[go: up one dir, main page]

CN117241274B - Communication method of self-adaptive networking - Google Patents

Communication method of self-adaptive networking Download PDF

Info

Publication number
CN117241274B
CN117241274B CN202311058108.1A CN202311058108A CN117241274B CN 117241274 B CN117241274 B CN 117241274B CN 202311058108 A CN202311058108 A CN 202311058108A CN 117241274 B CN117241274 B CN 117241274B
Authority
CN
China
Prior art keywords
threat detection
detection sensor
network threat
network
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311058108.1A
Other languages
Chinese (zh)
Other versions
CN117241274A (en
Inventor
王毅
王海
孙涛
任启
高阳
杨晟
赵欣硕
陈琳羽
陈振全
董晓蓉
王立新
于洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Zhangjiakou Power Supply Co of State Grid Jibei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Zhangjiakou Power Supply Co of State Grid Jibei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Zhangjiakou Power Supply Co of State Grid Jibei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202311058108.1A priority Critical patent/CN117241274B/en
Publication of CN117241274A publication Critical patent/CN117241274A/en
Application granted granted Critical
Publication of CN117241274B publication Critical patent/CN117241274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a communication method of a self-adaptive networking, which comprises the following steps: the network threat detection sensor host machine network behavior characteristic acquisition method is improved, and the host machine behavior characteristic acquisition method is suitable for host machine diversity of a target network; improving the network threat detection sensor network load initialization flow, and adopting port multiplexing to transmit internal communication information among network threat detection sensors and self-adaptive networking loads; improving the resource management of the network threat detection sensor, and optimizing the network threat detection sensor resource management group decomposition algorithm and the route selection algorithm; and constructing an optimized network threat detection sensor task cluster. The self-organizing property and the maneuverability of individual networking of the network threat detection sensor are met by using the minimum cost, the high safety and the high reliability as principle indexes and adopting a self-adapting networking method for statistical analysis of the network behavior of the network threat detection sensor host.

Description

一种自适应组网的通信方法A communication method for adaptive networking

技术领域Technical field

本发明涉及网络安全防护技术领域,尤其涉及一种自适应组网的通信方法。The present invention relates to the technical field of network security protection, and in particular to a communication method for adaptive networking.

背景技术Background technique

网络威胁检测传感器是一种部署在宿主机上,能够并自主开展相关安全威胁检测任务的软件。自适应组网是网络威胁检测传感器指挥控制及任务协作的关键环节,不仅关系到网络威胁检测传感器任务能否顺利执行,而且关系到网络威胁检测传感器个体生存的隐蔽性和安全性。The network threat detection sensor is a software deployed on the host computer that can and independently carry out relevant security threat detection tasks. Adaptive networking is a key link in the command, control and task collaboration of network threat detection sensors. It is not only related to the smooth execution of network threat detection sensor tasks, but also related to the concealment and security of the individual survival of network threat detection sensors.

(1)自适应组网是满足网络威胁检测传感器集群任务的基本要求(1) Adaptive networking is the basic requirement to meet the task of network threat detection sensor clusters

在非合作网络环境下执行任务,可以以单个个体的方式,也可以是以合作的方式。但是,任务的下达、执行及反馈的上传等必须通过协同的模式完成,这就需要每个网络威胁检测传感器都必须是集群任务组织的成员。网络威胁检测传感器个体成为集群任务成员的过程即是网络威胁检测传感器组网的过程,它是满足网络威胁检测传感器集群任务的最基本要求。Tasks can be performed in a non-cooperative network environment either individually or cooperatively. However, the assignment and execution of tasks and the uploading of feedback must be completed through a collaborative model, which requires that each network threat detection sensor must be a member of the cluster task organization. The process of an individual network threat detection sensor becoming a cluster task member is the process of network threat detection sensor networking, which is the most basic requirement to meet the network threat detection sensor cluster task.

(2)自适应组网不能影响生存状态(2) Adaptive networking cannot affect the living status

为在自适应组网过程中不能增加暴露的风险。必须在保障安全性前提下,以最小代价、高安全性、高可靠性为原则进行自适应安全组网。其中:This is because the risk of exposure cannot be increased during the adaptive networking process. Adaptive security networking must be carried out on the premise of ensuring security and based on the principles of minimum cost, high security, and high reliability. in:

最小代价是指自适应组网过程中网络威胁检测传感器应尽可能少地产生异常行为,防止被宿主机的安全检查机制发现,从而影响网络威胁检测传感器个体的存活,进而增加整个网络威胁检测传感器集群暴露的风险。The minimum cost means that the network threat detection sensor should produce as few abnormal behaviors as possible during the adaptive networking process to prevent it from being discovered by the host's security inspection mechanism, thus affecting the survival of individual network threat detection sensors and thereby increasing the number of the entire network threat detection sensor. Risks of cluster exposure.

高安全性是指自适应组网过程中需要协同的组网信息传输必须采用安全性高的方法,防止因为组网协同信息的泄露造成网络威胁检测传感器的暴露。High security means that the transmission of networking information that requires collaboration during the adaptive networking process must use high-security methods to prevent the exposure of network threat detection sensors due to the leakage of networking collaboration information.

高可靠性是指通过自适应组网必须构建可靠的任务集群,保证在组网状态下每个网络威胁检测传感器个体都具备接受控制并完成任务的能力。High reliability means that a reliable task cluster must be built through adaptive networking to ensure that each individual network threat detection sensor has the ability to accept control and complete tasks under the networking state.

(3)自适应组网应具备在非合作网络环境的动态适应性(3) Adaptive networking should have dynamic adaptability in non-cooperative network environments

依托非合作网络环境下宿主机生存,而宿主机是否开机、网络威胁检测传感器个体是否安全生存,都会对组网过程产生影响。而自适应组网应具备很强的动态适应性,灵活地根据网络威胁检测传感器的在线或存活状态调整组网策略,满足集群任务的组网需求。Relying on the host computer to survive in a non-cooperative network environment, whether the host computer is powered on and whether individual network threat detection sensors survive safely will have an impact on the networking process. Adaptive networking should have strong dynamic adaptability and flexibly adjust networking strategies based on the online or alive status of network threat detection sensors to meet the networking needs of cluster tasks.

发明内容Contents of the invention

鉴于上述问题,提出了本发明以便提供克服上述问题或者至少部分地解决上述问题的一种自适应组网的通信方法。In view of the above problems, the present invention is proposed to provide an adaptive networking communication method that overcomes the above problems or at least partially solves the above problems.

根据本发明的一个方面,提供了一种自适应组网的通信方法,所述通信方法包括:According to one aspect of the present invention, a communication method for adaptive networking is provided. The communication method includes:

改进网络威胁检测传感器宿主机网络行为特征采集方法,适应目标网络的主机多样性;Improve the collection method of network behavior characteristics of the network threat detection sensor host to adapt to the host diversity of the target network;

改进网络威胁检测传感器组网载荷初始化流程,采用端口复用传输网络威胁检测传感器自适应组网载荷间的内部通信信息;Improve the network threat detection sensor networking load initialization process and use port reuse to transmit internal communication information between network threat detection sensor adaptive networking loads;

改进网络威胁检测传感器资源管理,优化网络威胁检测传感器资源管理群分解算法和路由选取算法;构建优化的网络威胁检测传感器任务群簇。Improve network threat detection sensor resource management, optimize network threat detection sensor resource management group decomposition algorithm and routing selection algorithm; build optimized network threat detection sensor task clusters.

可选的,所述通过改进网络威胁检测传感器宿主机网络行为特征采集方法具体包括:Optionally, the method for collecting network behavior characteristics of the host computer by improving the network threat detection sensor specifically includes:

根据网络威胁检测传感器宿主机多网卡存在的情况,区分IP地址进行网络行为特征的采集,并增加对同一IP下端口使用情况及使用频率的采集;According to the presence of multiple network cards on the network threat detection sensor host, distinguish IP addresses to collect network behavior characteristics, and increase the collection of port usage and usage frequency under the same IP;

细化HTTP、SMTP协议流量的通信区间统计,按照正常工作流速分小时统计用户活跃时间段,提取若干个活跃时间段;Detail the communication interval statistics of HTTP and SMTP protocol traffic, count user active time periods hourly according to the normal work flow rate, and extract several active time periods;

实现对多网卡主机的特征统计支持,对某个通信IP的通信时间段按照24个区间统计,但统计结果不列入组网策略表,以文件形式存储在本地,供本地通信时参考。Implement feature statistics support for multi-network card hosts. The communication time period of a certain communication IP is counted according to 24 intervals. However, the statistical results are not included in the networking policy table and are stored locally in the form of files for reference during local communication.

可选的,所述改进后宿主机网络行为特征库定义:对于其网络行为特征库记为:Optionally, the improved host network behavior signature library definition: for Its network behavior feature library is recorded as:

其中:p≥n;NODEID为网络威胁检测传感器唯一标识,ipk代表与宿主机通信的主机k的IP地址,Fk代表与主机k的通信频率;Httpk为与主机k进行HTTP协议通信的通信时机及通信量;Smtpk为与主机k进行SMTP协议通信的通信时机及通信量,portk为在ipk地址上端口使用信息和使用频率信息。Among them: p≥n; NODEID is the unique identifier of the network threat detection sensor, ip k represents the IP address of host k communicating with the host machine, F k represents the communication frequency with host k; Http k represents the HTTP protocol communication with host k Communication timing and traffic volume; Smtp k is the communication timing and traffic volume for SMTP protocol communication with host k, port k is the port usage information and usage frequency information on the ip k address.

可选的,所述改进网络威胁检测传感器组网载荷初始化流程具体包括:Optionally, the improved network threat detection sensor networking load initialization process specifically includes:

以目标网络内符合服务器特点的宿主机做为网络威胁检测传感器簇头的选择对象,并构建网络威胁检测传感器管理体系,当网络威胁检测传感器进入目标网络后,检查宿主机是否满足服务器特征,如是否开启80、25端口,如果满足,则将标识为簇头节点,否则为普通节点;若普通节点网络威胁检测传感器生存过程中,发现无簇头节点,在后续维护自身组网特征表时,若发现同IP网段有簇头网络威胁检测传感器存在,主动将排序靠前的簇头节点标识为簇头节点。Use the host machine in the target network that meets the server characteristics as the selection target of the network threat detection sensor cluster head, and build a network threat detection sensor management system. When the network threat detection sensor enters the target network, check whether the host machine meets the server characteristics, such as Whether to open ports 80 and 25. If satisfied, it will be marked as a cluster head node, otherwise it will be an ordinary node; if an ordinary node finds no cluster head node during the survival process of the network threat detection sensor, when subsequently maintaining its own networking characteristic table, If it is found that there is a cluster head network threat detection sensor in the same IP network segment, the cluster head node with the highest ranking will be actively identified as the cluster head node.

可选的,所述采用端口复用传输网络威胁检测传感器自适应组网载荷间的内部通信信息具体包括:Optionally, the use of port multiplexing to transmit internal communication information between adaptive networking loads of network threat detection sensors specifically includes:

当在网络威胁检测传感器资源管理体系构建和维护的过程中,簇头节点与普通节点自适应组网载荷间的内部通信,包括组网策略表上报、任务分配信息,均需采用与宿主机网络行为特征匹配的端口复用技术进行传输。During the construction and maintenance of the network threat detection sensor resource management system, the internal communication between the cluster head node and the ordinary node adaptive networking load, including the reporting of the networking policy table and task allocation information, all need to be communicated with the host network. Port multiplexing technology matching behavioral characteristics for transmission.

可选的,所述改进网络威胁检测传感器资源管理,优化网络威胁检测传感器资源管理群分解算法和路由选取算法具体包括:Optionally, the improved network threat detection sensor resource management, optimized network threat detection sensor resource management group decomposition algorithm and routing selection algorithm specifically include:

当管理节点拥有的网络威胁检测传感器资源达到数量阈值时,启动网络威胁检测传感器资源分解流程:When the network threat detection sensor resources owned by the management node reach the quantity threshold, the network threat detection sensor resource decomposition process is started:

管理节点将备份管理节点选取为新的管理节点,新的管理节点从原管理节点中选取合适的节点作为管理资源,管理节点从管理资源当中去除新管理节点及新管理节点管理的网络威胁检测传感器资源;The management node selects the backup management node as the new management node. The new management node selects the appropriate node from the original management node as the management resource. The management node removes the new management node and the network threat detection sensor managed by the new management node from the management resources. resource;

管理节点和新的管理节点根据簇头选取算法补充备份管理节点,管理节点通知所属节点更新备份管理节点信息,所有的簇头和备份簇头均为目标网络中的服务器节点。The management nodes and new management nodes supplement the backup management nodes according to the cluster head selection algorithm. The management nodes notify their affiliated nodes to update the backup management node information. All cluster heads and backup cluster heads are server nodes in the target network.

可选的,所述改进后的网络威胁检测传感器管理体系中,簇头节点掌握网络威胁检测传感器资源最多的节点,对通信路由检索进行优化。Optionally, in the improved network threat detection sensor management system, the cluster head node controls the node with the most network threat detection sensor resources and optimizes communication route retrieval.

可选的,所述节点A首先在组网策略表中检查是否与节点B有直接通信,如果有,则返回路由信息节点A ID+节点B ID并退出;否则节点A向簇头节点A’申请检查是否能与节点B通信,若节点B存在于A’组网策略表中,则返回路由信息节点AID+节点A’ID+节点B ID;否则,节点A’按照组网策略表中的排序向能够在自己组网策略表查询到的所有簇头和备份簇头节点申请检查其是否能与节点B通信,若簇头或备份簇头节点C的组网策略表中存在节点B,则返回路由信息节点A ID+节点A’ID+节点C ID+节点B ID。Optionally, the node A first checks whether there is direct communication with the node B in the networking policy table. If so, it returns the routing information node A ID + node B ID and exits; otherwise, the node A applies to the cluster head node A'. Check whether it can communicate with node B. If node B exists in the networking policy table of A', return the routing information node AID + node A' ID + node B ID; otherwise, node A' will be able to communicate with it according to the sorting in the networking policy table. All cluster heads and backup cluster head nodes queried in the own networking policy table apply to check whether they can communicate with node B. If node B exists in the networking policy table of the cluster head or backup cluster head node C, the routing information is returned. Node A ID+Node A'ID+Node C ID+Node B ID.

可选的,所述构建网络威胁检测传感器任务群簇过程中,包括主动式任务群簇构建和被动式任务群簇构建;Optionally, the process of building a network threat detection sensor task cluster includes active task cluster construction and passive task cluster construction;

当网络威胁检测传感器资源不足时,向簇头或其它网络威胁检测传感器资源管理群申请网络威胁检测传感器资源;When network threat detection sensor resources are insufficient, apply for network threat detection sensor resources from the cluster head or other network threat detection sensor resource management groups;

在网络威胁检测传感器任务群簇构建过程中,当网络威胁检测传感器资源不足需要申请网络威胁检测传感器资源时,由于被申请资源的簇头宿主机拥有最大化的网络威胁检测传感器资源。During the construction process of the network threat detection sensor task cluster, when the network threat detection sensor resources are insufficient and it is necessary to apply for network threat detection sensor resources, the cluster head host for which the resources are applied has the maximum network threat detection sensor resources.

可选的,所述主动式任务群簇构建支持,网络威胁检测传感器A从所属网络威胁检测传感器资源中选择并通知合适的网络威胁检测传感器构建任务群簇,并创建任务群簇表;根据各个网络威胁检测传感器完成任务的反馈动态调整任务群簇中的网络威胁检测传感器资源;Optionally, the active task cluster construction supports that network threat detection sensor A selects and notifies appropriate network threat detection sensors from the network threat detection sensor resources to which it belongs to build task clusters, and creates a task cluster table; according to each The feedback of the network threat detection sensor completing the task dynamically adjusts the network threat detection sensor resources in the task cluster;

如某个网络威胁检测传感器无法执行任务或执行任务失败,则从任务群簇表中动态退出该网络威胁检测传感器,同时从剩余网络威胁检测传感器选择合适的网络威胁检测传感器动态加入任务群簇表;If a network threat detection sensor cannot perform a task or fails to perform a task, the network threat detection sensor is dynamically exited from the task cluster table, and at the same time, a suitable network threat detection sensor is selected from the remaining network threat detection sensors and dynamically added to the task cluster table. ;

如果任务群簇构建过程中,网络威胁检测传感器A的资源无法满足任务的需要,则向其它网络威胁检测传感器资源管理群申请资源;当A完成根据任务群簇中的各节点反馈,若任务已完成,则销毁任务群簇。If the resources of network threat detection sensor A cannot meet the needs of the task during the construction of the task cluster, it will apply for resources from other network threat detection sensor resource management groups; when A completes the task, according to the feedback from each node in the task cluster, if the task has When completed, the task cluster is destroyed.

可选的,所述若网络威胁检测传感器A的所属网络威胁检测传感器资源中拥有足够的网络威胁检测传感器资源,则直接选择并通知合适的网络威胁检测传感器构建任务群簇,并创建任务群簇表;Optionally, if there are sufficient network threat detection sensor resources in the network threat detection sensor resources to which network threat detection sensor A belongs, directly select and notify the appropriate network threat detection sensor to build a task cluster, and create a task cluster. surface;

否则,网络威胁检测传感器A向其簇头申请网络威胁检测传感器资源,由簇头将满足任务条件的网络威胁检测传感器资源返回给网络威胁检测传感器A,再由网络威胁检测传感器A通知选中的网络威胁检测传感器构建任务群簇,并创建任务群簇表;Otherwise, network threat detection sensor A applies to its cluster head for network threat detection sensor resources. The cluster head returns the network threat detection sensor resources that meet the task conditions to network threat detection sensor A, and then network threat detection sensor A notifies the selected network. Threat detection sensors build task clusters and create task cluster tables;

网络威胁检测传感器A根据各个网络威胁检测传感器完成任务的反馈动态调整任务群簇中的网络威胁检测传感器资源;Network threat detection sensor A dynamically adjusts the network threat detection sensor resources in the task cluster based on the feedback of each network threat detection sensor completing the task;

如某个网络威胁检测传感器无法执行任务或执行任务失败,则从任务群簇表中动态退出网络威胁检测传感器,同时从剩余网络威胁检测传感器选择合适的网络威胁检测传感器动态加入任务群簇表。If a network threat detection sensor cannot perform a task or fails to perform a task, the network threat detection sensor is dynamically exited from the task cluster table, and at the same time, a suitable network threat detection sensor is selected from the remaining network threat detection sensors and dynamically added to the task cluster table.

可选的,所述被动式任务群簇构建支持;Optionally, the passive task cluster construction support;

被动式任务群簇管理依赖的任务不是自己产生,而是由上级节点下达的,称为有中心的任务群簇管理,也包括任务群簇的生成、群簇的合并和群簇的销毁;Passive task cluster management relies on tasks that are not generated by themselves, but are issued by superior nodes. This is called central task cluster management, which also includes the generation of task clusters, the merging of clusters, and the destruction of clusters;

被动式任务群簇生成、合并和销毁等都由簇头进行管理。The generation, merging and destruction of passive task group clusters are all managed by the cluster head.

本发明提供的一种自适应组网的通信方法,所述通信方法包括:改进网络威胁检测传感器宿主机网络行为特征采集方法,适应目标网络的主机多样性;改进网络威胁检测传感器组网载荷初始化流程,采用端口复用传输网络威胁检测传感器自适应组网载荷间的内部通信信息;改进网络威胁检测传感器资源管理,优化网络威胁检测传感器资源管理群分解算法和路由选取算法;构建优化的网络威胁检测传感器任务群簇。以最小代价、高安全性、高可靠性为原则指标,通过对网络威胁检测传感器宿主机网络行为统计分析的自适应组网方法,满足网络威胁检测传感器个体组网的自组性和机动性。The invention provides an adaptive networking communication method. The communication method includes: improving the network behavior characteristic collection method of the network threat detection sensor host to adapt to the host diversity of the target network; improving the network threat detection sensor network load initialization The process uses port reuse to transmit internal communication information between network threat detection sensor adaptive networking loads; improve network threat detection sensor resource management, optimize network threat detection sensor resource management group decomposition algorithm and routing selection algorithm; build optimized network threat Detect sensor task clusters. Taking the minimum cost, high security and high reliability as the principle indicators, through the adaptive networking method of statistical analysis of the network behavior of the network threat detection sensor host, the self-organization and mobility of the individual network threat detection sensor network are satisfied.

上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention. In order to have a clearer understanding of the technical means of the present invention, they can be implemented according to the content of the description, and in order to make the above and other objects, features and advantages of the present invention more obvious and understandable. , the specific embodiments of the present invention are listed below.

附图说明Description of the drawings

为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to explain the technical solutions of the embodiments of the present invention more clearly, the drawings needed to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. Those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts.

图1为本发明实施例提供的自适应组网过程和步骤流程图;Figure 1 is a flow chart of the adaptive networking process and steps provided by the embodiment of the present invention;

图2为本发明实施例提供的组网载荷初始化改进流程图;Figure 2 is an improved flow chart of networking load initialization provided by an embodiment of the present invention;

图3为本发明实施例提供的网络威胁检测传感器资源分解优化流程图;Figure 3 is a flow chart of network threat detection sensor resource decomposition and optimization provided by an embodiment of the present invention;

图4为本发明实施例提供的网络威胁检测传感器通信安全路由决策优化示意图。Figure 4 is a schematic diagram of optimization of network threat detection sensor communication security routing decisions provided by an embodiment of the present invention.

具体实施方式Detailed ways

下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be implemented in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided to provide a thorough understanding of the disclosure, and to fully convey the scope of the disclosure to those skilled in the art.

本发明的说明书实施例和权利要求书及附图中的术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元。The terms "comprising" and "having" and any variations thereof in the description, claims and drawings of the present invention are intended to cover non-exclusive inclusion, for example, the inclusion of a series of steps or units.

下面结合附图和实施例,对本发明的技术方案做进一步的详细描述。The technical solution of the present invention will be described in further detail below with reference to the accompanying drawings and examples.

实施例1Example 1

如图1所示,一种自适应组网的通信方法,包括:As shown in Figure 1, an adaptive networking communication method includes:

S01:统计分析网络威胁检测传感器个体宿主机的网络行为,获取宿主机网络行为的特征,构造宿主机的网络行为特征库,主要包括:主要通信IP地址、通信频率、通信时间段、通信时长、通信业务类型、通信流量大小等,并按照通信频率进行排序。S01: Statistically analyze the network behavior of individual hosts of the network threat detection sensor, obtain the characteristics of the host network behavior, and construct the network behavior feature library of the host, which mainly includes: main communication IP address, communication frequency, communication time period, communication duration, Communication service type, communication traffic size, etc., and sorted according to communication frequency.

S02:网络威胁检测传感器个体依据宿主机网络行为特征库,检查自身继承的组网策略表(能够组网的网络威胁检测传感器个体列表)中的网络威胁检测传感器个体对象宿主机是否是本个体宿主机经常正常通信的对象,有以下2种处理方式:S02: Based on the host network behavior signature library, the network threat detection sensor individual checks whether the network threat detection sensor individual object host in the networking policy table it inherits (the list of network threat detection sensor individuals that can be networked) is the host of this individual. Objects that the host communicates with normally can be handled in the following two ways:

S02-1:不在本个体宿主机的网络行为特征库中,网络威胁检测传感器个体对象不作为日常隐蔽通信的对象,目的是不产生异常的通信流量,减少网络威胁检测传感器暴露的风险,并且在组网策略表中将其下移。S02-1: The individual object of the network threat detection sensor is not included in the network behavior signature library of this individual host and is not used as the object of daily covert communication. The purpose is not to generate abnormal communication traffic and reduce the risk of exposure of the network threat detection sensor, and in Move it down in the networking policy table.

S02-2:存在宿主机制网络行为特征库中,在组网策略表中根据与宿主机的通信频率、通信流量大小等进行排序,并且在日常隐蔽通信时选择排序靠前的网络威胁检测传感器个体对象进行通信,尽量不选择排序靠后的网络威胁检测传感器个体对象通信。S02-2: There is a host mechanism network behavior signature database, which is sorted in the networking policy table according to the frequency of communication with the host, the size of the communication traffic, etc., and the top-ranked network threat detection sensor individuals are selected for daily covert communication. To communicate with objects, try not to choose lower-ranked network threat detection sensors to communicate with individual objects.

如图2所示,组网载荷初始化改进的方法流程;As shown in Figure 2, the method flow of improved network load initialization is shown;

S03:网络威胁检测传感器个体依据宿主机网络行为特征库,在排除组网策略表中的所有通信对象后,侦察宿主机剩余的、排序靠前的网络行为对象中是否存在有网络威胁检测传感器个体存在,如果存在将其添加到组网策略表中并排序。S03: Based on the host network behavior signature database, the network threat detection sensor individual detects whether there is an individual network threat detection sensor among the remaining top-ranked network behavior objects of the host after excluding all communication objects in the networking policy table. If it exists, add it to the networking policy table and sort it.

S04:网络威胁检测传感器个体按照一定的频率向指控中心发送组网策略表中更新的内容。S04: The individual network threat detection sensor sends the updated content in the networking policy table to the command center at a certain frequency.

S05:网络威胁检测传感器个体按照组网策略表,在平时状态下,选择排名靠前的网络威胁检测传感器个体对象进行通信,为了保证通信的可靠性,可一次选择两至三个对象通信;在任务状态及特殊情况下,根据“指挥节点”协同指令可与组网策略表中任一网络威胁检测传感器个体对象组网和通信。S05: According to the networking policy table, individual network threat detection sensors select top-ranked individual network threat detection sensor objects for communication under normal conditions. In order to ensure the reliability of communication, two to three objects can be selected for communication at a time; Under mission status and special circumstances, according to the "Command Node" collaborative instructions, it can network and communicate with any individual object of the network threat detection sensor in the networking policy table.

S06:在网络威胁检测传感器完成组网策略表以后,为了更好的适应任务的需求,需要形成任务群簇。指控中心先对任务进行规划,然后下达任务命令,接到任务的网络威胁检测传感器首先形成任务群簇,这样才能协同控制地完成任务。根据前期对网络威胁检测传感器集群任务体系结构的研究,RC-chord协议可以用于资源的查询和集群的构建,因此,在任务命令下达后,网络威胁检测传感器迅速通过制定好的协议自适应的形成任务群簇。如图3所示,网络威胁检测传感器资源分解优化的流程图。S06: After the network threat detection sensor completes the networking policy table, in order to better adapt to the needs of the task, a task cluster needs to be formed. The command center first plans the mission and then issues the mission order. The network threat detection sensors that receive the mission first form a mission cluster so that the mission can be completed under coordinated control. According to the previous research on the task architecture of the network threat detection sensor cluster, the RC-chord protocol can be used for resource query and cluster construction. Therefore, after the task command is issued, the network threat detection sensor quickly adapts through the developed protocol. Form task clusters. As shown in Figure 3, the flow chart of network threat detection sensor resource decomposition and optimization.

S05-1:首先要形成网络威胁检测传感器的集群任务体系结构。网络威胁检测传感器集群的形成先要选出一个或多个超级节点,超级节点在初始阶段负责整个网络所有处理,假设初始阶段只有两个节点,则选出一个节点作为超级节点,节点和超级节点分别添加自己的路由信息,此时网络的最基本结构已经形成。节点向超级节点发送组网请求,超级节点负责节点的注册并通知相应节点更新路由信息,随着节点的加入,集群内节点达到一定数量时,第二次集群开始创建,按照上述过程,分别创建下一层集群,此时,网络威胁检测传感器集群任务体系结构组建基本完成。如图4所示,网络威胁检测传感器通信安全路由决策优化示意图。S05-1: First, we must form a cluster task architecture for network threat detection sensors. The formation of a network threat detection sensor cluster must first select one or more super nodes. The super node is responsible for all processing of the entire network in the initial stage. Assuming that there are only two nodes in the initial stage, one node is selected as the super node. The node and the super node Add your own routing information respectively. At this time, the most basic structure of the network has been formed. The node sends a networking request to the super node. The super node is responsible for registering the node and notifying the corresponding node to update the routing information. With the addition of nodes, when the number of nodes in the cluster reaches a certain number, the second cluster begins to be created. According to the above process, each node is created separately. Next-level cluster, at this time, the network threat detection sensor cluster task architecture is basically completed. As shown in Figure 4, a schematic diagram of network threat detection sensor communication security routing decision optimization.

S05-2:任务群簇的形成有2种方式:S05-2: There are two ways to form task clusters:

第一种:指控中心根据任务规划方案指定网络威胁检测传感器任务群簇超级节点和普通节点,由群簇超级节点按照群簇构成方案调用群簇构建算法实现群簇的创建和管理。The first type: the command center designates network threat detection sensor task cluster super nodes and ordinary nodes according to the mission planning plan, and the cluster super node calls the cluster construction algorithm according to the cluster composition plan to realize the creation and management of clusters.

第二种:指挥中心只下达任务并指定网络威胁检测传感器群簇超级节点,由指定的网络威胁检测传感器超级节点自适应的根据任务和自适应组网模块提供的组网策略表信息,选择较为安全的网络威胁检测传感器节点,调用群簇构建算法实现群簇的创建和管理。The second type: the command center only assigns tasks and designates network threat detection sensor cluster super nodes. The designated network threat detection sensor super nodes adaptively select the network policy table information provided by the tasks and the adaptive networking module. Secure network threat detection sensor nodes call the cluster construction algorithm to realize the creation and management of clusters.

S05-3:本发明采用基于改进的RC-Chord(Resource ClusteredChord)算法实现网络威胁检测传感器群簇的创建和管理。RC-Chord是对Chord协议的一种扩展,它结合HP2P结构解决大规模系统中的联合编队问题。RC-Chord算法具有把层次结构扩展为任意数量层次的能力,每层由一个或多个集群构成,每个集群是一个独立的Chord实例。在RC-chord中,集群组织方式类似于一棵树,集群网络的构建是至上而下的,最高层集群叫做超级集群,每个集群可以拥有的子集群数量由分支系数决定。每个任务群簇都有一个超级节点,超级节点负责管理群簇内的节点和与指控中心进行通信,指控中心管理超级节点。由于网络的动态性,节点可能退出任务群簇或失效,任务群簇也可能分裂或合并,任务群簇节点调用改进的RC-Chord算法实现网络威胁检测传感器群簇的动态管理。为了保证任务的完成,采用相应的容错机制(构建备用超级节点),实现群簇的管理,每个任务群簇有一个超级节点和一个备用超级节点,在任务协同执行过程中,普通节点向超级节点发送的请求信息在一定时间内没有收到响应,则判定超级节点是否失效,若失效立刻启动备用超级节点。在任务完成之后,超级节点负责解散任务群簇。S05-3: This invention uses an improved RC-Chord (Resource ClusteredChord) algorithm to realize the creation and management of network threat detection sensor clusters. RC-Chord is an extension of the Chord protocol, which combines the HP2P structure to solve the joint formation problem in large-scale systems. The RC-Chord algorithm has the ability to expand the hierarchical structure to any number of levels. Each level is composed of one or more clusters, and each cluster is an independent Chord instance. In RC-chord, the cluster organization is similar to a tree. The cluster network is constructed from top to bottom. The highest-level cluster is called a super cluster. The number of sub-clusters each cluster can have is determined by the branch coefficient. Each task cluster has a super node. The super node is responsible for managing the nodes in the cluster and communicating with the command center. The command center manages the super node. Due to the dynamic nature of the network, nodes may exit the task cluster or fail, and task clusters may also split or merge. Task cluster nodes call the improved RC-Chord algorithm to implement dynamic management of network threat detection sensor clusters. In order to ensure the completion of the task, a corresponding fault-tolerant mechanism (building a backup super node) is adopted to realize the management of the cluster. Each task cluster has a super node and a backup super node. During the collaborative execution of tasks, ordinary nodes transfer to the super node. If the request information sent by the node does not receive a response within a certain period of time, it will be determined whether the super node has failed. If it fails, the backup super node will be started immediately. After the task is completed, the super node is responsible for disbanding the task cluster.

为了更好的适应集群任务体系结构,集群分裂算法的具体过程和步骤为:In order to better adapt to the cluster task architecture, the specific process and steps of the cluster split algorithm are:

S05-3-1:当集群内节点数目超过上限时,集群的主超级节点从超级节点中选出一半的备选超级节点作为新集群的超级节点,并选出一个主超级节点。选举的原则是主超级节点根据本集群的资源类型,尽可能将资源类型均匀分配,使得分裂后的两个集群拥有的节点数目和资源类型尽可能均衡。S05-3-1: When the number of nodes in the cluster exceeds the upper limit, the main super node of the cluster selects half of the candidate super nodes from the super nodes as the super nodes of the new cluster, and selects a main super node. The principle of election is that the main super node distributes resource types as evenly as possible according to the resource types of the cluster, so that the number of nodes and resource types owned by the two clusters after the split are as balanced as possible.

S05-3-2:新集群作为一个chord实例加入到网络中,并建立相应的路由表,相关集群的超级节点更新自己的路由表。S05-3-2: The new cluster is added to the network as a chord instance and a corresponding routing table is established. The super node of the relevant cluster updates its own routing table.

S05-3-3:原集群从普通节点中选举一批新的备份超级节点,并与原来保留的超级节点交换信息,其他普通节点更新自己路由信息。S05-3-3: The original cluster elects a new batch of backup super nodes from the ordinary nodes and exchanges information with the original reserved super nodes. Other ordinary nodes update their own routing information.

S05-3-4:新集群从普通节点中选举一批新的备份超级节点,并与刚建立的超级节点交换信息,其他普通节点更新自己的路由信息。S05-3-4: The new cluster elects a new batch of backup super nodes from the ordinary nodes and exchanges information with the newly established super nodes. Other ordinary nodes update their routing information.

S05-3-5:新集群将自身拥有的资源向上层集群报告,上层集群的超级节点更新自己路由信息,集群分裂完成。S05-3-5: The new cluster reports its own resources to the upper cluster, the super node of the upper cluster updates its own routing information, and the cluster split is completed.

集群合并算法的具体过程和步骤为:The specific process and steps of the cluster merging algorithm are:

S05-3-1:当集群i内节点数目小于下限值时,该集群的主超级节点在同层中查找离该集群较近的集群j,并向集群j发送合并请求。S05-3-1: When the number of nodes in cluster i is less than the lower limit, the main super node of the cluster searches for cluster j that is closer to the cluster in the same layer and sends a merge request to cluster j.

S05-3-2:当集群j的超级节点收到合并请求时,首先检测本集群的节点数目是否小于下限值,如果小于,则检测集群i与本集群的资源类型是否互补,使得合并后的集群拥有尽可能多的资源类型,资源的互补给定一个阀值,当两个集群达到这个阀值时,则发送合并响应,否则发送拒绝合并响应。S05-3-2: When the super node of cluster j receives a merge request, it first checks whether the number of nodes in this cluster is less than the lower limit. If it is less than the lower limit, it checks whether the resource types of cluster i and this cluster are complementary, so that after the merger The cluster has as many resource types as possible, and the resource complementarity is given a threshold. When the two clusters reach this threshold, a merge response is sent, otherwise a merge response is rejected.

S05-3-3:当集群i收到集群j的合并响应后,启动合并程序。集群i将本集群通知上层集群自己要退出,上层集群更新自己路由信息。S05-3-3: After cluster i receives the merge response from cluster j, it starts the merge process. Cluster i notifies the upper-level cluster that it wants to exit, and the upper-level cluster updates its routing information.

S05-3-4:集群i将整个集群加入到集群j中,集群j内主超级节点根据选举策略选出新的超级节点,其他节点也更新相关的路由信息。S05-3-4: Cluster i adds the entire cluster to cluster j. The main super node in cluster j selects a new super node according to the election strategy, and other nodes also update related routing information.

S05-3-5:当集群i收到集群j拒绝合并响应后,集群i寻找下一个可以合并的群,发送合并请求,直到找到可以合并的集群为止,集群合并完成。S05-3-5: When cluster i receives the merge rejection response from cluster j, cluster i looks for the next group that can be merged and sends a merge request until a cluster that can be merged is found, and the cluster merge is completed.

实施例2Example 2

提供了一种基于网络行为特征的自适应组网模型。该方法具体包括以下步骤:An adaptive networking model based on network behavior characteristics is provided. The method specifically includes the following steps:

(1)模型定义(1)Model definition

定义1:指挥中心:Command={ipcommand}。Definition 1: Command center: Command={ip command }.

定义2:超级节点集合:SuperCraft={ipi|1≤i≤m,m∈N},ipi代表超级节点(簇头)个体;Definition 2: Super node set: SuperCraft={ip i |1≤i≤m,m∈N}, ip i represents the super node (cluster head) individual;

定义3:网络威胁检测传感器集合:Craft={ipj|1≤j≤n,n∈N},其中n≥m,ipj代表网络威胁检测传感器个体。Definition 3: Network threat detection sensor collection: Craft = {ip j |1≤j≤n,n∈N}, where n≥m, ip j represents an individual network threat detection sensor.

定义4:宿主机集合:Computer={ipj|1≤j≤n,n∈N}。Definition 4: Host set: Computer={ip j |1≤j≤n,n∈N}.

定义5:宿主机网络行为特征库:对于其网络行为特征库记为其中p≥n;ipk代表与宿主机通信的主机k的IP地址,Fk代表与主机k的通信频率;Httpk表示与主机k进行HTTP协议通信的通信时机及通信量;Smtpk表示与主机k进行SMTP协议通信的通信时机及通信量。Definition 5: Host network behavior signature library: for Its network behavior feature library is recorded as where p≥n; ip k represents the IP address of host k communicating with the host machine, F k represents the communication frequency with host k; Http k represents the communication opportunity and traffic volume of HTTP protocol communication with host k; Smtp k represents the communication time with host k The communication timing and communication volume of host k performing SMTP protocol communication.

定义6:网络威胁检测传感器的组网策略表集合:对于网络威胁检测传感器craftj∈Craft,其组网策略表集合Policyj={<ipjk,Fjk,Httpjk,Smtpjk,statejk,payloadjk>|1≤k≤q,q∈N},其中,statek表示表中第k个网络威胁检测传感器的在线状态,payloadk表示表中第k个网络威胁检测传感器所携带的载荷。Definition 6: Network threat detection sensor network policy table set: For network threat detection sensor craft j ∈ Craft, its network policy table set Policy j = {<ip jk ,F jk ,Http jk ,Smtp jk ,state jk , payload jk >|1≤k≤q,q∈N}, where state k represents the online status of the kth network threat detection sensor in the table, and payload k represents the payload carried by the kth network threat detection sensor in the table.

定义7:指挥控制中心发送给簇头等超级结点的任务记为Misson={ml|1≤l≤q,q∈N}。Definition 7: The tasks sent by the command and control center to super nodes such as cluster heads are recorded as Misson={m l |1≤l≤q,q∈N}.

定义8:超级节点的群簇集合:对于网络威胁检测传感器craftj∈SuperCraft,其任务群簇集合记为并且 Definition 8: Super node cluster set: For the network threat detection sensor craft j ∈ SuperCraft, its task cluster set is recorded as and

(2)模型规则(2)Model rules

规则1:如果网络威胁检测传感器craftj1、craftj2∈Craft,并且craftj1是由craftj2复制生成,则craftj2称为craftj1的父网络威胁检测传感器,craftj1称为craftj2子网络威胁检测传感器,记为craftj1<craftj2Rule 1: If the network threat detection sensors craft j1 and craft j2 ∈ Craft, and craft j1 is copied and generated by craft j2 , then craft j2 is called the parent network threat detection sensor of craft j1 , and craft j1 is called the child network threat detection sensor of craft j2 . Sensor, recorded as craft j1 <craft j2 .

规则2:若网络威胁检测传感器craftj1、craftj2∈Craft,并且craftj1<craftj2,则craftj1生成时携带的组网策略表Policyj1为craftj2组网策略表的子集,仅包括指挥控制中心、簇头等超级节点信息,以及前三项普通节点信息。Rule 2: If the network threat detection sensors craft j1 and craft j2 ∈ Craft, and craft j1 <craft j2 , then the networking policy table Policy j1 carried when craft j1 is generated is a subset of the craft j2 networking policy table, including only the command Super node information such as control center and cluster head, as well as the first three common node information.

规则3:若网络威胁检测传感器craftj1是指挥控制中心复制生成,或由指挥控制中心发射,则craftj1默认为簇头,即craftj1∈SuperCraft。Rule 3: If the network threat detection sensor craft j1 is copied and generated by the command and control center, or is launched by the command and control center, then craft j1 defaults to the cluster head, that is, craft j1 ∈ SuperCraft.

规则4:若网络威胁检测传感器craftj1是由跨网方式注入到非合作网络,则默认为簇头,即craftj1∈SuperCraft。Rule 4: If the network threat detection sensor craft j1 is injected into a non-cooperative network through a cross-network method, it will default to the cluster head, that is, craft j1 ∈ SuperCraft.

规则5:若网络威胁检测传感器craftj1出现在craftj2∈SuperCraft的组网策略表Policyj2,则认为craftj1受超级节点craftj2管辖,即可以支持craftj2基于任务对craftj1的自适应组网,记为craftj2——→craftj1Rule 5: If the network threat detection sensor craft j1 appears in the networking policy table Policy j2 of craft j2 ∈ SuperCraft, then craft j1 is considered to be under the jurisdiction of the super node craft j2 , which can support the task-based adaptive networking of craft j1 by craft j2 . , recorded as craft j2 ——→craft j1 .

规则6:对craftj2∈Craft,若craftj2——→craftj1,且craftj2实际使用craftj1构建任务群簇,则记为/> Rule 6: Right craft j2 ∈Craft, if craft j2 ——→craft j1 , and craft j2 actually uses craft j1 to build the task cluster, then it is recorded as />

(3)模型描述(3)Model description

自适应组网可分为两个过程:个体自适应构建组网策略表和基于任务的自适应组网。Adaptive networking can be divided into two processes: individual adaptive networking strategy table construction and task-based adaptive networking.

过程2:基于任务的动态组网,形成任务群簇Process 2: Dynamic networking based on tasks to form task clusters

基于任务的动态组网方式有两种:一种是由指挥控制中心直接下达指令,告知超级节点(簇头)构建任务群簇的所有普通节点;另一种是由超级节点(簇头)根据任务自行选择普通节点构建任务群簇。There are two ways of task-based dynamic networking: one is that the command and control center directly issues instructions to inform the super node (cluster head) to build all ordinary nodes of the task cluster; the other is that the super node (cluster head) Tasks select ordinary nodes to build task clusters.

过程3:任务群簇的分离和重组Process 3: Separation and reorganization of task clusters

当某一任务群簇过大时,需要进行分离并扩展出新的群簇,这样便于任务的分解,以及对普通节点的管理。而当某一任务群簇过小,合并到其它任务群簇,便于整合任务力量。When a certain task cluster is too large, it needs to be separated and expanded into a new cluster, which facilitates task decomposition and management of ordinary nodes. When a certain task cluster is too small, it is merged into other task clusters to facilitate the integration of task forces.

①任务群簇的分离扩展①Separate expansion of task clusters

②任务群簇的重组合并。②Reorganization and merger of task clusters.

有益效果:以最小代价、高安全性、高可靠性为原则满足网络威胁检测传感器个体组网的自组性和机动性需求。Beneficial effects: Based on the principles of minimum cost, high security, and high reliability, it meets the self-organization and mobility requirements of individual network threat detection sensors.

以上的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above specific embodiments further describe the purpose, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above are only specific embodiments of the present invention and are not intended to limit the scope of protection of the present invention. Within the spirit and principles of the present invention, any modifications, equivalent substitutions, improvements, etc. shall be included in the protection scope of the present invention.

Claims (1)

1.一种自适应组网的通信方法,其特征在于,所述通信方法包括:1. A communication method for adaptive networking, characterized in that the communication method includes: 改进网络威胁检测传感器宿主机网络行为特征采集方法,适应目标网络的主机多样性,具体包括:Improve the network behavior characteristic collection method of the network threat detection sensor host to adapt to the host diversity of the target network, including: 根据网络威胁检测传感器宿主机多网卡存在的情况,区分IP地址进行网络行为特征的采集,并增加对同一IP下端口使用情况及使用频率的采集;According to the presence of multiple network cards on the network threat detection sensor host, distinguish IP addresses to collect network behavior characteristics, and increase the collection of port usage and usage frequency under the same IP; 细化HTTP、SMTP协议流量的通信区间统计,按照正常工作流速分小时统计用户活跃时间段,提取若干个活跃时间段;Detail the communication interval statistics of HTTP and SMTP protocol traffic, count user active time periods hourly according to the normal work flow rate, and extract several active time periods; 实现对多网卡主机的特征统计支持,对某个通信IP的通信时间段按照24个区间统计,但统计结果不列入组网策略表,以文件形式存储在本地,供本地通信时参考;Implement feature statistics support for multi-network card hosts. The communication time period of a certain communication IP is counted according to 24 intervals. However, the statistical results are not included in the networking policy table and are stored locally in the form of files for reference during local communication; 改进后宿主机网络行为特征库定义:对于其网络行为特征库记为:Improved host network behavior signature library definition: for Its network behavior feature library is recorded as: 其中:p≥n;NODEID为网络威胁检测传感器唯一标识,ipk代表与宿主机通信的主机k的IP地址,Fk代表与主机k的通信频率;Httpk为与主机k进行HTTP协议通信的通信时机及通信量;Smtpk为与主机k进行SMTP协议通信的通信时机及通信量,portk为在ipk地址上端口使用信息和使用频率信息;Among them: p≥n; NODEID is the unique identifier of the network threat detection sensor, ip k represents the IP address of host k communicating with the host machine, F k represents the communication frequency with host k; Http k represents the HTTP protocol communication with host k Communication timing and traffic volume; Smtp k is the communication timing and traffic volume for SMTP protocol communication with host k, port k is the port usage information and usage frequency information on the ip k address; 改进后的网络威胁检测传感器管理体系中,簇头节点掌握网络威胁检测传感器资源最多的节点,对通信路由检索进行优化;In the improved network threat detection sensor management system, the cluster head node controls the node with the most network threat detection sensor resources and optimizes communication route retrieval; 节点A首先在组网策略表中检查是否与节点B有直接通信,如果有,则返回路由信息节点A ID+节点B ID并退出;否则节点A向簇头节点A’申请检查是否能与节点B通信,若节点B存在于A’组网策略表中,则返回路由信息节点A ID+节点A’ID+节点B ID;否则,节点A’按照组网策略表中的排序向能够在自己组网策略表查询到的所有簇头和备份簇头节点申请检查其是否能与节点B通信,若簇头或备份簇头节点C的组网策略表中存在节点B,则返回路由信息节点AID+节点A’ID+节点C ID+节点B ID;Node A first checks whether there is direct communication with node B in the networking policy table. If so, it returns the routing information node A ID + node B ID and exits; otherwise node A applies to cluster head node A' to check whether it can communicate with node B. Communication, if node B exists in the networking policy table of A', the routing information node A ID + node A' ID + node B ID will be returned; otherwise, node A' will be able to use its own networking policy according to the sorting in the networking policy table. All cluster heads and backup cluster head nodes queried in the table apply to check whether they can communicate with node B. If node B exists in the networking policy table of cluster head or backup cluster head node C, the routing information node AID + node A' is returned. ID+node C ID+node B ID; 改进网络威胁检测传感器组网载荷初始化流程,具体包括;Improve the network threat detection sensor network payload initialization process, specifically including; 以目标网络内符合服务器特点的宿主机做为网络威胁检测传感器簇头的选择对象,并构建网络威胁检测传感器管理体系,当网络威胁检测传感器进入目标网络后,检查宿主机是否满足服务器特征,如是否开启80、25端口,如果满足,则将标识为簇头节点,否则为普通节点;若普通节点网络威胁检测传感器生存过程中,发现无簇头节点,在后续维护自身组网特征表时,若发现同IP网段有簇头网络威胁检测传感器存在,主动将排序靠前的簇头节点标识为簇头节点;Use the host machine in the target network that meets the server characteristics as the selection target of the network threat detection sensor cluster head, and build a network threat detection sensor management system. When the network threat detection sensor enters the target network, check whether the host machine meets the server characteristics, such as Whether to open ports 80 and 25. If satisfied, it will be marked as a cluster head node, otherwise it will be an ordinary node; if an ordinary node finds no cluster head node during the survival process of the network threat detection sensor, when subsequently maintaining its own networking characteristic table, If it is found that there is a cluster head network threat detection sensor in the same IP network segment, the cluster head node with the highest ranking will be actively identified as the cluster head node; 采用端口复用传输网络威胁检测传感器自适应组网载荷间的内部通信信息,具体包括:Port reuse is used to transmit internal communication information between adaptive networking loads of network threat detection sensors, including: 当在网络威胁检测传感器资源管理体系构建和维护的过程中,簇头节点与普通节点自适应组网载荷间的内部通信,包括组网策略表上报、任务分配信息,均需采用与宿主机网络行为特征匹配的端口复用技术进行传输;During the construction and maintenance of the network threat detection sensor resource management system, the internal communication between the cluster head node and the ordinary node adaptive networking load, including the reporting of the networking policy table and task allocation information, all need to be communicated with the host network. Port multiplexing technology matching behavioral characteristics for transmission; 改进网络威胁检测传感器资源管理,优化网络威胁检测传感器资源管理群分解算法和路由选取算法,具体包括:Improve network threat detection sensor resource management and optimize network threat detection sensor resource management group decomposition algorithm and routing selection algorithm, including: 当管理节点拥有的网络威胁检测传感器资源达到数量阈值时,启动网络威胁检测传感器资源分解流程:When the network threat detection sensor resources owned by the management node reach the quantity threshold, the network threat detection sensor resource decomposition process is started: 管理节点将备份管理节点选取为新的管理节点,新的管理节点从原管理节点中选取合适的节点作为管理资源,管理节点从管理资源当中去除新管理节点及新管理节点管理的网络威胁检测传感器资源;The management node selects the backup management node as the new management node. The new management node selects the appropriate node from the original management node as the management resource. The management node removes the new management node and the network threat detection sensor managed by the new management node from the management resources. resource; 管理节点和新的管理节点根据簇头选取算法补充备份管理节点,管理节点通知所属节点更新备份管理节点信息,所有的簇头和备份簇头均为目标网络中的服务器节点;The management nodes and new management nodes supplement the backup management nodes according to the cluster head selection algorithm. The management nodes notify their affiliated nodes to update the backup management node information. All cluster heads and backup cluster heads are server nodes in the target network; 构建优化的网络威胁检测传感器任务群簇,包括主动式任务群簇构建和被动式任务群簇构建;Build optimized network threat detection sensor task clusters, including active task cluster construction and passive task cluster construction; 当网络威胁检测传感器资源不足时,向簇头或其它网络威胁检测传感器资源管理群申请网络威胁检测传感器资源;When network threat detection sensor resources are insufficient, apply for network threat detection sensor resources from the cluster head or other network threat detection sensor resource management groups; 在网络威胁检测传感器任务群簇构建过程中,被申请资源的簇头宿主机拥有最大化的网络威胁检测传感器资源,当网络威胁检测传感器资源不足需要申请网络威胁检测传感器资源;During the construction process of the network threat detection sensor task cluster, the cluster head host for which the resources are applied has the maximum network threat detection sensor resources. When the network threat detection sensor resources are insufficient, you need to apply for network threat detection sensor resources; 所述主动式任务群簇构建支持,网络威胁检测传感器A从所属网络威胁检测传感器资源中选择并通知合适的网络威胁检测传感器构建任务群簇,并创建任务群簇表;根据各个网络威胁检测传感器完成任务的反馈动态调整任务群簇中的网络威胁检测传感器资源;The active task cluster construction supports the network threat detection sensor A. It selects and notifies the appropriate network threat detection sensor from the network threat detection sensor resources it belongs to to build a task cluster, and creates a task cluster table; according to each network threat detection sensor Feedback on completed tasks dynamically adjusts network threat detection sensor resources in task clusters; 如某个网络威胁检测传感器无法执行任务或执行任务失败,则从任务群簇表中动态退出该网络威胁检测传感器,同时从剩余网络威胁检测传感器选择合适的网络威胁检测传感器动态加入任务群簇表;If a network threat detection sensor cannot perform a task or fails to perform a task, the network threat detection sensor is dynamically exited from the task cluster table, and at the same time, a suitable network threat detection sensor is selected from the remaining network threat detection sensors and dynamically added to the task cluster table. ; 如果任务群簇构建过程中,网络威胁检测传感器A的资源无法满足任务的需要,则向其它网络威胁检测传感器资源管理群申请资源;当网络威胁检测传感器A完成任务群簇中的各节点反馈,若任务已完成,则销毁任务群簇;If during the construction of the task cluster, the resources of network threat detection sensor A cannot meet the needs of the task, it will apply for resources from other network threat detection sensor resource management groups; when network threat detection sensor A completes the task cluster, each node in the cluster will give feedback. If the task is completed, destroy the task cluster; 若网络威胁检测传感器A的所属网络威胁检测传感器资源中拥有足够的网络威胁检测传感器资源,则直接选择并通知合适的网络威胁检测传感器构建任务群簇,并创建任务群簇表;If there are sufficient network threat detection sensor resources in the network threat detection sensor resources to which network threat detection sensor A belongs, directly select and notify the appropriate network threat detection sensor to build a task cluster, and create a task cluster table; 否则,网络威胁检测传感器A向其簇头申请网络威胁检测传感器资源,由簇头将满足任务条件的网络威胁检测传感器资源返回给网络威胁检测传感器A,再由网络威胁检测传感器A通知选中的网络威胁检测传感器构建任务群簇,并创建任务群簇表;Otherwise, network threat detection sensor A applies to its cluster head for network threat detection sensor resources. The cluster head returns the network threat detection sensor resources that meet the task conditions to network threat detection sensor A, and then network threat detection sensor A notifies the selected network. Threat detection sensors build task clusters and create task cluster tables; 网络威胁检测传感器A根据各个网络威胁检测传感器完成任务的反馈动态调整任务群簇中的网络威胁检测传感器资源;Network threat detection sensor A dynamically adjusts the network threat detection sensor resources in the task cluster based on the feedback of each network threat detection sensor completing the task; 如某个网络威胁检测传感器无法执行任务或执行任务失败,则从任务群簇表中动态退出网络威胁检测传感器,同时从剩余网络威胁检测传感器选择合适的网络威胁检测传感器动态加入任务群簇表If a network threat detection sensor cannot perform the task or fails to perform the task, the network threat detection sensor will be dynamically exited from the task cluster table, and at the same time, a suitable network threat detection sensor will be selected from the remaining network threat detection sensors and dynamically added to the task cluster table. 所述被动式任务群簇构建支持;The passive task cluster construction support; 被动式任务群簇管理依赖的任务不是自己产生,而是由上级节点下达的,称为有中心的任务群簇管理,也包括任务群簇的生成、群簇的合并和群簇的销毁;Passive task cluster management relies on tasks that are not generated by themselves, but are issued by superior nodes. This is called central task cluster management, which also includes the generation of task clusters, the merging of clusters, and the destruction of clusters; 被动式任务群簇生成、合并和销毁等都由簇头进行管理。The generation, merging and destruction of passive task group clusters are all managed by the cluster head.
CN202311058108.1A 2023-08-22 2023-08-22 Communication method of self-adaptive networking Active CN117241274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311058108.1A CN117241274B (en) 2023-08-22 2023-08-22 Communication method of self-adaptive networking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311058108.1A CN117241274B (en) 2023-08-22 2023-08-22 Communication method of self-adaptive networking

Publications (2)

Publication Number Publication Date
CN117241274A CN117241274A (en) 2023-12-15
CN117241274B true CN117241274B (en) 2024-03-19

Family

ID=89093775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311058108.1A Active CN117241274B (en) 2023-08-22 2023-08-22 Communication method of self-adaptive networking

Country Status (1)

Country Link
CN (1) CN117241274B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006574A (en) * 2011-01-05 2011-04-06 中国人民解放军理工大学 Wireless self-organized network-based integrated heterogeneous emergency communication network
CN108712758A (en) * 2018-04-27 2018-10-26 中山大学 It is a kind of to be applied to dynamic stability cluster-dividing method safe in vehicular ad hoc network network
CN110913402A (en) * 2019-11-27 2020-03-24 南京航空航天大学 A UAV ad hoc network clustering method with high coverage efficiency for joint optimization of communication and formation
CN112688899A (en) * 2019-10-17 2021-04-20 中国移动通信集团重庆有限公司 In-cloud security threat detection method and device, computing equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2640131A1 (en) * 2012-03-14 2013-09-18 British Telecommunications Public Limited Company Method and system for preventing the propagation of ad-hoc networks
US9621568B2 (en) * 2014-02-11 2017-04-11 Varmour Networks, Inc. Systems and methods for distributed threat detection in a computer network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006574A (en) * 2011-01-05 2011-04-06 中国人民解放军理工大学 Wireless self-organized network-based integrated heterogeneous emergency communication network
CN108712758A (en) * 2018-04-27 2018-10-26 中山大学 It is a kind of to be applied to dynamic stability cluster-dividing method safe in vehicular ad hoc network network
CN112688899A (en) * 2019-10-17 2021-04-20 中国移动通信集团重庆有限公司 In-cloud security threat detection method and device, computing equipment and storage medium
CN110913402A (en) * 2019-11-27 2020-03-24 南京航空航天大学 A UAV ad hoc network clustering method with high coverage efficiency for joint optimization of communication and formation

Also Published As

Publication number Publication date
CN117241274A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
CN101719842B (en) A Distributed Network Security Early Warning Method Based on Cloud Computing Environment
CN111049895B (en) Improved PBFT consensus method based on ISM
CN102724057B (en) A kind of distributed levelization autonomous management method towards cloud computing platform
GB2406466A (en) Grouping nodes into zones satisfying a threshold
CN106953926A (en) A kind of method for routing and device
CN113821566B (en) Block chain aggregation architecture based on multi-chain slicing
CN116149370A (en) A Cluster-Based Multi-UAV Distributed Dynamic Task Assignment Method
CN111353172A (en) Hadoop cluster big data access method and system based on block chain
CN116957110A (en) A trusted federated learning method and system based on alliance chain
Mozaffari et al. Frl: Federated rank learning
CN117241274B (en) Communication method of self-adaptive networking
CN109587026A (en) A method of large and medium-sized enterprise&#39;s Network Programe Design based on Java
CN103957124A (en) Distribution type collecting method and system of collection tasks
US7313101B2 (en) Need-based filtering for rapid selection of devices in a tree topology network
CN112565368B (en) Blockchain-based maritime equipment ad hoc network system, method and medium
Toce et al. An efficient hypercube labeling schema for dynamic Peer-to-Peer networks
Mohanasundaram et al. Hybrid swarm intelligence optimization approach for optimal data storage position identification in wireless sensor networks
de Campos Jr et al. Evaluation of asynchronous multi‐swarm particle optimization on several topologies
CN112134833A (en) Virtual-real fused stream deception defense method
CN116016540B (en) Block chain network node group fault-tolerant auxiliary storage mechanism based on Internet of things equipment
Gupta et al. Improved Extreme Learning Machine Based Hunger Games Search for Automatic IP Configuration and Duplicate Node Detection
CN112468345B (en) Cross-boundary service network architecture based on distributed spanning tree
CN113518126A (en) Cross fault-tolerant method for alliance chain
CN115361708A (en) A 5G-based power consumption data detection technology
RU2747452C2 (en) Method for forming device clusters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant