CN101714990A - Network security safeguarding integrated system and control method thereof - Google Patents

Network security safeguarding integrated system and control method thereof Download PDF

Info

Publication number
CN101714990A
CN101714990A CN200910236815A CN200910236815A CN101714990A CN 101714990 A CN101714990 A CN 101714990A CN 200910236815 A CN200910236815 A CN 200910236815A CN 200910236815 A CN200910236815 A CN 200910236815A CN 101714990 A CN101714990 A CN 101714990A
Authority
CN
China
Prior art keywords
network information
information security
security equipment
network
master controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910236815A
Other languages
Chinese (zh)
Other versions
CN101714990B (en
Inventor
张英
薛一波
李军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CERTUSNET CORP
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN 200910236815 priority Critical patent/CN101714990B/en
Publication of CN101714990A publication Critical patent/CN101714990A/en
Application granted granted Critical
Publication of CN101714990B publication Critical patent/CN101714990B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a network security safeguarding integrated system and a control method thereof. The system comprises a plurality of network information security equipments and a central controller, wherein each network information security equipment is provided with a function control interface, the function control interface can be used for an external controller to connect and call each security safeguarding function of the network information security equipment to which the interface belongs, the central controller performs interactive communication with each network information security equipment controls the working condition of each network information security equipment, and is provided with a linkage strategic information table enabling each network information security equipment to perform cooperation and interaction. The invention solves the problems of interface standard and interactive operation access between different network information security equipments, realizes cooperative work and linkage between the different network information security equipments and finally realizes seamless integration of each network information security equipment.

Description

A kind of network security safeguarding integrated system and control method thereof
Technical field
The present invention relates to the network safety prevention field, relate in particular to a kind of network security safeguarding integrated system and control method thereof.
Background technology
Along with the application in the network becomes increasingly complex, network security problem is unexpected must to be increased, and attack also presents the characteristics that make new advances day by day:
The one, the attack means variation, and attack often is multiple means and usefulness at every turn, mixed type is attacked the main flow that (Hybrid attack) becomes attack.Hybrid Attack is meant with in once attacking, comprises multiple attack patterns such as virus attack, assault, concealed channel, Denial of Service attack, password attack, routing attack, relay attack.
The 2nd, the renewal speed of attack means is very fast, and it is fast that the attack of new leak is produced speed, and safety devices need be taken precautions against various being called as " zero time " (zero-hour) or " zero day " new unknown attack (zero-day).So-called " zero time attack " is meant if after a leak is found, in 24 hours, immediately by malicious exploitation, appearance is to the attack method or the attack of this leak, come out and simultaneously corresponding defence instrument is also untapped, this leak is called as " zero-day vulnerability " so, and this attack is called as " attacking in 1st ".
The 3rd, security threat is not only from the outside, and the improper internet access of enterprises, abuse the Internet and the behavior etc. of divulging a secret can bring safety problem equally.The famous IDC of the market research agency of U.S. report, 70% security loss is caused by the enterprises reason, wherein the utilization of resources improperly and employee's internet behavior " arch-criminal " often.
In the face of the attack variation of the security threat under these new models and the characteristics that merge, traditional fire compartment wall, simple function safety products such as intruding detection system/IPS (IDS/IPS) and anti-virus have seemed powerless, therefore the integrated and integrated demand of safety protection technique is arisen at the historic moment, this is UTM (Unified Threat Management, be called for short UTM), IDC has carried out clearly definition to UTM: UTM is by hardware, the special equipment that software and networking technology is formed, the combination fire compartment wall, VPN, IDS/IPS, anti-virus, Anti-Spam, network address is filtered, information filtering, functions such as traffic monitoring, the management platform of a standard of formation.From technical standpoint, the interlock bridging technology between the network information security equipment helps security system effectively combination and lifting performance.For example, fire compartment wall and anti-virus interlock can provide gateway killing virus capable, have guaranteed the purity of built-in system and external network information flow; Fire compartment wall and Verification System interlock will authenticate with fire compartment wall peels off, and can adopt task equipment to finish authentication work, has improved the reliability and security of authentication, has also alleviated the burden of fire compartment wall; Fire compartment wall and invasion detecting system interlink make protection system by static state to dynamically, to solid, promoted the mobility and the real time reaction ability of fire compartment wall by the plane, also strengthened the block function of intruding detection system etc.
Because the various safety feature of UTM system requirements seamless integrated, and the technical specification of these functional parts, implementation method, system framework, information format, suitable communication protocol, security strategy are expressed and are all had nothing in common with each other.Therefore in order to realize the collaborative work between them, must have interface standard and bridging technology that unified standard solves network information security equipment room.
On the other hand, network security is whole, we can be by selecting outstanding product, outstanding solution of service construction, if it is but isolated mutually between each outstanding product, outstanding each links such as service, then the security strategy of each product, service link is isolated relatively, can't form whole security strategy; Certainly will form security breaches like this, give invador's opportunity.Network security is dynamic, if isolate between each link such as each outstanding product, service, then can't fully understand the general safety situation of network, also can't dynamically adjust security strategy according to network and applicable cases certainly.
The solution of current network security mechanism interoperability framework has three great development trend:
1, with the fire compartment wall is the interoperability framework at center.As the fire compartment wall at center provide and other safety products between standard interface protocol, the SDK that other safety product business mens provide according to the fire compartment wall business men develops their corresponding communication module, and by separately with the interface protocol of fire compartment wall, realize interlock and interoperability.
2, with the intruding detection system be the interoperability framework at center.Following with the fire compartment wall is that the interoperability frame principles at center is the same, is the center with IDS, other safety products by with the interface protocol of IDS, realize interoperability.
3, unified interoperability framework between all safety products.Based on general, disclosed, standard with extendible interface and agreement, realize that effective tissue of safety product also promotes performance.For example, fire compartment wall and anti-virus interlock can provide gateway killing virus capable; Fire compartment wall and Verification System interlock have improved the reliability and security of authentication, have also alleviated the burden of fire compartment wall; Fire compartment wall and invasion detecting system interlink have been realized dynamic, the three-dimensional protective capacities of protection system, have promoted the mobility and the real time reaction ability of fire compartment wall, have also strengthened the block function of intruding detection system etc.
Have many network security management platforms both at home and abroad, the TOPSEC platform of the OPSEC safety interaction platform of wherein external Check Point company and domestic company of Topsec is present comparatively famous implementation.
With OPSEC is example, illustrates that their treatment step is as follows:
The step 1 authentication
Before the product of submitting authentication to, confirm whether each the OPSEC interface that uses has satisfied the standard of authentication in integrated.
Give OPSEC engineer with the overall architecture of safety product, and state with OPSEC engineer how product designs, and how to cooperate with Check Point product.OPSEC engineer prepares corresponding experimental situation for this product and tests.
Obtain the detailed OPSEC identifying procedure document of a cover, explaining in the document has the document of how submitting this product and all product documentations to and how submitting to authentication to need.
If authentification failure must join again and wait in the Approval Queue and resubmit product; If authentication success upgrades all descriptions about this product and company's situation in OPSEC solution center website.
Step 2 interlock interoperability
Behind the authentication success, can link and interoperability with other safety products by the OPSEC platform.
The shortcoming of above-mentioned solution:
1, this scheme can realize simple equipment linkage, but does not rise to the angle of safety management, has set up a kind of preliminary network security interaction interoperability mechanism.
2, lack compatibility widely.
API that other manufacturers must provide according to Check Point and OPSEC protocol suite develop can with the integrated safety means of OPSEC, realize Check Point fire compartment wall and third party's intrusion detection, the interlock between the products such as anti-virus and information filtering.But each production firm is design and a development data interface in understanding of oneself and applied environment, and therefore certain limitation is arranged, and lacks compatible.Need general, disclosed, standard, an extendible interface and agreement, make the work of associated safety product collaborative.
3, lack practicality and correct, accuracy.
Interlock between most of product all needs to realize by the configuration of more complicated, and can not guarantee the validity of coordination and response, really reaches blocking-up, needs to be responsible for for a long time configuration, even some product can't reach this effect, lacks practicality.For example,, block normal network traffics, lack correct and accuracy because the IDS wrong report causes the interlock of fire compartment wall mistake.
Summary of the invention
(1) technical problem that will solve
The objective of the invention is to overcome the deficiencies in the prior art, a kind of network security safeguarding integrated system and control method thereof are provided, thereby solve interface standard and interoperability access problem between the heterogeneous networks information safety devices, realize collaborative work and interlock between them, finally realize the seamless integrated of each network information security equipment.
(2) technical scheme
At above problem, the present invention propose a kind of network security safeguarding integrated system, this system is used for protected information network is carried out security protection, described system comprises:
Some network information security equipment, described network information security equipment is used for security protection is carried out in the various different classes of network information security threat of protected information network, each network information security equipment all is provided with a function control interface, and described function control interface can connect and call every function of safety protection of this interface belonging network information safety devices for peripheral control unit; With
Master controller; described master controller is connected by described function control interface with described each network information security equipment; carry out interactive communication with each network information security equipment and the operating state of each network information security equipment is controlled; described master controller is provided with and makes each network information security equipment interactive linkage strategy information table of cooperating; when protected information network and the external world carried out data communication, each network information security equipment was carried out linkage strategy in the above-mentioned linkage strategy information table by described master controller.
The invention allows for a kind of control method at above-mentioned network security safeguarding integrated system, this method comprises the steps:
The function of each network information security equipment is applied in web or the CLI interface that is issued as on the master controller based on Web services, and take between master controller and each network information security equipment to communicate, and adopt XML digital signature and diploma system to guarantee the fail safe of network information security communication between devices based on public invasion and the detection descriptive language of XML and CISL.
Wherein, the described method operating state of supervisory control system in the following way:
Make master controller regularly send the heartbeat request packet to each network information security equipment, wait for the heartbeat reply data bag that each network information security equipment returns then, if master controller has been received the heartbeat reply data bag from each network information security equipment in official hour, it is normal then can be considered each network information security equipment, otherwise be considered as the working state abnormal of network information security equipment, after master controller is noted daily record, to the user interface information that gives a warning.
Wherein, described method is carried out the system configuration renewal in the following way:
The user is in the configuration of changing by WEB interface or CLI interface on each network information security equipment, master controller sends the system configuration update inquiry information to each network information security equipment, after each network information security equipment is received the system configuration update inquiry information that master controller sends, if confirm that order is correct, then upgrade self configuration, and return the response message of config update to master controller according to the requirement of system configuration update inquiry information.
Wherein, described method is carried out the interlock control of system in the following way:
The mode of operation information of each network information security equipment is set in described linkage strategy information table, described mode of operation information is between each network information security equipment, and information transmission, logic determines and action executive mode between master controller and each network information security equipment are stipulated, when system was in running order, then the mode with described mode of operation information specifies turned round.
(3) beneficial effect
Adopt network security safeguarding integrated system of the present invention and control method thereof, interface standard and interoperability access problem between the heterogeneous networks information safety devices have been solved, realize collaborative work and interlock between them, finally realize the seamless integrated of each network information security equipment.
Description of drawings
Fig. 1 is the interoperability framework schematic diagram of network security mechanism of the present invention;
Fig. 2 is the interoperability schematic flow sheet of network security mechanism of the present invention;
Fig. 3 is a heartbeat agreement schematic diagram of the present invention;
Fig. 4 is a more New Deal schematic diagram of system configuration of the present invention;
Fig. 5 is that incident of the present invention is reported the agreement schematic diagram;
Fig. 6 is master controller configuration of the present invention and on-premise network information safety devices schematic diagram;
Fig. 7 is master controller control of the present invention and supervising the network information safety devices schematic diagram;
Fig. 8 is the interlock and the interoperability schematic diagram of network information security equipment room of the present invention.
Embodiment
A kind of network security safeguarding integrated system and control method thereof that the present invention proposes are described as follows in conjunction with the accompanying drawings and embodiments.Following execution mode only is used to illustrate the present invention; and be not limitation of the present invention; the those of ordinary skill in relevant technologies field; under the situation that does not break away from the spirit and scope of the present invention; can also make various variations and modification; therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be limited by each claim.
The interoperability framework of network security mechanism comprises network information security equipment, interface and master controller as shown in Figure 1, being described below of each unit:
Network information security equipment: being meant needs the network of relation of interoperability and interlock information safety devices, as switch, router, fire compartment wall, intruding detection system, PAA, Anti-Spam Network Management Equipment, content filtering equipment and traffic monitoring equipment etc.
Interface: be meant the communication interface that each network information security equipment provides for other network information security device accesses.
Master controller: be meant the linkage strategy controller, comprise access control and linkage strategy etc.
Each network information security equipment is issued into Web Service interface with application separately, for other component call, thereby reaches cooperation interaction between each assembly; Corresponding linkage strategy is dynamically formulated and safeguarded to master controller.
Following the interlock interoperability of intrusion detection with fire compartment wall below is example, and the standard interoperability flow process of network security mechanism is described, as shown in Figure 2:
0 represents initial work such as master controller configuration network information safety devices and deployment strategy, below specifies the intruding detection system monitoring flow, and to flow to the testing process that reaches as follows when proper network:
The 1A network flow arrives fire compartment wall;
The 1B fire compartment wall is forwarded to intruding detection system according to strategy with this network flow;
Intruding detection system is not measured unusually, the notice fire compartment wall;
1 ' fire compartment wall allows No. 1 network flow to pass through.
The testing process that unusual network flow arrives is as follows:
The 2A network flow arrives fire compartment wall;
The 2B fire compartment wall is forwarded to intruding detection system according to strategy with this network flow;
Intruding detection system is measured unusually;
3 intruding detection systems send to master controller with relevant information;
4 master controllers notice fire compartment wall is carried out and is stopped action;
5 fire compartment wall execution results return to master controller;
6 master controllers notice intruding detection system stops successfully;
2 ' fire compartment wall stops No. 2 streams to be passed through.
As shown in Figure 3, heartbeat agreement schematic diagram for system of the present invention, safeguard a passage of communicating by letter between master controller and each network information security equipment, master controller regularly sends the heartbeat request packet to each network information security equipment, waits for the heartbeat reply data bag that each network information security equipment returns then.If master controller has been received the heartbeat reply data bag from each network information security equipment in official hour, just then master controller thinks that each network information security equipment is normal; If do not receive the heartbeat reply data bag from each network information security equipment in official hour, just then master controller thinks that each network information security equipment is undesired, log is to the user interface warning.
As shown in Figure 4, be system configuration of the present invention New Deal schematic diagram more.The user is in the configuration of changing by WEB interface or CLI interface on each network information security equipment, and master controller needs " notice " each network information security device responds user's order, changes its configuration." notice " herein is exactly the system configuration update inquiry information.After each network information security equipment is received the system configuration update inquiry information of master controller, confirm that order is correct, upgrade configuration as requested, and return " result " of config update to master controller." result " herein is exactly that system configuration is upgraded response message.This message is divided three classes again: success, failure, alarm.
As shown in Figure 5, report the agreement schematic diagram for incident of the present invention.Each network information security equipment may be reported some information to master controller, reports such as unusual stream warning, and operating state incident report etc., master controller is made corresponding action according to these warning messages.
As shown in Figure 6, be master controller configuration of the present invention and deployment secure block diagram; Master controller disposes each network information security equipment, by based on the interface (ws-if) of web service and foregoing system configuration New Deal more, can realize configuration and deployment to the heterogeneous networks information safety devices.
As shown in Figure 7, be master controller control of the present invention and Administrative Security block diagram, master controller can be by interface (ws-if) and foregoing heartbeat agreement and the incident report agreement based on web service, realization is to the control and the management of each network information security equipment, for example load balancing etc.
As shown in Figure 8, be interlock between safety component of the present invention and interoperability schematic diagram, each network information security equipment can be reported agreement by separately interface based on web service (ws-if) and foregoing incident, realize interlock and interoperability between them, in addition, also can utilize the authentication of master controller to network information security equipment.

Claims (5)

1. network security safeguarding integrated system, described network security safeguarding integrated system is used for protected information network is carried out security protection, it is characterized in that, and described system comprises:
Some network information security equipment, described network information security equipment is used for security protection is carried out in the various different classes of network information security threat of protected information network, each network information security equipment all is provided with a function control interface, and described function control interface can connect and call every function of safety protection of this interface belonging network information safety devices for peripheral control unit; With
Master controller; described master controller is connected by described function control interface with described each network information security equipment; carry out interactive communication with each network information security equipment and the operating state of each network information security equipment is controlled; described master controller is provided with and makes each network information security equipment interactive linkage strategy information table of cooperating; when protected information network and the external world carried out data communication, each network information security equipment was carried out linkage strategy in the above-mentioned linkage strategy information table by described master controller.
2. the control method of the described network security safeguarding integrated system of claim 1 is characterized in that, described method comprises the steps:
The function of each network information security equipment is applied in web or the CLI interface that is issued as on the master controller based on Web services, and take between master controller and each network information security equipment to communicate, and adopt XML digital signature and diploma system to guarantee the fail safe of network information security communication between devices based on public invasion and the detection descriptive language of XML and CISL.
3. control method as claimed in claim 2 is characterized in that, described method is the operating state of supervisory control system in the following way:
Make master controller regularly send the heartbeat request packet to each network information security equipment, wait for the heartbeat reply data bag that each network information security equipment returns then, if master controller has been received the heartbeat reply data bag from each network information security equipment in official hour, it is normal then can be considered each network information security equipment, otherwise be considered as the working state abnormal of network information security equipment, after master controller is noted daily record, to the user interface information that gives a warning.
4. control method as claimed in claim 2 is characterized in that, described method is carried out system configuration in the following way and upgraded:
The user is in the configuration of changing by WEB interface or CLI interface on each network information security equipment, master controller sends the system configuration update inquiry information to each network information security equipment, after each network information security equipment is received the system configuration update inquiry information that master controller sends, if confirm that order is correct, then upgrade self configuration, and return the response message of config update to master controller according to the requirement of system configuration update inquiry information.
5. control method as claimed in claim 2 is characterized in that, described method is carried out the interlock control of system in the following way:
The mode of operation information of each network information security equipment is set in described linkage strategy information table, described mode of operation information is between each network information security equipment, and information transmission, logic determines and action executive mode between master controller and each network information security equipment are stipulated, when system was in running order, then the mode with described mode of operation information specifies turned round.
CN 200910236815 2009-10-30 2009-10-30 Network security safeguarding integrated system and control method thereof Active CN101714990B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910236815 CN101714990B (en) 2009-10-30 2009-10-30 Network security safeguarding integrated system and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910236815 CN101714990B (en) 2009-10-30 2009-10-30 Network security safeguarding integrated system and control method thereof

Publications (2)

Publication Number Publication Date
CN101714990A true CN101714990A (en) 2010-05-26
CN101714990B CN101714990B (en) 2013-06-05

Family

ID=42418266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910236815 Active CN101714990B (en) 2009-10-30 2009-10-30 Network security safeguarding integrated system and control method thereof

Country Status (1)

Country Link
CN (1) CN101714990B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN103795713A (en) * 2014-01-20 2014-05-14 中国建设银行股份有限公司 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method
CN104883348A (en) * 2014-09-28 2015-09-02 宁波匡恩网络科技有限公司 Network security regulation automatic deployment method and system
CN108234447A (en) * 2017-12-04 2018-06-29 北京交通大学 A kind of safety regulation for heterogeneous networks security function manages system and method
CN110572412A (en) * 2019-09-24 2019-12-13 南京大学 Firewall based on intrusion detection system feedback in cloud environment and implementation method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7246156B2 (en) * 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
CN100346610C (en) * 2004-11-01 2007-10-31 沈明峰 Security policy based network security management system and method
CN100550768C (en) * 2006-04-10 2009-10-14 华为技术有限公司 A kind of information security management platform

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN101938460B (en) * 2010-06-22 2014-04-09 北京中兴网安科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system
CN103795713A (en) * 2014-01-20 2014-05-14 中国建设银行股份有限公司 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method
CN104883348A (en) * 2014-09-28 2015-09-02 宁波匡恩网络科技有限公司 Network security regulation automatic deployment method and system
CN108234447A (en) * 2017-12-04 2018-06-29 北京交通大学 A kind of safety regulation for heterogeneous networks security function manages system and method
CN110572412A (en) * 2019-09-24 2019-12-13 南京大学 Firewall based on intrusion detection system feedback in cloud environment and implementation method thereof

Also Published As

Publication number Publication date
CN101714990B (en) 2013-06-05

Similar Documents

Publication Publication Date Title
CN102594814B (en) Terminal-based network access control system
KR101977731B1 (en) Apparatus and method for detecting anomaly in a controller system
US8737398B2 (en) Communication module with network isolation and communication filter
CN104767748B (en) Opc server security protection system
CN100435513C (en) Method of linking network equipment and invading detection system
CN101714990B (en) Network security safeguarding integrated system and control method thereof
WO2017156261A1 (en) Active deception system
CN102882828A (en) Information safe transmission control method between inside network and outside network and gateway thereof
KR100523483B1 (en) The system and method of malicious traffic detection and response in network
CN101984693A (en) Monitoring method and monitoring device for access of terminal to local area network (LAN)
CN106789982B (en) Safety protection method and system applied to industrial control system
Li Security requirements in IoT architecture
CN113467311B (en) Electric power Internet of things safety protection device and method based on software definition
CN101621427B (en) Anti-intrusion method and system for a communication network
US20140323095A1 (en) Method and device for monitoring a mobile radio interface on mobile terminals
CN106161330A (en) A kind of security isolation system being applied to PROFINET EPA
CN101616038B (en) SOA security guarantee system and method
KR101881061B1 (en) 2-way communication apparatus capable of changing communication mode and method thereof
EP3018878B1 (en) Firewall based prevention of the malicious information flows in smart home
Silveira et al. Cyber vulnerability assessment of a digital secondary system in an electrical substation
CN101300807A (en) Network access remote front-end processor for a communication network and method for operating a communications system
US20220272119A1 (en) Protection system of information networks and relevant security procedure
CN106358188A (en) Periodic link switching method, equipment and system
CN110896403A (en) Application firewall architecture
CN110278184A (en) A kind of isolation of network security and data exchange oil field Network of Power application system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20161213

Address after: 210042 Xuanwu District, Xuanwu District, Jiangsu, Nanjing, No. 699-22, building 18

Patentee after: CERTUSNET CORP.

Address before: 100084 Beijing Haidian District Tsinghua Yuan 100084-82 mailbox

Patentee before: Qinghua UNiversity