期刊文献+

基于Petri网的TCP协议异常检测模型 被引量:4

Anomaly Detection Model Based on Petri Net for TCP Protocol
下载PDF
导出
摘要 从面向连接的角度出发,以Petri网为工具,建立了TCP协议异常检测模型.该模型以TCP协议的状态变迁图为基础,并根据协议规范可对传输报文的标志位进行系统的分析,从而识别出标志位非法组合构成的畸形报文(FIN-RST报文).模型中规定了各种状态下可接收的标志位集合,同时还细化了各状态下的超时异常,据此可准确地检测出各种异常,以抵御已知和未知的非法行为.利用该模型不仅可发现已知异常事件,还可对未知漏洞进行防范.通过实验发现,网络中的错误标志位报文、端口扫描以及DOS攻击产生的异常流量将占到总流量的10%以上. Based on Petri net, a connection oriented TCP protocol anomaly detection model was established. Based on TCP state transition diagram, the flag bits of packets were systemically analyzed according to TCP protocol specification. So the malformed packets, which abnormally formed by flag bits, such as FIN-RST packets can be identified. The receivable flag bit set of each state in the model was defined, meanwhile the timeout anomaly of each state was refined, by which varied anomaly can be detected accurately so as to defend the known and unknown abnormal behaviors. With the detection model, not only the known anomalies can be discovered, but also can it protect from unknown attacks. Experimental results show that the quantity of anomalies generated by packets with malformed flag, port scans and DOS attacks will occupy more than 10 percent of the total traffic in networks.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2006年第6期659-662,共4页 Journal of Xi'an Jiaotong University
基金 国家信息化计算机网络与信息安全基金资助项目(2001-研1-010)
关键词 协议异常检测 状态变迁图 协议规范 标志位 protocol anomaly detection state transition diagram protocol specification flag bit
  • 相关文献

参考文献6

  • 1Yoo I S.Protocol anomaly detection and verification[A].2004 IEEE Workshop on Information Assurance and Security,New York,2004.
  • 2Ultes-NitscheU,Yoo I S.Run-time protocolconformance verification in firewalls[A].4th Annual ISSA 2004 IT Security Conference,Johannesburg,South Africa,2004.
  • 3Yoo I S,Ultes-Nitsche U.Towards run-time protocol anomaly detection and verification[A].1st International Conference on E-Business and Telecommunication Networks,Setubal,Portugal,2004.
  • 4Sekar R,Gupta A,Frullo J,et al.Specification-based anomaly detection:a new approach for detecting network intrusions[A].9th ACM Conference on Computer and Communications Security,Washington DC,2002.
  • 5Paxson V.Automated packet trace analysis of TCP implementations[A].Proceedings of the ACM SIGCOMM Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications[C].Cannes,France:ACM Press,1997.167-179.
  • 6Stevens W R.TCP/IP illustrated,volume 1:the protocols[M].Indianapolis,USA:Addison Wesley,1994.

同被引文献49

  • 1李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3ROSENBERG J, WEINBERGER J, HUITEMA C, et al. STUN - simple traversal of user datagram protocol (UDP) through network address translators (NATs), RFC 3489[R]. Reston, VA, USA: Internet Society. IETF, 2003.
  • 4ROSENBERG J, MAHY R, HUTIEMA C, et al. Traversal using relay NAT (TURN), draft-rosenbergmidcom-turn-08[R]. Reston, VA, USA: Internet So ciety. IETF, 2006.
  • 5ROSENBERG J. Interactive connectivity establishment (ICE): a methodology for network address translator (NAT) traversal for offer/answer protocols, draft-ietfmmusic ice - 15 [R]. Reston, VA, USA: Internet Society. IETF, 2007.
  • 6PAN Jianli, CHEN Shanzhi. A mobile IPv6 firewall traversal scheme integrating with AAA[C]// 2006 In ternational Conference on Wireless Communications, Networking and Mobile Compuling. Piscataway, NJ, USA: IEEE, 2007:414-420.
  • 7MIHAI A, CERNAIANU D O. NAT/firewall traversal for SIP: issues and solutions[C]//Proceedings of International Symposium on Signals. Circuils and Systems. Piscataway, NJ, USA.. IEEE,2005: 521-524.
  • 8FU Xiaoming, TSCHOFENIG H. HOGREFE D. Be yond QoS signaling: a new generic IP signaling framework [J]. Computer Networks, 2006, 50(17) : 3416-3433.
  • 9HANCOCK R, KARAGIANNIS G. LOUGHNEY J,et al. Next steps in signaling (NSIS): framework, IETF RFC 4080 [R]. Reston, VA, USA: Internet Sociely. IETF, 2005.
  • 10SCHUI.ZRINNE H, COI.UMBIA U, HANCOCK R, et al. GIST: general internet signalling transport [EB/ OL]. [2008-06-10]. http://www. ietf. org/internetdrafts/draft-ietf-nsis-ntlp-15. txt.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部