CN103856486A - Large-scale network logical safety domain access control method - Google Patents

Large-scale network logical safety domain access control method Download PDF

Info

Publication number
CN103856486A
CN103856486A CN201410070159.0A CN201410070159A CN103856486A CN 103856486 A CN103856486 A CN 103856486A CN 201410070159 A CN201410070159 A CN 201410070159A CN 103856486 A CN103856486 A CN 103856486A
Authority
CN
China
Prior art keywords
border
control method
boundary
application
isolation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410070159.0A
Other languages
Chinese (zh)
Inventor
马琳
刘嵩
刘福强
房潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UNIT 91655 OF PLA
Original Assignee
UNIT 91655 OF PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UNIT 91655 OF PLA filed Critical UNIT 91655 OF PLA
Priority to CN201410070159.0A priority Critical patent/CN103856486A/en
Publication of CN103856486A publication Critical patent/CN103856486A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a large-scale network logical safety domain access control method for independent and differentiated protection of different safety domains. The method includes the first step of dividing boundaries between the safety domains into external network boundaries, internal network boundaries, application boundaries, longitudinal boundaries and horizontal boundaries according to connection and information relations between application systems with different types and different grades, and the second step of enabling the external network boundaries to implement one-way data input for physical isolation by adopting mobile storage media, and adopting a one-way safe isolation method and a two-way safe isolation method for logical isolation. According to the large-scale network logical safety domain access control method, the independent and differentiated protection of the different safety domains are achieved, architectures of networks and systems can be straightened out, logical structures of information systems can be more clear, and complexity for system design is simplified.

Description

A kind of large scale network logical security domain browsing control method
Technical field
The present invention relates to a kind of security domain access control method, especially a kind of large scale network logical security domain browsing control method.
Background technology
In a lot of large-scale distributed information systems, related to multiclass application subsystem, comprised again multiple subsystems in different subsystems, different subsystems and subsystem have accessed again a lot of support safeguards systems, make the network configuration more sophisticated of information system
Summary of the invention
The invention provides a kind of independent of different security domains, large scale network logical security domain browsing control method of differentiation protection of realizing.
The large scale network logical security domain browsing control method that realizes the object of the invention, comprises the steps:
(1) connection and the information relationship between the application system of, different stage dissimilar according to information system, is outer net border, Intranet border, application boundary, longitudinal boundary and horizontal boundary five classes by the boundary demarcation between security domain;
(2) described outer net border adopts mobile memory medium to implement one-way data importing and realizes physical isolation; Adopt one-way safety partition method and bidirectional safe partition method to realize logic isolation;
Described Intranet border Adoption Network access control method, virus and malicious code filter method, authentication and authorization method and intrusion detection and the isolation of auditing method implementation strategy;
Described application boundary Adoption Network access control method, access authentication and authorize control method and execute application isolation;
Described longitudinal boundary Adoption Network access control method, virus and malicious code filter method, discriminating/mandate/authentication method and intrusion detection and auditing method practice isolation;
Described horizontal boundary Adoption Network access control method, virtual subnet method and access list approach are guaranteed data exchange safety.
Described outer net border is the border of application system or its external network such as network and the Internet relying on;
Described Intranet border is the border between application system and the network that relies on thereof;
Described application boundary is the border between different application systems;
Described longitudinal boundary is the border between the superior and the subordinate or the similar application system of sane level;
Described horizontal boundary is the exchanging visit border between the inner different operating of application system territory.
The beneficial effect of large scale network logical security domain browsing control method of the present invention is as follows:
Large scale network logical security domain browsing control method of the present invention, for meeting the various demands for security of operation system and network system of information system complexity, take a point principle for territory protection, according to the type of business, importance, the difference of managerial class and safe class, carry out the division of logical security territory, according to " classification, classification, subregion " pattern, under total defense System Framework, classify according to the function of system and purposes, homogeneous system is carried out classification according to position and the importance of disposing, similar internal system at the same level forms subregion according to system, demand for security is decomposed step by step, form defense module independently one by one, it is logical security territory, by the access mechanism between Different Logic security domain is made overall planning, independently safety and Protection is carried out in different security domains inside, realize the independent of different security domains, differentiation protection, so that make the framework of network and system in order, make the logical construction of information system more clear, thereby simplify the complexity of system.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of large scale network information system logical security territory boundary demarcation of the present invention.
Embodiment
As shown in Figure 1, large scale network logical security domain browsing control method of the present invention, comprises the steps:
(1) connection and the information relationship between the application system of, different stage dissimilar according to information system, is outer net border, Intranet border, application boundary, longitudinal boundary and horizontal boundary five classes by the boundary demarcation between security domain;
Described outer net border is the border of application system or its external network such as network and the Internet relying on;
Described Intranet border is the border between application system and the network that relies on thereof;
Described application boundary is the border between different application systems;
Described longitudinal boundary is the border between the superior and the subordinate or the similar application system of sane level;
Described horizontal boundary is the exchanging visit border between the inner different operating of application system territory;
(2) described outer net border adopts mobile memory medium to implement one-way data importing and realizes physical isolation; Adopt one-way safety partition method and bidirectional safe partition method to realize logic isolation;
Described Intranet border Adoption Network access control method, virus and malicious code filter method, authentication and authorization method and intrusion detection and the isolation of auditing method implementation strategy;
Described application boundary Adoption Network access control method, access authentication and authorize control method and execute application isolation;
Described longitudinal boundary Adoption Network access control method, virus and malicious code filter method, discriminating/mandate/authentication method and intrusion detection and auditing method practice isolation;
Described horizontal boundary Adoption Network access control method, virtual subnet method and access list approach are guaranteed data exchange safety.
Physical security technological means is for guaranteeing Environmental security, installation security and the media safety of information system, Environmental security comprises the safety of the environment at information system place, installation security comprises the safety of information system relevant device, and media safety comprises the safety of media data and the safety of media itself.
Network security technology means are mainly for the fail safe of basic network and availability, realize the functions such as network access security, network exchange safety and virus filtration, emphasis solves border access security problem, guarantee the safety of communication and exchange, and information system is carried out to Real-Time Monitoring, the weak link in active searching network, and in the time attacking generation, can find in time its inherent law, judge in real time, exactly source, means, the point of attack and the Harm of attack.
The safety problem of the main settlement server of Host Security technological means and terminal, realize the security protection to server and terminal: provide host computer system security protection and monitor audit ability, can carry out security monitoring and audit to behaviors such as main frame access in violation of rules and regulations, illegal external connection, peripheral hardware copy and accesss to netwoks, take precautions against secret leaking event to occur; Security risk assessment and hidden danger ability of discovery are provided, find in time and repair leak; Main frame virus killing ability is in real time provided, realizes the antivirus protection to server and terminal.
Application safety technological means is take certificate management system as basis, provide the function such as authentication and rights management for applied business, by Secure Application DLL (dynamic link library) or application proxy mode, the services such as confidentiality, integrality, non-repudiation, access control are provided for application system, and possess the security audit ability to application system, can register user, the behavior such as system use carries out audit trail.
Technology On Data Encryption means are for guaranteeing integrality and the confidentiality of system significant data information at transmitting procedure and storing process, and while guaranteeing completeness error to be detected in storing process, have corresponding measure information is recovered.
Embodiment recited above is described the preferred embodiment of the present invention; not scope of the present invention is limited; design under spiritual prerequisite not departing from the present invention; various distortion and improvement that the common engineers and technicians in this area make technical solution of the present invention, all should fall in the definite protection range of claims of the present invention.

Claims (2)

1. a large scale network logical security domain browsing control method, comprises the steps:
(1) connection and the information relationship between the application system of, different stage dissimilar according to information system, is outer net border, Intranet border, application boundary, longitudinal boundary and horizontal boundary five classes by the boundary demarcation between security domain;
(2) described outer net border adopts mobile memory medium to implement one-way data importing and realizes physical isolation; Adopt one-way safety partition method and bidirectional safe partition method to realize logic isolation;
Described Intranet border Adoption Network access control method, virus and malicious code filter method, authentication and authorization method and intrusion detection and the isolation of auditing method implementation strategy;
Described application boundary Adoption Network access control method, access authentication and authorize control method and execute application isolation;
Described longitudinal boundary Adoption Network access control method, virus and malicious code filter method, discriminating/mandate/authentication method and intrusion detection and auditing method practice isolation;
Described horizontal boundary Adoption Network access control method, virtual subnet method and access list approach are guaranteed data exchange safety.
2. large scale network logical security domain browsing control method according to claim 1, is characterized in that: described outer net border is the border of application system or its external network such as network and the Internet relying on;
Described Intranet border is the border between application system and the network that relies on thereof;
Described application boundary is the border between different application systems;
Described longitudinal boundary is the border between the superior and the subordinate or the similar application system of sane level;
Described horizontal boundary is the exchanging visit border between the inner different operating of application system territory.
CN201410070159.0A 2014-02-28 2014-02-28 Large-scale network logical safety domain access control method Pending CN103856486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410070159.0A CN103856486A (en) 2014-02-28 2014-02-28 Large-scale network logical safety domain access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410070159.0A CN103856486A (en) 2014-02-28 2014-02-28 Large-scale network logical safety domain access control method

Publications (1)

Publication Number Publication Date
CN103856486A true CN103856486A (en) 2014-06-11

Family

ID=50863700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410070159.0A Pending CN103856486A (en) 2014-02-28 2014-02-28 Large-scale network logical safety domain access control method

Country Status (1)

Country Link
CN (1) CN103856486A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN105808987A (en) * 2014-12-30 2016-07-27 中国移动通信集团公司 Mobile data interaction method and device
CN110768832A (en) * 2019-10-24 2020-02-07 中国计量大学 Method for monitoring information security domain of industrial control system
CN112910921A (en) * 2021-03-02 2021-06-04 中核武汉核电运行技术股份有限公司 Industrial control boundary network safety protection method
CN114826760A (en) * 2022-05-12 2022-07-29 深圳铸泰科技有限公司 Network security analysis method based on boundary theory
CN115766189A (en) * 2022-11-10 2023-03-07 贵州电网有限责任公司 Multi-channel isolation safety protection method and system
CN115766189B (en) * 2022-11-10 2024-05-03 贵州电网有限责任公司 Multichannel isolation safety protection method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916342A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Secure mobile storage device and method for realizing secure data exchange by using same
CN202495968U (en) * 2011-05-06 2012-10-17 辽宁省电力有限公司信息通信分公司 Enterprise integration information platform
CN103491072A (en) * 2013-09-06 2014-01-01 北京信息控制研究所 Boundary access control method based on double one-way separation gatekeepers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916342A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Secure mobile storage device and method for realizing secure data exchange by using same
CN202495968U (en) * 2011-05-06 2012-10-17 辽宁省电力有限公司信息通信分公司 Enterprise integration information platform
CN103491072A (en) * 2013-09-06 2014-01-01 北京信息控制研究所 Boundary access control method based on double one-way separation gatekeepers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蒋诚智、等: "基于等级保护的智能电网信息安全防护模型研究", 《计算机与现代化》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808987A (en) * 2014-12-30 2016-07-27 中国移动通信集团公司 Mobile data interaction method and device
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN110768832A (en) * 2019-10-24 2020-02-07 中国计量大学 Method for monitoring information security domain of industrial control system
CN110768832B (en) * 2019-10-24 2022-07-26 中国计量大学 Method for monitoring information security domain of industrial control system
CN112910921A (en) * 2021-03-02 2021-06-04 中核武汉核电运行技术股份有限公司 Industrial control boundary network safety protection method
CN114826760A (en) * 2022-05-12 2022-07-29 深圳铸泰科技有限公司 Network security analysis method based on boundary theory
CN114826760B (en) * 2022-05-12 2023-08-15 深圳铸泰科技有限公司 Network security analysis method based on boundary theory
CN115766189A (en) * 2022-11-10 2023-03-07 贵州电网有限责任公司 Multi-channel isolation safety protection method and system
CN115766189B (en) * 2022-11-10 2024-05-03 贵州电网有限责任公司 Multichannel isolation safety protection method and system

Similar Documents

Publication Publication Date Title
Habibzadeh et al. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities
Nguyen et al. {FLAME}: Taming backdoors in federated learning
Mughal Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
US7779465B2 (en) Distributed peer attack alerting
US20130086685A1 (en) Secure integrated cyberspace security and situational awareness system
US20130086376A1 (en) Secure integrated cyberspace security and situational awareness system
CN105409164A (en) Rootkit detection by using hardware resources to detect inconsistencies in network traffic
Kebande et al. Real-time monitoring as a supplementary security component of vigilantism in modern network environments
CN105430000A (en) Cloud computing security management system
CN103856486A (en) Large-scale network logical safety domain access control method
CN104065651A (en) Information flow dependability guarantee mechanism for cloud computation
CN109587106A (en) Cross-domain safety in the cloud of password subregion
Heinrich et al. Security requirements engineering in safety-critical railway signalling networks
Gupta et al. A light weight centralized file monitoring approach for securing files in cloud environment
Magare et al. Security and privacy issues in smart city: Threats and their countermeasures
Miloslavskaya et al. Big data information security maintenance
Gonzalez-Granadillo et al. Using an event data taxonomy to represent the impact of cyber events as geometrical instances
Thaseen et al. Improving security and privacy in cyber-physical systems
Alert Advanced persistent threat compromise of government agencies, critical infrastructure, and private sector organizations
Prakash et al. A survey of security challenges, attacks in IoT
Márquez Díaz Cybersecurity and Internet of Things. Outlook for this decade
Ruha Cybersecurity of computer networks
Hill et al. Poster: DyPolDroid: User-centered counter-policies against android permission-abuse attacks
CN113452718B (en) Active defense method and system for exclusive storage space

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140611