CN107508817A - 一种企事业单位内源威胁网络安全防御设备 - Google Patents

一种企事业单位内源威胁网络安全防御设备 Download PDF

Info

Publication number
CN107508817A
CN107508817A CN201710784489.XA CN201710784489A CN107508817A CN 107508817 A CN107508817 A CN 107508817A CN 201710784489 A CN201710784489 A CN 201710784489A CN 107508817 A CN107508817 A CN 107508817A
Authority
CN
China
Prior art keywords
endogenous
risk
attack
enterprises
threat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710784489.XA
Other languages
English (en)
Other versions
CN107508817B (zh
Inventor
李春强
于磊
丘国伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingwei Xin'an Technology Co Ltd
Original Assignee
Beijing Jingwei Xin'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingwei Xin'an Technology Co Ltd filed Critical Beijing Jingwei Xin'an Technology Co Ltd
Priority to CN201710784489.XA priority Critical patent/CN107508817B/zh
Publication of CN107508817A publication Critical patent/CN107508817A/zh
Application granted granted Critical
Publication of CN107508817B publication Critical patent/CN107508817B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Aiming, Guidance, Guns With A Light Source, Armor, Camouflage, And Targets (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明描述了一种针对企事业单位内源威胁的网络安全防御设备。本发明面向来自于企事业单位内部的网络安全威胁,通过基于内源威胁的风险评估、风险缓解、威胁监测、威胁响应技术,从而实现对企事业单位内源威胁的系统防御效果。

Description

一种企事业单位内源威胁网络安全防御设备
技术领域
本发明涉及一种网络安全防御设备,尤其涉及一种针对来企事业单位内部的网络安全威胁的防御设备。
背景技术
内源威胁区别于外源威胁,攻击者来自于企事业单位内部设备或用户,检测困难,危害性大。随着企业信息安全机制的建立建全,单纯想从外部渗透进入目标系统的攻击门槛不断提高;内源威胁逐渐增多,并且开始在各大安全报告中崭露头角,引起了国外研究者的高度重视。遗憾的是,国内此类事件曝光率极低,研究重视不够,因此缺乏行之有效的防范措施。
发明内容
本发明目的在于提供一种企事业单位内源威胁网络安全防御设备。本发明面向来自于企事业单位内部的网络安全威胁,通过基于内源威胁的风险评估、风险缓解、威胁监测、威胁响应技术,从而实现对企事业单位内源威胁的系统防御效果。
本发明的技术方案如下:
一种企事业单位内源威胁网络安全防御设备,其包括:
A、内源威胁预测模块:包括内部设备安全风险评估、内源攻击风险评估、失泄密风险评估、窃密攻击风险评估等子模块。
B、内源威胁预防模块:包括基于设备漏洞的风险缓解、基于内源攻击技术的风险缓解、失泄密安全风险缓解、基于安全设备联动的风险缓解等子模块。
C、内源威胁监测模块:包括基于内部安全风险实时监测、内源攻击实时监测、失泄密实时监测、窃密攻击实时监测等子模块。
D、内源威胁响应模块:包括内源攻击取证、内源攻击溯源、内源攻击反制、响应效能反馈等子模块。
所述方法,其中A中,内源攻击风险评估是评估来自于内部的网络攻击方式在当前内部网络环境发生的可能性及危害大小,失泄密风险是评估当前内部网络环境中存在的失泄密行为的可能性及危害大小,窃密攻击风险评估是评估在当前内部网络环境中发生窃密攻击行为的可能性及危害大小。
所述方法,其中B中,风险缓解主要是通过设备配置等操作来消除或减少该风险的依赖条件,进而增大该风险触发难度。
所述方法,其中C中,内源攻击实时监测主要是通过设备监测信息、设备日志、蜜罐等方式对内源攻击行为进行基于行为而非特征的监测。
本发明所提供的一种企事业单位内源威胁网络安全防御设备,直接接入企事业单位内部网络即可应用,对网络改动小,故障风险低,功能完善,能够系统防御已知和未知内源威胁。
附图说明
图1为本发明的结构简图。
具体实施方式
以下结合附图,将对本发明的较佳实施例进行较为详细的说明。
如图1所示,本发明主要包括针对内源威胁的预测、预防、监测、响应等模块。
各模块之间相互联动,预测模块的输出是预防模块的输入,预防模块的输出作用于监测模块,监测模块的输出与响应模块的输入,响应模块的输出作用于预测模块。
本发明实现的具体步骤如下:
步骤A 对内源威胁进行预测,包括内部设备安全风险评估、内源攻击风险评估、失泄密风险评估、窃密攻击风险评估等;
步骤B 对内源威胁进行预防,包括基于设备漏洞的风险缓解、基于内源攻击技术的风险缓解、失泄密安全风险缓解、基于安全设备联动的风险缓解等;
步骤C 对内源威胁进行监测,包括基于内部安全风险实时监测、内源攻击实时监测、失泄密实时监测、窃密攻击实时监测等;
步骤D 对内源威胁进行响应:包括内源攻击取证、内源攻击溯源、内源攻击反制、响应效能反馈等。
在步骤D中,响应效能反馈是针对特定内源威胁的取证、溯源、反制等结果信息进行反馈,用于改进预测模块;
应当理解的是,上述针对具体实施方式的描述较为详细,不能因此而认为是对本发明专利保护范围的限制,本发明的专利保护范围应以所附权利要求为准。

Claims (4)

1.一种企事业单位内源威胁网络安全防御设备,其特征在于:
A、内源威胁预测模块:包括内部设备安全风险评估、内源攻击风险评估、失泄密风险评估、窃密攻击风险评估等子模块;
B、内源威胁预防模块:包括基于设备漏洞的风险缓解、基于内源攻击技术的风险缓解、失泄密安全风险缓解、基于安全设备联动的风险缓解等子模块;
C、内源威胁监测模块:包括基于内部安全风险实时监测、内源攻击实时监测、失泄密实时监测、窃密攻击实时监测等子模块;
D、内源威胁响应模块:包括内源攻击取证、内源攻击溯源、内源攻击反制、响应效能反馈等子模块。
2.根据权利要求1所述的一种企事业单位内源威胁网络安全防御设备,其特征在于:其中模块A中,内源攻击风险评估是评估来自于内部的网络攻击方式在当前内部网络环境发生的可能性及危害大小,失泄密风险是评估当前内部网络环境中存在的失泄密行为的可能性及危害大小,窃密攻击风险评估是评估在当前内部网络环境中发生窃密攻击行为的可能性及危害大小。
3.根据权利要求1所述的一种企事业单位内源威胁网络安全防御设备,其特征在于:其中模块B中,风险缓解主要是通过设备配置操作来消除或减少该风险的依赖条件,进而增大该风险触发难度。
4.根据权利要求1所述的一种企事业单位内源威胁网络安全防御设备,其特征在于:其中模块C中,内源攻击实时监测主要是通过设备监测信息、设备日志、蜜罐等方式对内源攻击行为进行基于行为而非特征的监测。
CN201710784489.XA 2017-09-04 2017-09-04 一种企事业单位内源威胁网络安全防御设备 Active CN107508817B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710784489.XA CN107508817B (zh) 2017-09-04 2017-09-04 一种企事业单位内源威胁网络安全防御设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710784489.XA CN107508817B (zh) 2017-09-04 2017-09-04 一种企事业单位内源威胁网络安全防御设备

Publications (2)

Publication Number Publication Date
CN107508817A true CN107508817A (zh) 2017-12-22
CN107508817B CN107508817B (zh) 2020-05-05

Family

ID=60695566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710784489.XA Active CN107508817B (zh) 2017-09-04 2017-09-04 一种企事业单位内源威胁网络安全防御设备

Country Status (1)

Country Link
CN (1) CN107508817B (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134797A (zh) * 2017-12-28 2018-06-08 广州锦行网络科技有限公司 基于蜜罐技术的攻击反制实现系统及方法
CN109918935A (zh) * 2019-03-19 2019-06-21 北京理工大学 一种内部泄密威胁防护策略的优化方法
CN110381092A (zh) * 2019-08-29 2019-10-25 南京经纬信安科技有限公司 一种自适应闭环解决网络威胁的防御系统及方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270372A (zh) * 2014-10-11 2015-01-07 国家电网公司 一种参数自适应的网络安全态势量化评估方法
US20170142140A1 (en) * 2015-08-31 2017-05-18 Splunk Inc. Event specific relationship graph generation and application in a machine data processing platform
KR20170079528A (ko) * 2015-12-30 2017-07-10 주식회사 시큐아이 공격 탐지 방법 및 장치

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270372A (zh) * 2014-10-11 2015-01-07 国家电网公司 一种参数自适应的网络安全态势量化评估方法
US20170142140A1 (en) * 2015-08-31 2017-05-18 Splunk Inc. Event specific relationship graph generation and application in a machine data processing platform
KR20170079528A (ko) * 2015-12-30 2017-07-10 주식회사 시큐아이 공격 탐지 방법 및 장치

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曲巨宝: ""基于动态自适应的网络安全智能预警系统研究"", 《计算机时代》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134797A (zh) * 2017-12-28 2018-06-08 广州锦行网络科技有限公司 基于蜜罐技术的攻击反制实现系统及方法
CN109918935A (zh) * 2019-03-19 2019-06-21 北京理工大学 一种内部泄密威胁防护策略的优化方法
CN110381092A (zh) * 2019-08-29 2019-10-25 南京经纬信安科技有限公司 一种自适应闭环解决网络威胁的防御系统及方法

Also Published As

Publication number Publication date
CN107508817B (zh) 2020-05-05

Similar Documents

Publication Publication Date Title
Fillatre et al. Security of SCADA systems against cyber–physical attacks
Ylmaz et al. Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect
Harrop et al. Cyber resilience: A review of critical national infrastructure and cyber security protection measures applied in the UK and USA
CN107508817A (zh) 一种企事业单位内源威胁网络安全防御设备
Khalid et al. Advanced persistent threat detection: A survey
Van Dine et al. Outpacing cyber threats: Priorities for cybersecurity at nuclear facilities
Milosevic et al. Malware in IoT software and hardware
Tanwar et al. Classification and imapct of cyber threats in India: a review
Zhang et al. All your PLCs belong to me: ICS ransomware is realistic
Ning et al. Defense-in-depth against insider attacks in cyber-physical systems
CN107343011A (zh) 一种基于动态目标防御的内源威胁防御设备
Li et al. Cyber attack detection of I&C systems in NPPS based on physical process data
Armstrong et al. A controller-based autonomic defense system
kamal Kaur et al. Security analysis of smart grids: Successes and challenges
Bere et al. Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)
Lu et al. Research of Computer Network Information Security and Protection Strategy
Ismail et al. Towards developing scada systems security measures for critical infrastructures against cyber-terrorist attacks
Gonda Understanding the threat to SCADA networks
Sharma Security and Privacy Aspects of Cyber Physical Systems
Maciel et al. Impact evaluation of DDoS attacks using IoT devices
Gandotra et al. Layered security architecture for threat management using multi-agent system
Zhen et al. Research of Computer Network Information Security and Protection Strategy
Sepehrzadeh Security Evaluation of Cyber-Physical Systems with Redundant Components
Stoytcheva et al. Security Threats and Models in the Field of Renewable Energy Systems
Gu et al. Optimization Strategy of Computer Network Security Technology in Big Data Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant