WO2011113239A1 - Flow detection method for domain name system and domain name server thereof - Google Patents
Flow detection method for domain name system and domain name server thereof Download PDFInfo
- Publication number
- WO2011113239A1 WO2011113239A1 PCT/CN2010/074574 CN2010074574W WO2011113239A1 WO 2011113239 A1 WO2011113239 A1 WO 2011113239A1 CN 2010074574 W CN2010074574 W CN 2010074574W WO 2011113239 A1 WO2011113239 A1 WO 2011113239A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- domain name
- type
- measurement
- query request
- actual value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a domain name system traffic detection method and a domain name server. Background technique
- the Domain Name System is one of the important infrastructures of the Internet. It is responsible for providing mapping and resolution between domain names and Internet Protocol (IP) addresses. It is web browsing and email. Wait for key links in almost all Internet applications. Therefore, the stable operation of the domain name system is a prerequisite for the normal service of the Internet. However, the recent cyber attacks against the domain name system have become increasingly rampant, and the abuse of the domain name system has emerged one after another. Coupled with the inherent limitations of the DNS protocol, the security of the domain name system is facing a severe test. Therefore, how to quickly and effectively detect the domain name system Abnormal behavior and avoiding catastrophic events have become an important issue for today's domain name systems and the entire Internet.
- the DNS server Since the DNS server implements the external domain name resolution service by responding to the DNS query request it receives, the DNS query data flow directly reflects the entire process of the DNS server's external service. Therefore, the prior art usually detects the DNS traffic. Efficiently evaluate the service status of the DNS server to detect abnormal behavior of the domain name system.
- a commonly used method for detecting DNS traffic anomalies in the prior art is one or more measurement indicators (for example, a domain name query request, a source IP address, a query domain name, a port number, etc.) in a DNS query request data stream sent to a DNS server.
- the quantity is detected in real time. Once the number of certain measurement indicators exceeds the specified threshold at a certain time, a DNS traffic abnormal alarm is generated, indicating that the domain name system behaves abnormally.
- the reason for the abnormal DNS traffic is multi-faceted.
- the prior art only determines whether the DNS traffic is abnormal by instantaneously measuring an independent measurement index. This method is one-sided. The false alarm rate is high, and the detection of abnormal DNS traffic cannot be accurately and effectively implemented. Summary of the invention
- the object of the present invention is to provide a domain name system traffic detection method and a domain name server, which are used to improve the accuracy of DNS traffic anomaly detection.
- the present invention provides a domain name system traffic detection method, including:
- the domain name system traffic abnormality alarm information is output.
- the invention provides a domain name server, comprising:
- An actual value obtaining module configured to acquire the number of domain name query requests received during the detection period and the actual value of the type of the measurement indicator
- a prediction value obtaining module configured to acquire a predicted value of the type of the measurement indicator according to a mapping relationship between the domain name query request and the measurement indicator and the number of the domain name query request;
- a first difference determining module configured to determine a first difference between the actual value of the measurement indicator type and the predicted value of the measurement indicator type
- the determining output module is configured to output the domain name system traffic abnormality alarm information when determining that the first difference is greater than a pre-acquired threshold.
- the domain name system traffic detection method and the domain name server of the present invention detect the DNS traffic according to the actual value of the measurement index type, the number of domain name query requests, and the mapping relationship between the domain name query request and the measurement index. Compared with technology, it reduces the judgment of DNS flow. The false positive rate when the quantity is abnormal increases the accuracy of detecting abnormal DNS traffic. DRAWINGS
- FIG. 1 is a flowchart of a method for detecting a traffic of a domain name system according to Embodiment 1 of the present invention
- FIG. 2 is a flowchart of a method for acquiring parameters and thresholds according to Embodiment 1 of the present invention
- FIG. 3 is a domain name provided by Embodiment 2 of the present invention
- FIG. 4 is a flow chart of a double logarithmic transformation of a query domain name and a domain name query request in multiple test cycles according to Embodiment 2 of the present invention
- FIG. 6 is a schematic diagram showing the distribution of the number of domain name query requests and the number of query domain names over time in an experiment process according to an embodiment of the present invention
- FIG. 7 is a schematic diagram of changes in calculation cost and measurement index in a test process according to an embodiment of the present invention
- FIG. 8 is a schematic structural diagram of a domain name server according to Embodiment 3 of the present invention.
- FIG. 9 is a schematic structural diagram of a domain name server according to Embodiment 4 of the present invention. detailed description
- V KN P
- K and ⁇ are the mapping between the total number of words ⁇ and the dictionary size V
- the parameter of the relationship which is a constant and 0 ⁇ ⁇ ⁇ 1.
- a large number of English documents have been statistically verified to verify the correctness of the law, and the range of parameters ⁇ and ⁇ is obtained, usually 0 ⁇ ⁇ ⁇ 100, 0.4 ⁇ ⁇ ⁇ 0.6.
- the technical solution of the present invention is based on the above stacking law, that is, under the normal network, the stacking law is followed between the number of DNS query requests received by the DNS server and the measurement indicators included in the query request within a certain period of time.
- FIG. 1 is a flowchart of a method for detecting a traffic of a domain name system according to Embodiment 1 of the present invention.
- the execution entity of this embodiment is a domain name server.
- the detection method in this embodiment includes:
- Step 11 Obtain the number of domain name query requests received during the detection period and the actual value of the measurement indicator type
- the working state of the DNS server is detected according to the status of the DNS query request received by the DNS server in a period of time.
- the "period" is a detection period, that is, the result of detecting the DNS server traffic at the end of the detection period.
- the detection period may be a time interval for detecting the DNS server traffic according to an actual application, and may be time-divided, for example, one hour is a detection period, or may be divided according to the query quantity, for example, every ten million query requests are received. For a detection cycle.
- the DNS server receives the DNS query request, and collects the number of DNS query requests in the detection period, and simultaneously calculates the actual value of the measurement indicator type.
- the source IP address: 192.168.200.1 and the source IP address are used to distinguish different measurement indicators, for example, when the source IP address is used as a measurement indicator, for example, Source IP address: 192.168.200.2 belongs to different types of measurement indicators, and the actual value of the corresponding measurement indicator type is 2.
- the process of calculating the actual value of the measurement indicator type is as follows: When the DNS server receives any DNS query request, obtains the measurement index in any DNS query request; and determines the measurement index in any DNS query request obtained. Type, whether it is the same as the type of the measurement indicator included in the other domain name query request; if the judgment result is different, the DNS server increases the actual value of the corresponding measurement indicator type by 1, and obtains the measurement index at the end of the detection period. The actual value of the type.
- Step 12 Obtain a predicted value of the type of the measurement indicator according to the mapping relationship between the domain name query request and the measurement indicator and the number of the domain name query request;
- the stacking law is followed between the number of DNS query requests and the measurement indicators.
- the number of DNS query requests is equivalent to the total number of words in the stacking law
- the number of measurement index types is equivalent to the dictionary size, that is, the number of different words.
- the DNS query request and the measurement indicator type satisfy the formula (1) quantitatively, that is, the mapping relationship between the DNS query request and the measurement indicator type, and the formula (1) is as follows:
- N the number of domain name query requests within the detection period
- the predicted value of the type of measurement indicator in the detection period calculated according to the number of domain name query requests in the normal network state
- ⁇ pre-acquired, indicating the number of domain name query requests and the type of measurement indicator
- the parameter of the mapping relationship between values, the parameter range is 0 ⁇ 1, and the parameter range is 0-100.
- the predicted value of the type of measurement indicator is calculated according to the number of DNS query requests and the formula (1), which should be the same or similar to the actual value of the measurement indicator type.
- Step 13 determining a first difference between the actual value of the measurement indicator type and the predicted value of the measurement indicator type
- the actual value of the actually measured type of the measurement index is compared with the predicted value of the type of the measurement index calculated according to the formula (1), and the difference is taken as an absolute value to obtain the first difference.
- the size of the first difference may be The proximity of the actual value of the type of measurement indicator to the predicted value of the type of measurement indicator, which in turn indicates the status of the domain name system traffic.
- Step 14 When it is determined that the first difference is greater than the pre-acquired threshold, the domain name system traffic abnormal alarm information is output.
- the DNS server After obtaining the first difference, the DNS server compares the first difference with the pre-acquired threshold.
- the actual value of the measurement indicator type and the type of the measurement indicator are The predicted values differ greatly, which indicates that the DNS server traffic is abnormal at this time, and the traffic abnormal alarm information should be output.
- the threshold value is not limited, and the threshold may be an empirical value obtained in an actual application, or may be a range value of the allowed fluctuation according to the application scenario.
- the second difference between the actual value of the measurement index type and the predicted value of the measurement index type of multiple test periods is obtained, and the largest second difference is taken as the current step.
- the threshold in 14 It is worth noting that the threshold is acquired before performing this step, but it is not limited to enter the detection period after acquiring the threshold.
- the domain name system traffic detection method in this embodiment obtains the predicted value of the measurement index type according to the mapping relationship between the domain name query request and the measurement index type, and compares the actual value of the measurement index type with the predicted value according to the two The range of the difference is used to determine whether the DNS server traffic is abnormal.
- the stacking law combines the domain name query request with the measurement index to detect the DNS traffic. Compared with the prior art, the false alarm rate when determining the abnormal DNS traffic can be reduced. The accuracy of the abnormality of the DNS traffic is detected.
- the technical solution of the present invention detects the traffic of the DNS server based on the domain name query request in the detection period, and does not make the judgment instantaneously as in the prior art, thereby further improving the abnormality of detecting the DNS traffic. Accuracy and effectiveness.
- the DNS server performs the external domain name resolution service by responding to the domain name query request received by the DNS server.
- the typical domain name query request includes a timestamp, a source IP address, a port number, a query domain name, and a resource type. Therefore, in this embodiment, the measurement indicator obtained from the query request refers to each field value in the domain name query request, that is, the measurement indicator may be a timestamp, a source IP address, a port number, a query domain name, a resource type, and the like.
- the obtaining threshold value and the implementation manner of the parameter in the formula (1) provided by the embodiment are as follows:
- the implementation process specifically includes the following steps:
- Step 111 Obtain the number of domain name query requests received during each test period and the actual value of the measurement indicator type
- test period is similar to the detection period. The difference is that the test period is before the detection period to provide various parameters and information required for the detection period, and the test period is generally selected during a period in which the network performance is relatively stable, that is, in a normal network state. Next, test it.
- step 111 the process of obtaining the actual value of the measurement indicator type in this step 111 is the same as that in step 11, and will not be discussed in detail.
- Step 112 linearly fitting the number of domain name query requests and the actual value of the measurement index type in the obtained multiple test periods, and obtaining the parameter ⁇ and the parameter according to the fitting result;
- the linear fitting may be a least square method, an equal-partition three-group averaging method or a piecewise optimal slope averaging method, and this embodiment is preferably a least square method, that is, determining the number and measurement of the domain name query request by the least squares method.
- Step 113 Calculate a predicted value of the type of the measurement indicator for each test period according to the mapping relationship between the domain name query request and the measurement indicator;
- the predicted value of the type of the measurement index for each test period is calculated according to the formula (2), wherein the formula (2) is as follows:
- N 2 is the number of domain name query requests for each test period;
- I is the predicted value of the type of measurement indicator for each test period;
- ⁇ , ⁇ is the parameter obtained according to step 111 and step 112 above, where the value of the parameter The range is 0 ⁇ 1, and the parameter range is 0 ⁇ 100.
- Step 114 Determine a second difference between the actual value of the measurement indicator type of each test period and the predicted value of the measurement indicator type;
- the actual value of the measurement index type of each test period and the predicted value of the measurement index type are made a difference and the result of taking the absolute value is used as the second difference.
- Step 115 Obtain a second largest difference among the second differences of the multiple test periods as a threshold for detecting domain name system traffic.
- the method provided in this embodiment can acquire parameters and thresholds at the same time, that is, after obtaining the parameters and parameters, the subsequent operations are directly performed to obtain the threshold, that is, the acquisition parameters and the thresholds use the same test period, but in practical applications.
- the process of obtaining parameters and thresholds may be independent, that is, different test periods may be set for acquiring parameters and thresholds respectively.
- This embodiment provides a preferred embodiment, and the efficiency is high.
- the parameters and thresholds in this embodiment are obtained by testing the normal network.
- the test process is similar to the actual detection process. Therefore, the DNS traffic is detected based on the parameters and thresholds provided in this embodiment, and the detection accuracy and effectiveness are high.
- this embodiment does not count the number of test cycles and test cycles. The amount is limited. Generally, the more the number of test cycles, the closer the threshold is to the actual situation, and the better the detection effect is when the DNS traffic is detected based on the threshold.
- the measurement index in this embodiment may be not only a single measurement parameter obtained from a domain name query request, such as a source IP address or a query domain name, but also a set of multiple measurement parameters, for example, including a source IP address and Query requests, etc. to deal with a variety of situations.
- the measurement parameter refers to the source IP address, query domain name or port number obtained from the domain name query request.
- the domain name system traffic detection method When the measurement indicator includes multiple measurement parameters, the domain name system traffic detection method provided in this embodiment needs to obtain the actual value of each measurement parameter type and the prediction value of each measurement parameter type separately; and determine the actual value of each measurement parameter type respectively. And a first difference value of the predicted values of the measured parameter types; and when any of the first differences is greater than a first threshold corresponding to any of the first differences, the domain name system traffic abnormality alarm information is output.
- the first threshold corresponding to each first difference may be the same or different, and the acquiring process of each first threshold is the same as the foregoing step 111 to step 115.
- the domain name system traffic detection method provided in this embodiment detects the domain name system traffic according to multiple measurement parameters, and the adaptability thereof is stronger.
- the source IP address and the query domain name are taken as an example for description.
- FIG. 3 is a flowchart of a method for detecting a domain name system traffic according to Embodiment 2 of the present invention. This embodiment will be implemented based on the above embodiments. The specific embodiment of the present invention will further explain the technical solution of the present invention in combination with practical applications.
- this embodiment implements the technical solution provided by the present invention on the CN domain name server, that is, detects the traffic of the CN domain name server according to the method provided by the present invention.
- the specific embodiment is a test period of half an hour, and the total test time is 24 hours.
- the two measurement indicators of the domain name and the source IP address are taken as an example.
- the method in this embodiment includes:
- Step 31 Record the actual quantity value of the query domain name as V name , the actual quantity value of the source IP address as V ip , and the number of DNS domain name query requests as N, and initialize V name , V ip , N respectively to 0;
- Step 32 receiving a DNS domain name query request, and updating V name , V ip and N;
- the information in the domain name query request is obtained, where the information includes the query domain name and the source IP address; determining whether the query domain name is a newly appearing domain name, and if yes, adding V name to 1 to implement V nam update; V name remains unchanged; for the same reason, it is judged whether the source IP address is the newly-created source IP address, and if so, V ip is incremented by 1 to implement the update of V ip ; otherwise, V ip remains unchanged.
- the source IP address in the current domain name query request is 192.168.200.1, and is compared with the source IP address that has been received by other domain name query requests to determine whether the source IP address already exists: 192.168.200.1, if present , then V ip remains unchanged; if not, V ip is incremented by 1.
- Step 33 Determine whether the test period has arrived
- This step determines whether the domain name query request has been received from the beginning for half an hour, and if so, step 34 is performed; otherwise, step 32 is performed;
- Step 34 recording V name , V ip and N of the current test period
- the actual value V name of the query domain name , the actual value V ip of the source IP address, and the number N of the domain name query request are accumulated for each test period, and are stored for subsequent processing.
- Step 35 determining whether the test time has expired
- step 36 it refers to whether it has reached 24 hours from the beginning to the time, for example, it can be timed.
- the device records the test period and the test time; if yes, step 36 is performed; otherwise, step 31 is performed; step 36, parameters ⁇ ⁇ personally K name and parameters ⁇ ⁇ , ⁇ ⁇ are respectively calculated;
- the abscissa of FIG. 4 and FIG. 5 is the cumulative total number of domain name query requests, and the ordinate is the cumulative total of the query domain name and the cumulative total number of source IP addresses respectively.
- the above results are analyzed in combination with FIG. 4 and FIG. 5, and the normal network state is known.
- the cumulative total number of query domain names, the cumulative total number of source IP addresses, and the total number of DNS domain name query requests have a linear relationship after the double logarithmic transformation, that is, the stacking law is met.
- Step 37 Calculate a threshold value Y name corresponding to the query domain name and a threshold value ⁇ ⁇ corresponding to the source IP address.
- V, name the predicted value of the query domain name for each test period.
- V, ip the predicted value of the query domain name for each test period.
- i is greater than or equal to 1 and less than or equal to 48, that is, the number of test cycles for testing is 48, and the number of the test period is determined according to the length of the test period and the test time, but is not limited thereto, and different test periods and test times can be selected according to the specific application environment.
- the traffic of the CN domain name server is detected through step 38 and subsequent steps, and the detection period is also half an hour;
- Step 38 the detection cycle begins, and V name , V ip , and N are initialized to 0;
- Step 39 receiving a domain name query request, and updating V name , V ip and N; specifically, the step is the same as step 32;
- Step 40 Determine whether the detection period ends
- step 41 it is judged whether the time of the preset detection period has been reached from the start of the test to the current time (for example, 30 minutes), and if so, step 41 is performed; otherwise, step 39 is performed;
- Step 41 Record the V name , V ip, and N of the current detection period, and calculate V, name , V, and ip . Specifically, obtain the number of CN domain name query requests, the actual value of the query domain name, and the source IP address in the current detection period. After the actual value of the address, V, name is calculated according to the formula (3) and the parameters p name and K name calculated by the above steps; V is calculated according to the formula (6) and the parameters ⁇ ⁇ , ⁇ ⁇ calculated by the above steps, 1P ;
- Step 42 Calculate the absolute difference between V name and V' name , V' ip and V ip of the detection period; that is, calculate
- Step 43 Compare the magnitude relationship between the absolute difference and the corresponding threshold, and perform an abnormality alarm of the CN domain name server when the absolute difference is greater than the threshold.
- log ( V' name ) -log ( V name ) I and the threshold Y name are respectively compared, and the absolute difference
- log ( V' name ) -log ( V name ) I is greater than Y name , or I log ( V, ip ) -log ( V ip ) I is greater than Y ip , or
- the traffic is sent. Abnormal alarm; otherwise, the CN domain name server traffic is normal. If the CN domain name server is working well, go to step 38 to start a new detection cycle.
- the query domain name and the source IP address are taken as an example for description, but it should be noted that the two processes are independent, and are two processes implemented in parallel, that is, as described in step 43, as long as the query One of the domain name and the source IP address has a corresponding absolute difference greater than the corresponding threshold, that is, a traffic abnormality alarm is issued.
- the technical solution of the present invention is described in detail based on the CN domain name server.
- the domain name system traffic detection method in this embodiment is based on the mapping relationship between the number of DNS domain name query requests and the number of query domain names and the DNS domain name query.
- the mapping between the number of requests and the number of source IP addresses can detect the traffic of the CN domain name server from different angles, which can further improve the accuracy of detection and reduce the false alarm rate.
- the technical solution of the present invention calculates the amount of calculation. Relatively small, low deployment costs, suitable for use on large DNS servers.
- multiple detection cycles are detected on the CN domain name server, and the detection results after the double logarithm transformation shown in the circles in FIG. 4 and FIG. 5 are obtained, which can be seen from the figure and after the double logarithmic transformation.
- the results of the fitting are basically the same, indicating that the CN domain name server is working normally.
- DDOS Denial of Denial of Service
- the standard association container set in the STL (Standard Template Library) is used to record the set of the actual value V name of the query domain name and the actual value V ip of the source IP address, and perform in memory.
- STL Standard Template Library
- the DDOS attack is implemented from the 50th cycle. At this time, the DNS query request received by the DNS server is abnormally increased.
- the time complexity of binary search and insertion of set sets is 0 (log 2 V), where V is ⁇ ⁇ or V ip .
- V log 2 V
- V ip the time required to find V when it rises to 10 8
- the technical solution of the present invention has a relatively small amount of calculation and a low deployment cost, and is suitable for use on a large-scale DNS server.
- FIG. 8 is a schematic structural diagram of a domain name server according to Embodiment 3 of the present invention.
- the domain name server of this embodiment includes: an actual value obtaining module 81, a predicted value obtaining module 82, a first difference determining module 83, and The output module 84 is judged.
- the actual value obtaining block 81 is configured to acquire the number of the domain name query request and the actual value of the measurement index type received during the detection period when the domain name query request is received; the predicted value obtaining module 82 is connected to the actual value obtaining module 81.
- the method is used to obtain a predicted value of a measurement indicator type according to a mapping relationship between a domain name query request and a measurement index, and a number of domain name query requests; wherein the mapping relationship refers to a stacking law that satisfies the number of domain name query requests and the number of measurement index types. As shown in formula (1).
- the first difference determining module 83 is connected to the actual value obtaining module 81 and the predicted value obtaining module 82, and is configured to calculate the actual value and the predicted value of the measured index type after acquiring the actual value of the measured index type and the predicted value of the measured index type.
- the domain name server of this embodiment may be used to perform the domain name system traffic detection method provided by the embodiment of the present invention.
- the actual value obtaining module acquires the number of domain name query requests and the actual value of the measurement index type in the detection period
- the predicted value acquisition module According to the mapping relationship between the domain name query request and the measurement index type, that is, the stacking law obtains the predicted value of the measurement index type, and combines the predicted value and the actual value of the measurement index type to detect the traffic of the domain name server, on the one hand based on the detection period
- the statistical result of the domain name query request performs traffic detection on the domain name server instead of detecting it in real time, which can reduce the false positive rate when the domain name server traffic is abnormal.
- the actual value of the measurement index type and the mapping relationship are calculated.
- the predicted values of the types of measurement indicators are compared, and whether the abnormality of the domain name server traffic is abnormal according to the comparison result is compared, and the accuracy and effectiveness of detecting the DNS traffic are improved compared with the judgment based on the change of the actual value.
- the measurement indicator in this embodiment may be each field value in the data packet of the domain name query request, such as a source IP address, a port number, a query domain name, and the like.
- the actual value obtaining module 81 of this embodiment includes: a first obtaining submodule 811 and a second obtaining submodule 812.
- the first obtaining sub-module 811 is configured to increase the number of domain name query requests by one when receiving any domain name query request in the detection period, to obtain the number of domain name query requests for the detection period.
- the second obtaining sub-module 812 is configured to obtain an actual value of the type of the measurement indicator in the detection period, and specifically includes: a measurement index obtaining unit 8121 and a determining value-adding unit 8122.
- the measurement index obtaining unit 8121 is configured to obtain any domain name query request packet when receiving any domain name query request within the detection period.
- the measurement indicator includes, for example, a source IP address, a query domain name, a port number, and the like.
- the judgment value-adding unit 8122 is configured to perform the measurement indicator type acquired by the measurement index obtaining unit 8121 and the type of the measurement indicator included in the other domain name query request.
- the predicted value obtaining module 82 in the embodiment pre-stores the mapping relationship between the domain name query request and the measurement index, and the mapping relationship is specifically the relationship shown in the formula (1), that is, the stacking law. Description of the corresponding part of the system traffic detection method embodiment.
- the predicted value of the measured index of the network under normal conditions can be accurately calculated according to the deformed deposition law, and the stacking law is logarithmically processed, one is to simplify The calculation process, the second is to more intuitively display the relationship between measurement indicators and domain name query requests.
- FIG. 9 is a schematic structural diagram of a domain name server according to Embodiment 4 of the present invention. The embodiment is implemented based on Embodiment 3. As shown in FIG. 9, the domain name server in this embodiment further includes: a parameter obtaining module 85 and a threshold acquiring module 86.
- the parameter acquisition block 85 includes a first actual value acquisition unit 851 and a first parameter acquisition unit 852.
- the first actual value obtaining unit 851 is configured to obtain the number of the domain name query request and the actual value of the measurement index type received in the plurality of test periods, and provide the obtained result to the first parameter obtaining unit 852;
- the unit 852 linearly fits the number of domain name query requests and the actual values of the measurement index types of the plurality of test periods provided by the first actual value acquisition unit 851, and obtains parameters and parameters according to the fitting result and provides the obtained parameters to the parameters.
- Predicted value acquisition module 82 is configured to obtain the number of the domain name query request and the actual value of the measurement index type received in the plurality of test periods, and provide the obtained result to the first parameter obtaining unit 852;
- the unit 852 linearly fits the number of domain name query requests and the actual values of the measurement index types of the plurality of test periods provided by the first actual value acquisition unit 851, and obtains parameters and parameters according to the fitting result and provides the obtained
- the threshold acquisition module 86 includes a second actual value acquisition unit 861, a second parameter acquisition unit 862, a predicted value acquisition unit 863, a second difference determination unit 864, and a threshold acquisition unit 865.
- the threshold acquisition module 86 works as follows:
- the second actual value obtaining unit 861 is configured to obtain the actual number of the domain name query request and the measured index type received in the plurality of test periods, and provide the obtained result to the second parameter obtaining unit 862;
- the unit 862 linearly fits the number of domain name query requests of the plurality of test periods provided by the second actual value obtaining unit 861 and the actual value of the measurement index type, and obtains parameters and parameters according to the fitting result, and obtains the parameter values.
- the predicted value obtaining unit 863 brings the parameter provided by the second parameter acquiring unit 862 into the formula (2), and calculates the predicted value of the type of the measured index for each test period; the second difference determining unit The 864 is connected to the second actual value obtaining unit 861 and the predicted value obtaining unit 863, and is configured to: after acquiring the actual value of the measurement index type and the predicted value of the measurement index type for each test period, the actual value and the measurement type of the measurement index type.
- the predicted value of the indicator type is poor and takes an absolute value to obtain the second difference, and the second difference obtained Provided to the threshold acquisition unit 865; the threshold acquisition unit 865 is configured to compare the plurality of second differences, obtain the largest second difference therein as a threshold, and provide the maximum second difference to the determination output module 84.
- the domain name server of the present embodiment provides an implementation manner for obtaining the parameters and thresholds required by the technical solution of the present invention by using the foregoing modules.
- the test is obtained by testing the normal network, and the test process is similar to the actual detection process.
- the threshold value provided by the embodiment detects the traffic of the domain name server, and the detection accuracy and the validity thereof are high.
- the second actual value obtaining unit in the domain name server provided by the embodiment has the same function as the first actual value obtaining unit, the second parameter obtaining unit, and the first parameter obtaining unit, and can be used as an actual implementation.
- a functional module is implemented, and may also be a separate functional module. This embodiment does not limit this.
- the domain name server of this embodiment may be used to perform the domain name system traffic detection method provided by the embodiment of the present invention.
- the domain name system traffic detection method part provided by the embodiment of the present invention.
- the domain name server of the implementation may have There are a plurality of corresponding function modules for detecting the traffic of the domain name server according to different measurement parameters, and the same set of function modules and different softwares are used to detect the traffic of the domain name server according to multiple measurement parameters, this embodiment This is not a limitation.
- the embodiment of the present invention reduces the normal growth of the domain name server traffic caused by the increase in the number of domain name query requests, according to the technical solution for performing traffic detection on the statistics result of the domain name query request in a period of time.
- the false positive rate of the situation improves the accuracy of the detection; in addition, the predicted value of the type of the measurement index is calculated according to the stacking law satisfied by the measurement index and the domain name query request, and the flow rate is performed based on the comparison result between the predicted value and the actual value of the type of the measurement index Detection further improves the accuracy of domain name server traffic detection.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
域名系统流量检测方法与域名服务器 Domain Name System Traffic Detection Method and Domain Name Server
技术领域 Technical field
本发明涉及通信技术领域, 尤其涉及一种域名系统流量检测方法与域名 服务器。 背景技术 The present invention relates to the field of communications technologies, and in particular, to a domain name system traffic detection method and a domain name server. Background technique
域名系统 (Domain Name System; 简称为: DNS)是互联网的重要基础 设施之一, 负责提供域名和网际协议 ( Internet Protocol; 简称为: IP ) 地 址之间的映射和解析, 是网页浏览、 电子邮件等几乎所有互联网应用中的 关键环节。 因此, 域名系统的稳定运行是实现互联网正常服务的前提。 但 是, 近来针对域名系统的网络攻击行为日益猖獗, 域名系统的滥用现象层 出不穷, 再加上 DNS协议本身固有的局限性, 域名系统的安全问题面临 严峻考验, 因此, 如何快速有效的检测域名系统的行为异常, 避免灾难性 事件的发生成为当今域名系统乃至整个互联网所面临的一个重要议题。 The Domain Name System (DNS) is one of the important infrastructures of the Internet. It is responsible for providing mapping and resolution between domain names and Internet Protocol (IP) addresses. It is web browsing and email. Wait for key links in almost all Internet applications. Therefore, the stable operation of the domain name system is a prerequisite for the normal service of the Internet. However, the recent cyber attacks against the domain name system have become increasingly rampant, and the abuse of the domain name system has emerged one after another. Coupled with the inherent limitations of the DNS protocol, the security of the domain name system is facing a severe test. Therefore, how to quickly and effectively detect the domain name system Abnormal behavior and avoiding catastrophic events have become an important issue for today's domain name systems and the entire Internet.
由于 DNS服务器是通过对其所接收的 DNS查询请求进行应答实现对 外域名解析服务的, DNS查询数据流直接反映了 DNS服务器对外服务的 整个过程,因此,现有技术通常通过检测 DNS流量的情况来有效评估 DNS 服务器的服务状况, 进而实现对域名系统异常行为的检测。 Since the DNS server implements the external domain name resolution service by responding to the DNS query request it receives, the DNS query data flow directly reflects the entire process of the DNS server's external service. Therefore, the prior art usually detects the DNS traffic. Efficiently evaluate the service status of the DNS server to detect abnormal behavior of the domain name system.
现有技术中常用的检测 DNS流量异常的方法是对发往 DNS服务器端 的 DNS查询请求数据流中的一个或多个测量指标(例如: 域名查询请求、 源 IP地址、 查询域名、 端口号等) 的数量进行实时检测, 一旦某时刻某 一测量指标的数量超过规定的阈值, 则做出 DNS流量异常报警, 即说明 域名系统行为异常。 A commonly used method for detecting DNS traffic anomalies in the prior art is one or more measurement indicators (for example, a domain name query request, a source IP address, a query domain name, a port number, etc.) in a DNS query request data stream sent to a DNS server. The quantity is detected in real time. Once the number of certain measurement indicators exceeds the specified threshold at a certain time, a DNS traffic abnormal alarm is generated, indicating that the domain name system behaves abnormally.
由于导致 DNS流量异常的原因是多方面的, 现有技术仅通过瞬时测 量某个独立的测量指标来判定 DNS流量是否异常, 这种方法存在片面性, 误报率高, 不能准确、 有效的实现对 DNS流量异常的检测。 发明内容 The reason for the abnormal DNS traffic is multi-faceted. The prior art only determines whether the DNS traffic is abnormal by instantaneously measuring an independent measurement index. This method is one-sided. The false alarm rate is high, and the detection of abnormal DNS traffic cannot be accurately and effectively implemented. Summary of the invention
本发明的目的是提供一种域名系统流量检测方法与域名服务器, 用以提 高 DNS流量异常检测的准确性。 The object of the present invention is to provide a domain name system traffic detection method and a domain name server, which are used to improve the accuracy of DNS traffic anomaly detection.
本发明提供一种域名系统流量检测方法, 包括: The present invention provides a domain name system traffic detection method, including:
获取检测周期内接收到的域名查询请求的数量和测量指标类型的实际 值; Obtaining the number of domain name query requests received during the detection period and the actual value of the measurement indicator type;
根据域名查询请求与测量指标的映射关系和所述域名查询请求的数量, 获取所述测量指标类型的预测值; Obtaining a predicted value of the type of the measurement indicator according to a mapping relationship between the domain name query request and the measurement indicator and the number of the domain name query request;
确定所述测量指标类型的实际值和所述测量指标类型的预测值的第一差 值; Determining a first difference between the actual value of the type of measurement indicator and the predicted value of the type of measurement indicator;
在判断出所述第一差值大于预先获取的阈值时, 输出域名系统流量异 常报警信息。 When it is determined that the first difference is greater than a pre-acquired threshold, the domain name system traffic abnormality alarm information is output.
本发明提供一种域名服务器, 包括: The invention provides a domain name server, comprising:
实际值获取模块, 用于获取检测周期内接收到的域名查询请求的数量和 测量指标类型的实际值; An actual value obtaining module, configured to acquire the number of domain name query requests received during the detection period and the actual value of the type of the measurement indicator;
预测值获取模块, 用于根据域名查询请求与测量指标的映射关系和所述 域名查询请求的数量, 获取所述测量指标类型的预测值; a prediction value obtaining module, configured to acquire a predicted value of the type of the measurement indicator according to a mapping relationship between the domain name query request and the measurement indicator and the number of the domain name query request;
第一差值确定模块, 用于确定所述测量指标类型的实际值和所述测量指 标类型的预测值的第一差值; a first difference determining module, configured to determine a first difference between the actual value of the measurement indicator type and the predicted value of the measurement indicator type;
判断输出模块, 用于在判断出所述第一差值大于预先获取的阈值时, 输 出域名系统流量异常报警信息。 The determining output module is configured to output the domain name system traffic abnormality alarm information when determining that the first difference is greater than a pre-acquired threshold.
本发明的域名系统流量检测方法与域名服务器, 根据一段时间内的测量 指标类型的实际值、 域名查询请求的数量以及域名查询请求和测量指标之间 的映射关系, 对 DNS流量进行检测, 与现有技术相比, 降低了判定 DNS流 量异常时的误报率, 提高了检测 DNS流量异常的准确性。 附图说明 The domain name system traffic detection method and the domain name server of the present invention detect the DNS traffic according to the actual value of the measurement index type, the number of domain name query requests, and the mapping relationship between the domain name query request and the measurement index. Compared with technology, it reduces the judgment of DNS flow. The false positive rate when the quantity is abnormal increases the accuracy of detecting abnormal DNS traffic. DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下 面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在 不付出创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。 In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description of the drawings used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any inventive labor.
图 1为本发明实施例一提供的域名系统流量检测方法的流程图; 图 2为本发明实施例一提供的获取参数和阈值的方法的流程图; 图 3为本发明实施例二提供的域名系统流量检测方法的流程图; 图 4为本发明实施例二中多个测试周期的查询域名和域名查询请求的双 对数变换后的拟合曲线; 1 is a flowchart of a method for detecting a traffic of a domain name system according to Embodiment 1 of the present invention; FIG. 2 is a flowchart of a method for acquiring parameters and thresholds according to Embodiment 1 of the present invention; FIG. 3 is a domain name provided by Embodiment 2 of the present invention; FIG. 4 is a flow chart of a double logarithmic transformation of a query domain name and a domain name query request in multiple test cycles according to Embodiment 2 of the present invention; FIG.
图 5为本发明实施例二中多个测试周期的源 IP地址和域名查询请求的双 对数变换后的拟合曲线; 5 is a fitting curve of a double logarithmic transformation of a source IP address and a domain name query request in multiple test cycles according to Embodiment 2 of the present invention;
图 6为本发明实施例的实验过程中域名查询请求的数量与查询域名的数 量随时间的分布示意图; 6 is a schematic diagram showing the distribution of the number of domain name query requests and the number of query domain names over time in an experiment process according to an embodiment of the present invention;
图 7为本发明实施例的试验过程中计算代价和测量指标的变化示意图; 图 8为本发明实施例三提供的域名服务器的结构示意图; 7 is a schematic diagram of changes in calculation cost and measurement index in a test process according to an embodiment of the present invention; FIG. 8 is a schematic structural diagram of a domain name server according to Embodiment 3 of the present invention;
图 9为本发明实施例四提供的域名服务器的结构示意图。 具体实施方式 FIG. 9 is a schematic structural diagram of a domain name server according to Embodiment 4 of the present invention. detailed description
为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本发 明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于 本发明中的实施例, 本领域普通技术人员在没有做出创造性劳动前提下所获 得的所有其他实施例, 都属于本发明保护的范围。 在介绍本发明的技术方案之前, 首先简单介绍一下堆积定律: 堆积定律(Heap's Law ) 最早起源于计算语言学中, 用于描述文档集合 中所含单词总量与不同单词个数之间的关系, 假设一个文档集合含有 N个单 词, 其中不同单词的个数称为字典的大小记为 V, 则有: V=KNP, 其中, K 和 β 为表示单词总数 Ν和字典大小 V之间映射关系的参数, 其为常数且 0<β<1。 曾对大量的英文文档进行统计验证了该定律的正确性, 并获取到参数 Κ和 β的范围, 通常 0<Κ<100, 0.4≤β≤0.6。 该定律说明: 随着文本数量的增 加, 其中涉及的不同单词的个数占文本中单词总量的比例先是突然增大, 然 后增速放緩, 但始终在提高, 即随着观察到的文本越来越多, 新单词一直在 出现, 但新单词出现的概率在降低。 The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without departing from the inventive scope are the scope of the present invention. Before introducing the technical solution of the present invention, the following briefly introduces the law of accumulation: The Heap's Law originated in computational linguistics and is used to describe the relationship between the total number of words contained in a document collection and the number of different words. Suppose a document collection contains N words, where the number of different words is called the size of the dictionary is V, then: V = KN P , where K and β are the mapping between the total number of words 字典 and the dictionary size V The parameter of the relationship, which is a constant and 0 < β < 1. A large number of English documents have been statistically verified to verify the correctness of the law, and the range of parameters Κ and β is obtained, usually 0 < Κ < 100, 0.4 ≤ β ≤ 0.6. The law states: As the number of texts increases, the number of different words involved accounts for a sudden increase in the proportion of words in the text, and then the growth slows, but is always increasing, that is, with the observed text More and more, new words are always appearing, but the probability of new words appearing is decreasing.
本发明技术方案基于上述堆积定律, 即在正常网络下, 某时间段内 DNS 服务器端所接收到的 DNS 查询请求数和查询请求中包括的各测量指标之间 遵循堆积定律。 The technical solution of the present invention is based on the above stacking law, that is, under the normal network, the stacking law is followed between the number of DNS query requests received by the DNS server and the measurement indicators included in the query request within a certain period of time.
实施例一 Embodiment 1
图 1为本发明实施例一提供的域名系统流量检测方法的流程图, 本实施 例的执行主体为域名服务器, 如图 1所示, 本实施例的检测方法包括: FIG. 1 is a flowchart of a method for detecting a traffic of a domain name system according to Embodiment 1 of the present invention. The execution entity of this embodiment is a domain name server. As shown in FIG. 1 , the detection method in this embodiment includes:
步骤 11, 获取检测周期内接收到的域名查询请求的数量和测量指标类型 的实际值; Step 11: Obtain the number of domain name query requests received during the detection period and the actual value of the measurement indicator type;
本实施例根据一段时间内 DNS服务器接收到的 DNS查询请求的状况检 测 DNS服务器的工作状态。其中,本实施例称 "一段时间"为一个检测周期, 即在检测周期结束时输出对 DNS服务器流量检测的结果。且该检测周期可以 是根据实际应用设定的检测 DNS服务器流量的时间间隔, 可以时间划分, 例 如一小时为一个检测周期, 也可以根据查询量来划分, 例如以每接收一千万 次查询请求为一个检测周期。 In this embodiment, the working state of the DNS server is detected according to the status of the DNS query request received by the DNS server in a period of time. In this embodiment, the "period" is a detection period, that is, the result of detecting the DNS server traffic at the end of the detection period. The detection period may be a time interval for detecting the DNS server traffic according to an actual application, and may be time-divided, for example, one hour is a detection period, or may be divided according to the query quantity, for example, every ten million query requests are received. For a detection cycle.
具体的, DNS服务器接收 DNS查询请求, 并统计检测周期内 DNS查询 请求的数量, 同时统计测量指标类型的实际值。 其中, 测量指标从查询请求 中获取, 例如可以是查询请求中包含的源 IP地址或查询域名等; 而测量指标 类型用于区别不同的测量指标, 例如当以源 IP地址作为测量指标时, 源 IP 地址: 192.168.200.1与源 IP地址: 192.168.200.2属于不同类型的测量指标, 且对应测量指标类型的实际值为 2。 Specifically, the DNS server receives the DNS query request, and collects the number of DNS query requests in the detection period, and simultaneously calculates the actual value of the measurement indicator type. Where the measurement indicator is requested from the query The source IP address: 192.168.200.1 and the source IP address are used to distinguish different measurement indicators, for example, when the source IP address is used as a measurement indicator, for example, Source IP address: 192.168.200.2 belongs to different types of measurement indicators, and the actual value of the corresponding measurement indicator type is 2.
本步骤 11 统计测量指标类型的实际值的过程为: DNS服务器接收到任 一 DNS查询请求时, 获取任一 DNS查询请求中的测量指标; 并判断获取的 任一 DNS查询请求中的测量指标的类型,与已经接收到其他域名查询请求包 括的测量指标的类型是否相同; 若判断结果为不同时, 则 DNS服务器将相应 测量指标类型的实际值增 1 , 并在检测周期结束时获取到测量指标类型的实 际值。 The process of calculating the actual value of the measurement indicator type is as follows: When the DNS server receives any DNS query request, obtains the measurement index in any DNS query request; and determines the measurement index in any DNS query request obtained. Type, whether it is the same as the type of the measurement indicator included in the other domain name query request; if the judgment result is different, the DNS server increases the actual value of the corresponding measurement indicator type by 1, and obtains the measurement index at the end of the detection period. The actual value of the type.
步骤 12, 根据域名查询请求与测量指标的映射关系和域名查询请求的数 量, 获取测量指标类型的预测值; Step 12: Obtain a predicted value of the type of the measurement indicator according to the mapping relationship between the domain name query request and the measurement indicator and the number of the domain name query request;
具体的, 在正常网络状态下, DNS查询请求的数量和测量指标之间遵循 堆积定律。 其中, DNS查询请求的数量相当于堆积定律中的单词总数, 而测 量指标类型的数量相当于字典大小, 即不同的单词数。 则 DNS查询请求和测 量指标类型在数量上满足公式( 1 ) , 即 DNS查询请求和测量指标类型之间 的映射关系, 公式( 1 )如下所示: Specifically, in the normal network state, the stacking law is followed between the number of DNS query requests and the measurement indicators. Among them, the number of DNS query requests is equivalent to the total number of words in the stacking law, and the number of measurement index types is equivalent to the dictionary size, that is, the number of different words. Then, the DNS query request and the measurement indicator type satisfy the formula (1) quantitatively, that is, the mapping relationship between the DNS query request and the measurement indicator type, and the formula (1) is as follows:
log^^ - ^log^) + ^ ( 1 ) Log^^ - ^log^) + ^ ( 1 )
由上述可知,若知道 DNS查询请求的数量和测量指标类型的数量之间的 任一个, 根据公式(1 )就可以求出另一个; 具体的, 将根据已知的 DNS查 询请求的数量和公式( 1 )计算出的测量指标类型的数量称为测量指标类型的 预测值; 其中, 公式(1 ) 中的各个变量或参数的意义如下: It can be seen from the above that if any one of the number of DNS query requests and the number of measurement index types is known, another one can be obtained according to formula (1); specifically, the number and formula of the query according to the known DNS query will be obtained. (1) The calculated number of measurement index types is called the predicted value of the measurement index type; wherein, the meaning of each variable or parameter in formula (1) is as follows:
N,为检测周期内的域名查询请求的数量; N, the number of domain name query requests within the detection period;
为在正常网络状态下根据域名查询请求的数量计算出的检测周期内的 测量指标类型的预测值; The predicted value of the type of measurement indicator in the detection period calculated according to the number of domain name query requests in the normal network state;
β、 为预先获取的、 表示域名查询请求的数量和测量指标类型的预测 值之间映射关系的参数, 参数 的取值范围为 0〜1 , 参数 的取值范围为 0-100, 具体的参数 、 的获取过程将在后续进行详细介绍。 β, pre-acquired, indicating the number of domain name query requests and the type of measurement indicator The parameter of the mapping relationship between values, the parameter range is 0~1, and the parameter range is 0-100. The specific parameters and the acquisition process will be described in detail later.
进一步, 由堆积定律可知, 当 DNS查询请求的数量增加时, 测量指标类 型的数量会突然增大, 然后增速放緩, 但始终会增加。 在正常网络状态下, 根据 DNS查询请求的数量和公式( 1 )计算出测量指标类型的预测值, 应该 与测量指标类型的实际值相同或相近。 Further, it is known from the stacking law that as the number of DNS query requests increases, the number of measurement metric types suddenly increases, and then the growth rate slows down, but it always increases. Under normal network conditions, the predicted value of the type of measurement indicator is calculated according to the number of DNS query requests and the formula (1), which should be the same or similar to the actual value of the measurement indicator type.
步骤 13 , 确定测量指标类型的实际值和测量指标类型的预测值的第一差 值; Step 13: determining a first difference between the actual value of the measurement indicator type and the predicted value of the measurement indicator type;
具体的, 将实际统计出的测量指标类型的实际值和根据公式( 1 )计算出 的测量指标类型的预测值做差, 并将差值取绝对值, 获取第一差值。 Specifically, the actual value of the actually measured type of the measurement index is compared with the predicted value of the type of the measurement index calculated according to the formula (1), and the difference is taken as an absolute value to obtain the first difference.
根据 DNS查询请求和测量指标类型之间的映射关系即堆积定律可知,若 网络正常, 则测量指标类型的实际值和测量指标类型的预测值应该相同或相 近, 因此, 第一差值的大小可以表征测量指标类型的实际值和测量指标类型 的预测值的接近程度, 进而可以表明域名系统流量状况。 According to the mapping relationship between the DNS query request and the measurement index type, that is, the stacking law, if the network is normal, the actual value of the measurement index type and the prediction value of the measurement index type should be the same or similar, therefore, the size of the first difference may be The proximity of the actual value of the type of measurement indicator to the predicted value of the type of measurement indicator, which in turn indicates the status of the domain name system traffic.
步骤 14, 在判断出第一差值大于预先获取的阈值时, 输出域名系统流量 异常报警信息。 Step 14. When it is determined that the first difference is greater than the pre-acquired threshold, the domain name system traffic abnormal alarm information is output.
DNS服务器在获取到第一差值后, 将第一差值和预先获取的阈值进行比 较, 当比较出第一差值大于预先获取的阈值时, 说明测量指标类型的实际值 和测量指标类型的预测值相差较大, 进而说明此时 DNS服务器流量不正常, 应输出流量异常报警信息。 After obtaining the first difference, the DNS server compares the first difference with the pre-acquired threshold. When comparing the first difference with the pre-acquired threshold, the actual value of the measurement indicator type and the type of the measurement indicator are The predicted values differ greatly, which indicates that the DNS server traffic is abnormal at this time, and the traffic abnormal alarm information should be output.
在本实施例中, 并不限定阈值的获取方式, 该阈值可以是在实际应用中 获取的经验值, 也可以是根据应用场景预设的允许波动的范围值。 本实施例 优选在正常网络状态下, 通过获取多个测试周期的测量指标类型的实际值和 测量指标类型的预测值之间的第二差值, 并取其中最大的第二差值作为本步 骤 14中的阈值。 值得说明的是, 该阈值在执行本步骤之前获取, 但并不限制 获取该阈值之后一定要进入检测周期。 本实施例的域名系统流量检测方法, 根据域名查询请求和测量指标类型 之间的映射关系即堆积定律, 获取测量指标类型的预测值; 将测量指标类型 的实际值和预测值进行比较,根据两者差值的范围来判断 DNS服务器流量是 否异常;其中,堆积定律将域名查询请求和测量指标结合起来检测 DNS流量, 与现有技术相比, 可以降低判定 DNS流量异常时的误报率, 提高检测 DNS 流量异常的准确性; 同时本发明技术方案基于检测周期内的域名查询请求来 检测 DNS服务器的流量, 并不像现有技术那样瞬时做出判断, 因此, 进一步 提高了检测 DNS流量异常的准确性和有效性。 In this embodiment, the threshold value is not limited, and the threshold may be an empirical value obtained in an actual application, or may be a range value of the allowed fluctuation according to the application scenario. Preferably, in the normal network state, the second difference between the actual value of the measurement index type and the predicted value of the measurement index type of multiple test periods is obtained, and the largest second difference is taken as the current step. The threshold in 14. It is worth noting that the threshold is acquired before performing this step, but it is not limited to enter the detection period after acquiring the threshold. The domain name system traffic detection method in this embodiment obtains the predicted value of the measurement index type according to the mapping relationship between the domain name query request and the measurement index type, and compares the actual value of the measurement index type with the predicted value according to the two The range of the difference is used to determine whether the DNS server traffic is abnormal. The stacking law combines the domain name query request with the measurement index to detect the DNS traffic. Compared with the prior art, the false alarm rate when determining the abnormal DNS traffic can be reduced. The accuracy of the abnormality of the DNS traffic is detected. At the same time, the technical solution of the present invention detects the traffic of the DNS server based on the domain name query request in the detection period, and does not make the judgment instantaneously as in the prior art, thereby further improving the abnormality of detecting the DNS traffic. Accuracy and effectiveness.
通常, DNS服务器通过对其所接收的域名查询请求进行应答来实现对外 域名解析服务, 其中典型的域名查询请求包括时间戳, 源 IP地址, 端口号, 查询域名, 资源类型等字段。 因此, 在本实施例中, 从查询请求中获取的测 量指标是指域名查询请求中的各个字段值, 即测量指标可以是时间戳、 源 IP 地址、 端口号、 查询域名、 资源类型等。 Generally, the DNS server performs the external domain name resolution service by responding to the domain name query request received by the DNS server. The typical domain name query request includes a timestamp, a source IP address, a port number, a query domain name, and a resource type. Therefore, in this embodiment, the measurement indicator obtained from the query request refers to each field value in the domain name query request, that is, the measurement indicator may be a timestamp, a source IP address, a port number, a query domain name, a resource type, and the like.
进一步, 本实施例提供的获取阈值以及公式( 1 )中参数的实现方式具体 如下: Further, the obtaining threshold value and the implementation manner of the parameter in the formula (1) provided by the embodiment are as follows:
在正常网络状态下, 设置多个测试周期, 则如图 2所示, 该实现过程具 体包括以下步骤: In the normal network state, multiple test cycles are set, as shown in FIG. 2, the implementation process specifically includes the following steps:
步骤 111 , 获取每个测试周期内接收到的域名查询请求的数量和测量指 标类型的实际值; Step 111: Obtain the number of domain name query requests received during each test period and the actual value of the measurement indicator type;
其中测试周期与检测周期相类似,其区别在于测试周期在检测周期之前, 以提供检测周期所需的各种参数和信息, 并且测试周期一般选择在网络性能 比较稳定的时期, 即在正常网络状态下, 进行测试。 The test period is similar to the detection period. The difference is that the test period is before the detection period to provide various parameters and information required for the detection period, and the test period is generally selected during a period in which the network performance is relatively stable, that is, in a normal network state. Next, test it.
具体的, 本步骤 111获取测量指标类型的实际值的过程与步骤 11相同, 不再详细论述。 Specifically, the process of obtaining the actual value of the measurement indicator type in this step 111 is the same as that in step 11, and will not be discussed in detail.
步骤 112, 对获取到的多个测试周期内的域名查询请求的数量和测量指 标类型的实际值进行线性拟合, 并根据拟合结果获取参数 β和参数 ; 其中, 线性拟合可以采用最小二乘法、 对等分三组平均法或是分段最佳 斜率平均法, 本实施例优选为最小二乘法, 即通过最小二乘法确定域名查询 请求的数量和测量指标类型的实际值之间的线性关系, 以及线性系数, 即参 数 和参数 。 Step 112: linearly fitting the number of domain name query requests and the actual value of the measurement index type in the obtained multiple test periods, and obtaining the parameter β and the parameter according to the fitting result; Wherein, the linear fitting may be a least square method, an equal-partition three-group averaging method or a piecewise optimal slope averaging method, and this embodiment is preferably a least square method, that is, determining the number and measurement of the domain name query request by the least squares method. The linear relationship between the actual values of the indicator types, as well as the linear coefficients, ie parameters and parameters.
步骤 113 , 根据域名查询请求和测量指标的映射关系, 计算每个测试周 期的测量指标类型的预测值; Step 113: Calculate a predicted value of the type of the measurement indicator for each test period according to the mapping relationship between the domain name query request and the measurement indicator;
具体的, 根据公式(2 )计算每个测试周期的测量指标类型的预测值, 其 中公式(2 )如下: Specifically, the predicted value of the type of the measurement index for each test period is calculated according to the formula (2), wherein the formula (2) is as follows:
log(F2') - ^log(N2) + ^ ( 2 ) Log(F 2 ') - ^log(N 2 ) + ^ ( 2 )
其中, N2为每个测试周期的域名查询请求的数量; I 为每个测试周期的 测量指标类型的预测值; β、 Κ为根据上述步骤 111和步骤 112获取的参数, 其中参数 的取值范围为 0〜1 , 参数 的取值范围为 0〜100。 Where N 2 is the number of domain name query requests for each test period; I is the predicted value of the type of measurement indicator for each test period; β, Κ is the parameter obtained according to step 111 and step 112 above, where the value of the parameter The range is 0~1, and the parameter range is 0~100.
步骤 114, 确定每个测试周期的测量指标类型的实际值和测量指标类型 的预测值的第二差值; Step 114: Determine a second difference between the actual value of the measurement indicator type of each test period and the predicted value of the measurement indicator type;
具体的, 将每个测试周期的测量指标类型的实际值和测量指标类型的预 测值做差并取绝对值的结果作为第二差值。 Specifically, the actual value of the measurement index type of each test period and the predicted value of the measurement index type are made a difference and the result of taking the absolute value is used as the second difference.
步骤 115 , 获取多个测试周期的第二差值中最大的第二差值作为阈值, 以供检测域名系统流量。 Step 115: Obtain a second largest difference among the second differences of the multiple test periods as a threshold for detecting domain name system traffic.
值得说明的是, 本实施例提供的方法同时可以获取参数和阈值, 即在获 取参数 和参数 后, 直接进行后续操作以获取阈值, 即获取参数和阈值使 用相同的测试周期, 但是, 在实际应用中获取参数和阈值的过程可以是独立 的, 即可以设置不同的测试周期分别用于获取参数和阈值, 本实施例提供一 种较佳的实施方式, 其效率较高。 It should be noted that the method provided in this embodiment can acquire parameters and thresholds at the same time, that is, after obtaining the parameters and parameters, the subsequent operations are directly performed to obtain the threshold, that is, the acquisition parameters and the thresholds use the same test period, but in practical applications. The process of obtaining parameters and thresholds may be independent, that is, different test periods may be set for acquiring parameters and thresholds respectively. This embodiment provides a preferred embodiment, and the efficiency is high.
本实施例中的参数和阈值, 通过对正常网络进行测试获取, 其测试过程 和实际检测过程相似,因此,基于本实施例提供的参数和阈值检测 DNS流量, 其检测准确性、 有效性高。 另外, 本实施例并未对测试周期和测试周期的数 量进行限制, 一般而言测试周期的数量越多所得到的阈值越接近实际情况, 基于该阈值检测 DNS流量时检测效果就越好。 The parameters and thresholds in this embodiment are obtained by testing the normal network. The test process is similar to the actual detection process. Therefore, the DNS traffic is detected based on the parameters and thresholds provided in this embodiment, and the detection accuracy and effectiveness are high. In addition, this embodiment does not count the number of test cycles and test cycles. The amount is limited. Generally, the more the number of test cycles, the closer the threshold is to the actual situation, and the better the detection effect is when the DNS traffic is detected based on the threshold.
网络攻击的方式多种多样,例如:攻击方为了降低本地 DNS緩存命中率, 提高攻击效果, 往往会随机生成任意域名发往攻击对象; 或者攻击者为了提 高自己的隐蔽性, 而通过控制超大规模的僵尸网络, 甚至伪造大量的源 IP地 址实现攻击, 因此, 导致域名系统流量异常的原因也是多样的。 基于此, 本 实施例中的测量指标不仅可以是从域名查询请求中获取的单个测量参数, 例 如源 IP地址或者查询域名等, 还可以是多个测量参数的集合, 例如同时包括 源 IP地址和查询请求等以应对多种情况。 其中测量参数即指从域名查询请求 中获取的源 IP地址、 查询域名或端口号等。 There are many ways to attack a network. For example, in order to reduce the local DNS cache hit rate and improve the attack effect, the attacker will randomly generate any domain name and send it to the attack object. Or the attacker can control the hyperscale by improving his hiddenness. The botnet, even forging a large number of source IP addresses to achieve attacks, therefore, the reasons for the abnormality of the domain name system traffic are also diverse. Based on this, the measurement index in this embodiment may be not only a single measurement parameter obtained from a domain name query request, such as a source IP address or a query domain name, but also a set of multiple measurement parameters, for example, including a source IP address and Query requests, etc. to deal with a variety of situations. The measurement parameter refers to the source IP address, query domain name or port number obtained from the domain name query request.
当测量指标包括多个测量参数时, 本实施例提供的域名系统流量检测方 法需要分别获取各测量参数类型的实际值和各测量参数类型的预测值; 并分 别确定各测量参数类型的实际值与各测量参数类型的预测值的第一差值; 并 在任一第一差值大于任一第一差值对应的第一阈值时, 输出域名系统流量异 常报警信息。 其中各第一差值对应的第一阈值可以相同也可以不同, 各第一 阈值的获取过程同上述步骤 111至步骤 115所述。 When the measurement indicator includes multiple measurement parameters, the domain name system traffic detection method provided in this embodiment needs to obtain the actual value of each measurement parameter type and the prediction value of each measurement parameter type separately; and determine the actual value of each measurement parameter type respectively. And a first difference value of the predicted values of the measured parameter types; and when any of the first differences is greater than a first threshold corresponding to any of the first differences, the domain name system traffic abnormality alarm information is output. The first threshold corresponding to each first difference may be the same or different, and the acquiring process of each first threshold is the same as the foregoing step 111 to step 115.
本实施例提供的域名系统流量检测方法, 根据多个测量参数对域名系统 流量进行检测, 其适应性更强。 The domain name system traffic detection method provided in this embodiment detects the domain name system traffic according to multiple measurement parameters, and the adaptability thereof is stronger.
进一步, 在本发明以下各实施例中将以源 IP地址和查询域名为例进行说 明。 Further, in the following embodiments of the present invention, the source IP address and the query domain name are taken as an example for description.
实施例二 Embodiment 2
图 3为本发明实施例二提供的域名系统流量检测方法的流程图。 本实施 例将基于上述实施例实现, 具体的本实施例将结合实际应用对本发明的技术 方案从整体上做进一步说明。 FIG. 3 is a flowchart of a method for detecting a domain name system traffic according to Embodiment 2 of the present invention. This embodiment will be implemented based on the above embodiments. The specific embodiment of the present invention will further explain the technical solution of the present invention in combination with practical applications.
以 CN域名为例, 截止 2009年底, CN域名注册量达到 1345.6万, CN 域名服务器每天接收到的来自世界各地的 DNS查询请求总量接近 15亿次, 每秒接收的查询峰值接近 6万次。 一旦 CN域名服务器出现异常情况, 将危 及到其下数以千万计的二级域名的安全。 因此, 本实施例将在 CN域名服务 器上实施本发明提供的技术方案, 即根据本发明提供的方法检测 CN域名服 务器的流量。 具体的本实施例以半小时为一测试周期, 总的测试时间为 24小 时, 并以查询域名和源 IP地址两个测量指标为例, 如图 3所示, 本实施例的 方法包括: Taking the CN domain name as an example, as of the end of 2009, the number of CN domain name registrations reached 13.456 million, and the total number of DNS query requests received by CN domain name servers from around the world was nearly 1.5 billion times. The peak of queries received per second is close to 60,000 times. Once the CN domain name server is abnormal, it will endanger the security of its tens of millions of second-level domain names. Therefore, this embodiment implements the technical solution provided by the present invention on the CN domain name server, that is, detects the traffic of the CN domain name server according to the method provided by the present invention. The specific embodiment is a test period of half an hour, and the total test time is 24 hours. The two measurement indicators of the domain name and the source IP address are taken as an example. As shown in FIG. 3, the method in this embodiment includes:
步骤 31 , 将查询域名的实际数量值记为 Vname、 源 IP地址的实际数量值 记为 Vip以及将 DNS域名查询请求的数量记为 N, 并分别将 Vname、 Vip、 N初 始化为 0; Step 31: Record the actual quantity value of the query domain name as V name , the actual quantity value of the source IP address as V ip , and the number of DNS domain name query requests as N, and initialize V name , V ip , N respectively to 0;
步骤 32, 接收 DNS域名查询请求, 并更新 Vname、 Vip和 N; Step 32, receiving a DNS domain name query request, and updating V name , V ip and N;
具体的,获取域名查询请求中的信息,该信息包括查询域名和源 IP地址; 判断其中的查询域名是否是新出现的域名, 若是, 则将 Vname增加 1 , 以实现 对 Vnam 更新; 反之, Vname保持不变; 同理, 判断源 IP地址是否是新出现 的源 IP地址, 若是, 则将 Vip加 1 , 以实现对 Vip的更新; 反之, Vip保持不 变。 例如, 获取的当前域名查询请求中的源 IP地址为 192.168.200.1 , 并与之 前已接收到其他域名查询请求包括的源 IP地址进行比较, 判断是否已经存在 源 IP地址: 192.168.200.1 , 若存在, 则 Vip保持不变; 若不存在, 则将 Vip加 1。 Specifically, the information in the domain name query request is obtained, where the information includes the query domain name and the source IP address; determining whether the query domain name is a newly appearing domain name, and if yes, adding V name to 1 to implement V nam update; V name remains unchanged; for the same reason, it is judged whether the source IP address is the newly-created source IP address, and if so, V ip is incremented by 1 to implement the update of V ip ; otherwise, V ip remains unchanged. For example, the source IP address in the current domain name query request is 192.168.200.1, and is compared with the source IP address that has been received by other domain name query requests to determine whether the source IP address already exists: 192.168.200.1, if present , then V ip remains unchanged; if not, V ip is incremented by 1.
步骤 33 , 判断测试周期是否已到; Step 33: Determine whether the test period has arrived;
本步骤判断从开始接收域名查询请求是否已经半个小时, 若是, 则执行 步骤 34; 反之, 则执行步骤 32; This step determines whether the domain name query request has been received from the beginning for half an hour, and if so, step 34 is performed; otherwise, step 32 is performed;
步骤 34, 记录当前测试周期的 Vname、 Vip和 N; Step 34, recording V name , V ip and N of the current test period;
即累计每个测试周期的查询域名的实际值 Vname、 源 IP地址的实际值 Vip 和域名查询请求的数量 N, 并存储起来, 以供后续处理使用。 That is, the actual value V name of the query domain name , the actual value V ip of the source IP address, and the number N of the domain name query request are accumulated for each test period, and are stored for subsequent processing.
步骤 35, 判断测试时间是否已到; Step 35, determining whether the test time has expired;
本实施例中指从开始到此时, 是否已经到了 24小时, 例如可以通过计时 器来记录测试周期和测试时间; 若是, 则执行步骤 36;反之, 则执行步骤 31 ; 步骤 36, 分别计算参数 βη„ Kname和参数 βιρ, Κιρ; In this embodiment, it refers to whether it has reached 24 hours from the beginning to the time, for example, it can be timed. The device records the test period and the test time; if yes, step 36 is performed; otherwise, step 31 is performed; step 36, parameters β η „ K name and parameters β ιρ , Κ ιρ are respectively calculated;
具体的, 本步骤根据记录的多个测试周期(具体为 48个测试周期) 内的 N进行线性拟合, 双对数变换后的拟合结果如图 4所示, 其中虚线为 拟合结果, 并根据拟合结果得到参数 βη,=0.4937, Kname=6.7017; 同理, 本 步骤根据记录的多个测试周期内的 Vip和 N进行线性拟合, 双对数变换后的 拟合结果如图 5 所述, 其中虚线为拟合结果, 并根据拟合结果得到参数 βίρ=0.3759, Kip=6.5222„ Specifically, this step is based on multiple test cycles (specifically 48 test cycles) recorded. N is linearly fitted, and the fitting result after double logarithmic transformation is shown in Fig. 4. The dotted line is the fitting result, and the parameter β η is obtained according to the fitting result, = 0.4937, K name = 6.7017; similarly, this The steps are linearly fitted according to V ip and N in the recorded test cycles. The fitting result after double logarithmic transformation is as shown in Fig. 5, wherein the dotted line is the fitting result, and the parameter β ίρ is obtained according to the fitting result. =0.3759, K ip =6.5222„
图 4、 图 5的横坐标为域名查询请求的累计总数, 纵坐标分别为查询域 名的累计总数和源 IP地址的累计总数,结合图 4和图 5对上述结果进行分析, 可知在正常网络状态下, 查询域名的累计总数、 源 IP地址的累计总数和 DNS 域名查询请求的总数在双对数变换后存在线性关系, 即符合堆积定律。 The abscissa of FIG. 4 and FIG. 5 is the cumulative total number of domain name query requests, and the ordinate is the cumulative total of the query domain name and the cumulative total number of source IP addresses respectively. The above results are analyzed in combination with FIG. 4 and FIG. 5, and the normal network state is known. Next, the cumulative total number of query domain names, the cumulative total number of source IP addresses, and the total number of DNS domain name query requests have a linear relationship after the double logarithmic transformation, that is, the stacking law is met.
步骤 37, 计算查询域名对应的阈值 Yname和源 IP地址对应的阈值 Υιρ; 具体的, 本步骤计算每个测试周期的查询域名的预测值记为 V,name、 源 IP地址的预测值记为 V,ip, 以第 i(l≤i≤48)个测试周期为例, 其计算过程为: 根据步骤 36中计算出的参数 βη„ Kname, 利用公式(3 )计算 V name; log(V'name)i =β elog(Ni)+Kn 3 ) Step 37: Calculate a threshold value Y name corresponding to the query domain name and a threshold value Υ ιρ corresponding to the source IP address. Specifically, in this step, the predicted value of the query domain name for each test period is calculated as V, name , and the predicted value of the source IP address. For V, ip , taking the i-th (l≤i≤48) test period as an example, the calculation process is as follows: According to the parameter β η „ K name calculated in step 36, calculate V name by using formula (3); log (V' name )i =β e log(Ni)+K n 3 )
其中 (ν'η^Α为第 i个测试周期的查询域名的预测值; 为第 i个测试周 期内的 DNS域名查询请求的数量; Where (ν'η^Α is the predicted value of the query domain name for the i-th test period; the number of DNS domain name query requests for the i-th test period;
根据公式(4 )计算第 i个测试周期的查询域名的实际值 (V^A和查询域 名的预测值 (V'^o^之间的绝对误差 Υ1; Calculate the actual value of the query domain name of the i-th test period according to formula (4) (V^A and the predicted value of the query domain name (absolute error V 1 between V'^o^ ;
( 4 ) (4)
根据上述方法计算出每个测试周期的绝对误差, 并将最大绝对误差作为 阈值 Yname, 即Calculate the absolute error of each test cycle according to the above method, and use the maximum absolute error as the threshold Y name , ie
在本实施例中, i大于等于 1 小于等于 48, 即进行测试的测试周期数为 48, 且该测试周期的个数是根据测试周期的长度和测试时间求出的, 但是并 不限于此, 根据具体应用环境可以选择不同的测试周期和测试时间。 In this embodiment, i is greater than or equal to 1 and less than or equal to 48, that is, the number of test cycles for testing is 48, and the number of the test period is determined according to the length of the test period and the test time, but is not limited thereto, and different test periods and test times can be selected according to the specific application environment.
同理, 根据公式(6 )和公式(7 )计算 Υιρ , Similarly, calculate Υ ιρ according to formula (6) and formula (7).
logCV^, =βιρ1ο§(Ν1)+Κιρ ( 6 ) logCV^, =β ιρ 1ο § (Ν 1 )+Κ ιρ ( 6 )
Y^maxdlogCV'^-logCV^I} ( 7 )。 Y^maxdlogCV'^-logCV^I} (7).
在计算出上述各个参数和阈值之后,通过步骤 38及后续步骤对 CN域名 服务器的流量进行检测, 假设检测周期也为半个小时; After calculating the above various parameters and thresholds, the traffic of the CN domain name server is detected through step 38 and subsequent steps, and the detection period is also half an hour;
步骤 38, 检测周期开始, 将 Vname、 Vip和 N初始化为 0; Step 38, the detection cycle begins, and V name , V ip , and N are initialized to 0;
步骤 39, 接收域名查询请求, 并更新 Vname、 Vip和 N; 具体的, 该步骤 同步骤 32; Step 39, receiving a domain name query request, and updating V name , V ip and N; specifically, the step is the same as step 32;
步骤 40, 判断检测周期是否结束; Step 40: Determine whether the detection period ends;
即判断从测试开始到当前时刻, 是否已经达到预先设定的检测周期的时 长(例如, 30分钟) , 若是, 则执行步骤 41 ; 反之, 则执行步骤 39; That is, it is judged whether the time of the preset detection period has been reached from the start of the test to the current time (for example, 30 minutes), and if so, step 41 is performed; otherwise, step 39 is performed;
步骤 41 , 记录当前检测周期的 Vname、 Vip和 N, 并计算 V,name、 V,ip; 具体的, 获取当前检测周期内的 CN域名查询请求的数量、 查询域名的 实际值和源 IP地址的实际值后,根据公式(3 )和上述步骤计算出的参数 pname, Kname计算出 V,name; 根据公式(6 )和上述步骤计算出的参数 βιρ, Κιρ计算出 V,1P; Step 41: Record the V name , V ip, and N of the current detection period, and calculate V, name , V, and ip . Specifically, obtain the number of CN domain name query requests, the actual value of the query domain name, and the source IP address in the current detection period. After the actual value of the address, V, name is calculated according to the formula (3) and the parameters p name and K name calculated by the above steps; V is calculated according to the formula (6) and the parameters β ιρ , Κ ιρ calculated by the above steps, 1P ;
步骤 42, 计算检测周期的 Vname和 V'name、 V'ip和 Vip的绝对差值; 即计算 |log ( V'name ) -log ( Vname ) I和 |log ( V'name ) -log ( Vname ) |; Step 42: Calculate the absolute difference between V name and V' name , V' ip and V ip of the detection period; that is, calculate |log ( V' name ) -log ( V name ) I and |log ( V' name ) - Log ( V name ) |;
步骤 43 , 分别比较绝对差值与其对应的阈值的大小关系, 并当存在绝对 差值大于阈值时进行 CN域名服务器流量异常报警。 Step 43: Compare the magnitude relationship between the absolute difference and the corresponding threshold, and perform an abnormality alarm of the CN domain name server when the absolute difference is greater than the threshold.
具体的, 分别比较绝对差值 |log ( V'name ) -log ( Vname ) I与阈值 Yname的大 小, 绝对差值 |log ( V'name ) -log ( Vname ) I与阈值 Yip的大小; 若 |log ( V'name ) -log ( Vname ) I大于 Yname,或者 I log ( V,ip ) -log ( Vip ) I大于 Yip,或者 |log ( V'name ) -log ( Vname ) I大于 Yname, 且 I log ( V,ip ) -log ( Vip ) I大于 Yip时, 则发出流量 异常报警; 反之, 说明 CN域名服务器流量正常, 进一步说明 CN域名服务 器的工作状态良好, 则执行步骤 38, 即开始新的检测周期。 Specifically, the absolute difference |log ( V' name ) -log ( V name ) I and the threshold Y name are respectively compared, and the absolute difference |log ( V' name ) -log ( V name ) I and the threshold Y ip The size of |log ( V' name ) -log ( V name ) I is greater than Y name , or I log ( V, ip ) -log ( V ip ) I is greater than Y ip , or |log ( V' name ) - When log ( V name ) I is greater than Y name and I log ( V, ip ) -log ( V ip ) I is greater than Y ip , the traffic is sent. Abnormal alarm; otherwise, the CN domain name server traffic is normal. If the CN domain name server is working well, go to step 38 to start a new detection cycle.
在本实施例中, 同时以查询域名和源 IP地址为例进行了说明, 但是需要 说明的是这两个过程是独立的, 是并行实施的两个过程, 即如步骤 43所述, 只要查询域名和源 IP地址之中有一个对应的绝对差值大于对应的阈值, 即发 出流量异常报警。 In this embodiment, the query domain name and the source IP address are taken as an example for description, but it should be noted that the two processes are independent, and are two processes implemented in parallel, that is, as described in step 43, as long as the query One of the domain name and the source IP address has a corresponding absolute difference greater than the corresponding threshold, that is, a traffic abnormality alarm is issued.
具体的, 若攻击者通过域名进行网络攻击, 则可以通过查询域名数据量 的变化情况来判断; 若攻击者通过伪造源 IP地址进行网络攻击, 则由此所导 致的流量异常将无法体现在 Vname和 V,name的差异上, 这时可以通过观察 Vip 的异常变化情况, 来实现流量异常检测的目的。 Specifically, if an attacker conducts a network attack through a domain name, it can be judged by querying the change of the domain name data volume. If the attacker spoofs the source IP address for network attack, the traffic abnormality caused by the attacker cannot be reflected in the V. The difference between name and V, name , at this time can observe the abnormal changes of V ip , to achieve the purpose of traffic anomaly detection.
本实施例基于 CN域名服务器对本发明的技术方案进行了全面详细的说 明,本实施例的域名系统流量检测方法同时基于 DNS域名查询请求的数量与 查询域名的数量之间的映射关系和 DNS域名查询请求的数量与源 IP地址的 数量之间的映射关系, 可以从不同的角度对 CN域名服务器的流量进行检测, 可以进一步提高检测的准确性, 降低误报率; 同时, 本发明技术方案计算量 相对较小, 部署成本较低, 适合在大型 DNS服务器上使用。 In this embodiment, the technical solution of the present invention is described in detail based on the CN domain name server. The domain name system traffic detection method in this embodiment is based on the mapping relationship between the number of DNS domain name query requests and the number of query domain names and the DNS domain name query. The mapping between the number of requests and the number of source IP addresses can detect the traffic of the CN domain name server from different angles, which can further improve the accuracy of detection and reduce the false alarm rate. Meanwhile, the technical solution of the present invention calculates the amount of calculation. Relatively small, low deployment costs, suitable for use on large DNS servers.
进一步, 本实施例对 CN域名服务器进行了多个检测周期的检测, 并得 到如图 4和图 5中的圆圈所示的双对数变换后的检测结果, 由图可知与双对 数变换后的拟合结果基本一致, 说明 CN域名服务器工作状态正常。 Further, in this embodiment, multiple detection cycles are detected on the CN domain name server, and the detection results after the double logarithm transformation shown in the circles in FIG. 4 and FIG. 5 are obtained, which can be seen from the figure and after the double logarithmic transformation. The results of the fitting are basically the same, indicating that the CN domain name server is working normally.
进一步,发明人在 C++语言环境下, 通过模拟向 DNS服务器端发送大量 不存在的域名查询请求来实施分布式拒绝服务 (Distributed Denial of Service; 简称为: DDOS)攻击的实验, 对本发明的技术方案的性能进行了测试。 Further, the inventor performs an experiment of distributing a Denial of Denial of Service (DDOS) attack by simulating a large number of non-existing domain name query requests to the DNS server in a C++ language environment, and the technical solution of the present invention The performance was tested.
具体的: 在 C++语言环境下, 采用 STL ( Standard Template Library ) 中 的标准关联容器 set来记录查询域名的实际值 Vname的集合和源 IP地址的实际 值 Vip的集合, 并在内存中进行维护, 每来一个 DNS查询请求就对这两个集 合进行插入操作; 本实验中设置测试周期的长度和测试周期的数目分别为 30 分钟和 48, 通过测试阶段得到 pname=0.4937, Kname=6.7017, 由此计算得到的 阈值 Yname=0.03。 并从第 50个周期开始实施 DDOS攻击, 此时 DNS服务器 端接收到的 DNS查询请求异常增多,图 6为本发明实施例的实验过程中域名 查询请求的数量与查询域名的数量随时间的分布示意图, 可以看到在该周期 结束时所观测到的 Vname异常增大, 数据点的位置与拟合直线发生明显偏离, 经过计算 |log ( V,name ) -log ( Vname ) I为 0.09, 超过获取的阈值 Yname=0.03 , 此 时, 通过流量异常报警信息提示域名系统流量异常。 此外,本发明提供的技术方案还可以对于查询域名的实际值 Vname增量异 常过小、 源 IP地址的实际值 Vip异常增大或增量异常过小的情况进行有了效 检测。 其原理相似, 故不再——论述。 Specifically: In the C++ language environment, the standard association container set in the STL (Standard Template Library) is used to record the set of the actual value V name of the query domain name and the actual value V ip of the source IP address, and perform in memory. Maintenance, each time a DNS query request is inserted into the two sets; the length of the test cycle and the number of test cycles are set to 30 in this experiment. Minutes and 48, through the test phase, p name = 0.4937, K name = 6.7017, and the resulting threshold Y name = 0.03. And the DDOS attack is implemented from the 50th cycle. At this time, the DNS query request received by the DNS server is abnormally increased. FIG. 6 is a distribution of the number of domain name query requests and the number of query domain names in the experiment process according to the embodiment of the present invention. Schematic, you can see that the V name observed at the end of the cycle is abnormally increased, and the position of the data point deviates significantly from the fitted straight line. After calculating |log ( V, name ) -log ( V name ) I is 0.09 Exceeded the obtained threshold Y name = 0.03. At this time, the traffic of the domain name system is abnormal due to the traffic abnormality alarm message. In addition, the technical solution provided by the present invention can also effectively detect that the actual value V name of the query domain name is abnormally too small, the actual value of the source IP address V ip is abnormally increased, or the increment is abnormally too small. The principle is similar, so it is no longer - discussion.
由于 set容器封装了一种非常高效的平衡检索二叉树: 红黑树 (Red-Black Tree),在对 set集合进行二分查找和插入时的时间复杂度为 0(log2V),其中 V 为 ^^或 Vip。 如图 7所示, 设 V大小为 104时对其进行查找所需时间为 t, 则当 V上升为 108时对其进行查找所需时间仅为 2t, 可见 V的增大对于查找 和插入的计算代价的增长作用有限。 因此, 本发明技术方案计算量相对较小, 部署成本较低, 适合在大型 DNS服务器上使用。 Since the set container encapsulates a very efficient balanced search binary tree: Red-Black Tree, the time complexity of binary search and insertion of set sets is 0 (log 2 V), where V is ^ ^ or V ip . As shown in Fig. 7, when the V size is 10 4 , the time required to search for it is t, then the time required to find V when it rises to 10 8 is only 2t, and it can be seen that the increase of V is for the search and The growth of the computational cost of insertion is limited. Therefore, the technical solution of the present invention has a relatively small amount of calculation and a low deployment cost, and is suitable for use on a large-scale DNS server.
实施例三 Embodiment 3
图 8为本发明实施例三提供的域名服务器的结构示意图, 如图 8所示, 本实施例的域名服务器包括: 实际值获取模块 81、 预测值获取模块 82、 第一 差值确定模块 83和判断输出模块 84。 FIG. 8 is a schematic structural diagram of a domain name server according to Embodiment 3 of the present invention. As shown in FIG. 8, the domain name server of this embodiment includes: an actual value obtaining module 81, a predicted value obtaining module 82, a first difference determining module 83, and The output module 84 is judged.
其中,实际值获 莫块 81用于在接收到域名查询请求时获取检测周期内 接收到的域名查询请求的数量和测量指标类型的实际值; 预测值获取模块 82 与实际值获取模块 81连接,用于根据域名查询请求和测量指标的映射关系和 域名查询请求的数量, 获取测量指标类型的预测值; 其中映射关系是指域名 查询请求的数量和测量指标类型的数量之间满足的堆积定律, 如公式( 1 )所 示。 第一差值确定模块 83与实际值获取模块 81和预测值获取模块 82连接, 用于在获取测量指标类型的实际值和测量指标类型的预测值后, 计算测量指 标类型的实际值和预测值的差值, 并取绝对值确定第一差值, 并将第一差值 提供给判断输出模块 84; 判断输出模块 84将第一差值与预先获取的阈值进 行比较, 判断第一差值和阈值的大小, 并在判断出第一差值大于阈值时, 输 出域名服务器流量异常报警信息; 若判断出第一差值小于阈值时, 则不输出 域名服务器流量异常报警信息, 继续对下一检测周期进行判断。 The actual value obtaining block 81 is configured to acquire the number of the domain name query request and the actual value of the measurement index type received during the detection period when the domain name query request is received; the predicted value obtaining module 82 is connected to the actual value obtaining module 81. The method is used to obtain a predicted value of a measurement indicator type according to a mapping relationship between a domain name query request and a measurement index, and a number of domain name query requests; wherein the mapping relationship refers to a stacking law that satisfies the number of domain name query requests and the number of measurement index types. As shown in formula (1). The first difference determining module 83 is connected to the actual value obtaining module 81 and the predicted value obtaining module 82, and is configured to calculate the actual value and the predicted value of the measured index type after acquiring the actual value of the measured index type and the predicted value of the measured index type. The difference value, and taking the absolute value to determine the first difference, and providing the first difference to the judgment output module 84; the judgment output module 84 compares the first difference with the pre-acquired threshold, and determines the first difference and The size of the threshold, and when it is determined that the first difference is greater than the threshold, the domain name server traffic abnormal alarm information is output; if it is determined that the first difference is less than the threshold, the domain name server traffic abnormal alarm information is not output, and the next detection is continued. The cycle is judged.
本实施例的域名服务器可用于执行本发明实施例提供的域名系统流量检 测方法, 由实际值获取模块获取检测周期内的域名查询请求的数量和测量指 标类型的实际值, 并由预测值获取模块根据域名查询请求和测量指标类型之 间的映射关系, 即堆积定律获取测量指标类型的预测值, 将测量指标类型的 预测值和实际值结合起来检测域名服务器的流量, 一方面基于对检测周期内 的域名查询请求的统计结果对域名服务器进行流量检测, 而不是实时进行检 测, 可以降低判定域名服务器流量异常时的误报率; 另一方面通过将测量指 标类型的实际值和根据映射关系计算出的测量指标类型的预测值进行比较, 并根据比较结果判断域名服务器流量是否发生异常, 与直接基于实际值的变 化进行判断相比, 提高了检测 DNS流量的准确性和有效性。 The domain name server of this embodiment may be used to perform the domain name system traffic detection method provided by the embodiment of the present invention. The actual value obtaining module acquires the number of domain name query requests and the actual value of the measurement index type in the detection period, and the predicted value acquisition module According to the mapping relationship between the domain name query request and the measurement index type, that is, the stacking law obtains the predicted value of the measurement index type, and combines the predicted value and the actual value of the measurement index type to detect the traffic of the domain name server, on the one hand based on the detection period The statistical result of the domain name query request performs traffic detection on the domain name server instead of detecting it in real time, which can reduce the false positive rate when the domain name server traffic is abnormal. On the other hand, the actual value of the measurement index type and the mapping relationship are calculated. The predicted values of the types of measurement indicators are compared, and whether the abnormality of the domain name server traffic is abnormal according to the comparison result is compared, and the accuracy and effectiveness of detecting the DNS traffic are improved compared with the judgment based on the change of the actual value.
其中, 本实施例中的测量指标可以是域名查询请求的数据包中的各个字 段值, 例如源 IP地址、 端口号、 查询域名等。 The measurement indicator in this embodiment may be each field value in the data packet of the domain name query request, such as a source IP address, a port number, a query domain name, and the like.
进一步, 本实施例的实际值获取模块 81包括: 第一获取子模块 811和第 二获取子模块 812。 Further, the actual value obtaining module 81 of this embodiment includes: a first obtaining submodule 811 and a second obtaining submodule 812.
其中, 第一获取子模块 811用于在检测周期内接收到任一域名查询请求 时, 将域名查询请求的数量增 1 , 以获取检测周期的域名查询请求的数量。 The first obtaining sub-module 811 is configured to increase the number of domain name query requests by one when receiving any domain name query request in the detection period, to obtain the number of domain name query requests for the detection period.
第二获取子模块 812用于获取检测周期内测量指标类型的实际值, 具体 包括:测量指标获取单元 8121和判断增值单元 8122。测量指标获取单元 8121 用于在检测周期内接收到任一域名查询请求时, 获取任一域名查询请求中包 括的测量指标, 例如源 IP地址、 查询域名、 端口号等; 判断增值单元 8122 用于将测量指标获取单元 8121 获取到的测量指标类型与已接收到其他域名 查询请求包括的测量指标的类型进行判断, 并在判断出测量指标获取单元 8121获取到的测量指标的类型与已经收到的其他域名查询请求包括的测量指 标的类型不同时, 将测量指标类型的实际值增 1 , 以获取检测周期内的测量 指标类型的实际值。 The second obtaining sub-module 812 is configured to obtain an actual value of the type of the measurement indicator in the detection period, and specifically includes: a measurement index obtaining unit 8121 and a determining value-adding unit 8122. The measurement index obtaining unit 8121 is configured to obtain any domain name query request packet when receiving any domain name query request within the detection period. The measurement indicator includes, for example, a source IP address, a query domain name, a port number, and the like. The judgment value-adding unit 8122 is configured to perform the measurement indicator type acquired by the measurement index obtaining unit 8121 and the type of the measurement indicator included in the other domain name query request. Judging, and determining that the type of the measurement index acquired by the measurement index obtaining unit 8121 is different from the type of the measurement index included in the other domain name query request that has been received, increasing the actual value of the measurement indicator type by one to obtain the detection period The actual value of the type of measurement within.
进一步,本实施例中的预测值获取模块 82中预先存储有域名查询请求和 测量指标的映射关系,该映射关系具体为公式(1 )所示的关系, 即堆积定律, 具体详见本发明域名系统流量检测方法实施例相应部分的描述。 Further, the predicted value obtaining module 82 in the embodiment pre-stores the mapping relationship between the domain name query request and the measurement index, and the mapping relationship is specifically the relationship shown in the formula (1), that is, the stacking law. Description of the corresponding part of the system traffic detection method embodiment.
由于测量指标和域名查询请求之间符合堆积定律, 因此, 根据变形后的 堆积定律可以准确计算出网络在正常状态下的测量指标的预测值, 对堆积定 律进行取对数处理, 一是为了简化计算过程, 二是为了更加直观的显示测量 指标和域名查询请求之间的关系。 Since the measurement index and the domain name query request conform to the stacking law, the predicted value of the measured index of the network under normal conditions can be accurately calculated according to the deformed deposition law, and the stacking law is logarithmically processed, one is to simplify The calculation process, the second is to more intuitively display the relationship between measurement indicators and domain name query requests.
实施例四 Embodiment 4
图 9为本发明实施例四提供的域名服务器的结构示意图, 本实施例基于 实施例三实现, 如图 9所示, 本实施例的域名服务器还包括: 参数获取模块 85和阈值获取模块 86。 FIG. 9 is a schematic structural diagram of a domain name server according to Embodiment 4 of the present invention. The embodiment is implemented based on Embodiment 3. As shown in FIG. 9, the domain name server in this embodiment further includes: a parameter obtaining module 85 and a threshold acquiring module 86.
其中,参数获耳 莫块 85包括第一实际值获取单元 851和第一参数获取单 元 852。 其中第一实际值获取单元 851用于获取多个测试周期内接收到的域 名查询请求的数量和测量指标类型的实际值, 并将获取的结果提供给第一参 数获取单元 852; 第一参数获取单元 852对第一实际值获取单元 851提供的 多个测试周期的域名查询请求的数量和测量指标类型的实际值进行线性拟 合, 并根据拟合结果获取参数 和参数 并将获取的参数提供给预测值获 取模块 82。 The parameter acquisition block 85 includes a first actual value acquisition unit 851 and a first parameter acquisition unit 852. The first actual value obtaining unit 851 is configured to obtain the number of the domain name query request and the actual value of the measurement index type received in the plurality of test periods, and provide the obtained result to the first parameter obtaining unit 852; The unit 852 linearly fits the number of domain name query requests and the actual values of the measurement index types of the plurality of test periods provided by the first actual value acquisition unit 851, and obtains parameters and parameters according to the fitting result and provides the obtained parameters to the parameters. Predicted value acquisition module 82.
其中, 阈值获取模块 86包括第二实际值获取单元 861、 第二参数获取单 元 862、 预测值获取单元 863、 第二差值确定单元 864和阈值获取单元 865。 阈值获取模块 86的工作原理如下: The threshold acquisition module 86 includes a second actual value acquisition unit 861, a second parameter acquisition unit 862, a predicted value acquisition unit 863, a second difference determination unit 864, and a threshold acquisition unit 865. The threshold acquisition module 86 works as follows:
第二实际值获取单元 861用于获取多个测试周期内接收到的域名查询请 求的数量和测量指标类型的实际值, 并将所获取的结果提供给第二参数获取 单元 862; 第二参数获取单元 862对第二实际值获取单元 861提供的多个测 试周期的域名查询请求的数量和测量指标类型的实际值进行线性拟合, 并根 据拟合结果获取参数 和参数 , 并将获取的参数值提供给预测值获取单元 863 ; 预测值获取单元 863将第二参数获取单元 862提供的参数带入公式( 2 ) 中, 计算每个测试周期的测量指标类型的预测值; 第二差值确定单元 864与 第二实际值获取单元 861和预测值获取单元 863连接, 用于在获取每个测试 周期的测量指标类型的实际值和测量指标类型的预测值后, 将测量指标类型 的实际值和测量指标类型的预测值做差并取绝对值, 以获取第二差值, 并将 获取的第二差值提供给阈值获取单元 865; 阈值获取单元 865用于将多个第 二差值进行比较, 获取其中最大的第二差值作为阈值, 并将最大的第二差值 提供给判断输出模块 84。 The second actual value obtaining unit 861 is configured to obtain the actual number of the domain name query request and the measured index type received in the plurality of test periods, and provide the obtained result to the second parameter obtaining unit 862; The unit 862 linearly fits the number of domain name query requests of the plurality of test periods provided by the second actual value obtaining unit 861 and the actual value of the measurement index type, and obtains parameters and parameters according to the fitting result, and obtains the parameter values. Provided to the predicted value obtaining unit 863; the predicted value obtaining unit 863 brings the parameter provided by the second parameter acquiring unit 862 into the formula (2), and calculates the predicted value of the type of the measured index for each test period; the second difference determining unit The 864 is connected to the second actual value obtaining unit 861 and the predicted value obtaining unit 863, and is configured to: after acquiring the actual value of the measurement index type and the predicted value of the measurement index type for each test period, the actual value and the measurement type of the measurement index type. The predicted value of the indicator type is poor and takes an absolute value to obtain the second difference, and the second difference obtained Provided to the threshold acquisition unit 865; the threshold acquisition unit 865 is configured to compare the plurality of second differences, obtain the largest second difference therein as a threshold, and provide the maximum second difference to the determination output module 84.
本实施例的域名服务器, 通过上述各模块提供了一种获取本发明技术方 案所需的参数和阈值的实施方式, 通过对正常网络进行测试获取, 由于测试 过程和实际检测过程相似, 因此, 基于本实施例提供的阈值检测域名服务器 的流量, 其检测准确性、 有效性高。 The domain name server of the present embodiment provides an implementation manner for obtaining the parameters and thresholds required by the technical solution of the present invention by using the foregoing modules. The test is obtained by testing the normal network, and the test process is similar to the actual detection process. The threshold value provided by the embodiment detects the traffic of the domain name server, and the detection accuracy and the validity thereof are high.
值得说明的是, 本实施例提供的域名服务器中第二实际值获取单元与第 一实际值获取单元、 第二参数获取单元和第一参数获取单元分别具有相同的 功能, 在实际实现时可以作为一个功能模块实现, 也可以是独立的功能模块, 本实施例不对此进行限制。 It should be noted that the second actual value obtaining unit in the domain name server provided by the embodiment has the same function as the first actual value obtaining unit, the second parameter obtaining unit, and the first parameter obtaining unit, and can be used as an actual implementation. A functional module is implemented, and may also be a separate functional module. This embodiment does not limit this.
进一步, 本实施例的域名服务器可用于执行本发明实施例提供的域名系 统流量检测方法, 其详细的工作原理和流程可参见本发明实施例提供的域名 系统流量检测方法部分的描述。 Further, the domain name server of this embodiment may be used to perform the domain name system traffic detection method provided by the embodiment of the present invention. For a detailed working principle and process, refer to the description of the domain name system traffic detection method part provided by the embodiment of the present invention.
具体的, 当测量指标包括多个测量参数时, 本实施的域名服务器可以具 有多套相应的功能模块用于根据不同的测量参数对域名服务器的流量进行检 测, 也可以使用同一套功能模块结合不同的软件实现根据多个测量参数对域 名服务器的流量进行检测, 本实施例并不对此进行限制。 Specifically, when the measurement indicator includes multiple measurement parameters, the domain name server of the implementation may have There are a plurality of corresponding function modules for detecting the traffic of the domain name server according to different measurement parameters, and the same set of function modules and different softwares are used to detect the traffic of the domain name server according to multiple measurement parameters, this embodiment This is not a limitation.
总之, 本发明实施例根据对一段时间内的域名查询请求的统计结果进行 流量检测的技术方案, 与实时检测相比, 其可以降低对因域名查询请求数量 的增多导致的域名服务器流量的正常增长的情况误判率, 提高了检测的准确 性; 另外, 根据测量指标和域名查询请求满足的堆积定律计算测量指标类型 的预测值,基于测量指标类型的预测值和实际值的比较结果对流量进行检测, 进一步提高了对域名服务器流量检测的准确性。 In summary, the embodiment of the present invention reduces the normal growth of the domain name server traffic caused by the increase in the number of domain name query requests, according to the technical solution for performing traffic detection on the statistics result of the domain name query request in a period of time. The false positive rate of the situation improves the accuracy of the detection; in addition, the predicted value of the type of the measurement index is calculated according to the stacking law satisfied by the measurement index and the domain name query request, and the flow rate is performed based on the comparison result between the predicted value and the actual value of the type of the measurement index Detection further improves the accuracy of domain name server traffic detection.
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步骤 可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机可读 取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述 的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代码的介 质。 A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其 限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通技术 人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或 者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技 术方案的本质脱离本发明各实施例技术方案的精神和范围。 It should be noted that the above embodiments are only for explaining the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that: The technical solutions described in the foregoing embodiments are modified, or some of the technical features are equivalently replaced. The modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010129301.6 | 2010-03-19 | ||
| CN2010101293016A CN101826996B (en) | 2010-03-19 | 2010-03-19 | Domain name system flow detection method and domain name server |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011113239A1 true WO2011113239A1 (en) | 2011-09-22 |
Family
ID=42690714
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2010/074574 Ceased WO2011113239A1 (en) | 2010-03-19 | 2010-06-28 | Flow detection method for domain name system and domain name server thereof |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN101826996B (en) |
| WO (1) | WO2011113239A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104378389A (en) * | 2014-12-12 | 2015-02-25 | 北京奇虎科技有限公司 | Website security detecting method and device |
| CN114726625A (en) * | 2022-04-08 | 2022-07-08 | Oppo广东移动通信有限公司 | Detection method and device, server and storage medium |
Families Citing this family (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101997878A (en) * | 2010-11-23 | 2011-03-30 | 蓝汛网络科技(北京)有限公司 | Method, device and system for verifying domain name link |
| CN102130800B (en) * | 2011-04-01 | 2013-08-28 | 苏州赛特斯网络科技有限公司 | Device and method for detecting network access abnormality based on data stream behavior analysis |
| CN102868685B (en) * | 2012-08-29 | 2015-04-15 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for judging automatic scanning behavior |
| CN102882895A (en) * | 2012-10-31 | 2013-01-16 | 杭州迪普科技有限公司 | Method and device for identifying message attack |
| CN103152222B (en) * | 2013-01-05 | 2015-11-18 | 中国科学院信息工程研究所 | A kind of Intrusion Detection based on host group character detects speed and becomes the method for attacking domain name |
| CN103209192B (en) * | 2013-05-10 | 2016-03-23 | 张昱 | For domain name state purging system during ddos attack and detection method |
| CN103701955B (en) * | 2014-01-03 | 2017-06-20 | 互联网域名系统北京市工程研究中心有限公司 | The method and its system of inquiry of the domain name request |
| CN104486415B (en) * | 2014-12-15 | 2018-06-15 | 新浪网技术(中国)有限公司 | The determination method and device of monitored object working condition |
| CN105281981B (en) * | 2015-11-04 | 2019-04-02 | 北京百度网讯科技有限公司 | The data traffic monitoring method and device of network service |
| CN106685749B (en) * | 2015-11-09 | 2019-09-20 | 北京国双科技有限公司 | Method and device for inspecting network traffic |
| CN105939321B (en) * | 2015-12-07 | 2019-08-06 | 杭州迪普科技股份有限公司 | A kind of DNS attack detection method and device |
| CN105847281B (en) * | 2016-05-12 | 2019-02-19 | 中国联合网络通信集团有限公司 | A method and system for DNS defense attack |
| CN106027516B (en) * | 2016-05-17 | 2019-06-14 | 中国互联网络信息中心 | A method and system for evaluating security events of domain name service |
| CN105893213B (en) * | 2016-06-22 | 2018-04-20 | 北京蓝海讯通科技股份有限公司 | A kind of method for detecting abnormality, application and monitoring device |
| CN106705368B (en) * | 2016-12-30 | 2019-07-30 | 美的集团股份有限公司 | Prejudge the method, apparatus and household electrical appliance of household electrical appliance failure |
| US10439914B2 (en) * | 2017-02-16 | 2019-10-08 | Schneider Electric It Corporation | System and method to determine and repair network connection problems |
| CN107579874B (en) * | 2017-09-01 | 2020-03-31 | 北京亚鸿世纪科技发展有限公司 | Method and device for detecting data collection missing report of flow collection equipment |
| CN109495423A (en) * | 2017-09-11 | 2019-03-19 | 网宿科技股份有限公司 | A kind of method and system preventing network attack |
| CN108334774A (en) * | 2018-01-24 | 2018-07-27 | 中国银联股份有限公司 | A kind of method, first server and the second server of detection attack |
| WO2019183781A1 (en) * | 2018-03-26 | 2019-10-03 | 华为技术有限公司 | Data processing method and network apparatus |
| CN110324295B (en) * | 2018-03-30 | 2022-04-12 | 阿里云计算有限公司 | Defense method and device for domain name system flooding attack |
| CN108777805B (en) * | 2018-05-17 | 2021-01-22 | 北京奇艺世纪科技有限公司 | A detection method, device, central control server and system for illegal access request |
| CN108600790B (en) * | 2018-05-17 | 2020-11-27 | 北京奇艺世纪科技有限公司 | A method and device for detecting a stuck fault |
| CN109818921B (en) * | 2018-12-14 | 2021-09-21 | 微梦创科网络科技(中国)有限公司 | Method and device for analyzing abnormal flow of website interface |
| CN109936487A (en) * | 2019-04-19 | 2019-06-25 | 浙江中烟工业有限责任公司 | A method and system for real-time analysis and monitoring of network broadcast packets |
| CN112118205B (en) * | 2019-06-19 | 2022-08-16 | 腾讯科技(深圳)有限公司 | Domain name information detection method and related device |
| CN110868393A (en) * | 2019-09-24 | 2020-03-06 | 国网河北省电力有限公司信息通信分公司 | A protection method based on abnormal flow of power grid information system |
| CN110784483B (en) * | 2019-11-04 | 2020-11-27 | 北京航空航天大学 | An event detection system and method based on DGA abnormal domain name |
| CN111083012B (en) * | 2019-12-18 | 2021-10-26 | 苏州浪潮智能科技有限公司 | Data center switch flow statistical method and equipment |
| CN111209163A (en) * | 2020-01-03 | 2020-05-29 | 中国工商银行股份有限公司 | Application system anomaly detection method and system |
| DE102020209993A1 (en) * | 2020-08-06 | 2022-02-10 | Robert Bosch Gesellschaft mit beschränkter Haftung | Method and device for processing data from a technical system |
| CN114900322A (en) * | 2021-01-26 | 2022-08-12 | 腾讯科技(深圳)有限公司 | Method, device, server and configuration terminal for detecting and protecting network attacks |
| CN114172707B (en) * | 2021-11-29 | 2024-04-26 | 北京恒安嘉新安全技术有限公司 | Fast-Flux botnet detection method, device, equipment and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009200993A (en) * | 2008-02-25 | 2009-09-03 | Kddi Corp | Failure detecting apparatus, failure detection method, and computer program |
| CN101567815A (en) * | 2009-05-27 | 2009-10-28 | 清华大学 | Method for effectively detecting and defending domain name server (DNS) amplification attacks |
| CN101572701A (en) * | 2009-02-10 | 2009-11-04 | 中科正阳信息安全技术有限公司 | Security gateway system for resisting DDoS attack for DNS service |
| CN101702660A (en) * | 2009-11-12 | 2010-05-05 | 中国科学院计算技术研究所 | Abnormal domain name detection method and system |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7372809B2 (en) * | 2004-05-18 | 2008-05-13 | Time Warner Cable, Inc. | Thwarting denial of service attacks originating in a DOCSIS-compliant cable network |
| CN101321055A (en) * | 2008-06-28 | 2008-12-10 | 华为技术有限公司 | An attack defense method and device |
| US10027688B2 (en) * | 2008-08-11 | 2018-07-17 | Damballa, Inc. | Method and system for detecting malicious and/or botnet-related domain names |
-
2010
- 2010-03-19 CN CN2010101293016A patent/CN101826996B/en active Active
- 2010-06-28 WO PCT/CN2010/074574 patent/WO2011113239A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009200993A (en) * | 2008-02-25 | 2009-09-03 | Kddi Corp | Failure detecting apparatus, failure detection method, and computer program |
| CN101572701A (en) * | 2009-02-10 | 2009-11-04 | 中科正阳信息安全技术有限公司 | Security gateway system for resisting DDoS attack for DNS service |
| CN101567815A (en) * | 2009-05-27 | 2009-10-28 | 清华大学 | Method for effectively detecting and defending domain name server (DNS) amplification attacks |
| CN101702660A (en) * | 2009-11-12 | 2010-05-05 | 中国科学院计算技术研究所 | Abnormal domain name detection method and system |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104378389A (en) * | 2014-12-12 | 2015-02-25 | 北京奇虎科技有限公司 | Website security detecting method and device |
| CN114726625A (en) * | 2022-04-08 | 2022-07-08 | Oppo广东移动通信有限公司 | Detection method and device, server and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101826996A (en) | 2010-09-08 |
| CN101826996B (en) | 2012-05-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2011113239A1 (en) | Flow detection method for domain name system and domain name server thereof | |
| US8260914B1 (en) | Detecting DNS fast-flux anomalies | |
| US8844034B2 (en) | Method and apparatus for detecting and defending against CC attack | |
| US8341742B2 (en) | Network attack detection devices and methods | |
| KR101061375B1 (en) | JR type based DDoS attack detection and response device | |
| US20090094699A1 (en) | Apparatus and method of detecting network attack situation | |
| US20130347114A1 (en) | System and method for malware detection | |
| US7669241B2 (en) | Streaming algorithms for robust, real-time detection of DDoS attacks | |
| WO2018095192A1 (en) | Method and system for website attack detection and prevention | |
| CN111641658A (en) | Request intercepting method, device, equipment and readable storage medium | |
| CN110061998B (en) | Attack defense method and device | |
| CN101841533A (en) | Method and device for detecting distributed denial-of-service attack | |
| CN108270778B (en) | A kind of DNS domain name abnormal access detection method and device | |
| CN109257390B (en) | CC attack detection method, device and electronic device | |
| CN101635658A (en) | Method and system for detecting abnormality of network secret stealing behavior | |
| CN107135238A (en) | A kind of DNS reflection amplification attacks detection method, apparatus and system | |
| CN102882880A (en) | Detection method and detection system of distributed denial of service (DDoS) attack aiming at domain name server (DNS) service | |
| CN108111548A (en) | A kind of domain name system attack detection method, apparatus and system | |
| CN117354024A (en) | DNS malicious domain name detection system and method based on big data | |
| CN112839005B (en) | DNS domain name abnormal access monitoring method and device | |
| CN112929369A (en) | Distributed real-time DDoS attack detection method | |
| CN109005181B (en) | Detection method, system and related components for DNS amplification attack | |
| CN114301700B (en) | Method, device, system and storage medium for adjusting network security defense scheme | |
| CN109413022B (en) | Method and device for detecting HTTP FLOOD attack based on user behavior | |
| Cai et al. | A behavior-based method for detecting DNS amplification attacks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10847708 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10847708 Country of ref document: EP Kind code of ref document: A1 |