TWI835113B - System for executing task based on an analysis result of records for achieving device joint defense and method thereof - Google Patents

System for executing task based on an analysis result of records for achieving device joint defense and method thereof Download PDF

Info

Publication number
TWI835113B
TWI835113B TW111113543A TW111113543A TWI835113B TW I835113 B TWI835113 B TW I835113B TW 111113543 A TW111113543 A TW 111113543A TW 111113543 A TW111113543 A TW 111113543A TW I835113 B TWI835113 B TW I835113B
Authority
TW
Taiwan
Prior art keywords
network node
module
maintenance
task
tasks
Prior art date
Application number
TW111113543A
Other languages
Chinese (zh)
Other versions
TW202340988A (en
Inventor
顏章憲
Original Assignee
彰化商業銀行股份有限公司
Filing date
Publication date
Application filed by 彰化商業銀行股份有限公司 filed Critical 彰化商業銀行股份有限公司
Priority to TW111113543A priority Critical patent/TWI835113B/en
Publication of TW202340988A publication Critical patent/TW202340988A/en
Application granted granted Critical
Publication of TWI835113B publication Critical patent/TWI835113B/en

Links

Abstract

A system for executing a task based on an analysis result of records for achieving device joint defense and a method thereof are provided. By analyzing operation records of network nodes to select a corresponding maintenance task, and executing the selected maintenance task for performing a corresponding operation plan by a network node, the system and the method can analyze security event and implement protection effectively, and can achieve the effect of network device joint defense automation.

Description

依記錄分析結果執行任務以實現設備聯防之系統及方法System and method for performing tasks based on record analysis results to achieve joint defense of equipment

一種設備聯防系統及其方法,特別係指一種依記錄分析結果執行任務以實現設備聯防之系統及方法。 An equipment joint defense system and its method, in particular, refers to a system and method that performs tasks based on recorded analysis results to realize equipment joint defense.

隨著各式新興科技應用的出現,駭客手法不斷更新,再加上各種使用多年的既有技術接連被揭露出安全性漏洞,因此,現代的資安人員須面對巨量且複雜的資訊,也使得防護機制複雜化。為此,可以幫助資安人員掌握資安事件狀態進而下定決策之資安事件管理(Security Incident Event Management,SIEM)相關的系統/軟體因運而生。 With the emergence of various emerging technology applications, hacking techniques are constantly updated, and security vulnerabilities have been exposed in various existing technologies that have been used for many years. Therefore, modern security personnel must face a huge amount of complex information. , also complicates the protection mechanism. For this reason, systems/software related to Security Incident Event Management (SIEM) were born that can help security personnel grasp the status of security incidents and make decisions.

然而,目前資安事件管理系統/軟體大多著重於事件日誌(Event Log)的保管,且所使用的過濾條件與關聯規則過於僵化,導致資安事件管理系統/軟體所提供給資安人員的只是被整齊分類與統計的資料(Data),這對資安人員進行資安事件掌握與決策判斷的幫助並不足夠,因此,即使企業投入了大量的專業資安人員,資安人員對於資安事件的應變處理效率依舊低落,導致發現入侵時間(Time to Detect,TTD)與有效反應時間(Time to Response,TTR) 越來越長,使得造成資安事件之攻擊者的布局時間越來越久,如此,更遑論依靠資安人員建立有效可靠的聯防機制。 However, most of the current information security event management systems/software focus on the storage of event logs (Event Log), and the filter conditions and association rules used are too rigid. As a result, the information security event management system/software only provides information security personnel with Neatly classified and statistical data (Data) is not enough help for information security personnel to grasp information security incidents and make decisions. Therefore, even if the company invests a large number of professional information security personnel, the information security personnel will not be able to understand the information security incidents. The response processing efficiency is still low, resulting in time to detect (TTD) and effective response time (Time to Response, TTR) It is getting longer and longer, making the deployment time of attackers who cause information security incidents longer and longer, not to mention relying on information security personnel to establish an effective and reliable joint defense mechanism.

綜上所述,可知先前技術中長期以來一直存在無法有效的自動化分析資安事件並執行防護的問題,因此有必要提出改進的技術手段,來解決此一問題。 To sum up, it can be seen that there has long been a problem in the previous technology that cannot effectively automatically analyze information security events and implement protection. Therefore, it is necessary to propose improved technical means to solve this problem.

有鑒於先前技術存在無法有效的自動分析資安事件並執行防護的問題,本發明遂揭露一種依記錄分析結果執行任務以實現設備聯防之系統及方法,其中:本發明所揭露之依記錄分析結果執行任務以實現設備聯防之系統,至少包含:任務設定模組,用以設定多個維運任務;事件監控模組,用以讀取運作記錄,並分析運作記錄以取得異常事件;威脅分析模組,用以分析異常事件以選出維運任務;任務執行模組,用以執行被選出之維運任務以使第一網路節點執行對應之第一運作方案,及用以接收與第一網路節點對應之運作報告,並依據運作報告判斷資安問題存在時,執行被選出之維運任務以使第二網路節點執行第一運作方案。 In view of the problem that the prior art cannot effectively automatically analyze information security events and perform protection, the present invention discloses a system and method for performing tasks based on recorded analysis results to achieve joint defense of equipment, wherein: the disclosed analysis results based on recorded analysis results are disclosed in the present invention A system that performs tasks to achieve joint defense of equipment must at least include: a task setting module to set multiple maintenance and operation tasks; an event monitoring module to read and analyze operation records to obtain abnormal events; a threat analysis module The group is used to analyze abnormal events to select maintenance and operation tasks; the task execution module is used to execute the selected maintenance and operation tasks so that the first network node executes the corresponding first operation plan, and is used to receive and communicate with the first network node. According to the operation report corresponding to the network node, and when it is judged that there is an information security problem based on the operation report, the selected maintenance operation task is executed so that the second network node executes the first operation plan.

本發明所揭露之依記錄分析結果執行任務以實現設備聯防之方法,其步驟至少包括:設定多個維運任務;讀取運作記錄,並分析運作記錄以取得異常事件;分析異常事件以選出維運任務;執行被選出之維運任務以使第一網路節點執行對應之第一運作方案;接收與第一網路節點對應之運作報告, 並依據運作報告判斷資安問題存在時,執行被選出之維運任務以使第二網路節點執行第一運作方案。 The method disclosed in the present invention performs tasks according to the record analysis results to realize joint defense of equipment. The steps include at least: setting multiple maintenance tasks; reading operation records and analyzing the operation records to obtain abnormal events; analyzing abnormal events to select maintenance tasks. operation task; execute the selected maintenance operation task so that the first network node executes the corresponding first operation plan; receive the operation report corresponding to the first network node, And when it is judged that there is an information security problem based on the operation report, the selected maintenance and operation task is executed so that the second network node executes the first operation plan.

本發明所揭露之系統與方法如上,與先前技術之間的差異在於本發明透過分析網路節點的運作記錄以選擇對應的維運任務,並執行被選擇的維運任務以使網路節點執行對應的運作方案,藉以與網路節點進行聯防,藉以解決先前技術所存在的問題,並可以達成網路設備聯防自動化之技術功效。 The system and method disclosed by the present invention are as described above. The difference between the system and the prior art is that the present invention selects the corresponding maintenance and operation tasks by analyzing the operation records of the network nodes, and executes the selected maintenance and operation tasks to enable the network nodes to execute The corresponding operation plan is used to conduct joint defense with network nodes to solve the problems existing in the previous technology and achieve the technical effect of automated joint defense of network equipment.

100:計算設備 100:Computing equipment

110:任務設定模組 110:Task setting module

120:事件監控模組 120:Event monitoring module

130:情資收集模組 130:Information collection module

150:威脅分析模組 150:Threat Analysis Module

160:設備通訊模組 160:Equipment communication module

170:任務執行模組 170:Task Execution Module

410:網路節點 410:Network node

411:電腦 411:Computer

413:伺服器 413:Server

415:資料電路端 415: Data circuit end

490:行動裝置 490:Mobile device

步驟210:設定維運任務 Step 210: Set maintenance tasks

步驟230:讀取運作記錄,並分析運作記錄以取得異常事件 Step 230: Read the operation record and analyze the operation record to obtain abnormal events

步驟240:收集威脅情資 Step 240: Gather threat intelligence

步驟250:分析異常事件以選出維運任務 Step 250: Analyze abnormal events to select maintenance tasks

步驟255:分析威脅情資以選出維運任務 Step 255: Analyze threat intelligence to select maintenance tasks

步驟261:依據異常事件判斷風險等級 Step 261: Determine the risk level based on abnormal events

步驟263:依據風險等級選擇行動裝置,並傳送通知訊息至行動裝置 Step 263: Select a mobile device according to the risk level and send a notification message to the mobile device

步驟265:接收行動裝置所傳送之確認訊息,並執行與確認訊息對應之維運任務 Step 265: Receive the confirmation message sent by the mobile device and perform the maintenance tasks corresponding to the confirmation message.

步驟270:執行被選出之維運任務,使第一網路節點執行對應之第一運作方案 Step 270: Execute the selected maintenance task so that the first network node executes the corresponding first operation plan

步驟271:通知第三網路節點對第一網路節點執行第二運作方案並接收第三網路節點所產生之運作報告 Step 271: Notify the third network node to execute the second operation plan on the first network node and receive the operation report generated by the third network node

步驟275:依據運作報告判斷資安問題存在時通知第一網路節點執行第一運作方案 Step 275: Notify the first network node to implement the first operation plan when it is determined based on the operation report that there is an information security problem.

步驟280:接收與第一網路節點對應之運作報告,並依據運作報告判斷資安問題存在時,執行被選出之維運任務以使第二網路節點執行第一運作方案 Step 280: Receive the operation report corresponding to the first network node, and when it is determined that an information security problem exists based on the operation report, execute the selected maintenance task to enable the second network node to execute the first operation plan.

第1圖為本發明所提之依記錄分析結果執行任務以實現設備聯防之系統架構圖。 Figure 1 is a system architecture diagram of the present invention for performing tasks based on record analysis results to achieve joint defense of equipment.

第2A圖為本發明所提之依記錄分析結果執行任務以實現設備聯防之方法流程圖。 Figure 2A is a flow chart of a method for performing tasks based on recorded analysis results to achieve joint defense of equipment proposed by the present invention.

第2B圖為本發明所提之依記錄分析結果執行任務以實現設備聯防之附加方法流程圖。 Figure 2B is a flow chart of an additional method for performing tasks based on record analysis results to achieve joint defense of equipment proposed by the present invention.

第2C圖為本發明所提之分析威脅情資選擇執行對應任務之方法流程圖。 Figure 2C is a flow chart of a method for analyzing threat information and selecting and executing corresponding tasks according to the present invention.

第2D圖為本發明所提之判斷風險等級以選擇通知對應行動裝置之方法流程圖。 Figure 2D is a flowchart of the method of judging the risk level and selecting and notifying the corresponding mobile device according to the present invention.

以下將配合圖式及實施例來詳細說明本發明之特徵與實施方式,內容足以使任何熟習相關技藝者能夠輕易地充分理解本發明解決技術問題所應用的技術手段並據以實施,藉此實現本發明可達成的功效。 The features and implementations of the present invention will be described in detail below with reference to the drawings and examples. The content is sufficient to enable any person familiar with the relevant art to easily fully understand the technical means used to solve the technical problems of the present invention and implement them accordingly, thereby achieving The effect that the present invention can achieve.

本發明可以對網路上之各種網路節點所產生的運作記錄進行分析,藉以判斷資安情境,並執行相對應的維運任務,使得同一網路上之網路節點可以進行聯合防禦。 The present invention can analyze the operation records generated by various network nodes on the network to determine the information security situation and perform corresponding maintenance tasks, so that network nodes on the same network can conduct joint defense.

其中,本發明所提之網路節點可以是資料電路端(DCE),如存取點、中繼器、集線器、橋接器、交換器、路由器、數據機等,網路節點也可以是資料終端(DTE),如電腦、工作站、伺服器等;運作記錄包含但不限於伺服器的伺服器日誌(log)、網路節點的防火牆記錄、防毒軟體記錄、入侵檢測(IDS)記錄、入侵防禦(IPS)記錄、網路終端的帳號登入記錄等;資安情境可以由資安人員自行定義,資安人員可以依據各種資安事件(如裝置被嘗試入侵、裝置已被入侵、裝置被攻擊、裝置中毒等)發生時可能產生的狀況定義相對應之資安情境的符合條件;維運任務包含調整(新增/修改/刪除)設定、規則(rule)、或策略(policy)等運作方案,也可以包含病毒掃描、弱點掃描、安裝系統更新或軟體更新等運作方案,但本發明所提之維運任務並不以上述為限。 Among them, the network node mentioned in the present invention can be a data circuit end (DCE), such as an access point, a repeater, a hub, a bridge, a switch, a router, a modem, etc. The network node can also be a data terminal. (DTE), such as computers, workstations, servers, etc.; operation records include but are not limited to server logs (logs) of servers, firewall records of network nodes, anti-virus software records, intrusion detection (IDS) records, intrusion prevention ( IPS) records, network terminal account login records, etc.; the information security situation can be defined by the information security personnel themselves, and the information security personnel can base on various information security events (such as the device is attempted to be invaded, the device has been invaded, the device is attacked, the device Poisoning, etc.) may occur when defining the qualifying conditions of the corresponding information security situation; maintenance tasks include adjusting (adding/modifying/deleting) settings, rules, or policies and other operational plans, as well as Operation plans may include virus scanning, vulnerability scanning, installation of system updates or software updates, etc., but the maintenance tasks mentioned in the present invention are not limited to the above.

以下先以「第1圖」本發明所提之依記錄分析結果執行任務以實現設備聯防之系統架構圖來說明本發明的系統運作。如「第1圖」所示,本發明之系統應用在網路環境中,包含計算設備100與網路節點410,其中,計算設備100含有任務設定模組110、事件監控模組120、威脅分析模組150、任務執行模組170,即可附加的情資收集模組130、設備通訊模組160。要說明的是,計算設 備100包含處理單元與記憶體單元,處理單元可以執行記憶體單元所儲存的一個或一連串計算機指令以產生上述各模組,以下將對各模組進一步說明。 The system operation of the present invention is first described below with reference to "Figure 1", a system architecture diagram of performing tasks according to the recorded analysis results to realize joint defense of equipment proposed by the present invention. As shown in "Figure 1", the system of the present invention is applied in a network environment and includes a computing device 100 and a network node 410. The computing device 100 includes a task setting module 110, an event monitoring module 120, and a threat analysis module. The module 150 and the task execution module 170 are the additional intelligence collection module 130 and the equipment communication module 160. It should be noted that the calculation design The device 100 includes a processing unit and a memory unit. The processing unit can execute one or a series of computer instructions stored in the memory unit to generate each of the above modules. Each module will be further described below.

任務設定模組110負責設定一個或多個維運任務。任務設定模組110所設定的每一個維運任務可以包含一個或多個運作方案,且可以對應一個資安情境。要說明的是,一個運作方案可能包含在不同的維運任務中。 The task setting module 110 is responsible for setting one or more maintenance tasks. Each maintenance task set by the task setting module 110 may include one or more operation plans and may correspond to an information security situation. It should be noted that an operation plan may be included in different maintenance tasks.

任務設定模組110可以提供文字編輯或圖形編輯的使用者設定介面以提供設定維運任務。 The task setting module 110 can provide a user setting interface for text editing or graphic editing to provide setting maintenance tasks.

事件監控模組120負責讀取一個或多個網路節點410所產生的一種或多種運作記錄。事件監控模組120可以讀取預先儲存在計算設備100之儲存媒體(圖中未示)中的運作記錄,或也可以連線到特定的網路節點410下載運作記錄,例如,事件監控模組120可以透過網路節點410所提供的應用程式介面(API)下載運作記錄,但本發明並不以此為限。 The event monitoring module 120 is responsible for reading one or more operation records generated by one or more network nodes 410 . The event monitoring module 120 can read the operation records pre-stored in the storage medium (not shown in the figure) of the computing device 100, or can also be connected to a specific network node 410 to download the operation records, for example, the event monitoring module 120 can download the operation record through the application programming interface (API) provided by the network node 410, but the present invention is not limited to this.

事件監控模組120可以分析所讀取到的運作記錄以取得一個或多個異常事件。更詳細的,事件監控模組120可以對運作記錄中的各種資料進行關聯分析、分類統計等分析作業,藉以判斷運作記錄中是否存在異常事件。舉例而言,若運作記錄為防火牆記錄,則運作記錄可以包含來源裝置與目的裝置之裝置識別資料、通訊埠號、連線時間、運作結果(允許或拒絕)等資料;若運作記錄為帳號登入記錄,則運作記錄可以包含登入(與被登入)裝置之裝置識別資料、登入時間、登入帳號、運作結果(成功登入或拒絕登入)等資料;若運作記錄為病毒/弱點掃描記錄,則運作記錄可以包含被掃描裝置之裝置識別資料、掃描時間、運作結果(掃瞄出的弱點/病毒及處理方式與結果)等資料;若運作記錄為入侵檢測/防禦記錄,則運作記錄可以包含來源裝置之裝置識別資 料、來源通訊埠號、目的通訊埠號、入侵時間、入侵行為等資料。事件監控模組120可以關聯各種運作記錄中的時間(連線時間、登入時間、入侵時間)與裝置識別資料(來源裝置及/或目的裝置)等資料以進行關聯分析,還可以統計相關聯之裝置識別資料(來源裝置及/或目的裝置)、通訊埠號、運作結果等資料並可以依據各種資料的統計值是否超過相對應之統計門檻值判斷是否存在異常事件。但事件監控模組120判斷異常事件是否存在之方式並不以上述為限。 The event monitoring module 120 can analyze the read operation records to obtain one or more abnormal events. In more detail, the event monitoring module 120 can perform correlation analysis, classification statistics and other analysis operations on various data in the operation records to determine whether there are abnormal events in the operation records. For example, if the operation record is a firewall record, the operation record can include the device identification data of the source device and the destination device, communication port number, connection time, operation result (allow or deny), etc.; if the operation record is an account login, record, the operation record can include the device identification data of the logged-in (and logged-in) device, login time, login account, operation result (successful login or refused login) and other information; if the operation record is a virus/weakness scanning record, the operation record It can include the device identification data of the scanned device, scan time, operation results (scanned vulnerabilities/viruses and processing methods and results) and other information; if the operation record is an intrusion detection/prevention record, the operation record can include the source device's information. device identifier data, source communication port number, destination communication port number, intrusion time, intrusion behavior and other information. The event monitoring module 120 can correlate data such as time (connection time, login time, intrusion time) and device identification data (source device and/or destination device) in various operation records to perform correlation analysis, and can also perform correlation statistics. Device identification data (source device and/or destination device), communication port number, operation results and other data can be used to determine whether there are abnormal events based on whether the statistical values of various data exceed the corresponding statistical thresholds. However, the way in which the event monitoring module 120 determines whether an abnormal event exists is not limited to the above.

在部分的實施例中,事件監控模組120也可以先對運作記錄進行前置處理,例如文字分析、語意分析、條件過濾等,藉以刪去運作記錄中給資安人員提示等與實際運作無關的資料或訊息,再對經過前置處理的運作記錄進行關聯分析、分類統計等分析作業,進而增加異常事件的判斷正確率。 In some embodiments, the event monitoring module 120 can also perform pre-processing on the operation records, such as text analysis, semantic analysis, conditional filtering, etc., so as to delete prompts to security personnel in the operation records that are irrelevant to the actual operation. data or information, and then perform correlation analysis, classification statistics and other analysis operations on the pre-processed operation records, thereby increasing the accuracy of judgment of abnormal events.

事件監控模組120也可以在取得異常事件時,取得異常事件的風險等級。例如,事件監控模組120可以預先建立各種異常事件的風險等級,藉以在判斷異常事件存在時,讀出與所判斷出之異常事件的風險等級,但本發明並不以此為限。 The event monitoring module 120 may also obtain the risk level of the abnormal event when obtaining the abnormal event. For example, the event monitoring module 120 can pre-establish the risk levels of various abnormal events, so that when determining the existence of an abnormal event, the event monitoring module 120 can read and determine the risk level of the abnormal event, but the present invention is not limited thereto.

情資收集模組130可以收集威脅情資。更詳細的說,情資收集模組130可以由開源免費的網路資源(包含黑暗網站或免費的惡意程式分析網站或惡意程式的討論區或論壇等)或商用付費的資源提供商取得威脅情資,也可以由資安資訊分享與分析中心(Information Sharing and Analysis Center,ISAC)等資安中心取得威脅情資,但情資收集模組130取得威脅情資的方式並不以上述為限。其中,情資收集模組130可以依據免費之網路資源所規定的資料格式、資源提供商或資安中心所設定的資料格式,由網路資源所提供的網頁或資源提供商 或資安中心所提供的資料中取得威脅情資;情資收集模組130也可以對沒有既定格式的網路資源或資料檔案進行文字及/或語意等分析,藉以取得威脅情資。 The intelligence collection module 130 can collect threat intelligence. In more detail, the intelligence collection module 130 can obtain threat information from open source free network resources (including dark websites or free malware analysis websites or malware discussion areas or forums, etc.) or commercial paid resource providers. Threat information can also be obtained from information security centers such as Information Sharing and Analysis Center (ISAC), but the method by which the intelligence collection module 130 obtains threat information is not limited to the above. Among them, the information collection module 130 can be based on the data format specified by the free network resource, the data format set by the resource provider or the information security center, and the web page or resource provider provided by the network resource. Or obtain threat information from the data provided by the information security center; the intelligence collection module 130 can also perform text and/or semantic analysis on network resources or data files that do not have a predetermined format to obtain threat information.

情資收集模組130所收集到的威脅情資包含標的資訊與對應的操作手法。其中,標的資訊可以包含產生威脅之網路位址/網域名稱的黑名單、惡意程式的檔案名稱或雜湊(hash)值或其他特徵值,換句話說,標的資訊可以包含入侵威脅指標(Indicators of Compromise,IOC),但本發明並不以此為限;標的資訊也可以包含威脅的影響範圍與傷害程度;操作手法可以包含產生威脅所採用的工具、技術、及/或程式碼等。 The threat information collected by the intelligence collection module 130 includes target information and corresponding operating methods. Among them, the target information can include a blacklist of network addresses/domain names that generate threats, file names or hash values of malicious programs, or other characteristic values. In other words, the target information can include intrusion threat indicators (Indicators). of Compromise (IOC), but the present invention is not limited to this; the target information may also include the scope of influence and degree of damage of the threat; the operating methods may include the tools, techniques, and/or program codes used to generate the threat.

威脅分析模組150負責分析事件監控模組120所取得的異常事件。更詳細的,威脅分析模組150可以使用大數據分析結合人工智慧(AI)及/或機器學習(Machine Learning)分析異常事件,舉例來說,大數據分析可以分析記載異常事件之不同來源的運作記錄的特徵(如Volume、Velocity、Variety等特徵),藉以將不同來源之運作記錄中表示相同異常事件的資料歸類融合為一組異常事件(在本發明中亦以「異常事件組」表示),而人工智慧或機器學習之演算法可以計算出各異常事件組(各組經過歸類融合之異常事件)的特徵值,並可以依據特徵值所符合的門檻值將各組異常事件分類,威脅分析模組150可以依據人工智慧或機器學習之演算法的分類結果判斷各組異常事件所表示的資安情境。 The threat analysis module 150 is responsible for analyzing abnormal events obtained by the event monitoring module 120 . In more detail, the threat analysis module 150 can use big data analysis combined with artificial intelligence (AI) and/or machine learning (Machine Learning) to analyze abnormal events. For example, big data analysis can analyze the operations of different sources that record abnormal events. The recorded characteristics (such as Volume, Velocity, Variety, etc.) are used to classify and fuse the data representing the same abnormal event in the operation records from different sources into a group of abnormal events (also represented by the "abnormal event group" in the present invention) , and artificial intelligence or machine learning algorithms can calculate the characteristic values of each abnormal event group (each group of abnormal events that has been classified and merged), and can classify each group of abnormal events according to the threshold value that the characteristic value meets, threatening The analysis module 150 can determine the information security situation represented by each group of abnormal events based on the classification results of the artificial intelligence or machine learning algorithm.

威脅分析模組150也負責依據異常事件的分析結果由任務設定模組110所設定的維運任務選出對應的維運任務。一般而言,威脅分析模組150可以依據人工智慧或機器學習之演算法對各組異常事件之分類所表示的資安情境選擇相對應的維運任務。 The threat analysis module 150 is also responsible for selecting corresponding maintenance tasks from the maintenance tasks set by the task setting module 110 based on the analysis results of abnormal events. Generally speaking, the threat analysis module 150 can select corresponding maintenance tasks based on the information security situation represented by the classification of each group of abnormal events based on artificial intelligence or machine learning algorithms.

在部分的實施例中,威脅分析模組150在選擇維運任務時,除了參考異常事件的分類結果之外,還可以參考情資收集模組130所收集到的威脅情資。也就是說,威脅分析模組150可以依據情資收集模組130所收集到的威脅情資由任務設定模組110所設定的維運任務選擇對應的維運任務。 In some embodiments, when selecting maintenance tasks, the threat analysis module 150 may, in addition to referring to the classification results of abnormal events, also refer to the threat information collected by the intelligence collection module 130 . That is to say, the threat analysis module 150 can select a corresponding maintenance task based on the threat information collected by the intelligence collection module 130 and the maintenance task set by the task setting module 110 .

要說明的是,維運任務並不一定只包含增加或調整設定/規則/策略的運作方案,也可以包含刪除設定/規則/策略的運作方案,例如,當威脅分析模組150依據威脅情資確認過去產生威脅的網站/網域等特定標的已不再被記錄於威脅情資中或於威脅情資中被標記註銷時,維運任務可以包含刪除有關該特定標的之設定/規則/策略的運作方案。 It should be noted that the maintenance task does not necessarily include only adding or adjusting the operation plan of settings/rules/policies, but may also include the operation plan of deleting settings/rules/policies. For example, when the threat analysis module 150 operates based on threat intelligence, When confirming that specific targets such as websites/domains that have generated threats in the past are no longer recorded in the threat information or are marked for deregistration in the threat information, the maintenance tasks can include deleting the settings/rules/policies related to the specific target. Operational plan.

威脅分析模組150也可以依據異常事件的分類結果取得相對應的風險等級。舉例來說,威脅分析模組150可以依據異常事件之分類所表示的資安情境讀取對應的風險等級,其中,資安情境與風險等級的對應關係可以由設定資安情境與風險等級的資安人員預先定義;威脅分析模組150也可以依據異常事件之分類可能的影響範圍、處理複雜度、傷害程度等參數決定風險等級,例如,威脅分析模組150可以對各種不同的參數分別定義對應的數值,並加總與各參數對應的數值後,依據總和值決定風險等級,但本發明並不以此為限。 The threat analysis module 150 can also obtain the corresponding risk level based on the classification results of abnormal events. For example, the threat analysis module 150 can read the corresponding risk level according to the information security situation represented by the classification of abnormal events, where the correspondence between the information security situation and the risk level can be determined by the information that sets the information security situation and risk level. Security personnel pre-define; the threat analysis module 150 can also determine the risk level based on parameters such as the possible impact scope, processing complexity, and degree of damage of the abnormal event classification. For example, the threat analysis module 150 can define corresponding parameters for various parameters. , and after adding up the values corresponding to each parameter, the risk level is determined based on the sum value, but the present invention is not limited to this.

設備通訊模組160可以在事件監控模組120分析出異常事件時,傳送通知訊息至行動裝置490;設備通訊模組160也可以在事件監控模組120或威脅分析模組150判斷出風險等級時,依據被判斷出之風險等級選擇行動裝置490,並傳送通知訊息至所選出的行動裝置490,舉例來說,設備通訊模組160可以預先設定各個風險等級所對應的權限,也可以設定各個行動裝置之使用者的權 限,藉以可以依據被判斷出之風險等級選擇具有對應權限之使用者的行動裝置;另外,設備通訊模組160也可以接收行動裝置490所傳回的確認訊息。 The device communication module 160 can send a notification message to the mobile device 490 when the event monitoring module 120 analyzes an abnormal event; the device communication module 160 can also send a notification message to the mobile device 490 when the event monitoring module 120 or the threat analysis module 150 determines the risk level. , select a mobile device 490 based on the judged risk level, and send a notification message to the selected mobile device 490. For example, the device communication module 160 can preset permissions corresponding to each risk level, and can also set each action. Device user rights Limit, so that the mobile device of the user with corresponding permissions can be selected according to the judged risk level; in addition, the device communication module 160 can also receive the confirmation message returned by the mobile device 490.

要說明的是,設備通訊模組160並不限於只傳送通知訊息給一個行動裝置490,也就是說,設備通訊模組160也可以選擇一個或多個行動裝置490,並傳送通知訊息給所有被選擇的行動裝置490;設備通訊模組160也可以接收一個或多個行動裝置490所傳回的確認訊息。 It should be noted that the device communication module 160 is not limited to sending notification messages to only one mobile device 490. That is to say, the device communication module 160 can also select one or more mobile devices 490 and send notification messages to all mobile devices 490. The selected mobile device 490; the device communication module 160 may also receive confirmation messages returned by one or more mobile devices 490.

設備通訊模組160可以透過簡訊、即時通訊、電子郵件、推播等方式傳送通知訊息到行動裝置490,並同樣可以透過簡訊、即時通訊、電子郵件、推播等方式接收行動裝置490所傳回的確認訊息。 The device communication module 160 can send notification messages to the mobile device 490 through SMS, instant messaging, email, push, etc., and can also receive notification messages from the mobile device 490 through SMS, instant messaging, email, push, etc. confirmation message.

任務執行模組170負責執行被威脅分析模組150所選出之維運任務,使得一個或多個第一網路節點執行與被執行之維運任務對應的第一運作方案,藉以讓計算設備100與各個第一網路節點進行聯合防禦。以實際的例子來說,若第一網路節點為路由器或交換器等資料電路端,任務執行模組170可以連線到第一網路節點調整第一網路節點的存取控制列表(Access Control List,ACL),藉以阻止異常的連線,或開放連線到特定網站或網域等;又如第一網路節點為電腦411或伺服器413等資料終端,任務執行模組170可以透過第一網路節點所提供的API遠端調整第一網路節點的系統設定/軟體設定及/或調整安全性規則/安全性策略,或對第一網路節點進行特定弱點的掃描並在第一網路節點存在該弱點時通知第一網路節點執行系統更新或軟體更新,或通知第一網路節點執行弱點掃描並依據掃描結果判斷是否執行系統或軟體更新。其中,第一網路節點通常為與事件監控模組120所取得之異常事件有關的網路節點,例如,異常事件的產生節點或發生節點等。 The task execution module 170 is responsible for executing the maintenance and operation tasks selected by the threat analysis module 150, so that one or more first network nodes execute the first operation plan corresponding to the executed maintenance and operation tasks, so that the computing device 100 Conduct joint defense with each first network node. Taking a practical example, if the first network node is a data circuit end such as a router or a switch, the task execution module 170 can be connected to the first network node to adjust the access control list (Access Control List) of the first network node. Control List (ACL) to prevent abnormal connections or open connections to specific websites or domains; and if the first network node is a data terminal such as a computer 411 or a server 413, the task execution module 170 can The API provided by the first network node remotely adjusts the system settings/software settings of the first network node and/or adjusts security rules/security policies, or scans the first network node for specific vulnerabilities and scans the first network node for specific vulnerabilities. When a network node has the vulnerability, the first network node is notified to perform a system update or software update, or the first network node is notified to perform a vulnerability scan and determine whether to perform a system or software update based on the scan results. The first network node is usually a network node related to the abnormal event obtained by the event monitoring module 120, for example, the generation node or occurrence node of the abnormal event, etc.

任務執行模組170也可以接收與第一網路節點對應的運作報告。任務執行模組170所接收到的運作報告包含但不限於弱點/病毒掃描報告、攻擊測試報告等,但本發明並不以此為限。其中,任務執行模組170所接收到的運作報告可以是第一網路節點執行第一運作方案而產生,也可以是與第一網路節點不同的第三網路節點對第一網路節點執行第二運作方案而產生。 The task execution module 170 may also receive an operation report corresponding to the first network node. The operation reports received by the task execution module 170 include but are not limited to vulnerability/virus scanning reports, attack test reports, etc., but the present invention is not limited thereto. The operation report received by the task execution module 170 may be generated by the first network node executing the first operation plan, or may be generated by a third network node different from the first network node. Generated by executing the second operation plan.

以實際的例子來說,任務執行模組170可以通知第三網路節點執行第二運作方案並接收第三網路節點執行第二運作方案所產生的運作報告,及依據所接收到的運作報告判斷資安問題存在時通知第一網路節點執行第一運作方案。舉如,若第一網路節點為電腦411、第三網路節點弱點/病毒掃描伺服器413,任務執行模組170執行維運任務後可以使第三網路節點為第一網路節點進行弱點/病毒掃描,並在掃描後將所產生之弱點/病毒掃描報告等運作報告傳回任務執行模組170,任務執行模組170可以在第三網路節點所產生之弱點/病毒掃描報告(運作報告)的內容表示偵測到第一網路節點存在弱點/病毒時,通知第一網路節點執行系統更新或軟體更新,或刪除病毒檔案等第一運作方案,藉以修補弱點/清除病毒。 Taking a practical example, the task execution module 170 can notify the third network node to execute the second operation plan and receive an operation report generated by the third network node executing the second operation plan, and based on the received operation report When it is determined that an information security problem exists, the first network node is notified to execute the first operation plan. For example, if the first network node is the computer 411 and the third network node vulnerability/virus scanning server 413, the task execution module 170 can cause the third network node to perform maintenance tasks for the first network node after executing the maintenance task. Weakness/virus scanning, and after scanning, the generated vulnerability/virus scanning report and other operational reports are sent back to the task execution module 170. The task execution module 170 can generate the vulnerability/virus scanning report on the third network node ( The content of the operation report) indicates that when a vulnerability/virus is detected on the first network node, the first network node is notified to perform a system update or software update, or delete the virus file, etc., to repair the vulnerability/remove the virus.

任務執行模組170也可以依據所接收到的運作報告判斷資安問題是否存在。如上所述,任務執行模組170可以透過弱點/病毒掃描報告或攻擊測試報告等運作報告的內容判斷第一網路節點是否存在弱點或病毒,但本發明並不以此為限。 The task execution module 170 can also determine whether an information security problem exists based on the received operation report. As mentioned above, the task execution module 170 can determine whether there is a vulnerability or virus in the first network node through the content of the operation report such as the vulnerability/virus scanning report or the attack test report, but the invention is not limited thereto.

任務執行模組170也可以依據事件監控模組120或威脅分析模組150所判斷出之風險等級選擇直接執行威脅分析模組150所選擇的維運任務,或選擇等待設備通訊模組160接收到行動裝置490所傳送的確認訊息,並執行與確 認訊息對應的維運任務,例如,當確認訊息表示確認執行維運任務時,任務執行模組170可以執行確認執行之由威脅分析模組150所選擇的維運任務;而當確認訊息表示執行指定的維運任務時,任務執行模組170可以執行確認訊息中所指定的維運任務。 The task execution module 170 can also choose to directly execute the maintenance and operation task selected by the threat analysis module 150 based on the risk level judged by the event monitoring module 120 or the threat analysis module 150, or choose to wait for the device communication module 160 to receive The confirmation message sent by the mobile device 490, and execution and confirmation The maintenance and operation task corresponding to the confirmation message. For example, when the confirmation message indicates confirmation of execution of the maintenance and operation task, the task execution module 170 can execute the maintenance and operation task selected by the threat analysis module 150 for confirmed execution; and when the confirmation message indicates execution of the maintenance and operation task, When specifying the maintenance task, the task execution module 170 can execute the maintenance task specified in the confirmation message.

在部分的實施例中,若設備通訊模組160接收到多個行動裝置490所傳回的確認訊息,則任務執行模組170可以選擇執行設備通訊模組160最早接收到之確認訊息所對應的維運任務;任務執行模組170也可以由設備通訊模組160所接收之確認訊息中選出具有最高權限之使用者的行動裝置所傳回之確認訊息,並執行所選出之確認訊息所對應的維運任務。任務執行模組170也可以將表示所執行之維運任務的執行訊息傳送給先前傳送通知訊息的所有行動裝置490。 In some embodiments, if the device communication module 160 receives confirmation messages returned by multiple mobile devices 490, the task execution module 170 may choose to execute the task corresponding to the earliest confirmation message received by the device communication module 160. Maintenance tasks; the task execution module 170 can also select the confirmation message returned by the mobile device of the user with the highest authority from the confirmation message received by the device communication module 160, and execute the task corresponding to the selected confirmation message. Maintenance tasks. The task execution module 170 may also send an execution message indicating the executed maintenance task to all mobile devices 490 that previously sent notification messages.

任務執行模組170也可以依據所接收到的運作報告判斷資安問題存在時,再次執行被選出的維運任務以使一個或多個第二網路節點執行第一運作方案。任務執行模組170使第二網路節點執行第一運作方案的方式與使第一網路節點執行第一運作方案的方式相同,故不再贅述。其中,第二網路節點可以是網路上不為第一網路節點的其他所有網路節點,或是與第一網路節點具有相同身分的其他網路節點,如第一網路節點為伺服器時,第二網路節點可以是其他所有伺服器或其他所有資料終端等;又如,第一網路節點為交換器或路由器時,第二網路節點可以是其他所有交換器或路由器或其他所有資料電路端等。 When the task execution module 170 determines that an information security problem exists based on the received operation report, it can execute the selected maintenance task again to enable one or more second network nodes to execute the first operation plan. The way in which the task execution module 170 causes the second network node to execute the first operation plan is the same as the way in which the first network node executes the first operation plan, so the details will not be described again. The second network node can be all other network nodes on the network that are not the first network node, or other network nodes with the same identity as the first network node. For example, the first network node is a server When the first network node is a switch or router, the second network node can be all other switches or routers or All other data circuit terminals, etc.

要特別說明的是,在某些實施例中,上述各模組並不一定同時包含在計算設備100中,例如,事件監控模組120與其他模組可以分別設置在不同的兩個計算設備中,但本發明並不以此為限。 It should be noted that in some embodiments, the above-mentioned modules are not necessarily included in the computing device 100 at the same time. For example, the event monitoring module 120 and other modules can be respectively provided in two different computing devices. , but the present invention is not limited to this.

接著以一個實施例來解說本發明的運作系統與方法,並請參照「第2A圖」本發明所提之依記錄分析結果執行任務以實現設備聯防之方法流程圖。 Next, an embodiment will be used to explain the operating system and method of the present invention, and please refer to "Figure 2A" for the flow chart of the method of performing tasks based on the recorded analysis results to achieve joint defense of equipment according to the present invention.

首先,管理者需要透過任務設定模組110在執行本發明的計算設備100上設定維運任務(步驟210)。在本實施例中,假設使用者可以預設各種資安情境,並設定各種資安情境的滿足條件與相對應的維運任務。 First, the administrator needs to set maintenance tasks on the computing device 100 executing the present invention through the task setting module 110 (step 210). In this embodiment, it is assumed that the user can preset various information security scenarios, and set the conditions for satisfying various information security scenarios and corresponding maintenance tasks.

而在計算設備100開始運行後,事件監控模組120可以讀取各個網路節點410的運作記錄,並對所讀取到的運作記錄進行分析,藉以在分析後取得異常事件(步驟230)。在本實施例中,假設運作記錄包含多個伺服器的伺服器日誌與多個網路節點的流量資料,事件監控模組120可以依據各個伺服器日誌與各個網路節點的流量資料判斷是否存在異常事件,例如,是否在不合理的時間連線或登入、是否在短時間內多次連線或錯誤登入等,若是,則表示異常事件發生。 After the computing device 100 starts running, the event monitoring module 120 can read the operation records of each network node 410 and analyze the read operation records to obtain abnormal events after analysis (step 230). In this embodiment, assuming that the operation records include server logs of multiple servers and traffic data of multiple network nodes, the event monitoring module 120 can determine whether there is a problem based on each server log and traffic data of each network node. Abnormal events, for example, whether you connect or log in at an unreasonable time, connect or log in incorrectly multiple times in a short period of time, etc. If so, it means that an abnormal event has occurred.

在任務設定模組110完成維運任務的設定(步驟210)且事件監控模組120分析運作記錄取得異常事件(步驟230)後,威脅分析模組150可以透過人工智慧/機器學習分析異常事件以選出相對應的維運任務(步驟250)。在本實施例中,假設任務設定模組110可以對與異常事件有關之運作記錄進行大數據分析以關聯多個異常事件之異常資料,並將分析出被關聯為同一異常事件的一個或多個異常資料逐一提供給人工智慧或機器學習演算法所產生的分類模型,使得分類模型輸出各個異常事件的分類,例如將異常事件分類為漏洞攻擊及/或異常登入等,如此,威脅分析模組150可以選擇與異常事件之分類對應之資安情境相對應的維運任務。 After the task setting module 110 completes the setting of the maintenance task (step 210) and the event monitoring module 120 analyzes the operation record to obtain abnormal events (step 230), the threat analysis module 150 can analyze the abnormal events through artificial intelligence/machine learning to Select the corresponding maintenance task (step 250). In this embodiment, it is assumed that the task setting module 110 can perform big data analysis on operation records related to abnormal events to correlate abnormal data of multiple abnormal events, and will analyze one or more abnormal events that are related to the same abnormal event. The abnormal data are provided one by one to the classification model generated by the artificial intelligence or machine learning algorithm, so that the classification model outputs the classification of each abnormal event, such as classifying the abnormal events into vulnerability attacks and/or abnormal logins, etc. In this way, the threat analysis module 150 You can select maintenance tasks corresponding to the information security situation corresponding to the classification of abnormal events.

在威脅分析模組150選出維運任務後,任務執行模組170可以執行威脅分析模組150所選出的維運任務,使得第一網路節點執行對應的第一運作方案(步驟270),藉以讓計算設備100與第一網路節點進行聯合防禦。在本實施例中,假設任務執行模組170所執行的維運任務包含通知被攻擊之電腦411或伺服器413等資料終端(第一網路節點)進行弱點掃描,使得資料終端在掃瞄出漏洞等弱點時執行系統/軟體更新以修補被攻擊之漏洞等弱點,同時任務執行模組170所執行的維運任務也可以包含設定資料電路端415(另一個第一網路節點)之存取控制列表之指令以拒絕被攻擊之資料終端的大部分連線,而只保留被攻擊之資料終端與計算設備100間之特定通訊埠及被攻擊之資料終端與儲存更新檔案之檔案伺服器間下載檔案之通訊埠的連線等,直到被攻擊之資料終端完成弱點的修補,即任務執行模組170可以在被攻擊之資料終端傳送之弱點/病毒偵測報告表示資料終端被攻擊之漏洞等弱點已經不存在後,通知資料電路端415刪除存取控制列表中關於拒絕資料終端連線的指令(另一個第一運作方案)。 After the threat analysis module 150 selects the maintenance and operation task, the task execution module 170 can execute the maintenance and operation task selected by the threat analysis module 150, so that the first network node executes the corresponding first operation plan (step 270), thereby Let the computing device 100 and the first network node perform joint defense. In this embodiment, it is assumed that the maintenance task executed by the task execution module 170 includes notifying the data terminal (first network node) such as the attacked computer 411 or server 413 to perform vulnerability scanning, so that the data terminal can perform vulnerability scanning after scanning. When vulnerabilities and other vulnerabilities occur, system/software updates are performed to patch the exploited vulnerabilities and other vulnerabilities. At the same time, the maintenance tasks performed by the task execution module 170 may also include access to the configuration data circuit end 415 (another first network node). The command of the control list is to deny most connections of the attacked data terminal, and only retain the specific communication port between the attacked data terminal and the computing device 100 and the download between the attacked data terminal and the file server storing the update file. The connection of the communication port of the file, etc., until the attacked data terminal completes the vulnerability repair, that is, the task execution module 170 can send a vulnerability/virus detection report on the attacked data terminal to indicate the vulnerability and other vulnerabilities of the data terminal being attacked. After it no longer exists, the data circuit terminal 415 is notified to delete the instruction regarding rejecting the data terminal connection in the access control list (another first operation plan).

在任務執行模組170執行威脅分析模組150所選出的維運任務使得第一網路節點執行對應的第一運作方案(步驟270)後,任務執行模組170可以接收與第一網路節點對應的運作報告,並可以依據所接收到的運作報告判斷資安問題存在時,再次執行被威脅分析模組150選出之維運任務以使第二網路節點執行與被選出之維運任務對應的第一運作方案(步驟280)。在本實施例中,假設任務執行模組170可以接收第一網路節點所傳回的運作報告,並可以在運作報告中包含掃瞄出弱點/病毒或已修復弱點/已清除病毒等訊息時判斷資安問題存在,如此,任務執行模組170可以通知其他資料終端(第二網路節點)進行弱點掃描,使得第二網路節點在掃瞄出漏洞等弱點時執行系統/軟體更新以修補被 攻擊之漏洞等弱點,並可以設定資料電路端415之存取控制列表以拒絕存在漏洞之資料終端的大部分連線,直到存在漏洞之資料終端完成弱點的修補。 After the task execution module 170 executes the maintenance and operation task selected by the threat analysis module 150 so that the first network node executes the corresponding first operation plan (step 270), the task execution module 170 may receive the information from the first network node. Corresponding operation report, and when it can be judged that an information security problem exists based on the received operation report, the maintenance operation task selected by the threat analysis module 150 is executed again so that the second network node executes the maintenance operation task corresponding to the selection. The first operation plan (step 280). In this embodiment, it is assumed that the task execution module 170 can receive the operation report returned by the first network node, and can include in the operation report information such as when a vulnerability/virus has been scanned or a vulnerability has been repaired/virus has been removed. It is determined that the information security problem exists. In this way, the task execution module 170 can notify other data terminals (second network nodes) to perform vulnerability scanning, so that when the vulnerabilities and other weaknesses are scanned, the second network node performs system/software updates to fix them. quilt Attack vulnerabilities and other vulnerabilities, and the access control list of the data circuit terminal 415 can be set to deny most connections from the vulnerable data terminal until the vulnerable data terminal completes the patching of the vulnerability.

在任務執行模組170執行威脅分析模組150所選出的維運任務,使得第一網路節點執行對應的第一運作方案(步驟270)時,如「第2B圖」之流程所示,任務執行模組170也可以通知弱點/病毒掃描伺服器413(第三網路節點)對第一網路節點執行第二運作方案,也就是通知弱點/病毒掃描伺服器413對第一網路節點進行弱點/病毒掃描,並產生對應的運作報告(步驟271),任務執行模組170可以依據弱點/病毒掃描伺服器413所傳回的運作報告判斷資安問題存在於第一網路節點中時,通知第一網路節點執行第一運作方案(步驟275)。 When the task execution module 170 executes the maintenance and operation task selected by the threat analysis module 150 so that the first network node executes the corresponding first operation plan (step 270), as shown in the process of "Figure 2B", the task The execution module 170 can also notify the vulnerability/virus scanning server 413 (the third network node) to execute the second operation plan on the first network node, that is, notify the vulnerability/virus scanning server 413 to execute the second operation plan on the first network node. Vulnerability/virus scanning is performed and a corresponding operation report is generated (step 271). The task execution module 170 can determine that the information security problem exists in the first network node based on the operation report returned by the vulnerability/virus scanning server 413. Notify the first network node to execute the first operation plan (step 275).

另外,若計算設備100包含情資收集模組130,則如「第2C圖」之流程所示,在任務設定模組110完成維運任務的設定(步驟210)後,情資收集模組130可以收集威脅情資(步驟240),威脅分析模組150可以分析情資收集模組130所收集到的威脅情資以選出對應的維運任務(步驟255),任務執行模組170可以執行威脅分析模組150所選出的維運任務,使得第一網路節點執行對應之第一運作方案(步驟270)。在本實施例中,假設威脅情資中註銷過去產生威脅的網站/網域等特定標的時,威脅分析模組150可以選擇包含刪除有關該特定標的之設定/規則/策略之運作方案的維運任務,使得任務執行模組170在執行威脅分析模組150所選出的維運任務後,各個資料電路端(第一網路節點)可以執行刪除特定標的之連線的運作方案。 In addition, if the computing device 100 includes the intelligence collection module 130, as shown in the process of "Figure 2C", after the task setting module 110 completes the setting of the maintenance task (step 210), the intelligence collection module 130 Threat information can be collected (step 240), the threat analysis module 150 can analyze the threat information collected by the intelligence collection module 130 to select corresponding maintenance tasks (step 255), and the task execution module 170 can execute the threat The maintenance task selected by the analysis module 150 causes the first network node to execute the corresponding first operation plan (step 270). In this embodiment, when a specific target such as a website/domain that has generated threats in the past is deregistered from the threat information, the threat analysis module 150 may choose to include the operation plan of deleting the settings/rules/policies related to the specific target. task, so that after the task execution module 170 executes the maintenance task selected by the threat analysis module 150, each data circuit end (first network node) can execute the operation plan of deleting the connection of the specific target.

此外,若計算設備100還包含設備通訊模組160,如「第2D圖」之流程所示,則在事件監控模組120取得異常事件(步驟230)後,事件監控模組120或威脅分析模組150可以依據異常事件判斷風險等級(步驟261),設備通訊 模組160可以依據事件監控模組120或威脅分析模組150所判斷出之風險等級選擇是否傳送通知訊息,若否,則結束執行不傳送通知訊息,若是,則設備通訊模組160可以依據風險等級選擇符合權限之使用者的行動裝置490,並將所產生的通知訊息傳送給所選出的行動裝置490(步驟263),任務執行模組170可以執行威脅分析模組150所選出的維運任務(步驟250、270)。 In addition, if the computing device 100 also includes a device communication module 160, as shown in the process of "Figure 2D", after the event monitoring module 120 obtains the abnormal event (step 230), the event monitoring module 120 or the threat analysis module Group 150 can determine the risk level based on abnormal events (step 261), and the device communicates The module 160 can choose whether to send the notification message based on the risk level determined by the event monitoring module 120 or the threat analysis module 150. If not, the execution will be terminated without sending the notification message. If so, the device communication module 160 can choose based on the risk. The level selects the mobile device 490 of the user that meets the authority, and sends the generated notification message to the selected mobile device 490 (step 263). The task execution module 170 can execute the maintenance and operation task selected by the threat analysis module 150. (Steps 250, 270).

設備通訊模組160也可以在傳送通知訊息給所選出的行動裝置490後,等待行動裝置490傳回確認訊息。當設備通訊模組160接收到行動裝置490所傳回的確認訊息時,任務執行模組170可以執行與設備通訊模組160所接收到之確認訊息對應的維運任務(步驟265)。例如,執行確認訊息所確認之由威脅分析模組150所選出的維運任務,或是執行確認訊息所指定的維運任務。 The device communication module 160 may also wait for the mobile device 490 to return a confirmation message after sending the notification message to the selected mobile device 490 . When the device communication module 160 receives the confirmation message returned by the mobile device 490, the task execution module 170 can execute the maintenance task corresponding to the confirmation message received by the device communication module 160 (step 265). For example, the maintenance task selected by the threat analysis module 150 confirmed by the confirmation message is executed, or the maintenance task specified by the confirmation message is executed.

綜上所述,可知本發明與先前技術之間的差異在於具有分析網路節點的運作記錄以選擇對應的維運任務,並執行被選擇的維運任務以使網路節點執行對應的運作方案,藉以與網路節點進行聯防之技術手段,藉由此一技術手段可以來解決先前技術所存在無法有效的自動分析資安事件並執行防護的問題,進而達成網路設備聯防自動化之技術功效。 In summary, it can be seen that the difference between the present invention and the prior art lies in the ability to analyze the operation records of network nodes to select corresponding maintenance and operation tasks, and execute the selected maintenance and operation tasks to enable the network nodes to execute corresponding operation plans. , a technical means for joint defense with network nodes. This technical means can solve the problem of the inability of previous technologies to effectively automatically analyze information security events and implement protection, thereby achieving the technical effect of automated joint defense of network equipment.

再者,本發明之依記錄分析結果執行任務以實現設備聯防之方法,可實現於硬體、軟體或硬體與軟體之組合中,亦可在電腦系統中以集中方式實現或以不同元件散佈於若干互連之電腦系統的分散方式實現。 Furthermore, the method of performing tasks based on the recorded analysis results to achieve joint defense of equipment according to the present invention can be implemented in hardware, software, or a combination of hardware and software. It can also be implemented in a centralized manner in a computer system or distributed with different components. Implemented in a decentralized manner across several interconnected computer systems.

雖然本發明所揭露之實施方式如上,惟所述之內容並非用以直接限定本發明之專利保護範圍。任何本發明所屬技術領域中具有通常知識者,在不脫離本發明所揭露之精神和範圍的前提下,對本發明之實施的形式上及細節 上作些許之更動潤飾,均屬於本發明之專利保護範圍。本發明之專利保護範圍,仍須以所附之申請專利範圍所界定者為準。 Although the embodiments of the present invention are disclosed above, the content described is not intended to directly limit the scope of patent protection of the present invention. Any person with ordinary knowledge in the technical field to which the present invention belongs can make no reservations about the form and details of the implementation of the present invention without departing from the spirit and scope of the present invention. Slight modifications and modifications made above all fall within the scope of patent protection of the present invention. The scope of patent protection for this invention must still be defined by the scope of the attached patent application.

步驟210:設定維運任務 Step 210: Set maintenance tasks

步驟230:讀取運作記錄,並分析運作記錄以取得異常事件 Step 230: Read the operation record and analyze the operation record to obtain abnormal events

步驟250:分析異常事件以選出維運任務 Step 250: Analyze abnormal events to select maintenance tasks

步驟270:執行被選出之維運任務,使第一網路節點執行對應之第一運作方案 Step 270: Execute the selected maintenance task so that the first network node executes the corresponding first operation plan

步驟280:接收與第一網路節點對應之運作報告,並依據運作報告判斷資安問題存在時,執行被選出之維運任務以使第二網路節點執行第一運作方案 Step 280: Receive the operation report corresponding to the first network node, and when it is determined that an information security problem exists based on the operation report, execute the selected maintenance task to enable the second network node to execute the first operation plan.

Claims (10)

一種依記錄分析結果執行任務以實現設備聯防之系統,該系統至少包含:多個網路節點,包含至少一第一網路節點及至少一第二網路節點,該至少一第二網路節點為與該至少一第一網路節點不同的其他網路節點或與該至少一第一網路節點具有相同身分的其他網路節點;及一計算設備,其中更包含:一任務設定模組,用以設定多個維運任務;一事件監控模組,用以讀取該些網路節點之至少一運作記錄,並分析該至少一運作記錄以取得至少一異常事件,該至少一異常事件與該至少一第一網路節點有關;一威脅分析模組,用以分析該至少一異常事件以由該些維運任務選出其中之一;及一任務執行模組,用以執行該被選出之維運任務以使該至少一第一網路節點執行對應之一第一運作方案,及用以於該至少一第一網路節點執行該第一運作方案後接收與該至少一第一網路節點對應之一運作報告,並依據該運作報告判斷該至少一第一網路節點存在資安問題時,執行該被選出之維運任務以使該至少一第二網路節點執行該第一運作方案。 A system that performs tasks based on recorded analysis results to achieve joint defense of equipment. The system at least includes: a plurality of network nodes, including at least one first network node and at least one second network node. The at least one second network node be other network nodes different from the at least one first network node or other network nodes with the same identity as the at least one first network node; and a computing device, which further includes: a task setting module, Used to set multiple maintenance and operation tasks; an event monitoring module used to read at least one operation record of the network nodes, and analyze the at least one operation record to obtain at least one abnormal event, and the at least one abnormal event is related to The at least one first network node is related; a threat analysis module is used to analyze the at least one abnormal event to select one of the maintenance tasks; and a task execution module is used to execute the selected one. The maintenance operation task is to enable the at least one first network node to execute a corresponding first operation plan, and to receive the at least one first network node after the at least one first network node executes the first operation plan. The node corresponds to an operation report, and when it is determined that the at least one first network node has a security problem based on the operation report, the selected maintenance task is executed so that the at least one second network node performs the first operation. plan. 如請求項1所述之依記錄分析結果執行任務以實現設備聯防之系統,其中該計算設備更包含一情資收集模組用以收集一威脅情資,該威脅分析模組更用以分析該威脅情資以由該些維運任務選出其中之一。 As described in claim 1, the system performs tasks according to the record analysis results to realize joint defense of devices, wherein the computing device further includes an intelligence collection module for collecting threat intelligence, and the threat analysis module is further for analyzing the Threat intelligence is selected from one of these maintenance tasks. 如請求項1所述之依記錄分析結果執行任務以實現設備聯防之系統,其中該計算設備更包含一設備通訊模組,用以於該事件監控模組分析出該至少一異常事件時,傳送一通知訊息至至少一行動裝置,或用以依據該事件監控模組或該威脅分析模組所判斷出之一風險等級選擇至少一行動裝置並傳送一通知訊息至該至少一行動裝置。 The system for performing tasks based on record analysis results to achieve joint defense of equipment as described in request 1, wherein the computing device further includes a device communication module for transmitting when the event monitoring module analyzes the at least one abnormal event. A notification message is sent to at least one mobile device, or is used to select at least one mobile device and send a notification message to the at least one mobile device based on a risk level determined by the event monitoring module or the threat analysis module. 如請求項3所述之依記錄分析結果執行任務以實現設備聯防之系統,其中該設備通訊模組更用以接收該至少一行動裝置所傳回之一確認訊息,該任務執行模組更用以依據該風險等級選擇是否自動執行該維運任務或執行與該確認訊息對應之一該維運任務。 As described in request item 3, the system for executing tasks based on record analysis results to achieve joint defense of equipment, wherein the equipment communication module is further used to receive a confirmation message returned by the at least one mobile device, and the task execution module is further used Select whether to automatically execute the maintenance task or execute one of the maintenance tasks corresponding to the confirmation message according to the risk level. 如請求項1所述之依記錄分析結果執行任務以實現設備聯防之系統,其中該任務執行模組更用以通知一第三網路節點對該至少一第一網路節點執行一第二運作方案並接收該第三網路節點所產生之該運作報告,及依據該運作報告判斷資安問題存在時通知該至少一第一網路節點執行該第一運作方案。 The system for executing tasks based on record analysis results to achieve joint defense of equipment as described in claim 1, wherein the task execution module is further used to notify a third network node to perform a second operation on at least one first network node. Plan and receive the operation report generated by the third network node, and notify the at least one first network node to execute the first operation plan when it is judged that an information security problem exists based on the operation report. 一種依記錄分析結果執行任務以實現設備聯防之方法,應用於一計算設備,該方法至少包含下列步驟:設定多個維運任務;讀取多個網路節點之至少一運作記錄,並分析該至少一運作記錄以取得至少一異常事件,其中,該至少一異常事件與至少一第一網路節點有關;分析該至少一異常事件以由該些維運任務選出其中之一;執行該被選出之維運任務以使至少一第一網路節點執行對應之一第一運作方案;及 於該至少一第一網路節點執行該第一運作方案後接收與該至少一第一網路節點對應之一運作報告,並依據該運作報告判斷該至少一第一網路節點存在資安問題時,執行該被選出之維運任務以使至少一第二網路節點執行該第一運作方案,其中,該至少一第二網路節點為與該至少一第一網路節點不同的其他網路節點或與該至少一第一網路節點具有相同身分的其他網路節點。 A method for executing tasks based on record analysis results to achieve joint device defense, applied to a computing device, the method at least includes the following steps: setting multiple maintenance tasks; reading at least one operation record of multiple network nodes, and analyzing the At least one operation record is used to obtain at least one abnormal event, wherein the at least one abnormal event is related to at least one first network node; the at least one abnormal event is analyzed to select one of the maintenance tasks; and the selected one is executed. The maintenance task is to enable at least one first network node to execute a corresponding first operation plan; and After the at least one first network node executes the first operation plan, an operation report corresponding to the at least one first network node is received, and based on the operation report, it is determined that the at least one first network node has an information security problem. When executing the selected maintenance task, at least one second network node executes the first operation plan, wherein the at least one second network node is another network different from the at least one first network node. network node or other network nodes having the same identity as the at least one first network node. 如請求項6所述之依記錄分析結果執行任務以實現設備聯防之方法,其中該方法於執行該被選出之維運任務之步驟前,更包含收集一威脅情資,並分析該威脅情資以由該些維運任務選出其中之一之步驟。 The method of performing tasks based on record analysis results to achieve joint defense of equipment as described in claim 6, wherein the method further includes collecting a threat information and analyzing the threat information before executing the step of the selected maintenance task. To select one of the steps from these maintenance tasks. 如請求項6所述之依記錄分析結果執行任務以實現設備聯防之方法,其中該方法於分析出該異常事件之步驟後,更包含傳送一通知訊息至至少一行動裝置之步驟,或包含依據該至少一異常事件判斷一風險等級,並依據該風險等級選擇至少一行動裝置,及傳送一通知訊息至該至少一行動裝置之步驟。 The method of performing tasks based on record analysis results to achieve joint defense of equipment as described in request item 6, wherein the method further includes the step of sending a notification message to at least one mobile device after analyzing the abnormal event, or includes a basis The at least one abnormal event determines a risk level, selects at least one mobile device according to the risk level, and sends a notification message to the at least one mobile device. 如請求項8所述之依記錄分析結果執行任務以實現設備聯防之方法,其中該方法於傳送該通知訊息至該至少一行動裝置之步驟後,更包含接收該至少一行動裝置所傳送之一確認訊息,並執行與該確認訊息對應之一該維運任務之步驟。 The method of performing tasks based on record analysis results to achieve joint defense of devices as described in claim 8, wherein the method further includes receiving a message sent by the at least one mobile device after the step of sending the notification message to the at least one mobile device. Confirm the message and execute the steps of the maintenance task corresponding to the confirmation message. 如請求項6所述之依記錄分析結果執行任務以實現設備聯防之方法,其中執行該被選出之維運任務以使該第一網路節點執行對應之該第一運作方案之步驟是通知一第三網路節點對該至少一第一網路節點執行一第二運作 方案並接收該第三網路節點所產生之該運作報告,及依據該運作報告判斷資安問題存在時通知該至少一第一網路節點執行該第一運作方案。 As described in claim 6, the method for executing tasks based on record analysis results to achieve joint defense of equipment, wherein the step of executing the selected maintenance task to enable the first network node to execute the corresponding first operation plan is to notify a The third network node performs a second operation on the at least one first network node Plan and receive the operation report generated by the third network node, and notify the at least one first network node to execute the first operation plan when it is judged that an information security problem exists based on the operation report.
TW111113543A 2022-04-08 System for executing task based on an analysis result of records for achieving device joint defense and method thereof TWI835113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111113543A TWI835113B (en) 2022-04-08 System for executing task based on an analysis result of records for achieving device joint defense and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111113543A TWI835113B (en) 2022-04-08 System for executing task based on an analysis result of records for achieving device joint defense and method thereof

Publications (2)

Publication Number Publication Date
TW202340988A TW202340988A (en) 2023-10-16
TWI835113B true TWI835113B (en) 2024-03-11

Family

ID=

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149343A (en) 2019-05-31 2019-08-20 国家计算机网络与信息安全管理中心 A kind of abnormal communications and liaison behavioral value method and system based on stream

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149343A (en) 2019-05-31 2019-08-20 国家计算机网络与信息安全管理中心 A kind of abnormal communications and liaison behavioral value method and system based on stream

Similar Documents

Publication Publication Date Title
US10009361B2 (en) Detecting malicious resources in a network based upon active client reputation monitoring
US10893059B1 (en) Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10505953B2 (en) Proactive prediction and mitigation of cyber-threats
CN110495138B (en) Industrial control system and monitoring method for network security thereof
EP2715975B1 (en) Network asset information management
US20200322371A1 (en) Scoring the performance of security products
US20220239687A1 (en) Security Vulnerability Defense Method and Device
JP2018530066A (en) Security incident detection due to unreliable security events
CN111274583A (en) Big data computer network safety protection device and control method thereof
US20160232349A1 (en) Mobile malware detection and user notification
KR102222377B1 (en) Method for Automatically Responding to Threat
CN110896386B (en) Method, device, storage medium, processor and terminal for identifying security threat
CN111641620A (en) Novel cloud honeypot method and framework for detecting evolution DDoS attack
US20190109824A1 (en) Rule enforcement in a network
CN116319061A (en) Intelligent control network system
CN112583845A (en) Access detection method and device, electronic equipment and computer storage medium
CN114268452A (en) Network security protection method and system
RU2514137C1 (en) Method for automatic adjustment of security means
TWI835113B (en) System for executing task based on an analysis result of records for achieving device joint defense and method thereof
KR102444922B1 (en) Apparatus of controlling intelligent access for security situation recognition in smart grid
TW202340988A (en) System for executing task based on an analysis result of records for achieving device joint defense and method thereof
TWM632159U (en) System for performing tasks according to recorded analysis results to realize device joint defense
US20220060485A1 (en) Threat forecasting
KR20210141198A (en) Network security system that provides security optimization function of internal network
Lejonqvist et al. Improving the precision of an intrusion detection system using indicators of compromise:-a proof of concept