CN106534042A - Server invasion identifying method and apparatus based on data analysis and cloud safety system - Google Patents

Server invasion identifying method and apparatus based on data analysis and cloud safety system Download PDF

Info

Publication number
CN106534042A
CN106534042A CN201510571634.7A CN201510571634A CN106534042A CN 106534042 A CN106534042 A CN 106534042A CN 201510571634 A CN201510571634 A CN 201510571634A CN 106534042 A CN106534042 A CN 106534042A
Authority
CN
China
Prior art keywords
server
data
source data
attack
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510571634.7A
Other languages
Chinese (zh)
Inventor
周来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510571634.7A priority Critical patent/CN106534042A/en
Publication of CN106534042A publication Critical patent/CN106534042A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention discloses a server invasion identifying method and apparatus based on data analysis and a cloud safety system. The method includes the steps of analyzing attacking source data invading a server from security events recorded by one or more servers, searching the attacking source data in the accessing data of the current server, and determining that the current server is invaded if the access data generated by the attacking source data accessing the current server exists. According to the server invasion identifying scheme based on data analysis, security data recorded by one or more servers under the cloud environment can be effectively exploited and utilized, and the identifying scope can be expanded to multiple servers under the cloud environment.

Description

Based on the server invasive biology method of data analysiss, device and cloud security system
Technical field
The application is related to field of computer technology, and in particular to a kind of server based on data analysiss enters Invade recognition methodss, a kind of a kind of server invasive biology device and Yunan County's complete set based on data analysiss System.
Background technology
In today that cloud computing day is more popularized, the user of Cloud Server increasingly pays close attention to the peace of Cloud Server Entirely, the safety of Cloud Server has become one of core competitiveness of cloud computing service.
Due to should on being short of of safety consciousness and the security capabilities by Cloud Server user, Cloud Server With multiformity, web leaks, system vulnerability, 0day leaks, weak passwurd, server it is incorrect The impact of the factors such as configuration, substantial amounts of Cloud Server are invaded by attack source, become broiler, the industry of user Business and data safety are subject to serious threat.In this context, Cloud Server faces safely very severe Challenge, server intrusion detection is extremely important.
Server invasive biology refer to attack source break through system of defense invasion server success after, can and When identify event that server is invaded, and notify that user is processed, so as to contribute to reducing user Loss, control cloud computing environment in broiler threaten, purify system for cloud computing environment.Therefore with clothes Business device Prevention-Security means are compared, and the invasive biology of server is also critically important.
Traditional invasive biology method includes viral wooden horse scanning, web back door scanning, server log The methods such as analysis.For example, the file inside server web catalogues is collected, is then carried out beyond the clouds Webshell killings;Brute Force event is collected, is then intercepted etc..But the analysis of this scheme with The data of detection are all produced by single server, and identification range is only resided within single server.
The content of the invention
In view of the above problems, it is proposed that the application is to provide one kind and overcome the problems referred to above or at least portion The server invasive biology method based on data analysiss and corresponding being based on for solving the above problems with dividing is counted According to the server invasive biology device of analysis.
According to the one side of the application, there is provided a kind of server invasive biology based on data analysiss Method, including:The parsing invasion server from the security incident of one or more server record Attack source data;The attack source data is searched in the access data of current server;If existing The access data that the current server by described in the attack source data access is produced, it is determined that described current Server is invaded.
Alternatively, collect the security incident of one or more server record.
Alternatively, when the security incident includes web attacks, the collection one or more The security incident of server record includes:The web applications guard system for accessing the server obtains pin Web attacks to the server, and/or, extract the mirror image of the network traffics of the server The mirror image data and default detected rule are carried out rule match and are obtained for the service by data The web attacks of device.
Alternatively, when the security incident includes server Brute Force event, the collection one Or the security incident of multiple servers record includes:The login daily record of the server is gathered, by dividing Analysis it is described log in daily record include login successfully event and login failure event is obtained for the service The server Brute Force event of device.
Alternatively, when the security incident includes Denial of Service attack event, the collection one Or the security incident of multiple servers record includes:The distributed denial of service for accessing the server is attacked Hit system and obtain the Denial of Service attack event for the server.
Alternatively, it is described search in the access data of current server it is described attack source data packet include: From the access data of the current server, parsing logs in the login source data of the current server, And in the login source data of attack source data search parsing;If finding the login source data, Then determine the access data for having that the current server by described in the attack source data access is produced.
Alternatively, the access data possess the mark attack source data to the server malice journey The malice coefficient of degree, it is determined that have what the current server by described in the attack source data access was produced After accessing data, methods described also includes:It is determined that the malice system of the attack source data for finding Number is more than pre-set threshold value.
Alternatively, methods described also includes:Count Hit number of times and attack frequency, and the attack source is calculated according to the number of times of attack and the attack frequency The malice coefficient of data.
Alternatively, the current server is determined by before invading described, methods described also includes: It is determined that the attack source data for finding was not logged in the current server before this access; And/or, it is determined that the attack source data for finding not is commonly used logs in source data.
Alternatively, methods described also includes:Generation notifies the prompting letter invaded by the current server Breath;
The information is illustrated on the current server, and/or, by under the information It is dealt into the client for accessing the current server.
Alternatively, methods described also includes:If receiving user to be invaded for the current server Information feedback wrong report information, then reduce it is described attack source data malice coefficient;And/or, If not receiving the wrong report information of the information feedback invaded for the current server by user, Then increase the malice coefficient for attacking source data.
Alternatively, methods described also includes:If not existing current by described in the attack source data access The access data that server is produced, it is determined that the current server is not invaded, and extracts the visit Ask that the corresponding source data that logs in of data is added to the conventional login source data of the current server.
Alternatively, parsing invasion server in the security incident from one or more server record Attack source data packet include:The attack source IP ground of the parsing invasion server from the security incident Location.
Alternatively, methods described also includes:By the attack source number imported outside preset interface According to.
Alternatively, the security incident includes web attacks, server Brute Force event and refuses At least one of exhausted service event.
According to the another aspect of the application, there is provided a kind of server invasive biology based on data analysiss Device, including:Attack source data acquisition module, for the safety from one or more server record The attack source data of the parsing invasion server in event;Data search module, for taking currently The attack source data is searched in the access data of business device, and determines that presence is visited by the attack source data Ask the access data that the current server is produced;Invasion determining module, for determining the current clothes Business device is invaded.
Alternatively, described device also includes:Security incident collection module, for collecting one or more The security incident of server record.
Alternatively, the access data possess the mark attack source data to the server malice journey The malice coefficient of degree, described device also include:Malice coefficient judge module, for it is determined that exist by After the access data that current server described in the attack source data access is produced, it is determined that find The malice coefficient for attacking source data is more than pre-set threshold value.
Alternatively, described device also includes:Historical log determining module, for it is determined that described current Server by before invading, it is determined that the attack source data for finding was not logged in before this access Cross the current server;And/or, commonly use and log in determining module, for it is determined that the current service Device is by before invading, it is determined that the attack source data for finding not is commonly used logs in source data.
According to the another further aspect of the application, there is provided a kind of cloud security system, including current server and Attack source database;The attack source database, for the safety from one or more server record The attack source data of the parsing invasion server in event;The current server includes:Data are looked into Module is looked for, for searching the attack source data in the access data of the current server;Invasion , if for there is the access that the current server by described in the attack source data access is produced in judge module Data, it is determined that the current server is invaded.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment The attack source data of attack server is parsed in security incident, is looked in the access data of current server The attack source data is looked for, when there are access data corresponding by attack source data, identification is current to be taken Business device is invaded, so as to the secure data to one or more server record under cloud environment is carried out Sufficiently effective excavation and utilization, identification range can expand the multiple servers under cloud environment to.
Described above is only the general introduction of technical scheme, in order to better understand the application's Technological means, and being practiced according to the content of description, and in order to allow the above-mentioned of the application and Other objects, features and advantages can become apparent, below especially exemplified by the specific embodiment party of the application Formula.
Description of the drawings
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit for Those of ordinary skill in the art will be clear from understanding.Accompanying drawing is only used for illustrating the mesh of preferred implementation , and it is not considered as the restriction to the application.And in whole accompanying drawing, with identical with reference to symbol Number represent identical part.In the accompanying drawings:
Fig. 1 shows the server invasive biology side based on data analysiss according to the application one embodiment The flow chart of method;
Fig. 2 shows the server invasive biology based on data analysiss according to another embodiment of the application The flow chart of method;
Fig. 3 collects the schematic diagram of malice IP in showing the example of the embodiment of the present application;
Fig. 4 shows server invasive biology process schematic in the example of the embodiment of the present application;
Fig. 5 shows The structured flowchart put;
Fig. 6 shows the server invasive biology based on data analysiss according to another embodiment of the application The structured flowchart of device;
Fig. 7 shows the structured flowchart of the cloud security system according to the application one embodiment.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing in accompanying drawing The exemplary embodiment of the disclosure is shown, it being understood, however, that may be realized in various forms the disclosure And should not be limited by embodiments set forth here.On the contrary, there is provided these embodiments are able to more Thoroughly understand the disclosure, and can be by the scope of the present disclosure complete technology for conveying to this area Personnel.
With reference to Fig. 1, entering based on the server of data analysiss according to the application one embodiment is shown The flow chart for invading recognition methodss, the method specifically may comprise steps of:
Step 101, the parsing invasion server from the security incident of one or more server record Attack source data.
On server in cloud cluster, record has the security incident for having occurred, and security incident meets with for server The attack received, such as web attacks, server password Brute Force event and server are stepped on Record daily record etc..The application can extract security incident from wherein one server, or take from multiple stage Security incident is extracted on business device respectively as subsequent analysis foundation.
The security incident of server record includes the relevant information of the attack source of attack server, is designated as Source data is attacked, in the embodiment of the present application, the attack that source data can be mark invasion server is attacked The information in source, can be specifically the network address (such as IP address, MAC Address etc.), or The identifier server of the affiliated actual geographic position in attack source, or attack source place server or It is the device identifier of terminal, can also be other any suitable information categories.
The various ways that attack source Data Source is subject in whole cloud computing platform is attacked, with cloud meter The popularization of calculation, the growth of Cloud Server user, data volume will be increasing, attack classification with Increasingly enrich, by attack event analysis be used for server invasive biology also will produce it is bigger Value, and analytical effect can be more beneficial for comprehensively clothes with the increase of the data volume of attack Business device Prevention-Security.
Step 102, searches the attack source data in the access data of current server.
After the attack source information for parsing attack source to the security incident that history occurs, further may be used It is monitored for the access behavior to occurring on certain current server, can be using access data The access behavior that record occurs on current server, further in the access data of current server The attack source data is searched, is accessed in data with the presence or absence of being produced by attack source attack server with determining Raw access data.
The access data can record various Access Events of the external equipment to current server, example Such as, it can be the logon data for recording external equipment in the log-in events of current server to access data, Can also be record search data of the external equipment to the search events of current server, can also be note The data of record other types Access Events, the application are without limitation.
The attack source data is searched in the access data, if there is whole or portion in accessing data Divide the attack source data, it is determined that current server is invaded.
, if there is the access number that the current server by described in the attack source data access is produced in step 103 According to, it is determined that the current server is invaded.
If finding the attack source data in the access data of current server, can determine and deposit In the access data produced by attack source data access current server, then current server is attacked Source is invaded.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment Parse the attack source data of attack server in security incident, data search module, when existing by attacking Source data it is corresponding access data when, identification current server invaded, so as to under cloud environment The secure data of platform or multiple servers record has carried out sufficiently effective excavation and utilization, identification range The multiple servers under cloud environment can be expanded to.In a preferred embodiment of the present application, the step Rapid 102 can include:
Sub-step S1, the parsing from the access data of the current server log in the current server Login source data, and the attack source data search parsing login source data.
Sub-step S2, if find the login source data, it is determined that exist by the attack source data Access the access data that the current server is produced.
The login source number of the visitor for accessing current server has been recorded in the access data of current server According to accessing to the one or many of current server due to accessing data and can record, accordingly, step on Record source data can then correspond to the log-on message of one or more visitors.Log in source data and attack source Data can be same type of data, for identifying the visitor of login service device, when certain access When the login source data of person is identical with the attack source data of certain attack source, then the visitor is can determine For attack source, therefore, it can search whether in the login source data that record has at least one attack source There are the access data of current server, if existing, can determine that the already present access data are Current server is accessed by the corresponding attack source of the attack source data to produce.
In the embodiment of the present application, the attack source that attack source data could be for identified attacks server is each Kind of information, it can be the IP address of attack source that the embodiment of the present application preferably attacks source data, it is described from In the security incident, the attack source data of each server of parsing invasion can include:
Sub-step S3, the attack source IP address of the parsing invasion server from the security incident.
With reference to Fig. 2, entering based on the server of data analysiss according to another embodiment of the application is shown The flow chart for invading recognition methodss, the method specifically may comprise steps of:
Step 201, collects the security incident of one or more server record.
In a preferred embodiment of the present application, the security incident can include web attacks, At least one of server Brute Force event and Denial of Service attack event, according to actual application environment The other kinds of security incident of other systems record can also be included.The source of security incident can be The cloud security related system disposed on server, can also originate from any other and can provide security incident Source, the application is not restricted to this.
It is further preferred that when the security incident includes web attacks, the step 201 The middle security incident for collecting one or more server record can include:
Sub-step S4, the web applications guard system for accessing the server are obtained for the server Web attacks.
And/or, sub-step S5 extracts the mirror image data of the network traffics of the server, by the mirror Obtain attacking thing for the web of the server as data and default detected rule carry out rule match Part.
In a kind of example of the application, web can be obtained by web applications guard system and attack thing Part.Web applications guard system is used for protection and the web of server is attacked, and with web application firewalls is Example, web application firewalls are by performing a series of security strategies for procotol come exclusively for web Using protection is provided, by parsing the HTTP request that web client is initiated, content therein is carried out Detection, refusal do not meet the request of HTTP standards, meanwhile, only allow the component options of http protocol Pass through, so as to reduce the coverage of attack.For the request of refusal is carried out using web attacks Record, can obtain the web attacks of record by accessing web application firewalls.
In another kind of example of the application, web attack things can also be obtained by analyzing network traffics Part.The mirror image number of network traffics that the server with external equipment communicated is collected in advance can According to.For example, web application firewalls can be linked in network by series connection or bypass mode, The mirror image data of the network traffics of access server is replicated, or by the webserver and network road Collecting device is arranged by equipment and replicates mirror image data, can also be gathered by other any suitable modes The mirror image data of network traffics.
Further, according to for attack detected rule set in advance, by mirror image data and detection Rule carries out rule match, obtains the web attacks for each server.Specific detection rule Then can be set according to practical application, for example, include in mirror image data or do not include certain specific pass Keyword, or the number of times that certain particular keywords occurs exceedes or is less than certain threshold value etc., further The web attacks with rule match can be extracted from the mirror image data of network traffics.
In a preferred embodiment of the present application, when the security incident includes server Brute Force thing During part, the security incident for collecting one or more server record in the step 201 can include:
Sub-step S6, gathers the login daily record of the server, is wrapped in the login daily record by analyzing Include login successfully event and login failure event obtains the server Brute Force for the server Event.
Brute Force is attacked and refers to attack source by systematically combining all possible log-on message combination, The log-on message of crack servers is attempted, is remembered in the login daily record of server in login process for several times Record logins successfully event and login failure event.
If repeatedly occurring, from the same login failure event for logging in source data, can determine and sending out Brute Force event is given birth to;If after it there is multiple login failure event, logining successfully appearance and logging in Success events, it is believed that successfully logged in by Brute Force.Can be according to even in the embodiment of the present application The number of times of the login failure event occurred in continuous preset time period, there occurs from certain login with determining The Brute Force event of source data, further determines that occur the login source after multiple login failure event Data login successfully event, then record the Brute Force event.
In a preferred embodiment of the present application, when the security incident includes Denial of Service attack event When, the security incident for collecting one or more server record in the step 201 includes:
Sub-step S7, the distributed denial of service attack system for accessing the server are obtained for described The Denial of Service attack event of server.
Distributed denial of service attack (DistributedDenial of Service, DDoS) refer to by means of Client/server technology, multiple computers are joined together as Attack Platform, to one or more mesh Mark starts ddos attack, so as to exponentially improve the power of Denial of Service attack.Generally, attack source makes DDoS primary control programs are installed on a computer with a stealing account number, in the time of a setting Primary control program will be communicated with a large amount of Agents, and Agent has been installed within many meters on network On calculation machine.With regard to offensive attack when Agent receives instruction.Using client/server technology, master control journey Sequence can activate the operation of hundreds and thousands of Agents in seconds.In the embodiment of the present application, according to The refusal attack recorded in the DDoS systems installed on server in extraction cloud cluster.Specifically can be with Obtained by access target file, it is also possible to by obtaining to DDoS system requests.
Being different from background technology carries out invasion knowledge according to the secure data collected from server web client Other scheme, in the above-mentioned preferred exemplary of the application, can extract the cloud security related system of server The security incident of collection, and a kind of brand-new invasive biology method is provided accordingly.
In implementing, can be with the peace of the acquisition current server from other kinds of air control data Total event, the application are not limited to this.
Step 202, the parsing invasion server from the security incident of one or more server record Attack source data.
Step 203, by the attack source data imported outside preset interface.
Attack source data and may come from server password Brute Force event or web attacks etc. respectively The assault of the form of kind, also may be from the malicious attack source database of third-party institution's offer.
In the present embodiment, attack source data and may come from external third-parties platform, by third party Platform provides preset interface, receives the attack source data that third-party platform is sent by preset interface.
Step 204, counts the number of times of attack and attack frequency for attacking source data described in the security incident Rate, and the malice system for attacking source data is calculated according to the number of times of attack and the attack frequency Number.
In the present embodiment, the access data possess the mark attack source data and the server are disliked The malice coefficient of meaning degree, the height of malice coefficient is with attack source is to the number of times of attack of the server and attacks Hit frequency relevant, and malice coefficient is directly proportional to number of times of attack and attack frequency.The embodiment of the present application Preferably, using number of times of attack and the product of frequency can be attacked as the malice coefficient for attacking source data, In concrete implementation, can with according to number of times of attack and attack frequency according to any suitable calculating side Formula obtains malice coefficient.
Step 205, searches the attack source data in the access data of current server.
, it is determined that there is the access that the current server by described in the attack source data access is produced in step 206 Data.
Step 207, it is determined that the malice coefficient of the attack source data for finding is more than pre-set threshold value.
From unlike last embodiment, in the present embodiment, it is determined that exist by attack source data access After the access data that current server is produced, it is determined that current server is by before invading, in addition it is also necessary to Jing Cross repeatedly judgement.
Judge firstly the need of the malice coefficient further to attacking the access data of source data, if disliking Meaning coefficient is higher, more than certain pre-set threshold value, then judges into next step, if malice coefficient is simultaneously less In the pre-set threshold value, it is determined that the current server is not invaded.
Step 208, it is determined that the attack source data for finding be not logged in before this access it is described Current server.
After it is determined that the malice coefficient of the attack source data for finding is more than pre-set threshold value, determine whether The attack source data whether logged current server before this access.Can specifically search current Historical log information on server, wherein have recorded the visitor that historical log crosses current server Source data is logged in, source data will be attacked and matched with historical log information, if in historical log information It is middle to search less than the attack source data, then illustrate that the attack source data was not logged in current server, then Judge into next step.Otherwise, however, it is determined that attack source data entry crosses current server, then explanation should Log in source data not being intercepted, then can determine that this access that the login source data is produced is safety , therefore, current server is not invaded.
Step 209, it is determined that the attack source data for finding not is commonly used logs in source data.
In the present embodiment, preset conventional login source data is commonly used and logs in source data for meeting certain login The login source data that number of times is required, it is determined that the attack source data searched was not logged in before this access Current server is crossed, then further the login source data is matched with conventional login source data, if Matching, then the login source data is conventional login source data, if mismatching, into step 210.
Preferably, the IP address that source data can be visitor is attacked, the conventional source data that logs in can be Conventional IP address and according to the actual geographic position that draws of IP address analysis, will attack source data with When conventional login source data is matched, it can be determined that access whether the corresponding IP address of data is conventional IP address, or access whether the affiliated geographical position of the corresponding IP address of data is conventional IP address Corresponding geographical position or possesses certain matching relationship.
Step 210, determines that the current server is invaded.
By above-mentioned judgement, attack during source data is present in access data and malice coefficient is more than default valve Value, and current server is not logged in before this access, and be not belonging to conventional login source data, then Can determine that current server is invaded by the attack source data.Compared to last embodiment, this enforcement Example increased multiple Rule of judgment, if being unsatisfactory for wherein any one Rule of judgment, it is determined that current to take Business device do not invaded, by introduce malice coefficient be used as Rule of judgment, can will access data with it is current Conventional login source data in server is associated judgement, it is also possible to will access data and historical log Information is associated judgement, such that it is able to exclude the feelings simply with error in judgement during the Data Matching of attack source Condition.
In implementing, above-mentioned each judges that the sequencing of step can be adjusted according to the actual requirements It is whole, and wherein one or more can be performed as needed judge step, the application is not done to this Limit.
Step 211, generation notify the information invaded by the current server.
If current server is invaded, corresponding information can be generated, information can include The various information such as the server for attack source data, being invaded, the time for invading server, can be each Plant the form being suitable for, such as combination of word, picture, audio frequency and video or various ways.
Step 212, the information is illustrated on the current server, and/or, will be described Information is issued to the client for accessing the current server.
Information is illustrated on current server and refers to for the manager of current server, if working as Front server configures have corresponding client, then can will be prompted to information and be issued to client, for remote The manager of thread management current server refers to.
Step 213, if receive the information feedback invaded for the current server by user Wrong report information, then reduce the malice coefficient for attacking source data.
For the information for showing, after user views the information, if being sent out according to practical experience Existing, above-mentioned judgement determines that the attack source data of invasion server is the access number that safe visitor produces According to then this information can be fed back by preset interface on interface and wrong report occurs, according to receiving Wrong report information, then accordingly can reduce attack source data malice coefficient, so as to avoid next judgement When, because the larger erroneous judgement current server of the malice coefficient of the attack source data is invaded.
Step 214, if do not receive the information feedback invaded for the current server by user Wrong report information, then increase it is described attack source data malice coefficient.
If user does not feed back corresponding wrong report information for information, illustrate that the attack source data is true Cause the server to be invaded in fact, the malice system for attacking source data can be increased according to this invasion Number.
The above-mentioned adjustment amplitude to malice coefficient can be arranged according to the actual requirements, for example, in advance respectively Setting malice coefficient value added and decreasing value, or the number of times of server is invaded according to the attack source data Different value addeds and decreasing value is calculated, the application is not limited to this.
It is above-mentioned can select the step of increase or decrease malice coefficient it is one of perform or be performed both by, The application is not limited to this.
, if there is no the access that the current server by described in the attack source data access is produced in step 215 Data, it is determined that the current server is not invaded, and extract the corresponding login of the access data Source data is added to the conventional login source data of the current server.
In the judgement of above-mentioned steps 204, by data search module, when it is determined that not existing by attack source During the access data that current server described in data access is produced, then what was certain was that the access data Not produced by the attack source of current server, its corresponding login source data is safe login source number According to the conventional login source data of current server can be further used as.Each can specifically be counted to step on The number of times that record source data occurs, if certain logs in source data occurrence number reaches certain predetermined threshold values, Can be used as the conventional login source of current server.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment The attack source data of attack server is parsed in security incident, is looked in the access data of current server The attack source data is looked for, when there are access data corresponding by attack source data, identification is current to be taken Business device is invaded, so as to the secure data to one or more server record under cloud environment is carried out Sufficiently effective excavation and utilization, identification range can expand the multiple servers under cloud environment to.
For making those skilled in the art more fully understand the application, below by way of specific example to this Shen A kind of server invasive biology method based on data analysiss please is illustrated.
Referring to Fig. 3, as a example by source data being attacked for attack source IP, show one of the embodiment of the present application The schematic diagram of malice IP is collected in example.By server Brute Force event, web attacks, Malicious attack is extracted in the malice IP storehouse that other assaults or other third-party institutions provide Source IP, adds to malice IP storehouse the foundation whether invaded as subsequent analysis current server.
Referring to Fig. 4, as a example by source data being attacked for attack source IP, show one of the embodiment of the present application Server invasive biology process schematic in example.
Step 1, judge login source IP whether in malice IP storehouse, if so, then execution step 2, if It is no, then execution step 3.
Step 2, judge that whether the malice coefficient of malice IP exceedes threshold value, if so, then execution step 6, If it is not, then execution step 4.
Step 3, conventional entry address and conventional login source IP is formed for the server.
Step 4, the whether once logged servers of login source IP, if so, then terminate to judge, if It is no, then execution step 5.
Whether step 5, the address of login source IP are conventional entry address, if so, then terminate to judge, if It is no, then execution step 6.
Step 6, abnormal login event is reported, notify that client server is invaded.
Whether step 7, user feed back wrong report, if so, then execution step 9, if it is not, then execution step 8。
Step 8, the malice index for increasing malice IP.
Step 9, the malice index for reducing malice IP.
With reference to Fig. 5, the server based on data analysiss according to the application one embodiment is it illustrates The structured flowchart of invasive biology device, can specifically include:
Attack source data acquisition module 301, for from the security incident of one or more server record The attack source data of the parsing invasion server.
Data search module 302, for searching the attack source number in the access data of current server According to, and determine the access data for having that the current server by described in the attack source data access is produced.
Invasion determining module 303, for determining that the current server is invaded.
In the embodiment of the present application, it is preferable that the security incident includes web attacks, server At least one of Brute Force event and Denial of Service attack event.
In the embodiment of the present application, it is preferable that the data search module includes:
Log in source data and search submodule, step on for parsing from the access data of the current server The login source data of the current server is recorded, and in the login source of attack source data search parsing Data;
Attack source accesses determination sub-module, if for finding the login source data, it is determined that exist The access data that the current server by described in the attack source data access is produced.
In the embodiment of the present application, it is preferable that the attack source data acquisition module, specifically for from institute State the attack source IP address of the parsing invasion server in security incident.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment Parse the attack source data of attack server in security incident, data search module, when existing by attacking Source data it is corresponding access data when, identification current server invaded, so as to under cloud environment The secure data of platform or multiple servers record has carried out sufficiently effective excavation and utilization, identification range The multiple servers under cloud environment can be expanded to.
With reference to Fig. 6, the service based on data analysiss according to another embodiment of the application is it illustrates The structured flowchart of device invasive biology device, can specifically include:
Security incident collection module 401, for collecting the security incident of one or more server record.
Attack source data acquisition module 402, for from the security incident of one or more server record The attack source data of the parsing invasion server.
Attack source data import modul 403, for the attack source number by importing outside preset interface According to.
Statistical module 404 is attacked, for counting the attack time for attacking source data described in the security incident Number and attack frequency.
Malice coefficients calculation block 405, for calculating institute according to the number of times of attack and the attack frequency State the malice coefficient for attacking source data.
Data search module 406, for searching the attack source number in the access data of current server According to, and determine the access data for having that the current server by described in the attack source data access is produced.
Malice coefficient judge module 407, for determining the malice coefficient of the attack source data for finding More than pre-set threshold value.
Historical log determining module 408, for it is determined that the current server is by before invading, it is determined that The attack source data for finding was not logged in the current server before this access.
It is conventional to log in determining module 409, for it is determined that the current server is by before invading, it is determined that The attack source data for finding not is commonly used and logs in source data.
Invasion determining module 410, for determining that the current server is invaded.
Information generation module 411, for generating the prompting for notifying the current server to be invaded letter Breath;
Information display module 412, for being illustrated in the current server by the information On, and/or, the information is issued to the client for accessing the current server.
Malice coefficient reduces module 413, if being invaded for the current server for receiving user Information feedback wrong report information, then reduce it is described attack source data malice coefficient.
Malice coefficient increases module 414, if being entered for the current server for not receiving user The wrong report information of the information feedback invaded, then increase the malice coefficient for attacking source data.
Conventional login source add module 415, if for do not exist by described in the attack source data access when The access data that front server is produced, it is determined that the current server is not invaded, and extract described Access the corresponding source data that logs in of data to add to the conventional login source data of the current server.
In the embodiment of the present application, it is preferable that when the security incident includes web attacks, institute Stating security incident collection module includes:
First web attack acquisition submodules, access the web application guard systems of the server Obtain the web attacks for the server;
And/or, the 2nd web attack acquisition submodules, for extracting the network flow of the server The mirror image data and default detected rule are carried out rule match and are directed to by the mirror image data of amount The web attacks of the server.
In the embodiment of the present application, it is preferable that when the security incident includes server Brute Force event When, the security incident collection module includes:
Cracking event acquisition submodule, for gathering the login daily record of the server, by analyzing institute State log in daily record include login successfully event and login failure event is obtained for the server Server Brute Force event.
In the embodiment of the present application, it is preferable that when the security incident includes Denial of Service attack event When, the security incident collection module includes:
Denial of Service attack event acquisition submodule, for accessing the distributed refusal clothes of the server Business attacking system obtains the Denial of Service attack event for the server.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment Parse the attack source data of attack server in security incident, data search module, when existing by attacking Source data it is corresponding access data when, identification current server invaded, so as to under cloud environment The secure data of platform or multiple servers record has carried out sufficiently effective excavation and utilization, identification range The multiple servers under cloud environment can be expanded to.
With reference to Fig. 7, the structural frames of the cloud security system according to the application one embodiment are it illustrates Figure, the system can specifically include current server 601 and attack source database 602.
The attack source database 602, for solving from the security incident of one or more server record The attack source data of the analysis invasion server;
The current server 601 includes:
Data search module 6011, for attacking described in the lookup in the access data of the current server Hit source data;
, if for there is the current service by described in the attack source data access in invasion judge module 6012 The access data that device is produced, it is determined that the current server is invaded.
According to the embodiment of the present application, the magnanimity of one or more server record under cloud computing environment Parse the attack source data of attack server in security incident, data search module, when existing by attacking Source data it is corresponding access data when, identification current server invaded, so as to under cloud environment The secure data of platform or multiple servers record has carried out sufficiently effective excavation and utilization, identification range The multiple servers under cloud environment can be expanded to.
The method reality shown in aforementioned Fig. 1 and Fig. 2 is essentially corresponded to due to described device and system embodiment Apply example, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment Illustrate, here is not just repeated.
Provided herein algorithm and show not with any certain computer, virtual system or miscellaneous equipment It is intrinsic related.Various general-purpose systems can also be used together based on teaching in this.According to above Description, the structure constructed required by this kind of system is obvious.Additionally, the application is also not for Any certain programmed language.It is understood that, it is possible to use various programming languages realize described here The content of application, and the description done to language-specific above is for the optimal reality for disclosing the application Apply mode.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that Embodiments herein can be put into practice in the case where not having these details.In some instances, Known method, structure and technology is not been shown in detail, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify during the disclosure helping is understood in terms of each application It is individual or multiple, above in the description of the exemplary embodiment of the application, each feature of the application Sometimes it is grouped together in single embodiment, figure or descriptions thereof.However, should be by The method of the disclosure is construed to reflect following intention:It is i.e. required for protection this application claims ratio is at each The more features of feature being expressly recited in claim.More precisely, as following right will As asking book reflected, it is less than all spies of single embodiment disclosed above in terms of application Levy.Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment party Separate embodiments of the formula, wherein each claim as the application itself.
Those skilled in the art are appreciated that can be carried out to the module in the equipment in embodiment Adaptively change and they are arranged in one or more different from embodiment equipment. Module in embodiment or unit or component can be combined into a module or unit or component, and In addition multiple submodule or subelement or sub-component can be divided into.Except such feature and/or Outside at least some in process or unit is excluded each other, can be using any combinations to this explanation All features disclosed in book (including adjoint claim, summary and accompanying drawing) and so disclosed All processes or unit of any method or equipment are combined.Unless expressly stated otherwise, this theory Each feature disclosed in bright book (including adjoint claim, summary and accompanying drawing) can be by offer phase With the alternative features of, equivalent or similar purpose replacing.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include Some included features rather than further feature in other embodiments, but the feature of different embodiments Combination mean within scope of the present application and form different embodiments.For example, under In the claims in face, embodiment required for protection one of arbitrarily can be in any combination Mode is using.
The all parts embodiment of the application can be realized with hardware, or with one or more The software module run on reason device is realized, or is realized with combinations thereof.Those skilled in the art It should be appreciated that can be realized using microprocessor or digital signal processor (DSP) in practice According to some in the server invasive biology equipment based on data analysiss of the embodiment of the present application or complete The some or all functions of portion's part.The application is also implemented as described herein for performing Some or all equipment of method or program of device (for example, computer program and computer journey Sequence product).Such program for realizing the application can be stored on a computer-readable medium, Huo Zheke In the form of with one or more signal.Such signal can be downloaded from internet website Arrive, or provide on carrier signal, or provided with any other form.
It should be noted that above-described embodiment is illustrated rather than to the application limiting to the application Make, and those skilled in the art can design without departing from the scope of the appended claims Alternative embodiment.In the claims, any reference markss between bracket should not be configured to Limitations on claims.Word "comprising" do not exclude the presence of element not listed in the claims or Step.Word "a" or "an" before element does not exclude the presence of multiple such units Part.The application can be by means of the hardware for including some different elements and by means of properly programmed Computer is realizing.If in the unit claim for listing equipment for drying, some in these devices Individual can be embodying by same hardware branch.Word first, second, and third Using not indicating that any order.These words can be construed to title.

Claims (20)

1. a kind of server invasive biology method based on data analysiss, it is characterised in that include:
The attack source of the parsing invasion server from the security incident of one or more server record Data;
The attack source data is searched in the access data of current server;
If there are the access data that the current server by described in the attack source data access is produced, really The fixed current server is invaded.
2. the method for claim 1, it is characterised in that also include:Collect one or more The security incident of server record.
3. method as claimed in claim 2, it is characterised in that when the security incident includes web During attack, the security incident of one or more server record of collection includes:
The web applications guard system for accessing the server obtains the web attacks for the server Event, and/or, extract the mirror image data of the network traffics of the server, by the mirror image data with Default detected rule carries out rule match and obtains the web attacks for the server.
4. method as claimed in claim 2, it is characterised in that when the security incident includes service During device Brute Force event, the security incident of one or more server record of collection includes:
Gather the login daily record of the server, by analyze it is described log in the login that includes of daily record into Work(event and login failure event obtain the server Brute Force event for the server.
5. method as claimed in claim 2, it is characterised in that when the security incident includes refusal During service event, the security incident of one or more server record of collection includes:
The distributed denial of service attack system for accessing the server obtains refusing for the server Exhausted service event.
6. the method for claim 1, it is characterised in that the access in current server Search the attack source data packet to include in data:
From the access data of the current server, parsing logs in the login source number of the current server According to, and in the login source data of attack source data search parsing;
If finding the login source data, it is determined that exist by described in the attack source data access when The access data that front server is produced.
7. the method for claim 1, it is characterised in that the access data possess mark institute Attack malice coefficient of the source data to the server malice degree is stated, it is determined that existing by the attack After source data accesses the access data that the current server is produced, methods described also includes:
It is determined that the malice coefficient of the attack source data for finding is more than pre-set threshold value.
8. method as claimed in claim 7, it is characterised in that methods described also includes:
Count the number of times of attack of attack source data described in the security incident and attack frequency, and according to The number of times of attack and the attack frequency calculate the malice coefficient for attacking source data.
9. the method for claim 1, it is characterised in that determine the current service described By before invading, methods described also includes device:
It is determined that the attack source data for finding was not logged in the current service before this access Device;
And/or, it is determined that the attack source data for finding not is commonly used logs in source data.
10. method as claimed in claim 7, it is characterised in that methods described also includes:
Generation notifies the information invaded by the current server;
The information is illustrated on the current server, and/or, by under the information It is dealt into the client for accessing the current server.
11. methods as claimed in claim 10, it is characterised in that methods described also includes:
If receiving the wrong report letter of the information feedback invaded for the current server by user Breath, then reduce the malice coefficient for attacking source data;
And/or, if not receiving the information feedback invaded for the current server by user Wrong report information, then increase the malice coefficient for attacking source data.
12. methods as claimed in claim 9, it is characterised in that methods described also includes:
If there are no the access data that the current server by described in the attack source data access is produced, Determine that the current server is not invaded, and extract the corresponding source data that logs in of the access data and add Add to the conventional login source data of the current server.
13. the method for claim 1, it is characterised in that described from one or more server In the security incident of record, the attack source data packet of parsing invasion server is included:
The attack source IP address of the parsing invasion server from the security incident.
14. the method for claim 1, it is characterised in that methods described also includes:
By the attack source data imported outside preset interface.
15. the method for claim 1, it is characterised in that the security incident includes web At least one of attack, server Brute Force event and Denial of Service attack event.
16. a kind of server invasive biology devices based on data analysiss, it is characterised in that include:
Attack source data acquisition module, for solving from the security incident of one or more server record The attack source data of the analysis invasion server;
Data search module, for searching the attack source number in the access data of current server According to, and determine the access data for having that the current server by described in the attack source data access is produced;
Invasion determining module, for determining that the current server is invaded.
17. devices as claimed in claim 16, it is characterised in that also include:
Security incident collection module, for collecting the security incident of one or more server record.
18. devices as claimed in claim 15, it is characterised in that the access data possess mark The attack malice coefficient of the source data to the server malice degree, described device also include:
Malice coefficient judge module, for it is determined that exist current by described in the attack source data access After the access data that server is produced, it is determined that the malice coefficient of the attack source data for finding is big In pre-set threshold value.
19. devices as claimed in claim 15, it is characterised in that described device also includes:
Historical log determining module, for it is determined that the current server is by before invading, it is determined that look into The attack source data for finding was not logged in the current server before this access;
And/or, commonly use and log in determining module, for it is determined that the current server is by before invading, It is determined that the attack source data for finding not is commonly used logs in source data.
20. a kind of cloud security systems, it is characterised in that including current server and attack source data Storehouse;
The attack source database, for parsing from the security incident of one or more server record Invade the attack source data of the server;
The current server includes:
Data search module, for searching the attack source in the access data of the current server Data;
Invasion judge module, if produce for there is the current server by described in the attack source data access Raw access data, it is determined that the current server is invaded.
CN201510571634.7A 2015-09-09 2015-09-09 Server invasion identifying method and apparatus based on data analysis and cloud safety system Pending CN106534042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510571634.7A CN106534042A (en) 2015-09-09 2015-09-09 Server invasion identifying method and apparatus based on data analysis and cloud safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510571634.7A CN106534042A (en) 2015-09-09 2015-09-09 Server invasion identifying method and apparatus based on data analysis and cloud safety system

Publications (1)

Publication Number Publication Date
CN106534042A true CN106534042A (en) 2017-03-22

Family

ID=58345704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510571634.7A Pending CN106534042A (en) 2015-09-09 2015-09-09 Server invasion identifying method and apparatus based on data analysis and cloud safety system

Country Status (1)

Country Link
CN (1) CN106534042A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317790A (en) * 2016-04-27 2017-11-03 阿里巴巴集团控股有限公司 The monitoring method and device of network behavior
CN108460279A (en) * 2018-03-12 2018-08-28 北京知道创宇信息技术有限公司 Attack recognition method, apparatus and computer readable storage medium
CN108958884A (en) * 2018-06-22 2018-12-07 郑州云海信息技术有限公司 A kind of method and relevant apparatus of Virtual Machine Manager
CN109167792A (en) * 2018-09-19 2019-01-08 四川长虹电器股份有限公司 A kind of novel WAF design method based on Nginx
CN109543419A (en) * 2018-11-30 2019-03-29 杭州迪普科技股份有限公司 Detect the method and device of assets security
CN109818974A (en) * 2019-03-14 2019-05-28 北京百度网讯科技有限公司 Method and apparatus for sending information
CN111262901A (en) * 2019-07-29 2020-06-09 深圳百灵声学有限公司 Many-to-many communication system and operation method thereof
CN111711599A (en) * 2020-04-23 2020-09-25 北京凌云信安科技有限公司 Safety situation perception system based on multivariate mass data fusion association analysis
CN112615865A (en) * 2020-12-21 2021-04-06 曹佳乐 Data anti-intrusion method based on big data and artificial intelligence and big data server
CN114826727A (en) * 2022-04-22 2022-07-29 南方电网数字电网研究院有限公司 Flow data acquisition method and device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137111A (en) * 2011-04-20 2011-07-27 北京蓝汛通信技术有限责任公司 Method and device for preventing CC (Challenge Collapsar) attack and content delivery network server
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102137111A (en) * 2011-04-20 2011-07-27 北京蓝汛通信技术有限责任公司 Method and device for preventing CC (Challenge Collapsar) attack and content delivery network server
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317790A (en) * 2016-04-27 2017-11-03 阿里巴巴集团控股有限公司 The monitoring method and device of network behavior
CN108460279A (en) * 2018-03-12 2018-08-28 北京知道创宇信息技术有限公司 Attack recognition method, apparatus and computer readable storage medium
CN108958884A (en) * 2018-06-22 2018-12-07 郑州云海信息技术有限公司 A kind of method and relevant apparatus of Virtual Machine Manager
CN108958884B (en) * 2018-06-22 2022-02-18 郑州云海信息技术有限公司 Virtual machine management method and related device
CN109167792A (en) * 2018-09-19 2019-01-08 四川长虹电器股份有限公司 A kind of novel WAF design method based on Nginx
CN109543419A (en) * 2018-11-30 2019-03-29 杭州迪普科技股份有限公司 Detect the method and device of assets security
CN109543419B (en) * 2018-11-30 2020-12-04 杭州迪普科技股份有限公司 Method and device for detecting asset security
CN109818974A (en) * 2019-03-14 2019-05-28 北京百度网讯科技有限公司 Method and apparatus for sending information
CN111262901A (en) * 2019-07-29 2020-06-09 深圳百灵声学有限公司 Many-to-many communication system and operation method thereof
CN111711599A (en) * 2020-04-23 2020-09-25 北京凌云信安科技有限公司 Safety situation perception system based on multivariate mass data fusion association analysis
CN112615865A (en) * 2020-12-21 2021-04-06 曹佳乐 Data anti-intrusion method based on big data and artificial intelligence and big data server
CN114826727A (en) * 2022-04-22 2022-07-29 南方电网数字电网研究院有限公司 Flow data acquisition method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106534042A (en) Server invasion identifying method and apparatus based on data analysis and cloud safety system
CN109951500B (en) Network attack detection method and device
US9021583B2 (en) System and method for network security including detection of man-in-the-browser attacks
US9503469B2 (en) Anomaly detection system for enterprise network security
US9369479B2 (en) Detection of malware beaconing activities
CN107465651B (en) Network attack detection method and device
US9032521B2 (en) Adaptive cyber-security analytics
CN103701795B (en) The recognition methods of the attack source of Denial of Service attack and device
CN105577608B (en) Network attack behavior detection method and device
US7930746B1 (en) Method and apparatus for detecting anomalous network activities
EP3068095B1 (en) Monitoring apparatus and method
CN109962891A (en) Monitor method, apparatus, equipment and the computer storage medium of cloud security
EP3085023B1 (en) Communications security
CN114915479B (en) Web attack stage analysis method and system based on Web log
CN103297433A (en) HTTP botnet detection method and system based on net data stream
KR20110009811A (en) Web attack event extraction system and method based on monitoring data
CN106506547A (en) Processing method, WAF, router and system for Denial of Service attack
CN107547490A (en) A kind of scanner recognition method, apparatus and system
JP2019536158A (en) Method and system for verifying whether detection result is valid or not
Massa et al. A fraud detection system based on anomaly intrusion detection systems for e-commerce applications
Choi et al. Understanding the proxy ecosystem: A comparative analysis of residential and open proxies on the internet
Atighetchi et al. Attribute-based prevention of phishing attacks
CN116781405A (en) Attack processing method, device, equipment and medium
CN106411951A (en) Network attack behavior detection method and device
US20120272314A1 (en) Data collection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication