[go: up one dir, main page]

CN1949720A - Distributed network invasion detecting system - Google Patents

Distributed network invasion detecting system Download PDF

Info

Publication number
CN1949720A
CN1949720A CN 200610037594 CN200610037594A CN1949720A CN 1949720 A CN1949720 A CN 1949720A CN 200610037594 CN200610037594 CN 200610037594 CN 200610037594 A CN200610037594 A CN 200610037594A CN 1949720 A CN1949720 A CN 1949720A
Authority
CN
China
Prior art keywords
data
information
analysis
analysis engine
responsible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610037594
Other languages
Chinese (zh)
Inventor
彭斌斌
罗笑南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN 200610037594 priority Critical patent/CN1949720A/en
Publication of CN1949720A publication Critical patent/CN1949720A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开一种分布式网络入侵检测系统。该系统采用分层结构,分为数据采集层、通信层、通信层、控制层四层;数据采集层由数据采集器构成,主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理;通信层由通信装置构成,主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁;分析层主要由分析引擎、日志集和存储器构成,主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集;控制层由控制中心构成,负责管理和配置系统中的各个部件,也可以启动或停止某部件的运行。该系统采用中心式体系架构,可以检测大规模网络入侵,并具有良好的分布性和可扩展性。

Figure 200610037594

The invention discloses a distributed network intrusion detection system. The system adopts a layered structure and is divided into four layers: data acquisition layer, communication layer, communication layer, and control layer; the data acquisition layer is composed of data collectors, which are mainly responsible for intercepting data packets in the network, and Types are formatted differently; the communication layer is composed of communication devices, and is mainly responsible for transmitting control information or data information within the IDS system or between IDS systems, and is a communication bridge between various components; the analysis layer is mainly composed of analysis engines, logs It is mainly responsible for judging the intrusion of network data packets, and then writing the analysis results into the log set as needed; the control layer is composed of a control center, which is responsible for managing and configuring various components in the system, and can also start or stop a certain component running. The system adopts a central architecture, which can detect large-scale network intrusions, and has good distribution and scalability.

Figure 200610037594

Description

一种分布式网络入侵检测系统A Distributed Network Intrusion Detection System

技术领域technical field

本发明属于网络安全防护技术领域,具体涉及一种分布式网络入侵检测系统。The invention belongs to the technical field of network security protection, and in particular relates to a distributed network intrusion detection system.

背景技术Background technique

当今互联网的广泛应用极大的方便了人们的工作与生活,但网络所面临的安全威胁,也使人们的正常生活受到干扰,以往的网络安全防御措施主要是采用防火墙技术,但防火墙也有其自身的局限性,它不能检测出来自网络内部的攻击,所以入侵检测技术构成了继防火墙之后的又一道网络安全闸门。The wide application of the Internet today greatly facilitates people's work and life, but the security threats faced by the network also interfere with people's normal life. In the past, the network security defense measures mainly used firewall technology, but the firewall also has its own Due to the limitations of the network, it cannot detect attacks from within the network, so the intrusion detection technology constitutes another network security gate after the firewall.

现有的安全机制可通过访问控制使受保护的计算机和网络不被非法攻击和未经授权者使用,然而如果这些访问措施被泄漏或被绕过则一个滥用权力者将可能获得未经授权的访问,从而导致被攻击系统遭受巨大损失。因此,不能在所有情况下都依靠访问控制机制来防范入侵活动或来自内部的攻击行为,几乎所有的安全系统对内部人员的滥用权力行为都是脆弱的,并且审计记录痕迹几乎是检测授权用户的滥用行为的唯一手段。Existing security mechanisms can prevent protected computers and networks from illegal attacks and unauthorized use through access control. However, if these access measures are leaked or bypassed, an abuser may obtain unauthorized access. access, resulting in huge losses to the attacked system. Therefore, access control mechanisms cannot be relied upon in all cases to protect against intrusions or attacks from insiders, almost all security systems are vulnerable to abuse of power by insiders, and audit trails are almost impossible to detect authorized users The only means of abuse.

入侵检测系统通过对计算机网络或计算机系统中的若干关键节点收集的信息进行分析,从中发现网络或系统中是否有违反安全策略的行为和遭到攻击的迹象,然后做出响应。网络入侵检测的核心部分是数据分析,它判断系统是否异常或遭到攻击。以往的入侵检测系统都是基于中心式的数据处理机制,由于网络规模小,通讯速度慢,因此可以做到信息的实时处理。随着高速网络的发展、网络范围的拓宽以及各种分布式网络技术的发展,分布式的攻击手段日益增多,现有简单的基于主机的或者基于网络的入侵检测手段对这些攻击方式的检测几乎无能为力,因此有必要把检测分析过程也设为分布式。分布式入侵检测系统的工作方式比较新,它检测的数据是来自网络中的数据包,采用分布式检测、集中管理的方法,检测其所在网段的数据流,根据安全管理中心制定的安全管理策略、响应规则等来分析检测网络数据,同时向安全管理中心发送安全事件信息。The intrusion detection system analyzes the information collected by several key nodes in the computer network or computer system, and finds out whether there are signs of violations of security policies and signs of attacks in the network or system, and then responds. The core part of network intrusion detection is data analysis, which determines whether the system is abnormal or under attack. The previous intrusion detection systems are based on the central data processing mechanism, because the network scale is small and the communication speed is slow, so the real-time processing of information can be achieved. With the development of high-speed networks, the widening of network scope, and the development of various distributed network technologies, distributed attack methods are increasing, and the existing simple host-based or network-based intrusion detection methods can hardly detect these attack methods. Nothing can be done, so it is necessary to set the detection and analysis process as distributed. The working method of the distributed intrusion detection system is relatively new. The data it detects comes from the data packets in the network. It adopts the method of distributed detection and centralized management to detect the data flow of the network segment where it is located. According to the security management established by the security management center Policy, response rules, etc. to analyze and detect network data, and at the same time send security event information to the security management center.

入侵检测是防火墙的合理补充,帮助系统对付网络攻击,扩展了系统管理员的安全管理能力,提高了信息安全基础结构的完整性。入侵检测是继防火墙之后的第二道安全闸门,在不影响网络性能的情况下能对网络进行检测,从而提供对外部攻击、内部攻击、误操作的实时保护。入侵检测系统根据网络数据包和协议分析来检测入侵活动。系统可以按照一定的规则从网络上获取与安全事件相关的数据包,然后传递给分析引擎模块进行安全分析判断,入侵分析引擎模块将根据接收到的数据包,并结合网络安全数据库进行分析,将分析结果传递给管理/配置模块,管理配置模块的主要功能是管理其它各模块的配置工作,并将分析引擎的结果以有效的方式通知网络管理员。Intrusion detection is a reasonable supplement to the firewall, which helps the system deal with network attacks, expands the security management capabilities of system administrators, and improves the integrity of the information security infrastructure. Intrusion detection is the second security gate after the firewall. It can detect the network without affecting the network performance, so as to provide real-time protection against external attacks, internal attacks, and misoperations. Intrusion detection systems detect intrusion activity based on network packet and protocol analysis. The system can obtain data packets related to security events from the network according to certain rules, and then pass them to the analysis engine module for security analysis and judgment. The analysis results are passed to the management/configuration module. The main function of the management configuration module is to manage the configuration work of other modules and notify the network administrator of the results of the analysis engine in an effective manner.

入侵检测核心技术至今已经历三代:第一代技术是主机日志分析、模式匹配;第二代技术出现在上世纪90年代中期,技术突破包括网络数据包截获、主机网络数据和审计数据分析、基于网络的入侵检测系统和基于主机的入侵检测系统的明确分工和合作;第三代技术出现在2000年前后,代表性的突破有协议分析、行为异常分析。协议分析的出现极大减少了计算量,减少了误报率。行为异常分析技术的出现则赋予了第三代入侵检测系统识别未知攻击的能力。The core technology of intrusion detection has gone through three generations: the first generation technology is host log analysis and pattern matching; the second generation technology appeared in the mid-1990s, and technological breakthroughs include network data packet interception, host network The clear division of labor and cooperation between the network intrusion detection system and the host-based intrusion detection system; the third generation technology appeared around 2000, and the representative breakthroughs include protocol analysis and abnormal behavior analysis. The emergence of protocol analysis greatly reduces the amount of calculation and reduces the false positive rate. The emergence of behavioral anomaly analysis technology endows the third generation intrusion detection system with the ability to identify unknown attacks.

目前,国际顶尖的入侵检测系统主要以模式发现技术为主。1991年,加州大学戴维斯分校的研究人员就提出了分布式入侵检测系统的概念,给出了一种分布式入侵检测系统的体系结构。该种体系结构将以往基于主机和基于网络的入侵检测系统结合起来。At present, the top international intrusion detection systems are mainly based on pattern discovery technology. In 1991, researchers at the University of California, Davis proposed the concept of a distributed intrusion detection system, and provided a distributed intrusion detection system architecture. This architecture combines the traditional host-based and network-based intrusion detection systems.

发明内容Contents of the invention

本发明目的是提供一种分布式网络入侵检测系统,该系统为中心式体系架构,可以检测大规模网络入侵,并具有良好的分布性和可扩展性。The object of the present invention is to provide a distributed network intrusion detection system, which is a central architecture, can detect large-scale network intrusions, and has good distribution and scalability.

本发明所采用的技术方案如下:一种分布式网络入侵检测系统,该系统采用分层结构,分为数据采集层、通信层、通信层、控制层四层;所述数据采集层由数据采集器构成,主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理;所述通信层由通信装置构成,主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁;所述分析层主要由分析引擎、日志集和存储器构成,主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集;所述控制层由控制中心构成,负责管理和配置系统中的各个部件,也可以启动或停止某部件的运行。The technical scheme adopted in the present invention is as follows: a distributed network intrusion detection system, which adopts a layered structure and is divided into four layers: data acquisition layer, communication layer, communication layer, and control layer; The communication layer is composed of a communication device, which is mainly responsible for intercepting data packets in the network and performing different formatting processes according to different types of data packets; the communication layer is composed of communication devices, and is mainly responsible for transmitting control within the IDS system or between IDS systems Information or data information is a bridge for communication between various components; the analysis layer is mainly composed of an analysis engine, a log set and a memory, and is mainly responsible for judging the intrusion of network data packets, and then writing the analysis results into the log set as required; The control layer is composed of a control center, which is responsible for managing and configuring each component in the system, and can also start or stop the operation of a certain component.

所述分析引擎是用来判断是否发生入侵的大脑中枢,存储器中保存着各种入侵方式的特征库,分析引擎在进行特征匹配的时候需要调用特征库中的信息来进行比较。The analysis engine is the brain center for judging whether an intrusion has occurred, and the feature library of various intrusion methods is stored in the memory, and the analysis engine needs to call the information in the feature library for comparison when performing feature matching.

所述数据采集器负责截获网络中的原始数据包,将收集到的信息传给分析引擎进行安全判断,能够从收集到的信息中发掘出可能的入侵或其它敏感信息,然后将数据包中的数据传递给分析引擎做二次处理;通过分析以太包头、TCP、UDP、和IP包头中的信息,选出用户感兴趣的数据包,然后进行相应的应用层协议级的数据解释,把原始数据转化为相应格式化的事件,通过通信部件传给分析引擎做进一步分析;如果在解释过程中发现有分段报文,则将它们交给报文重组器进行处理,各个数据采集器之间也可以通过通信部件相互交换信息,当某个数据采集器某个活动可疑时则通知其它数据采集器,后续数据采集器分析后,也可以向相邻的数据采集器发送可疑通知,最终在可信级别上超过设定的阈值时,向主控制系统和响应系统发出报警;如果某个数据采集器收到可疑通知后,将提升可疑级别,如果没有收到可疑通知,将逐渐恢复到正常状态。The data collector is responsible for intercepting the original data packets in the network, passing the collected information to the analysis engine for security judgment, and can dig out possible intrusion or other sensitive information from the collected information, and then send the The data is passed to the analysis engine for secondary processing; by analyzing the information in the Ethernet header, TCP, UDP, and IP header, the data packets that the user is interested in are selected, and then the corresponding application-layer protocol-level data interpretation is performed, and the original data Convert them into correspondingly formatted events, and send them to the analysis engine for further analysis through communication components; if segmented messages are found during the interpretation process, they will be handed over to the message reassembler for processing, and the Information can be exchanged with each other through communication components. When a certain activity of a data collector is suspicious, other data collectors will be notified. When the level exceeds the set threshold, an alarm will be sent to the main control system and the response system; if a data collector receives a suspicious notification, it will raise the suspicious level, and if it does not receive a suspicious notification, it will gradually return to the normal state.

所述数据采集器中包括事件产生器,所述事件产生器对收集到的数据进行初步分析和过滤,可以减少需要系统处理的数据量,提高系统的处理速度。The data collector includes an event generator, and the event generator performs preliminary analysis and filtering on the collected data, which can reduce the amount of data that needs to be processed by the system and improve the processing speed of the system.

所述通信装置负责在不同的入侵检测单元之间交换各自所需的信息或在不同的IDS之间交换各自相关信息,通信装置通过SOCKET机制来完成与其它部件进行交换信息的功能,同时,通信部件通过交换信息,把检测入侵的任务合理地分担给各个检测单元,提升了整个IDS的运行效率。The communication device is responsible for exchanging required information between different intrusion detection units or exchanging relevant information between different IDSs. The communication device completes the function of exchanging information with other components through the SOCKET mechanism. At the same time, the communication By exchanging information, the components reasonably distribute the task of detecting intrusions to each detection unit, improving the operating efficiency of the entire IDS.

所述分析引擎是整个入侵检测系统的大脑,对捕获的原始数据、系统信息、其它入侵检测系统提供的可疑信息进行统一分析和处理,分析引擎具有预处理、分类和后处理的功能,所述分析引擎的构造方法是首先要收集事件信息,在接收到从数据采集器传来的格式化事件信息后,通过入侵检测方法来判定入侵是否发生,由于分析引擎和存储系统是利用统一的接口交换数据,所以一个IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测的准确度。The analysis engine is the brain of the entire intrusion detection system, which performs unified analysis and processing on the captured raw data, system information, and suspicious information provided by other intrusion detection systems. The analysis engine has the functions of preprocessing, classification and postprocessing. The construction method of the analysis engine is to first collect event information, and after receiving the formatted event information from the data collector, determine whether the intrusion has occurred through the intrusion detection method, because the analysis engine and the storage system use a unified interface to exchange data, so there may be multiple analysis engines in an IDS, and the detection methods used by each analysis engine are not necessarily the same. Even in the same analysis engine, several detection methods can be used at the same time, and different detection methods are used for the same data. The method is analyzed, and then the respective test results are compared, which can improve the accuracy of the test.

所述日志集负责记录系统发生过的事情,把用户所感兴趣的事件都记录下来,这将有利于用户对入侵事件做进一步的调查和分析,一方面可以分析入侵者所采取的入侵技术,另一方面也可以掌握入侵者的行为踪迹。The log set is responsible for recording the things that have happened in the system, and records all the events that the user is interested in, which will help the user to further investigate and analyze the intrusion event. On the one hand, it can analyze the intrusion technology adopted by the intruder. On the one hand, it is also possible to grasp the traces of the intruder's behavior.

所述响应系统负责接收分析引擎发来的入侵报警信息,然后采取相应的措施阻止入侵者继续进行入侵活动。The response system is responsible for receiving the intrusion alarm information sent by the analysis engine, and then taking corresponding measures to prevent the intruder from continuing the intrusion activities.

所述控制中心是IDS与用户交互的接口,通过它管理员可以管理和配置系统中的各个部件,查询IDS中各部件的运行情况。The control center is an interface for interaction between the IDS and the user, through which the administrator can manage and configure each component in the system, and query the operation status of each component in the IDS.

本发明系统的特点如下:The characteristics of the system of the present invention are as follows:

1.它具有一个统一完整的架构,使得整个系统具有模块化、分层处理、便于合并的特点。我们将系统模块化后可以容易的对系统进行添加或删除某个部件,同时也便于部件的重复使用,从而增强了系统的扩展能力。同时也加强对系统的整体把握能力;再者,我们借鉴TCP/IP协议的分层处理的方式,建立一些中间层,使得上、下层的相互调用透明化;最后我们尽量使各模块可以方便的进行合并起来组成一个工程。这就对各个模块的独立性要求较高。1. It has a unified and complete architecture, which makes the whole system have the characteristics of modularization, layered processing, and easy merger. After we modularize the system, we can easily add or delete a certain part of the system, and also facilitate the reuse of parts, thus enhancing the expansion ability of the system. At the same time, it also strengthens the overall grasp of the system; moreover, we use the layered processing method of the TCP/IP protocol to establish some intermediate layers to make the mutual calls between the upper and lower layers transparent; finally, we try to make each module convenient. Combine them to form a project. This requires high independence of each module.

2.采用中心式体系架构,以利于检测大规模网络入侵。而对于中心式体系结构可能带来的缺点,则采用主从结构来解决这个问题。控制系统对每一个部件能够精确的控制。每个部件在系统中是一个独立的实体。部件管理还包括部件的添加、删除以及启动、停止某个部件等。控制系统给用户提供了一个关于整个系统运行状况的视图,以及进行控制查询日志的功能。分析引擎在被监测的主机上负责入侵事件的分析,并把消息发送给自己的上级控制系统。整个入侵检测系统由一个中央控制系统统一控制。所有的信息经中央控制系统处理判断后,根据情况产生不同报警信息,如果中央控制系统瘫痪,从控制系统可以担当起中央控制系统的重任,这样不仅可以保证整个IDS系统的正常运作,也可以提高系统自身的安全性。2. Adopt a central architecture to facilitate the detection of large-scale network intrusions. As for the possible shortcomings of the central architecture, the master-slave structure is used to solve this problem. The control system can precisely control each component. Each component is an independent entity in the system. Parts management also includes adding and deleting parts, starting and stopping a certain part, etc. The control system provides users with a view of the health of the entire system, as well as the ability to query logs for control. The analysis engine is responsible for the analysis of intrusion events on the monitored host, and sends the message to its own superior control system. The entire intrusion detection system is uniformly controlled by a central control system. After all the information is processed and judged by the central control system, different alarm messages are generated according to the situation. If the central control system is paralyzed, the secondary control system can take on the heavy responsibility of the central control system, which can not only ensure the normal operation of the entire IDS system, but also improve The security of the system itself.

3.设计分析引擎体系结构时充分考虑了系统的开放性可以向系统中添加任何一种分析方法,也可以把多种分析方法同时运用到系统中。分析引擎和存储系统是利用统一的接口交换数据,所以IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中,也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测准确度。动态添加数据分析功能是通过添加新的数据分析函数来实现的。对于已经有的分析方法,可以在入侵特征数据库中添加新的入侵特征,以争强现有模式匹配分析方法的检测能力。3. When designing the analysis engine architecture, the openness of the system is fully considered. Any analysis method can be added to the system, and multiple analysis methods can also be applied to the system at the same time. The analysis engine and the storage system use a unified interface to exchange data, so there may be multiple analysis engines in the IDS, and the detection methods used by each analysis engine are not necessarily the same. Even in the same analysis engine, several analysis engines can be used at the same time. The detection method uses different detection methods to analyze the same data, and then compares the respective detection results, which can improve the detection accuracy. Dynamically adding data analysis functions is realized by adding new data analysis functions. For existing analysis methods, new intrusion signatures can be added to the intrusion signature database to improve the detection ability of existing pattern matching analysis methods.

附图说明Description of drawings

图1是本发明系统的结构示意图;Fig. 1 is the structural representation of the system of the present invention;

图2是系统的层次结构图;Figure 2 is a hierarchical structure diagram of the system;

图3是系统的运行流程图;Fig. 3 is the operation flowchart of the system;

图4是主从控制结构系统流程图。Figure 4 is a flow chart of the master-slave control structure system.

具体实施方式Detailed ways

下面结合附图和实施例对本发明作进一步说明。The present invention will be further described below in conjunction with drawings and embodiments.

如图1、2所示,在系统总体结构方面,本专利参考TCP/IP协议中所采用的分层机制,将系统分为以下四个层次。分层结构易于管理。系统管理员在任何时候若要对入侵检测系统进行管理,只需在一台机器上进行,各层次为:As shown in Figures 1 and 2, in terms of overall system structure, this patent divides the system into the following four levels with reference to the layered mechanism adopted in the TCP/IP protocol. Hierarchical structure is easy to manage. If the system administrator wants to manage the intrusion detection system at any time, he only needs to manage it on one machine, and each level is:

1)数据采集层:数据采集层由数据采集器1构成。它主要负责截获本网断中的数据包,并根据数据包的不同类型做不同的格式化处理。1) Data collection layer: the data collection layer is composed of data collector 1 . It is mainly responsible for intercepting data packets in the network, and doing different formatting according to different types of data packets.

2)通信层:通信层由通信装置2构成。主要负责在IDS系统内部或IDS系统之间传送控制信息或数据信息,是各个部件之间通信的桥梁。2) Communication layer: The communication layer is constituted by the communication device 2 . It is mainly responsible for transmitting control information or data information within the IDS system or between IDS systems, and is a communication bridge between various components.

3)分析层:分析层主要由分析引擎5、日志集3和存储器4构成。它主要负责对网络数据包的入侵判断,然后根据需要将分析结果写入日志集3。分析引擎5是判断是否发生入侵的大脑中枢,存储器4中保存着各种入侵方式的特征库,分析引擎5在进行特征匹配的时候需要调用特征库中的信息来进行比较。3) Analysis layer: The analysis layer is mainly composed of analysis engine 5 , log set 3 and memory 4 . It is mainly responsible for judging the intrusion of network data packets, and then writes the analysis results into the log set 3 as needed. The analysis engine 5 is the brain center for judging whether an intrusion has occurred. The memory 4 stores feature libraries of various intrusion methods. The analysis engine 5 needs to call the information in the feature library for comparison when performing feature matching.

4)控制层:控制层由控制中心7构成。管理和配置系统中的各个部件,也可以启动或停止某部件的运行。4) Control layer: the control layer is composed of the control center 7 . Manage and configure various components in the system, and can also start or stop the operation of a certain component.

数据采集器1负责截获网络中的原始数据包,将收集到的信息传给分析引擎进行安全判断。数据采集器1能够从收集到的信息中发掘出可能的入侵或其它敏感信息,然后将数据包中的数据传递给分析引擎做二次处理。事件产生器是数据采集器中的重要组件,它对收集到的数据进行初步分析和过滤,减少了需要系统处理的数据量,提高了系统的处理速度。通过分析以太包头、TCP、UDP、和IP包头中的信息,选出用户感兴趣的数据包,然后进行相应的应用层协议级的数据解释,把原始数据转化为相应格式化的事件,通过通信部件传给分析引擎做进一步分析。如果在解释过程中发现有分段报文,则将它们交给报文重组器进行处理。各个数据采集器之间也可以通过通信部件相互交换信息。当某个数据采集器某个活动可疑时则通知其它数据采集器,后续数据采集器分析后,也可以向相邻的数据采集器发送可疑通知,最终在可信级别上超过设定的阈值时,向主控制系统和响应系统发出报警。如果某个数据采集器收到可疑通知后,将提升可疑级别,如果没有收到可疑通知,将逐渐恢复到正常状态。The data collector 1 is responsible for intercepting the original data packets in the network, and passing the collected information to the analysis engine for safety judgment. The data collector 1 can dig out possible intrusion or other sensitive information from the collected information, and then transfer the data in the data packet to the analysis engine for secondary processing. The event generator is an important component in the data collector. It conducts preliminary analysis and filtering on the collected data, reduces the amount of data that needs to be processed by the system, and improves the processing speed of the system. By analyzing the information in the Ethernet header, TCP, UDP, and IP header, select the data packets that the user is interested in, and then interpret the data at the corresponding application layer protocol level, convert the original data into corresponding formatted events, and communicate Parts are passed to the analysis engine for further analysis. If segmented packets are found during interpretation, they are handed over to the packet reassembler for processing. Each data collector can also exchange information with each other through the communication component. When a certain activity of a data collector is suspicious, other data collectors will be notified. After subsequent analysis, the data collector can also send suspicious notifications to adjacent data collectors. When the trust level finally exceeds the set threshold , to send an alarm to the main control system and response system. If a data collector receives a suspicious notification, it will increase the suspicious level, and if it does not receive a suspicious notification, it will gradually return to the normal state.

通信装置2负责在不同的入侵检测单元之间交换各自所需的信息或在不同的IDS之间交换各自相关信息。通信装置2通过SOCKET机制来完成与其它部件进行交换信息的功能。同时,通信装置2通过交换信息,把检测入侵的任务合理地分担给各个检测单元,提升了整个IDS的运行效率。分析引擎是整个入侵检测系统的大脑。对捕获的原始数据、系统信息、其它入侵检测系统提供的可疑信息进行统一分析和处理。The communication device 2 is responsible for exchanging required information between different intrusion detection units or exchanging relevant information between different IDSs. The communication device 2 completes the function of exchanging information with other components through the SOCKET mechanism. At the same time, the communication device 2 reasonably distributes the task of detecting intrusions to each detection unit by exchanging information, thereby improving the operating efficiency of the entire IDS. The analysis engine is the brain of the entire intrusion detection system. Unified analysis and processing of captured raw data, system information, and suspicious information provided by other intrusion detection systems.

日志集3负责记录系统发生过的事情,把用户所感兴趣的事件都记录下来,这将有利于用户对入侵事件做进一步的调查和分析,一方面可以分析入侵者所采取的入侵技术,另一方面也可以掌握入侵者的行为踪迹。The log set 3 is responsible for recording the things that happened in the system, and records all the events that the user is interested in, which will help the user to further investigate and analyze the intrusion event. On the one hand, it can analyze the intrusion technology adopted by the intruder, and on the other hand On the other hand, you can also grasp the behavior traces of intruders.

存储器4为各部件提供其所需的数据。其中的规则库记录着丰富的入侵特征,这是分析引擎进行判断的重要依据。The memory 4 provides each component with the data it needs. The rule base records rich intrusion features, which is an important basis for the analysis engine to judge.

分析引擎5具有预处理、分类和后处理的功能。构造分析引擎6首先要收集事件信息,在接收到从数据采集器1传来的格式化事件信息后,通过入侵检测方法来判定入侵是否发生。由于分析引擎6和存储器4是利用统一的接口交换数据,所以一个IDS中可能有多个分析引擎,每个分析引擎采用的检测方法也不一定相同,即使是同一个分析引擎中也可以同时使用几种检测方法,对相同的数据采用不同的检测方法进行分析,然后对各自的检测结果进行比较,可以提高检测的准确度。The analysis engine 5 has functions of preprocessing, classification and postprocessing. The structural analysis engine 6 first collects event information, and after receiving the formatted event information from the data collector 1, it determines whether an intrusion has occurred through an intrusion detection method. Since the analysis engine 6 and the memory 4 use a unified interface to exchange data, there may be multiple analysis engines in one IDS, and the detection methods adopted by each analysis engine are not necessarily the same, even in the same analysis engine, they can be used at the same time For several detection methods, different detection methods are used to analyze the same data, and then the respective detection results are compared, which can improve the detection accuracy.

响应器6负责接收分析引擎发来的入侵报警信息,然后采取相应的措施阻止入侵者继续进行入侵活动。The responder 6 is responsible for receiving the intrusion alarm information sent by the analysis engine, and then taking corresponding measures to prevent the intruder from continuing the intrusion activities.

控制中心7是IDS与用户交互的接口,通过它管理员可以管理和配置系统中的各个部件,查询IDS中各部件的运行情况。The control center 7 is the interface between the IDS and the user, through which the administrator can manage and configure each component in the system, and query the operation status of each component in the IDS.

本系统采用多线程处理方式,在主线程上运行数据采集器目的是为了提高分析引擎的速度,它采用了多个匹配线程同时进行不同的匹配处理:如果有控制信息产生,则有一个独立的控制线程来负责控制功能,系统运行流程如图3所示。首先,IDS系统进行一些必要的初始化配置,接着将规则库中的逻辑链表调入内存,然后判断是否有控制信息,如果有则对控制信息进行相应的控制信息处理,否则进行网络包捕获,紧接着判断捕获到的网络包包头是否合法,如不合法则回到上一个判断看是否有控制信息,否则对合法的数据包进行格式化处理以及与规则库里的规则进行匹配,如果与规则链表不匹配,则同样返回到控制信息判断,否则对匹配的数据包进行相应的处理以及将相关的规则写进日志集。This system adopts multi-thread processing method. The purpose of running the data collector on the main thread is to improve the speed of the analysis engine. It uses multiple matching threads to perform different matching processing at the same time: if there is control information generated, there is an independent The control thread is responsible for the control function, and the system operation flow is shown in Figure 3. First, the IDS system performs some necessary initialization configurations, then transfers the logical linked list in the rule base into the memory, and then judges whether there is control information, and if so, performs corresponding control information processing on the control information, otherwise performs network packet capture, and then Then judge whether the captured network packet header is legal. If not, go back to the previous judgment to see if there is control information. Otherwise, format the legal data packet and match it with the rules in the rule base. If it is not consistent with the rule list If it matches, it will also return to the control information judgment, otherwise, the matching data packet will be processed accordingly and the relevant rules will be written into the log set.

图4是本发明的一个应用实例,控制系统采用主/从结构是本专利的又一特色之处。整个IDS系统由一个中央控制器系统统一控制。所有的信息经中央控制系统处理判断后,根据情况产生不同报警信息。如果中央控制系统瘫痪,从控制系统可以担当起中央控制系统的重任,这样不仅可以保证整个IDS系统的正常运作,也可以提高系统自身的安全性能,其运行流程如图4所示。控制系统运行流程为:首先,中央控制系统会将从控制系统的信息传给区域内所有下级部件。然后,下级部件与中央控制系统进行正常的通讯。当中央控制系统出现问题时,它将发送转交信号给所有的下级部件,下级部件接收到信号后先切断与中央控制系统的连接,然后再与从控制系统建立新的连接。建立连接之后,从控制系统将取代中央控制系统的地位来控制整个系统的运行。中央控制系统在给区域内所有部件发转交信号的同时,将会和从控制系统进行通信,把一些状态信息发送给从控制系统,当中央控制系统恢复工作时,其工作过程与上述过程相反。Fig. 4 is an application example of the present invention, another feature of this patent is that the control system adopts a master/slave structure. The whole IDS system is uniformly controlled by a central controller system. After all the information is processed and judged by the central control system, different alarm information will be generated according to the situation. If the central control system is paralyzed, the secondary control system can take on the heavy responsibility of the central control system, which can not only ensure the normal operation of the entire IDS system, but also improve the security performance of the system itself. Its operation process is shown in Figure 4. The operation process of the control system is as follows: First, the central control system will transmit the information from the control system to all the subordinate components in the area. The subordinate components then communicate normally with the central control system. When there is a problem with the central control system, it will send a handover signal to all the lower-level components. After receiving the signal, the lower-level components will first cut off the connection with the central control system, and then establish a new connection with the slave control system. After the connection is established, the slave control system will replace the central control system to control the operation of the entire system. When the central control system sends handover signals to all components in the area, it will communicate with the slave control system and send some status information to the slave control system. When the central control system resumes work, its working process is opposite to the above process.

Claims (9)

1, a kind of distributed network invasion detecting system, this system adopts hierarchy, it is characterized in that this system is divided into four layers of data collection layers, communication layers, communication layers, key-course; Described data collection layer is made of data acquisition unit, main is responsible for intercepting and capturing the packet of Home Network in disconnected, and does different formats according to packet dissimilar and handle; Described communication layers is made of communicator, mainly is responsible for communicating control information or data message between IDS internal system or IDS system, is the bridge of communicating by letter between each parts; Described analysis layer mainly is made of analysis engine, daily record collection and memory, and main being responsible for judged the invasion of network packet, as required analysis result write the daily record collection then; Described key-course is made of control centre, be in charge of with configuration-system in each parts, also can start or stop the operation of certain parts.
2, distributed network invasion detecting system according to claim 1, it is characterized in that described analysis engine is to be used for judging whether the big mesencephalic centre of invading, the feature database of in store various invasion modes in the memory, the information that analysis engine need call in the feature database when carrying out characteristic matching compares.
3, distributed network invasion detecting system according to claim 1, it is characterized in that described data acquisition unit is responsible for intercepting and capturing the raw data packets in the network, the information of collecting is passed to analysis engine carry out safe judgement, can from the information of collecting, excavate out possible invasion or other sensitive information, then the data passes in the packet be done aftertreatment to analysis engine; By analyzing the information in ether packet header, TCP, UDP and the IP packet header, select the user's interest packet, carry out the data interpretation of application corresponding layer protocol level then, initial data is converted into the incident of corresponding formatization, pass to analysis engine by communication component and be further analyzed; If in interpretation process, find to have segmented message, then they being given the message reformer handles, also can pass through the mutual exchange message of communication component between each data acquisition unit, when certain movable other data acquisition unit of then notifying when suspicious of certain data acquisition unit, after the follow-up data collector is analyzed, also can send suspicious notice, when finally on confidence levels, surpassing preset threshold, send warning to master control system and responding system to adjacent data acquisition unit; After if certain data acquisition unit is received suspicious notice, will promote level of suspicion, if do not receive suspicious notice, will return to normal condition gradually.
4, distributed network invasion detecting system according to claim 3, it is characterized in that comprising event generator in the described data acquisition unit, described event generator carries out initial analysis and filtration to the data of collecting, can reduce the data volume that needs system handles, improve the processing speed of system.
5, distributed network invasion detecting system according to claim 1, it is characterized in that described communicator is responsible in the required separately information of exchange between the different intrusion detecting unit or exchanges relevant information separately between different IDS, communicator is finished the function of carrying out exchange message with other parts by SOCKET mechanism, simultaneously, communication component passes through exchange message, the task of detecting invasion is reasonably shared to each detecting unit, promoted the operational efficiency of entire I DS.
6, distributed network invasion detecting system according to claim 1, it is characterized in that described analysis engine is the brain of whole intruding detection system, to the initial data of catching, system information, the suspicious information that other intruding detection system provides is unified to analyze and handle, analysis engine has preliminary treatment, the function of classification and reprocessing, the building method of described analysis engine is at first to want Collection Events information, after receiving the format event information that transmits from data acquisition unit, judge by intrusion detection method whether invasion takes place, because analysis engine and storage system are to utilize unified interface swap data, so have a plurality of analysis engines among the IDS, the detection method that each analysis engine adopts is also not necessarily identical, even also can use several detection methods simultaneously in the same analysis engine, the detection method that identical The data is different is analyzed, then separately testing result is compared, can improve the accuracy of detection.
7, distributed network invasion detecting system according to claim 1, it is characterized in that described daily record collection is responsible for the thing that register system took place, the interested incident of user is all noted, this will help the user intrusion event will be done further investigation and analysis, can analyze the invasion technology that the invador takes on the one hand, also can grasp invador's behavior trace on the other hand.
8, distributed network invasion detecting system according to claim 1 is characterized in that described responding system is responsible for the intrusion alarm information that the receiving and analyzing engine is sent, and takes appropriate measures then to stop the invador to proceed the invasion activity.
9, distributed network invasion detecting system according to claim 1 is characterized in that described control centre is the interface of IDS and user interactions, by its keeper can manage with configuration-system in each parts, the ruuning situation of each parts among the inquiry IDS.
CN 200610037594 2006-09-08 2006-09-08 Distributed network invasion detecting system Pending CN1949720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610037594 CN1949720A (en) 2006-09-08 2006-09-08 Distributed network invasion detecting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610037594 CN1949720A (en) 2006-09-08 2006-09-08 Distributed network invasion detecting system

Publications (1)

Publication Number Publication Date
CN1949720A true CN1949720A (en) 2007-04-18

Family

ID=38019111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610037594 Pending CN1949720A (en) 2006-09-08 2006-09-08 Distributed network invasion detecting system

Country Status (1)

Country Link
CN (1) CN1949720A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115010B (en) * 2007-09-04 2010-06-02 杭州华三通信技术有限公司 Method for extending safety system, safety system and safety processing device
CN103748988B (en) * 2009-06-12 2010-10-06 北京理工大学 A kind of attack detection method based on fuzzy uncertainty reasoning
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN101534213B (en) * 2009-04-09 2011-02-02 成都市华为赛门铁克科技有限公司 Acquisition method of log and log server
CN101420419B (en) * 2008-10-27 2011-05-18 吉林大学 Adaptive high-speed network flow layered sampling and collecting method
CN101350745B (en) * 2008-08-15 2011-08-03 北京启明星辰信息技术股份有限公司 Intrude detection method and device
CN101562534B (en) * 2009-05-26 2011-12-14 中山大学 Network behavior analytic system
CN103384241A (en) * 2012-12-21 2013-11-06 北京安天电子设备有限公司 Distributed analysis method and system for security event data
CN104333534A (en) * 2014-09-18 2015-02-04 南京邮电大学 DoS detection system of 6LoWPAN sensing network
CN105812200A (en) * 2014-12-31 2016-07-27 中国移动通信集团公司 Abnormal behavior detection method and device
CN106850645A (en) * 2017-02-18 2017-06-13 许昌学院 A kind of system and method for detecting invalid access to computer network
CN107819837A (en) * 2017-10-31 2018-03-20 南京优速网络科技有限公司 A kind of method and log cache analysis system for lifting buffer service quality
CN107921981A (en) * 2015-06-30 2018-04-17 莱尔德技术股份有限公司 The monitoring and control of distributed machines
CN109067555A (en) * 2018-07-25 2018-12-21 安徽三实信息技术服务有限公司 A kind of WLAN wireless network data encryption system and its encryption method
CN111181914A (en) * 2019-09-29 2020-05-19 腾讯云计算(北京)有限责任公司 Method, device and system for monitoring internal data security of local area network and server

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115010B (en) * 2007-09-04 2010-06-02 杭州华三通信技术有限公司 Method for extending safety system, safety system and safety processing device
US8713663B2 (en) 2007-09-04 2014-04-29 Hangzhou H3C Technologies Co., Ltd. Method for using extended security system, extended security system and devices
CN101350745B (en) * 2008-08-15 2011-08-03 北京启明星辰信息技术股份有限公司 Intrude detection method and device
CN101420419B (en) * 2008-10-27 2011-05-18 吉林大学 Adaptive high-speed network flow layered sampling and collecting method
CN101534213B (en) * 2009-04-09 2011-02-02 成都市华为赛门铁克科技有限公司 Acquisition method of log and log server
CN101562534B (en) * 2009-05-26 2011-12-14 中山大学 Network behavior analytic system
CN103748988B (en) * 2009-06-12 2010-10-06 北京理工大学 A kind of attack detection method based on fuzzy uncertainty reasoning
CN103748989B (en) * 2009-07-14 2010-10-06 北京理工大学 A kind of many granularities of matrix form network security threats method for situation assessment
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN101938460B (en) * 2010-06-22 2014-04-09 北京中兴网安科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN103384241B (en) * 2012-12-21 2016-07-13 北京安天电子设备有限公司 A kind of distribution analysis method towards security event data and system
CN103384241A (en) * 2012-12-21 2013-11-06 北京安天电子设备有限公司 Distributed analysis method and system for security event data
CN104333534A (en) * 2014-09-18 2015-02-04 南京邮电大学 DoS detection system of 6LoWPAN sensing network
CN105812200A (en) * 2014-12-31 2016-07-27 中国移动通信集团公司 Abnormal behavior detection method and device
CN107921981A (en) * 2015-06-30 2018-04-17 莱尔德技术股份有限公司 The monitoring and control of distributed machines
US10516737B2 (en) 2015-06-30 2019-12-24 Control Solutions Enterprises, Inc. Monitoring and controlling of distributed machines
CN107921981B (en) * 2015-06-30 2020-05-01 莱尔德技术股份有限公司 Method and network for managing a plurality of distributed machines
US10805400B2 (en) 2015-06-30 2020-10-13 Cattron North America, Inc. Monitoring and controlling of distributed machines
CN106850645A (en) * 2017-02-18 2017-06-13 许昌学院 A kind of system and method for detecting invalid access to computer network
CN107819837A (en) * 2017-10-31 2018-03-20 南京优速网络科技有限公司 A kind of method and log cache analysis system for lifting buffer service quality
CN109067555A (en) * 2018-07-25 2018-12-21 安徽三实信息技术服务有限公司 A kind of WLAN wireless network data encryption system and its encryption method
CN111181914A (en) * 2019-09-29 2020-05-19 腾讯云计算(北京)有限责任公司 Method, device and system for monitoring internal data security of local area network and server
CN111181914B (en) * 2019-09-29 2022-08-02 腾讯云计算(北京)有限责任公司 Method, device and system for monitoring internal data security of local area network and server

Similar Documents

Publication Publication Date Title
CN1949720A (en) Distributed network invasion detecting system
Dong et al. Real-time network intrusion detection system based on deep learning
Mitchell et al. A survey of intrusion detection techniques for cyber-physical systems
Mukherjee et al. Network intrusion detection
CN100384153C (en) An IPv6-based network performance analysis reporting system and its implementation method
CN106778253A (en) Threat context aware information security Initiative Defense model based on big data
Jia et al. Big-data analysis of multi-source logs for anomaly detection on network-based system
Zhang et al. Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis
Zhang et al. Multi-agent based intrusion detection architecture
CN1564530A (en) Network safety guarded distributing invading detection and internal net monitoring system and method thereof
CN118784348A (en) A network information security analysis method and system based on data analysis
WO2004051929A1 (en) Audit platform system for application process based on components
Liao et al. Research on network intrusion detection method based on deep learning algorithm
Chai et al. Research of intelligent intrusion detection system based on web data mining technology
Wasniowski Multi-sensor agent-based intrusion detection system
Zhu et al. Research of intrusion detection based on support vector machine
Qi et al. FSM-based cyber security status analysis method
CN106878338B (en) Remote control equipment gateway firewall integrated machine system
Kong et al. Research on situation analysis technology of network security incidents
Chen et al. Dynamic forensics based on intrusion tolerance
Srivastav et al. Evaluation of network intrusion detection system using PCA and NBA
CN108337238B (en) Information security detection system for teaching network
Nalavade et al. Intrusion prevention systems: data mining approach
Zhuo et al. Research on Intelligent Algorithm of Public Network Attack Data Mining Based on Deep Neural Network
Lyubenova et al. А graph database intrusion detection and prevention system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication