计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240900110-6.doi: 10.11896/jsjkx.240900110

• 信息安全 • 上一篇    下一篇

基于时间式网络流水印技术的大规模网络防御算法

朱柯达, 蔡瑞杰, 刘胜利   

  1. 信息工程大学网络空间安全学院 郑州 450001
  • 出版日期:2025-06-16 发布日期:2025-06-12
  • 通讯作者: 刘胜利(mr_liushengli@163.com)
  • 作者简介:(1010214136@qq.com)

Large Scale Network Defense Algorithm Based on Temporal Network Flow Watermarking Technology

ZHU Keda, CAI Ruijie, LIU Shengli   

  1. School of Network and Cybersecurity,Information Engineering University,Zhengzhou 450001,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:ZHU Keda,born in 1994,postgraduate.His main research interests include network attack detection and so on.
    LIU Shengli,born in 1973,Ph.D,professor.His main research interests include network device security and network attack detection.

摘要: 网络攻击者所用链路包含暗网、跳板等多个节点,将攻击路径变得复杂和难以预测,使得全链条溯源存在困难,导致大规模网络流量检测的效果较不稳定。为此,提出一种基于时间式网络流水印技术的大规模网络防御算法,利用时间间隔将大规模网络数据流进行分组,减少因单一参数异常而引发的误报。通过卷积编码和流量调制后实现该数据流时间式水印注入,使得水印信息在面对网络流量波动时仍能保持一定的稳定性,增强了水印的鲁棒性。通过比较时间式网络多流联合质心熵,快速识别出含有水印的标记流。实验表明,该算法受抖动影响较小,能够确保水印注入,实现对大规模网络攻击的防御。

关键词: 网络安全, 流量检测, 时间式, 大规模网络防御, 网络流水印, 联合质心熵

Abstract: Network attackers use multiple nodes such as dark net,stepping stones,and other relay links to create complex and unpredictable attack path,making it difficult to trace the entire chain,leading to unstable detection effectiveness of large-scale network.Therefore,a large-scale network defense algorithm based on temporal network pipeline detection technology is proposed.This algorithm uses time intervals to group large-scale network data streams,reducing false alarms caused by single parameter anomalies.By using convolutional encoding and traffic modulation,the temporal watermark embedding of the data stream is achieved,so that the watermark information can maintain a certain stability in the face of network traffic fluctuations,enhancing the robustness of the watermark.By comparing the joint centroid entropy of multiple streams in a temporal network,the marked streams containing watermarks could be identified quickly.Experiment shows that the proposed algorithm is less affected by jitter and can ensure watermark embedding,achieving defense against large-scale network attacks.

Key words: Cyber security, Flow detection, Temporal, Large-scale network defense, Network stream watermarking, Joint centroid entropy

中图分类号: 

  • TP393
[1]ZHAO N,SU J S,ZHAO B K,et al.A Survey on Hidden Servi-ce Location Technologies in Anonymous Communication System [J].Chinese Journal of Computers,2022,45(2):393-411.
[2]MA X G,LI T Y,LIU F L,et al.Robust network flow watermarking algorithm based on dynamic interval compression [J].Application Research of Computers,2023,40(10):3144-3148,3154.
[3]ZHANG L C,KONG Y Z,GUO Y,et al.Survey on networkflow watermarking;model,interferences,applications,technologies and security [J].IET Communications,2018,12(14):1639-1648.
[4]CHEN Q,SHEN T,LI P F,et al.Optical watermarking reconstruction method based on FC-DenseNets-BC neural network [J].Optical Technique,2021,47(2):223-230.
[5]MELLIMI S,RAJPUT V,ANSARI I A,et al.A fast and efficient image watermarking scheme based on deep neural network[J].Pattern Recognition Letters,2021,151:222-228.
[6]ZHENG G,HU D H,GE H,et al.End-to-end image steganography and watermarking driven by generative adversarial networks[J].Journal of Image and Graphics,2021,26(10):2485-2502.
[7]WANG F.Simulation of Network Big Data Lossless Encryption Algorithm Based on Two-Way Defense[J].Computer Simulation,2021,38(10):316-319.
[8]ZHANG L,LUO J Z,YANG M,et al.Interval Centroid Based Flow Watermarking Technique for Anonymous Communication Traceback [J].Journal of Software,2011,22(10):2358-2371.
[9]LI Q K,LIU G J,LIU W W,et al.Detecting Network Watermark Through Multi-flow Joint Entropy of Centroid [J].Journal of Chinese Computer Systems,2017,38(11):2443-2447.
[10]ZHANG Y J,CHEN K,ZHOU G,et al.Research Progress of Neural Networks Watermarking Technology[J].Journal of Computer Research and Development,2021,58(5):964-976.
[11]XIA D X,WANG L N,SONG Y F,et al.Review of Deep Neural Network Model Digital Watermarking Technology [J].Science Technology and Engineering,2023,23(5):1799-1811.
[12]YANG A S,WANG L,CAO Y J,et al.Neural network model integrity verification algorithm based on reversible watermark [J].Computer Engineering and Design,2024,45(2):383-389.
[13]LIU Y L,HE H J,CHEN F,et al.Traceable DNN Model Protection Based on Watermark Neural Network [J].Journal of Applied Sciences,2023,41(2):183-196.
[14]TAO J,ZHU Z C,WANG Z Y,et al.A Feature Watermarking Generation and Embedding Scheme for IPv6 Network [J].Journal of Computer Research and Development,2021,58(11):2400-2415.
[15]ZHAO X Q,SUN L,WANG Y J,et al.Covert Channel Construction Method based on IPv6 Protocol [J].Communications Technology,2021,54(1):158-163.
[16]WU Q,LI Y H,ZHU Q L.HMM-Viterbi Based Network Resource Data Processing Method and Its Application [J].Mobile Communications,2022,46(2):89-94.
[17]FENG L,ZHU R J,WU H Z,et al.Survey of Neural Network Watermarking[J].Journal of Applied Sciences,2021,39(6):881-892.
[18]WANG X C,ZHANG L,YU Y Q,et al.Robust image watermarking network algorithm based on effective neural architecture search [J].Journal of Zhejiang University(Science Edition),2021,48(3):261-269.
[19]DI Y L,ZHANG Y Z,WANG T Q,et al.Low Distortion Watermark Scheme Based on Redistributable Anticollusion Coding [J].Journal of Data Acquisition and Processing,2023,38(2):413-425.
[20]SONG Y,SHEN Q J,YANG H S.Reversible Database Watermarking Scheme Based on Cuckoo Algorithm [J].Computer Applications and Software,2021,38(12):304-313.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!