Intrude detection method and device

An intrusion detection and to-be-detected technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of non-existence of network attack events, low intrusion detection efficiency, poor unitization of intrusion detection devices, etc., to reduce maintenance. The effect of upgrading costs, improving intrusion detection efficiency, and enhancing detection capabilities

Inactive Publication Date: 2009-01-21
BEIJING VENUS INFORMATION TECH +1
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This intrusion detection mode based on a single attack signature string expression format and a single pattern matching algorithm is being severely challenged by the current variety of network attack events, mainly in the following aspects: 1) With the emergence of various network applications, especially Web-based With the emergence of network application systems, the differences of various network attack events are becoming larger and larger, and it is becoming more and more difficult to use a single format to describe the attack characteristics of all types of network attack events; 2) some network attack events There is no obvious attack signature string in the event, or it is impossible to list all attack signature strings by enumeration, so the attack signature knowledge base using misuse detection cannot extract attack signature strings, such as SQL injection attacks and cross-site scripting attack events. It is impossible to use the attack signature string enumeration method to define the attack signature, but must use other dedicated detection knowledge base; 3) Traditional pattern matching technology is becoming more and more difficult to achieve complex attack signature string matching
[0006] In order to support the intrusion detection of complex network attack events such as SQL injection attacks, it is necessary to overcome the shortcomings of using a single attack feature description format and a single attack feature matching technology in traditional intrusion detection devices
Although some traditional intrusion detection devices support the detection of some complex network attack events through patching, it destroys the architecture of traditional intrusion detection devices, resulting in two problems: 1) With more With the addition of the detection patch, the degree of unitization of the entire intrusion detection device is getting worse and worse, which will greatly increase the maintenance and upgrading costs of the intrusion detection device; 2) The coupling between the detection patch and the data collection unit in the traditional intrusion detection device is too strong, seriously Affect the execution efficiency of the intrusion detection device
[0007] At present, it is also seen that some intrusion detection devices use an attack feature description language similar to a high-level language to define the attack features of network attack events, which makes it possible to use a single format to describe all attack features, such as the open source Bro intrusion detection tool and commercial NFR intrusion detection The tools adopt this method, but these intrusion detection tools have to use virtual machine technology to perform the matching of network data flow data and attack signature strings, resulting in low intrusion detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrude detection method and device
  • Intrude detection method and device
  • Intrude detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The intrusion detection method and device of the present invention no longer adopts the intrusion detection idea of ​​using a single attack feature description format and a single attack feature matching algorithm in the traditional intrusion detection technology, but adopts a layered divide-and-conquer strategy intrusion detection idea, allowing different types of network attacks Events use different detection knowledge base description formats and select different attack detection operators to improve the detection accuracy and execution efficiency of the intrusion detection device.

[0055] Below, some nouns used in the present invention will be explained first.

[0056] The object to be detected may be an application protocol message or a file stream object, where the application layer protocol message may be an HTTP request message, and the file stream object may be an HTML document object.

[0057] The detection operator is a software program designed to detect a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an intrusion detection method and a device thereof. The method distributes one or more than one detection units to various types of network attacks to be detected, and is provided with the type of the object to be detected in the network attack of the type, a detection operator and a detection knowledge base. When the intrusion is detected, the real-time network data packet which comprises the object to be detected is acquired; the corresponding detection unit detects the intrusion according to the configured detection operator and the detection knowledge base, so as to generate the occurrence of alarming the network attack. The intrusion detection device orderly comprises a data pre-processing unit, a data distribution unit, a detection network which comprises one or more than one detection units, and a configuration management which is used for managing the connection of the unit. The method supports the precise detection of various complex network attacks, and comprises the detection efficiency of the whole intrusion detection device.

Description

technical field [0001] The invention relates to the field of network attack detection, in particular to an intrusion detection method and device. Background technique [0002] The intrusion detection device is a network security device deployed in bypass or in series. It is usually deployed at the entrance of the key network / network boundary to comprehensively monitor the network data packets entering and leaving the network. By scanning the monitored network data packets Detection to discover various possible intrusion behaviors, and adjust security policies or protection methods according to attack events. At the same time, the attack event sequence generated by the intrusion detection device can provide a basis for regular security assessment and analysis. [0003] The intrusion detection technologies adopted by current intrusion detection devices can be divided into two categories: one is misuse detection technology; the other is anomaly detection technology. Misuse de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06H04L29/08
CPCH04L63/1416H04L41/0677
Inventor 周力丹李博叶润国周涛
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products