CN102387163A - Network server defense method based on risk balance - Google Patents

Network server defense method based on risk balance Download PDF

Info

Publication number
CN102387163A
CN102387163A CN2011104224135A CN201110422413A CN102387163A CN 102387163 A CN102387163 A CN 102387163A CN 2011104224135 A CN2011104224135 A CN 2011104224135A CN 201110422413 A CN201110422413 A CN 201110422413A CN 102387163 A CN102387163 A CN 102387163A
Authority
CN
China
Prior art keywords
risk
warning
invasion
alarm
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104224135A
Other languages
Chinese (zh)
Inventor
穆成坡
韩操正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011104224135A priority Critical patent/CN102387163A/en
Publication of CN102387163A publication Critical patent/CN102387163A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a network server defense method based on risk balance. A network server defense system based on the risk balance comprises three parts, namely, an alarm acquisition and response execution part, an event handling part and a display and management part, wherein the alarm acquisition and response execution part comprises various invasion detecting systems and load balancers, the invasion detecting systems complete invasion detection, an Agent residing on the invasion detecting systems achieves standard format conversion and convergence of alarm and sends the alarm to an event handling center for treatment, and the risk balancers receive an invasion response command from the event handling center, and convert the access service process to achieve risk balance of server clusters; the event handling part comprises alarm handling, on-line risk assessment and invasion response decision-making, the alarm handling can be realized through alarm filtering, alarm verification and alarm linkage, so as to reduce the false alarm rate and alarm missing rate of the system and form an alarm line representing the invasion process, the on-line risk assessment aims to calculate the risk to hosts from each invasion alarm line (invasion process) in real time, and the invasion response decision-making is realized in the way that whether the access service process is converted or not is determined according to the risk situation of hosts, and a conversion command is formed and sent to the risk balancers for implementation; and the display management part is used for completing parameter configuration, management, maintenance and other man-machine interaction operation on a management control board.

Description

A kind of based on the balanced webserver defence method of risk
Technical field
The present invention relates to a kind of based on the balanced webserver defence method of risk; Especially utilize hierarchical network to invade the method that online risk assessment method is invaded the risk assessment of process; Especially utilize the risk evaluation result that quantizes to carry out the balanced method of risk, belong to field of computer information security.
Background technology
Along with all kinds of development, support the important goal that these professional disparate networks servers (Web server, Ftp server and Database server etc.) become the invasion activity based on Internet service.According to " report of China Internet network security " that CNCERT issued, be first three network intrusions behavior of rank in recent years to the attack (distorting activities such as webpage) of Web service is movable.How effectively to carry out the protection of the webserver, resist all kinds of attacks to the webserver, be the emphasis and the focus of network security research field always.Under new form of security; Static security defense techniques such as host access control originally, fire compartment wall isolation can not satisfy demand for security; The important development trend of network security is comprehensively to use intrusion detection, intrusion response, system vulnerability to find in advance and defense technique such as security risk assessment, is formed on security strategy and instructs detection down, response to circulate with the dynamic security that protects.Model proposed by the invention and method have embodied the theory of dynamic security circulation; Be " dredging " to invasion or unusual network behavior change " blocking-up "; When effectively server being protected, greatly reduce the defence action the negative effect that possibly bring.
Summary of the invention
The object of the invention is exactly to design method and system a kind of and the IDS collaborative work; The warning message that utilizes IDS is as input; The risk that online assessment invasion process causes goal systems, the result according to risk assessment judges then, and then carries out the equilibrium of risk.
Be the experiment above-mentioned purpose, the present invention has realized planting based on risk balanced webserver defence method and system,
Its step is following:
Step 1: obtain the warning message that the bottom alarm module provides;
Step 2: according to source IP address and purpose IP address warning message is carried out integrated treatments such as polymerization is related, the information of the thread that obtains reporting to the police;
Step 3: calculate and upgrade the warning quantity in this warning thread, the warning kind, the attack certainty factor that up-to-date warning is indicated is attacked the order of severity, attacks with by the degree of correlation of target of attack.And above-mentioned five parameters are fused to the risk index that objective factor produces with the D-S evidence theory.
Step 4: risk index and the threshold value that configures according to this process compare, and through the mode (NAT) of network address translation, carry out the platform conversion of this service, thereby reach the equilibrium of risk.
Characteristics of the present invention are: the risk assessment of stratification is that the intrusion response decision-making of stratification provides foundation, can the coverage of response be limited in the suitable scope; Setting through the response risk threshold value can increase the tolerance of system to the diverse network abnormal movement, reduces the risk that wrong report causes the mistake response; Can also carry out the adjustment of response scheme through risk situation, increase the adaptivity of response.This appraisal procedure can be used as the high layer model of intrusion detection, and can be and invade evidence obtaining work targetedly in real time and provide support.The response decision model will invade risk assessment and the risk equilibrium combines, and carries out the intrusion response decision-making according to this risk index, determines whether to carry out the platform conversion, thereby selects the service host of safety that service outwards is provided.Reach the dynamic equilibrium of risk.The intrusion response mechanism that is proposed well balance the validity and the contradiction of response between the negative effect of intrusion response, both stoped attack effectively, reduced the risk of mistake response again.Such intrusion response mechanism has improved the validity of intrusion response, and the system that solved is responding the problem that influences network speed when reporting to the police.
Description of drawings
Fig. 1: risk assessment arborescence.
Fig. 2: the risk evaluation model figure on the service level.
Fig. 3: system experimentation environment map.
Fig. 4: vertical scanning main frame risk situation figure.
Fig. 5: Windows server page figure.
Fig. 6: to the main frame risk situation figure of IIS leak invasion.
Fig. 7: Linux server page figure.
Fig. 8: Ftp MDTM flooding main frame risk situation figure.
Fig. 9: the wrong report risk situation figure that thread produced.
Figure 10: the balanced defensive disposition figure of the risk under the high bandwidth network environment.
Embodiment
Below in conjunction with accompanying drawing and instantiation the present invention is further specified:
The composition of whole system is as shown in Figure 1.Below explain risk evaluating system and risk equalizing system emphatically.
Protected network system is made up of various main frames, is moving operating system and various application network service routine on the main frame:
Define 1. risk index RI (risk index) and be the invasion process to degree of danger that specific objective caused.
Defining that 2. target risks are interval to distribute (risk distribution). risk distribution is meant the distribution situation between the high, medium and low risk area that goal systems can bear.
Steps A: the online risk assessment of network intrusions
If m platform main frame H is arranged on the protecting network i(i=1,2 ..., m), each operating system is OS i, main frame H iLast operation n iIndividual network service is S Ij(j=1,2 ..., n i).The object of being assessed is meant a warning thread k (representing an invasion process) who is formed by the warning relating module.Some invasion activity is not to certain leak of serving, but still formation is to the threat of service.Here, be invasion activity for distinguishing to any service, be included into without exception in the attack of operating system.For expressing conveniently, will also be regarded as a kind of assessment to the assessment of operating system to service.According to the definition that distributes between risk index and risk area, the assessment factor of the service level of selection is as shown in Figure 2.In these 6 factors; Preceding 5 factors have made full use of the various parameters that produced in the system alarm processing procedure (comprising the study of report to the police checking, warning polymerization, warning association and warning confidence level), reflect the safe condition and attack threat situation of system from objective angle; The 6th parameter specified based on situation by the keeper, is subjective factor, represented by the resource situation of protection system and keeper's purpose.
In the risk assessment of service level; At first use the D-S evidence theory to merge preceding 5 and the risk that invasion is caused is carried out assessment objectively with the bigger factor of attacker's correlation; Just do not considering under the goal systems importance situation; Calculating specific invasion process k is the evaluation process of five objective factors below the risk index on the service level
Figure BSA00000637542500031
, its assessment factor membership function such as Fig. 3.
(1) the warning quantity in this warning thread (Amount of alerts) A k, this parameter had both been represented the intensity of invasion, had also reflected the situation of be sure oing of invasion from another point of view.
&mu; 11 = &alpha; 2 - A k &alpha; 2 A k &le; &alpha; 2 0 A k > &alpha; 2 , &mu; 12 = 0 &alpha; 1 &GreaterEqual; A k A k - &alpha; 1 &alpha; 3 - &alpha; 1 &alpha; 1 < A k &le; &alpha; 3 1 &alpha; 3 < A k
Here α 1, α 2, α 3Be constant, confirm general desirable α by expertise 1∈ [5,15], α 2∈ [10,20], α 3∈ [15,30].μ IjBe to belong to V according to i the definite dbjective state of influencing factor jDegree of membership.
(2) indicated attack certainty factor (Alert confidence) C of up-to-date warning among the warning thread k K0∈ [0,1], its indicated abnormal movement of having represented to report to the police is real possibility of attacking, and can be obtained by the warning confidence level study module of native system.
μ 21=1-C k0,μ 22=C k0
(3) the warning species number in this warning thread (Number of alert types) B k, this argument section ground has reflected the situation of carrying out of invasion, and the progress along with invasion causes more warning kinds, and invasion is just more and more serious to the threat of destination service, and simultaneously, it has also reflected invador's technical merit, its value can be obtained by the warning relating module.
&mu; 31 = &lambda; 2 - B k &lambda; 2 B k &le; &lambda; 2 0 B k > &lambda; 2 , &mu; 32 = 0 &lambda; 1 &GreaterEqual; B k B k - &lambda; 1 &lambda; 3 - &lambda; 1 &lambda; 1 < B k &le; &lambda; 3 1 &lambda; 3 < B k
Here λ 1, λ 2, λ 3Be constant, confirm, generally get λ by expertise 1∈ [1,5], λ 2∈ [5,9], λ 3∈ [6,10].
(4) attack the order of severity (Rank of alert severity) P R0, be the indicated attack order of severity of up-to-date warning among the warning thread k, obviously attack is serious more, and the risk that service is caused is big more.The value of the order of severity directly obtains by reporting to the police, and most of IDS embodies in warning with the such parameter of similar alert levels attacking the order of severity, and concrete regulation which rank report to the police be more serious, which is serious and very serious.
&mu; 41 = &phi; - P r 0 &phi; P r 0 &le; &phi; 0 P r 0 > &phi; , &mu; 42 = P r 0 &phi; P r 0 &le; &phi; 1 P r 0 > &phi;
The constant φ here sets according to the concrete regulation of IDS.For example, use Priority to show the order of severity of incident in the warning message of Snort intruding detection system, it is divided into 3 grades altogether, and 1 grade is very serious incident, and 2 grades is serious incident, and 3 grades is than matters of aggravation, like this order: P R0=4-Priority. Snort, φ=3 get final product.
(5) attack together by the degree of correlation of target of attack (Alert relevance score) R S0∈ [0,1] is up-to-date attack was directed against in the warning thread the target conditions matching degree with the realistic objective situation.Its value can be obtained by the warning authentication module.
μ 51=1-R s0, μ 52=R s0
The degree of membership distribution situation that each assessment factor has been arranged just can be calculated burnt first elementary probability number.For warning thread k, q the determined dbjective state V of assessment factor jThe probability assignments function
Figure BSA00000637542500045
For:
m q k ( V j ) = &mu; qj &Sigma; i = 1 2 &mu; qi + 1 - w q &times; P IDSi - - - ( 1 )
m q k ( &theta; ) = 1 - &Sigma; j = 1 2 m q k ( V j ) - - - ( 2 )
Figure BSA00000637542500048
Here q=1,2 ..., 5, j=1,2.P IDSiBe the total accuracy of detection of IDS.Intrusion detection comes down to a problem that network packet or various daily record data sample are classified.In assorting process, having following four kinds of situation takes place: 1. attack the data that produced and correctly be categorized as abnormal data; 2. attack the data that produced and be categorized as normal data by error; 3. normal data correctly is categorized as normal data; 4. normal data is categorized as abnormal data by error.It is correct classification samples number that the data sample that 3. 1. situation classified with situation is counted sum, situation 2. be the sample number of being classified for failing to report the sample number of (false negative), the sample number that 4. situation is classified is wrong report (false positive) sample number.
In most of intruding detection system, total accuracy of detection is defined as:
Total accuracy of detection (PIDS, precision)=correct sample number of classifying/total sample number.
Like this, 1-PIDS has just represented situation about can not correctly classify, wrong report and situation about failing to report in just detecting, and intruding detection system produces probabilistic root and wrong report is with failing to report just.In addition, added correction factor wq ∈ [0,1] here mainly based on following two reasons: 1. receive the influence of complex network environment, most IDS do not reach desirable precision in the middle of reality is used; 2. the uncertainty of each factor in the target risk evaluation process is different, and the assessment effect is different, has added correction factor, so that each factor is brought into play suitable effect in assessment.When wq is set, make w5 >=w4 >=w3 >=w2 >=w1, reason is following: because the existence of repetition of alarms, it is uncertain maximum to cause utilizing warning quantity to carry out risk assessment; The warning that produced of quite a few IDS at present IDS of characteristic (particularly based on) does not provide the such parameter of warning certainty factor (native system is to get through study), so the uncertainty of this part is also relatively large; The type of alarm of most of wrong report is single relatively, and the real type of alarm that phagocytic process produced is then abundant relatively, so the threat situation that how much can reflect invasion well of type of alarm in the thread; It is how serious that the order of severity of reporting to the police representes that attack has, and the degree of correlation combines by information of protection system (like leak) and attack information, has represented possibility of success attack, and these two factors are maximum with target risk situation correlation.
Obtain burnt first probability assignments of each risk factors through formula (1) (2) after, just can merge the judge of these 5 different assessment factors to security risk, the evaluation result m after obtaining merging according to formula (3) again k(V 1), m k(V 2) and m k(θ).Here the risk quantification that specific invasion process k is produced is that risk index
Figure BSA00000637542500051
can be obtained by following formula:
RI s k = m k ( V 2 ) .
Step B: the realization that risk is balanced
Method on the dissimilar main frames realizes through the access services process is transferred in the risk equilibrium, and its decision model is following:
The setting risk threshold value is T t, work as RI k<T tThe time, show invasion process k to risk that server host produced in the safety tolerance range, do not carry out service processes and shift, to process k service is provided by the continuation of existing server host;
Work as RI k>=T tThe time, show that invasion process k exceeds in the safe tolerance range the risk that server host produced, carry out service processes and shift, to process k service is provided by the main frame that is different from existing type of server;
The reference load equalization methods, our the risk equilibrating mechanism that realized is following at present:
Act on behalf of the risk equilibrium.Under this mode, the risk equalizer is as the service intermediary of two or more servers (server zone), and all services request that mail to server zone are at first come the risk equalizer, how to distribute these requests by the decision of risk equalizer;
The NAT load balancing.The risk equalizer is the entry and exit point of whole server zone; When services request arrives the risk equalizer; The risk equalizer becomes privately owned address of certain server and port in the server zone through network address translation (nat) with the legitimate purpose address of access request bag with port translation, and packet is issued this server, thus the server process access request; And give a response, the bag of response must turn back to the risk equalizer.
Except above-mentioned risk equilibrating mechanism, can also be with reference to based on methods such as the load balancing of agreement and mixed type load balancing.In addition, the risk equalizer also can adopt tandem (INLINE), single channel parallel (ONE-ARM) and the parallel dispositions methods such as (SIDE-ARM) of two-way as load equalizer.
In system shown in Figure 3, the risk equalizer is realized through the NAT mode, adopts the series connection access way.In order to realize intrusion detection effect preferably, the hub that adopts the here all devices that interconnects.The intruding detection system Network Based of being disposed is Snort; Cluster of servers is made up of two main frames, and wherein web host A operating system is Windows 2000, and the Web service system on it is IIS 5.0; Host B is Red Hat Linux 9.0 systems; The Web service system that is moved is Apache, and two-server can provide content identical Web service to outer net, and service is accomplished by web host A under the default situation.In addition, also disposed Host Based IDS system on the server, and the Agent of native system.The control desk main frame is accomplished integrated treatment, risk assessment and the response decision-making that all IDS report to the police, and response command is mail to the risk equalizer, realizes the transfer of service processes.The risk threshold value that is provided with in the system is T t=0.8.
At first carry out longitudinal scanning; From a computer of outer net Web server is carried out longitudinal scanning; Because default server is A; All scanning probe packets all will be transmitted to server A through equalizer, and this longitudinal scanning not only all tcp port states of detecting server main frame obtains the open service state, also use agreements such as NETBIOS and SNMP to collect all kinds of sensitive informations such as the operating system of destination host, local group, user and registration table.The warning that experiment produces is through integrated treatment and Risk Calculation, and its result is as shown in Figure 4.
The greateset risk that produces is 0.7191, does not reach risk threshold value, i.e. RI k<T t, at this moment the risk equalizer does not carry out service processes and shifts, when we at the webpage as shown in Figure 5 that outer net obtains during with the computer access Web service of implementing scanning, explaining that Web service remains is provided by server A.
Next be to utilize the multistep of a buffering Overflow Vulnerability that exists among the Idq.dll of IIS 5.0 to invade experiment suddenly.At first use the remote server of scanning tools and networking command scanning experiment subnet at outer net; Obtain operating system and Web service version information; Then IISIDQ invasion instrument carries out flooding, uses the NC instrument to obtain the connection with administrator right at last.The risk situation of phagocytic process is as shown in Figure 6, and through after the flooding stage, the main frame risk sharply is increased to 0.9823, has surpassed risk threshold value.
At this moment; When the invasion computer of use outer net conducts interviews to intranet Web server; Obtain webpage shown in Figure 7, the risk equalizer is described, carried out the conversion of service processes; Any services request that just comes from outer net invasion computer is no longer handled by host A, and is handled by host B.Although the IIS in the host A has taken place to overflow; But the invador can't use NC to connect; The assailant can not implement deep intrusion behavior to host A; And there is not the Idq.dll leak in the service platform (Linux+Apache) after the conversion, and to carry out flooding also of no avail even the invador re-uses IISIDQ.
In addition; We go back the intrusion prevention experiment that the application risk equalizer has carried out the Ftp server; Server A among Fig. 3 is configured to Windows 2000+Serv-U Ftp 5.0; Server B be configured to Linux 9.0+VSFtpd, both file service contents are identical, by server A Ftp outwards are provided service under the default situation.To the MDTM Overflow Vulnerability of Serv-U Ftp, phagocytic process mainly is divided into three parts: the one, and service scan is obtained information such as Ftp service software title and version; The 2nd, weak passwurd is attacked, and obtains Ftp username and password (necessary condition of using the MDTM attack tool to invade); Use the MDTM attack tool to carry out flooding.It is as shown in Figure 8 that whole invasion thread is assessed the risk situation of getting off; In fact at the weak passwurd phase of the attack; The risk of invasion thread has surpassed 0.8, has at this moment caused the risk equalizer and has carried out the service platform conversion, and the Ftp service after the conversion is provided by server B; And this Ftp application service system of VSFtpd does not have the MDTM leak, uses the MDTM attack tool to carry out flooding and can't succeed.
Find integrated treatment in the experiment through reporting to the police; The most false alarm of system's filtering preferably; Even those are not reported by mistake formed warning thread by filtering, its risk often neither be very high, is not enough to cause the transfer that the risk equalizer is served thread.Fig. 9 is the result that a thread of being made up of 20 false alarms is carried out risk assessment, and there is very little risk (the greateset risk index also has only 0.28) can to find out it.Even so, carry out the service platform conversion, still can be obtained corresponding network service by the user of " misunderstanding " even this wrong report thread has caused the risk equalizer.Therefore, system not only has tolerance and anti-noise ability preferably to the wrong report incident, has also reduced the negative effect of response well.
In the experiment, with intrusion detection part, risk assessment and response decision-making (comprising alarm integrated processing) partly, the balanced enforcement of risk partly carried out distributed deployment, solved all kinds of bottleneck problems of network communication and host process preferably.If developed special-purpose hardware chip, system also can carry out centralized deployment as UTM.Under the network environment of high bandwidth, desirable deployment and occupation mode are shown in figure 10.
Can find out that through experiment what risk was balanced does not directly block invasion,, eliminate the successful necessary condition of invasion, continue when the user provides service, to have realized defence invasion just through the conversion of service platform.This change " blocking-up " is the response mode of " dredging ", has solved the validity of intrusion response and the contradiction between the intrusion response negative effect well, and eliminated intrusion detection wrong report, fail to report with repetition of alarms and give the invasion influence that response is brought.The risk equilibrium has realized the dynamic security defence, meets the network security technology development trend, is a kind of network security defence method that is worthy to be popularized.

Claims (6)

1. one kind based on the balanced webserver defence method of risk, and its step comprises:
(1) utilizing the online risk evaluating system of network intrusions stratification that the warning process is carried out risk quantification calculates.
(2) risk index after utilization quantizes carries out the parameter decision of risk equalizing system, realizes the transfer of risk.
2. like the described method of claim 1, it is characterized in that utilizing the risk assessment of network intrusions dynamic multilevel to carry out risk quantification, its process is following:
(1) utilize the warning information comprehensive processing module to warning report to the police checking, association and filtration treatment; Form warning thread, and accomplish the study and the calculating of report to the police in the warning degree of correlation, the warning order of severity, the warning thread quantity, type of alarm quantity and confidence level to same attack process.
(2) use the D-S evidence theory to merge the also invasion risk index of calculation services level.
3. like the described method of claim 2, it is characterized in that, obtain five and the bigger factor information of attacker's correlation through integrated treatment to warning message.These five factors are not for being:
(1) the warning quantity in the warning thread (Amount of alerts) A k, this parameter had both been represented the intensity of invasion, had also reflected the situation of be sure oing of invasion from another point of view.This parameter value can be obtained by the warning relating module.
(2) indicated attack certainty factor (Alert confidence) C of up-to-date warning among the warning thread k K0∈ [0,1], its indicated abnormal movement of having represented to report to the police is real possibility of attacking, and can be obtained by the warning confidence level study module of native system.
(3) the warning species number in this warning thread (Number of alert types) B k, this argument section ground has reflected the situation of carrying out of invasion, and the progress along with invasion causes more warning kinds, and invasion is just more and more serious to the threat of destination service, and simultaneously, it has also reflected invador's technical merit, its value can be obtained by the warning relating module.
(4) attack the order of severity (Rank of alert severity) Pr 0, be the indicated attack order of severity of up-to-date warning among the warning thread k.The value of the order of severity directly obtains by reporting to the police, and most of IDS embodies in warning with the such parameter of similar alert levels attacking the order of severity, and concrete regulation which rank report to the police be more serious, which is serious and very serious.
(5) attack together by the degree of correlation of target of attack (Alert relevance score) R S0∈ [0,1] is up-to-date attack was directed against in the warning thread the target conditions matching degree with the realistic objective situation.Its value can be obtained by the warning authentication module.
4. like the described method of claim 2; It is characterized in that using the D-S evidence theory to merge above-mentioned five and the bigger factor of attacker's correlation; Risk to invasion is caused is carried out assessment objectively, and combining target assets importance degree carries out the invasion risk assessment of service layer then.
5. want 4 described methods like right, at first utilize fuzzy membership functions to obtain the elementary probability partition function of each burnt unit, then merge of the judge of these five different assessment factors security risk.Again based on being given each destination host corresponding importance degree by the servicing property that moves on each main frame in the protecting network, and the based target importance degree, definite target risk distributes.
6. like the described method of claim 1, it is characterized in that utilizing risk index after the quantification to carry out the parameter decision of risk equalizing system, native system adopts the method for network address translation NAT.The legitimate purpose address of access request bag is become privately owned address of certain server and port in the server zone with port translation; And packet issued this server; Server process access request thus, and give a response, the bag of response must turn back to the risk equalizer.
CN2011104224135A 2011-12-16 2011-12-16 Network server defense method based on risk balance Pending CN102387163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104224135A CN102387163A (en) 2011-12-16 2011-12-16 Network server defense method based on risk balance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104224135A CN102387163A (en) 2011-12-16 2011-12-16 Network server defense method based on risk balance

Publications (1)

Publication Number Publication Date
CN102387163A true CN102387163A (en) 2012-03-21

Family

ID=45826137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104224135A Pending CN102387163A (en) 2011-12-16 2011-12-16 Network server defense method based on risk balance

Country Status (1)

Country Link
CN (1) CN102387163A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916940A (en) * 2012-09-19 2013-02-06 浪潮(北京)电子信息产业有限公司 Method and system for realizing network safety of cloud data center
CN103368841A (en) * 2012-03-29 2013-10-23 深圳市腾讯计算机系统有限公司 Message forwarding method and device thereof
CN103384242A (en) * 2013-03-15 2013-11-06 中标软件有限公司 Intrusion detection method and system based on Nginx proxy server
CN106209426A (en) * 2016-06-28 2016-12-07 北京北信源软件股份有限公司 A kind of server load state assessment analysis method and system based on D S evidence theory
CN106716953A (en) * 2014-09-10 2017-05-24 霍尼韦尔国际公司 Dynamic quantification of cyber-security risks in a control system
CN106936620A (en) * 2015-12-31 2017-07-07 北京神州泰岳软件股份有限公司 The processing method and processing unit of a kind of alarm event
CN107194571A (en) * 2017-05-18 2017-09-22 武汉烽火技术服务有限公司 A kind of communication equipment Method about Spares Amount Calculating controlled based on risk quantification
CN108363926A (en) * 2017-10-19 2018-08-03 北京安天网络安全技术有限公司 A kind of loophole defence method and system
CN108667642A (en) * 2017-03-30 2018-10-16 穆成坡 A kind of risk balance device of the server based on risk assessment
CN105264861B (en) * 2013-03-29 2019-02-12 英国电讯有限公司 Method and apparatus for detecting multistage event
CN109543463A (en) * 2018-10-11 2019-03-29 平安科技(深圳)有限公司 Data Access Security method, apparatus, computer equipment and storage medium
CN110086806A (en) * 2019-04-26 2019-08-02 中国南方电网有限责任公司 A kind of scanning system of plant stand device systems loophole
CN113678070A (en) * 2019-01-31 2021-11-19 摩根士丹利服务集团有限公司 Minimizing response to exposure through artificial intelligence

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
晏丰: "基于风险的自动入侵响应系统研究与设计", 《网络安全技术与应用》 *
穆成坡等: "入侵进城的层次化在线风险评估", 《计算机研究与发展》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368841A (en) * 2012-03-29 2013-10-23 深圳市腾讯计算机系统有限公司 Message forwarding method and device thereof
CN103368841B (en) * 2012-03-29 2016-08-17 深圳市腾讯计算机系统有限公司 Message forwarding method and device
CN102916940A (en) * 2012-09-19 2013-02-06 浪潮(北京)电子信息产业有限公司 Method and system for realizing network safety of cloud data center
CN103384242A (en) * 2013-03-15 2013-11-06 中标软件有限公司 Intrusion detection method and system based on Nginx proxy server
CN103384242B (en) * 2013-03-15 2016-12-28 中标软件有限公司 Intrusion detection method based on Nginx proxy server and system
CN105264861B (en) * 2013-03-29 2019-02-12 英国电讯有限公司 Method and apparatus for detecting multistage event
CN106716953B (en) * 2014-09-10 2020-06-12 霍尼韦尔国际公司 Dynamic quantification of cyber-security risks in a control system
CN106716953A (en) * 2014-09-10 2017-05-24 霍尼韦尔国际公司 Dynamic quantification of cyber-security risks in a control system
CN106936620B (en) * 2015-12-31 2020-09-01 北京神州泰岳软件股份有限公司 Alarm event processing method and processing device
CN106936620A (en) * 2015-12-31 2017-07-07 北京神州泰岳软件股份有限公司 The processing method and processing unit of a kind of alarm event
CN106209426B (en) * 2016-06-28 2019-05-21 北京北信源软件股份有限公司 A kind of server load state assessment analysis method and system based on D-S evidence theory
CN106209426A (en) * 2016-06-28 2016-12-07 北京北信源软件股份有限公司 A kind of server load state assessment analysis method and system based on D S evidence theory
CN108667642A (en) * 2017-03-30 2018-10-16 穆成坡 A kind of risk balance device of the server based on risk assessment
CN108667642B (en) * 2017-03-30 2021-11-02 穆成坡 Risk equalizer of server based on risk assessment
CN107194571A (en) * 2017-05-18 2017-09-22 武汉烽火技术服务有限公司 A kind of communication equipment Method about Spares Amount Calculating controlled based on risk quantification
CN108363926A (en) * 2017-10-19 2018-08-03 北京安天网络安全技术有限公司 A kind of loophole defence method and system
CN109543463A (en) * 2018-10-11 2019-03-29 平安科技(深圳)有限公司 Data Access Security method, apparatus, computer equipment and storage medium
CN109543463B (en) * 2018-10-11 2023-12-22 平安科技(深圳)有限公司 Data security access method, device, computer equipment and storage medium
CN113678070A (en) * 2019-01-31 2021-11-19 摩根士丹利服务集团有限公司 Minimizing response to exposure through artificial intelligence
US11360442B2 (en) 2019-01-31 2022-06-14 Morgan Stanley Services Group Inc. Exposure minimization response by artificial intelligence
CN110086806A (en) * 2019-04-26 2019-08-02 中国南方电网有限责任公司 A kind of scanning system of plant stand device systems loophole

Similar Documents

Publication Publication Date Title
CN102387163A (en) Network server defense method based on risk balance
CN109698819B (en) Threat disposal management method and system in network
CN110620759B (en) Multi-dimensional association-based network security event hazard index evaluation method and system
EP3528462A1 (en) A method for sharing cybersecurity threat analysis and defensive measures amongst a community
EP2619958B1 (en) Ip prioritization and scoring method and system for ddos detection and mitigation
CN100511159C (en) Method and system for addressing intrusion attacks on a computer system
CN111953679A (en) Intranet user behavior measurement method and network access control method based on zero trust
CN108289088A (en) Abnormal traffic detection system and method based on business model
Ganesh Kumar et al. Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)
KR20130058813A (en) Agent device and method for sharing security information based on anonymous identifier between security management domains
Fink et al. A metrics-based approach to intrusion detection system evaluation for distributed real-time systems
CN108667642A (en) A kind of risk balance device of the server based on risk assessment
CN102394766A (en) Intrusion process layering online risk assessment method
CN117081868B (en) Network security operation method based on security policy
Alsarhan et al. A novel scheme for malicious nodes detection in cloud markets based on fuzzy logic technique.
Ghanshala et al. BNID: a behavior-based network intrusion detection at network-layer in cloud environment
Rahman Detection of distributed denial of service attacks based on machine learning algorithms
AlZoubi et al. The effect of using honeypot network on system security
Ahmed et al. Security & privacy in software defined networks, issues, challenges and cost of developed solutions: a systematic literature review
Vokorokos et al. Sophisticated honeypot mechanism-the autonomous hybrid solution for enhancing computer system security
Kumar Mitigate volumetric DDoS attack using machine learning algorithm in SDN based IoT network environment
Abou Haidar et al. High perception intrusion detection system using neural networks
Hassanzadeh et al. Intrusion detection with data correlation relation graph
Aroua et al. A distributed and coordinated massive DDOS attack detection and response approach
Zhai et al. Network intrusion early warning model based on DS evidence theory

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120321