Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IPv6 network intrusion detection method and system based on data mining technology

A technology of network intrusion detection and intrusion detection, applied in the direction of transmission system, electrical components, etc., can solve the problems that the host and network cannot be detected, and the data packets that cannot be encrypted cannot be detected, so as to simplify the detection complexity and improve the intrusion detection ability , the effect of improving the detection efficiency

Pending Publication Date: 2021-12-24
ELECTRIC POWER SCI RES INST OF STATE GRID XINJIANG ELECTRIC POWER +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an IPv6 network intrusion detection method based on data mining technology, which overcomes the above-mentioned deficiencies in the prior art, and can effectively solve the problem that the existing network intrusion detection method cannot detect the host and the network at the same time, further Solve the problem that existing network intrusion detection methods cannot detect encrypted data packets in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPv6 network intrusion detection method and system based on data mining technology
  • IPv6 network intrusion detection method and system based on data mining technology
  • IPv6 network intrusion detection method and system based on data mining technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Embodiment 1: as attached figure 1 As shown, the embodiment of the present invention discloses a kind of IPv6 network intrusion detection method based on data mining technology, comprising:

[0056] Step S101, detecting known attacks on the data network and unencrypted IPv6 data streams in multiple target subsystems to complete host intrusion detection;

[0057] Here, the host intrusion detection is mainly to perform security detection on log files, misoperation behaviors, redundant data, etc. in the IPv6 network, so as to ensure the interconnection and intercommunication of data between hosts.

[0058] Step S102, presetting the variable feature database stored with feature strings, calling the variable feature database, using a multi-mode string matching algorithm to detect IPv6 data streams encrypted by the IPSec protocol transmitted between different host objects, and completing network intrusion detection;

[0059] Here, the IPv6 data stream encrypted by IPSec prot...

Embodiment 2

[0064] Embodiment 2: as attached figure 2 As shown, the embodiment of the present invention discloses a kind of IPv6 network intrusion detection method based on data mining technology, wherein detection of known attacks on data networks in multiple target subsystems and unencrypted IPv6 data streams further includes:

[0065] Step S201, performing IPSec protocol analysis on the IPv6 packet header in the target subsystem; where the IPv6 packet in the target subsystem is the host IPv6 packet;

[0066] Step S202, extracting the header of the IPv6 data packet, using the information entropy protocol analysis algorithm to determine whether there is an intrusion behavior in the header of the IPv6 data packet, if the response is no, continue to analyze the IPv6 data packet, and if the response is yes, it is judged that there is abnormal intrusion behavior data;

[0067] Here, step S202 specifically includes:

[0068] 1. Extract the IPv6 packet header;

[0069] 2. Calculate its corr...

Embodiment 3

[0075] Embodiment 3: as attached image 3 , 4 As shown, the embodiment of the present invention discloses an IPv6 network intrusion detection method based on data mining technology, in which a variable feature database storing feature strings is preset, the variable feature database is called, and a multi-pattern string matching algorithm is used to detect different hosts The IPv6 data flow encrypted by the IPSec protocol transmitted between objects further includes:

[0076] Step S301, using a data capture function to capture IPv6 data packets in network data, wherein the data capture function includes filtering rules in data address format;

[0077] Here specifically include:

[0078] 1. Use the data capture function to capture IPv6 data packets in the network data;

[0079] 2. Obtain the network address and mask information from the IPv6 data packet, compare the network address and mask information with the filtering rules of the data address format, extract the consiste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network intrusion detection, in particular to an IPv6 network intrusion detection method and system based on the data mining technology, and the method comprises the steps: detecting known attacks and unencrypted IPv6 data streams of a data network in a plurality of target subsystems; detecting IPv6 data streams which are transmitted among different host objects and encrypted by an IPSec protocol by using a multi-mode character string matching algorithm; and monitoring all intrusion detection processes, matching a host intrusion detection result with a network intrusion detection result, and judging an attack type. According to the method, the complexity of an original data packet is reduced by using an information entropy protocol analysis algorithm, intrusion detection of the head of the IPv6 data packet is completed, the detection complexity is simplified, the detection efficiency is improved, the IPv6 data stream which is transmitted among different host objects and encrypted by the IPSec protocol is detected by using a multi-mode character string matching algorithm, and the detection efficiency is improved by using the advantages of multiple modes.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection, and relates to an IPv6 network intrusion detection method and system based on data mining technology. Background technique [0002] With the limitations of the scale of IPv4 addresses, it is gradually unable to meet the needs of the deployment and application of power Internet of Things equipment. IPv6 addresses instead of IPv4 addresses have become the trend of network address deployment. It can be satisfied, so IPv6 is selected as the main address deployment mode of the power Internet of Things. The introduction of IPv6 technology supports the realization of the addition of power IoT equipment. Under the functional application of IoT equipment, it has opened up diversified and multi-channel business service capabilities for power, such as video multimedia, sensor monitoring, WLAN wireless communication and other business networks. , the development of business services will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1416H04L63/1425H04L63/164
Inventor 李明轩李峰杨慧婷邹振婉舒斐王斌
Owner ELECTRIC POWER SCI RES INST OF STATE GRID XINJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products