CN101986609A - Method and system for realizing network flow cleaning - Google Patents

Method and system for realizing network flow cleaning Download PDF

Info

Publication number
CN101986609A
CN101986609A CN2009100901327A CN200910090132A CN101986609A CN 101986609 A CN101986609 A CN 101986609A CN 2009100901327 A CN2009100901327 A CN 2009100901327A CN 200910090132 A CN200910090132 A CN 200910090132A CN 101986609 A CN101986609 A CN 101986609A
Authority
CN
China
Prior art keywords
network traffics
equipment
template
dfi
flow detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100901327A
Other languages
Chinese (zh)
Inventor
杨波
宋晓丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2009100901327A priority Critical patent/CN101986609A/en
Priority to PCT/CN2010/072585 priority patent/WO2011012004A1/en
Publication of CN101986609A publication Critical patent/CN101986609A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for realizing network flow cleaning. In the scheme adopted by the invention, data field identifier (DFI) equipment detects network flow according to a flow detection template and transmits suspicious network flow to data processing installation (DPI) equipment; and the DPI equipment detects the suspicious network flow according to an identification template and cleans abnormal network flow according to a control policy. In the scheme adopted by the invention, DFI technology and DPI technology are combined, the contradiction between the completeness of the detection and cleaning efficiency in the network flow cleaning is well solved, the detection efficiency and accuracy are both taken into consideration, the network flow cleaning needs of mass data can be satisfied, and the network flow cleaning efficiency is improved considerably.

Description

A kind of method and system that realize that network traffics are cleaned
Technical field
The present invention relates to computer networking technology, be meant a kind of method and system that realize that network traffics are cleaned especially.
Background technology
Fast development along with Internet service kind and traffic carrying capacity; junk traffic in the network is not (as having in all senses or the flow of use; or the flow of malicious attack) also increasing gradually; bearer network more and more can't bear the heavy load; occur congested through regular meeting; the situation of bandwidth deficiency; a very important reason that causes this situation to occur is exactly to have a lot of unusual network traffics in the network; network traffics as malicious attack; unauthorized network traffics; illegal point-to-point (P2P; Peer-to-Peer) network traffics etc.; at this moment, unusual network traffics are cleaned just become a very important processing operation.At present, packet-by-packet the network traffics cleaning way of Jian Ceing is all very high to the requirement of communication system and checkout equipment, and treatment effeciency is lower, yet, clean at network traffics be very large, therefore, the existing network traffics cleaning way network traffics that at all can't satisfy big flow application occasions such as backbone network are cleaned needs.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method and system that realize that network traffics are cleaned, and effectively improves the network traffics cleaning efficiency.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method that realizes that network traffics are cleaned, this method comprises:
Deep stream detects DFI equipment and according to the flow detection template network traffics is detected, and detects DPI equipment to deep message and sends suspicious network traffics;
DPI equipment detects suspicious network traffics according to recognition template, cleans unusual network traffics according to control strategy.
This method also comprises:
Control centre issues the flow detection template of setting to DFI equipment, and DFI equipment is stored the flow detection template of receiving; And/or,
Control centre issues the recognition template and the control strategy of setting to DPI equipment, and DPI equipment is stored recognition template and the control strategy received.
Described DFI equipment also comprises after according to the flow detection template network traffics being detected: DFI equipment injects transmission link with normal network traffics and transmits; And/or,
Described DPI equipment also comprises after according to recognition template suspicious network traffics being detected: DPI equipment injects transmission link with normal network traffics and transmits.
Describedly network traffics are detected, comprising: the feature of network traffics and the flow detection template of storage are compared, when determining the feature abnormalities of network traffics, determine that the map network flow is suspicious network traffics according to the flow detection template.
Describedly according to recognition template suspicious network traffics are detected, comprising: according to recognition template suspicious network traffics are carried out deep message and detect, the concrete application of recognition network flow determines whether network traffics are unusual.
A kind of system that realizes that network traffics are cleaned comprises:
DFI equipment is used for according to the flow detection template network traffics being detected, and sends suspicious network traffics to DPI equipment;
DPI equipment is used for according to recognition template suspicious network traffics being detected, and cleans unusual network traffics according to control strategy.
Described system further comprises: control centre is used for issuing to DFI equipment the flow detection template of setting; And/or, be used for issuing the recognition template and the control strategy of setting to DPI equipment.
Described flow detection template or described recognition template are: the static setting, or according to current required dynamically arranging.
Described DFI equipment is used for that also normal network traffics are injected transmission link to be transmitted; And/or described DPI equipment is used for that also normal network traffics are injected transmission link to be transmitted.
Among the present invention program, the DFI technology is combined with the DPI technology, thereby the integrality of detection during network traffics are cleaned and the contradiction between the cleaning efficiency have been solved well, and detection efficiency and accuracy have been taken into account, network traffics that can the satisfying magnanimity data are cleaned to be needed, and has improved the network traffics cleaning efficiency greatly.
In addition, flow detection template related among the present invention program can be identical with existing flow detection template, therefore the present invention program does not need the flow detection template of frequently upgrading in the relevant realization of relevant flow detection template, greatly reduces the maintenance cost that network traffics are cleaned.
Description of drawings
Fig. 1 is for realizing the system configuration schematic diagram that network traffics are cleaned among the present invention;
Fig. 2 is for realizing the schematic flow sheet that network traffics are cleaned among the present invention.
Embodiment
Deep message detects (DPI, Deep Packet Inspection) technology and deep stream detection (DFI, Deep Flow Inspection) technology is two kinds of main modes that unusual network traffics are discerned.Wherein, the DPI technology has increased the analysis to application layer on the basis of analyzing packet header, be a kind of flow detection and control technology based on application layer; The loaded matching of carrying out application layer with the DPI technology is different, and what the DFI technology adopted is a kind of application recognition technology based on the flow behavior, and the state that promptly different application types is embodied on session connection or the data flow is had nothing in common with each other.
For example, the feature that IP flow in the network is embodied on the stream mode is just very obvious: RTP (RTP, Real-time Transport Protocol) Liu bag appearance is to fixing, generally in 130 to 220 bytes (byte), it is lower to connect speed, be 20 to 84 kilobits per seconds (Kbit/s), session persistence is longer relatively simultaneously; And based on the characteristics of the network traffics of P2P down load application be average packet long all more than 450byte, download time is long, connect the speed height, first-selected transport layer protocol is a transmission control protocol (TCP, Transmission Control Protocol) etc.
The DFI technology just is being based on the feature of this serial flow behavior, set up the traffic characteristic model, be the flow detection template, compare by length of data package, the connection speed of analysis session connection stream, information such as the interval flow detection template of transmitting between amount of bytes, the packet next and that set up, thus the discriminating of realization application type.
In view of above-mentioned DPI technology and DFI technology characteristics separately, among the present invention program the DFI technology is combined with the DPI technology, promptly DFI equipment detects network traffics according to the flow detection template, sends suspicious network traffics to DPI equipment; DPI equipment detects suspicious network traffics according to recognition template, cleans unusual network traffics according to control strategy, improves the network traffics cleaning efficiency greatly.
Fig. 1 is for realizing the system configuration schematic diagram that network traffics are cleaned among the present invention, as shown in Figure 1, this system comprises: DFI equipment and DPI equipment, wherein, DFI equipment is used for according to the flow detection template network traffics being detected, and sends suspicious network traffics to DPI equipment; DPI equipment is used for according to recognition template suspicious network traffics being detected, and cleans unusual network traffics according to control strategy.
DFI equipment is used for that also normal network traffics are injected transmission link to be transmitted.DPI equipment is used for that also normal network traffics are injected transmission link to be transmitted.
This system may further include: control centre is used for issuing to DFI equipment the flow detection template of setting; Also be used for issuing the recognition template and the control strategy of setting to DPI equipment.The flow detection template that control centre issues, recognition template, control strategy can be initial static settings, also can be according to current required dynamically arranging.
The schematic flow sheet that Fig. 2 cleans for realization network traffics among the present invention, as shown in Figure 2,
Step 201: control centre issues the flow detection template of setting to DFI equipment, and DFI equipment is stored the flow detection template of receiving.
Step 202: control centre issues the recognition template and the control strategy of setting to DPI equipment, and DPI equipment is stored recognition template and the control strategy received.
Step 201 and step 202 do not have tangible time sequencing on carrying out.
Step 203~step 204:DFI equipment detects network traffics according to the flow detection template, judge whether network traffics are unusual,, show that then network traffics may be unusual if unusual, determine that network traffics are suspicious network traffics, continue execution in step 205; If not unusual, then normal network traffics injected transmission link and transmit.
When in the network transfer of data being arranged, the network traffics that DFI equipment will need to detect are directed to self, to carry out flow detection.It is that the feature of network traffics and the flow detection template of storage are compared that DFI equipment adopts the DFI technology to carry out flow detection, and processing speed is very fast.Flow detection template related among the present invention program can be identical with existing flow detection template, therefore the present invention program does not need the flow detection template of frequently upgrading in the relevant realization of relevant flow detection template, greatly reduces the maintenance cost that network traffics are cleaned.
DFI equipment judges whether unusual concrete processing is that network traffics and flow detection template are compared to network traffics, whether the feature that promptly can determine network traffics is unusual, if determine that the feature of network traffics is normal, then network traffics injected transmission link and transmit; If determine the feature abnormalities of network traffics, show that then network traffics may be unusual, determine that network traffics are suspicious network traffics, send to DPI equipment with suspicious network traffics, carry out deep message by DPI equipment and detect, further discern unusual network traffics particularly.
Step 205:DFI equipment sends suspicious network traffics to DPI equipment, carries out deep message by DPI equipment and detects.
Step 206:DPI equipment detects the suspicious network traffics of receiving according to recognition template, determine exception of network traffic after, according to control strategy unusual network traffics are carried out clean.
DPI equipment carries out deep message according to recognition template to suspicious network traffics and detects, the accurately concrete application of recognition network flow, thereby determine whether network traffics unusual, determine exception of network traffic after, according to control strategy the unusual network traffics that identify are carried out clean.The unusual network traffics that DPI equipment is determined are the unusual network traffics that finally obtain according to the present invention program.For example, DPI equipment determines that according to recognition template the source of network traffics is the disabled user, determines that therefore the map network flow is unusual network traffics, directly tackles the map network flow, thereby the map network flow can not transmitted in transmission link; And for example, DPI equipment determines that according to recognition template network traffics are the information of a large amount of empty contents, determines that therefore the map network flow is unusual network traffics, directly tackles the map network flow, thereby the map network flow can not transmitted in transmission link.
Step 207:DPI equipment injects transmission link with normal network traffics and transmits, and finishes whole abnormal flow cleaning process.Here said normal network traffics can be to carry out resulting normal network traffics after the clean.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (9)

1. method that realizes that network traffics are cleaned is characterized in that this method comprises:
Deep stream detects DFI equipment and according to the flow detection template network traffics is detected, and detects DPI equipment to deep message and sends suspicious network traffics;
DPI equipment detects suspicious network traffics according to recognition template, cleans unusual network traffics according to control strategy.
2. method according to claim 1 is characterized in that, this method also comprises:
Control centre issues the flow detection template of setting to DFI equipment, and DFI equipment is stored the flow detection template of receiving; And/or,
Control centre issues the recognition template and the control strategy of setting to DPI equipment, and DPI equipment is stored recognition template and the control strategy received.
3. method according to claim 1 and 2 is characterized in that,
Described DFI equipment also comprises after according to the flow detection template network traffics being detected: DFI equipment injects transmission link with normal network traffics and transmits; And/or,
Described DPI equipment also comprises after according to recognition template suspicious network traffics being detected: DPI equipment injects transmission link with normal network traffics and transmits.
4. method according to claim 1 and 2, it is characterized in that, describedly network traffics are detected according to the flow detection template, comprise: the feature of network traffics and the flow detection template of storage are compared, when determining the feature abnormalities of network traffics, determine that the map network flow is suspicious network traffics.
5. method according to claim 1 and 2, it is characterized in that, describedly suspicious network traffics are detected, comprising: according to recognition template suspicious network traffics are carried out deep message and detect according to recognition template, the concrete application of recognition network flow determines whether network traffics are unusual.
6. a system that realizes that network traffics are cleaned is characterized in that, comprising:
DFI equipment is used for according to the flow detection template network traffics being detected, and sends suspicious network traffics to DPI equipment;
DPI equipment is used for according to recognition template suspicious network traffics being detected, and cleans unusual network traffics according to control strategy.
7. system according to claim 6 is characterized in that, described system further comprises: control centre,
Be used for issuing the flow detection template of setting to DFI equipment; And/or,
Be used for issuing the recognition template and the control strategy of setting to DPI equipment.
8. system according to claim 7 is characterized in that, described flow detection template or described recognition template are: the static setting, or according to current required dynamically arranging.
9. according to the arbitrary described system of claim 6 to 8, it is characterized in that,
Described DFI equipment is used for that also normal network traffics are injected transmission link to be transmitted; And/or,
Described DPI equipment is used for that also normal network traffics are injected transmission link to be transmitted.
CN2009100901327A 2009-07-29 2009-07-29 Method and system for realizing network flow cleaning Pending CN101986609A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009100901327A CN101986609A (en) 2009-07-29 2009-07-29 Method and system for realizing network flow cleaning
PCT/CN2010/072585 WO2011012004A1 (en) 2009-07-29 2010-05-10 Method and system for realizing network flow cleaning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100901327A CN101986609A (en) 2009-07-29 2009-07-29 Method and system for realizing network flow cleaning

Publications (1)

Publication Number Publication Date
CN101986609A true CN101986609A (en) 2011-03-16

Family

ID=43528738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100901327A Pending CN101986609A (en) 2009-07-29 2009-07-29 Method and system for realizing network flow cleaning

Country Status (2)

Country Link
CN (1) CN101986609A (en)
WO (1) WO2011012004A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166807A (en) * 2011-12-15 2013-06-19 中国电信股份有限公司 Analyzing and processing method and analyzing and processing system of traffic flow direction based on application
CN104243237A (en) * 2014-09-17 2014-12-24 杭州华三通信技术有限公司 P2P flow detection method and device
CN107819646A (en) * 2017-10-23 2018-03-20 国网冀北电力有限公司信息通信分公司 A kind of net flow assorted system and method for distributed transmission
CN111783804A (en) * 2019-04-04 2020-10-16 ***通信集团上海有限公司 Abnormal call bill determining method, device, equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320304B (en) * 2014-11-04 2017-11-28 武汉虹信技术服务有限责任公司 A kind of core network user flow application recognition methods of the multimode fusion easily extended
CN107302472A (en) * 2017-06-14 2017-10-27 苏州海加网络科技股份有限公司 Application Activity recognition method and system based on stream morphological feature

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060009775A (en) * 2004-07-26 2006-02-01 삼성전자주식회사 Apparatus and method for transmitting multimedia packet
WO2006063052A1 (en) * 2004-12-07 2006-06-15 Nortel Networks Limited Method and apparatus for network immunization
US20060268866A1 (en) * 2005-05-17 2006-11-30 Simon Lok Out-of-order superscalar IP packet analysis
CN101399749A (en) * 2007-09-27 2009-04-01 华为技术有限公司 Method, system and device for packet filtering
CN101488946A (en) * 2008-01-16 2009-07-22 华为技术有限公司 Packet detection method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090146838A1 (en) * 2007-12-09 2009-06-11 Daniel A. Katz Communication System for Data Acquisition from Remote Devices Applicable for AMR
CN101299724B (en) * 2008-07-04 2010-12-08 杭州华三通信技术有限公司 Method, system and equipment for cleaning traffic
CN101431449B (en) * 2008-11-04 2011-05-04 中国科学院计算技术研究所 Network flux cleaning system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060009775A (en) * 2004-07-26 2006-02-01 삼성전자주식회사 Apparatus and method for transmitting multimedia packet
WO2006063052A1 (en) * 2004-12-07 2006-06-15 Nortel Networks Limited Method and apparatus for network immunization
US20060268866A1 (en) * 2005-05-17 2006-11-30 Simon Lok Out-of-order superscalar IP packet analysis
CN101399749A (en) * 2007-09-27 2009-04-01 华为技术有限公司 Method, system and device for packet filtering
CN101488946A (en) * 2008-01-16 2009-07-22 华为技术有限公司 Packet detection method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103166807A (en) * 2011-12-15 2013-06-19 中国电信股份有限公司 Analyzing and processing method and analyzing and processing system of traffic flow direction based on application
CN104243237A (en) * 2014-09-17 2014-12-24 杭州华三通信技术有限公司 P2P flow detection method and device
CN104243237B (en) * 2014-09-17 2017-05-17 新华三技术有限公司 P2P flow detection method and device
CN107819646A (en) * 2017-10-23 2018-03-20 国网冀北电力有限公司信息通信分公司 A kind of net flow assorted system and method for distributed transmission
CN111783804A (en) * 2019-04-04 2020-10-16 ***通信集团上海有限公司 Abnormal call bill determining method, device, equipment and storage medium
CN111783804B (en) * 2019-04-04 2023-11-24 ***通信集团上海有限公司 Abnormal ticket determining method, device, equipment and storage medium

Also Published As

Publication number Publication date
WO2011012004A1 (en) 2011-02-03

Similar Documents

Publication Publication Date Title
EP2437456B1 (en) Method and system for realizing concurrent access of multi-kinds of bearer protocols on machine-to-machine (m2m) platform
CN101399749B (en) Method, system and device for packet filtering
CN100474819C (en) A deep message detection method, network device and system
CN101986609A (en) Method and system for realizing network flow cleaning
CN102084634B (en) Optimized selection of transmission protocol respecting thresholds
CN102055674B (en) Internet protocol (IP) message as well as information processing method and device based on same
CN101248628A (en) Network interface control program and network interface control device
CN103414725A (en) Method and device used for detecting and filtering data message
CN101953139A (en) DHCP initialization responsive to network layer connectivity
CN102082699A (en) P2P (peer-to-peer) protocol identification method on basis of active detection mode
CN101350764B (en) Network flow control method
JP2006279636A (en) Consistency guarantee management system for inter-client communication log
CN102209039A (en) Method and equipment for transmitting file
CN104580346B (en) Data transmission method and device
CN101350765A (en) Network flow detection method
EP2400389B1 (en) A method, a system, a server, a device, a computer program and a computer program product for transmitting data in a computer network
CN102130792A (en) Communication amount monitoring system
CN101841424A (en) EMS network management system and method based on SOCKS proxy connection
CN105703967B (en) Method and device for detecting connectivity of label switched path
CN101232406A (en) OAM fast detecting method, apparatus and system
JP2008048131A (en) P2p traffic monitoring and control system, and method therefor
CN107104892A (en) The method and apparatus of network acceleration
US8605612B2 (en) Method and apparatus for extracting QoS parameters in mobile device
CN102480503B (en) P2P (peer-to-peer) traffic identification method and P2P traffic identification device
CN108449280B (en) Method and device for avoiding ping-pong of TCP (Transmission control protocol) messages

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110316