CN111092889B - Distributed data node abnormal behavior detection method, device and server - Google Patents
Distributed data node abnormal behavior detection method, device and server Download PDFInfo
- Publication number
- CN111092889B CN111092889B CN201911307932.XA CN201911307932A CN111092889B CN 111092889 B CN111092889 B CN 111092889B CN 201911307932 A CN201911307932 A CN 201911307932A CN 111092889 B CN111092889 B CN 111092889B
- Authority
- CN
- China
- Prior art keywords
- data node
- instruction
- action
- action instruction
- behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及数据节点分析技术领域,具体而言,涉及一种分布式数据节点异常行为检测方法、装置及服务器。The present invention relates to the technical field of data node analysis, and in particular, to a method, device and server for detecting abnormal behavior of distributed data nodes.
背景技术Background technique
随着科技的发展,分布式数据处理技术已应用于金融、物联网、保险和公益领域等领域,能够实现对数据信息的快速、安全交互以及数据信息的有效性验证。也正是由于分布式数据处理技术涉及的应用领域大多为国民生产中的重要领域,确保分布式数据网络中的分布式数据节点不被黑客入侵和攻击是非常重要的。由于分布式网络中的分布式数据节点的数量较多,且分布式数据节点通常会执行大量的数据处理工作,如果为每个分布式数据节点额外配置防火墙或者黑客监测/拦截机制从而实现对分布式数据节点的异常行为检测,会极大地影响分布式数据节点的工作性能(例如数据处理速度和数据处理精确度)。因此,如何在确保分布式数据节点的工作性能的前提下实现异常行为的检测从而确定出被入侵的分布式数据节点是现阶段亟待解决的一个技术问题。With the development of science and technology, distributed data processing technology has been applied to the fields of finance, Internet of Things, insurance and public welfare, which can realize the rapid and safe interaction of data information and the validity verification of data information. It is precisely because the application fields involved in distributed data processing technology are mostly important fields in national production, it is very important to ensure that the distributed data nodes in the distributed data network are not hacked and attacked. Due to the large number of distributed data nodes in the distributed network, and the distributed data nodes usually perform a large amount of data processing work, if each distributed data node is additionally configured with a firewall or a hacker monitoring/interception mechanism to achieve distributed data processing The abnormal behavior detection of distributed data nodes will greatly affect the performance of distributed data nodes (such as data processing speed and data processing accuracy). Therefore, how to realize the detection of abnormal behavior under the premise of ensuring the working performance of the distributed data nodes so as to determine the intruded distributed data nodes is a technical problem to be solved urgently at the present stage.
发明内容SUMMARY OF THE INVENTION
为了至少克服现有技术中的上述不足,本发明的目的之一在于提供一种分布式数据节点异常行为检测方法、装置及服务器。In order to at least overcome the above deficiencies in the prior art, one of the objectives of the present invention is to provide a method, device and server for detecting abnormal behavior of distributed data nodes.
本发明实施例提供了一种分布式数据节点异常行为检测方法,应用于服务器,所述服务器与分布式数据网络通信,所述分布式数据网络中存在相同节点标识的数据节点共用一种动作解析逻辑,设置每个数据节点与所述服务器的绑定关系、以及对应的动作解析逻辑和行为识别逻辑,每个数据节点在启动数据处理进程时通过所述服务器激活该数据节点对应的动作解析逻辑和行为识别逻辑,所述方法至少包括:An embodiment of the present invention provides a method for detecting abnormal behavior of distributed data nodes, which is applied to a server, where the server communicates with a distributed data network, and data nodes with the same node identifier in the distributed data network share an action parsing Logic, set the binding relationship between each data node and the server, as well as the corresponding action analysis logic and behavior recognition logic, each data node activates the action analysis logic corresponding to the data node through the server when starting the data processing process and behavior recognition logic, the method includes at least:
当所述分布式数据网络中的第一数据节点与第二数据节点进行数据交互时,判断所述第一数据节点的节点标识与所述第二数据节点是否相同;When the first data node in the distributed data network performs data interaction with the second data node, determine whether the node identifier of the first data node is the same as that of the second data node;
在所述第一数据节点的节点标识与所述第二数据节点的节点标识相同时,从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流;When the node identifier of the first data node is the same as the node identifier of the second data node, determine the first data node from the interaction record between the first data node and the second data node a first action instruction stream and a second action instruction stream of the second data node;
按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征;According to the action parsing logic corresponding to the first data node or the second data node, parse the first action instruction stream and the second action instruction stream respectively, and obtain the first instruction feature and the second instruction feature ;
在所述第一指令特征和所述第二指令特征不匹配时,基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果;When the first instruction feature and the second instruction feature do not match, identify the first instruction feature based on the first behavior identification logic corresponding to the first data node to obtain a first identification result and obtain a first identification result based on the first behavior identification logic corresponding to the first data node. The second behavior identification logic corresponding to the second data node identifies the second instruction feature to obtain a second identification result;
根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点。It is determined according to the first identification result and the second identification result that a data node with abnormal behavior exists in the first data node and the second data node.
在一种可选的实施例中,所述从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流,包括:In an optional embodiment, the first action instruction stream of the first data node and the second data are determined from the interaction record between the first data node and the second data node The second action instruction flow of the node, including:
获取所述交互记录的元数据信任度以及各动作指令对;Obtain the metadata trust degree of the interaction record and each action instruction pair;
在根据所述元数据信任度确定出所述交互记录中包含有无效交互行为的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在有效交互行为下的各动作指令对与交互记录在无效交互行为下的各动作指令对之间的响应成功率之差,并将交互记录在有效交互行为下的与在无效交互行为下的动作指令对的响应成功率相同的动作指令对调整到相应的无效交互行为的分类下;In the case where it is determined according to the metadata trust degree that the interaction record contains invalid interaction behaviors, it is determined that the interaction record is under valid interaction behaviors according to the action instruction pair and its digital signature of the interaction record under invalid interaction behaviors The difference between the response success rate of each action instruction pair and the action instruction pair recorded under the invalid interaction behavior, and the response success rate of the interaction record under the valid interaction behavior and the action instruction pair under the invalid interaction behavior The action instruction pairs with the same rate are adjusted to the corresponding invalid interaction behavior classification;
在交互记录的当前有效交互行为下包含有多个动作指令对的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在当前有效交互行为下的各动作指令对之间的响应成功率之差,并根据所述各动作指令对之间的响应成功率之差对当前有效交互行为下的各动作指令对进行筛选;In the case where the currently valid interaction behavior of the interaction record contains multiple action instruction pairs, each action recorded in the interaction record under the current valid interaction behavior is determined according to the action instruction pairs and their digital signatures of the interaction record under the invalid interaction behavior The difference between the response success rates between the instruction pairs, and screening each action instruction pair under the current effective interaction behavior according to the difference in the response success rate between the action instruction pairs;
根据所述交互记录在无效交互行为下的动作指令对及其数字签名为上述筛选得到的每一个动作指令对设置无效交互行为签名,并将所述每一个动作指令对调整到所述无效交互行为签名所对应的无效交互行为的分类下;Set an invalid interaction behavior signature for each action instruction pair obtained by the above screening according to the action instruction pair and its digital signature recorded under the invalid interaction behavior, and adjust each action instruction pair to the invalid interaction behavior Under the classification of invalid interaction behavior corresponding to the signature;
根据有效交互行为分类下的第一动作指令对、无效交互行为分类下的第二动作指令对、所述第一数据节点的第一链路层协议以及所述第二数据节点的第二链路层协议确定出所述第一动作指令流和所述第二动作指令流。According to the first action instruction pair under the valid interaction behavior classification, the second action instruction pair under the invalid interaction behavior classification, the first link layer protocol of the first data node, and the second link of the second data node The layer protocol determines the first action instruction stream and the second action instruction stream.
在一种可选的实施例中,所述根据有效交互行为分类下的第一动作指令对、无效交互行为分类下的第二动作指令对、所述第一数据节点的第一链路层协议以及所述第二数据节点的第二链路层协议确定出所述第一动作指令流和所述第二动作指令流,包括:In an optional embodiment, according to the first action instruction pair under the valid interaction behavior classification, the second action instruction pair under the invalid interaction behavior classification, and the first link layer protocol of the first data node and the second link layer protocol of the second data node determines the first action instruction stream and the second action instruction stream, including:
根据所述第一动作指令对、所述第二动作指令对、所述第一链路层协议以及所述第二链路层协议,确定所述第一数据节点和所述第二数据节点各自对应的第一动作指令集和所述第二动作指令集;其中,所述第一动作指令集包括所述第一数据节点在所述交互记录的有效调用时间范围内向所述第二数据节点发送的一连串的请求指令,所述第二动作指令集包括所述第二数据节点在所述交互记录的有效调用时间范围内根据接收到的所述第一数据节点发送的所述请求指令向所述第一数据节点反馈的一连串的响应指令;According to the first action instruction pair, the second action instruction pair, the first link layer protocol and the second link layer protocol, determine that the first data node and the second data node are respectively The corresponding first action instruction set and the second action instruction set; wherein, the first action instruction set includes that the first data node sends to the second data node within the valid invocation time range of the interaction record A series of request instructions, the second action instruction set includes that the second data node sends the request instruction received by the first data node to the A series of response commands fed back by the first data node;
基于所述第一动作指令集、所述第二动作指令集、所述第一链路层协议和所述第二链路层协议,确定出所述第一数据节点的第一结构化序列以及所述第二数据节点的第二结构化序列;determining the first structured sequence of the first data node based on the first action instruction set, the second action instruction set, the first link layer protocol and the second link layer protocol; and a second structured sequence of said second data nodes;
基于所述第一结构化序列以及所述第二结构化序列,分别从所述第一动作指令集和所述第二动作指令集中确定所述第一数据节点的第一指令序列和所述第二数据节点的第二指令序列;Based on the first structured sequence and the second structured sequence, the first instruction sequence and the first instruction sequence of the first data node are determined from the first action instruction set and the second action instruction set, respectively. The second instruction sequence of the two data nodes;
当确定出所述第一指令序列和所述第二指令序列时,以所述第一指令序列和所述第二指令序列进行指令序列配对,获得配对结果;根据所述配对结果判断所述第一指令序列和所述第二指令序列是否为多分支线程的序列对;若是,则按照每个分支线程将所述第一指令序列和所述第二指令序列分别转换为多个具有所述分支线程的第一指令表单和第二指令表单;分别按照所述第一指令表单和所述第二指令表单查找与所述第一指令表单和第二指令表单具有相同或相似分支线程的预设指令脚本文件;将所述配对结果和所述预设指令脚本文件对应的脚本流合成动作指令流集合;When the first instruction sequence and the second instruction sequence are determined, instruction sequence pairing is performed with the first instruction sequence and the second instruction sequence to obtain a pairing result; the first instruction sequence is determined according to the pairing result. Whether an instruction sequence and the second instruction sequence are a sequence pair of multi-branch threads; if so, convert the first instruction sequence and the second instruction sequence into a multi-branch thread according to each branch thread. The first instruction form and the second instruction form of the thread; according to the first instruction form and the second instruction form respectively, find the preset instructions with the same or similar branch thread as the first instruction form and the second instruction form a script file; synthesize an action instruction stream set with the script stream corresponding to the pairing result and the preset instruction script file;
根据所述动作指令流集合中的预设指令脚本文件和所述预设指令脚本文件对应的脚本流、以及所述第一数据节点的动作解析逻辑对应的第一接口信息、所述第二数据节点的动作解析逻辑对应的第二接口信息,确定出所述第一动作指令流和所述第二动作指令流。According to the preset instruction script file in the action instruction stream set, the script stream corresponding to the preset instruction script file, and the first interface information and the second data corresponding to the action parsing logic of the first data node The second interface information corresponding to the action parsing logic of the node determines the first action instruction stream and the second action instruction stream.
在一种可选的实施例中,所述按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征,包括:In an optional embodiment, according to the action parsing logic corresponding to the first data node or the second data node, the first action instruction stream and the second action instruction stream are respectively performed. Parsing to obtain the first instruction feature and the second instruction feature, including:
根据所述动作指令逻辑中的指令拆分规则,分别对所述第一动作指令流和所述第二动作指令流进行拆分,得到所述第一动作指令流的第一拆分集以及所述第二动作指令流的第二拆分集;其中,所述第一拆分集中包括所述第一动作指令流的多个第一单动作指令,所述第二拆分集中包括所述第二动作指令流的多个第二单动作指令;According to the instruction splitting rule in the action instruction logic, the first action instruction stream and the second action instruction stream are split respectively to obtain a first split set of the first action instruction stream and all a second split set of the second action instruction stream; wherein the first split set includes a plurality of first single-action instructions of the first action instruction stream, and the second split set includes the first Multiple second single-action instructions of the two-action instruction stream;
在预设的动作指令包集合中任意确定出一个动作指令包作为目标动作指令包;分别将所述第一动作指令流对应的第一拆分集中的每个第一单动作指令和所述第二动作指令流对应的第二拆分集中的每个第二单动作指令与所述目标动作指令包中的每个参考动作指令进行对比,得到所述第一动作指令流与所述目标动作指令包之间的第一对比结果以及所述第二动作指令流与所述目标动作指令包之间的第二对比结果;所述动作指令包集合包括以指令数据库中每个已验证动作指令为参考动作指令的对比动作指令包,所述对比动作指令包的动作指令节点为参考动作指令的相对时序信息,之后的每个动作指令节点包括参考动作指令与所述指令数据库中其他动作指令的时序关联度以及所述其他动作指令的相对时序信息,所述每个对比动作指令包中动作指令按照所述时序关联度升序排列;An action instruction package is arbitrarily determined as the target action instruction package in the preset action instruction package set; each first single action instruction and the first single action instruction in the first split set corresponding to the first action instruction stream are respectively Each second single-action instruction in the second split set corresponding to the two-action instruction stream is compared with each reference action instruction in the target action instruction package to obtain the first action instruction stream and the target action instruction The first comparison result between the packages and the second comparison result between the second action instruction stream and the target action instruction package; the action instruction package set includes taking each verified action instruction in the instruction database as a reference The comparison action instruction package of the action instruction, the action instruction node of the comparison action instruction package is the relative timing information of the reference action instruction, and each subsequent action instruction node includes the time sequence association between the reference action instruction and other action instructions in the instruction database degree and relative timing information of the other action instructions, the action instructions in each of the comparison action instruction packets are arranged in ascending order according to the timing correlation degree;
以所述目标动作指令包为参考位置,沿设定序列方向进行对比,直至所述动作指令包集合中出现一个当前动作指令包,使得所述第一动作指令流与所述当前动作指令包之间的第三对比结果与所述第一动作指令流与所述目标动作指令包之间的第一对比结果的第一相似度值大于设定阈值,且所述第二动作指令流与所述当前动作指令包之间的第四对比结果与所述第二动作指令流与所述当前动作指令包之间的第二对比结果的第二相似度值大于所述设定阈值;Taking the target action instruction packet as a reference position, the comparison is carried out along the set sequence direction until a current action instruction packet appears in the action instruction packet set, so that the first action instruction stream and the current action instruction packet have a difference. The first similarity value between the third comparison result and the first comparison result between the first action instruction stream and the target action instruction packet is greater than the set threshold, and the second action instruction stream and the The second similarity value between the fourth comparison result between the current action instruction packets and the second comparison result between the second action instruction stream and the current action instruction packet is greater than the set threshold;
确定所述当前动作指令包对应的第三指令特征,所述第三指令特征确定所述动作解析逻辑的解析线程;按照所述解析线程对所述第一拆分集和所述第二拆分集进行特征提取,得到所述第一指令特征和所述第二指令特征。determining a third instruction feature corresponding to the current action instruction packet, where the third instruction feature determines a parsing thread of the action parsing logic; splitting the first split set and the second split according to the parsing thread The set performs feature extraction to obtain the first instruction feature and the second instruction feature.
在一种可选的实施例中,所述基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果,包括:In an optional embodiment, the first identification result is obtained by identifying the first instruction feature based on the first behavior identification logic corresponding to the first data node, and the first identification result is obtained based on the first behavior identification logic corresponding to the second data node. The second behavior identification logic identifies the second instruction feature to obtain a second identification result, including:
根据所述第一数据节点的第一指令特征对应的第一动作类别及所述第二数据节点的第二指令特征对应的第二动作类别,确定所述第一数据节点相对于所述第二数据节点的第一角色映射向量以及所述第二数据节点相对于所述第一数据节点的第二角色映射向量;According to the first action class corresponding to the first command feature of the first data node and the second action class corresponding to the second command feature of the second data node, it is determined that the first data node is relative to the second data node. a first role mapping vector of the data node and a second role mapping vector of the second data node relative to the first data node;
基于所述第一角色映射向量以及所述第一指令特征所表征的所述第一数据节点向所述第二数据节点发送的请求指令的第一累计值,对所述第一行为识别逻辑中的第一逻辑识别单元和第一逻辑有向边进行调整,得到第一目标行为识别逻辑;基于所述第二角色映射向量以及所述第二指令特征所表征的所述第二数据节点向所述第一数据节点发送的响应指令的第二累计值,对所述第二行为识别逻辑中的第二逻辑识别单元和第二逻辑有向边进行调整,得到第二目标行为识别逻辑;Based on the first role mapping vector and the first accumulated value of the request instruction sent by the first data node to the second data node represented by the first instruction feature, the first behavior identification logic The first logical recognition unit and the first logical directed edge are adjusted to obtain the first target behavior recognition logic; based on the second role mapping vector and the second data node represented by the second instruction feature the second cumulative value of the response command sent by the first data node, and adjusting the second logic recognition unit and the second logic directed edge in the second behavior recognition logic to obtain the second target behavior recognition logic;
根据所述第一目标行为识别逻辑和所述第二目标行为识别逻辑确定所述对所述第一指令特征和所述第二指令特征进行识别的持续时长;其中,所述持续时长用于表征采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一起始时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二起始时刻相同且采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一结束时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二结束时刻相同;The duration for identifying the first instruction feature and the second instruction feature is determined according to the first target behavior identification logic and the second target behavior identification logic; wherein the duration is used to characterize The first start time when the first instruction feature is recognized by the first target behavior recognition logic is the same as the second start time when the second command feature is recognized by the second target behavior recognition logic and The first end time at which the first instruction feature is recognized by the first target behavior recognition logic is the same as the second end time when the second instruction feature is recognized by the second target behavior recognition logic;
在所述持续时长内采用所述第一目标行为识别逻辑确定所述第一指令特征的第一特征关联度;根据所述第一特征关联度以及预存的所述第二数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第二数据节点与所述第一数据节点之间的第一验证结果,得到所述第一识别结果;所述第一验证结果是所述第二数据节点作为验证端且所述第一数据节点作为待验证端对应的验证结果;Determine the first feature correlation degree of the first instruction feature by using the first target behavior recognition logic within the duration; according to the first feature correlation degree and the pre-stored second data node and the distribution the first verification result between the second data node and the first data node included in the verification form between other data nodes in the data network, to obtain the first identification result; the first verification The result is that the second data node is used as the verification terminal and the first data node is used as the verification result corresponding to the terminal to be verified;
在所述持续时长内采用所述第二目标行为识别逻辑确定所述第二指令特征的第二特征关联度;根据所述第二特征关联度以及预存的所述第一数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第一数据节点与所述第二数据节点之间的第二验证结果,得到所述第二识别结果;所述第二验证结果是所述第一数据节点作为验证端且所述第二数据节点作为待验证端对应的验证结果。Determine the second feature correlation degree of the second instruction feature by using the second target behavior recognition logic within the duration; according to the second feature correlation degree and the pre-stored first data node and the distribution obtain the second identification result; the second verification As a result, the first data node is used as a verification terminal and the second data node is used as a verification result corresponding to the terminal to be verified.
在一种可选的实施例中,所述根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点,包括:In an optional embodiment, the determining, according to the first identification result and the second identification result, that the first data node and the second data node have data nodes with abnormal behavior, including :
提取所述第一识别结果中的第一置信度参数和所述第二识别结果中的第二置信度参数;extracting the first confidence parameter in the first recognition result and the second confidence parameter in the second recognition result;
根据所述第一识别结果得到所述第一数据节点映射至所述第二数据节点的第一校验码;obtaining a first check code mapping the first data node to the second data node according to the first identification result;
根据所述第一校验码和所述第二识别结果得到所述第二数据节点映射至所述第一数据节点的第二校验码;obtaining, according to the first check code and the second identification result, a second check code of the second data node mapped to the first data node;
根据预存的第一数据节点的第一设备标识对应的第一动态随机数和所述第一识别结果确定出第三校验码;determining the third check code according to the pre-stored first dynamic random number corresponding to the first device identifier of the first data node and the first identification result;
根据预存的第二数据节点的第二设备标识对应的第二动态随机数和所述第二识别结果确定出第四校验码;Determine the fourth check code according to the second dynamic random number corresponding to the second device identifier of the second data node and the second identification result pre-stored;
判断所述第一校验码和所述第三校验码是否一致,在所述第一校验码和所述第三校验码不一致时确定所述第一数据节点存在异常行为;Determine whether the first check code and the third check code are consistent, and determine that the first data node has abnormal behavior when the first check code and the third check code are inconsistent;
判断所述第二校验码和所述第四校验码是否一致,在所述第二校验码和所述第四校验码不一致时确定所述第二数据节点存在异常行为。It is judged whether the second check code and the fourth check code are consistent, and when the second check code and the fourth check code are inconsistent, it is determined that the second data node has abnormal behavior.
在一种可选的实施例中,所述方法还包括:In an optional embodiment, the method further includes:
屏蔽存在异常行为的第一数据节点或第二数据节点。The first data node or the second data node with abnormal behavior is shielded.
本发明实施例还提供了一种分布式数据节点异常行为检测装置,应用于服务器,所述服务器与分布式数据网络通信,所述分布式数据网络中存在相同节点标识的数据节点共用一种动作解析逻辑,设置每个数据节点与所述服务器的绑定关系、以及对应的动作解析逻辑和行为识别逻辑,每个数据节点在启动数据处理进程时通过所述服务器激活该数据节点对应的动作解析逻辑和行为识别逻辑,所述装置至少包括:The embodiment of the present invention also provides a distributed data node abnormal behavior detection device, which is applied to a server, the server communicates with a distributed data network, and data nodes with the same node identifier in the distributed data network share one action Parsing logic, setting the binding relationship between each data node and the server, as well as the corresponding action parsing logic and behavior recognition logic, each data node activates the action parsing corresponding to the data node through the server when starting the data processing process Logic and behavior recognition logic, the apparatus includes at least:
判断模块,用于当所述分布式数据网络中的第一数据节点与第二数据节点进行数据交互时,判断所述第一数据节点的节点标识与所述第二数据节点是否相同;a judgment module, configured to judge whether the node identifier of the first data node is the same as that of the second data node when the first data node in the distributed data network interacts with the second data node;
确定模块,用于在所述第一数据节点的节点标识与所述第二数据节点的节点标识相同时,从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流;A determination module, configured to determine from the interaction record between the first data node and the second data node when the node identification of the first data node is the same as the node identification of the second data node the first action instruction stream of the first data node and the second action instruction stream of the second data node;
解析模块,用于按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征;A parsing module, configured to parse the first action instruction stream and the second action instruction stream respectively according to the action parsing logic corresponding to the first data node or the second data node, to obtain the first instruction feature and the second instruction feature;
识别模块,用于在所述第一指令特征和所述第二指令特征不匹配时,基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果;An identification module, configured to identify the first instruction feature based on the first behavior identification logic corresponding to the first data node when the first instruction feature does not match the second instruction feature to obtain a first identification result and identify the second instruction feature based on the second behavior identification logic corresponding to the second data node to obtain a second identification result;
检测模块,用于根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点。A detection module, configured to determine a data node with abnormal behavior in the first data node and the second data node according to the first identification result and the second identification result.
本发明实施例提供了一种服务器,包括处理器以及与所述处理器连接的存储器和总线;其中,所述处理器和所述存储器通过所述总线完成相互间的通信;所述处理器用于调用所述存储器中的程序指令,以执行上述的分布式数据节点异常行为检测方法。An embodiment of the present invention provides a server, including a processor, a memory and a bus connected to the processor; wherein, the processor and the memory communicate with each other through the bus; the processor is used for The program instructions in the memory are invoked to execute the above-mentioned method for detecting abnormal behavior of distributed data nodes.
本发明实施例提供了一种可读存储介质,其上存储有程序,该程序被处理器执行时实现上述的分布式数据节点异常行为检测方法。An embodiment of the present invention provides a readable storage medium on which a program is stored, and when the program is executed by a processor, the above-mentioned method for detecting abnormal behavior of a distributed data node is implemented.
本发明实施例所提供的一种分布式数据节点异常行为检测方法、装置及服务器,存在相同节点标识的数据节点的动作解析逻辑是相同的,并且服务器是根据不同的数据节点进行行为识别逻辑部署的,因此,当第一数据节点和第二数据节点进行交互时,部署在服务器侧的动作解析逻辑和行为识别逻辑是不会影响第一数据节点和第二数据节点的工作性能的。服务器获取的交互记录是第一数据节点和第二数据节点在数据交互时正常生成的,这一行为也不会影响第一数据节点和第二数据节点的工作性能。详细地,若第一数据节点和第二数据节点的节点标识相同,在采用同一种动作解析逻辑对第一动作指令流和第二动作指令流进行解析得到的第一指令特征和第二指令特征不匹配时,可以基于不同的行为识别逻辑分别对第一指令特征和第二指令特征进行识别从而确定出第一识别结果和第二识别结果,然后根据第一是别结果和第二识别结果确定出存在异常行为的数据节点。如此,无需在数据节点侧部署防火墙或者黑客监测/拦截机制,能够在确保分布式数据节点的工作性能的前提下实现异常行为的检测从而确定出被入侵的分布式数据节点。In the method, device, and server for detecting abnormal behavior of distributed data nodes provided by the embodiments of the present invention, the action analysis logic of data nodes with the same node identifier is the same, and the server performs behavior recognition logic deployment according to different data nodes Therefore, when the first data node and the second data node interact, the action analysis logic and behavior recognition logic deployed on the server side will not affect the working performance of the first data node and the second data node. The interaction record acquired by the server is normally generated during data interaction between the first data node and the second data node, and this behavior will not affect the working performance of the first data node and the second data node. In detail, if the node identifiers of the first data node and the second data node are the same, the first instruction feature and the second instruction feature obtained by parsing the first action instruction stream and the second action instruction stream using the same action parsing logic. When there is no match, the first instruction feature and the second instruction feature can be identified based on different behavior identification logic to determine the first identification result and the second identification result, and then determine according to the first identification result and the second identification result. A data node with abnormal behavior appears. In this way, there is no need to deploy a firewall or a hacker monitoring/interception mechanism on the data node side, and the abnormal behavior can be detected on the premise of ensuring the working performance of the distributed data node, thereby determining the intruded distributed data node.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings used in the embodiments. It should be understood that the following drawings only show some embodiments of the present invention, and therefore do not It should be regarded as a limitation of the scope, and for those of ordinary skill in the art, other related drawings can also be obtained according to these drawings without any creative effort.
图1为本发明实施例所提供的一种分布式数据节点异常行为检测方法的流程图。FIG. 1 is a flowchart of a method for detecting abnormal behavior of distributed data nodes according to an embodiment of the present invention.
图2为本发明实施例所提供的一种分布式数据节点异常行为检测装置的功能模块框图。FIG. 2 is a functional module block diagram of an apparatus for detecting abnormal behavior of distributed data nodes according to an embodiment of the present invention.
图3为本发明实施例所提供的一种服务器的方框示意图。FIG. 3 is a schematic block diagram of a server according to an embodiment of the present invention.
图标:icon:
200-分布式数据节点异常行为检测装置;201-判断模块;202-确定模块;203-解析模块;204-识别模块;205-检测模块;200-distributed data node abnormal behavior detection device; 201-judging module; 202-determining module; 203-analyzing module; 204-identifying module; 205-detecting module;
300-服务器;301-处理器;302-存储器;303-总线。300-server; 301-processor; 302-memory; 303-bus.
具体实施方式Detailed ways
下面将参照附图更详细地描述本发明公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure will be more thoroughly understood, and will fully convey the scope of the present disclosure to those skilled in the art.
本发明实施例提供了一种分布式数据节点异常行为检测方法、装置及服务器,用以改善现有技术难以在确保分布式数据节点的工作性能的前提下实现异常行为的检测从而确定出被入侵的分布式数据节点的技术问题。Embodiments of the present invention provide a method, device, and server for detecting abnormal behavior of distributed data nodes, which are used to improve the difficulty in the prior art to detect abnormal behaviors on the premise of ensuring the working performance of distributed data nodes, so as to determine the intrusion technical issues of distributed data nodes.
为了更好的理解上述技术方案,下面通过附图以及具体实施例对本发明技术方案做详细的说明,应当理解本发明实施例以及实施例中的具体特征是对本发明技术方案的详细的说明,而不是对本发明技术方案的限定,在不冲突的情况下,本发明实施例以及实施例中的技术特征可以相互组合。In order to better understand the above technical solutions, the technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments. It is not intended to limit the technical solutions of the present invention, and the embodiments of the present invention and the technical features in the embodiments may be combined with each other without conflict.
图1为根据本发明一个实施例提供的分布式数据节点异常行为检测方法的流程图,该方法应用于服务器,所述服务器与分布式数据网络通信,所述分布式数据网络中存在相同节点标识的数据节点共用一种动作解析逻辑,设置每个数据节点与所述服务器的绑定关系、以及对应的动作解析逻辑和行为识别逻辑,每个数据节点在启动数据处理进程时通过所述服务器激活该数据节点对应的动作解析逻辑和行为识别逻辑。1 is a flowchart of a method for detecting abnormal behavior of distributed data nodes according to an embodiment of the present invention. The method is applied to a server, and the server communicates with a distributed data network, and the same node identifier exists in the distributed data network. The data nodes share an action analysis logic, set the binding relationship between each data node and the server, as well as the corresponding action analysis logic and behavior recognition logic, and each data node is activated by the server when the data processing process is started. Action parsing logic and behavior recognition logic corresponding to the data node.
可以理解,在本实施例中,分布式数据网络可以应用于物联网领域、车联网领域、智能医疗领域和政务数据化领域等,在本实施例中不作限定。It can be understood that, in this embodiment, the distributed data network can be applied to the field of Internet of Things, the field of Internet of Vehicles, the field of intelligent medical care, and the field of government affairs data, which is not limited in this embodiment.
请继续参阅图1,该方法可以包括以下内容:Continuing to refer to Figure 1, the method can include the following:
步骤S21,当所述分布式数据网络中的第一数据节点与第二数据节点进行数据交互时,判断所述第一数据节点的节点标识与所述第二数据节点是否相同。Step S21 , when a first data node in the distributed data network performs data interaction with a second data node, determine whether the node identifier of the first data node is the same as that of the second data node.
步骤S22,在所述第一数据节点的节点标识与所述第二数据节点的节点标识相同时,从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流。Step S22, when the node identifier of the first data node is the same as the node identifier of the second data node, determine the first data node from the interaction record between the first data node and the second data node. The first action instruction stream of the data node and the second action instruction stream of the second data node.
步骤S23,按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征。Step S23, according to the action parsing logic corresponding to the first data node or the second data node, parse the first action instruction stream and the second action instruction stream respectively, and obtain the first instruction feature and the second action instruction stream. Two command features.
步骤S24,在所述第一指令特征和所述第二指令特征不匹配时,基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果。Step S24, when the first instruction feature and the second instruction feature do not match, identify the first instruction feature based on the first behavior identification logic corresponding to the first data node to obtain a first identification result and obtain a first identification result. The second identification result is obtained by identifying the second instruction feature based on the second behavior identification logic corresponding to the second data node.
步骤S25,根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点。Step S25: Determine, according to the first identification result and the second identification result, a data node with abnormal behavior in the first data node and the second data node.
可以理解,在步骤S21-步骤S25中,存在相同节点标识的数据节点的动作解析逻辑是相同的,并且服务器是根据不同的数据节点进行行为识别逻辑部署的,因此,当第一数据节点和第二数据节点进行交互时,部署在服务器侧的动作解析逻辑和行为识别逻辑是不会影响第一数据节点和第二数据节点的工作性能的。服务器获取的交互记录是第一数据节点和第二数据节点在数据交互时正常生成的,这一行为也不会影响第一数据节点和第二数据节点的工作性能。It can be understood that in step S21-step S25, the action analysis logic of data nodes with the same node identification is the same, and the server is deployed according to different data nodes for behavior identification logic. Therefore, when the first data node and the first data node are When the two data nodes interact, the action analysis logic and behavior recognition logic deployed on the server side will not affect the working performance of the first data node and the second data node. The interaction record acquired by the server is normally generated during data interaction between the first data node and the second data node, and this behavior will not affect the working performance of the first data node and the second data node.
详细地,若第一数据节点和第二数据节点的节点标识相同,在采用同一种动作解析逻辑对第一动作指令流和第二动作指令流进行解析得到的第一指令特征和第二指令特征不匹配时,可以基于不同的行为识别逻辑分别对第一指令特征和第二指令特征进行识别从而确定出第一识别结果和第二识别结果,然后根据第一是别结果和第二识别结果确定出存在异常行为的数据节点。In detail, if the node identifiers of the first data node and the second data node are the same, the first instruction feature and the second instruction feature obtained by parsing the first action instruction stream and the second action instruction stream using the same action parsing logic. When there is no match, the first instruction feature and the second instruction feature can be identified based on different behavior identification logic to determine the first identification result and the second identification result, and then determine according to the first identification result and the second identification result. A data node with abnormal behavior appears.
如此,无需在数据节点侧部署防火墙或者黑客监测/拦截机制,能够在确保分布式数据节点的工作性能的前提下实现异常行为的检测从而确定出被入侵的分布式数据节点。In this way, there is no need to deploy a firewall or a hacker monitoring/interception mechanism on the data node side, and the abnormal behavior can be detected on the premise of ensuring the working performance of the distributed data node, thereby determining the intruded distributed data node.
在具体实施时,在同一时段内存在数据交互的数据节点有很多,为了确保确定出的第一动作指令流以及第二动作指令流的准确性,在步骤S22中,所述从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流,具体可以包括以下内容:During specific implementation, there are many data nodes with data interaction in the same time period. In order to ensure the accuracy of the determined first action instruction stream and second action instruction stream, in step S22, the The interaction record between the data node and the second data node determines the first action instruction stream of the first data node and the second action instruction stream of the second data node, which may specifically include the following content:
步骤S221,获取所述交互记录的元数据信任度以及各动作指令对。Step S221, obtaining the metadata trust degree of the interaction record and each action instruction pair.
步骤S222,在根据所述元数据信任度确定出所述交互记录中包含有无效交互行为的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在有效交互行为下的各动作指令对与交互记录在无效交互行为下的各动作指令对之间的响应成功率之差,并将交互记录在有效交互行为下的与在无效交互行为下的动作指令对的响应成功率相同的动作指令对调整到相应的无效交互行为的分类下。Step S222, when it is determined that the interaction record contains invalid interaction behavior according to the metadata trust degree, determine that the interaction record is valid according to the action instruction pair under the invalid interaction behavior of the interaction record and its digital signature. The difference between the response success rate of each action instruction pair under the interaction behavior and the action instruction pair under the interaction record under the invalid interaction behavior, and record the interaction between the action instruction pair under the valid interaction behavior and the action instruction pair under the invalid interaction behavior The action instruction pairs with the same response success rate are adjusted to the corresponding invalid interaction behavior classification.
步骤S223,在交互记录的当前有效交互行为下包含有多个动作指令对的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在当前有效交互行为下的各动作指令对之间的响应成功率之差,并根据所述各动作指令对之间的响应成功率之差对当前有效交互行为下的各动作指令对进行筛选。Step S223, in the case where the current valid interaction behavior of the interaction record includes multiple action instruction pairs, determine that the interaction record is under the current valid interaction behavior according to the action instruction pairs and their digital signatures of the interaction record under the invalid interaction behavior. The difference between the response success rates of each action instruction pair, and each action instruction pair under the current effective interaction behavior is screened according to the difference in the response success rate between the action instruction pairs.
步骤S224,根据所述交互记录在无效交互行为下的动作指令对及其数字签名为上述筛选得到的每一个动作指令对设置无效交互行为签名,并将所述每一个动作指令对调整到所述无效交互行为签名所对应的无效交互行为的分类下;Step S224, setting an invalid interaction behavior signature for each action instruction pair obtained by the above screening according to the action instruction pair and its digital signature under the invalid interaction behavior recorded in the interaction, and adjusting each action instruction pair to the Under the classification of invalid interaction behaviors corresponding to invalid interaction behavior signatures;
步骤S225,根据有效交互行为分类下的第一动作指令对、无效交互行为分类下的第二动作指令对、所述第一数据节点的第一链路层协议以及所述第二数据节点的第二链路层协议确定出所述第一动作指令流和所述第二动作指令流。Step S225, according to the first action instruction pair under the valid interaction behavior classification, the second action instruction pair under the invalid interaction behavior classification, the first link layer protocol of the first data node, and the first link layer protocol of the second data node. The second link layer protocol determines the first action instruction stream and the second action instruction stream.
通过步骤S221-步骤S225,能够根据交互记录的元数据信任度以及各动作指令对,确定出处于有效交互行为和无效交互行为分类下的各动作指令对,从而实现对动作指令对的有效性的准确划分。在准确划分出动作指令对的有效性的前提下,能够结合第一数据节点的第一链路层协议以及第二数据节点的第二链路层协议确定出第一动作指令流和第二动作指令流。如此,能够将动作指令的有效性考虑在内,从而确保得到的第一动作指令流以及第二动作指令流的准确性。Through steps S221 to S225, each action instruction pair under the classification of valid interaction behavior and invalid interaction behavior can be determined according to the metadata trust degree of the interaction record and each action instruction pair, thereby realizing the validity of the action instruction pair. accurate division. On the premise of accurately dividing the validity of the action instruction pair, the first action instruction stream and the second action can be determined in combination with the first link layer protocol of the first data node and the second link layer protocol of the second data node instruction flow. In this way, the validity of the action command can be taken into consideration, thereby ensuring the accuracy of the obtained first action command stream and the second action command stream.
在确定第一动作指令流和第二动作指令流时,需要将第一数据节点和第二数据节点之间的存在交互的动作指令进行区分,从而确保第一动作指令流和第二动作指令流不会携带对方的动作指令流,为此,在步骤S225中,所述根据有效交互行为分类下的第一动作指令对、无效交互行为分类下的第二动作指令对、所述第一数据节点的第一链路层协议以及所述第二数据节点的第二链路层协议确定出所述第一动作指令流和所述第二动作指令流,具体可以包括以下内容:When determining the first action command flow and the second action command flow, it is necessary to distinguish the action commands that interact between the first data node and the second data node, so as to ensure the first action command flow and the second action command flow. will not carry the action instruction stream of the other party. Therefore, in step S225, the first action instruction pair under the classification of valid interaction behaviors, the second action instruction pair under the classification of invalid interaction behaviors, and the first data node The first link layer protocol of the second data node and the second link layer protocol of the second data node determine the first action instruction stream and the second action instruction stream, which may specifically include the following content:
步骤S2251,根据所述第一动作指令对、所述第二动作指令对、所述第一链路层协议以及所述第二链路层协议,确定所述第一数据节点和所述第二数据节点各自对应的第一动作指令集和所述第二动作指令集。Step S2251: Determine the first data node and the second data node according to the first action instruction pair, the second action instruction pair, the first link layer protocol and the second link layer protocol. The first action instruction set and the second action instruction set corresponding to the data nodes respectively.
步骤S2252,基于所述第一动作指令集、所述第二动作指令集、所述第一链路层协议和所述第二链路层协议,确定出所述第一数据节点的第一结构化序列以及所述第二数据节点的第二结构化序列。Step S2252, based on the first action instruction set, the second action instruction set, the first link layer protocol and the second link layer protocol, determine the first structure of the first data node a sequence of izations and a second structured sequence of said second data nodes.
步骤S2253,基于所述第一结构化序列以及所述第二结构化序列,分别从所述第一动作指令集和所述第二动作指令集中确定所述第一数据节点的第一指令序列和所述第二数据节点的第二指令序列。Step S2253, based on the first structured sequence and the second structured sequence, respectively determine the first instruction sequence and the first instruction sequence of the first data node from the first action instruction set and the second action instruction set a second sequence of instructions for the second data node.
步骤S2254,当确定出所述第一指令序列和所述第二指令序列时,以所述第一指令序列和所述第二指令序列进行指令序列配对,获得配对结果;根据所述配对结果判断所述第一指令序列和所述第二指令序列是否为多分支线程的序列对;若是,则按照每个分支线程将所述第一指令序列和所述第二指令序列分别转换为多个具有所述分支线程的第一指令表单和第二指令表单;分别按照所述第一指令表单和所述第二指令表单查找与所述第一指令表单和第二指令表单具有相同或相似分支线程的预设指令脚本文件;将所述配对结果和所述预设指令脚本文件对应的脚本流合成动作指令流集合。Step S2254, when the first instruction sequence and the second instruction sequence are determined, perform instruction sequence pairing with the first instruction sequence and the second instruction sequence to obtain a pairing result; judge according to the pairing result Whether the first instruction sequence and the second instruction sequence are sequence pairs of multi-branch threads; if so, convert the first instruction sequence and the second instruction sequence into multiple The first instruction form and the second instruction form of the branch thread; respectively, according to the first instruction form and the second instruction form to find the branch thread that has the same or similar branch thread as the first instruction form and the second instruction form A preset instruction script file; the pairing result and the script stream corresponding to the preset instruction script file are synthesized into an action instruction stream set.
步骤S2255,根据所述动作指令流集合中的预设指令脚本文件和所述预设指令脚本文件对应的脚本流、以及所述第一数据节点的动作解析逻辑对应的第一接口信息、所述第二数据节点的动作解析逻辑对应的第二接口信息,确定出所述第一动作指令流和所述第二动作指令流。Step S2255, according to the preset instruction script file in the action instruction stream set, the script stream corresponding to the preset instruction script file, and the first interface information corresponding to the action parsing logic of the first data node, the The second interface information corresponding to the action parsing logic of the second data node determines the first action instruction stream and the second action instruction stream.
在步骤S2251中,所述第一动作指令集包括所述第一数据节点在所述交互记录的有效调用时间范围内向所述第二数据节点发送的一连串的请求指令,所述第二动作指令集包括所述第二数据节点在所述交互记录的有效调用时间范围内根据接收到的所述第一数据节点发送的所述请求指令向所述第一数据节点反馈的一连串的响应指令。In step S2251, the first action instruction set includes a series of request instructions sent by the first data node to the second data node within the valid invocation time range of the interaction record, and the second action instruction set It includes a series of response commands fed back by the second data node to the first data node according to the received request command sent by the first data node within the valid invocation time range of the interaction record.
可以理解,通过步骤S2251-步骤S2255,能够根据第一数据节点和第二数据节点各自对应的动作指令对和链路层协议确定出各自赌赢的动作指令集,进而确定出结构化序列和指令序列。进一步地,对指令序列进行配对,然后根据配对结果确定出符合要求的预设指令脚本文件,进而将配对结果和预设指令脚本文件对应的脚本流合成动作指令流集合。最后基于动作指令流集合中的预设指令脚本文件和预设指令脚本文件对应的脚本流、以及第一数据节点的动作解析逻辑对应的第一接口信息、第二数据节点的动作解析逻辑对应的第二接口信息,确定出第一动作指令流和第二动作指令流。It can be understood that through steps S2251 to S2255, the action instruction set for winning the bet can be determined according to the corresponding action instruction pair of the first data node and the second data node and the link layer protocol, and then the structured sequence and instructions can be determined. sequence. Further, the instruction sequences are paired, and a preset instruction script file that meets the requirements is determined according to the pairing result, and then the pairing result and the script stream corresponding to the preset instruction script file are synthesized into an action instruction stream set. Finally, based on the preset instruction script file in the action instruction stream set and the script stream corresponding to the preset instruction script file, as well as the first interface information corresponding to the action parsing logic of the first data node, and the action parsing logic of the second data node. The second interface information determines the first action instruction stream and the second action instruction stream.
如此,能够依次通过动作指令集、结构化序列、指令序列对第一数据节点和第二数据节点进行区分,从而将第一数据节点和第二数据节点存在交互的动作指令进行区分,从而确保第一动作指令流和第二动作指令流不会携带对方的动作指令流。In this way, the first data node and the second data node can be distinguished through the action instruction set, the structured sequence, and the instruction sequence in turn, so as to distinguish the action instructions in which the first data node and the second data node interact, so as to ensure the first data node and the second data node. The first action instruction stream and the second action instruction stream do not carry each other's action instruction stream.
在具体实施时,虽然对第一动作指令流和第二动作指令流进行解析的动作解析逻辑是一致的,但是要考虑第一动作指令流和第二动作指令流之间的时序差异,为此,在步骤S22中,所述按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征,具体可以包括以下内容:During specific implementation, although the action parsing logic for parsing the first action instruction stream and the second action instruction stream is consistent, the timing difference between the first action instruction stream and the second action instruction stream should be considered. , in step S22, according to the action parsing logic corresponding to the first data node or the second data node, parse the first action instruction stream and the second action instruction stream respectively, and obtain the first action instruction stream. The first instruction feature and the second instruction feature may specifically include the following:
步骤S221,根据所述动作指令逻辑中的指令拆分规则,分别对所述第一动作指令流和所述第二动作指令流进行拆分,得到所述第一动作指令流的第一拆分集以及所述第二动作指令流的第二拆分集。Step S221, according to the instruction splitting rule in the action instruction logic, split the first action instruction stream and the second action instruction stream respectively to obtain a first split of the first action instruction stream set and a second split set of the second action instruction stream.
步骤S222,在预设的动作指令包集合中任意确定出一个动作指令包作为目标动作指令包;分别将所述第一动作指令流对应的第一拆分集中的每个第一单动作指令和所述第二动作指令流对应的第二拆分集中的每个第二单动作指令与所述目标动作指令包中的每个参考动作指令进行对比,得到所述第一动作指令流与所述目标动作指令包之间的第一对比结果以及所述第二动作指令流与所述目标动作指令包之间的第二对比结果。Step S222, arbitrarily determine an action instruction packet in the preset action instruction packet set as the target action instruction packet; respectively, each first single action instruction in the first split set corresponding to the first action instruction stream and Each second single action instruction in the second split set corresponding to the second action instruction stream is compared with each reference action instruction in the target action instruction packet, to obtain the first action instruction stream and the A first comparison result between target action instruction packets and a second comparison result between the second action instruction stream and the target action instruction packet.
步骤S223,以所述目标动作指令包为参考位置,沿设定序列方向进行对比,直至所述动作指令包集合中出现一个当前动作指令包,使得所述第一动作指令流与所述当前动作指令包之间的第三对比结果与所述第一动作指令流与所述目标动作指令包之间的第一对比结果的第一相似度值大于设定阈值,且所述第二动作指令流与所述当前动作指令包之间的第四对比结果与所述第二动作指令流与所述当前动作指令包之间的第二对比结果的第二相似度值大于所述设定阈值。Step S223, take the target action instruction packet as a reference position, and compare along the set sequence direction until a current action instruction packet appears in the action instruction packet set, so that the first action instruction stream and the current action are The first similarity value between the third comparison result between the instruction packets and the first comparison result between the first action instruction stream and the target action instruction packet is greater than a set threshold, and the second action instruction stream A second similarity value between the fourth comparison result between the current action instruction package and the second comparison result between the second action instruction stream and the current action instruction package is greater than the set threshold.
步骤S224,确定所述当前动作指令包对应的第三指令特征,所述第三指令特征确定所述动作解析逻辑的解析线程;按照所述解析线程对所述第一拆分集和所述第二拆分集进行特征提取,得到所述第一指令特征和所述第二指令特征。Step S224: Determine the third instruction feature corresponding to the current action instruction package, and the third instruction feature determines the parsing thread of the action parsing logic; analyze the first split set and the first split set according to the parsing thread. Feature extraction is performed on the second split set to obtain the first instruction feature and the second instruction feature.
在步骤S221中,所述第一拆分集中包括所述第一动作指令流的多个第一单动作指令,所述第二拆分集中包括所述第二动作指令流的多个第二单动作指令。In step S221, the first split set includes multiple first single action instructions of the first action instruction stream, and the second split set includes multiple second single action instructions of the second action instruction stream Action command.
在步骤S222中,所述动作指令包集合包括以指令数据库中每个已验证动作指令为参考动作指令的对比动作指令包,所述对比动作指令包的动作指令节点为参考动作指令的相对时序信息,之后的每个动作指令节点包括参考动作指令与所述指令数据库中其他动作指令的时序关联度以及所述其他动作指令的相对时序信息,所述每个对比动作指令包中动作指令按照所述时序关联度升序排列。In step S222, the action instruction package set includes a comparison action instruction package with each verified action instruction in the instruction database as a reference action instruction, and an action instruction node of the comparison action instruction package is the relative timing information of the reference action instruction , each subsequent action instruction node includes the timing correlation degree between the reference action instruction and other action instructions in the instruction database and the relative timing information of the other action instructions, and the action instructions in each comparison action instruction package are in accordance with the Sorted in ascending order of temporal relevance.
可以理解,通过步骤S221-步骤S224,能够基于动作指令逻辑中的指令拆分规则对第一动作指令流和第二动作指令流进行拆分得到第一拆分集和第二拆分集,进而基于第一拆分集和第二拆分集从预设的动作指令包集合确定出当前动作指令包,进而基于当前动作指令包确定出动作解析逻辑的解析线程,然后基于解析线程对第一拆分集和第二拆分集进行特征提取,得到第一指令特征和第二指令特征。如此,能够在确定当前动作指令包时将第一动作指令流和第二动作指令流之间的时序差异考虑在内,从而确保对第一动作指令流和第二动作指令流进行解析的准确性。It can be understood that through steps S221 to S224, the first action instruction stream and the second action instruction stream can be split based on the instruction splitting rules in the action instruction logic to obtain the first split set and the second split set, and then Based on the first split set and the second split set, the current action instruction packet is determined from the preset action instruction packet set, and then the parsing thread of the action parsing logic is determined based on the current action instruction packet, and then based on the parsing thread, the first split Feature extraction is performed on the diversity set and the second split set to obtain the first instruction feature and the second instruction feature. In this way, the timing difference between the first action command stream and the second action command stream can be taken into account when determining the current action command packet, thereby ensuring the accuracy of parsing the first action command stream and the second action command stream .
在具体实施时,由于不同的数据节点的行为识别逻辑是不同的,在对数据节点的指令特征进行行为识别时,需要将执行请求发送和反馈响应的不同的数据节点之间的相对角色关系对应的动作映射考虑在内,为此,在步骤S24中,所述基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果,具体可以包括以下内容:In the specific implementation, since the behavior recognition logic of different data nodes is different, when the behavior recognition of the command features of the data nodes is performed, it is necessary to correspond the relative role relationship between the different data nodes that send the execution request and feedback the response. Taking into account the action mapping of The second behavior identification logic corresponding to the second data node identifies the second instruction feature to obtain a second identification result, which may specifically include the following content:
步骤S241,根据所述第一数据节点的第一指令特征对应的第一动作类别及所述第二数据节点的第二指令特征对应的第二动作类别,确定所述第一数据节点相对于所述第二数据节点的第一角色映射向量以及所述第二数据节点相对于所述第一数据节点的第二角色映射向量。Step S241, according to the first action category corresponding to the first command feature of the first data node and the second action category corresponding to the second command feature of the second data node, determine the relative relationship between the first data node and the second data node. The first role mapping vector of the second data node and the second role mapping vector of the second data node relative to the first data node.
步骤S242,基于所述第一角色映射向量以及所述第一指令特征所表征的所述第一数据节点向所述第二数据节点发送的请求指令的第一累计值,对所述第一行为识别逻辑中的第一逻辑识别单元和第一逻辑有向边进行调整,得到第一目标行为识别逻辑;基于所述第二角色映射向量以及所述第二指令特征所表征的所述第二数据节点向所述第一数据节点发送的响应指令的第二累计值,对所述第二行为识别逻辑中的第二逻辑识别单元和第二逻辑有向边进行调整,得到第二目标行为识别逻辑。Step S242, based on the first role mapping vector and the first cumulative value of the request command sent by the first data node to the second data node represented by the first command feature, determine the first behavior. The first logical recognition unit in the recognition logic and the first logical directed edge are adjusted to obtain the first target behavior recognition logic; based on the second role mapping vector and the second data represented by the second instruction feature The second accumulated value of the response command sent by the node to the first data node, the second logic recognition unit and the second logic directed edge in the second behavior recognition logic are adjusted to obtain the second target behavior recognition logic .
步骤S243,根据所述第一目标行为识别逻辑和所述第二目标行为识别逻辑确定所述对所述第一指令特征和所述第二指令特征进行识别的持续时长。Step S243: Determine, according to the first target behavior identification logic and the second target behavior identification logic, the duration for identifying the first instruction feature and the second instruction feature.
步骤S244,在所述持续时长内采用所述第一目标行为识别逻辑确定所述第一指令特征的第一特征关联度;根据所述第一特征关联度以及预存的所述第二数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第二数据节点与所述第一数据节点之间的第一验证结果,得到所述第一识别结果;所述第一验证结果是所述第二数据节点作为验证端且所述第一数据节点作为待验证端对应的验证结果。Step S244, using the first target behavior recognition logic to determine the first feature correlation degree of the first instruction feature within the duration; according to the first feature correlation degree and the pre-stored second data node and the obtaining the first identification result from the first verification result between the second data node and the first data node included in the verification form between other data nodes in the distributed data network; the The first verification result is the verification result corresponding to the second data node as the verification end and the first data node as the to-be-verified terminal.
步骤S245,在所述持续时长内采用所述第二目标行为识别逻辑确定所述第二指令特征的第二特征关联度;根据所述第二特征关联度以及预存的所述第一数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第一数据节点与所述第二数据节点之间的第二验证结果,得到所述第二识别结果;所述第二验证结果是所述第一数据节点作为验证端且所述第二数据节点作为待验证端对应的验证结果。Step S245, using the second target behavior recognition logic to determine the second feature correlation degree of the second instruction feature within the duration; according to the second feature correlation degree and the pre-stored first data node and the obtaining the second identification result from the second verification result between the first data node and the second data node included in the verification form between other data nodes in the distributed data network; the The second verification result is the verification result corresponding to the first data node as the verification end and the second data node as the to-be-verified terminal.
在步骤S243中,所述持续时长用于表征采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一起始时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二起始时刻相同且采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一结束时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二结束时刻相同。In step S243, the duration is used to characterize the first start time of using the first target behavior recognition logic to recognize the first instruction feature and the second target behavior recognition logic to recognize the second target behavior The second starting time for identifying the instruction feature is the same and the first ending time for identifying the first instruction feature using the first target behavior identification logic is the same as the second target behavior identification logic using the second target behavior identification logic. The second end time at which the instruction feature is identified is the same.
可以理解,通过步骤S241-步骤S245,能够根据数据节点的动作类别确定对应的角色映射向量,从而基于角色映射向量实现对不同的行为识别逻辑的调整得到不同的目标行为识别逻辑。进一步地,基于不同的目标行为识别逻辑确定对识别的持续时长进行统一,能够确保不同识别结果的时间同步性,进而不同识别结果的准确性。在进行识别时,能够根据不同的特征关联度和不同数据节点之间的验证结果准确得到不同的识别结果。It can be understood that through steps S241 to S245, the corresponding role mapping vector can be determined according to the action category of the data node, so as to realize the adjustment of different behavior recognition logic based on the role mapping vector to obtain different target behavior recognition logic. Further, unifying the duration of recognition based on different target behavior recognition logics can ensure the time synchronization of different recognition results, and thus the accuracy of different recognition results. During identification, different identification results can be accurately obtained according to different feature correlation degrees and verification results between different data nodes.
通过上述方法,能够将不同动作类别对应的数据节点之间的相对角色关系进行区分,例如从请求指令和响应指令角度以及验证端和待验证端角度确定不同的数据节点对应的识别结果,如此,能够将不同的数据节点之间的相对角色关系对应的动作映射考虑在内,确保不同的识别结果的准确性。Through the above method, the relative role relationship between data nodes corresponding to different action categories can be distinguished, for example, the identification results corresponding to different data nodes can be determined from the perspectives of request commands and response commands, as well as from the perspectives of verification and to-be-verified terminals. In this way, The action mapping corresponding to the relative role relationship between different data nodes can be taken into account to ensure the accuracy of different recognition results.
在具体实施时,为了准确确定出存在异常行为的数据节点,需要从不同的数据节点的角度来分析识别结果,为此,在步骤S25中,所述根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点,具体还可以包括以下内容:During specific implementation, in order to accurately determine the data nodes with abnormal behaviors, it is necessary to analyze the identification results from the perspectives of different data nodes. For this reason, in step S25, the 2. The identification result determines that the first data node and the second data node have data nodes with abnormal behavior, which may specifically include the following content:
步骤S251,提取所述第一识别结果中的第一置信度参数和所述第二识别结果中的第二置信度参数。Step S251: Extract the first confidence parameter in the first identification result and the second confidence parameter in the second identification result.
步骤S252,根据所述第一识别结果得到所述第一数据节点映射至所述第二数据节点的第一校验码。Step S252, obtaining a first check code mapping the first data node to the second data node according to the first identification result.
步骤S253,根据所述第一校验码和所述第二识别结果得到所述第二数据节点映射至所述第一数据节点的第二校验码。Step S253: Obtain, according to the first check code and the second identification result, a second check code that maps the second data node to the first data node.
步骤S254,根据预存的第一数据节点的第一设备标识对应的第一动态随机数和所述第一识别结果确定出第三校验码。Step S254: Determine a third check code according to the pre-stored first dynamic random number corresponding to the first device identifier of the first data node and the first identification result.
步骤S255,根据预存的第二数据节点的第二设备标识对应的第二动态随机数和所述第二识别结果确定出第四校验码。Step S255: Determine a fourth check code according to the pre-stored second dynamic random number corresponding to the second device identifier of the second data node and the second identification result.
步骤S256,判断所述第一校验码和所述第三校验码是否一致,在所述第一校验码和所述第三校验码不一致时确定所述第一数据节点存在异常行为。Step S256, determine whether the first check code and the third check code are consistent, and determine that the first data node has abnormal behavior when the first check code and the third check code are inconsistent .
步骤S257,判断所述第二校验码和所述第四校验码是否一致,在所述第二校验码和所述第四校验码不一致时确定所述第二数据节点存在异常行为。Step S257, determine whether the second check code and the fourth check code are consistent, and determine that the second data node has abnormal behavior when the second check code and the fourth check code are inconsistent .
可以理解,通过步骤S251-步骤S257,能够基于第一数据节点和第二数据节点之间的互相映射确定出第一校验码和第二校验码,并基于预存的第一动态随机数和第二动态随机数确定出第三校验码和第四校验码,如此,能够从不同的数据节点的角度来分析识别结果,从而准确确定出存在异常行为的数据节点。It can be understood that through steps S251 to S257, the first check code and the second check code can be determined based on the mutual mapping between the first data node and the second data node, and based on the pre-stored first dynamic random number and The second dynamic random number determines the third check code and the fourth check code. In this way, the identification results can be analyzed from the perspectives of different data nodes, thereby accurately determining the data nodes with abnormal behavior.
在具体实施时,为了确保分布式数据网络中其他数据节点的安全性,在步骤S251-步骤S257的基础上,还可以包括以下内容:During specific implementation, in order to ensure the security of other data nodes in the distributed data network, on the basis of step S251-step S257, the following contents may also be included:
屏蔽存在异常行为的第一数据节点和第二数据节点。The first data node and the second data node with abnormal behavior are shielded.
可以理解,通过将存在异常行为的第一数据节点和第二数据节点进行屏蔽,能够避免存在异常行为的第一数据节点和第二数据节点与分布式数据网络中的其他节点进行通信,从而确保分布式数据网络中其他数据节点的安全性。It can be understood that by shielding the first data node and the second data node with abnormal behavior, the first data node and the second data node with abnormal behavior can be prevented from communicating with other nodes in the distributed data network, so as to ensure Security of other data nodes in a distributed data network.
在具体实施时,为了确保在屏蔽存在异常行为的第一数据节点和第二数据节点时不影响其他数据节点的正常工作,所述屏蔽存在异常行为的第一数据节点或第二数据节点,具体还可以包括以下内容:During specific implementation, in order to ensure that the normal operation of other data nodes is not affected when the first data node and the second data node with abnormal behavior are shielded, the first data node or the second data node with abnormal behavior is shielded, specifically Can also include the following:
步骤S31,当所述分布式数据网络中存在除所述第一数据节点和所述第二数据节点之外的第三数据节点对应的当前数据交互行为时,根据当前数据交互行为中用于检测分布式数据网络的网络稳定性的扰动参数、与当前数据交互行为所属时长对应的用于表示所述网络稳定性的最佳传输稳定性权重值、以及至少一个与当前数据交互行为所属时长对应的所述分布式数据网络的数据节点接入数量增长率,确定当前数据交互行为进行时所述第三数据节点出现数据丢失的概率。Step S31, when there is a current data interaction behavior corresponding to a third data node other than the first data node and the second data node in the distributed data network, according to the current data interaction behavior for detecting The disturbance parameter of the network stability of the distributed data network, the optimal transmission stability weight value corresponding to the duration of the current data interaction behavior and used to represent the network stability, and at least one corresponding to the duration of the current data interaction behavior. The growth rate of the number of data node accesses of the distributed data network determines the probability of data loss of the third data node when the current data interaction behavior is in progress.
步骤S32,根据所述概率,以及所述概率的裕量范围划分的若干数值区间与当前数据交互行为之间的对应关系,确定所述概率对应的屏蔽信号频段。Step S32 , according to the probability and the correspondence between several numerical intervals divided by the margin range of the probability and the current data interaction behavior, determine the frequency band of the masked signal corresponding to the probability.
步骤S33,根据所述屏蔽信号频段生成用于屏蔽所述第一数据节点或所述第二数据节点发起的请求指令或响应指令的屏蔽信号,并通过所述分布式数据网络的节点分布序列发射所述屏蔽信号。Step S33, generating a masking signal for masking the request command or response command initiated by the first data node or the second data node according to the masking signal frequency band, and transmitting it through the node distribution sequence of the distributed data network. the shielded signal.
在步骤S31中,所述数据节点接入数量增长率为根据所述分布式数据网络的网络结构化描述对应的有效接入请求数量与接入请求总数的比例。In step S31, the growth rate of the number of accesses of the data nodes is the ratio of the number of valid access requests corresponding to the network structure description of the distributed data network to the total number of access requests.
可以理解,通过步骤S31-步骤S33,能够对分布式数据网络中存在除第一数据节点和第二数据节点之外的第三数据节点对应的当前数据交互行为进行分析,从而实现对分布式数据网络的网络稳定性和传输稳定性的分析,进而确定出第三数据节点在当前数据交互行为进行时出现数据丢失的概率。然后根据概率进行进一步分析,确定出屏蔽信号频段,进而生成用于屏蔽第一数据节点或第二数据节点发起的请求指令或响应指令的屏蔽信号,并通过分布式数据网络的节点分布序列发射所述屏蔽信号。如此,在发射屏蔽信号的时候能够将第三数据节点的数据交互行为受到的影响最小化,从而确保第三数据节点的正常工作。It can be understood that through steps S31 to S33, the current data interaction behavior corresponding to the third data node other than the first data node and the second data node in the distributed data network can be analyzed, so as to realize the distributed data Analyze the network stability and transmission stability of the network, and then determine the probability of data loss in the third data node during the current data interaction behavior. Then further analysis is performed according to the probability to determine the frequency band of the shielded signal, and then a shielded signal for shielding the request command or response command initiated by the first data node or the second data node is generated, and the signal is transmitted through the node distribution sequence of the distributed data network. the shielded signal. In this way, when the shielding signal is transmitted, the influence on the data interaction behavior of the third data node can be minimized, thereby ensuring the normal operation of the third data node.
在上述基础上,本发明实施例提供了一种分布式数据节点异常行为检测装置200。图2为根据本发明一个实施例提供的一种分布式数据节点异常行为检测装置200的功能模块框图,该分布式数据节点异常行为检测装置200包括:Based on the above, an embodiment of the present invention provides an
判断模块201,用于当所述分布式数据网络中的第一数据节点与第二数据节点进行数据交互时,判断所述第一数据节点的节点标识与所述第二数据节点是否相同;A
确定模块202,用于在所述第一数据节点的节点标识与所述第二数据节点的节点标识相同时,从所述第一数据节点和所述第二数据节点之间的交互记录中确定出第一数据节点的第一动作指令流以及所述第二数据节点的第二动作指令流;A
解析模块203,用于按照所述第一数据节点或所述第二数据节点对应的动作解析逻辑,分别对所述第一动作指令流和所述第二动作指令流进行解析,得到第一指令特征和第二指令特征;The
识别模块204,用于在所述第一指令特征和所述第二指令特征不匹配时,基于所述第一数据节点对应的第一行为识别逻辑对所述第一指令特征进行识别得到第一识别结果并基于所述第二数据节点对应的第二行为识别逻辑对所述第二指令特征进行识别得到第二识别结果;The
检测模块205,用于根据所述第一识别结果和所述第二识别结果确定出所述第一数据节点和所述第二数据节点中存在异常行为的数据节点。The
在一种可替换的实施例中,所述确定模块202,用于:In an alternative embodiment, the determining
获取所述交互记录的元数据信任度以及各动作指令对;Obtain the metadata trust degree of the interaction record and each action instruction pair;
在根据所述元数据信任度确定出所述交互记录中包含有无效交互行为的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在有效交互行为下的各动作指令对与交互记录在无效交互行为下的各动作指令对之间的响应成功率之差,并将交互记录在有效交互行为下的与在无效交互行为下的动作指令对的响应成功率相同的动作指令对调整到相应的无效交互行为的分类下;In the case where it is determined according to the metadata trust degree that the interaction record contains invalid interaction behaviors, it is determined that the interaction record is under valid interaction behaviors according to the action instruction pair and its digital signature of the interaction record under invalid interaction behaviors The difference between the response success rate of each action instruction pair and the action instruction pair recorded under the invalid interaction behavior, and the response success rate of the interaction record under the valid interaction behavior and the action instruction pair under the invalid interaction behavior The action instruction pairs with the same rate are adjusted to the corresponding invalid interaction behavior classification;
在交互记录的当前有效交互行为下包含有多个动作指令对的情况下,根据所述交互记录在无效交互行为下的动作指令对及其数字签名确定交互记录在当前有效交互行为下的各动作指令对之间的响应成功率之差,并根据所述各动作指令对之间的响应成功率之差对当前有效交互行为下的各动作指令对进行筛选;In the case where the currently valid interaction behavior of the interaction record contains multiple action instruction pairs, each action recorded in the interaction record under the current valid interaction behavior is determined according to the action instruction pairs and their digital signatures of the interaction record under the invalid interaction behavior The difference between the response success rates between the instruction pairs, and screening each action instruction pair under the current effective interaction behavior according to the difference in the response success rate between the action instruction pairs;
根据所述交互记录在无效交互行为下的动作指令对及其数字签名为上述筛选得到的每一个动作指令对设置无效交互行为签名,并将所述每一个动作指令对调整到所述无效交互行为签名所对应的无效交互行为的分类下;Set an invalid interaction behavior signature for each action instruction pair obtained by the above screening according to the action instruction pair and its digital signature recorded under the invalid interaction behavior, and adjust each action instruction pair to the invalid interaction behavior Under the classification of invalid interaction behavior corresponding to the signature;
根据有效交互行为分类下的第一动作指令对、无效交互行为分类下的第二动作指令对、所述第一数据节点的第一链路层协议以及所述第二数据节点的第二链路层协议确定出所述第一动作指令流和所述第二动作指令流。According to the first action instruction pair under the valid interaction behavior classification, the second action instruction pair under the invalid interaction behavior classification, the first link layer protocol of the first data node, and the second link of the second data node The layer protocol determines the first action instruction stream and the second action instruction stream.
在一种可替换的实施例中,所述确定模块202,用于:In an alternative embodiment, the determining
根据所述第一动作指令对、所述第二动作指令对、所述第一链路层协议以及所述第二链路层协议,确定所述第一数据节点和所述第二数据节点各自对应的第一动作指令集和所述第二动作指令集;其中,所述第一动作指令集包括所述第一数据节点在所述交互记录的有效调用时间范围内向所述第二数据节点发送的一连串的请求指令,所述第二动作指令集包括所述第二数据节点在所述交互记录的有效调用时间范围内根据接收到的所述第一数据节点发送的所述请求指令向所述第一数据节点反馈的一连串的响应指令;According to the first action instruction pair, the second action instruction pair, the first link layer protocol and the second link layer protocol, determine that the first data node and the second data node are respectively The corresponding first action instruction set and the second action instruction set; wherein, the first action instruction set includes that the first data node sends to the second data node within the valid invocation time range of the interaction record A series of request instructions, the second action instruction set includes that the second data node sends the request instruction received by the first data node to the A series of response commands fed back by the first data node;
基于所述第一动作指令集、所述第二动作指令集、所述第一链路层协议和所述第二链路层协议,确定出所述第一数据节点的第一结构化序列以及所述第二数据节点的第二结构化序列;determining the first structured sequence of the first data node based on the first action instruction set, the second action instruction set, the first link layer protocol and the second link layer protocol; and a second structured sequence of said second data nodes;
基于所述第一结构化序列以及所述第二结构化序列,分别从所述第一动作指令集和所述第二动作指令集中确定所述第一数据节点的第一指令序列和所述第二数据节点的第二指令序列;Based on the first structured sequence and the second structured sequence, the first instruction sequence and the first instruction sequence of the first data node are determined from the first action instruction set and the second action instruction set, respectively. The second instruction sequence of the two data nodes;
当确定出所述第一指令序列和所述第二指令序列时,以所述第一指令序列和所述第二指令序列进行指令序列配对,获得配对结果;根据所述配对结果判断所述第一指令序列和所述第二指令序列是否为多分支线程的序列对;若是,则按照每个分支线程将所述第一指令序列和所述第二指令序列分别转换为多个具有所述分支线程的第一指令表单和第二指令表单;分别按照所述第一指令表单和所述第二指令表单查找与所述第一指令表单和第二指令表单具有相同或相似分支线程的预设指令脚本文件;将所述配对结果和所述预设指令脚本文件对应的脚本流合成动作指令流集合;When the first instruction sequence and the second instruction sequence are determined, instruction sequence pairing is performed with the first instruction sequence and the second instruction sequence to obtain a pairing result; the first instruction sequence is determined according to the pairing result. Whether an instruction sequence and the second instruction sequence are a sequence pair of multi-branch threads; if so, convert the first instruction sequence and the second instruction sequence into a multi-branch thread according to each branch thread. The first instruction form and the second instruction form of the thread; according to the first instruction form and the second instruction form respectively, find the preset instructions with the same or similar branch thread as the first instruction form and the second instruction form a script file; synthesize an action instruction stream set with the script stream corresponding to the pairing result and the preset instruction script file;
根据所述动作指令流集合中的预设指令脚本文件和所述预设指令脚本文件对应的脚本流、以及所述第一数据节点的动作解析逻辑对应的第一接口信息、所述第二数据节点的动作解析逻辑对应的第二接口信息,确定出所述第一动作指令流和所述第二动作指令流。According to the preset instruction script file in the action instruction stream set, the script stream corresponding to the preset instruction script file, and the first interface information and the second data corresponding to the action parsing logic of the first data node The second interface information corresponding to the action parsing logic of the node determines the first action instruction stream and the second action instruction stream.
在一种可替换的实施例中,所述解析模块203,用于:In an alternative embodiment, the
根据所述动作指令逻辑中的指令拆分规则,分别对所述第一动作指令流和所述第二动作指令流进行拆分,得到所述第一动作指令流的第一拆分集以及所述第二动作指令流的第二拆分集;其中,所述第一拆分集中包括所述第一动作指令流的多个第一单动作指令,所述第二拆分集中包括所述第二动作指令流的多个第二单动作指令;According to the instruction splitting rule in the action instruction logic, the first action instruction stream and the second action instruction stream are split respectively to obtain a first split set of the first action instruction stream and all a second split set of the second action instruction stream; wherein the first split set includes a plurality of first single-action instructions of the first action instruction stream, and the second split set includes the first Multiple second single-action instructions of the two-action instruction stream;
在预设的动作指令包集合中任意确定出一个动作指令包作为目标动作指令包;分别将所述第一动作指令流对应的第一拆分集中的每个第一单动作指令和所述第二动作指令流对应的第二拆分集中的每个第二单动作指令与所述目标动作指令包中的每个参考动作指令进行对比,得到所述第一动作指令流与所述目标动作指令包之间的第一对比结果以及所述第二动作指令流与所述目标动作指令包之间的第二对比结果;所述动作指令包集合包括以指令数据库中每个已验证动作指令为参考动作指令的对比动作指令包,所述对比动作指令包的动作指令节点为参考动作指令的相对时序信息,之后的每个动作指令节点包括参考动作指令与所述指令数据库中其他动作指令的时序关联度以及所述其他动作指令的相对时序信息,所述每个对比动作指令包中动作指令按照所述时序关联度升序排列;An action instruction package is arbitrarily determined as the target action instruction package in the preset action instruction package set; each first single action instruction and the first single action instruction in the first split set corresponding to the first action instruction stream are respectively Each second single-action instruction in the second split set corresponding to the two-action instruction stream is compared with each reference action instruction in the target action instruction package to obtain the first action instruction stream and the target action instruction The first comparison result between the packages and the second comparison result between the second action instruction stream and the target action instruction package; the action instruction package set includes taking each verified action instruction in the instruction database as a reference The comparison action instruction package of the action instruction, the action instruction node of the comparison action instruction package is the relative timing information of the reference action instruction, and each subsequent action instruction node includes the time sequence association between the reference action instruction and other action instructions in the instruction database degree and relative timing information of the other action instructions, the action instructions in each of the comparison action instruction packets are arranged in ascending order according to the timing correlation degree;
以所述目标动作指令包为参考位置,沿设定序列方向进行对比,直至所述动作指令包集合中出现一个当前动作指令包,使得所述第一动作指令流与所述当前动作指令包之间的第三对比结果与所述第一动作指令流与所述目标动作指令包之间的第一对比结果的第一相似度值大于设定阈值,且所述第二动作指令流与所述当前动作指令包之间的第四对比结果与所述第二动作指令流与所述当前动作指令包之间的第二对比结果的第二相似度值大于所述设定阈值;Taking the target action instruction packet as a reference position, the comparison is carried out along the set sequence direction until a current action instruction packet appears in the action instruction packet set, so that the first action instruction stream and the current action instruction packet have a difference. The first similarity value between the third comparison result and the first comparison result between the first action instruction stream and the target action instruction packet is greater than the set threshold, and the second action instruction stream and the The second similarity value between the fourth comparison result between the current action instruction packets and the second comparison result between the second action instruction stream and the current action instruction packet is greater than the set threshold;
确定所述当前动作指令包对应的第三指令特征,所述第三指令特征确定所述动作解析逻辑的解析线程;按照所述解析线程对所述第一拆分集和所述第二拆分集进行特征提取,得到所述第一指令特征和所述第二指令特征。determining a third instruction feature corresponding to the current action instruction packet, where the third instruction feature determines a parsing thread of the action parsing logic; splitting the first split set and the second split according to the parsing thread The set performs feature extraction to obtain the first instruction feature and the second instruction feature.
在一种可替换的实施例中,所述识别模块204,用于:In an alternative embodiment, the
根据所述第一数据节点的第一指令特征对应的第一动作类别及所述第二数据节点的第二指令特征对应的第二动作类别,确定所述第一数据节点相对于所述第二数据节点的第一角色映射向量以及所述第二数据节点相对于所述第一数据节点的第二角色映射向量;According to the first action class corresponding to the first command feature of the first data node and the second action class corresponding to the second command feature of the second data node, it is determined that the first data node is relative to the second data node. a first role mapping vector of the data node and a second role mapping vector of the second data node relative to the first data node;
基于所述第一角色映射向量以及所述第一指令特征所表征的所述第一数据节点向所述第二数据节点发送的请求指令的第一累计值,对所述第一行为识别逻辑中的第一逻辑识别单元和第一逻辑有向边进行调整,得到第一目标行为识别逻辑;基于所述第二角色映射向量以及所述第二指令特征所表征的所述第二数据节点向所述第一数据节点发送的响应指令的第二累计值,对所述第二行为识别逻辑中的第二逻辑识别单元和第二逻辑有向边进行调整,得到第二目标行为识别逻辑;Based on the first role mapping vector and the first accumulated value of the request instruction sent by the first data node to the second data node represented by the first instruction feature, the first behavior identification logic The first logical recognition unit and the first logical directed edge are adjusted to obtain the first target behavior recognition logic; based on the second role mapping vector and the second data node represented by the second instruction feature the second cumulative value of the response command sent by the first data node, and adjusting the second logic recognition unit and the second logic directed edge in the second behavior recognition logic to obtain the second target behavior recognition logic;
根据所述第一目标行为识别逻辑和所述第二目标行为识别逻辑确定所述对所述第一指令特征和所述第二指令特征进行识别的持续时长;其中,所述持续时长用于表征采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一起始时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二起始时刻相同且采用所述第一目标行为识别逻辑对所述第一指令特征进行识别的第一结束时刻与采用所述第二目标行为识别逻辑对所述第二指令特征进行识别的第二结束时刻相同;The duration for identifying the first instruction feature and the second instruction feature is determined according to the first target behavior identification logic and the second target behavior identification logic; wherein the duration is used to characterize The first start time when the first instruction feature is recognized by the first target behavior recognition logic is the same as the second start time when the second command feature is recognized by the second target behavior recognition logic and The first end time at which the first instruction feature is recognized by the first target behavior recognition logic is the same as the second end time when the second instruction feature is recognized by the second target behavior recognition logic;
在所述持续时长内采用所述第一目标行为识别逻辑确定所述第一指令特征的第一特征关联度;根据所述第一特征关联度以及预存的所述第二数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第二数据节点与所述第一数据节点之间的第一验证结果,得到所述第一识别结果;所述第一验证结果是所述第二数据节点作为验证端且所述第一数据节点作为待验证端对应的验证结果;Determine the first feature correlation degree of the first instruction feature by using the first target behavior recognition logic within the duration; according to the first feature correlation degree and the pre-stored second data node and the distribution the first verification result between the second data node and the first data node included in the verification form between other data nodes in the data network, to obtain the first identification result; the first verification The result is that the second data node is used as the verification terminal and the first data node is used as the verification result corresponding to the terminal to be verified;
在所述持续时长内采用所述第二目标行为识别逻辑确定所述第二指令特征的第二特征关联度;根据所述第二特征关联度以及预存的所述第一数据节点与所述分布式数据网络中的其他数据节点之间的验证表单中包括的所述第一数据节点与所述第二数据节点之间的第二验证结果,得到所述第二识别结果;所述第二验证结果是所述第一数据节点作为验证端且所述第二数据节点作为待验证端对应的验证结果。Determine the second feature correlation degree of the second instruction feature by using the second target behavior recognition logic within the duration; according to the second feature correlation degree and the pre-stored first data node and the distribution obtain the second identification result; the second verification As a result, the first data node is used as a verification terminal and the second data node is used as a verification result corresponding to the terminal to be verified.
在一种可替换的实施例中,所述检测模块205,用于:In an alternative embodiment, the
提取所述第一识别结果中的第一置信度参数和所述第二识别结果中的第二置信度参数;extracting the first confidence parameter in the first recognition result and the second confidence parameter in the second recognition result;
根据所述第一识别结果得到所述第一数据节点映射至所述第二数据节点的第一校验码;obtaining a first check code mapping the first data node to the second data node according to the first identification result;
根据所述第一校验码和所述第二识别结果得到所述第二数据节点映射至所述第一数据节点的第二校验码;obtaining, according to the first check code and the second identification result, a second check code of the second data node mapped to the first data node;
根据预存的第一数据节点的第一设备标识对应的第一动态随机数和所述第一识别结果确定出第三校验码;determining the third check code according to the pre-stored first dynamic random number corresponding to the first device identifier of the first data node and the first identification result;
根据预存的第二数据节点的第二设备标识对应的第二动态随机数和所述第二识别结果确定出第四校验码;Determine the fourth check code according to the second dynamic random number corresponding to the second device identifier of the second data node and the second identification result pre-stored;
判断所述第一校验码和所述第三校验码是否一致,在所述第一校验码和所述第三校验码不一致时确定所述第一数据节点存在异常行为;Determine whether the first check code and the third check code are consistent, and determine that the first data node has abnormal behavior when the first check code and the third check code are inconsistent;
判断所述第二校验码和所述第四校验码是否一致,在所述第二校验码和所述第四校验码不一致时确定所述第二数据节点存在异常行为。It is judged whether the second check code and the fourth check code are consistent, and when the second check code and the fourth check code are inconsistent, it is determined that the second data node has abnormal behavior.
在一种可替换的实施例中,所述检测模块205,还用于:In an alternative embodiment, the
屏蔽存在异常行为的第一数据节点或第二数据节点。The first data node or the second data node with abnormal behavior is shielded.
所述服务器300包括处理器和存储器,上述判断模块201、确定模块202、解析模块203、识别模块204和检测模块205等均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。The
处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核实现在确保分布式数据节点的工作性能的前提下实现异常行为的检测从而确定出被入侵的分布式数据节点。The processor contains a kernel, and the kernel calls the corresponding program unit from the memory. One or more kernels can be set, and by adjusting the kernel, the detection of abnormal behavior can be realized on the premise of ensuring the working performance of the distributed data nodes, so as to determine the invaded distributed data nodes.
本发明实施例提供了一种可读存储介质,其上存储有程序,该程序被处理器执行时实现所述分布式数据节点异常行为检测方法。An embodiment of the present invention provides a readable storage medium on which a program is stored, and when the program is executed by a processor, the method for detecting abnormal behavior of a distributed data node is implemented.
本发明实施例提供了一种处理器,所述处理器用于运行程序,其中,所述程序运行时执行所述分布式数据节点异常行为检测方法。An embodiment of the present invention provides a processor for running a program, wherein the method for detecting abnormal behavior of a distributed data node is executed when the program is running.
本发明实施例中,如图3所示,服务器300包括至少一个处理器301、以及与处理器301连接的至少一个存储器302、总线;其中,处理器301、存储器302通过总线303完成相互间的通信;处理器301用于调用存储器302中的程序指令,以执行上述的分布式数据节点异常行为检测方法。本文中的服务器300可以是服务器、PC、PAD、手机等。In this embodiment of the present invention, as shown in FIG. 3 , the
本申请是参照根据本申请实施例的方法、服务器(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理服务器的处理器以产生一个机器,使得通过计算机或其他可编程数据处理服务器的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, servers (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block in the flowcharts and/or block diagrams, and combinations of flows and/or blocks in the flowcharts and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing server to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing server produce Means for implementing the functions specified in one or more of the flowcharts and/or one or more blocks of the block diagrams.
在一个典型的配置中,服务器包括一个或多个处理器(CPU)、存储器和总线。服务器还可以包括输入/输出接口、网络接口等。In a typical configuration, a server includes one or more processors (CPUs), memory, and a bus. The server may also include input/output interfaces, network interfaces, and the like.
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。存储器是计算机可读介质的示例。Memory may include non-persistent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one memory chip. Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存 (PRAM)、静态随机存取存储器 (SRAM)、动态随机存取存储器 (DRAM)、其他类型的随机存取存储器 (RAM)、只读存储器 (ROM)、电可擦除可编程只读存储器 (EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘 (DVD) 或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储服务器或任何其他非传输介质,可用于存储可以被计算服务器访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体 (transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape magnetic disk storage or other magnetic storage servers or any other non-transmission medium that can be used to store information that can be accessed by computing servers. As defined herein, computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者服务器不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者服务器所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括要素的过程、方法、商品或者服务器中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion, such that a process, method, article or server comprising a series of elements includes not only those elements, but also Other elements not expressly listed or otherwise inherent to such a process, method, commodity or server. Without further limitation, an element qualified by the phrase "comprises a..." does not preclude the presence of additional identical elements in the process, method, commodity or server that includes the element.
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。It will be appreciated by those skilled in the art that the embodiments of the present application may be provided as a method, a system or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
以上仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。The above are merely examples of the present application, and are not intended to limit the present application. Various modifications and variations of this application are possible for those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included within the scope of the claims of this application.
Claims (10)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911307932.XA CN111092889B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method, device and server |
| CN202010827655.1A CN111988304B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method and device based on Internet of things |
| CN202010827946.0A CN111988305B (en) | 2019-12-18 | 2019-12-18 | Data node abnormal behavior detection method and server applied to Internet of things |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911307932.XA CN111092889B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method, device and server |
Related Child Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010827655.1A Division CN111988304B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method and device based on Internet of things |
| CN202010827946.0A Division CN111988305B (en) | 2019-12-18 | 2019-12-18 | Data node abnormal behavior detection method and server applied to Internet of things |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111092889A CN111092889A (en) | 2020-05-01 |
| CN111092889B true CN111092889B (en) | 2020-11-20 |
Family
ID=70395710
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911307932.XA Active CN111092889B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method, device and server |
| CN202010827655.1A Active CN111988304B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method and device based on Internet of things |
| CN202010827946.0A Active CN111988305B (en) | 2019-12-18 | 2019-12-18 | Data node abnormal behavior detection method and server applied to Internet of things |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010827655.1A Active CN111988304B (en) | 2019-12-18 | 2019-12-18 | Distributed data node abnormal behavior detection method and device based on Internet of things |
| CN202010827946.0A Active CN111988305B (en) | 2019-12-18 | 2019-12-18 | Data node abnormal behavior detection method and server applied to Internet of things |
Country Status (1)
| Country | Link |
|---|---|
| CN (3) | CN111092889B (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116016140B (en) * | 2020-07-10 | 2024-09-17 | 展讯半导体(成都)有限公司 | Communication exception handling method, master node, indoor distribution system and storage medium |
| CN113489752B (en) * | 2021-09-07 | 2021-11-19 | 华控清交信息科技(北京)有限公司 | Bright and ciphertext hybrid computing method and device, electronic equipment and storage medium |
| CN115168917B (en) * | 2022-07-07 | 2023-09-22 | 大唐智创(山东)科技有限公司 | A cloud computing service abnormal user behavior processing method and server |
| CN117221435B (en) * | 2023-11-09 | 2024-01-12 | 万道智控信息技术有限公司 | Mobile phone safety performance detection method and system based on mobile phone cabinet |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1588889A (en) * | 2004-09-24 | 2005-03-02 | 清华大学 | Abnormal detection method for user access activity in attached net storage device |
| CN102724182A (en) * | 2012-05-30 | 2012-10-10 | 北京像素软件科技股份有限公司 | Recognition method of abnormal client side |
| CN104424354A (en) * | 2013-08-27 | 2015-03-18 | 国际商业机器公司 | Detecting Anomalous User Behavior Using Generative Models of User Actions |
| CN104994091A (en) * | 2015-06-30 | 2015-10-21 | 东软集团股份有限公司 | Method and device for detecting abnormal flow, and method and device for defending against Web attack |
| CN105554016A (en) * | 2015-12-31 | 2016-05-04 | 山石网科通信技术有限公司 | Network attack processing method and device |
| CN106921676A (en) * | 2017-04-20 | 2017-07-04 | 电子科技大学 | A kind of intrusion detection method based on OPCClassic |
| US10091077B1 (en) * | 2016-06-27 | 2018-10-02 | Symantec Corporation | Systems and methods for detecting transactional message sequences that are obscured in multicast communications |
| CN109495521A (en) * | 2019-01-18 | 2019-03-19 | 新华三信息安全技术有限公司 | A kind of anomalous traffic detection method and device |
| CN110324323A (en) * | 2019-06-19 | 2019-10-11 | 全球能源互联网研究院有限公司 | A kind of new energy plant stand relates to net end real-time, interactive process exception detection method and system |
| CN110401624A (en) * | 2018-04-25 | 2019-11-01 | 全球能源互联网研究院有限公司 | The detection method and system of source net G system mutual message exception |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005053230A2 (en) * | 2003-11-28 | 2005-06-09 | Insightix Ltd. | Methods and systems for collecting information relating to a communication network and for collecting information relating to operating systems operating on nodes in a communication network |
| CN102111420A (en) * | 2011-03-16 | 2011-06-29 | 上海电机学院 | Intelligent NIPS framework based on dynamic cloud/fire wall linkage |
| CN102195975A (en) * | 2011-04-08 | 2011-09-21 | 上海电机学院 | Intelligent NIPS (Network Intrusion Prevention System) framework for quantifying neural network based on mobile agent (MA) and learning vector |
| WO2015186662A1 (en) * | 2014-06-06 | 2015-12-10 | 日本電信電話株式会社 | Log analysis device, attack detection device, attack detection method and program |
| CN105049421A (en) * | 2015-06-24 | 2015-11-11 | 百度在线网络技术(北京)有限公司 | Authentication method based on use behavior characteristic of user, server, terminal, and system |
| US10158658B1 (en) * | 2015-12-04 | 2018-12-18 | Amazon Technologies, Inc. | System for determining network anomalies |
| US10027694B1 (en) * | 2016-03-28 | 2018-07-17 | Amazon Technologies, Inc. | Detecting denial of service attacks on communication networks |
| US11165813B2 (en) * | 2016-10-03 | 2021-11-02 | Telepathy Labs, Inc. | System and method for deep learning on attack energy vectors |
| CN108737333B (en) * | 2017-04-17 | 2021-08-24 | 腾讯科技(深圳)有限公司 | Data detection method and device |
| CN108737410B (en) * | 2018-05-14 | 2021-04-13 | 辽宁大学 | Limited knowledge industrial communication protocol abnormal behavior detection method based on feature association |
| CN109194689B (en) * | 2018-10-22 | 2021-04-23 | 武汉极意网络科技有限公司 | Abnormal behavior recognition method, device, server and storage medium |
| CN109274692B (en) * | 2018-11-14 | 2021-03-16 | 众安信息技术服务有限公司 | A method and device for identifying malicious nodes in a blockchain network |
| CN110237530B (en) * | 2019-06-14 | 2020-12-11 | 腾讯科技(深圳)有限公司 | Abnormal behavior detection method and device and readable storage medium |
| CN110266680B (en) * | 2019-06-17 | 2021-08-24 | 辽宁大学 | An Anomaly Detection Method for Industrial Communication Based on Double Similarity Metrics |
-
2019
- 2019-12-18 CN CN201911307932.XA patent/CN111092889B/en active Active
- 2019-12-18 CN CN202010827655.1A patent/CN111988304B/en active Active
- 2019-12-18 CN CN202010827946.0A patent/CN111988305B/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1588889A (en) * | 2004-09-24 | 2005-03-02 | 清华大学 | Abnormal detection method for user access activity in attached net storage device |
| CN102724182A (en) * | 2012-05-30 | 2012-10-10 | 北京像素软件科技股份有限公司 | Recognition method of abnormal client side |
| CN104424354A (en) * | 2013-08-27 | 2015-03-18 | 国际商业机器公司 | Detecting Anomalous User Behavior Using Generative Models of User Actions |
| CN104994091A (en) * | 2015-06-30 | 2015-10-21 | 东软集团股份有限公司 | Method and device for detecting abnormal flow, and method and device for defending against Web attack |
| CN105554016A (en) * | 2015-12-31 | 2016-05-04 | 山石网科通信技术有限公司 | Network attack processing method and device |
| US10091077B1 (en) * | 2016-06-27 | 2018-10-02 | Symantec Corporation | Systems and methods for detecting transactional message sequences that are obscured in multicast communications |
| CN106921676A (en) * | 2017-04-20 | 2017-07-04 | 电子科技大学 | A kind of intrusion detection method based on OPCClassic |
| CN110401624A (en) * | 2018-04-25 | 2019-11-01 | 全球能源互联网研究院有限公司 | The detection method and system of source net G system mutual message exception |
| CN109495521A (en) * | 2019-01-18 | 2019-03-19 | 新华三信息安全技术有限公司 | A kind of anomalous traffic detection method and device |
| CN110324323A (en) * | 2019-06-19 | 2019-10-11 | 全球能源互联网研究院有限公司 | A kind of new energy plant stand relates to net end real-time, interactive process exception detection method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111988304B (en) | 2022-06-21 |
| CN111988305B (en) | 2022-06-03 |
| CN111988304A (en) | 2020-11-24 |
| CN111988305A (en) | 2020-11-24 |
| CN111092889A (en) | 2020-05-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111092889B (en) | Distributed data node abnormal behavior detection method, device and server | |
| JP2019506674A5 (en) | ||
| CN117081858A (en) | Intrusion behavior detection method, system, equipment and medium based on multi-decision tree | |
| WO2015062536A1 (en) | Data processing | |
| Abela et al. | An automated malware detection system for android using behavior-based analysis AMDA | |
| CN112115468B (en) | Service information detection method based on big data and cloud computing center | |
| Souza et al. | Combining regular expressions and machine learning for SQL injection detection in urban computing | |
| Huang et al. | Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems | |
| CN111241152B (en) | Policy information mining method, device and cloud server | |
| CN110135162A (en) | The recognition methods of the back door WEBSHELL, device, equipment and storage medium | |
| CN111181957B (en) | IoT device security verification method, system and central control device | |
| CN111680301A (en) | A kind of vulnerability detection method and device | |
| Daihes et al. | MORTON: detection of malicious routines in large-scale DNS traffic | |
| CN113032774A (en) | Training method, device and equipment of anomaly detection model and computer storage medium | |
| RU180789U1 (en) | DEVICE OF INFORMATION SECURITY AUDIT IN AUTOMATED SYSTEMS | |
| CN110769008B (en) | Data security protection method and device and service equipment | |
| WO2025222685A1 (en) | Security protection method based on system log, and security protection apparatus and security protection system | |
| CN116232612B (en) | Abnormal flow detection method, device and computer readable storage medium | |
| CN115310075B (en) | Risk detection methods, devices, storage media, and electronic equipment | |
| CN111241376B (en) | Multi-level information matching method, device and cloud service platform | |
| CN114448688A (en) | Information processing method, apparatus, device and storage medium | |
| RU2850644C2 (en) | Multi-level malicious software detector for mobile platforms | |
| CN114398621A (en) | A security verification method, device, electronic device and storage medium | |
| CN115600195A (en) | Web attack detection method, device, equipment and readable storage medium | |
| US11824887B1 (en) | Eliminating network security blind spots |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Address after: Room 504, building A3, phase 2, Yunnan University Science Park, high tech Zone, Kunming City, Yunnan Province Applicant after: Jia Haifang Address before: Room 627, building 11, zone B, Fuzhou Software Park, No. 89, software Avenue, Gulou District, Fuzhou City, Fujian Province 350000 Applicant before: Jia Haifang |
|
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20201029 Address after: 223400 Jiangsu Lianshui Huaian Xingang Xintiandi commercial A2 District Applicant after: Jiangsu Medusa Information Technology Co., Ltd Address before: Room 504, building A3, phase 2, Yunnan University Science Park, high tech Zone, Kunming City, Yunnan Province Applicant before: Jia Haifang |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |