A method, device and system for identifying abnormal ip data flow
A data flow and anomaly technology, applied in the field of communication, can solve the problems of wrong small traffic objects being identified as large traffic objects, low identification accuracy, frequent occurrence of network anomalies, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0122] Such as figure 1 As shown, a method for identifying an abnormal IP data flow provided by an embodiment of the present invention is applied to a working node, and the method includes:
[0123] 101: In the current time interval, receive Y elements sent by the data collection node; wherein, Y≥1, and Y is an integer.
[0124] Wherein, both the "working node" and the "data collection node" may be: a server or a PC (Personal Computer, personal computer) and other devices. In addition, different working nodes and / or data collection nodes may also be distributed on different CPUs (Central Processing Unit, central processing unit) of the same device. It should be noted that, for the convenience of description, different working nodes and / or data collection nodes are distributed on different devices as an example for description below.
[0125] Each server or PC can be used as a working node or a data collection node. However, in the same application scenario, the same node gen...
Embodiment 1
[0165] This embodiment is used to determine a target high-traffic object, that is, the preset abnormal object type is a high-traffic object. Specifically, including:
[0166] (1) Element distribution and mapping process
[0167] In the current time interval, the data collection node has obtained Y elements in total, and the elements (x, v x ) as an example to illustrate the element distribution and mapping process; where, x represents the object x, v x Indicates the flow value of object x.
[0168] Such as figure 2 As shown, the element distribution and mapping process includes:
[0169] 201: The data collection node obtains the element (x, v x ).
[0170] 202: Send the element to one of the d working nodes distributed by the preset object x; wherein, d≥1.
[0171] Exemplarily, the data collection node can pre-store the working nodes distributed by each object, wherein the number of working nodes distributed by different objects can be the same or different, and the wo...
Embodiment 2
[0243] This embodiment is used to determine the target large-change object, that is, the preset abnormal object type is a large-change object. Specifically, including:
[0244] (1) Element distribution and mapping process
[0245] This process is the same as the "element distribution process" in Embodiment 1.
[0246] (2) Record information update process
[0247]The difference between this process and the "record information update process" in Embodiment 1 is that the dynamic expansion parameter T in the above step 308 in this embodiment satisfies T=εφ; where ε is a constant, 0<ε≤1. Other steps are the same as the "record information updating process" in Embodiment 1.
[0248] (3) Work node identification process
[0249] Such as Figure 6 As shown, the working node identification process includes:
[0250] 601-606: the same as the above steps 401-406.
[0251] 607: Get the flow lower bound S of the first object mapped to the i-th bucket in the previous time interval o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


