张昊, 杨晓林, 袁琪. 基于流量大数据的IP画像和异常行为检测算法研究[J]. 电力信息与通信技术, 2022, 20(7): 58-64. DOI: 10.16543/j.2095-641x.electric.power.ict.2022.07.008
引用本文: 张昊, 杨晓林, 袁琪. 基于流量大数据的IP画像和异常行为检测算法研究[J]. 电力信息与通信技术, 2022, 20(7): 58-64. DOI: 10.16543/j.2095-641x.electric.power.ict.2022.07.008
ZHANG Hao, YANG Xiaolin, YUAN Qi. Research on IP Profile and Abnormal Behavior Detection Algorithm Based on Traffic Big Data[J]. Electric Power Information and Communication Technology, 2022, 20(7): 58-64. DOI: 10.16543/j.2095-641x.electric.power.ict.2022.07.008
Citation: ZHANG Hao, YANG Xiaolin, YUAN Qi. Research on IP Profile and Abnormal Behavior Detection Algorithm Based on Traffic Big Data[J]. Electric Power Information and Communication Technology, 2022, 20(7): 58-64. DOI: 10.16543/j.2095-641x.electric.power.ict.2022.07.008

基于流量大数据的IP画像和异常行为检测算法研究

Research on IP Profile and Abnormal Behavior Detection Algorithm Based on Traffic Big Data

  • 摘要: 当前的网络信息安全监测防护工作大多依靠安全设备监测访问请求的特征值开展防护。该模式存在特征库滞后、覆盖面不足等缺点。针对当前防护模式的不足,文章提出一种基于流量大数据的IP画像和异常检测算法,针对网络访问流量的原始数据进行提取分析,覆盖网段内所有类型的设备监测,通过IP画像和聚类算法提供对未知威胁的检测和前瞻性防护策略。以某供电公司内网边界出口流量为数据集,有效排查出存在异常访问设备,通过算法的交叉验证以及对设备的现场排查,确认了与实际情况的符合度,验证了算法的有效性。

     

    Abstract: Current network information security monitoring and protection work mostly relies on security equipment to monitor the characteristic values of access requests for protection. This model has shortcomings such as lagging feature library and insufficient coverage. This paper proposes an IP profile and anomaly detection algorithm based on traffic big data, extracts and analyzes the original data of network access traffic, covers all types of equipment monitoring in the network segment, and provides information on unknown threats through IP profile and clustering algorithms, detection and proactive protection strategy. This paper uses the intranet boundary traffic of a power supply company as a data set to effectively find out the abnormal access equipment. Through the cross-validation of the algorithm and the on-site inspection of the equipment, the compliance with the actual situation is confirmed and the validity of the algorithm is verified.

     

/

返回文章
返回