choosing t1 , the ratio q should generally be close to 1. And the sizes of the sliding windows of the high frequency band, the low frequency band and the middle frequency band are generally different. The deviation scores for the three frequency bands calculated in the previous step are then combined using a weighted sum to produce a combined deviation score signal. Finally, an anomaly occurs by detecting whether the deviation score exceeds a given threshold.

上述技术方案存在以下几方面的缺点:There are the following disadvantages in the above-mentioned technical scheme:

(1)该算法基于二进小波变换的多分辨分析,没有对细节的高频部分进一步分解,因此无法很好地检测到高频异常。(1) The algorithm is based on multi-resolution analysis of binary wavelet transform, without further decomposition of the high-frequency part of the details, so high-frequency anomalies cannot be detected well.

(2)该算法需要进行小波变换,而变换本身需要一定的系统开销,必然会影响检测算法的实时性。(2) The algorithm needs wavelet transform, and the transform itself requires a certain system overhead, which will inevitably affect the real-time performance of the detection algorithm.

(3)该算法中给出的选择滑动窗口大小的方法是基于异常信号持续时间,但在实际检测中,事先无法得知异常的持续时间,因此该算法所提出的取滑动窗口大小的方法在实际检测中,可操作性不强。(3) The method for selecting the size of the sliding window given in the algorithm is based on the duration of the abnormal signal, but in actual detection, the duration of the abnormality cannot be known in advance, so the method for selecting the size of the sliding window proposed by the algorithm is in In actual testing, the operability is not strong.

(4)该算法没有给出一种自适应的门限选择方法,只是以一个固定的经验值作为判决门限,其门限值大小不能随流量变化而自适应地改变。(4) This algorithm does not provide an adaptive threshold selection method, but only uses a fixed empirical value as the decision threshold, and its threshold value cannot be adaptively changed with the flow change.

总的说来,现有技术中的基于小波变换的异常检测方法大都存在以下三方面的缺陷:Generally speaking, most of the anomaly detection methods based on wavelet transform in the prior art have the following three defects:

(1)异常检测的全面性不足,即对低频异常检测效果较好,对高频异常检测效果较差;所有检测算法都是建立在多分辨分析的基础之上,多分辩分析可以检测出较小的高频异常,这是因为网络流量低频成分所占的比重较大。但是对很多中频异常就容易出现漏检;(1) The comprehensiveness of anomaly detection is insufficient, that is, the effect of low-frequency anomaly detection is better, and the effect of high-frequency anomaly detection is poor; all detection algorithms are based on multi-resolution analysis, which can detect relatively high-frequency anomalies. Small high-frequency anomalies, because the low-frequency components of network traffic account for a large proportion. However, it is easy to miss detection for many intermediate frequency abnormalities;

(2)异常检测的可靠性不足,一个异常可能分布在不相邻的多个频段内,对单一尺度的检测结果不十分可靠;(2) The reliability of anomaly detection is insufficient. An anomaly may be distributed in multiple non-adjacent frequency bands, and the detection result of a single scale is not very reliable;

(3)异常检测的时窗难以确定,通常各个尺度采用的检测时窗大小相同,没有根据异常信号本身的特性选择相应的时窗。(3) The time window for anomaly detection is difficult to determine. Usually, the detection time windows used in each scale are the same size, and the corresponding time window is not selected according to the characteristics of the anomaly signal itself.

发明内容Contents of the invention

本发明的目的是针对上述现有技术的不足,提供一种网络流量异常的检测方法及检测装置,通过双门限机制自适应的进行多尺度的小波包分解,以提高异常检测的全面性、灵活性和可靠性。The purpose of the present invention is to address the above-mentioned deficiencies in the prior art, to provide a method and device for detecting network traffic anomalies, which can self-adaptively perform multi-scale wavelet packet decomposition through a double-threshold mechanism, so as to improve the comprehensiveness and flexibility of anomaly detection sex and reliability.

本发明的又一发明目的是提供一种网络流量异常的检测方法及检测装置,通过确认异常检测机制,进一步降低误检率。Yet another object of the present invention is to provide a method and device for detecting network traffic anomalies, which can further reduce the false detection rate by confirming the anomaly detection mechanism.

为实现上述目的,本发明提供了一种网络流量异常的检测方法,包括如下步骤:In order to achieve the above object, the present invention provides a method for detecting abnormal network traffic, comprising the following steps:

步骤1、对网络流量信号进行采样,生成流量信号;Step 1. Sampling network traffic signals to generate traffic signals;

步骤2、对流量信号进行小波包分解,生成多个频段的小波包系数;Step 2, performing wavelet packet decomposition on the traffic signal to generate wavelet packet coefficients in multiple frequency bands;

步骤3、利用统计算法对分解后生成的各频段的小波包系数进行初期异常检测,生成检测参数,将检测参数与预先设定的报警门限和分解门限进行比较,如果存在检测参数大于报警门限,则确认为信号异常;如果存在检测参数小于报警门限,大于分解门限,则对该检测参数对应的频段进行小波包下一层分解,然后重复执行步骤3。Step 3, use statistical algorithm to carry out initial anomaly detection on the wavelet packet coefficients of each frequency band generated after decomposition, generate detection parameters, compare the detection parameters with the preset alarm threshold and decomposition threshold, if there is a detection parameter greater than the alarm threshold, Then it is confirmed that the signal is abnormal; if there is a detection parameter that is less than the alarm threshold and greater than the decomposition threshold, then the next layer of wavelet packet decomposition is performed on the frequency band corresponding to the detection parameter, and then step 3 is repeated.

在上述方案中,如果存在检测参数大于报警门限,则确认为信号异常,可以具体为:In the above scheme, if there is a detection parameter greater than the alarm threshold, it is confirmed that the signal is abnormal, which can be specifically:

步骤4、对大于报警门限的检测参数对应频段的小波包系数序列进行重构;Step 4, reconstructing the wavelet packet coefficient sequence corresponding to the frequency band of the detection parameter greater than the alarm threshold;

步骤5、将重构后生成的信号进行确认异常检测,将生成的检测参数与预先设定的所述报警门限进行比较,如果大于所述报警门限,则确认为信号异常。Step 5: Perform abnormality detection on the signal generated after reconstruction, compare the generated detection parameters with the preset alarm threshold, and if it is greater than the alarm threshold, confirm that the signal is abnormal.

本发明还提供了一种网络流量异常的检测装置,包括:流量信号生成模块、小波包变换模块、初期异常检测模块;The present invention also provides a detection device for network traffic anomalies, including: a traffic signal generation module, a wavelet packet transformation module, and an initial anomaly detection module;

流量信号生成模块,用于对网络流量信号进行采样,生成流量信号;A traffic signal generating module, configured to sample network traffic signals to generate traffic signals;

小波包变换模块,用于对流量信号生成模块流量信号和初期异常的小波包系数序列进行小波包分解;The wavelet packet transformation module is used to decompose the wavelet packet coefficient sequence of the flow signal of the flow signal generation module and the initial abnormal wavelet packet coefficient sequence;

初期异常检测模块,用于对小波包变换模块生成的小波包系数序列进行初期异常检测,生成检测参数,将检测参数与预先设定的报警门限和分解门限进行比较,如果存在检测参数大于所述报警门限,则输出信号为信号异常的检测结果,如果存在检测参数小于所述报警门限,大于所述分解门限,则向所述小波包变换模块输出该检测参数对应的小波包系数序列。The initial anomaly detection module is used to perform initial anomaly detection on the wavelet packet coefficient sequence generated by the wavelet packet transform module, generate detection parameters, compare the detection parameters with the preset alarm threshold and decomposition threshold, if there is a detection parameter greater than the stated Alarm threshold, the output signal is the detection result of signal abnormality, if there is a detection parameter less than the alarm threshold and greater than the decomposition threshold, then output the wavelet packet coefficient sequence corresponding to the detection parameter to the wavelet packet transformation module.

本发明的装置还可以进一步包括小波包重构模块和确认异常检测模块:The device of the present invention may further include a wavelet packet reconstruction module and a confirmation abnormality detection module:

小波包重构模块,用于对初期异常检测模块检测为信号异常的小波包系数序列进行重构;The wavelet packet reconstruction module is used to reconstruct the wavelet packet coefficient sequence detected as signal anomaly by the initial anomaly detection module;

确认异常检测模块,用于对小波包重构模块重构后的生成的流量信号进行确认异常检测,将生成的检测参数与预先设定的所述报警门限进行比较,如果大于所述报警门限,则输出信号异常的检测结果。Confirmation anomaly detection module, used for confirming anomaly detection of the traffic signal generated after the reconstruction of the wavelet packet reconstruction module, comparing the generated detection parameters with the preset alarm threshold, if greater than the alarm threshold, Then, the detection result of signal abnormality is output.

由上述技术方案可知,本发明具有如下有益效果:As can be seen from the foregoing technical solutions, the present invention has the following beneficial effects:

(1)根据每一层小波包系数的检测情况,通过双门限机制,灵活确定是否继续分解或下一层小波包分解的路径,解决了分解尺度的自适应选取的问题。避免了小波包分解的盲目性,提高了检测的灵活性;(1) According to the detection of wavelet packet coefficients in each layer, through the double-threshold mechanism, flexibly determine whether to continue to decompose or the path of the next layer of wavelet packet decomposition, and solve the problem of self-adaptive selection of decomposition scale. It avoids the blindness of wavelet packet decomposition and improves the flexibility of detection;

(2)通过采用小波包自适应分解、重构、检测,对各个频段的异常具有同样的检测能力,可以有效地检测出长时的持续异常流量和短时的突变异常流量,也可以有效地检测出基于多分辨分析的网络流量异常检测无法检测到的中频攻击流量,从而实现了全面检测。并且进一步确认异常,提高了检测的可靠性;(2) By using wavelet packet self-adaptive decomposition, reconstruction, and detection, it has the same detection ability for abnormalities in each frequency band, and can effectively detect long-term continuous abnormal traffic and short-term abrupt abnormal traffic, and can also effectively detect Detects medium-frequency attack traffic that cannot be detected by network traffic anomaly detection based on multi-resolution analysis, thereby achieving comprehensive detection. And further confirm the abnormality, improving the reliability of detection;

(3)通过提出基于小波中心频率的自适应时窗选择方法,解决了每层各个尺度下的小波包系数检测窗口的选取问题。(3) By proposing an adaptive time window selection method based on the wavelet center frequency, the problem of selecting the detection window of wavelet packet coefficients in each layer and each scale is solved.

下面通过附图和实施例,对本发明的技术方案做进一步的详细描述。The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

附图说明Description of drawings

图1为本发明的网络流量异常的检测方法具体实施例1的流程图;Fig. 1 is the flow chart of the specific embodiment 1 of the method for detecting abnormal network traffic of the present invention;

图2为本发明的滑动时窗的偏离分数算法示意图;Fig. 2 is a schematic diagram of the deviation score algorithm of the sliding time window of the present invention;

图3为本发明的小波包分解树示例;Fig. 3 is the wavelet packet decomposition tree example of the present invention;

图4为本发明的网络流量异常的检测装置的结构示意图一;Fig. 4 is a structural schematic diagram 1 of a detection device for abnormal network traffic of the present invention;

图5为本发明的网络流量异常的检测装置的结构示意图二。FIG. 5 is a second structural schematic diagram of the device for detecting abnormal network traffic of the present invention.

具体实施方式Detailed ways

传统的异常检测方法都是属于单尺度的。对于突然的变化,这些方法都是有效的,但是现在的攻击手段为了逃避异常的检测,能非常灵活的组织进攻,它们可能会用比较缓慢渐进变化的信号流量来攻击目标,对于这些看似缓慢的变化,由于单尺度的测量效果相对不明显,就有可能漏检。如果可以在一定程度上放大信号的细节,那么缓慢的攻击信号也就会变得相对明显了。由此,用小波变换来实现异常检测的想法初步形成。Traditional anomaly detection methods are all single-scale. For sudden changes, these methods are effective, but in order to avoid abnormal detection, the current attack methods can organize attacks very flexibly. They may use relatively slow and gradual changes in signal traffic to attack the target. For these seemingly slow Since the single-scale measurement effect is relatively inconspicuous, it may be missed. If the details of the signal can be amplified to a certain extent, then the slow attack signal will become relatively obvious. Thus, the idea of using wavelet transform to realize anomaly detection was initially formed.

网络流量异常检测,先对网络流量进行采样,生成一维时变信号,称为流量信号。通过利用异常信号的数据统计特性与正常情况的偏差,也就是流量信号的异常变化(Abrupt Change)来检测异常。像流量信号这样的随机信号,我们通常用功率谱密度(Power Spectral Density,PSD)来表征它的统计平均谱特性,正常网络流量的功率谱和异常网络流量的功率谱是不同的,一般来说,正常流量的功率谱在每个频段范围内的能量比较均匀,异常流量的功率谱在某些频段范围内能量比较集中。前人利用小波分解进行检测正是利用正常和异常流量信号在频率域上的差异作为检测的依据。他们的检测算法都是建立在多分辨分析的基础之上,它可以对信号进行有效的时频分解,由于其尺度是按二进制变化的,在高频频段其频率分辨率较差。然而异常流量产生原因多种多样导致了异常有可能是低频的,也有可能是高频的。所以这些方法存在不能有效检测所有频段异常的不足。For network traffic anomaly detection, the network traffic is first sampled to generate a one-dimensional time-varying signal, which is called a traffic signal. Abnormalities are detected by using the deviation between the statistical characteristics of the abnormal signal and the normal situation, that is, the abnormal change of the traffic signal (Abrupt Change). For random signals such as traffic signals, we usually use Power Spectral Density (PSD) to characterize its statistical average spectral characteristics. The power spectrum of normal network traffic and the power spectrum of abnormal network traffic are different. Generally speaking, , the power spectrum of normal traffic has relatively uniform energy in each frequency range, and the power spectrum of abnormal traffic has relatively concentrated energy in certain frequency bands. Predecessors using wavelet decomposition to detect is just using the difference between normal and abnormal flow signals in the frequency domain as the basis for detection. Their detection algorithms are all based on multi-resolution analysis, which can effectively decompose the signal in time-frequency. Since its scale changes according to binary, its frequency resolution is poor in high-frequency bands. However, there are various reasons for abnormal traffic, so the abnormality may be low-frequency or high-frequency. Therefore, these methods have the disadvantage that they cannot effectively detect abnormalities in all frequency bands.

本明提出了一个将小波包分析用于网络流量异常检测的新机制。小波包分析是多分辨分析的改进,它可以根据信号的特性,自动选取不同的时频分辨率进行分解。利用它能有效地进行时-频定位和微弱信号提取。Benming proposes a new mechanism using wavelet packet analysis for network traffic anomaly detection. Wavelet packet analysis is an improvement of multi-resolution analysis, which can automatically select different time-frequency resolutions for decomposition according to the characteristics of the signal. Using it can effectively carry out time-frequency positioning and weak signal extraction.

具体实施例1Specific embodiment 1

参见图1,其为本发明的网络流量异常的检测方法具体实施例1的流程图,包括如下步骤:Referring to Fig. 1, it is the flow chart of the specific embodiment 1 of the detection method of abnormal network traffic of the present invention, comprises the following steps:

步骤1、检测信号生成:用单位时间内通过路由器的包数作为流量信号,设采样时间间隔为T0秒。如果f(n)作为第n个抽样点的值,则有:Step 1. Detection signal generation: the number of packets passing through the router per unit time is used as the flow signal, and the sampling time interval is set as T 0 seconds. If f(n) is used as the value of the nth sampling point, then:

Figure A20061016817300121
Figure A20061016817300121

具体的来说,在上述的采样过程中,f(n)是对第n个单位时间T0秒内通过路由器的包数进行统计的结果。与传统的意义上的,将时间、幅值上都连续的模拟信号,转换成时间上离散、但幅值上仍连续的离散模拟信号的“采样”过程不同。上述的采样过程仅是发明中的较优的采样方式,本发明也可以采用其他现有的采样方式生成流量信号。Specifically, in the above sampling process, f(n) is the result of counting the number of packets passing through the router within the nth unit time T 0 seconds. It is different from the traditional "sampling" process of converting an analog signal that is continuous in time and amplitude into a discrete analog signal that is discrete in time but still continuous in amplitude. The above sampling process is only a better sampling method in the invention, and the present invention can also use other existing sampling methods to generate flow signals.

步骤2、小波包分解:对流量信号进行小波包分解,生成多个频段的小波包系数序列。研究发现,背景流量本身就是偏低频的信号,而异常信号一般为偏高频信号,即使很微弱的高频异常也可以从小波包分解后,可以归一角频率在(π,π/2)的高频段部分检测到,所以只需先多尺度分解到第1层,接着从归一角频率为(0,π/2)的频段开始小波包分解。通过2抽取离散小波包分析,输出为各个尺度的小波包系数序列。随着小波包分解层数的增加,输出的小波包系数的个数减半。如果检测序列的长度为N,那么在第j层上输出的小波包系数序列的长度就为N/2j。由于小波包分解是二叉树结构,随着层数的增加,每层树节点以2j增加,所以一般初始分解的层数都有限。以后将随检测情况自适应分解。Step 2, wavelet packet decomposition: perform wavelet packet decomposition on the flow signal, and generate wavelet packet coefficient sequences of multiple frequency bands. The study found that the background traffic itself is a low-frequency signal, and the abnormal signal is generally a high-frequency signal. Even a very weak high-frequency anomaly can be decomposed from the wavelet packet, and the angular frequency can be normalized at (π, π/2) The high-frequency band part is detected, so it only needs to be multi-scale decomposed to the first layer, and then the wavelet packet decomposition starts from the frequency band whose normalized angular frequency is (0, π/2). Through 2 extraction discrete wavelet packet analysis, the output is the sequence of wavelet packet coefficients of each scale. As the number of wavelet packet decomposition layers increases, the number of output wavelet packet coefficients is halved. If the length of the detection sequence is N, then the length of the wavelet packet coefficient sequence output on the jth layer is N/2 j . Since the wavelet packet decomposition is a binary tree structure, with the increase of the number of layers, the number of tree nodes in each layer increases by 2j , so the number of initial decomposition layers is generally limited. It will be decomposed adaptively according to the detection situation in the future.

步骤3、初期异常检测:进行小波包分解后,对分解后生成的各频段的小波包系数序列进行初期异常检测,生成检测参数ratio,将检测参数与预先设定的报警门限和分解门限进行比较,如果存在检测参数大于报警门限,则可以确认信号为异常,但为了进一步提高检测结果的可靠性,也可以在检测出检测参数大于报警门限后,执行步骤4,对大于报警门限的检测参数对应频段的小波包系数序列进行重构,然后进行确认异常的检测,这样可以排除一部分误检的结果;如果存在检测参数小于报警门限,大于分解门限,则对该检测参数对应的频段进行小波包分解,然后重复执行步骤3;如果生成的检测参数都小于分解门限,则确认为信号正常;Step 3. Initial anomaly detection: After performing wavelet packet decomposition, perform initial anomaly detection on the wavelet packet coefficient sequences of each frequency band generated after the decomposition, generate detection parameter ratio, and compare the detection parameters with the preset alarm threshold and decomposition threshold , if there is a detection parameter greater than the alarm threshold, it can be confirmed that the signal is abnormal, but in order to further improve the reliability of the detection result, it is also possible to perform step 4 after detecting that the detection parameter is greater than the alarm threshold, and corresponding to the detection parameters greater than the alarm threshold The wavelet packet coefficient sequence of the frequency band is reconstructed, and then the abnormal detection is confirmed, so that some false detection results can be eliminated; if there is a detection parameter that is less than the alarm threshold and greater than the decomposition threshold, then the wavelet packet decomposition is performed for the frequency band corresponding to the detection parameter , and then repeat step 3; if the generated detection parameters are all smaller than the decomposition threshold, it is confirmed that the signal is normal;

在上述步骤3中,可以采用采用偏离分数检测的方式进行初期异常检测,偏离分数算法最初是被用于重构信号上的,在本发明中,不仅把它用于检测重构信号上,而且直接把它用于小波包系数上。信号在经过了小波包变换之后,得到的是一系列的小波包系数,异常检测算法实际上是在小波包系数上操作的,因为信号的突变点在小波包变换域上,常对应于小波包变换系数模的极值点或过零点,并且信号奇异性的大小同小波包变换系数的极值随尺度的变化规律相互对应。也就是说,可以认为信号经小波包变换后的小波包系数的统计特性和原信号的统计特性相符。于是对小波包系数的检测几乎等同于对原始信号的检测。In the above-mentioned step 3, the initial anomaly detection can be carried out by adopting the deviation score detection method. The deviation score algorithm is initially used on the reconstructed signal. In the present invention, it is not only used to detect the reconstructed signal, but also Apply it directly to the wavelet packet coefficients. After the signal undergoes wavelet packet transformation, a series of wavelet packet coefficients are obtained. The anomaly detection algorithm actually operates on the wavelet packet coefficients, because the mutation point of the signal is in the wavelet packet transform domain, which often corresponds to the wavelet packet coefficient. The extremum point or zero-crossing point of the transform coefficient modulus, and the size of the signal singularity corresponds to the change law of the extremum value of the wavelet packet transform coefficient with the scale. That is to say, it can be considered that the statistical properties of the wavelet packet coefficients of the signal after wavelet packet transformation are consistent with those of the original signal. Then the detection of the wavelet packet coefficients is almost equivalent to the detection of the original signal.

偏离分数检测可以采用基于滑动时窗的偏离分数算法实现,如图2所示,其为滑动时窗的偏离分数算法示意图,这里用到两个测量窗口,一个是基于历史方差的窗口HisWin,一个是检测窗口DetWin。两个窗口都随着时间的移动而移动,做到实时更新。随着时间的变化,在当前时刻t,我们计算出(t-DetWin,t)这个检测窗口中的方差V1,(t-HisWin,t)这个历史窗口的方差V2。令The deviation score detection can be realized by using the deviation score algorithm based on the sliding time window, as shown in Figure 2, which is a schematic diagram of the deviation score algorithm of the sliding time window. Two measurement windows are used here, one is the window HisWin based on the historical variance, and the other is Is the detection window DetWin. Both windows move with time, updating in real time. As time changes, at the current moment t, we calculate the variance V 1 in the detection window (t-DetWin, t), and the variance V 2 in the history window (t-HisWin, t). make

ratioratio == VV 11 VV 22 -- -- -- (( 33 -- 11 ))

参数ratio在一定程度上反映了检测窗口中样本较历史正常数据的偏离,如果当前时刻点上信号有异常,那么它必然会影响到检测窗的测量结果,反映在ratio这个参数上,就必然有一个幅度值的增长。在时刻t的初期异常检测阶段,把(t-HisWin,t)时间段内的网络流量信号做小波包分解,我们得到各个尺度下的小波包系数,对其采用偏离分数算法进行检测,并将生成的ratio与预先设定的报警门限Ta和分解门限Td进行比较,这样存在三种情况:The parameter ratio reflects the deviation of the samples in the detection window from the historical normal data to a certain extent. If there is an abnormality in the signal at the current moment, it will inevitably affect the measurement results of the detection window. Reflected in the parameter ratio, there must be An increase in magnitude value. In the initial stage of anomaly detection at time t, we decompose the network traffic signal in the time period (t-HisWin, t) into wavelet packets, and we obtain the wavelet packet coefficients at various scales, and use the deviation score algorithm to detect them. The generated ratio is compared with the preset alarm threshold T a and decomposition threshold T d , so there are three situations:

1、如果ratio>Ta,则认为出现了异常状态,并进行确认异常检测,在时刻t的确认异常阶段,把发现可能异常的各个尺度下的小波包系数重构,在重构信号上再进行一次检测。如果对重构的信号的检测结果仍超过报警门限Ta,则确定为异常,反之认为是误检,即信号为正常。1. If ratio>T a , it is considered that an abnormal state has occurred, and anomaly confirmation detection is carried out. In the anomaly confirmation stage at time t, the wavelet packet coefficients at various scales where possible anomalies are found are reconstructed, and then reconstructed on the reconstructed signal Run a test. If the detection result of the reconstructed signal still exceeds the alarm threshold T a , it is determined to be abnormal, otherwise it is considered to be a false detection, that is, the signal is normal.

2、如果ratio<Ta,ratio>Td,则认为出现了疑似异常的状态,则要把出现疑似状态的频段进一步进行小波包分解,然后重复进行初期异常检测,直至检测结果为信号出现了异常状态或信号处于正常状态为止。2. If ratio<T a , ratio>T d , it is considered that a suspected abnormal state has occurred, and the frequency band in which the suspected state appears is further decomposed by wavelet packets, and then the initial abnormal detection is repeated until the detection result is that the signal appears Abnormal state or signal is in normal state.

3、如果ratio<Td,则认为信号正常。3. If ratio<T d , the signal is considered normal.

如果仅仅依靠偏离分数,那么对持续时间较长的低频异常就会失效。原因是低频异常在增加到一定幅度时就稳定下来,当检测窗口大大小于异常持续时间时,只能够在异常开始和结束时偏离分数才会有突变,中间异常平稳的时候偏离分数基本保持不变。这时,一个持续时间较长的异常就被当作了两个持续时间较短的异常。为了解决这个问题,本发明对偏离分数算法作了第二个改进,定义了一个均值偏移分数ratioE。在当前时刻t,计算出(t-DetWin,t)内检测窗口的均值E1,(t-HisWin,t)内历史窗口的均值E2,则令均值偏移分数为If only relying on the deviation score, it will be invalid for low-frequency anomalies with a long duration. The reason is that low-frequency anomalies stabilize when they increase to a certain extent. When the detection window is much smaller than the duration of the anomaly, there will be a sudden change in the deviation score only at the beginning and end of the anomaly. When the anomaly is stable in the middle, the deviation score will basically remain unchanged. . At this time, a longer-duration exception is treated as two shorter-duration exceptions. In order to solve this problem, the present invention makes a second improvement to the deviation score algorithm, and defines a mean deviation score ratio E . At the current time t, calculate the mean value E 1 of the detection window in (t-DetWin, t), and the mean value E 2 of the historical window in (t-HisWin, t), then let the mean value shift score be

ratioratio EE. == EE. 11 EE. 22 -- -- -- (( 33 -- 22 ))

它反映了检测窗口中的样本平均较历史正常数据的变化。一般来说,在低频异常开始后它的值就会较稳定的大于1,于是结合它,可以准确检测出持续时间较长的低频异常。对于均值分数ratioE的来说,相应的报警门限为TEa,相应的分解门限为TEd,具体的检测方法,与上述的偏移分数的检测方法相同,在此不在赘述。It reflects the average change of the sample in the detection window compared with the historical normal data. Generally speaking, its value will be more stable than 1 after the low-frequency anomaly starts, so combining it can accurately detect low-frequency anomalies with a long duration. For the average score ratio E , the corresponding alarm threshold is T Ea , and the corresponding decomposition threshold is T Ed . The specific detection method is the same as the above-mentioned detection method of the offset score, and will not be repeated here.

从步骤3中可以看出,小波包的分解层数及分解路径是不固定的,是根据检测到的异常状态或疑似异常状态而灵活确定是否进行进一步分解或下一层小波包分解的路径,完全是自适应的。It can be seen from step 3 that the number of decomposition layers and decomposition paths of the wavelet packet are not fixed, and it is flexibly determined whether to further decompose or the next layer of wavelet packet decomposition path according to the detected abnormal state or suspected abnormal state. It is completely adaptive.

步骤4、对大于报警门限的检测参数对应频段的小波包系数序列进行重构,异常信号的能量大概分布在步骤3中检测到的出现异常的频段上,把这些频段上的小波包系数序列进行重构,这样重构出的信号可以更大程度在原始信号上突出异常信号。Step 4. Reconstruct the wavelet packet coefficient sequence of the frequency band corresponding to the detection parameter greater than the alarm threshold. The energy of the abnormal signal is roughly distributed on the abnormal frequency band detected in step 3, and the wavelet packet coefficient sequence on these frequency bands is Reconstruction, so that the reconstructed signal can highlight abnormal signals on the original signal to a greater extent.

由于信号异常的复杂性,在初期异常检测中发现的异常很有可能分布在不同的小波域中,把这些小波域的小波包系数进行重构,这样重构出的信号可以更大程度在原始信号上突出异常信号。对重构信号的进一步检测可以确认异常。另外通过有选择性的重构小波包系数序列,可以更准确的在时间域上定位这些异常。Due to the complexity of signal anomalies, the anomalies found in the initial anomaly detection are likely to be distributed in different wavelet domains, and the wavelet packet coefficients of these wavelet domains are reconstructed, so that the reconstructed signal can be more consistent with the original Highlight abnormal signals on the signal. Further inspection of the reconstructed signal can confirm the anomaly. In addition, by selectively reconstructing the sequence of wavelet packet coefficients, these anomalies can be more accurately located in the time domain.

步骤5、确认异常检测:将生成的检测参数与预先设定的报警门限进行比较,如果大于所述报警门限,则确认为信号异常,否则,认为是误检,即确认信号正常。由于在初期异常检测模块中检测出的疑似异常有可能是误检。所以最后我们要对重构信号序列再次检测,减小误检率。而且2抽取小波包分析时域定位性模糊,对重构后信号的检测可以增加异常时域定位的精确性。Step 5. Confirm abnormality detection: compare the generated detection parameters with the preset alarm threshold, if it is greater than the alarm threshold, it is confirmed that the signal is abnormal; otherwise, it is regarded as a false detection, that is, the signal is confirmed to be normal. Because the suspected abnormality detected in the initial abnormality detection module may be a false detection. So in the end we have to detect the reconstructed signal sequence again to reduce the false detection rate. Moreover, the 2-decimation wavelet packet analysis is ambiguous in time-domain positioning, and the detection of reconstructed signals can increase the accuracy of abnormal time-domain positioning.

另外,在上述实施例中,检测时窗也可以通过自适应的方式确定,一般来讲,异常检测时窗难以确定,如果随便选择一个时窗就无法保证很好的检测效果。所以本发明提出了一个根据每个频带的中心频率大致确定时窗的方法。In addition, in the above embodiments, the detection time window can also be determined in an adaptive manner. Generally speaking, it is difficult to determine the anomaly detection time window, and a good detection effect cannot be guaranteed if a time window is randomly selected. Therefore, the present invention proposes a method of approximately determining the time window according to the center frequency of each frequency band.

初期异常检测时,待检测的信号是各层小波包系数。把流量信号小波包分解到第j层后,共有2j个等带宽的频带序列,每个频带内信号的长度降为流量信号的1/2j,采样间隔增为流量信号的2j倍。如果流量信号的最高频率是f,则2j个频带的频率范围为:In initial anomaly detection, the signal to be detected is the wavelet packet coefficient of each layer. After the flow signal wavelet packet is decomposed into the jth layer, there are 2 j frequency band sequences of equal bandwidth, the length of the signal in each frequency band is reduced to 1/2 j of the flow signal, and the sampling interval is increased to 2 j times of the flow signal. If the highest frequency of the flow signal is f, the frequency range of the 2 j frequency bands is:

2-j(i-1)f~2-jif    (3-3)2 -j (i-1)f~2 -j if (3-3)

式中i=1,2,…,2j表示分解信号的频带序列。我们可以大致估算出每个频带的中心频率(center frequency)为:In the formula, i=1, 2,..., 2 j represents the frequency band sequence of the decomposed signal. We can roughly estimate the center frequency (center frequency) of each frequency band as:

ff cjcj ii == 22 -- (( jj ++ 11 )) (( 22 ii -- 11 )) ff -- -- -- (( 33 -- 44 ))

如果第0层(对流量信号)的采样间隔Δ,则第j层的采样间隔为2jΔ。我们取2j倍周期对应的数据长度为检测窗口的大小:If the sampling interval of layer 0 (for flow signal) is Δ, then the sampling interval of layer j is 2 j Δ. We take the data length corresponding to 2 j times the period as the size of the detection window:

DetWinDetWin jj ii == 22 jj &CenterDot;&Center Dot; 22 (( jj ++ 11 )) // &lsqb;&lsqb; (( 22 ii -- 11 )) ff &CenterDot;&Center Dot; 22 jj &Delta;&Delta; &rsqb;&rsqb; == 22 (( jj ++ 11 )) // &lsqb;&lsqb; (( 22 ii -- 11 )) ff &CenterDot;&Center Dot; &Delta;&Delta; &rsqb;&rsqb; -- -- -- (( 33 -- 55 ))

可以看出,通过中心频率计算出的检测窗口在每一层的各个频段下都有不同的大小:低频时检测窗口较大,高频时检测窗口较小。It can be seen that the detection window calculated by the center frequency has different sizes in each frequency band of each layer: the detection window is larger at low frequencies, and smaller at high frequencies.

在确认异常时,待检测信号为重构信号。为了确保所有频段范围内的异常都能够有效检测,所以检测窗口设为被重构的小波包系数序列检测窗口的最大值。When anomalies are confirmed, the signal to be detected is a reconstructed signal. In order to ensure that anomalies in all frequency bands can be effectively detected, the detection window is set to the maximum value of the detection window of the reconstructed wavelet packet coefficient sequence.

另外,本发明的又一个改进之处在于,本发明中的检测方法,将在线检测和滑动时窗技术结合,由图2可以清楚看出,前后滑动窗截取的数据有一部分将会重叠,尤其对历史窗口,冗余数据量非常大。在相邻的两个检测时刻,小波包变换将会重复的对冗余数据进行两次计算,这将会导致耗费大量的运算时间,导致整个检测器的实时性能下降。为了满足实时检测的要求,在实际的应用中,可以采用基于滑动时窗的小波包变换快速算法。In addition, another improvement of the present invention is that the detection method in the present invention combines online detection and sliding time window technology. It can be clearly seen from Figure 2 that some data intercepted by the front and rear sliding windows will overlap, especially For the history window, the amount of redundant data is very large. At two adjacent detection moments, the wavelet packet transform will repeatedly calculate the redundant data twice, which will consume a lot of computing time and lead to the decline of the real-time performance of the entire detector. In order to meet the requirements of real-time detection, in practical applications, a fast algorithm based on sliding time window wavelet packet transform can be used.

另外,门限Ta、Td、TEa、TEd可以通过对正常网络的监测和历史网络流量的数据分析来确定。为了使小波包分解到达自适应,其中的初期异常检测中使用双门限判决机制:设有两个门限,分别是报警门限(Ta和TEa)和分解门限(Td和TEd),其中(Ta>Td,TEa>TEd),门限Ta、Td可以根据统计检测算法中的偏离分数值ratio得到,通过对历史正常流量的检测,得到各个尺度流量正常的ratio的门限值,取 T a = ratio &OverBar; + 3 &sigma; , T d = ratio &OverBar; + 6 &sigma; . 门限TEa、TEd可以根据均值分数ratioE得到,通过对历史流量的研究,得到各个尺度流量正常的ratioE的门限值,取 T Ea = ratio E &OverBar; + 3 &sigma; , T Ed = ratio E &OverBar; + 6 &sigma; , 上述公式中的σ是对历史正常流量检测的过程中,检测窗口内的数据方差,3σ和6σ均为经验值,也可以根据实际情况取其他数值。In addition, the thresholds T a , T d , T Ea , and T Ed can be determined by monitoring normal networks and analyzing historical network traffic data. In order to make the wavelet packet decomposition reach self-adaptation, a double-threshold judgment mechanism is used in the initial anomaly detection: there are two thresholds, namely the alarm threshold (T a and T Ea ) and the decomposition threshold (T d and T Ed ), where (T a > T d , T Ea > T Ed ), the thresholds T a and T d can be obtained according to the deviation score value ratio in the statistical detection algorithm, and through the detection of historical normal traffic, the ratio gates of normal traffic in each scale can be obtained limit, take T a = ratio &OverBar; + 3 &sigma; , T d = ratio &OverBar; + 6 &sigma; . Thresholds T Ea and T Ed can be obtained according to the average score ratio E. Through the study of historical traffic, the threshold value of ratio E for normal traffic in each scale is obtained, which is taken as T Ea = ratio E. &OverBar; + 3 &sigma; , T Ed = ratio E. &OverBar; + 6 &sigma; , The σ in the above formula is the data variance within the detection window during the detection of historical normal traffic. 3σ and 6σ are empirical values, and other values can also be taken according to the actual situation.

下面结合小波包分解树来进一步说明本发明,参见图3,其为本发明的小波包分解树示例,首先对流量信号进行1层多尺度分解,然后对[1,0]节点的系数进行小波包分解到第3层,用基于滑动时窗的统计检测算法检测各个尺度下系数的异常,如果在前n层某个尺度的某个频段达到报警门限,则立即重构检测,若仍是异常则报警;如果在第n层某个尺度达到分解门限则进一步分解到n+1层进行检测,若第n+1层的小波包系数小于分解门限则可判断为非异常;若大于分解门限而小于报警门限则继续深入分解;大于报警门限则直接进行重构,再对重构信号进行判断。图3中深色为一种可能的分解路径。The present invention will be further described below in conjunction with the wavelet packet decomposition tree. Referring to FIG. 3, it is an example of the wavelet packet decomposition tree of the present invention. First, the flow signal is decomposed into layer 1 multi-scale, and then the coefficients of [1, 0] nodes are subjected to wavelet analysis. The packet is decomposed to the third layer, and the statistical detection algorithm based on the sliding time window is used to detect the abnormality of the coefficients at each scale. If a certain frequency band of a certain scale in the first n layers reaches the alarm threshold, the detection will be reconstructed immediately. If it is still abnormal Then alarm; if a certain scale of the nth layer reaches the decomposition threshold, it will be further decomposed to the n+1 layer for detection, if the wavelet packet coefficient of the n+1 layer is less than the decomposition threshold, it can be judged as non-abnormal; if it is greater than the decomposition threshold and If it is less than the alarm threshold, it will continue to decompose in depth; if it is greater than the alarm threshold, it will be reconstructed directly, and then the reconstructed signal will be judged. The dark color in Figure 3 is a possible decomposition path.

本发明还提供了一种网络流量异常的检测装置,如图4所示,其为本发明的网络流量异常的检测装置的结构示意图一,包括:流量信号生成模块11、小波包变换模块12、初期异常检测模块13;The present invention also provides a detection device for abnormal network traffic, as shown in Figure 4, which is a structural schematic diagram 1 of the detection device for abnormal network traffic of the present invention, including: a traffic signal generation module 11, a wavelet packet transformation module 12, Initial anomaly detection module 13;

流量信号生成模块11,用于对网络流量信号进行采样,生成流量信号;A traffic signal generation module 11, configured to sample network traffic signals to generate traffic signals;

小波包变换模块12,用于对流量信号和初期异常检测模块输出小波包系数序列进行小波包分解;The wavelet packet transformation module 12 is used for performing wavelet packet decomposition on the flow signal and the output wavelet packet coefficient sequence of the initial anomaly detection module;

初期异常检测模块13,用于对小波包变换模块生成的小波包系数序列进行初期异常检测,生成检测参数,将检测参数与预先设定的报警门限和分解门限进行比较,如果存在检测参数大于所述报警门限,则输出信号为信号异常的检测结果,如果存在检测参数小于所述报警门限,大于所述分解门限,则向所述小波包变换模块12输出该检测参数对应的小波包系数序列。The initial anomaly detection module 13 is used to carry out initial anomaly detection to the wavelet packet coefficient sequence generated by the wavelet packet transformation module, generates detection parameters, compares the detection parameters with the preset alarm threshold and decomposition threshold, if there is a detection parameter greater than the specified Said alarm threshold, then the output signal is the detection result of abnormal signal, if there is detection parameter less than said alarm threshold, greater than said decomposition threshold, then output the wavelet packet coefficient sequence corresponding to said detection parameter to said wavelet packet transformation module 12.

另外,如图5所示,其为本发明的网络流量异常的检测装置的结构示意图二,为了进一步提高检测的可靠性,在该装置中加入了小波包重构模块14和确认异常检测模块15;In addition, as shown in Figure 5, it is the second structural diagram of the detection device for abnormal network traffic of the present invention, in order to further improve the reliability of detection, a wavelet packet reconstruction module 14 and an abnormality detection module 15 are added to the device ;

小波包重构模块14,用于对初期异常检测模块检测为异常的小波包系数序列进行重构。The wavelet packet reconstruction module 14 is used to reconstruct the wavelet packet coefficient sequence detected as abnormal by the initial anomaly detection module.

确认异常检测模块15,用于对小波包重构模块重构后的生成的流量信号进行确认异常检测,将生成的检测参数与预先设定的所述报警门限进行比较,如果大于所述报警门限,则输出信号异常的检测结果。Confirmation abnormality detection module 15 is used for confirming the abnormality detection of the traffic signal generated after the reconstruction of the wavelet packet reconstruction module, comparing the generated detection parameters with the preset alarm threshold, if greater than the alarm threshold , the detection result of signal anomaly is output.

最后应说明的是:以上实施例仅用以说明本发明的技术方案而非对其进行限制,尽管参照较佳实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对本发明的技术方案进行修改或者等同替换,而这些修改或者等同替换亦不能使修改后的技术方案脱离本发明技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention and not to limit them. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that: it still Modifications or equivalent replacements can be made to the technical solutions of the present invention, and these modifications or equivalent replacements cannot make the modified technical solutions deviate from the spirit and scope of the technical solutions of the present invention.

Claims (11)

1, a kind of detection method of exception of network traffic is characterized in that comprising the steps:
Step 1, network traffics are sampled, generate flow signal;
Step 2, flow signal is carried out WAVELET PACKET DECOMPOSITION, generate the wavelet packet coefficient sequence of a plurality of frequency ranges;
Step 3, the wavelet packet coefficient sequence of decomposing each frequency range that the back generates is carried out the initial stage abnormality detection, generate detected parameters, detected parameters and predefined alarm threshold are compared with the decomposition thresholding,, then confirm as abnormal signal if exist detected parameters greater than described alarm threshold; If exist detected parameters less than described alarm threshold, greater than described decomposition thresholding, then the frequency range of this detected parameters correspondence is descended one deck WAVELET PACKET DECOMPOSITION, repeated execution of steps 3 then.
2, detection method according to claim 1 is characterized in that then confirming as abnormal signal if exist detected parameters greater than alarm threshold, is specially:
Step 4, the wavelet packet coefficient sequence greater than the detected parameters corresponding frequency band of described alarm threshold is reconstructed;
Step 5, the signal that generates after the reconstruct is confirmed abnormality detection, detected parameters and the predefined described alarm threshold that generates compared,, then confirm as abnormal signal if greater than described alarm threshold.
3, detection method according to claim 1 and 2 is characterized in that sampling process is specially in described step 1: the bag number by router in to the unit interval is added up, and generates flow signal.
4, detection method according to claim 1 and 2 is characterized in that described initial stage abnormality detection and/or confirms that abnormality detection adopts the mode that mark detects that departs from.
5, detection method according to claim 4 is characterized in that the described mark that departs from detects the mode that adopts historical variance window and detection window to slide and detect.
6, detection method according to claim 5, it is characterized in that in described slip testing process, described detection window slides to detect and generates detection window variance V1, and described historical variance window slides to detect and generates history window variance V2, and described detected parameters is the ratio of V1 and V2.
7, method according to claim 6, it is characterized in that in described slip testing process, described detection window slides and detects the average E1 that generates detection window, and described historical variance window slides and detects the average E2 that generates history window, and described detected parameters is the ratio of E1 and E2.
8, according to claim 5,6 or 7 described detection methods, the size that it is characterized in that described detection window is to determine according to the centre frequency of each frequency range.
9, detection method according to claim 1 and 2 is characterized in that also comprising before described step 1: by to the monitoring of proper network and the data analysis of web-based history flow, determine described alarm threshold and decompose thresholding.
10, a kind of checkout gear of exception of network traffic is characterized in that comprising: flow signal generation module, wavelet package transforms module, initial stage abnormality detection module;
The flow signal generation module is used for the network traffics signal is sampled, and generates flow signal;
The wavelet package transforms module, be used for to the unusual output of flow signal generation module flow signal and initial stage the wavelet packet coefficient sequence carry out WAVELET PACKET DECOMPOSITION;
Initial stage abnormality detection module, be used for that the wavelet packet coefficient sequence that the wavelet package transforms module generates is carried out the initial stage abnormality detection and generate detected parameters, detected parameters and predefined alarm threshold are compared with the decomposition thresholding, if exist detected parameters greater than described alarm threshold, then output signal is the testing result of abnormal signal, if exist detected parameters less than described alarm threshold, greater than described decomposition thresholding, then export the wavelet packet coefficient sequence of this detected parameters correspondence to described wavelet package transforms module.
11, checkout gear according to claim 10 is characterized in that also comprising:
The wavelet package reconstruction module is used for initial stage abnormality detection module detection is reconstructed for the wavelet packet coefficient sequence of abnormal signal;
Confirm the abnormality detection module, be used for the flow signal of the generation after the reconstruct of wavelet package reconstruction module is confirmed abnormality detection, the detected parameters and the predefined described alarm threshold that generate are compared, if greater than described alarm threshold, the unusual testing result of output signal then.
CNB200610168173XA 2006-12-15 2006-12-15 A detection method and detection device for exceptional network flow Expired - Fee Related CN100486179C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200610168173XA CN100486179C (en) 2006-12-15 2006-12-15 A detection method and detection device for exceptional network flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200610168173XA CN100486179C (en) 2006-12-15 2006-12-15 A detection method and detection device for exceptional network flow

Publications (2)

Publication Number Publication Date
CN1996888A true CN1996888A (en) 2007-07-11
CN100486179C CN100486179C (en) 2009-05-06

Family

ID=38251836

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200610168173XA Expired - Fee Related CN100486179C (en) 2006-12-15 2006-12-15 A detection method and detection device for exceptional network flow

Country Status (1)

Country Link
CN (1) CN100486179C (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895420A (en) * 2010-07-12 2010-11-24 西北工业大学 Fast network traffic anomaly detection method
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN102111312A (en) * 2011-03-28 2011-06-29 钱叶魁 Multi-scale principle component analysis-based network abnormity detection method
CN101388885B (en) * 2008-07-23 2012-04-25 成都市华为赛门铁克科技有限公司 Detection method and system for distributed denial of service
WO2014194495A1 (en) * 2013-06-05 2014-12-11 Beijing Blue I.T. Technologies Co., Ltd Method and apparatus for detecting attack on server
CN104268222A (en) * 2014-09-25 2015-01-07 北京国双科技有限公司 Monitoring method and device for promoted account operation events
WO2015172657A1 (en) * 2014-05-15 2015-11-19 Huawei Technologies Co., Ltd. System and method for anomaly detection
CN105515888A (en) * 2015-06-30 2016-04-20 国家电网公司 Intelligent substation communication network anomaly detection method based on multi-dimensional entropy sequence classification
CN105933157A (en) * 2016-06-01 2016-09-07 国网辽宁省电力有限公司葫芦岛供电公司 Fault detection method for electric power data communication network
CN103927392B (en) * 2014-05-04 2017-03-22 苏州大学 Deep layer network data source abnormal point detection method and system
CN108900476A (en) * 2018-06-07 2018-11-27 桂林电子科技大学 Based on Spark and the parallel network flow method for detecting abnormality that forest is isolated
CN110839016A (en) * 2019-10-18 2020-02-25 平安科技(深圳)有限公司 Abnormal flow monitoring method, device, equipment and storage medium
CN112188534A (en) * 2019-07-05 2021-01-05 中兴通讯股份有限公司 Anomaly detection method and device
CN112272100A (en) * 2020-08-04 2021-01-26 淘宝(中国)软件有限公司 A high-availability traffic control method and device for local business requirements of an online platform

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10447713B2 (en) 2017-04-26 2019-10-15 At&T Intellectual Property I, L.P. Internet traffic classification via time-frequency analysis

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388885B (en) * 2008-07-23 2012-04-25 成都市华为赛门铁克科技有限公司 Detection method and system for distributed denial of service
CN101895420A (en) * 2010-07-12 2010-11-24 西北工业大学 Fast network traffic anomaly detection method
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN102111312A (en) * 2011-03-28 2011-06-29 钱叶魁 Multi-scale principle component analysis-based network abnormity detection method
CN102111312B (en) * 2011-03-28 2013-05-01 钱叶魁 Multi-scale principle component analysis-based network abnormity detection method
WO2014194495A1 (en) * 2013-06-05 2014-12-11 Beijing Blue I.T. Technologies Co., Ltd Method and apparatus for detecting attack on server
US9398044B2 (en) 2013-06-05 2016-07-19 Beijing Blue I.T. Technologies Co., Ltd. Method and apparatus for detecting attack on server
CN103927392B (en) * 2014-05-04 2017-03-22 苏州大学 Deep layer network data source abnormal point detection method and system
WO2015172657A1 (en) * 2014-05-15 2015-11-19 Huawei Technologies Co., Ltd. System and method for anomaly detection
CN104268222B (en) * 2014-09-25 2018-04-03 北京国双科技有限公司 The monitoring method and device of promoted account Action Events
CN104268222A (en) * 2014-09-25 2015-01-07 北京国双科技有限公司 Monitoring method and device for promoted account operation events
CN105515888A (en) * 2015-06-30 2016-04-20 国家电网公司 Intelligent substation communication network anomaly detection method based on multi-dimensional entropy sequence classification
CN105933157A (en) * 2016-06-01 2016-09-07 国网辽宁省电力有限公司葫芦岛供电公司 Fault detection method for electric power data communication network
CN108900476A (en) * 2018-06-07 2018-11-27 桂林电子科技大学 Based on Spark and the parallel network flow method for detecting abnormality that forest is isolated
CN108900476B (en) * 2018-06-07 2021-05-11 桂林电子科技大学 A Parallel Network Traffic Anomaly Detection Method Based on Spark and Isolation Forest
CN112188534A (en) * 2019-07-05 2021-01-05 中兴通讯股份有限公司 Anomaly detection method and device
WO2021004161A1 (en) * 2019-07-05 2021-01-14 中兴通讯股份有限公司 Anomaly detection method and apparatus
US11777824B2 (en) 2019-07-05 2023-10-03 Zte Corporation Anomaly detection method and apparatus
CN112188534B (en) * 2019-07-05 2023-11-03 中兴通讯股份有限公司 Anomaly detection method and device
CN110839016A (en) * 2019-10-18 2020-02-25 平安科技(深圳)有限公司 Abnormal flow monitoring method, device, equipment and storage medium
CN112272100A (en) * 2020-08-04 2021-01-26 淘宝(中国)软件有限公司 A high-availability traffic control method and device for local business requirements of an online platform

Also Published As

Publication number Publication date
CN100486179C (en) 2009-05-06

Similar Documents

Publication Publication Date Title
CN100486179C (en) A detection method and detection device for exceptional network flow
Mai et al. Is sampled data sufficient for anomaly detection?
Hellemons et al. SSHCure: a flow-based SSH intrusion detection system
Siris et al. Application of anomaly detection algorithms for detecting SYN flooding attacks
CA2499938C (en) Network bandwidth anomaly detector apparatus and method for detecting network attacks using correlation function
Arshadi et al. Benford's law behavior of Internet traffic
Tellenbach et al. Beyond shannon: Characterizing internet traffic with generalized entropy metrics
Aizuddin et al. DNS amplification attack detection and mitigation via sFlow with security-centric SDN
Dainotti et al. Worm traffic analysis and characterization
CN112804250B (en) LDoS attack detection and mitigation method based on ensemble learning and peak-seeking algorithm
Dainotti et al. A cascade architecture for DoS attacks detection based on the wavelet transform
Carl et al. Wavelet based denial-of-service detection
Kim et al. Detecting traffic anomalies using discrete wavelet transform
Brauckhoff et al. A signal processing view on packet sampling and anomaly detection
Ali et al. On mitigating sampling-induced accuracy loss in traffic anomaly detection systems
Celenk et al. Anomaly prediction in network traffic using adaptive Wiener filtering and ARMA modeling
US20050240780A1 (en) Self-propagating program detector apparatus, method, signals and medium
Thatte et al. Detection of low-rate attacks in computer networks
Qin et al. Monitoring abnormal network traffic based on blind source separation approach
Kaur et al. A novel multi scale approach for detecting high bandwidth aggregates in network traffic
Bu et al. Design and evaluation of a fast and robust worm detection algorithm
Yu et al. On detecting camouflaging worm
Wang et al. An on-line anomaly detection method based on a new stationary metric-entropy-ratio
Nguyen et al. Suspicious traffic detection based on edge gateway sampling method
Arshadi et al. Entropy based SYN flooding detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090506

Termination date: 20181215

CF01 Termination of patent right due to non-payment of annual fee