CN109413642B - Terminal safety detection and monitoring systematization method - Google Patents

Terminal safety detection and monitoring systematization method Download PDF

Info

Publication number
CN109413642B
CN109413642B CN201811398304.2A CN201811398304A CN109413642B CN 109413642 B CN109413642 B CN 109413642B CN 201811398304 A CN201811398304 A CN 201811398304A CN 109413642 B CN109413642 B CN 109413642B
Authority
CN
China
Prior art keywords
terminal equipment
detection
safety
data
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811398304.2A
Other languages
Chinese (zh)
Other versions
CN109413642A (en
Inventor
郑松森
陈玲
黄照熙
陈武平
康志权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Youke Communication Technology Co ltd
Original Assignee
China Youke Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Youke Communication Technology Co ltd filed Critical China Youke Communication Technology Co ltd
Priority to CN201811398304.2A priority Critical patent/CN109413642B/en
Publication of CN109413642A publication Critical patent/CN109413642A/en
Application granted granted Critical
Publication of CN109413642B publication Critical patent/CN109413642B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a systematic method for terminal safety detection and monitoring, which is characterized by comprising the following steps of: step S1: defining a security event detection item; step S2: establishing a terminal equipment baseline library, comprising: a port baseline and a process baseline; step S3: establishing a safety event handling plan library; step S4: detecting when accessing the network and generating a detection report; step S5: monitoring is carried out in the operation process of the terminal equipment, the collected data is compared with the base line to confirm whether safety event early warning is generated or not, and if the safety event early warning is generated, the disposal means is matched from the safety event disposal plan library according to the type of the safety event and is executed. The invention can realize the safety state of the monitoring terminal equipment; the early warning of the safety event and the safety event disposal scheme are realized; and compared with the post-treatment, the method is more timely in terms of timeliness.

Description

Terminal safety detection and monitoring systematization method
Technical Field
The invention relates to the field of information security, in particular to a terminal security detection and monitoring systematization method and device.
Background
With the continuous development and innovation of science and technology, terminal equipment suitable for various types of application scenes emerges, and meanwhile, a large number of small terminal equipment quickly occupy the family of users, and the provided functions are endlessly developed and become more fun in the life of the users.
However, the user often has good things and dangerous things, and all home terminal devices have a common environmental requirement for better serving the user, that is, the user must be connected to an internet network, such as a home intelligent gateway, an AP, a high-definition intelligent set-top box, a network camera, and the like, "physical-to-physical interconnection" brings convenience and avoids network security threats represented by network DDOS attack, background vulnerability intrusion, and information data hijacking, and equipment manufacturers pay more attention to the creative degree of functions, often neglect the security of the network and information, and cause the unmeasurable loss of the user.
Disclosure of Invention
The invention creatively provides a set of systematic terminal security detection and monitoring mechanism, a security management and control mechanism of a complete life cycle from terminal network access to terminal operation, because the security of the current user home terminal is in a practical blind area, the discovery of a security event can be discovered only from the declaration of a user, a large amount of facts show that the security event has a strong requirement on timeliness, and the practically adopted defense means is usually lagged (the security patch is released for upgrading), so that the user is easily damaged by the network security, and the real-time network security defense and monitoring have to be faced, and the problem has to be considered.
The invention realizes the network access detection and the periodic monitoring of the terminal equipment, promotes the running state of the terminal equipment to be white-boxed, monitors the running state of the terminal equipment, can adopt a big data analysis algorithm for analysis, and immediately takes event handling after the safety event is confirmed by finding out the possible safety abnormal events, thereby realizing the inhibition when the safety event has a certain seedling trend, and further avoiding the loss caused by the event.
In order to solve the problems of defects and shortcomings in the prior art, the invention specifically adopts the following technical scheme:
a terminal safety detection and monitoring systematization method is characterized by comprising the following steps:
step S1: defining a security event detection item;
step S2: establishing a terminal equipment baseline library, comprising: a port baseline and a process baseline;
step S3: establishing a safety event handling plan library;
step S4: detecting when accessing the network and generating a detection report;
step S5: monitoring is carried out in the operation process of the terminal equipment, the collected data is compared with the base line to confirm whether safety event early warning is generated or not, and if the safety event early warning is generated, the disposal means is matched from the safety event disposal plan library according to the type of the safety event and is executed.
Preferably, in step S1, the defined security event detection items include: SSH service status detection, TELNET service status detection, and port detection.
Preferably, in step S2, the establishing a terminal device baseline library specifically includes the following steps:
step S21: establishing a minimum dimension of terminal equipment classification: classifying the terminal equipment according to the equipment type, the terminal manufacturer and the terminal model, and then classifying the terminal equipment by taking the software version of the terminal equipment as the minimum classification dimension;
step S22: establishing a baseline classification: the establishment of the base line takes the safety requirement on the terminal equipment as a starting point, and comprises the following steps: a port baseline and a process baseline;
step S23: a device baseline library is formed.
Preferably, step S4 specifically includes the following steps:
step S41: starting an external auxiliary tool to simulate a network environment;
step S42: actively initiating a detection task to the terminal equipment;
step S43: the terminal equipment receives and executes the detection task, and reports the diagnosis result to the management platform;
step S44: comparing the diagnosis result with the baseline to generate a diagnosis conclusion;
step S45: and returning a diagnosis conclusion and generating a detection report.
Preferably, step S43 specifically includes the following steps:
step S431: after receiving the detection task message, the instruction interaction module issues a detection task to the terminal equipment;
step S432: a safety management plug-in of the terminal equipment receives and executes a detection task;
step S433: the security management plug-in of the terminal equipment configures and collects security data according to the detection task;
step S434: and the safety management plug-in of the terminal equipment reports the acquired safety data to a data receiving module of the management platform.
Preferably, step S5 specifically includes the following steps:
step S51: the terminal equipment starts to operate and simultaneously enters an operation detection period;
step S52: the terminal equipment actively pulls a timing safety monitoring acquisition task and a condition triggering monitoring acquisition task from the management platform;
step S53: the terminal equipment collects data and reports the data according to preset time for a timing safety monitoring collection task;
step S54: the terminal equipment monitors and collects data according to the triggering conditions of the collection task for condition triggering and reports the data;
step S55: after receiving the acquired data, the management platform transmits the data into a data analysis and monitoring module for analysis;
step S56: the data analysis and monitoring module compares the data with the base line in the base line library of the terminal equipment according to the equipment type, and if the data are found to be abnormal, the data confirmed to be abnormal fluctuation are sent to the safety event decision module to generate safety event early warning;
step S57: the security event decision module matches a handling means from a security event handling plan library according to the type of the security event;
step S58: the management platform is in linkage fit with the safety management plug-in of the terminal equipment to execute the safety event handling plan, so that the safety event is processed.
The invention and the preferred scheme thereof use terminal safety as an entry point, and a whole set of solution is provided from the monitoring of the network access detection of the terminal equipment during operation: the safety state of the terminal equipment can be monitored by relying on the linkage of the management platform and the terminal safety management plug-in, the management platform finds abnormal safety environment abnormal change from the running condition of the whole network terminal equipment in a data analysis mode, and the early warning of safety events and the safety event disposal scheme are realized; and compared with the post-treatment, the method is more timely in terms of timeliness.
Drawings
The invention is described in further detail below with reference to the following figures and detailed description:
fig. 1 is a schematic diagram of modules and a work flow adopted in the embodiment of the present invention.
Detailed Description
In order to make the features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail as follows:
the term is defined as:
1. baseline: a general term representing allowable environment, state criteria of the terminal device.
2. And (3) detection items: and checking items of the terminal equipment during network access or running.
3. And (3) timing safety monitoring and collecting tasks: and triggering safety monitoring data acquisition by taking time as a condition.
4. And (3) triggering, monitoring and acquiring tasks according to conditions: and triggering safety monitoring data acquisition under a specific condition.
5. Safety management plug-in of terminal equipment: the terminal safety monitoring and collecting and safety event processing functions are realized by installing and integrating the terminal equipment side.
As shown in fig. 1, the implementation of this embodiment is mainly based on a security management plug-in installed in a terminal device and a management platform, where the management platform mainly includes: the system comprises a safety event decision module, a data analysis and monitoring module, an instruction interaction module, a data receiving module and the like.
The embodiment is specifically realized by the following steps:
step S1: defining a security event detection item;
step S2: establishing a terminal equipment baseline library, comprising: a port baseline and a process baseline;
step S3: establishing a safety event handling plan library;
step S4: detecting when accessing the network and generating a detection report;
step S5: monitoring is carried out in the operation process of the terminal equipment, the collected data is compared with the base line to confirm whether safety event early warning is generated or not, and if the safety event early warning is generated, the disposal means is matched from the safety event disposal plan library according to the type of the safety event and is executed.
The terminal device baseline library, the security event handling plan library, and the security event detection items established through steps S1 through S3 are stored in the storage management module of the management platform.
In step S1, the defined security event detection items include: SSH service state detection, TELNET service state detection and port detection, and can also be based on the specific items of matching baseline collection self-defining safety detection items.
In step S2, the establishing a terminal device baseline library specifically includes the following steps:
step S21: establishing a minimum dimension of terminal equipment classification: classifying according to the equipment type, the terminal manufacturer and the terminal model, and then classifying the terminal equipment by taking the software version of the terminal equipment as the minimum classification dimension;
step S22: establishing a baseline classification: the establishment of the baseline is based on the security requirement of the terminal device, and generally includes: a port baseline and a process baseline; different terminals may have their own unique baselines to provide criteria for later detection and monitoring.
Step S23: a device baseline library is formed.
The specifically formed device baseline library may be as shown in the examples provided in table 1:
Figure 764080DEST_PATH_IMAGE002
TABLE 1
In step S3, a safety event handling plan library is created by setting a set of diagnostic procedures according to the error set, i.e. a handling plan is preset for each type of safety event, and can be stored in the management platform as shown in the example provided in table 2:
Figure DEST_PATH_IMAGE004
TABLE 2
As shown in fig. 1, step S4 specifically includes the following steps:
step S41: starting an external auxiliary tool to simulate a network environment;
step S42: actively initiating a detection task to the terminal equipment;
step S43: the terminal equipment receives and executes the detection task, and reports the diagnosis result to the management platform;
step S44: comparing the diagnosis result with the baseline, and performing secondary processing to generate a diagnosis conclusion; part of simpler diagnosis results can be directly generated into a diagnosis conclusion without being compared with a baseline;
step S45: and returning a diagnosis conclusion and generating a detection report.
More specifically, step S43 specifically includes the following steps:
step S431: after receiving the detection task message, the instruction interaction module issues a detection task to the terminal equipment;
step S432: a safety management plug-in of the terminal equipment receives and executes a detection task;
step S433: the security management plug-in of the terminal equipment configures and collects security data according to the detection task;
step S434: and the safety management plug-in of the terminal equipment reports the acquired safety data to a data receiving module of the management platform.
As shown in fig. 1, step S5 specifically includes the following steps:
step S51: the terminal equipment starts to operate and simultaneously enters an operation detection period;
step S52: the terminal equipment actively pulls a timing safety monitoring acquisition task and a condition triggering monitoring acquisition task from the management platform;
step S53: the terminal equipment collects data and reports the data according to preset time for a timing safety monitoring collection task;
step S54: the terminal equipment monitors and collects data according to the triggering conditions of the collection task for condition triggering and reports the data;
step S55: after receiving the acquired data, the management platform transmits the data into a data analysis and monitoring module for analysis; part of the data is also subjected to preprocessing of cleaning according to rules, and irrelevant redundant data is screened out;
step S56: the data analysis and monitoring module compares the data with a base line in a base line library of the terminal equipment according to the defined equipment type, model and software version rule, and if the data are abnormal (including abnormal fluctuation), the data confirmed to be abnormal fluctuation are sent to the safety event decision module to generate safety event early warning;
step S57: the security event decision module matches a handling means from a security event handling plan library according to the type of the security event;
step S58: the management platform is in linkage fit with the safety management plug-in of the terminal equipment to execute the safety event handling plan, so that the safety event is processed. Wherein the processing of the security events is performed according to a preset priority or a sequence of human intervention.
The present invention is not limited to the above preferred embodiments, and any other various terminal security detection and monitoring system methods can be obtained according to the teaching of the present invention, and all equivalent changes and modifications made according to the claims of the present invention shall fall within the scope of the present invention.

Claims (3)

1. A terminal safety detection and monitoring systematization method is characterized by comprising the following steps:
step S1: defining a security event detection item;
step S2: establishing a terminal equipment baseline library, comprising: a port baseline and a process baseline;
step S3: establishing a safety event handling plan library;
step S4: detecting when accessing the network and generating a detection report;
step S5: monitoring in the running process of the terminal equipment, comparing the acquired data with a base line to determine whether safety event early warning is generated or not, and if the safety event early warning is generated, matching a disposal means from a safety event disposal plan library according to the type of the safety event and executing;
step S4 specifically includes the following steps:
step S41: starting an external auxiliary tool to simulate a network environment;
step S42: actively initiating a detection task to the terminal equipment;
step S43: the terminal equipment receives and executes the detection task, and reports the diagnosis result to the management platform;
step S44: comparing the diagnosis result with the baseline to generate a diagnosis conclusion;
step S45: returning a diagnosis conclusion and generating a detection report;
step S43 specifically includes the following steps:
step S431: after receiving the detection task message, the instruction interaction module issues a detection task to the terminal equipment;
step S432: a safety management plug-in of the terminal equipment receives and executes a detection task;
step S433: the security management plug-in of the terminal equipment configures and collects security data according to the detection task;
step S434: the security management plug-in of the terminal equipment reports the acquired security data to a data receiving module of the management platform;
step S5 specifically includes the following steps:
step S51: the terminal equipment starts to operate and simultaneously enters an operation detection period;
step S52: the terminal equipment actively pulls a timing safety monitoring acquisition task and a condition triggering monitoring acquisition task from the management platform;
step S53: the terminal equipment collects data and reports the data according to preset time for a timing safety monitoring collection task;
step S54: the terminal equipment monitors and collects data according to the triggering conditions of the collection task for condition triggering and reports the data;
step S55: after receiving the acquired data, the management platform transmits the data into a data analysis and monitoring module for analysis;
step S56: the data analysis and monitoring module compares the data with the base line in the base line library of the terminal equipment according to the equipment type, and if the data are found to be abnormal, the data confirmed to be abnormal fluctuation are sent to the safety event decision module to generate safety event early warning;
step S57: the security event decision module matches a handling means from a security event handling plan library according to the type of the security event;
step S58: the management platform is in linkage fit with the safety management plug-in of the terminal equipment to execute the safety event handling plan, so that the safety event is processed.
2. The terminal security detection and monitoring systematization method according to claim 1, wherein: in step S1, the defined security event detection items include: SSH service status detection, TELNET service status detection, and port detection.
3. The terminal security detection and monitoring systematization method according to claim 1, wherein: in step S2, the establishing a terminal device baseline library specifically includes the following steps:
step S21: establishing a minimum dimension of terminal equipment classification: classifying the terminal equipment according to the equipment type, the terminal manufacturer and the terminal model, and then classifying the terminal equipment by taking the software version of the terminal equipment as the minimum classification dimension;
step S22: establishing a baseline classification: the establishment of the base line takes the safety requirement on the terminal equipment as a starting point, and comprises the following steps: a port baseline and a process baseline;
step S23: a device baseline library is formed.
CN201811398304.2A 2018-11-22 2018-11-22 Terminal safety detection and monitoring systematization method Active CN109413642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811398304.2A CN109413642B (en) 2018-11-22 2018-11-22 Terminal safety detection and monitoring systematization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811398304.2A CN109413642B (en) 2018-11-22 2018-11-22 Terminal safety detection and monitoring systematization method

Publications (2)

Publication Number Publication Date
CN109413642A CN109413642A (en) 2019-03-01
CN109413642B true CN109413642B (en) 2022-02-18

Family

ID=65474426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811398304.2A Active CN109413642B (en) 2018-11-22 2018-11-22 Terminal safety detection and monitoring systematization method

Country Status (1)

Country Link
CN (1) CN109413642B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110120957B (en) * 2019-06-03 2019-12-06 浙江鹏信信息科技股份有限公司 Safe disposal digital twin method and system based on intelligent scoring mechanism
CN110347550A (en) * 2019-06-10 2019-10-18 烽火通信科技股份有限公司 The safety monitoring processing method and system of Android system terminal equipment
CN113625663B (en) * 2020-05-07 2024-05-17 宝武碳业科技股份有限公司 Comprehensive situation management and control system
CN112367224A (en) * 2020-11-11 2021-02-12 全球能源互联网研究院有限公司 Terminal monitoring device, system and method
CN112487419A (en) * 2020-11-30 2021-03-12 扬州大自然网络信息有限公司 Computer network information security event processing method
CN113259397B (en) * 2021-07-07 2021-09-28 奇安信科技集团股份有限公司 Method, device and equipment for executing plan and readable storage medium
CN115834426A (en) * 2022-11-07 2023-03-21 江苏安几科技有限公司 Terminal reliability dynamic detection method, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174973A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Network safety control construction
CN101399698A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Safety management system, device and method
CN106055984A (en) * 2016-05-27 2016-10-26 浪潮电子信息产业股份有限公司 Hierarchical management method applied to security baseline software
CN107948636A (en) * 2017-12-13 2018-04-20 中邮科通信技术股份有限公司 A kind of automatic fault selftesting localization method based on IPTV set top box error code
CN108718303A (en) * 2018-05-09 2018-10-30 北京仁和诚信科技有限公司 Safe operation management method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174973A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Network safety control construction
CN101399698A (en) * 2007-09-30 2009-04-01 华为技术有限公司 Safety management system, device and method
CN106055984A (en) * 2016-05-27 2016-10-26 浪潮电子信息产业股份有限公司 Hierarchical management method applied to security baseline software
CN107948636A (en) * 2017-12-13 2018-04-20 中邮科通信技术股份有限公司 A kind of automatic fault selftesting localization method based on IPTV set top box error code
CN108718303A (en) * 2018-05-09 2018-10-30 北京仁和诚信科技有限公司 Safe operation management method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
2002-2003中国通信科技回顾与设想;无;《通信与信息技术》;20031231(第3期);全文 *
政务终端安全基线管理系统的设计与实现;刘兰等;《计算机与现代化》;20131231(第2期);全文 *

Also Published As

Publication number Publication date
CN109413642A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN109413642B (en) Terminal safety detection and monitoring systematization method
CN107995049B (en) Cross-region synchronous fault monitoring method, device and system for power safety region
US8639988B2 (en) Device and method for detecting and diagnosing correlated network anomalies
CN107632918B (en) Monitoring system and method for computing storage equipment
US20080301081A1 (en) Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining
EP3258661B1 (en) Detection of abnormal configuration changes
CN107659431A (en) Interface processing method, apparatus, storage medium and processor
CN102447570A (en) Monitoring device and method based on health degree analysis
CN104052634B (en) Information spy system and method
CN107547228B (en) Implementation architecture of safe operation and maintenance management platform based on big data
CN112291075B (en) Network fault positioning method and device, computer equipment and storage medium
CN113328996B (en) Intelligent security policy configuration method based on target perception
US20160352573A1 (en) Method and System for Detecting Network Upgrades
WO2014096761A1 (en) Network security management
CN111510339A (en) Industrial Internet data monitoring method and device
CN117477774A (en) Intelligent early warning system and method for multifunctional power distribution cabinet
CN107809321B (en) Method for realizing safety risk evaluation and alarm generation
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN116991947B (en) Automatic data synchronization method and system
KR101433045B1 (en) System and method for detecting error beforehand
CN116204386B (en) Method, system, medium and equipment for automatically identifying and monitoring application service relationship
CN105045100A (en) Intelligent operation and maintenance monitoring platform for managing by utilizing mass data
CN117194154A (en) APM full-link monitoring system and method based on micro-service
CN116506278A (en) Abnormal monitoring platform based on zabbix
CN105007278A (en) Automatic real-time acquisition system and acquisition method for network safety log

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant