CN114338075B - Attack object defense method based on extensive sniffing - Google Patents

Attack object defense method based on extensive sniffing Download PDF

Info

Publication number
CN114338075B
CN114338075B CN202111322138.XA CN202111322138A CN114338075B CN 114338075 B CN114338075 B CN 114338075B CN 202111322138 A CN202111322138 A CN 202111322138A CN 114338075 B CN114338075 B CN 114338075B
Authority
CN
China
Prior art keywords
nodes
attack
node
sniffing
extensive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111322138.XA
Other languages
Chinese (zh)
Other versions
CN114338075A (en
Inventor
金旭
倪旭明
郭瑜
吴哲翔
厉立锋
瞿迪庆
邵航军
陈成钢
张文杰
潘伟东
李凌
吕齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111322138.XA priority Critical patent/CN114338075B/en
Publication of CN114338075A publication Critical patent/CN114338075A/en
Application granted granted Critical
Publication of CN114338075B publication Critical patent/CN114338075B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

In order to overcome the problems in the prior art, the invention actively observes the sniffing action, finds the actual attack target in the convergence process, and finally defends the attack target before actually launching the attack, thereby resisting the attack. To achieve the object, the present invention is a method for defending an attack object based on extensive sniffing, comprising: arranging an observation point; analyzing the abnormal signal to find a wide sniffing behavior therein; constructing a penetrating association relation tree according to the association relation between attacks, marking out nodes corresponding to penetrating operation in the middle when an attacker sniffs widely, and calculating an end point reached through the shortest distance in an association relation diagram according to the nodes through a shortest path algorithm, namely a presumed final attack target. The invention has the beneficial effect of changing passive attack defense into active observation exploration process. Sniffing is monitored to predict targets that may be attacked.

Description

Attack object defense method based on extensive sniffing
Technical Field
The invention belongs to the field of network information security, and particularly relates to an attack object defense method and device based on extensive sniffing.
Background
Information security relates to the safety of power production. In modern society, the consequences of a power network being destroyed are not envisaged. However, with the rapid development of the mobile internet age and the wide application of 5G communication, the newly-added informationized application system brings great hidden trouble to the related information security. The network security protection of the power system faces more serious challenges.
Because of the continuous efforts of the power system at ordinary times, outstanding results are achieved in the information security control aspect, and various attacks are resisted. However, as the attack and defense are continuously upgraded, the existing attack is not directly performed any more, but is detected by a wide sniffing mode, and destructive attack is properly issued at the right moment. For this attack mode, it is difficult to prevent in the prior art. Since the normal sniffing is allowed in a rule range and the sniffing range is very wide, almost the whole network is involved, and even if the sniffing is detected, the final attack target is difficult to judge in the prior art.
Disclosure of Invention
In order to overcome the problems in the prior art, the invention provides an attack object defense method based on extensive sniffing, which actively observes the extensive sniffing actions, finds an actual attack object in the convergence process of the attack object, and finally defends the attack object before the attack is actually initiated, thereby defending the attack.
To achieve the object, the present invention is a method for defending an attack object based on extensive sniffing, comprising:
arranging an observation point, and acquiring an abnormal signal from the observation point;
analyzing the abnormal signal to find a wide sniffing behavior therein;
constructing a penetrating association tree according to the association between attacks, marking out nodes corresponding to penetrating operation in the way when an attacker sniffs widely, and calculating an end point reached through the shortest distance in an association graph according to the nodes through a shortest path algorithm, namely a presumed final attack target;
and pre-judging the attack level, and preventing the presumed attack target according to the attack level.
Preferably, the infiltrated association relation tree includes network elements of ports, services, components, middleware, applications, systems and vulnerabilities expressed in the form of nodes.
Preferably, all network elements with relations in the association relation tree represent the relations in a connection form, and the weight value on each line is obtained by adding the weight values of two nodes connected with the weight value. The weight may be considered as the distance between the actual nodes.
Preferably, the weight of each node is set according to the common degree, the importance degree and the harm degree of the corresponding network element, and the nodes corresponding to the ports, the services, the components, the middleware, the applications, the systems and the loopholes involved in the infiltration operation are marked in the association relation tree of the infiltration according to the weight of the node.
Preferably, nodes in which the weight is below the threshold are not marked. Therefore, the whole association relation tree can be simplified, and the post-fast processing is facilitated.
Preferably, the merging operation is performed on two nodes when a node relation of unidirectional communication exists between the nodes. This is also to reduce the number of nodes and to speed up the processing efficiency.
Preferably, the shortest path algorithm here employs the dijkstra algorithm;
initially, taking a node where an observation point of a first observed abnormal signal is located as a starting node, starting throwing into a priority queue, marking the position of A in an array, throwing the nodes communicated around A into the priority queue, recording the distance between the nodes into a corresponding array, updating the array if the distance between the nodes is smaller than the distance in the array, otherwise, maintaining the array motionless; the initial first time is an infinite positive update; the first time ends
The node B closest to the node B is thrown out of the queue, the node B is marked as true, the adjacent node of the node B is added into the queue, the shortest point determined next time is generated in the node which is not determined before and the node adjacent to the node B, the length of each position is calculated through the node B when the length is updated, and if the length is smaller than the length, the length of each position is updated;
repeating the steps until all the nodes are traversed, and finding the shortest distance.
Preferably, the work of protecting against the presumed attack targets includes closing ports, modifying IP addresses, disabling part of the functions, closing the whole device and enabling the backup device, respectively, according to the attack level.
The invention has the beneficial effect of changing passive attack defense into active observation exploration process. Sniffing is monitored, so that targets possibly attacked are predicted, and finally, vector placement is carried out, and important precautions are carried out on the targets possibly attacked, so that defense work is completed at a lower cost.
Drawings
Fig. 1 is a schematic diagram of an association tree according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and examples.
An attack object defense method based on extensive sniffing comprises the following steps: arranging an observation point, and acquiring an abnormal signal from the observation point; the anomaly signal is analyzed to find a wide range of sniffing behavior therein. And constructing a permeated association relation tree according to the association relation between attacks, wherein the permeated association relation tree comprises network units of ports, services, components, middleware, applications, systems and vulnerabilities which are expressed in a node form. Marking out nodes corresponding to the penetration operation during the extensive sniffing of an attacker, and calculating an end point reached by the shortest distance in the association relation graph according to the nodes through a shortest path algorithm, namely a presumed final attack target;
and pre-judging the attack level, and preventing the presumed attack target according to the attack level.
And the network elements with the relations in the association relation tree represent the relations in a connection form, and the weight value on each line is obtained by adding the weight values of two nodes connected with the weight values.
Setting the weight of each node according to the common degree, the importance degree and the harm degree of the corresponding network unit, and marking the nodes corresponding to ports, services, components, middleware, applications, systems and vulnerabilities involved in the infiltration operation in the association relation tree of the infiltration according to the weight of the nodes.
Typical sniffing actions are: the host A sends a message to the host B, queries a local ARP cache table, and performs data transmission after finding the MAC address corresponding to the IP address of the host B. If not found, A broadcasts an ARP request message (carrying the IP address and physical address of host A), requests the IP address as host B, and sends the MAC of host B to host A. All hosts on the network, including host B, receive the ARP request, but only host B conforms to the IP, and then sends an ARP response message back to host a. The address of B is contained in the address, and after receiving the response of B, A updates the local ARP cache. The data is then sent using the MAC address. Thus, the local cache ARP table is the basis for local network traffic and is dynamic. The gateway spoofing of the intranet is to disguise an attacker as a gateway, so that the spoofed host sends data to itself. During this process, the sniffing action does not actively steal the data flowing through, but rather the architecture of the content is ascertained from the data trend. Since no loss is actually caused during the sniffing process, even if it is found that it is difficult to judge whether normal work is required or in preparation for attack.
The technical scheme of the invention is that the corresponding association relation tree diagram of the detected permeation information port A is shown in figure 1. Nodes with weights lower than a threshold value are deleted in the graph, and two nodes with unidirectional communication node relations are combined.
The weight of the connection in the graph is calculated according to the weight of the connection node. According to the Di Jie Style algorithm, the minimum weight edge service E- > vulnerability C, the service C- > vulnerability B, the vulnerability A- > permeation endpoint A and the service C- > service E which do not form a ring are sequentially selected. At this time, there is a path port a-service C-service E-leak C-permeation key B from the port a to the permeation endpoint, and at this time, the permeation endpoint is B, and the permeation endpoint node that the permeation information port a can reach through the shortest permeation path is considered as B.
And after the operation is performed on all the permeation information nodes, obtaining all permeation end points corresponding to all the nodes. And counting the permeation endpoint with the largest occurrence number, namely the predicted final attack objective. The work of defending the presumed attack target comprises closing the port, modifying the IP address, prohibiting part of the functions, closing the whole equipment and starting the backup equipment according to the attack level.
In this embodiment, after the attack destination is found, a series of intranet MAC addresses corresponding to the attack destination IP are sent to the router, where the intranet MAC addresses are virtual and cannot be connected to any device, and are continuously performed according to a certain frequency, so that real address information cannot be stored in the router through updating, and as a result, all data of the router, including external attack instructions, can only be sent to the wrong MAC address, and no substantial attack can be caused.
And network security personnel need to trace back information of an attacker as much as possible in the period of time, and can alarm if necessary. And meanwhile, the final attack purpose network disconnection is physically isolated, and standby redundant equipment is started to work normally.
What needs to be specified is: the above description of one embodiment provided in connection with the specific content does not set forth a limitation on the practice of the invention. The invention should be considered as limited in scope by the following description, which is intended to cover all modifications, variations, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (5)

1. An attack object defending method based on extensive sniffing, which is characterized by comprising the following steps:
arranging an observation point, and acquiring an abnormal signal from the observation point;
analyzing the abnormal signal to find a wide sniffing behavior therein;
constructing a permeable association tree according to the association between attacks, marking out nodes corresponding to the permeable operation in the way when an attacker sniffs widely, calculating the end points reached by the shortest distance in the association diagram according to the nodes through a shortest path algorithm, obtaining all permeable end points corresponding to all nodes after the operations are performed on all permeable information nodes, and counting the permeable end points with the largest occurrence number as a predicted final attack target;
pre-judging the attack level, and preventing the presumed attack target according to the attack level;
the network elements with the relation in the association relation tree represent the relation in a connection form, and the weight value on each line is obtained by adding the weight values of two nodes connected with the weight values;
setting the weight of each node according to the common degree, the importance degree and the harm degree of the corresponding network unit, and marking the nodes corresponding to ports, services, components, middleware, applications, systems and vulnerabilities involved in the infiltration operation in the association relation tree of the infiltration according to the weight of the nodes;
the shortest path algorithm adopts a Di Jie Style algorithm:
initially, taking a node where an observation point of a first observed abnormal signal is located as a starting node, starting throwing into a priority queue, marking the position of A in an array, throwing the nodes communicated around A into the priority queue, recording the distance between the nodes into a corresponding array, updating the array if the distance between the nodes is smaller than the distance in the array, otherwise, maintaining the array motionless;
the node B closest to the node B is thrown out of the queue, the node B is marked as true, the adjacent node of the node B is added into the queue, the shortest point determined next time is generated in the node which is not determined before and the node adjacent to the node B, the length of each position is calculated through the node B when the length is updated, and if the length is smaller than the length, the length of each position is updated;
repeating the steps until all the nodes are traversed, and finding the shortest distance.
2. The attack object defense method based on extensive sniffing according to claim 1, wherein the infiltrated association tree contains network elements of ports, services, components, middleware, applications, systems, vulnerabilities represented in the form of nodes.
3. The attack object defense method based on extensive sniffing according to claim 1, characterized in that nodes in which the weight is below a threshold are not marked.
4. The attack object defense method based on extensive sniffing according to claim 1, wherein the merging operation is performed on two nodes when there is a node relationship of unidirectional communication between the nodes.
5. The attack object defense method based on extensive sniffing according to claim 1, wherein the work of protecting against the presumed attack object includes closing ports, modifying IP addresses, prohibiting part of functions, closing the entire device and enabling the backup device, respectively, according to the attack level.
CN202111322138.XA 2021-11-10 2021-11-10 Attack object defense method based on extensive sniffing Active CN114338075B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111322138.XA CN114338075B (en) 2021-11-10 2021-11-10 Attack object defense method based on extensive sniffing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111322138.XA CN114338075B (en) 2021-11-10 2021-11-10 Attack object defense method based on extensive sniffing

Publications (2)

Publication Number Publication Date
CN114338075A CN114338075A (en) 2022-04-12
CN114338075B true CN114338075B (en) 2024-03-12

Family

ID=81045304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111322138.XA Active CN114338075B (en) 2021-11-10 2021-11-10 Attack object defense method based on extensive sniffing

Country Status (1)

Country Link
CN (1) CN114338075B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447695A (en) * 2011-11-14 2012-05-09 中国科学院软件研究所 Method for identifying key attack path in service system
CN104348652A (en) * 2013-08-06 2015-02-11 南京理工大学常熟研究院有限公司 Method and device for evaluating system security based on correlation analysis
KR101687811B1 (en) * 2015-09-07 2017-02-01 박준영 Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution
CN106850607A (en) * 2017-01-20 2017-06-13 北京理工大学 The quantitative estimation method of the network safety situation based on attack graph
CN109818953A (en) * 2019-01-21 2019-05-28 常州工程职业技术学院 A kind of sensor safe defense technique in mobile Internet of things system
CN110210229A (en) * 2019-04-29 2019-09-06 国网宁夏电力有限公司电力科学研究院 Appraisal procedure, system and the storage medium of the fragility of electric network information physical system
CN112020871A (en) * 2019-03-29 2020-12-01 华为技术有限公司 Method and device for reducing sniffing attack and integrated circuit
CN112313915A (en) * 2018-11-05 2021-02-02 北京大学深圳研究生院 Security modeling quantification method based on GSPN and halter strap theoretical network space mimicry defense
CN113452699A (en) * 2021-06-24 2021-09-28 西安电子科技大学 Springboard attack path analysis method based on configuration file

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
KR100922582B1 (en) * 2007-07-20 2009-10-21 한국전자통신연구원 Log-based traceback system and method by using the centroid decomposition technique
CN101847148B (en) * 2009-03-23 2013-03-20 国际商业机器公司 Method and device for implementing high application availability

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447695A (en) * 2011-11-14 2012-05-09 中国科学院软件研究所 Method for identifying key attack path in service system
CN104348652A (en) * 2013-08-06 2015-02-11 南京理工大学常熟研究院有限公司 Method and device for evaluating system security based on correlation analysis
KR101687811B1 (en) * 2015-09-07 2017-02-01 박준영 Design of Agent Type's ARP Spoofing Detection Scheme which uses the ARP probe Packet and Implementation of the Security Solution
CN106850607A (en) * 2017-01-20 2017-06-13 北京理工大学 The quantitative estimation method of the network safety situation based on attack graph
CN112313915A (en) * 2018-11-05 2021-02-02 北京大学深圳研究生院 Security modeling quantification method based on GSPN and halter strap theoretical network space mimicry defense
CN109818953A (en) * 2019-01-21 2019-05-28 常州工程职业技术学院 A kind of sensor safe defense technique in mobile Internet of things system
CN112020871A (en) * 2019-03-29 2020-12-01 华为技术有限公司 Method and device for reducing sniffing attack and integrated circuit
CN110210229A (en) * 2019-04-29 2019-09-06 国网宁夏电力有限公司电力科学研究院 Appraisal procedure, system and the storage medium of the fragility of electric network information physical system
CN113452699A (en) * 2021-06-24 2021-09-28 西安电子科技大学 Springboard attack path analysis method based on configuration file

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ARP协议欺骗攻击及防御方法研究;杜兴勇;于远诚;刘浩力;;通化师范学院学报(第10期);全文 *
deep reinforcement learning for Cybersecurity assessment of wind integrated power systems;xiaoruiliu;IEEE Access(第9期);全文 *
Dijkstra‘s algorithm for solving the shortest path problem on networks under intuitionistic fuzzy environment;sathi mukherjee;Springer link;全文 *
基于最小化攻击图的自动化渗透测试模型;谢冬青;李贵城;;广州大学学报(自然科学版)(第03期);全文 *
基于软件定义网络的反嗅探攻击方法;张传浩;谷学汇;孟彩霞;;计算机应用(第11期);全文 *

Also Published As

Publication number Publication date
CN114338075A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
Ali et al. Detecting ddos attack on sdn due to vulnerabilities in openflow
US9160761B2 (en) Selection of a countermeasure
Shakil et al. A novel dynamic framework to detect DDoS in SDN using metaheuristic clustering
Shi et al. Chaos: An sdn-based moving target defense system
US7917957B2 (en) Method and system for counting new destination addresses
CN103561004A (en) Cooperative type active defense system based on honey nets
CN103457931A (en) Active defense method for network trick and counter attack
CN110719299A (en) Honeypot construction method, device, equipment and medium for defending network attack
CN110266650B (en) Identification method of Conpot industrial control honeypot
CN101945117A (en) Method and equipment for preventing source address spoofing attack
Lin et al. Using signaling games to model the multi-step attack-defense scenarios on confidentiality
US20140165143A1 (en) Method and a program for controlling communication of target apparatus
Nehra et al. FICUR: Employing SDN programmability to secure ARP
Ge et al. Modeling and analysis of integrated proactive defense mechanisms for internet of things
Ma An effective method for defense against IP spoofing attack
CN108322454B (en) Network security detection method and device
CN114338075B (en) Attack object defense method based on extensive sniffing
Malliga et al. A proposal for new marking scheme with its performance evaluation for IP traceback
KR20170109949A (en) Method and apparatus for enhancing network security in dynamic network environment
Prasad et al. On the security of software-defined networks
Barbhuiya et al. An active DES based IDS for ARP spoofing
Liu et al. NetObfu: A lightweight and efficient network topology obfuscation defense scheme
KR102046612B1 (en) The system for defending dns amplification attacks in software-defined networks and the method thereof
CN110290156B (en) Big data-based defense and network security device for distributed attack
KR101914831B1 (en) SDN to prevent an attack on the host tracking service and controller including the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant