Network anomaly traffic monitoring method and device

A traffic monitoring and network anomaly technology, applied in the field of information security, can solve the problems of no confidence in the output results, low false detection rate, no low false detection rate, etc., and achieve output with result confidence, low false detection rate and false detection rate. The effect of high detection rate and low false detection rate

Inactive Publication Date: 2013-03-06
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The accuracy is not high, especially the accuracy of the threshold-based method is relatively poor
Since the processing in the case of network intrusion requires a considerable cost, the loss of missed detection and false detection is huge
[0007] (2) There is no confidence in the output result, and the risk difference between a state that is only 50% likely to be attacked and a state that is 99% likely to be attacked is huge
[0008] (3) Unable to cope with the massive network data flow accumulated by online collection, the increasing data will make the processing time of various data-driven methods infinitely increase, so that it is impossible to monitor the current network situation in real time
[0009] (4) Various parameters of the network monitoring system cannot be adaptively adjusted according to historical network conditions
Manual intervention setting not only consumes a lot of manpower, but also reduces the stability of the system. Once an error occurs, the result will be unpredictable
[0010] (5) Inefficiency in processing high-dimensional data
[0014] (1) When monitoring, the number of SVM support vectors grows linearly with the increase of training samples. When the training samples are large, on the one hand, it may cause over-fitting of historical data and weaken the generalization ability. Computational time is wasted
[0015] (2) Probabilistic monitoring output cannot be obtained, that is, the prediction result has no confidence, only a certain label or value
[0016] (3) The variation range of some parameters must be manually set. Improper setting will cause problems such as overfitting or underfitting. This parameter has a great impact on the results
[0019] In the existing technology, there is no low false detection rate, low false detection rate, output with result confidence, automatic parameter selection, and efficient network abnormal traffic monitoring scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network anomaly traffic monitoring method and device
  • Network anomaly traffic monitoring method and device
  • Network anomaly traffic monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] see figure 1 , which is a flow chart of the principles of the method for monitoring abnormal network traffic provided in this embodiment, specifically as follows:

[0064] Step 10, capturing the passing network data flow.

[0065] In this embodiment, for the monitoring of network abnormal traffic, it is first necessary to capture the unknown traffic in the network, and the captured network data flow data needs to be input into the relevant vector machine for training on the one hand, so as to establish a historical data model, and judge through the data model Whether the subsequent network data flow is abnormal. On the other hand, it is also necessary to continuously capture the current passing network data flow in order to predict the abnormality of network traffic in real time.

[0066] Step 20, according to the generation time of the network data stream, select n pieces of network data stream data closest to the current time.

[0067] Here, how to select appropria...

Embodiment 2

[0103] see image 3 , the embodiment of the present invention provides a network abnormal traffic monitoring device, the device includes a capture unit 100, a screening unit 200, a data processing unit 300 and an output unit 400, specifically as follows:

[0104] A capturing unit 100, configured to capture network data streams passing through;

[0105] The screening unit 200 is used to select n pieces of network data stream data closest to the current time according to the generation time of the network data stream; n is determined according to the computing power of the device;

[0106] The data processing unit 300 is used to train the captured network data flow data as the input of the correlation vector machine, and establish a data model;

[0107] The output unit 400 is configured to monitor current network traffic data according to the data model.

[0108] Preferably, the above device further includes a denoising unit 500, configured to perform denoising processing on t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network anomaly traffic monitoring method, belonging to the technical filed of information security. The network anomaly traffic monitoring method comprises the steps of: capturing a network data stream passing by; according to generation time of the network data stream, selecting n network data streaming data which are closest to the current time, wherein n is determined according to the calculating capacity of a system; training the captured n network data streaming data as input of a relevance vector machine, establishing a data model; and monitoring the current network traffic data according to the data model. By the method and the device, the classifying monitoring precision can be improved so that anomaly traffic is monitored more rapidly and effectively, and lower false drop rate and fallout ratio are ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for monitoring abnormal network traffic. Background technique [0002] Network traffic anomalies refer to significant changes in network traffic irregularities, such as local events such as transient network congestion, distributed denial of service attacks (DDoS, Distributed Denial of Service), large-scale scanning, or global events such as network routing anomalies. The monitoring and analysis of network traffic anomalies is very important for network security emergency response departments. However, due to the difficulty of macro-traffic anomaly monitoring, it is necessary to extract and explain abnormal patterns from a large number of high-dimensional and noisy data. Monitoring and analysis remains a great challenge. To this end, academic institutions and enterprises at home and abroad have proposed a variety of monitoring methods. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/801
Inventor 鲁松邹昕周立张良关建峰许长桥张能张宏科
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products