CN1949720A - Distributed network invasion detecting system - Google Patents
Distributed network invasion detecting system Download PDFInfo
- Publication number
- CN1949720A CN1949720A CN 200610037594 CN200610037594A CN1949720A CN 1949720 A CN1949720 A CN 1949720A CN 200610037594 CN200610037594 CN 200610037594 CN 200610037594 A CN200610037594 A CN 200610037594A CN 1949720 A CN1949720 A CN 1949720A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- analysis
- analysis engine
- responsible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000009545 invasion Effects 0.000 title claims 17
- 238000004458 analytical method Methods 0.000 claims abstract description 84
- 238000001514 detection method Methods 0.000 claims abstract description 57
- 238000004891 communication Methods 0.000 claims abstract description 32
- 238000000034 method Methods 0.000 claims description 17
- 238000012545 processing Methods 0.000 claims description 13
- 238000005516 engineering process Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 8
- 230000007246 mechanism Effects 0.000 claims description 7
- 230000000694 effects Effects 0.000 claims description 6
- 238000013480 data collection Methods 0.000 claims description 4
- 230000006399 behavior Effects 0.000 claims description 3
- 210000004556 brain Anatomy 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 3
- 230000003993 interaction Effects 0.000 claims description 2
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 claims 2
- 239000008186 active pharmaceutical agent Substances 0.000 claims 1
- 238000011835 investigation Methods 0.000 claims 1
- 238000012958 reprocessing Methods 0.000 claims 1
- 238000007726 management method Methods 0.000 description 6
- 230000004044 response Effects 0.000 description 4
- 238000007405 data analysis Methods 0.000 description 3
- 206010033799 Paralysis Diseases 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012805 post-processing Methods 0.000 description 2
- 238000007781 pre-processing Methods 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012916 structural analysis Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
本发明公开一种分布式网络入侵检测系统。该系统采用分层结构,分为数据采集层、通信层、通信层、控制层四层;数据采集层由数据采集器构成,主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理;通信层由通信装置构成,主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁;分析层主要由分析引擎、日志集和存储器构成,主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集;控制层由控制中心构成,负责管理和配置系统中的各个部件,也可以启动或停止某部件的运行。该系统采用中心式体系架构,可以检测大规模网络入侵,并具有良好的分布性和可扩展性。
The invention discloses a distributed network intrusion detection system. The system adopts a layered structure and is divided into four layers: data acquisition layer, communication layer, communication layer, and control layer; the data acquisition layer is composed of data collectors, which are mainly responsible for intercepting data packets in the network, and Types are formatted differently; the communication layer is composed of communication devices, and is mainly responsible for transmitting control information or data information within the IDS system or between IDS systems, and is a communication bridge between various components; the analysis layer is mainly composed of analysis engines, logs It is mainly responsible for judging the intrusion of network data packets, and then writing the analysis results into the log set as needed; the control layer is composed of a control center, which is responsible for managing and configuring various components in the system, and can also start or stop a certain component running. The system adopts a central architecture, which can detect large-scale network intrusions, and has good distribution and scalability.
Description
技术领域technical field
本发明属于网络安全防护技术领域,具体涉及一种分布式网络入侵检测系统。The invention belongs to the technical field of network security protection, and in particular relates to a distributed network intrusion detection system.
背景技术Background technique
当今互联网的广泛应用极大的方便了人们的工作与生活,但网络所面临的安全威胁,也使人们的正常生活受到干扰,以往的网络安全防御措施主要是采用防火墙技术,但防火墙也有其自身的局限性,它不能检测出来自网络内部的攻击,所以入侵检测技术构成了继防火墙之后的又一道网络安全闸门。The wide application of the Internet today greatly facilitates people's work and life, but the security threats faced by the network also interfere with people's normal life. In the past, the network security defense measures mainly used firewall technology, but the firewall also has its own Due to the limitations of the network, it cannot detect attacks from within the network, so the intrusion detection technology constitutes another network security gate after the firewall.
现有的安全机制可通过访问控制使受保护的计算机和网络不被非法攻击和未经授权者使用,然而如果这些访问措施被泄漏或被绕过则一个滥用权力者将可能获得未经授权的访问,从而导致被攻击系统遭受巨大损失。因此,不能在所有情况下都依靠访问控制机制来防范入侵活动或来自内部的攻击行为,几乎所有的安全系统对内部人员的滥用权力行为都是脆弱的,并且审计记录痕迹几乎是检测授权用户的滥用行为的唯一手段。Existing security mechanisms can prevent protected computers and networks from illegal attacks and unauthorized use through access control. However, if these access measures are leaked or bypassed, an abuser may obtain unauthorized access. access, resulting in huge losses to the attacked system. Therefore, access control mechanisms cannot be relied upon in all cases to protect against intrusions or attacks from insiders, almost all security systems are vulnerable to abuse of power by insiders, and audit trails are almost impossible to detect authorized users The only means of abuse.
入侵检测系统通过对计算机网络或计算机系统中的若干关键节点收集的信息进行分析,从中发现网络或系统中是否有违反安全策略的行为和遭到攻击的迹象,然后做出响应。网络入侵检测的核心部分是数据分析,它判断系统是否异常或遭到攻击。以往的入侵检测系统都是基于中心式的数据处理机制,由于网络规模小,通讯速度慢,因此可以做到信息的实时处理。随着高速网络的发展、网络范围的拓宽以及各种分布式网络技术的发展,分布式的攻击手段日益增多,现有简单的基于主机的或者基于网络的入侵检测手段对这些攻击方式的检测几乎无能为力,因此有必要把检测分析过程也设为分布式。分布式入侵检测系统的工作方式比较新,它检测的数据是来自网络中的数据包,采用分布式检测、集中管理的方法,检测其所在网段的数据流,根据安全管理中心制定的安全管理策略、响应规则等来分析检测网络数据,同时向安全管理中心发送安全事件信息。The intrusion detection system analyzes the information collected by several key nodes in the computer network or computer system, and finds out whether there are signs of violations of security policies and signs of attacks in the network or system, and then responds. The core part of network intrusion detection is data analysis, which determines whether the system is abnormal or under attack. The previous intrusion detection systems are based on the central data processing mechanism, because the network scale is small and the communication speed is slow, so the real-time processing of information can be achieved. With the development of high-speed networks, the widening of network scope, and the development of various distributed network technologies, distributed attack methods are increasing, and the existing simple host-based or network-based intrusion detection methods can hardly detect these attack methods. Nothing can be done, so it is necessary to set the detection and analysis process as distributed. The working method of the distributed intrusion detection system is relatively new. The data it detects comes from the data packets in the network. It adopts the method of distributed detection and centralized management to detect the data flow of the network segment where it is located. According to the security management established by the security management center Policy, response rules, etc. to analyze and detect network data, and at the same time send security event information to the security management center.
入侵检测是防火墙的合理补充,帮助系统对付网络攻击,扩展了系统管理员的安全管理能力,提高了信息安全基础结构的完整性。入侵检测是继防火墙之后的第二道安全闸门,在不影响网络性能的情况下能对网络进行检测,从而提供对外部攻击、内部攻击、误操作的实时保护。入侵检测系统根据网络数据包和协议分析来检测入侵活动。系统可以按照一定的规则从网络上获取与安全事件相关的数据包,然后传递给分析引擎模块进行安全分析判断,入侵分析引擎模块将根据接收到的数据包,并结合网络安全数据库进行分析,将分析结果传递给管理/配置模块,管理配置模块的主要功能是管理其它各模块的配置工作,并将分析引擎的结果以有效的方式通知网络管理员。Intrusion detection is a reasonable supplement to the firewall, which helps the system deal with network attacks, expands the security management capabilities of system administrators, and improves the integrity of the information security infrastructure. Intrusion detection is the second security gate after the firewall. It can detect the network without affecting the network performance, so as to provide real-time protection against external attacks, internal attacks, and misoperations. Intrusion detection systems detect intrusion activity based on network packet and protocol analysis. The system can obtain data packets related to security events from the network according to certain rules, and then pass them to the analysis engine module for security analysis and judgment. The analysis results are passed to the management/configuration module. The main function of the management configuration module is to manage the configuration work of other modules and notify the network administrator of the results of the analysis engine in an effective manner.
入侵检测核心技术至今已经历三代:第一代技术是主机日志分析、模式匹配;第二代技术出现在上世纪90年代中期,技术突破包括网络数据包截获、主机网络数据和审计数据分析、基于网络的入侵检测系统和基于主机的入侵检测系统的明确分工和合作;第三代技术出现在2000年前后,代表性的突破有协议分析、行为异常分析。协议分析的出现极大减少了计算量,减少了误报率。行为异常分析技术的出现则赋予了第三代入侵检测系统识别未知攻击的能力。The core technology of intrusion detection has gone through three generations: the first generation technology is host log analysis and pattern matching; the second generation technology appeared in the mid-1990s, and technological breakthroughs include network data packet interception, host network The clear division of labor and cooperation between the network intrusion detection system and the host-based intrusion detection system; the third generation technology appeared around 2000, and the representative breakthroughs include protocol analysis and abnormal behavior analysis. The emergence of protocol analysis greatly reduces the amount of calculation and reduces the false positive rate. The emergence of behavioral anomaly analysis technology endows the third generation intrusion detection system with the ability to identify unknown attacks.
目前,国际顶尖的入侵检测系统主要以模式发现技术为主。1991年,加州大学戴维斯分校的研究人员就提出了分布式入侵检测系统的概念,给出了一种分布式入侵检测系统的体系结构。该种体系结构将以往基于主机和基于网络的入侵检测系统结合起来。At present, the top international intrusion detection systems are mainly based on pattern discovery technology. In 1991, researchers at the University of California, Davis proposed the concept of a distributed intrusion detection system, and provided a distributed intrusion detection system architecture. This architecture combines the traditional host-based and network-based intrusion detection systems.
发明内容Contents of the invention
本发明目的是提供一种分布式网络入侵检测系统,该系统为中心式体系架构,可以检测大规模网络入侵,并具有良好的分布性和可扩展性。The object of the present invention is to provide a distributed network intrusion detection system, which is a central architecture, can detect large-scale network intrusions, and has good distribution and scalability.
本发明所采用的技术方案如下:一种分布式网络入侵检测系统,该系统采用分层结构,分为数据采集层、通信层、通信层、控制层四层;所述数据采集层由数据采集器构成,主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理;所述通信层由通信装置构成,主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁;所述分析层主要由分析引擎、日志集和存储器构成,主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集;所述控制层由控制中心构成,负责管理和配置系统中的各个部件,也可以启动或停止某部件的运行。The technical scheme adopted in the present invention is as follows: a distributed network intrusion detection system, which adopts a layered structure and is divided into four layers: data acquisition layer, communication layer, communication layer, and control layer; The communication layer is composed of a communication device, which is mainly responsible for intercepting data packets in the network and performing different formatting processes according to different types of data packets; the communication layer is composed of communication devices, and is mainly responsible for transmitting control within the IDS system or between IDS systems Information or data information is a bridge for communication between various components; the analysis layer is mainly composed of an analysis engine, a log set and a memory, and is mainly responsible for judging the intrusion of network data packets, and then writing the analysis results into the log set as required; The control layer is composed of a control center, which is responsible for managing and configuring each component in the system, and can also start or stop the operation of a certain component.
所述分析引擎是用来判断是否发生入侵的大脑中枢,存储器中保存着各种入侵方式的特征库,分析引擎在进行特征匹配的时候需要调用特征库中的信息来进行比较。The analysis engine is the brain center for judging whether an intrusion has occurred, and the feature library of various intrusion methods is stored in the memory, and the analysis engine needs to call the information in the feature library for comparison when performing feature matching.
所述数据采集器负责截获网络中的原始数据包,将收集到的信息传给分析引擎进行安全判断,能够从收集到的信息中发掘出可能的入侵或其它敏感信息,然后将数据包中的数据传递给分析引擎做二次处理;通过分析以太包头、TCP、UDP、和IP包头中的信息,选出用户感兴趣的数据包,然后进行相应的应用层协议级的数据解释,把原始数据转化为相应格式化的事件,通过通信部件传给分析引擎做进一步分析;如果在解释过程中发现有分段报文,则将它们交给报文重组器进行处理,各个数据采集器之间也可以通过通信部件相互交换信息,当某个数据采集器某个活动可疑时则通知其它数据采集器,后续数据采集器分析后,也可以向相邻的数据采集器发送可疑通知,最终在可信级别上超过设定的阈值时,向主控制系统和响应系统发出报警;如果某个数据采集器收到可疑通知后,将提升可疑级别,如果没有收到可疑通知,将逐渐恢复到正常状态。The data collector is responsible for intercepting the original data packets in the network, passing the collected information to the analysis engine for security judgment, and can dig out possible intrusion or other sensitive information from the collected information, and then send the The data is passed to the analysis engine for secondary processing; by analyzing the information in the Ethernet header, TCP, UDP, and IP header, the data packets that the user is interested in are selected, and then the corresponding application-layer protocol-level data interpretation is performed, and the original data Convert them into correspondingly formatted events, and send them to the analysis engine for further analysis through communication components; if segmented messages are found during the interpretation process, they will be handed over to the message reassembler for processing, and the Information can be exchanged with each other through communication components. When a certain activity of a data collector is suspicious, other data collectors will be notified. When the level exceeds the set threshold, an alarm will be sent to the main control system and the response system; if a data collector receives a suspicious notification, it will raise the suspicious level, and if it does not receive a suspicious notification, it will gradually return to the normal state.
所述数据采集器中包括事件产生器,所述事件产生器对收集到的数据进行初步分析和过滤,可以减少需要系统处理的数据量,提高系统的处理速度。The data collector includes an event generator, and the event generator performs preliminary analysis and filtering on the collected data, which can reduce the amount of data that needs to be processed by the system and improve the processing speed of the system.
所述通信装置负责在不同的入侵检测单元之间交换各自所需的信息或在不同的IDS之间交换各自相关信息,通信装置通过SOCKET机制来完成与其它部件进行交换信息的功能,同时,通信部件通过交换信息,把检测入侵的任务合理地分担给各个检测单元,提升了整个IDS的运行效率。The communication device is responsible for exchanging required information between different intrusion detection units or exchanging relevant information between different IDSs. The communication device completes the function of exchanging information with other components through the SOCKET mechanism. At the same time, the communication By exchanging information, the components reasonably distribute the task of detecting intrusions to each detection unit, improving the operating efficiency of the entire IDS.
所述分析引擎是整个入侵检测系统的大脑,对捕获的原始数据、系统信息、其它入侵检测系统提供的可疑信息进行统一分析和处理,分析引擎具有预处理、分类和后处理的功能,所述分析引擎的构造方法是首先要收集事件信息,在接收到从数据采集器传来的格式化事件信息后,通过入侵检测方法来判定入侵是否发生,由于分析引擎和存储系统是利用统一的接口交换数据,所以一个IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测的准确度。The analysis engine is the brain of the entire intrusion detection system, which performs unified analysis and processing on the captured raw data, system information, and suspicious information provided by other intrusion detection systems. The analysis engine has the functions of preprocessing, classification and postprocessing. The construction method of the analysis engine is to first collect event information, and after receiving the formatted event information from the data collector, determine whether the intrusion has occurred through the intrusion detection method, because the analysis engine and the storage system use a unified interface to exchange data, so there may be multiple analysis engines in an IDS, and the detection methods used by each analysis engine are not necessarily the same. Even in the same analysis engine, several detection methods can be used at the same time, and different detection methods are used for the same data. The method is analyzed, and then the respective test results are compared, which can improve the accuracy of the test.
所述日志集负责记录系统发生过的事情,把用户所感兴趣的事件都记录下来,这将有利于用户对入侵事件做进一步的调查和分析,一方面可以分析入侵者所采取的入侵技术,另一方面也可以掌握入侵者的行为踪迹。The log set is responsible for recording the things that have happened in the system, and records all the events that the user is interested in, which will help the user to further investigate and analyze the intrusion event. On the one hand, it can analyze the intrusion technology adopted by the intruder. On the one hand, it is also possible to grasp the traces of the intruder's behavior.
所述响应系统负责接收分析引擎发来的入侵报警信息,然后采取相应的措施阻止入侵者继续进行入侵活动。The response system is responsible for receiving the intrusion alarm information sent by the analysis engine, and then taking corresponding measures to prevent the intruder from continuing the intrusion activities.
所述控制中心是IDS与用户交互的接口,通过它管理员可以管理和配置系统中的各个部件,查询IDS中各部件的运行情况。The control center is an interface for interaction between the IDS and the user, through which the administrator can manage and configure each component in the system, and query the operation status of each component in the IDS.
本发明系统的特点如下:The characteristics of the system of the present invention are as follows:
1.它具有一个统一完整的架构,使得整个系统具有模块化、分层处理、便于合并的特点。我们将系统模块化后可以容易的对系统进行添加或删除某个部件,同时也便于部件的重复使用,从而增强了系统的扩展能力。同时也加强对系统的整体把握能力;再者,我们借鉴TCP/IP协议的分层处理的方式,建立一些中间层,使得上、下层的相互调用透明化;最后我们尽量使各模块可以方便的进行合并起来组成一个工程。这就对各个模块的独立性要求较高。1. It has a unified and complete architecture, which makes the whole system have the characteristics of modularization, layered processing, and easy merger. After we modularize the system, we can easily add or delete a certain part of the system, and also facilitate the reuse of parts, thus enhancing the expansion ability of the system. At the same time, it also strengthens the overall grasp of the system; moreover, we use the layered processing method of the TCP/IP protocol to establish some intermediate layers to make the mutual calls between the upper and lower layers transparent; finally, we try to make each module convenient. Combine them to form a project. This requires high independence of each module.
2.采用中心式体系架构,以利于检测大规模网络入侵。而对于中心式体系结构可能带来的缺点,则采用主从结构来解决这个问题。控制系统对每一个部件能够精确的控制。每个部件在系统中是一个独立的实体。部件管理还包括部件的添加、删除以及启动、停止某个部件等。控制系统给用户提供了一个关于整个系统运行状况的视图,以及进行控制查询日志的功能。分析引擎在被监测的主机上负责入侵事件的分析,并把消息发送给自己的上级控制系统。整个入侵检测系统由一个中央控制系统统一控制。所有的信息经中央控制系统处理判断后,根据情况产生不同报警信息,如果中央控制系统瘫痪,从控制系统可以担当起中央控制系统的重任,这样不仅可以保证整个IDS系统的正常运作,也可以提高系统自身的安全性。2. Adopt a central architecture to facilitate the detection of large-scale network intrusions. As for the possible shortcomings of the central architecture, the master-slave structure is used to solve this problem. The control system can precisely control each component. Each component is an independent entity in the system. Parts management also includes adding and deleting parts, starting and stopping a certain part, etc. The control system provides users with a view of the health of the entire system, as well as the ability to query logs for control. The analysis engine is responsible for the analysis of intrusion events on the monitored host, and sends the message to its own superior control system. The entire intrusion detection system is uniformly controlled by a central control system. After all the information is processed and judged by the central control system, different alarm messages are generated according to the situation. If the central control system is paralyzed, the secondary control system can take on the heavy responsibility of the central control system, which can not only ensure the normal operation of the entire IDS system, but also improve The security of the system itself.
3.设计分析引擎体系结构时充分考虑了系统的开放性可以向系统中添加任何一种分析方法,也可以把多种分析方法同时运用到系统中。分析引擎和存储系统是利用统一的接口交换数据,所以IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中,也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测准确度。动态添加数据分析功能是通过添加新的数据分析函数来实现的。对于已经有的分析方法,可以在入侵特征数据库中添加新的入侵特征,以争强现有模式匹配分析方法的检测能力。3. When designing the analysis engine architecture, the openness of the system is fully considered. Any analysis method can be added to the system, and multiple analysis methods can also be applied to the system at the same time. The analysis engine and the storage system use a unified interface to exchange data, so there may be multiple analysis engines in the IDS, and the detection methods used by each analysis engine are not necessarily the same. Even in the same analysis engine, several analysis engines can be used at the same time. The detection method uses different detection methods to analyze the same data, and then compares the respective detection results, which can improve the detection accuracy. Dynamically adding data analysis functions is realized by adding new data analysis functions. For existing analysis methods, new intrusion signatures can be added to the intrusion signature database to improve the detection ability of existing pattern matching analysis methods.
附图说明Description of drawings
图1是本发明系统的结构示意图;Fig. 1 is the structural representation of the system of the present invention;
图2是系统的层次结构图;Figure 2 is a hierarchical structure diagram of the system;
图3是系统的运行流程图;Fig. 3 is the operation flowchart of the system;
图4是主从控制结构系统流程图。Figure 4 is a flow chart of the master-slave control structure system.
具体实施方式Detailed ways
下面结合附图和实施例对本发明作进一步说明。The present invention will be further described below in conjunction with drawings and embodiments.
如图1、2所示,在系统总体结构方面,本专利参考TCP/IP协议中所采用的分层机制,将系统分为以下四个层次。分层结构易于管理。系统管理员在任何时候若要对入侵检测系统进行管理,只需在一台机器上进行,各层次为:As shown in Figures 1 and 2, in terms of overall system structure, this patent divides the system into the following four levels with reference to the layered mechanism adopted in the TCP/IP protocol. Hierarchical structure is easy to manage. If the system administrator wants to manage the intrusion detection system at any time, he only needs to manage it on one machine, and each level is:
1)数据采集层:数据采集层由数据采集器1构成。它主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理。1) Data collection layer: the data collection layer is composed of
2)通信层:通信层由通信装置2构成。主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁。2) Communication layer: The communication layer is constituted by the
3)分析层:分析层主要由分析引擎5、日志集3和存储器4构成。它主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集3。分析引擎5是判断是否发生入侵的大脑中枢,存储器4中保存着各种入侵方式的特征库,分析引擎5在进行特征匹配的时候需要调用特征库中的信息来进行比较。3) Analysis layer: The analysis layer is mainly composed of
4)控制层:控制层由控制中心7构成。管理和配置系统中的各个部件,也可以启动或停止某部件的运行。4) Control layer: the control layer is composed of the
数据采集器1负责截获网络中的原始数据包,将收集到的信息传给分析引擎进行安全判断。数据采集器1能够从收集到的信息中发掘出可能的入侵或其它敏感信息,然后将数据包中的数据传递给分析引擎做二次处理。事件产生器是数据采集器中的重要组件,它对收集到的数据进行初步分析和过滤,减少了需要系统处理的数据量,提高了系统的处理速度。通过分析以太包头、TCP、UDP、和IP包头中的信息,选出用户感兴趣的数据包,然后进行相应的应用层协议级的数据解释,把原始数据转化为相应格式化的事件,通过通信部件传给分析引擎做进一步分析。如果在解释过程中发现有分段报文,则将它们交给报文重组器进行处理。各个数据采集器之间也可以通过通信部件相互交换信息。当某个数据采集器某个活动可疑时则通知其它数据采集器,后续数据采集器分析后,也可以向相邻的数据采集器发送可疑通知,最终在可信级别上超过设定的阈值时,向主控制系统和响应系统发出报警。如果某个数据采集器收到可疑通知后,将提升可疑级别,如果没有收到可疑通知,将逐渐恢复到正常状态。The
通信装置2负责在不同的入侵检测单元之间交换各自所需的信息或在不同的IDS之间交换各自相关信息。通信装置2通过SOCKET机制来完成与其它部件进行交换信息的功能。同时,通信装置2通过交换信息,把检测入侵的任务合理地分担给各个检测单元,提升了整个IDS的运行效率。分析引擎是整个入侵检测系统的大脑。对捕获的原始数据、系统信息、其它入侵检测系统提供的可疑信息进行统一分析和处理。The
日志集3负责记录系统发生过的事情,把用户所感兴趣的事件都记录下来,这将有利于用户对入侵事件做进一步的调查和分析,一方面可以分析入侵者所采取的入侵技术,另一方面也可以掌握入侵者的行为踪迹。The log set 3 is responsible for recording the things that happened in the system, and records all the events that the user is interested in, which will help the user to further investigate and analyze the intrusion event. On the one hand, it can analyze the intrusion technology adopted by the intruder, and on the other hand On the other hand, you can also grasp the behavior traces of intruders.
存储器4为各部件提供其所需的数据。其中的规则库记录着丰富的入侵特征,这是分析引擎进行判断的重要依据。The
分析引擎5具有预处理、分类和后处理的功能。构造分析引擎6首先要收集事件信息,在接收到从数据采集器1传来的格式化事件信息后,通过入侵检测方法来判定入侵是否发生。由于分析引擎6和存储器4是利用统一的接口交换数据,所以一个IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测的准确度。The
响应器6负责接收分析引擎发来的入侵报警信息,然后采取相应的措施阻止入侵者继续进行入侵活动。The
控制中心7是IDS与用户交互的接口,通过它管理员可以管理和配置系统中的各个部件,查询IDS中各部件的运行情况。The
本系统采用多线程处理方式,在主线程上运行数据采集器目的是为了提高分析引擎的速度,它采用了多个匹配线程同时进行不同的匹配处理:如果有控制信息产生,则有一个独立的控制线程来负责控制功能,系统运行流程如图3所示。首先,IDS系统进行一些必要的初始化配置,接着将规则库中的逻辑链表调入内存,然后判断是否有控制信息,如果有则对控制信息进行相应的控制信息处理,否则进行网络包捕获,紧接着判断捕获到的网络包包头是否合法,如不合法则回到上一个判断看是否有控制信息,否则对合法的数据包进行格式化处理以及与规则库里的规则进行匹配,如果与规则链表不匹配,则同样返回到控制信息判断,否则对匹配的数据包进行相应的处理以及将相关的规则写进日志集。This system adopts multi-thread processing method. The purpose of running the data collector on the main thread is to improve the speed of the analysis engine. It uses multiple matching threads to perform different matching processing at the same time: if there is control information generated, there is an independent The control thread is responsible for the control function, and the system operation flow is shown in Figure 3. First, the IDS system performs some necessary initialization configurations, then transfers the logical linked list in the rule base into the memory, and then judges whether there is control information, and if so, performs corresponding control information processing on the control information, otherwise performs network packet capture, and then Then judge whether the captured network packet header is legal. If not, go back to the previous judgment to see if there is control information. Otherwise, format the legal data packet and match it with the rules in the rule base. If it is not consistent with the rule list If it matches, it will also return to the control information judgment, otherwise, the matching data packet will be processed accordingly and the relevant rules will be written into the log set.
图4是本发明的一个应用实例,控制系统采用主/从结构是本专利的又一特色之处。整个IDS系统由一个中央控制器系统统一控制。所有的信息经中央控制系统处理判断后,根据情况产生不同报警信息。如果中央控制系统瘫痪,从控制系统可以担当起中央控制系统的重任,这样不仅可以保证整个IDS系统的正常运作,也可以提高系统自身的安全性能,其运行流程如图4所示。控制系统运行流程为:首先,中央控制系统会将从控制系统的信息传给区域内所有下级部件。然后,下级部件与中央控制系统进行正常的通讯。当中央控制系统出现问题时,它将发送转交信号给所有的下级部件,下级部件接收到信号后先切断与中央控制系统的连接,然后再与从控制系统建立新的连接。建立连接之后,从控制系统将取代中央控制系统的地位来控制整个系统的运行。中央控制系统在给区域内所有部件发转交信号的同时,将会和从控制系统进行通信,把一些状态信息发送给从控制系统,当中央控制系统恢复工作时,其工作过程与上述过程相反。Fig. 4 is an application example of the present invention, another feature of this patent is that the control system adopts a master/slave structure. The whole IDS system is uniformly controlled by a central controller system. After all the information is processed and judged by the central control system, different alarm information will be generated according to the situation. If the central control system is paralyzed, the secondary control system can take on the heavy responsibility of the central control system, which can not only ensure the normal operation of the entire IDS system, but also improve the security performance of the system itself. Its operation process is shown in Figure 4. The operation process of the control system is as follows: First, the central control system will transmit the information from the control system to all the subordinate components in the area. The subordinate components then communicate normally with the central control system. When there is a problem with the central control system, it will send a handover signal to all the lower-level components. After receiving the signal, the lower-level components will first cut off the connection with the central control system, and then establish a new connection with the slave control system. After the connection is established, the slave control system will replace the central control system to control the operation of the entire system. When the central control system sends handover signals to all components in the area, it will communicate with the slave control system and send some status information to the slave control system. When the central control system resumes work, its working process is opposite to the above process.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200610037594 CN1949720A (en) | 2006-09-08 | 2006-09-08 | Distributed network invasion detecting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200610037594 CN1949720A (en) | 2006-09-08 | 2006-09-08 | Distributed network invasion detecting system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1949720A true CN1949720A (en) | 2007-04-18 |
Family
ID=38019111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200610037594 Pending CN1949720A (en) | 2006-09-08 | 2006-09-08 | Distributed network invasion detecting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1949720A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101115010B (en) * | 2007-09-04 | 2010-06-02 | 杭州华三通信技术有限公司 | Method for extending safety system, safety system and safety processing device |
CN103748988B (en) * | 2009-06-12 | 2010-10-06 | 北京理工大学 | A kind of attack detection method based on fuzzy uncertainty reasoning |
CN101938460A (en) * | 2010-06-22 | 2011-01-05 | 北京豪讯美通科技有限公司 | Coordinated defense method of full process and full network safety coordinated defense system |
CN101534213B (en) * | 2009-04-09 | 2011-02-02 | 成都市华为赛门铁克科技有限公司 | Acquisition method of log and log server |
CN101420419B (en) * | 2008-10-27 | 2011-05-18 | 吉林大学 | Adaptive high-speed network flow layered sampling and collecting method |
CN101350745B (en) * | 2008-08-15 | 2011-08-03 | 北京启明星辰信息技术股份有限公司 | Intrude detection method and device |
CN101562534B (en) * | 2009-05-26 | 2011-12-14 | 中山大学 | Network behavior analytic system |
CN103384241A (en) * | 2012-12-21 | 2013-11-06 | 北京安天电子设备有限公司 | Distributed analysis method and system for security event data |
CN104333534A (en) * | 2014-09-18 | 2015-02-04 | 南京邮电大学 | DoS detection system of 6LoWPAN sensing network |
CN105812200A (en) * | 2014-12-31 | 2016-07-27 | 中国移动通信集团公司 | Abnormal behavior detection method and device |
CN106850645A (en) * | 2017-02-18 | 2017-06-13 | 许昌学院 | A kind of system and method for detecting invalid access to computer network |
CN107819837A (en) * | 2017-10-31 | 2018-03-20 | 南京优速网络科技有限公司 | A kind of method and log cache analysis system for lifting buffer service quality |
CN107921981A (en) * | 2015-06-30 | 2018-04-17 | 莱尔德技术股份有限公司 | The monitoring and control of distributed machines |
CN109067555A (en) * | 2018-07-25 | 2018-12-21 | 安徽三实信息技术服务有限公司 | A kind of WLAN wireless network data encryption system and its encryption method |
CN111181914A (en) * | 2019-09-29 | 2020-05-19 | 腾讯云计算(北京)有限责任公司 | Method, device and system for monitoring internal data security of local area network and server |
-
2006
- 2006-09-08 CN CN 200610037594 patent/CN1949720A/en active Pending
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101115010B (en) * | 2007-09-04 | 2010-06-02 | 杭州华三通信技术有限公司 | Method for extending safety system, safety system and safety processing device |
US8713663B2 (en) | 2007-09-04 | 2014-04-29 | Hangzhou H3C Technologies Co., Ltd. | Method for using extended security system, extended security system and devices |
CN101350745B (en) * | 2008-08-15 | 2011-08-03 | 北京启明星辰信息技术股份有限公司 | Intrude detection method and device |
CN101420419B (en) * | 2008-10-27 | 2011-05-18 | 吉林大学 | Adaptive high-speed network flow layered sampling and collecting method |
CN101534213B (en) * | 2009-04-09 | 2011-02-02 | 成都市华为赛门铁克科技有限公司 | Acquisition method of log and log server |
CN101562534B (en) * | 2009-05-26 | 2011-12-14 | 中山大学 | Network behavior analytic system |
CN103748988B (en) * | 2009-06-12 | 2010-10-06 | 北京理工大学 | A kind of attack detection method based on fuzzy uncertainty reasoning |
CN103748989B (en) * | 2009-07-14 | 2010-10-06 | 北京理工大学 | A kind of many granularities of matrix form network security threats method for situation assessment |
CN101938460A (en) * | 2010-06-22 | 2011-01-05 | 北京豪讯美通科技有限公司 | Coordinated defense method of full process and full network safety coordinated defense system |
CN101938460B (en) * | 2010-06-22 | 2014-04-09 | 北京中兴网安科技有限公司 | Coordinated defense method of full process and full network safety coordinated defense system |
CN103384241B (en) * | 2012-12-21 | 2016-07-13 | 北京安天电子设备有限公司 | A kind of distribution analysis method towards security event data and system |
CN103384241A (en) * | 2012-12-21 | 2013-11-06 | 北京安天电子设备有限公司 | Distributed analysis method and system for security event data |
CN104333534A (en) * | 2014-09-18 | 2015-02-04 | 南京邮电大学 | DoS detection system of 6LoWPAN sensing network |
CN105812200A (en) * | 2014-12-31 | 2016-07-27 | 中国移动通信集团公司 | Abnormal behavior detection method and device |
CN107921981A (en) * | 2015-06-30 | 2018-04-17 | 莱尔德技术股份有限公司 | The monitoring and control of distributed machines |
US10516737B2 (en) | 2015-06-30 | 2019-12-24 | Control Solutions Enterprises, Inc. | Monitoring and controlling of distributed machines |
CN107921981B (en) * | 2015-06-30 | 2020-05-01 | 莱尔德技术股份有限公司 | Method and network for managing a plurality of distributed machines |
US10805400B2 (en) | 2015-06-30 | 2020-10-13 | Cattron North America, Inc. | Monitoring and controlling of distributed machines |
CN106850645A (en) * | 2017-02-18 | 2017-06-13 | 许昌学院 | A kind of system and method for detecting invalid access to computer network |
CN107819837A (en) * | 2017-10-31 | 2018-03-20 | 南京优速网络科技有限公司 | A kind of method and log cache analysis system for lifting buffer service quality |
CN109067555A (en) * | 2018-07-25 | 2018-12-21 | 安徽三实信息技术服务有限公司 | A kind of WLAN wireless network data encryption system and its encryption method |
CN111181914A (en) * | 2019-09-29 | 2020-05-19 | 腾讯云计算(北京)有限责任公司 | Method, device and system for monitoring internal data security of local area network and server |
CN111181914B (en) * | 2019-09-29 | 2022-08-02 | 腾讯云计算(北京)有限责任公司 | Method, device and system for monitoring internal data security of local area network and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1949720A (en) | Distributed network invasion detecting system | |
Dong et al. | Real-time network intrusion detection system based on deep learning | |
Mitchell et al. | A survey of intrusion detection techniques for cyber-physical systems | |
Mukherjee et al. | Network intrusion detection | |
CN100384153C (en) | An IPv6-based network performance analysis reporting system and its implementation method | |
CN106778253A (en) | Threat context aware information security Initiative Defense model based on big data | |
Jia et al. | Big-data analysis of multi-source logs for anomaly detection on network-based system | |
Zhang et al. | Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis | |
Zhang et al. | Multi-agent based intrusion detection architecture | |
CN1564530A (en) | Network safety guarded distributing invading detection and internal net monitoring system and method thereof | |
CN118784348A (en) | A network information security analysis method and system based on data analysis | |
WO2004051929A1 (en) | Audit platform system for application process based on components | |
Liao et al. | Research on network intrusion detection method based on deep learning algorithm | |
Chai et al. | Research of intelligent intrusion detection system based on web data mining technology | |
Wasniowski | Multi-sensor agent-based intrusion detection system | |
Zhu et al. | Research of intrusion detection based on support vector machine | |
Qi et al. | FSM-based cyber security status analysis method | |
CN106878338B (en) | Remote control equipment gateway firewall integrated machine system | |
Kong et al. | Research on situation analysis technology of network security incidents | |
Chen et al. | Dynamic forensics based on intrusion tolerance | |
Srivastav et al. | Evaluation of network intrusion detection system using PCA and NBA | |
CN108337238B (en) | Information security detection system for teaching network | |
Nalavade et al. | Intrusion prevention systems: data mining approach | |
Zhuo et al. | Research on Intelligent Algorithm of Public Network Attack Data Mining Based on Deep Neural Network | |
Lyubenova et al. | А graph database intrusion detection and prevention system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |