CN107454096B - A kind of wrong report removing method based on log playback - Google Patents

A kind of wrong report removing method based on log playback Download PDF

Info

Publication number
CN107454096B
CN107454096B CN201710734958.7A CN201710734958A CN107454096B CN 107454096 B CN107454096 B CN 107454096B CN 201710734958 A CN201710734958 A CN 201710734958A CN 107454096 B CN107454096 B CN 107454096B
Authority
CN
China
Prior art keywords
test sample
playback
sample library
test
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710734958.7A
Other languages
Chinese (zh)
Other versions
CN107454096A (en
Inventor
郭晓
范渊
龙文洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201710734958.7A priority Critical patent/CN107454096B/en
Publication of CN107454096A publication Critical patent/CN107454096A/en
Application granted granted Critical
Publication of CN107454096B publication Critical patent/CN107454096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

The present invention relates to network security technologies, it is desirable to provide a kind of wrong report removing method based on log playback.The wrong report removing method that this kind is played back based on log is comprising steps of dynamic generation test sample library;After updating security strategy, playback test is carried out to rule base;Obtained new regular testing result is analyzed, obtains rate of false alarm of the new rule in test sample library;By obtained rate of false alarm compared with reporting threshold values by mistake, automatically configure whether new rule opens.The present invention can intelligently, efficiently judge the applicability of new security strategy, can eliminate wrong report caused by new security strategy enables, and eliminate caused by new security strategy enables and accidentally block.

Description

A kind of wrong report removing method based on log playback
Technical field
The present invention relates to technical field of network security, in particular to a kind of wrong report removing method based on log playback.
Background technique
When WEB application is extensive, while enrich, WEB server is with its powerful computing capability, process performance and contains Higher-value is increasingly becoming primary challenge target.The security incidents such as SQL injection, webpage tamper, web page horse hanging frequently occur.
In reality, the first line of defence using firewall as safe-guard system can still have such-and-such ask Topic, thereby produces Web application guard system WAF.Web application guard system is to solve such as firewall one kind traditional equipment Helpless Web application safety problem.
Different from traditional firewall, WAF works in application layer, therefore has inborn technical advantage to Web application protection. Based on the profound understanding to Web applied business and logic, WAF carries out content detection to all kinds of requests from Web application access And verifying, it is ensured that its safety and legitimacy give real-time blocking to illegal request, to have to all kinds of web-sites Effect protection.
WAF is generally divided into rule-based protection and based on abnormal protection:
It is to be based on establishing model to lawful acts application data, and judge behavior on this basis based on abnormal protection Exception.But this needs to be well understood by using behavior business and is likely to accomplish, can this be very difficult something in reality Feelings.
Rule-based protection is to provide the safety regulation of various Web applications, establishes rule base and real-time servicing, update. User can be detected and be protected in all directions to Web application according to these rules.This mode is high-efficient, comprehensive, but this meeting Generate certain wrong report.
In actual application, for different system internal and external environments, WAF can configure applicable rule set as safety Strategy.But it before security strategy enabling, needs largely to manually check, monitor whether the security strategy is applicable in really, will not generate Wrong report accidentally blocks, to influence the progress of regular traffic.
Summary of the invention
It is a primary object of the present invention to overcome deficiency in the prior art, provide it is a kind of based on log playback wrong report disappear Except method.In order to solve the above technical problems, solution of the invention is:
There is provided it is a kind of based on log playback wrong report removing method, for the rule base to Web application guard system WAF into Row maintenance, the wrong report removing method based on log playback include the following steps:
Step 1: it is realized especially by following sub-steps in dynamic generation test sample library:
Step A: the access log of some period (the specific period can be configured) interior Web application is obtained first (i.e. The access log saved in WEB server);
Step B: in the access log that step A is obtained, extracting Web request, (Web request is that client is answered to Web With the access request of initiation);
Step C: according to the Web request obtained in step B, corresponding Web request parameter is obtained from access log and is requested Content forms test sample library;
Web request, Web request parameter are preserved in the test sample library, and test sample library is Web application guard system WAF passes through in the sample database that line service detects accumulation and is formed;
Step 2: after updating security strategy, playback test is carried out to rule base;It is realized especially by following sub-steps:
Step D: interior change and external change (online operation system environment, i.e. Web application for Web application environment Variation present in environment includes but is not limited to following: hacker attempt different new attack modes to constitute a threat to, online New security breaches are found in operation system), to security strategy, (security strategy is for all security-related movable a set of Regular collection) it is updated, it is including but not limited to following: to reconfigure in rule base and newly advised in regular, addition rule base Then;
The rule base is on Web application guard system WAF, for carrying out rule match, detection and mistake to network flow Filter the rule feature library of malicious attack flow;
Step E: playback test detecting and alarm is loaded into updated security strategy and test sample library;
The playback test detecting and alarm and regular traffic detecting and alarm are the same working mechanisms, i.e. operation rule library pair Access request is detected, but the rule base for playing back test detecting and alarm input is updated rule base, the data flow of input Amount is sample database flow, is only used for carrying out playback test;
Step F: playback test is carried out, the security strategy that playback test detecting and alarm operating procedure E is loaded into is to test sample Web request in library is detected, and new regular testing result is obtained;
Step 3: analyzing new regular testing result obtained in step F, obtains new rule in test sample library Rate of false alarm (since which sample is attack in test sample library, it is all known, therefore according to this which sample, which is not attack, A little known cases can obtain new security strategy wrong report situation, to calculate rate of false alarm);
Step 4: by rate of false alarm that step 3 obtains compared with wrong report threshold values (wrong report threshold values is configurable item), match automatically Set whether new rule opens: if rate of false alarm closes new security strategy not less than wrong report threshold values;If rate of false alarm is lower than wrong report valve Value, then open new security strategy, for the security strategy as Web application guard system WAF.
In the present invention, in the step C, the accumulation in test sample library is divided into two kinds:
1) configured with test sample library integration time (i.e. periodically): being configured when the integration time in test sample library reaches When integration time, accumulation is completed in test sample library;
2) it is configured with test sample library accumulated number (i.e. quantitative): being configured when the accumulated number in test sample library reaches When accumulated number, accumulation is completed in test sample library.
In the present invention, in the step 2, traversal test is offline to be carried out, and does not influence on-line checking business.
In the present invention, the playback test detecting and alarm is arranged in Web application guard system WAF, and plays back test The regular traffic detecting and alarm of detecting and alarm and Web application guard system WAF are two independent engine processes, therefore play back and survey Examination does not influence regular traffic.
Compared with prior art, the beneficial effects of the present invention are:
The present invention can intelligently, efficiently judge the applicability of new security strategy, can eliminate caused by new security strategy enabling Wrong report, and eliminate caused by new security strategy enables and accidentally block.
Detailed description of the invention
Fig. 1 is implementation flow chart of the invention.
Fig. 2 is the product process schematic diagram in test sample library in the present invention.
Fig. 3 is the flow diagram of new strategy test in the present invention.
Specific embodiment
Present invention is further described in detail with specific embodiment with reference to the accompanying drawing:
A kind of wrong report removing method based on log playback as shown in Figure 1, for Web application guard system WAF's Rule base safeguarded, specifically include the following steps:
S1 it is realized especially by following sub-steps in) dynamic generation test sample library:
Step A: the access log of some period (the specific period can be configured) interior Web application is obtained first, i.e., The access log saved in WEB server.
Step B: in the access log that step A is obtained, Web request is extracted.Web request is that client is sent out to Web application The access request risen.
Step C: according to the Web request obtained in step B, corresponding Web request parameter is obtained from access log and is requested Content forms test sample library;
Web request, Web request parameter are preserved in the test sample library, and test sample library is Web application guard system WAF passes through the accumulation detected in line service.Accumulation can be divided to two kinds:
1) test sample library integration time is configured;When the integration time in test sample library reaching the configured time, survey Trying sample database will complete to accumulate.
2) test sample library accumulated number is configured;When the accumulated number in test sample library reaches configured accumulated number When, test sample library will complete to accumulate.
S2 after) updating security strategy, playback test is carried out to rule base.It is realized especially by following sub-steps:
Step D: it for the inside and outside variation of online operation system environment, needs to be updated security strategy.More New security strategy, it is including but not limited to following: to reconfigure new regular in regular, addition rule base in rule base.
It specifically refers to, changes present in online operation system environment, including but not limited to following: hacker may attempt Different new attack modes to constitute a threat to, new security breaches are found in online operation system.For these variations, safety Guard system need to update security strategy and be protected.
The security strategy is for all security-related movable set of rule set.
The rule base refers in network safety prevention equipment, for carrying out rule match, detection and mistake to access request Filter the rule feature library of malicious attack access.
Step E: playback test detecting and alarm is loaded into updated security strategy and test sample library.
The playback test detecting and alarm is arranged in Web application guard system WAF, playback test detecting and alarm and Web Regular traffic detecting and alarm using guard system WAF is two independent engine processes, therefore playback test does not influence normally Business.And playback test detecting and alarm and actual motion engine are the same working mechanisms, i.e. operation rule library is to access request The engine detected, but the rule base and access request that input are different.The rule base that detecting and alarm inputs is tested in playback Updated rule base, the data of input are sample databases, are only used for carrying out playback test.
Step F: playback test is carried out, the security strategy that playback test detecting and alarm operating procedure E is loaded into is to test sample Web request in library is detected, and new regular testing result is obtained.
S3) new regular testing result obtained in step F is analyzed, obtains new security strategy in test sample library In rate of false alarm.
Specifically, due in test sample library which sample be attack, which sample be not attack, be all known.Root According to these known cases, new security strategy wrong report situation can be obtained, to calculate rate of false alarm.
S4) rate of false alarm that step 3 obtains is automatically configured new compared with wrong report threshold values (wrong report threshold values is configurable item) Whether rule opens: if rate of false alarm closes new security strategy not less than wrong report threshold values;If rate of false alarm is lower than wrong report threshold values, New security strategy is then opened, for the security strategy as Web application guard system WAF.New security strategy before enabling, It must carry out playback test
The following examples can make the professional technician of this profession that the present invention be more fully understood, but not with any side The formula limitation present invention.
Web application guard system WAF detects log according in line service, will nearest a certain amount of Web request and request ginseng Number preserves, and forms test sample library.Such as: Web request url1, url2, url3 ..., when having accumulated 10,000 or one Between the period (the two be configurable item).Assuming that one will newly be opened by having newly increased rule A, Web an application guard system WAF now A detecting and alarm process is called playback test detecting and alarm, is loaded into new rule base A, the web request library of storage is played back, playback stream Amount passes through this detecting and alarm newly opened.All Web requests of playback test detecting and alarm traversal sample database simultaneously carry out playback survey Examination.Web application guard system WAF by the test result of regular A compared with reporting threshold values by mistake after, be confirmed whether to open this new rule A, to eliminate wrong report.
Finally it should be noted that the above enumerated are only specific embodiments of the present invention.It is clear that the invention is not restricted to Above embodiments can also have many variations.Those skilled in the art can directly lead from present disclosure Out or all deformations for associating, it is considered as protection scope of the present invention.

Claims (4)

1. a kind of wrong report removing method based on log playback, is tieed up for the rule base to Web application guard system WAF Shield, which is characterized in that the wrong report removing method based on log playback includes the following steps:
Step 1: it is realized especially by following sub-steps in dynamic generation test sample library:
Step A: the access log that Web is applied in some period is obtained first;
Step B: in the access log that step A is obtained, Web request is extracted;
Step C: according to the Web request obtained in step B, obtaining corresponding Web request parameter i.e. request content from access log, Form test sample library;
Web request, Web request parameter are preserved in the test sample library, and test sample library is Web application guard system WAF warp It crosses in the sample database that line service detects accumulation and is formed;
Step 2: after updating security strategy, playback test is carried out to rule base;It is realized especially by following sub-steps:
Step D: for the interior change and external change of Web application environment, security strategy is updated, including but not limited to Below: reconfiguring new regular in regular, addition rule base in rule base;
The rule base is on Web application guard system WAF, and for carrying out rule match to network flow, detection and filtering are disliked The rule feature library for attack traffic of anticipating;
The interior change and external change of the Web application environment refer to deposits in online operation system environment i.e. Web application environment Variation, attempting different new attack mode including hacker to constitute a threat to and find new peace in online operation system Full loophole;
Step E: playback test detecting and alarm is loaded into updated security strategy and test sample library;
The playback test detecting and alarm and regular traffic detecting and alarm are the same working mechanisms, i.e. operation rule library is to access Request is detected, but the rule base for playing back test detecting and alarm input is updated rule base, and the data traffic of input is Sample database flow is only used for carrying out playback test;
Step F: playback test is carried out, the security strategy that playback test detecting and alarm operating procedure E is loaded into is in test sample library Web request detected, obtain new regular testing result;
Step 3: analyzing new regular testing result obtained in step F, obtains mistake of the new rule in test sample library Report rate;
Step 4: the rate of false alarm that step 3 is obtained automatically configures whether new rule opens compared with reporting threshold values by mistake: if rate of false alarm Not less than wrong report threshold values, then new security strategy is closed;If rate of false alarm opens new security strategy lower than wrong report threshold values, use In the security strategy as Web application guard system WAF.
2. a kind of wrong report removing method based on log playback according to claim 1, which is characterized in that the step C In, the accumulation in test sample library is divided into two kinds:
1) it is configured with test sample library integration time: when the integration time in test sample library reaching configured integration time, Complete accumulation in test sample library;
2) it is configured with test sample library accumulated number: when the accumulated number in test sample library reaches configured accumulated number, Complete accumulation in test sample library.
3. a kind of wrong report removing method based on log playback according to claim 1, which is characterized in that the step 2 In, traversal test is offline to be carried out, and does not influence on-line checking business.
4. a kind of wrong report removing method based on log playback according to claim 1, which is characterized in that the playback is surveyed It tries detecting and alarm to be arranged in Web application guard system WAF, and plays back test detecting and alarm and Web application guard system WAF's Regular traffic detecting and alarm is two independent engine processes, therefore playback test does not influence regular traffic.
CN201710734958.7A 2017-08-24 2017-08-24 A kind of wrong report removing method based on log playback Active CN107454096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710734958.7A CN107454096B (en) 2017-08-24 2017-08-24 A kind of wrong report removing method based on log playback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710734958.7A CN107454096B (en) 2017-08-24 2017-08-24 A kind of wrong report removing method based on log playback

Publications (2)

Publication Number Publication Date
CN107454096A CN107454096A (en) 2017-12-08
CN107454096B true CN107454096B (en) 2019-11-29

Family

ID=60494004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710734958.7A Active CN107454096B (en) 2017-08-24 2017-08-24 A kind of wrong report removing method based on log playback

Country Status (1)

Country Link
CN (1) CN107454096B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040128B (en) * 2018-09-18 2020-09-22 四川长虹电器股份有限公司 WAF reverse proxy detection method based on offline pcap flow packet
CN109413108B (en) * 2018-12-18 2021-07-02 杭州安恒信息技术股份有限公司 WAF detection method and system based on safety
CN113542204B (en) * 2020-04-22 2023-04-07 中国电信股份有限公司 Protection rule generation method and device and storage medium
CN113726779A (en) * 2021-08-31 2021-11-30 北京天融信网络安全技术有限公司 Rule false alarm test method and device, electronic equipment and computer storage medium
CN113992438B (en) * 2021-12-27 2022-03-22 北京微步在线科技有限公司 Network security detection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491060A (en) * 2012-06-13 2014-01-01 北京新媒传信科技有限公司 Method, device and system for defending against Web attacks
CN103581180A (en) * 2013-10-28 2014-02-12 深信服网络科技(深圳)有限公司 Method and device for adjusting target hitting characteristics according to attacking logs
CN104601530A (en) * 2013-10-31 2015-05-06 中兴通讯股份有限公司 Implementing method and system for could security service
CN105262720A (en) * 2015-09-07 2016-01-20 深信服网络科技(深圳)有限公司 Web robot traffic identification method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9369478B2 (en) * 2014-02-06 2016-06-14 Nicira, Inc. OWL-based intelligent security audit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491060A (en) * 2012-06-13 2014-01-01 北京新媒传信科技有限公司 Method, device and system for defending against Web attacks
CN103581180A (en) * 2013-10-28 2014-02-12 深信服网络科技(深圳)有限公司 Method and device for adjusting target hitting characteristics according to attacking logs
CN104601530A (en) * 2013-10-31 2015-05-06 中兴通讯股份有限公司 Implementing method and system for could security service
CN105262720A (en) * 2015-09-07 2016-01-20 深信服网络科技(深圳)有限公司 Web robot traffic identification method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"防火墙封阻引用攻击技术综述";丁威;《安防科技》;20030715;全文 *

Also Published As

Publication number Publication date
CN107454096A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
CN107454096B (en) A kind of wrong report removing method based on log playback
US20200026594A1 (en) System and method for real-time detection of anomalies in database usage
CN107888574B (en) Method, server and storage medium for detecting database risk
US8418247B2 (en) Intrusion detection method and system
CN111245793A (en) Method and device for analyzing abnormity of network data
WO2016150313A1 (en) Method and apparatus for detecting suspicious process
CN106790023A (en) Network security Alliance Defense method and apparatus
CN106209826A (en) A kind of safety case investigation method of Network Security Device monitoring
Taveras SCADA live forensics: real time data acquisition process to detect, prevent or evaluate critical situations
CN105573291B (en) A kind of threat detection method and safety device based on key parameter fusion verification
Ficco et al. A weight-based symptom correlation approach to SQL injection attacks
CN108111463A (en) The self study of various dimensions baseline and abnormal behaviour analysis based on average value and standard deviation
Wu et al. Alert correlation for cyber-manufacturing intrusion detection
CN111079271A (en) Industrial information physical system attack detection method based on system residual fingerprint
US20150358292A1 (en) Network security management
CN106570131A (en) Sensitive data exception access detection method based on clustering analysis
Eigner et al. Towards resilient artificial intelligence: Survey and research issues
JP4843546B2 (en) Information leakage monitoring system and information leakage monitoring method
CN110597691A (en) Computer monitoring system
Stavrou et al. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Hong et al. $ R $-print: A system residuals-based fingerprinting for attack detection in industrial cyber-physical systems
CN109787964A (en) Process behavior is traced to the source device and method
Fovino et al. Distributed intrusion detection system for SCADA protocols
Erba et al. Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
US11575702B2 (en) Systems, devices, and methods for observing and/or securing data access to a computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310051 No. 188 Lianhui Street, Xixing Street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Annan information technology Limited by Share Ltd

Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Applicant before: Dbappsecurity Co.,ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant