CN102857486A - Next-generation application firewall system and defense method - Google Patents

Next-generation application firewall system and defense method Download PDF

Info

Publication number
CN102857486A
CN102857486A CN2012100932651A CN201210093265A CN102857486A CN 102857486 A CN102857486 A CN 102857486A CN 2012100932651 A CN2012100932651 A CN 2012100932651A CN 201210093265 A CN201210093265 A CN 201210093265A CN 102857486 A CN102857486 A CN 102857486A
Authority
CN
China
Prior art keywords
application
packet
future generation
application firewall
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100932651A
Other languages
Chinese (zh)
Other versions
CN102857486B (en
Inventor
李军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Network Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Network Technology Shenzhen Co Ltd filed Critical Sangfor Network Technology Shenzhen Co Ltd
Priority to CN201210093265.1A priority Critical patent/CN102857486B/en
Publication of CN102857486A publication Critical patent/CN102857486A/en
Application granted granted Critical
Publication of CN102857486B publication Critical patent/CN102857486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a next-generation application firewall system and a defense method. The defense method can comprise the following steps of: acquiring a data package in a data stream; carrying out analyzing and verifying on the data in the data package; and collecting and analyzing verified results, and carrying out processing according to a corresponding preset strategy. According to the next-generation application firewall system and the defense method, the shortages of traditional safety devices are holistically solved, and meanwhile, the performances of the devices can not degrade after all functions are started.

Description

Application firewall system of future generation and defence method
Technical field
The present invention relates to application firewall technology of future generation, specially refer to a kind of application firewall system of future generation and defence method.
Background technology
Current network is used high speed development, network configuration is day by day complicated, the limitation of traditional firewall is embodied significantly: traditional fire compartment wall is based on IP (Internet Protocol, the agreement that interconnects between the network)/port, access control policy (Access Control List is provided, ACL) and unusual packet filtering function, but its mode of operation has determined that it can't tackle attack from application layer, as: worm, virus and wooden horse etc.Traditional firewall also can't be differentiated application concrete in the flow and content thereof, can't distinguish the user, behavior that more can't the analytic record user, namely can't distinguish use and content will cause can't refinement network traffics attribute, so low to the control ability of network, preferably service quality can not be provided; Its can't the analytic record user behavior can not satisfy safety requirements.
Because the disappearance on the traditional firewall function, so that enterprise need to take for existing diversified attack type the equipment overlaying scheme of patch installing formula at Network Security Construction, " string sugarcoated haws " formula that formed is disposed.Usually we see the Network security planning scheme time all can be with the form of fire compartment wall, intrusion prevention system, gateway virus killing and miscellaneous equipment stack.As if this mode can remedy the defective of traditional firewall function singleness to a certain extent, and all kinds of attacks that exist in the network have been formed comprehensively protection.But in this environment, administrative staff can run into following difficulty usually:
(1), efficient is low: same packet is repeated to unpack through the various kinds of equipment of series connection, and repeated resolution becomes lowly the efficient of whole network, and it is very slow that the speed of service becomes;
(2), maintenance cost is high: numerous equipment need to provide enough space and Environmental Support, have greatly improved maintenance cost;
(3), complex management: autonomous device, complex management need to cultivate the senior executive who is familiar with various kinds of equipment, each vendor equipment; Simultaneously also can't carry out unified security risk analysis.
For defects, industry is rectified and improved the concept of rear release UTM (Unified Threat Management, UTM).The theory of UTM be a plurality of functional modules are concentrated as: FW (fire wall), IPS (Intrusion Prevention System, intrusion prevention system) and AV (Anti Virus, anti-viral software), join together to reach the purpose of unified protection, centralized management.Also obtained user's approval after the UTM product is released, market-share growth is rapid, and the trend but the in recent years data of each side demonstration UTM product growth rate significantly decreases on year-on-year basis may be to be caused by following defective:
(1), UTM equipment only simply integrates FW, IPS, AV, to using and the control ability of content, and still has problem on the traditional firewall Safety and Manage, such as shortage to effective protection of WEB server etc.;
(2), the safety means that are connected in series among the UTM need to be through the filtration of a plurality of security modules, but fight separately between a plurality of module security module, passive protection, can't cooperation, cause performance and efficient lower;
(3), when business requires when high security strategy, UTM security protection strategy is too complicated, and is visual poor, so that the keeper is difficult to maintenance.
Summary of the invention
Main purpose of the present invention has solved the deficiency of conventional safety apparatus for a kind of application firewall of future generation system is provided, open simultaneously all functions after equipment performance can not decline to a great extent.
The present invention proposes a kind of application firewall of future generation system defence method, comprises step:
Obtain the packet in the data flow;
To data analysis in the packet and checking;
The result who collects and analyze described checking, and process according to the preset strategy of correspondence.
Preferably, also comprise after the described step to data analysis in the packet and checking:
According to the market demand type configuration processing policy that has been identified in the packet.
Preferably, the step of the corresponding preset strategy configuration process of the described application type that has been identified according to data in packet strategy specifically comprises:
According to application type and the corresponding preset strategy of packet, the interception of executing data bag, clearance, redirected or traffic shaping action.
Preferably, described step to data analysis in the packet and checking specifically comprises:
Set up the mapping relations of user and session, interception disabled user packet;
The concrete application of recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process;
Detect threat and/or critical data in the packet content.
Preferably, described collection and the result who analyzes described checking, and the step of processing according to the preset strategy of correspondence specifically comprises:
There is the action that threatens in packet in the recording conversation, calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.
Preferably, described method also comprises:
The pre-configured preset strategy that event may occur.
Preferably, described method also comprises:
Daily record and auditing result that register system produces.
Preferably, described method also comprises:
Analysis and result, daily record and the rear demonstration of auditing result arrangement with system.
The present invention also proposes a kind of application firewall of future generation system, comprising:
The packet acquiring unit is for the packet that obtains data flow;
The analysis verification unit is used for packet data analysis and checking;
The association analysis unit, the result who be used for to collect and analyze described checking, and process according to the preset strategy of correspondence.
Preferably, described system also comprises:
The application controls unit is used for the market demand type configuration processing policy that has been identified according to packet.
Preferably, described application controls unit specifically is used for:
According to application type and the corresponding preset strategy of packet, the interception of executing data bag, clearance, redirected or traffic shaping action.
Preferably, described analysis verification unit specifically comprises:
User's detection module is used for setting up the mapping relations of user and session, by application controls unit interception disabled user packet;
Use detection module, be used for the concrete application of recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process;
The content safety module is for detection of the threat in the packet content and/or critical data.
Preferably, described association analysis unit specifically is used for:
There is the action that threatens in packet in the recording conversation, calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.
Preferably, described system also comprises:
The strategy control unit is used for the pre-configured preset strategy that event may occur.
Preferably, described system also comprises:
Daily record and auditable unit are used for daily record and auditing result that register system produces.
Preferably, described system also comprises:
Visualization is used for analysis and result, daily record and the rear demonstration of auditing result arrangement with system.
The present invention is good to the control ability of user's application and content, can accomplish effective, safe protection; Interactive between a plurality of application modules, related, cooperation have promoted overall performance and the efficient of firewall system; Strengthen visualization function, be conducive to management and maintenance; Solved on the whole the deficiency of conventional safety apparatus, open simultaneously all functions after equipment performance can not decline to a great extent.
Description of drawings
Fig. 1 is steps flow chart schematic diagram among the present invention application firewall defence method one embodiment of system of future generation;
Fig. 2 is another steps flow chart schematic diagram among the present invention application firewall defence method one embodiment of system of future generation;
Fig. 3 analyzes and the verification step schematic flow sheet among the present invention application firewall defence method one embodiment of system of future generation;
Fig. 4 is that gray scale threatens the association analysis schematic diagram among the present invention application firewall defence method one embodiment of system of future generation;
Fig. 5 is structural representation among the present invention application firewall one embodiment of system of future generation;
Fig. 6 is analysis verification cellular construction schematic diagram among the present invention application firewall one embodiment of system of future generation;
Fig. 7 is structural representation among the present invention application firewall another embodiment of system of future generation.
The realization of the object of the invention, functional characteristics and advantage are described further with reference to accompanying drawing in connection with embodiment.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
With reference to Fig. 1, an embodiment of a kind of application firewall of future generation of the present invention system defence method is proposed.The method can comprise:
Step S10, obtain the packet in the data flow;
Step S11, to data analysis in the packet and checking;
Step S13, collection and the result who analyzes described checking, and process according to the preset strategy of correspondence.
With reference to Fig. 2, also can comprise after the above-mentioned steps S11:
Step S12, according to the market demand type configuration processing policy that has been identified in the packet.
Formation for application firewall system body framework of future generation mainly comprises: based on the security control of user, application and content, the content-level security protection, performance application layer disposal ability, general safety protection, and the aspect such as security strategy and Security Report be visual.
Should mainly comprise based on the security control of user, application and content: application identification, user's identification, the integral application access control policy, and based on the traffic management of using; This content-level security protection mainly comprises: gray scale threatens the association analysis technology, based on the server protection of attack process, and WEB security protection and client secure protection; This performance application layer disposal ability mainly comprises: single Analytical framework and multi-core parallel concurrent treatment technology; This general safety protection mainly comprises: support static routing, RIP (dynamic routing protocol) v1/2, OSPF (Open Shortest Path First, ospf), multiple Routing Protocol and NAT (the Network Address Translation such as strategy route, network address translation), support VPN (Virtual Private Network, VPN (virtual private network)), the protection of L4 network attack, packet filtering and state-detection, based on the user, use, the threat analysis of content and flow control, and threaten flow cleaning and shaping.Above-mentioned application firewall of future generation system has the basic network function, comprises the function of the traditional firewalls such as package forward, Packet Filtering, QoS (Quality of Service, service quality), status monitoring, NAT and VPN.
With reference to Fig. 3, above-mentioned steps S11 can specifically comprise:
Step S111, set up the mapping relations of user and session, interception disabled user packet;
The concrete application of step S112, recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process;
Threat and/or critical data in step S113, the detection packet content.
In the detection of above-mentioned steps S111 based on the user, can be according to the access rights handle packet of user in the preset strategy, do not have disabled user's a packet of access rights such as tackling.
Above-mentioned steps S112 can set up packet to the mapping relations of using based in the detection of using, and can be according to application permission handle packet in the preset strategy.This processing can comprise with flow classify, with the grouped data bag put into specified queue, for specified queue distribute bandwidth value and priority level, according to bandwidth value adjust the grouped data bag transmission rate, according to priority determine the grouped data bag sending order, based on the Intelligent Recognition of the intelligent flow management of applications/website/file type and/or P2P (Peer-to-Peer, point-to-point) with control flexibly.
In the content-based safe detection of above-mentioned steps S113, can detect the content of bidirectional traffics, and the context of understanding content and semanteme; Its function comprises the threat in the Detection of content, and the carrying of carrying in the content critical data etc. of economic worth.This threat can be the WEB security protection, comprise that SQL (Structured Query Language, SQL) injects that defence, XSS attack that (cross-site scripting attack) defence, order inject that defence, application message are hidden, password Brute Force and/or Webshell defence etc.
Above-mentioned based on using detection and content-based safe detection in can use single Analytical framework (engine), comprise the restructuring of single message, unified " virus, leak, Web invasion, malicious code " threat characteristics and unification matching engine etc.
Above-mentioned steps S12 can specifically comprise: according to application type and the corresponding preset strategy of packet, and the interception of executing data bag, clearance, redirected or traffic shaping action.Above-mentioned application firewall of future generation system at first needs the application type of specified data bag, can be according to the corresponding basic network strategy of this application type in the preset strategy, the interception of executing data bag, clearance, be redirected or the action such as traffic shaping.Determining of this application type can be by mating data in the packet and default application type storehouse, thereby can determine the application type of this packet.This application type can comprise the types such as ICMP (Internet Control MessageProtocol, Internet Control Message Protocol) data, P2P data and/or WEB data.
The execution of the not unique representative said method flow process of above-mentioned steps ordering is smooth, only for for example so that explanation, concrete execution sequence can be adjusted according to actual conditions; Such as step S11 and the step S12 cross processing that can walk abreast.
Above-mentioned steps S13 can specifically comprise: there is the action that threatens in packet in the recording conversation, calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.This step can be gray scale and threatens association analysis, comprises the threat behavior modeling, detects user's attack, sets up user behavior gray scale threat Sample Storehouse, threatens Sample Storehouse to calculate the user behavior threat value threshold based on standard.The detailed process of this calculating user behavior threat value threshold can comprise: have the action that threatens in all sessions of recording user, then record is carried out association and calculates threat value threshold, threaten Sample Storehouse to mate threat value threshold and standard, can identify various known and unknown threats.Below lift the calculating of simple examples explanation threat value threshold, threat value threshold such as default individual part, threat value threshold addition with the individual part of recording obtains whole threat value threshold again, the threat value threshold of integral body is carried out matching judgment with standard threat Sample Storehouse whether have threat.
With reference to Fig. 4, gray scale threatens the concrete running of association analysis can be in the present embodiment: the gray scale threat Sample Storehouse that the analysis result of single parsing is constantly fed back to gray scale association analysis engine by the single analytics engine, based on the continuous merger of information, arrangements such as attack, IP, users, then calculate threat value threshold and judge whether to exist threat; Do not find to threaten then further correlation behavior, depth analysis; The discovery degree of depth threatens, and then carries out respective handling for this threat, and can be warned.
Above-mentioned application firewall of future generation system, the before use pre-configured preset strategy that event may occur.Such as based on the package forward strategy of application type, the strategy etc. that threatens association analysis based on the strategy of user's detection, based on the strategy of the detection of using, content-based safe detection and/or intensity-based.This strategy configuration can make up GUI (Graphical User Interface, graphic user interface) subsystem at user browser, provides easy-to-use tactful configuration interface, the tactical management of What You See Is What You Get and control.Simultaneously, daily record and auditing result that register system produces are such as the result of various detections and analysis; And will show and tactful visual configuration after the analysis of system and result, daily record and the auditing result arrangement.
Above-mentioned application firewall of future generation system defence method, to the user use and the control ability of content good, can accomplish effective, safe protection; Interactive between a plurality of application modules, related, cooperation have promoted overall performance and the efficient of firewall system; Strengthen visualization function, be conducive to management and maintenance; Solved on the whole the deficiency of conventional safety apparatus, open simultaneously all functions after equipment performance can not decline to a great extent.
With reference to Fig. 5, an embodiment of a kind of application firewall of future generation of the present invention system is proposed.This system can comprise: packet acquiring unit 22, application controls unit 23, analysis verification unit 24 and association analysis unit 25; This packet acquiring unit 22 is for the packet that obtains data flow; This application controls unit 23 is used for the market demand type configuration processing policy that has been identified according to packet; This analysis verification unit 24 is used for packet data analysis and checking; This association analysis unit 25, the result who be used for to collect and analyze described checking, and process according to the preset strategy of correspondence.
Formation for application firewall system body framework of future generation mainly comprises: based on the security control of user, application and content, the content-level security protection, performance application layer disposal ability, general safety protection, and the aspect such as security strategy and Security Report be visual.
Should mainly comprise based on the security control of user, application and content: application identification, user's identification, the integral application access control policy, and based on the traffic management of using; This content-level security protection mainly comprises: gray scale threatens the association analysis technology, based on the server protection of attack process, and WEB security protection and client secure protection; This performance application layer disposal ability mainly comprises: single Analytical framework and multi-core parallel concurrent treatment technology; This general safety protection mainly comprises: support multiple Routing Protocol and the NAT such as static routing, RIPv1/2, OSPF, tactful route, support VPN, the protection of L4 network attack, packet filtering and state-detection, based on threat analysis and the flow control of user, application, content, and threaten flow cleaning and shaping.Above-mentioned application firewall of future generation system is provided with basic network unit 21, has the basic network function, comprises the function of the traditional firewalls such as package forward, Packet Filtering, QoS, status monitoring, NAT and VPN.
Above-mentioned application controls unit 23 specifically is used for: according to application type and the corresponding preset strategy of packet, and the interception of executing data bag, clearance, redirected or traffic shaping action.Above-mentioned application controls unit 23 at first needs the application type of specified data bag, can be according to the corresponding basic network strategy of this application type in the preset strategy, the interception of executing data bag, clearance, be redirected or the action such as traffic shaping.Determining of this application type can be by mating data in the packet and default application type storehouse, thereby can determine the application type of this packet.This application type can comprise the types such as ICMP data, P2P data and/or WEB data.
With reference to Fig. 6, above-mentioned analysis verification unit 24 specifically comprises: user's detection module 241, application detection module 242 and content safety module 243; This user's detection module 241 is used for setting up the mapping relations of user and session, by application controls unit 23 interception disabled user packets; This uses detection module 242, is used for the concrete application of recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process; This content safety module 243 is for detection of the threat in the packet content and/or critical data.
In the detection of above-mentioned user's detection module 241 based on the user, can be according to the access rights handle packet of user in the preset strategy, do not have disabled user's a packet of access rights such as tackling.
Above-mentioned application detection module 242 can be set up packet to the mapping relations of using based in the detection of using, and can be according to application permission handle packet in the preset strategy.This processing can comprise with flow classify, with the grouped data bag put into specified queue, for specified queue distribute bandwidth value and priority level, according to bandwidth value adjust the grouped data bag transmission rate, according to priority determine the grouped data bag sending order, based on the Intelligent Recognition of the intelligent flow management of applications/website/file type and/or P2P (Peer-to-Peer, point-to-point) with control flexibly.
In the 243 content-based safe detections of foregoing security module, can detect the content of bidirectional traffics, and the context of understanding content and semanteme; Its function comprises the threat in the Detection of content, and the carrying of carrying in the content critical data etc. of economic worth.This threat can be the WEB security protection, comprises that SQL injects that defence, XSS attack defending, order inject that defence, application message are hidden, password Brute Force and/or Webshell defend etc.
Above-mentioned based on using detection and content-based safe detection in can use single Analytical framework (engine), comprise the restructuring of single message, unified " virus, leak, Web invasion, malicious code " threat characteristics and unification matching engine etc.
Above-mentioned association analysis unit 25 specifically is used for: there is the action that threatens in the recording conversation packet, and calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.This association analysis unit 25 can carry out gray scale and threaten association analysis, comprises the threat behavior modeling, detects user's attack, sets up user behavior gray scale threat Sample Storehouse, threatens Sample Storehouse to calculate the user behavior threat value threshold based on standard.The detailed process of this calculating user behavior threat value threshold can comprise: have the action that threatens in all sessions of recording user, then record is carried out association and calculates threat value threshold, threaten Sample Storehouse to mate threat value threshold and standard, can identify various known and unknown threats.Below lift the calculating of simple examples explanation threat value threshold, threat value threshold such as default individual part, threat value threshold addition with the individual part of recording obtains whole threat value threshold again, the threat value threshold of integral body is carried out matching judgment with standard threat Sample Storehouse whether have threat.
With reference to Fig. 4, gray scale threatens the concrete running of association analysis can be in the present embodiment: the gray scale threat Sample Storehouse that the analysis result of single parsing is constantly fed back to gray scale association analysis engine by the single analytics engine, based on the continuous merger of information, arrangements such as attack, IP, users, then calculate threat value threshold and judge whether to exist threat; Do not find to threaten then further correlation behavior, depth analysis; The discovery degree of depth threatens, and then carries out respective handling for this threat, and can be warned.
With reference to Fig. 7, in the present embodiment, above-mentioned application firewall of future generation system also can comprise: tactful control unit 26 is used for the pre-configured preset strategy that event may occur.This strategy control unit 26 is the pre-configured preset strategy that event may occur before use.Such as based on the package forward strategy of application type, the strategy etc. that threatens association analysis based on the strategy of user's detection, based on the strategy of the detection of using, content-based safe detection and/or intensity-based.This strategy configuration can make up GUI (Graphical User Interface, graphic user interface) subsystem at user browser, provides easy-to-use tactful configuration interface, the tactical management of What You See Is What You Get and control.
Above-mentioned application firewall of future generation system also can comprise: daily record and auditable unit 27 and visualization 28; This daily record and auditable unit 27 are used for daily record and auditing result that register system produces; This visualization 28 is used for analysis and result, daily record and the rear demonstration of auditing result arrangement with system.Can be by daily record and the auditing result of daily record and the generation of auditable unit 27 register systems, such as the result of various detections and analysis; And by analysis and result, daily record and auditing result arrangement rear demonstration and the tactful visual configuration of visualization 28 with system.
Above-mentioned application firewall of future generation system, to the user use and the control ability of content good, can accomplish effective, safe protection; Interactive between a plurality of application modules, related, cooperation have promoted overall performance and the efficient of firewall system; Strengthen visualization function, be conducive to management and maintenance; Solved on the whole the deficiency of conventional safety apparatus, open simultaneously all functions after equipment performance can not decline to a great extent.The above only is the preferred embodiments of the present invention; be not so limit claim of the present invention; every equivalent structure or equivalent flow process conversion that utilizes specification of the present invention and accompanying drawing content to do; or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (16)

1. an application firewall of future generation system defence method is characterized in that, comprises step:
Obtain the packet in the data flow;
To data analysis in the packet and checking;
The result who collects and analyze described checking, and process according to the preset strategy of correspondence.
2. application firewall of future generation according to claim 1 system defence method is characterized in that, also comprises after the described step to data analysis in the packet and checking:
According to the market demand type configuration processing policy that has been identified in the packet.
3. application firewall of future generation according to claim 2 system defence method is characterized in that, the step of described market demand type configuration processing policy according to being identified in the packet specifically comprises:
According to application type and the corresponding preset strategy of packet, the interception of executing data bag, clearance, redirected or traffic shaping action.
4. application firewall of future generation according to claim 2 system defence method is characterized in that, described step to data analysis in the packet and checking specifically comprises:
Set up the mapping relations of user and session, interception disabled user packet;
The concrete application of recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process;
Detect threat and/or critical data in the packet content.
5. application firewall of future generation according to claim 1 system defence method is characterized in that, described collection and the result who analyzes described checking, and the step of processing according to the preset strategy of correspondence specifically comprises:
There is the action that threatens in packet in the recording conversation, calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.
6. each described application firewall of future generation system defence method in 5 according to claim 1 is characterized in that, described method also comprises:
The pre-configured preset strategy that event may occur.
7. each described application firewall of future generation system defence method in 5 according to claim 1 is characterized in that, described method also comprises:
Daily record and auditing result that register system produces.
8. application firewall of future generation according to claim 7 system defence method is characterized in that, described method also comprises:
Analysis and result, daily record and the rear demonstration of auditing result arrangement with system.
9. an application firewall of future generation system is characterized in that, comprising:
The packet acquiring unit is for the packet that obtains data flow;
The analysis verification unit is used for packet data analysis and checking;
The association analysis unit, the result who be used for to collect and analyze described checking, and process according to the preset strategy of correspondence.
10. application firewall of future generation according to claim 9 system is characterized in that, also comprises:
The application controls unit is used for the market demand type configuration processing policy that has been identified according to packet.
11. application firewall of future generation according to claim 10 system is characterized in that, described application controls unit specifically is used for:
According to application type and the corresponding preset strategy of packet, the interception of executing data bag, clearance, redirected or traffic shaping action.
12. application firewall of future generation according to claim 10 system is characterized in that, described analysis verification unit specifically comprises:
User's detection module is used for setting up the mapping relations of user and session, by application controls unit interception disabled user packet;
Use detection module, be used for the concrete application of recognition data bag; Described identification specifically comprises: based on the detection of agreement and port, based on the identification of application characteristic code, based on the identification of traffic characteristic, based on the identification of application content and/or detect the unusual of application interaction process;
The content safety module is for detection of the threat in the packet content and/or critical data.
13. application firewall of future generation according to claim 9 system is characterized in that, described association analysis unit specifically is used for:
There is the action that threatens in packet in the recording conversation, calculates threat value threshold and threatens Sample Storehouse to mate according to standard according to record, and identification is unknown to be threatened.
14. each described application firewall of future generation system in 12 is characterized in that according to claim 9, described system also comprises:
The strategy control unit is used for the pre-configured preset strategy that event may occur.
15. each described application firewall of future generation system in 12 is characterized in that according to claim 9, described system also comprises:
Daily record and auditable unit are used for daily record and auditing result that register system produces.
16. each described application firewall of future generation system is characterized in that according to claim 15, described system also comprises:
Visualization is used for analysis and result, daily record and the rear demonstration of auditing result arrangement with system.
CN201210093265.1A 2012-04-01 2012-04-01 Application firewall system of future generation and defence method Active CN102857486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210093265.1A CN102857486B (en) 2012-04-01 2012-04-01 Application firewall system of future generation and defence method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210093265.1A CN102857486B (en) 2012-04-01 2012-04-01 Application firewall system of future generation and defence method

Publications (2)

Publication Number Publication Date
CN102857486A true CN102857486A (en) 2013-01-02
CN102857486B CN102857486B (en) 2015-10-21

Family

ID=47403684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210093265.1A Active CN102857486B (en) 2012-04-01 2012-04-01 Application firewall system of future generation and defence method

Country Status (1)

Country Link
CN (1) CN102857486B (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414724A (en) * 2013-08-20 2013-11-27 曙光信息产业(北京)有限公司 Method and device for displaying system information of firewall device
CN103685320A (en) * 2013-12-31 2014-03-26 北京网康科技有限公司 Feature matching method and device of network data package
CN103957185A (en) * 2013-12-16 2014-07-30 汉柏科技有限公司 Firewall control method for realizing traffic monitoring of application layer
CN104105124A (en) * 2013-04-08 2014-10-15 南京理工大学常熟研究院有限公司 Traffic monitoring system based on Android intelligent mobile terminal
CN104252584A (en) * 2013-06-28 2014-12-31 华为数字技术(苏州)有限公司 Method and device for protecting website content
CN104394176A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Webshell prevention method based on mandatory access control mechanism
CN104579730A (en) * 2013-10-18 2015-04-29 宁夏先锋软件有限公司 Network attack protective system capable of effectively preventing threats
CN104702424A (en) * 2013-12-05 2015-06-10 中国联合网络通信集团有限公司 Network behavior monitoring method and device
CN105553958A (en) * 2015-12-10 2016-05-04 国网四川省电力公司信息通信公司 Novel network security linkage system and method
CN105991587A (en) * 2015-02-13 2016-10-05 中国移动通信集团山西有限公司 Intrusion detection method and system
CN106603471A (en) * 2015-10-16 2017-04-26 北京启明星辰信息安全技术有限公司 Firewall policy detection method and device
CN106992981A (en) * 2017-03-31 2017-07-28 北京知道创宇信息技术有限公司 A kind of website back door detection method, device and computing device
CN107360153A (en) * 2017-07-07 2017-11-17 国家电网公司 A kind of network security protection system on big data
CN107395593A (en) * 2017-07-19 2017-11-24 深信服科技股份有限公司 A kind of leak automation means of defence, fire wall and storage medium
CN107623700A (en) * 2017-10-25 2018-01-23 成都视达科信息技术有限公司 A kind of method and system of fire wall
CN107770164A (en) * 2017-09-30 2018-03-06 广东欧珀移动通信有限公司 The method and apparatus of data renewal, computer equipment, readable storage medium storing program for executing
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN108270730A (en) * 2016-12-30 2018-07-10 北京飞利信电子技术有限公司 A kind of application layer detection method, device and electronic equipment for extending fire wall
CN108650257A (en) * 2018-05-09 2018-10-12 腾讯音乐娱乐科技(深圳)有限公司 Safety detection setting method, device and storage medium based on web site contents
CN108881145A (en) * 2017-12-26 2018-11-23 北京安天网络安全技术有限公司 Inbreak detection rule optimization method, device, electronic equipment and storage medium
CN109525558A (en) * 2018-10-22 2019-03-26 深信服科技股份有限公司 Leaking data detection method, system, device and storage medium
CN109728989A (en) * 2017-10-31 2019-05-07 中国电信股份有限公司 For realizing the methods, devices and systems of secure accessing
CN109831452A (en) * 2019-03-07 2019-05-31 北京华安普特网络科技有限公司 A kind of distributed fire wall
CN110532753A (en) * 2019-07-01 2019-12-03 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) The safety protecting method and equipment of train operation monitoring and recording device business data flow
CN111083011A (en) * 2019-12-18 2020-04-28 北京网太科技发展有限公司 Automatic testing method and device for routing security firewall and management platform
CN111371750A (en) * 2020-02-21 2020-07-03 浙江德迅网络安全技术有限公司 Intrusion prevention system and intrusion prevention method based on computer network
CN114338087A (en) * 2021-12-03 2022-04-12 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN115065552A (en) * 2022-07-27 2022-09-16 北京六方云信息技术有限公司 Industrial communication protection method, device, terminal equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838592A (en) * 2006-04-26 2006-09-27 南京大学 Firewall method and system based on high-speed network data processing platform
CN101350781A (en) * 2008-07-31 2009-01-21 成都市华为赛门铁克科技有限公司 Method, equipment and system for monitoring flux
CN101610264A (en) * 2009-07-24 2009-12-23 深圳市永达电子股份有限公司 The management method of a kind of firewall system, safety service platform and firewall system
CN101964804A (en) * 2010-10-22 2011-02-02 北京工业大学 Attack defense system under IPv6 protocol and implementation method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838592A (en) * 2006-04-26 2006-09-27 南京大学 Firewall method and system based on high-speed network data processing platform
CN101350781A (en) * 2008-07-31 2009-01-21 成都市华为赛门铁克科技有限公司 Method, equipment and system for monitoring flux
CN101610264A (en) * 2009-07-24 2009-12-23 深圳市永达电子股份有限公司 The management method of a kind of firewall system, safety service platform and firewall system
CN101964804A (en) * 2010-10-22 2011-02-02 北京工业大学 Attack defense system under IPv6 protocol and implementation method thereof

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104105124A (en) * 2013-04-08 2014-10-15 南京理工大学常熟研究院有限公司 Traffic monitoring system based on Android intelligent mobile terminal
CN104252584B (en) * 2013-06-28 2018-03-09 华为数字技术(苏州)有限公司 The method and apparatus of guarding website content
CN104252584A (en) * 2013-06-28 2014-12-31 华为数字技术(苏州)有限公司 Method and device for protecting website content
CN103414724A (en) * 2013-08-20 2013-11-27 曙光信息产业(北京)有限公司 Method and device for displaying system information of firewall device
CN104579730A (en) * 2013-10-18 2015-04-29 宁夏先锋软件有限公司 Network attack protective system capable of effectively preventing threats
CN104702424A (en) * 2013-12-05 2015-06-10 中国联合网络通信集团有限公司 Network behavior monitoring method and device
CN103957185A (en) * 2013-12-16 2014-07-30 汉柏科技有限公司 Firewall control method for realizing traffic monitoring of application layer
CN103685320A (en) * 2013-12-31 2014-03-26 北京网康科技有限公司 Feature matching method and device of network data package
CN104394176A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Webshell prevention method based on mandatory access control mechanism
CN104394176B (en) * 2014-12-17 2018-05-08 中国人民解放军国防科学技术大学 A kind of webshell prevention methods based on mandatory Access Control Mechanism
CN105991587A (en) * 2015-02-13 2016-10-05 中国移动通信集团山西有限公司 Intrusion detection method and system
CN105991587B (en) * 2015-02-13 2019-10-15 中国移动通信集团山西有限公司 A kind of intrusion detection method and system
CN106603471A (en) * 2015-10-16 2017-04-26 北京启明星辰信息安全技术有限公司 Firewall policy detection method and device
CN106603471B (en) * 2015-10-16 2019-09-13 北京启明星辰信息安全技术有限公司 A kind of firewall policy detection method and device
CN105553958A (en) * 2015-12-10 2016-05-04 国网四川省电力公司信息通信公司 Novel network security linkage system and method
CN108270730A (en) * 2016-12-30 2018-07-10 北京飞利信电子技术有限公司 A kind of application layer detection method, device and electronic equipment for extending fire wall
CN106992981A (en) * 2017-03-31 2017-07-28 北京知道创宇信息技术有限公司 A kind of website back door detection method, device and computing device
CN106992981B (en) * 2017-03-31 2020-04-07 北京知道创宇信息技术股份有限公司 Website backdoor detection method and device and computing equipment
CN107360153B (en) * 2017-07-07 2020-11-24 国家电网公司 Network security protection system about big data
CN107360153A (en) * 2017-07-07 2017-11-17 国家电网公司 A kind of network security protection system on big data
CN107395593A (en) * 2017-07-19 2017-11-24 深信服科技股份有限公司 A kind of leak automation means of defence, fire wall and storage medium
CN107770164A (en) * 2017-09-30 2018-03-06 广东欧珀移动通信有限公司 The method and apparatus of data renewal, computer equipment, readable storage medium storing program for executing
CN107770164B (en) * 2017-09-30 2020-05-12 Oppo广东移动通信有限公司 Data updating method and device, computer equipment and readable storage medium
CN107623700A (en) * 2017-10-25 2018-01-23 成都视达科信息技术有限公司 A kind of method and system of fire wall
CN109728989B (en) * 2017-10-31 2021-06-11 中国电信股份有限公司 Method, device and system for realizing secure access
CN109728989A (en) * 2017-10-31 2019-05-07 中国电信股份有限公司 For realizing the methods, devices and systems of secure accessing
CN107872456A (en) * 2017-11-09 2018-04-03 深圳市利谱信息技术有限公司 Network intrusion prevention method, apparatus, system and computer-readable recording medium
CN108881145A (en) * 2017-12-26 2018-11-23 北京安天网络安全技术有限公司 Inbreak detection rule optimization method, device, electronic equipment and storage medium
CN108650257B (en) * 2018-05-09 2021-02-02 腾讯音乐娱乐科技(深圳)有限公司 Security detection setting method and device based on website content and storage medium
CN108650257A (en) * 2018-05-09 2018-10-12 腾讯音乐娱乐科技(深圳)有限公司 Safety detection setting method, device and storage medium based on web site contents
CN109525558A (en) * 2018-10-22 2019-03-26 深信服科技股份有限公司 Leaking data detection method, system, device and storage medium
CN109831452A (en) * 2019-03-07 2019-05-31 北京华安普特网络科技有限公司 A kind of distributed fire wall
CN110532753A (en) * 2019-07-01 2019-12-03 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) The safety protecting method and equipment of train operation monitoring and recording device business data flow
CN111083011A (en) * 2019-12-18 2020-04-28 北京网太科技发展有限公司 Automatic testing method and device for routing security firewall and management platform
CN111371750A (en) * 2020-02-21 2020-07-03 浙江德迅网络安全技术有限公司 Intrusion prevention system and intrusion prevention method based on computer network
CN114338087A (en) * 2021-12-03 2022-04-12 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN114338087B (en) * 2021-12-03 2024-03-15 成都安恒信息技术有限公司 Directional operation and maintenance auditing method and system based on firewall
CN115065552A (en) * 2022-07-27 2022-09-16 北京六方云信息技术有限公司 Industrial communication protection method, device, terminal equipment and storage medium
CN115065552B (en) * 2022-07-27 2023-01-10 北京六方云信息技术有限公司 Industrial communication protection method, device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN102857486B (en) 2015-10-21

Similar Documents

Publication Publication Date Title
CN102857486B (en) Application firewall system of future generation and defence method
CN109962903B (en) Home gateway security monitoring method, device, system and medium
US10091167B2 (en) Network traffic analysis to enhance rule-based network security
EP2767056B1 (en) A method and a system to detect malicious software
CN103561004B (en) Cooperating type Active Defending System Against based on honey net
CN101924757B (en) Method and system for reviewing Botnet
CN108494746A (en) A kind of network port Traffic anomaly detection method and system
CN103607399A (en) Special IP network safety monitor system and method based on hidden network
Alsafi et al. Idps: An integrated intrusion handling model for cloud
KR20120065727A (en) Apparatus and method for defending ddos attack
CN101567884A (en) Method for detecting network theft Trojan
CN103532957A (en) Device and method for detecting trojan remote shell behavior
CN102130920A (en) Botnet discovery method and system thereof
KR20110022141A (en) Apparatus for detecting and preventing application layer distribute denial of service attack and method
CN115766235A (en) Network security early warning system and early warning method
Chen et al. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions
KR20020072618A (en) Network based intrusion detection system
CN117375942A (en) Method and device for preventing DDoS attack based on node cleaning
Dhangar et al. Analysis of proposed intrusion detection system
Garg et al. Identifying anomalies in network traffic using hybrid Intrusion Detection System
Han et al. A collaborative botnets suppression system based on overlay network
CN105516096A (en) Botnet network discovery technology and apparatus
Mishra et al. Artificial intelligent firewall
CN109495470A (en) A kind of network information risk safe early warning method and server and system
Leu et al. A DoS/DDoS attack detection system using chi-square statistic approach

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200611

Address after: Nanshan District Xueyuan Road in Shenzhen city of Guangdong province 518000 No. 1001 Nanshan Chi Park building A1 layer

Patentee after: SANGFOR TECHNOLOGIES Inc.

Address before: 518000 Nanshan Science and Technology Pioneering service center, No. 1 Qilin Road, Guangdong, Shenzhen 418, 419,

Patentee before: Shenxin network technology (Shenzhen) Co.,Ltd.