CN105656872A - Attacker tracking method and system based on backbone network - Google Patents

Attacker tracking method and system based on backbone network Download PDF

Info

Publication number
CN105656872A
CN105656872A CN201510421096.3A CN201510421096A CN105656872A CN 105656872 A CN105656872 A CN 105656872A CN 201510421096 A CN201510421096 A CN 201510421096A CN 105656872 A CN105656872 A CN 105656872A
Authority
CN
China
Prior art keywords
effector
server
backbone network
command
monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510421096.3A
Other languages
Chinese (zh)
Inventor
康学斌
董建武
何公道
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201510421096.3A priority Critical patent/CN105656872A/en
Publication of CN105656872A publication Critical patent/CN105656872A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The invention provides an attacker tracking method and system based on a backbone network. The attacker tracking method comprises the following steps of: monitoring a malicious network communication behaviour through monitoring equipment of the backbone network, and obtaining a malicious code sample; analyzing the malicious code sample, and extracting information of an instruction and control server; obtaining the IP of a controller of the current instruction and controller server and corresponding information when the backbone network monitors IP communication between the instruction and control server and a corresponding port; judging whether the IP of the controller is a final controller, and if so, positioning the IP of the final controller; and otherwise, returning to continuously monitor till the IP of the controller is tracked. According to the invention, the problem of being difficult to track the position of a hacker in network communication can be solved; the hacker or control end IP can be tracked and positioned through the backbone network; and the malicious network behaviour is struck.

Description

A kind of assailant's method for tracing based on backbone network and system
Technical field
The present invention relates to computer network security technology field, particularly relate to a kind of assailant's method for tracing based on backbone network and system.
Background technology
Fast development along with network and computing technique, the kind of malicious code, spread speed, infection quantity and coverage are all strengthening gradually, the exploration of the Internet simultaneously also accelerates the propagation of malicious code, various malicious codes emerge in an endless stream, and the attacking ways of assault person constantly converts especially. Meanwhile, the relevant information of assailant is more hidden. The propagation of malicious code and its malicious act are all to rely on network, along with network service behavior, threaten network security greatly.
So, from substantial amounts of network traffic information, how to get the information of hacker, assailant, thus tracking hacker or hacker's tissue, hitting hostile network behavior, guaranteeing network security.
It is to carry out hostile network behavior that hacker discharges malicious code, the machine infecting malicious code eventually connects name and the control of controlled terminal, or send information to controlling end, therefore all can there is a corresponding control and process this type of order and information with command server (C&C server). C&C server mode has two kinds, hubbed mode and decentralized model, and in hubbed mode, effector issues order from a center C&C server to infecting machine, and not only one of which C&C server in decentralized model.
Summary of the invention
Based on existing issue, the present invention proposes a kind of assailant's method for tracing based on backbone network and system, solves the problem that prior art is difficult to final effector is positioned.
A kind of assailant's method for tracing based on backbone network, including:
By backbone network monitoring device, monitor malicious network service behavior, and obtain malicious code sample;
Analyze malicious code sample, extract order and control server info;
Communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance;
Judge whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
In described method, described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information.
In described method, described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain current control and command server effector IP and corresponding informance particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
In described method, the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another.
A kind of assailant's tracing system based on backbone network, including:
Backbone network monitoring module, is used for by backbone network monitoring device, monitor malicious network service behavior, and obtains malicious code sample;
Sample analysis module, is used for analyzing malicious code sample, extracts order and controls server info;
Control client information acquisition module, for communicating with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance;
Terminal judges module, is used for judging whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
In described system, described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information.
In described system, described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain current control and command server effector IP and corresponding informance particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
In described system, the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another.
Advantage of the invention is that, can according to the analysis to malice sample, malicious act in network is tracked, by backbone network is monitored, find the IP communication information, and determine whether whether its effector IP is a new C&C website, if it is continue to follow the trail of, finally navigate to assailant and control end IP.
The invention provides a kind of assailant's method for tracing based on backbone network and system, including: by backbone network monitoring device, monitor malicious network service behavior, and obtain malicious code sample; Analyze malicious code sample, extract order and control server info; Communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance; Judge whether effector IP is final effector, if it is, position final effector IP; Otherwise return and continue monitoring, until tracking effector IP. The invention solves the problem following the trail of hacker position difficulty in network service, it is possible to by backbone network, hacker or control end IP are tracked location, hit network malicious act.
Accompanying drawing explanation
In order to be illustrated more clearly that the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of assailant's method for tracing flow chart based on backbone network of the present invention;
Fig. 2 is a kind of assailant's tracking system architecture schematic diagram based on backbone network of the present invention.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the technical scheme in the embodiment of the present invention, and it is understandable to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, and below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail.
The present invention proposes a kind of assailant's method for tracing based on backbone network and system, solves the problem that prior art is difficult to final effector is positioned.
A kind of assailant's method for tracing based on backbone network, as it is shown in figure 1, include:
S101: by backbone network monitoring device, monitor malicious network service behavior, and obtain malicious code sample;
S102: analyze malicious code sample, extracts order and controls server info;
S103: communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtains the current effector IP controlled with command server and corresponding informance;
S104: judge whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
In described method, described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information. Data message can include the first packet of data, heartbeat packet and instruction bag etc.
In described method, described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain current control and command server effector IP and corresponding informance particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
In described method, the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another. Therefore it is not final effector, but the transfer of an instruction, it is therefore desirable to continue to follow the tracks of his effector IP, until finding final effector.
A kind of assailant's tracing system based on backbone network, as in figure 2 it is shown, include:
Backbone network monitoring module 201, is used for by backbone network monitoring device, monitor malicious network service behavior, and obtains malicious code sample;
Sample analysis module 202, is used for analyzing malicious code sample, extracts order and controls server info;
Control client information acquisition module 203, for communicating with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance;
Terminal judges module 204, is used for judging whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
In described system, described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information.
In described system, described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain current control and command server effector IP and corresponding informance particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
In described system, the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another.
Advantage of the invention is that, can according to the analysis to malice sample, malicious act in network is tracked, by backbone network is monitored, find the IP communication information, and determine whether whether its effector IP is a new C&C website, if it is continue to follow the trail of, finally navigate to assailant and control end IP.
The invention provides a kind of assailant's method for tracing based on backbone network and system, including: by backbone network monitoring device, monitor malicious network service behavior, and obtain malicious code sample; Analyze malicious code sample, extract order and control server info; Communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance; Judge whether effector IP is final effector, if it is, position final effector IP; Otherwise return and continue monitoring, until tracking effector IP. The invention solves the problem following the trail of hacker position difficulty in network service, it is possible to by backbone network, hacker or control end IP are tracked location, hit network malicious act.
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention has many deformation and is varied without departing from the spirit of the present invention, it is desirable to appended claim includes these deformation and is varied without departing from the spirit of the present invention.

Claims (8)

1. the assailant's method for tracing based on backbone network, it is characterised in that including:
By backbone network monitoring device, monitor malicious network service behavior, and obtain malicious code sample;
Analyze malicious code sample, extract order and control server info;
Communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance;
Judge whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
2. the method for claim 1, it is characterised in that described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information.
3. the method for claim 1, it is characterised in that described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain current control and command server effector IP and corresponding informance particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
4. the method for claim 1, it is characterised in that the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another.
5. the assailant's tracing system based on backbone network, it is characterised in that including:
Backbone network monitoring module, is used for by backbone network monitoring device, monitor malicious network service behavior, and obtains malicious code sample;
Sample analysis module, is used for analyzing malicious code sample, extracts order and controls server info;
Control client information acquisition module, for communicating with the IP controlling server and corresponding ports at backbone network monitor command, obtain the current effector IP controlled with command server and corresponding informance;
Terminal judges module, is used for judging whether effector IP is final effector, if it is, position final effector IP; Otherwise return previous step and continue monitoring.
6. system as claimed in claim 5, it is characterised in that described order includes with controlling server info: network service five-tuple information, server domain name information, and desired data information.
7. system as claimed in claim 5, it is characterised in that described communicate with the IP controlling server and corresponding ports at backbone network monitor command, obtain effector IP and the corresponding informance of current control and command server particularly as follows:
Sense command and control server OS environment, if order is windows with control server OS environment, then monitor 3389 ports; If order is linux with control server OS environment, then monitor 22 ports; If order is web site with control server OS environment, then monitoring FTP and webshell.
8. system as claimed in claim 5, it is characterised in that the described effector of judgement IP be whether final effector particularly as follows:
Effector's IP corresponding device is carried out packet capturing, if the packet sent comprises instruction bag, the packet received comprises the first packet that controlled terminal sends, and externally do not send particular network packet, then effector IP corresponding device is final effector, otherwise controls and command server for another.
CN201510421096.3A 2015-07-17 2015-07-17 Attacker tracking method and system based on backbone network Pending CN105656872A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510421096.3A CN105656872A (en) 2015-07-17 2015-07-17 Attacker tracking method and system based on backbone network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510421096.3A CN105656872A (en) 2015-07-17 2015-07-17 Attacker tracking method and system based on backbone network

Publications (1)

Publication Number Publication Date
CN105656872A true CN105656872A (en) 2016-06-08

Family

ID=56481639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510421096.3A Pending CN105656872A (en) 2015-07-17 2015-07-17 Attacker tracking method and system based on backbone network

Country Status (1)

Country Link
CN (1) CN105656872A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790142A (en) * 2016-12-28 2017-05-31 北京安天网络安全技术有限公司 The method and system that a kind of discovery IoT equipment is invaded
CN108512805A (en) * 2017-02-24 2018-09-07 腾讯科技(深圳)有限公司 A kind of network security defence method and network security defence installation
CN111212063A (en) * 2019-12-31 2020-05-29 北京安码科技有限公司 Attack countering method based on gateway remote control

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080127338A1 (en) * 2006-09-26 2008-05-29 Korea Information Security Agency System and method for preventing malicious code spread using web technology
CN101360019A (en) * 2008-09-18 2009-02-04 华为技术有限公司 Detection method, system and apparatus of zombie network
CN101753562A (en) * 2009-12-28 2010-06-23 成都市华为赛门铁克科技有限公司 Detection methods, device and network security protecting device for botnet
CN101841523A (en) * 2010-02-05 2010-09-22 中国科学院计算技术研究所 Method for detecting network behavior of malicious code sample and system thereof
CN102833240A (en) * 2012-08-17 2012-12-19 中国科学院信息工程研究所 Malicious code capturing method and system
CN103475529A (en) * 2013-10-11 2013-12-25 大唐移动通信设备有限公司 Method and device for tracking core network side application plane and application plane tracking system
CN103595732A (en) * 2013-11-29 2014-02-19 北京奇虎科技有限公司 Method and device for obtaining evidence of network attack
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080127338A1 (en) * 2006-09-26 2008-05-29 Korea Information Security Agency System and method for preventing malicious code spread using web technology
CN101360019A (en) * 2008-09-18 2009-02-04 华为技术有限公司 Detection method, system and apparatus of zombie network
CN101753562A (en) * 2009-12-28 2010-06-23 成都市华为赛门铁克科技有限公司 Detection methods, device and network security protecting device for botnet
CN101841523A (en) * 2010-02-05 2010-09-22 中国科学院计算技术研究所 Method for detecting network behavior of malicious code sample and system thereof
CN102833240A (en) * 2012-08-17 2012-12-19 中国科学院信息工程研究所 Malicious code capturing method and system
CN103475529A (en) * 2013-10-11 2013-12-25 大唐移动通信设备有限公司 Method and device for tracking core network side application plane and application plane tracking system
CN103595732A (en) * 2013-11-29 2014-02-19 北京奇虎科技有限公司 Method and device for obtaining evidence of network attack
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790142A (en) * 2016-12-28 2017-05-31 北京安天网络安全技术有限公司 The method and system that a kind of discovery IoT equipment is invaded
CN108512805A (en) * 2017-02-24 2018-09-07 腾讯科技(深圳)有限公司 A kind of network security defence method and network security defence installation
CN111212063A (en) * 2019-12-31 2020-05-29 北京安码科技有限公司 Attack countering method based on gateway remote control

Similar Documents

Publication Publication Date Title
KR20120068612A (en) Dns query traffic monitoring and processing method and apparatus
US20140189867A1 (en) DDoS ATTACK PROCESSING APPARATUS AND METHOD IN OPENFLOW SWITCH
EP2448211B1 (en) Method, system and equipment for detecting botnets
CN106302450B (en) A kind of detection method and device based on malice address in DDOS attack
EP1976227A3 (en) Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US20120173712A1 (en) Method and device for identifying p2p application connections
CN105656872A (en) Attacker tracking method and system based on backbone network
CN104796405B (en) Rebound connecting detection method and apparatus
CN104135474A (en) Network anomaly behavior detection method based on out-degree and in-degree of host
CN109587156A (en) Abnormal network access connection identification and blocking-up method, system, medium and equipment
CN105791220A (en) Method and system for actively defending distributed denial of service attacks
CN106686007A (en) Active flow analysis method for finding intranet controlled rerouting nodes
CN108270722A (en) A kind of attack detection method and device
CN102130920A (en) Botnet discovery method and system thereof
CN110336808A (en) A kind of attack source tracing method and system towards electric power industry control network
CN101051997A (en) P2P flow identifying control method based on network application
CN100493065C (en) Method for using immediate information software by data detection network address switching equipment
CN110300091A (en) Host in tracking network, which threatens and is directed to host and threatens, implements threat strategy movement
KR101528928B1 (en) Apparatus and method for managing network traffic based on flow and session
CN105959289A (en) Self-learning-based safety detection method for OPC Classic protocol
KR20150076613A (en) Method for collecting the suspicious file and trace information to analysis the ATP attack
CN113572764B (en) Industrial Internet network security situation awareness system based on AI
KR20150026345A (en) Apparatus and method for creating whitelist with network traffic
CN108055166A (en) A kind of the state machine extraction system and its extracting method of the application layer protocol of nesting
CN105915536A (en) Attack behavior real-time tracking and analysis method for cyber range

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Applicant after: Harbin antiy Technology Group Limited by Share Ltd

Address before: 506 room 162, Hongqi Avenue, Nangang District, Harbin Development Zone, Heilongjiang, 150090

Applicant before: Harbin Antiy Technology Co., Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160608

WD01 Invention patent application deemed withdrawn after publication