Hybrid intrusion detection method based on Internet protocol version 6

An Internet protocol and intrusion detection technology, applied in the field of network security, to achieve the effect of improving overall security and efficiency

Inactive Publication Date: 2009-02-11
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A typical network communication description mode is a four-dimensional matrix , where ID is a unique identifier for a specific connection, and each unit in the matrix represents a specific connection on the network, which From the source host to the destination host and use a certain service, each unit saves two values: the number of packets passing through the network within a period of time and the amount of data transmitted by these packets. There are two detection methods: (1) The current network communication matrix is ​​compared with a specific pattern matrix. This specific pattern matrix can be a pattern matrix representing a certain intrusion. If the current communication pattern matches it, it means that this kind of intrusion may occur. This kind of intrusion detection corresponds to the aforementioned Misuse intrusion detection; the specific pattern matrix can also be a pattern matrix representing the normal traffic pattern of the network, if the probability of the current communication pattern is too low, it means that anomalies occur, and this kind of intrusion detection corresponds to the abnormal intrusion detection described above; (2 ) uses a series of rules to find specific traffic patterns in the current network communication matrix, so as to discover intrusion or abnormal activities. This method is very important when specific network communication patterns are to be generated, because at this time the previous method has not yet detected in accordance with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid intrusion detection method based on Internet protocol version 6
  • Hybrid intrusion detection method based on Internet protocol version 6
  • Hybrid intrusion detection method based on Internet protocol version 6

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to meet the needs of the IPv6 environment, the IDS of this project adopts the overall architecture based on the combination of network and host, such as figure 1 shown.

[0075] 1. Protocol analysis sub-module

[0076] The protocol analysis sub-module is located on the variable feature library module, and performs protocol analysis on the received data packets, and divides the data packets into different detection method sets according to the analysis results. Matching algorithm A and matching algorithm B in the figure respectively represent optimization algorithms designed for specific protocols. In actual development, protocol analysis can be further refined, such as Figure 2 Show. This matching algorithm technology takes advantage of the highly ordered nature of network protocols, effectively reduces the matching range of targets, greatly reduces the amount of calculation, greatly improves the efficiency of intrusion analysis, and also makes the system m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A composite intrusion detection method based on an Internet protocol edition 6 effectively improves the accuracy and reduces the rate of false alarm by using a composite detection mean, and is suitable for the new requirements of IPv6 to the intrusion detection method. The method is divided into three parts, namely the design of an overall framework by using composite intrusion detection, the division of a sub module and an intrusion identifying method. The method comprises the following steps: introducing the sub-module of a variable feature database; matching a data package captured with the variable feature base firstly; immediately transferring into an alarm sub module if the matching is realized, so that an intrusion detection system can detect the intrusion of networks more rapidly, thereby improving the efficiency of the intrusion detection. Simultaneously, the adjacent network sharing proposal of the variable feature base can capture an intrusion feature in the networks in advance through the mutual reproduction of the variable feature base of the adjacent network when the network is not intruded, thereby facilitating the adoption of corresponding measures as soon as possible and improving the integral safety of the networks.

Description

technical field [0001] The present invention adopts a distributed overall architecture based on the combination of network and host, uses hybrid detection methods, can effectively improve accuracy, reduce false alarm rate, and adapt to the requirements of IPv6 (Internet Protocol 6) for intrusion detection systems. The new requirements belong to the technical field of cybersecurity. Background technique [0002] Overview of IPv6 [0003] IPv6 is the abbreviation of "Internet Protocol Version 6", also known as the next generation Internet protocol, which is a new IP protocol designed by IETF to replace the current IPv4 protocol. IPv6 is proposed to solve some problems and deficiencies existing in IPv4, mainly in address space, data header structure, address automatic configuration, data transmission security (IPSec protocol), quality of service (QoS) and other aspects have been improved. The main impact on the intrusion detection system is the structure of the data packet he...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 孙知信胡桂银
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products