Defence method and device, system, storage medium, the electronic device of similar attack
Technical field
The present invention relates to network safety fileds, and defence method and device in particular to a kind of similar attack are
System, storage medium, electronic device.
Background technique
Network attack is the attack that hacker or viral wooden horse etc. initiate electronic equipment, gives user by steal files etc.
Bring massive losses.
In the related technology, in computer safety field, network attack becomes more and more specialized and specific aim at present.Face
To such attack, often lack the entirety understanding to the attack, and it is defendd to be also to fight separately, not
Form a good defense system.For example APT (advanced duration threat) is attacked or " shake net " virus, this attack is that have
Purpose and targetedly only just has aggressiveness to specific industry or certain goal systems.And work as currently without scheme
These attacks can obtain threat information when a small range occurs in advance, and in a wide range of interior progress early warning and defence.
The defence of network attack is caused to lag.
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Summary of the invention
The embodiment of the invention provides a kind of defence method of similar attack and device, system, storage medium, electronics dresses
It sets.
According to one embodiment of present invention, a kind of defence method of similar attack is provided, comprising: detection is in predetermined week
The same type of multiple target attack events occurred in phase;Determine the firing area of the multiple target attack event;To institute
The target of attack stated in firing area sends the warning information for being directed to the target attack event.
Optionally, same type of multiple target attack events that detection occurs in predetermined period include: detection pre-
The multiple attacks occurred in fixed cycle;It is identified in the multiple attack by the behavioural characteristic of attack and is each attacked
Hit the attack type of event;Count the quantity of attack in each attack type;The quantity of attack is greater than default threshold
The attack set of any attack type of value is determined as the multiple target attack event.
Optionally, the attack of each attack in the multiple attack is identified by the behavioural characteristic of attack
Type includes: to obtain the network behavior feature of attack;The control of attack connection is identified according to the network behavior feature
Servomechanism processed;The multiple attacks for connecting same control servomechanism are determined as same attack type.
Optionally, target of attack in Xiang Suoshu firing area sends the warning information for the attack and includes:
Target of attack into the firing area sends the pre-alert notification for being directed to the attack, wherein the pre-alert notification is taken
Defence policies with the target attack event.
Optionally, the firing area for determining the multiple target attack event includes at least one of: being determined described more
The attack geographic area of a target attack event;Determine the attack enterprise of the multiple target attack event;It determines the multiple
The attacking network of target attack event;Determine the attack server of the multiple target attack event;Determine the multiple target
The attack device type of attack;Determine the attack software type of the multiple target attack event.
According to another embodiment of the invention, a kind of defence installation of similar attack is provided, comprising: detection module,
For detecting the same type of multiple target attack events occurred in predetermined period;Determining module is described more for determining
The firing area of a target attack event;Sending module is sent for the target of attack into the firing area for described
The warning information of target attack event.
Optionally, the detection module includes: detection unit, for detecting the multiple attack things occurred in predetermined period
Part;Recognition unit identifies attacking for each attack in the multiple attack for the behavioural characteristic by attack
Hit type;Statistic unit, for counting the quantity of attack in each attack type;Determination unit is used for attack
Quantity be greater than the attack set of any attack type of preset threshold and be determined as the multiple target attack event.
Optionally, the recognition unit includes: acquisition subelement, for obtaining the network behavior feature of attack;Know
Small pin for the case unit, for identifying the control servomechanism of attack connection according to the network behavior feature;It determines subelement, is used for
The multiple attacks for connecting same control servomechanism are determined as same attack type.
Optionally, the sending module includes: transmission unit, sends needle for the target of attack into the firing area
To the pre-alert notification of the attack, wherein the pre-alert notification carries the defence policies of the target attack event.
Optionally, the determining module includes at least one of: the first determination unit, for determining the multiple target
The attack geographic area of attack;Second determination unit, for determining the attack enterprise of the multiple target attack event;The
Three determination units, for determining the attacking network of the multiple target attack event;4th determination unit is described more for determining
The attack server of a target attack event;5th determination unit, for determining that the attack of the multiple target attack event is set
Standby type;6th determination unit, for determining the attack software type of the multiple target attack event.
According to still another embodiment of the invention, a kind of system of defense of similar attack is additionally provided, comprising: first service
Device, second server, terminal, wherein the first server includes: detection module, is occurred in predetermined period for detecting
Same type of multiple target attack events;Determining module, for determining the firing area of the multiple target attack event;
Sending module sends the warning information for being directed to the target attack event for the target of attack into the firing area;The
Two servers are connected between the first server and the terminal, comprising: acquisition module, for acquiring the terminal
Attack, and the attack is uploaded to the first server;Forwarding module, for receiving the warning information,
And the warning information is transmitted to the terminal.
According to still another embodiment of the invention, a kind of storage medium is additionally provided, meter is stored in the storage medium
Calculation machine program, wherein the computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
According to still another embodiment of the invention, a kind of electronic device, including memory and processor are additionally provided, it is described
Computer program is stored in memory, the processor is arranged to run the computer program to execute any of the above-described
Step in embodiment of the method.
Through the invention, the same type of multiple target attack events occurred in predetermined period are detected, determining
After the firing area for stating multiple target attack events, the target of attack in Xiang Suoshu firing area, which is sent, is directed to the target attack
The warning information of event is on the defensive by being found to have targeted attack, and then to relevant target of attack,
Issue defence warning information to each target that may be attacked, can prevent the type attack it is further diffusion and it is right
The target that do not attack damages, and solves the technical issues of cannot defending similar attack event in the related technology.Realize and
When obtain active threat information, and other similar targets of attack are done and are targetedly defendd.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the defence server of similar attack of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of the defence method of similar attack according to an embodiment of the present invention;
Fig. 3 is the schematic diagram that the embodiment of the present invention carries out similar attack in specific geographical area;
Fig. 4 is the structural block diagram of the defence installation of similar attack according to an embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can be mutual group
It closes.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Embodiment 1
Embodiment of the method provided by the embodiment of the present application one can mobile terminal, terminal, server or
It is executed in similar arithmetic unit.For running on the server, Fig. 1 is a kind of the anti-of similar attack of the embodiment of the present invention
The hardware block diagram of imperial server.As shown in Figure 1, server 10 may include one or more (only showing one in Fig. 1)
(processor 102 can include but is not limited to the processing dress of Micro-processor MCV or programmable logic device FPGA etc. to processor 102
Set) and memory 104 for storing data, optionally, above-mentioned server can also include setting for the transmission of communication function
Standby 106 and input-output equipment 108.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate,
The structure of above-mentioned server is not caused to limit.For example, server 10 may also include it is more or less than shown in Fig. 1
Component, or with the configuration different from shown in Fig. 1.
Memory 104 can be used for storing computer program, for example, the software program and module of application software, such as this hair
The corresponding computer program of defence method of one of bright embodiment similar attack, processor 102 are stored in by operation
Computer program in reservoir 104 realizes above-mentioned method thereby executing various function application and data processing.Storage
Device 104 may include high speed random access memory, may also include nonvolatile memory, as one or more magnetic storage device,
Flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise relative to processing
The remotely located memory of device 102, these remote memories can pass through network connection to server 10.The example of above-mentioned network
Including but not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include
The wireless network that the communication providers of server 10 provide.In an example, transmitting device 106 includes a network adapter
(Network Interface Controller, referred to as NIC), can be connected by base station with other network equipments so as to
It is communicated with internet.In an example, transmitting device 106 can be radio frequency (Radio Frequency, referred to as RF)
Module is used to wirelessly be communicated with internet.
A kind of defence method of similar attack is provided in the present embodiment, and Fig. 2 is one kind according to an embodiment of the present invention
The flow chart of the defence method of similar attack, as shown in Fig. 2, the process includes the following steps:
Step S202 detects the same type of multiple target attack events occurred in predetermined period;
Using loophole existing for network or hardware entities and safety defect to the hardware, software and its system of network system
In the attack that carries out of data, network attack can be divided into active attack and passive attack, wherein active attack will lead to certain
The generation of data flow distorted with false data stream, this kind of attack, which can be divided into, distorts, forges message data and terminal (refusal clothes
Business).Attacker does not make any modification to data information in passive attack, but can intercept or the data of interception facility, wherein cuts
It takes/eavesdrops and refer to that attacker obtains information or related data in the case where agreeing to without user and approving, including eavesdrop, flow
The attack patterns such as amount analysis, the data flow for cracking weak encryption.
The target attack event of the present embodiment can occur in computer, notebook, printer, camera, USB flash disk, server
Etc. the electronic equipment that can be accessed network or can be controlled.
Step S204 determines the firing area of the multiple target attack event;
The present embodiment firing area refers to the range that target attack event occurs, including target attack event may occur
All objects of attack, there are same or similar features for the object of attack in firing area, e.g., connect the same server,
It is mounted with the same software, work is logged using the same account in the same geographic area, in the same local area network
Deng.
Target of attack in step S206, Xiang Suoshu firing area sends the early warning letter for the target attack event
Breath.
Through the above steps, the same type of multiple target attack events occurred in predetermined period are detected, in determination
After the firing area of the multiple target attack event, the target of attack in Xiang Suoshu firing area is sent attacks for the target
The warning information for hitting event is prevented by being found to have targeted attack, and then to relevant target of attack
It is imperial, defence warning information is issued to each target that may be attacked, the further diffusion of the type attack can be prevented
It is damaged with to the target that do not attack, solves the technical issues of cannot defending similar attack event in the related technology.It realizes
Timely acquisition active threat information, and other similar targets of attack are done and are targetedly defendd.
In an optional embodiment of the present embodiment, the same type of multiple mesh occurred in predetermined period are detected
Marking attack includes:
S11 detects the multiple attacks occurred in predetermined period;
It is collapsed in terminal device, the security software of terminal monitors attack or the attack of user's active upload
Event, it is believed that be that attack has occurred;
S12 identifies the attack class of each attack in the multiple attack by the behavioural characteristic of attack
Type;
The behavioural characteristic of the present embodiment includes network behavior feature, interbehavior feature etc., is included in attack process
The server of middle connection, the interface of calling, the network used, the software etc. of unlatching;
Optionally, the attack of each attack in the multiple attack is identified by the behavioural characteristic of attack
Type includes: to obtain the network behavior feature of attack;The control of attack connection is identified according to the network behavior feature
Servomechanism (command and control server, C&C server) processed;Multiple attacks of same control servomechanism will be connected
Event is determined as same attack type;
S13 counts the quantity of attack in each attack type;
The attack set that the quantity of attack is greater than any attack type of preset threshold is determined as institute by S14
State multiple target attack events.
In one example, predetermined period is one day, monitors that 50 attacks have occurred, wherein the first kind
30 times, 11 times of Second Type, other types are all not above 3 times;By taking preset threshold is 10 times as an example, the first kind and second
The attack of type is target attack event, is had occurred repeatedly in predetermined period, it is known that the attack of the type is that have
The attack set of the first kind and Second Type is identified as first by the attack organizing, there is object, having planning
Target attack event and the second target attack event, then determine its firing area according to affair character respectively.
In an optional embodiment of the present embodiment, the target of attack in Xiang Suoshu firing area is sent for described
The warning information of attack includes: that the target of attack transmission into the firing area is logical for the early warning of the attack
Know, wherein the pre-alert notification carries the defence policies of the target attack event, and defence policies are used to indicate terminal and user
How the target attack event is defendd.Pre-alert notification can also include the description information of target attack event, and have occurred and that
The equipment of target attack event, such as the equipment of virus infection.
In the present embodiment, firing area is that the range of the object of attack of target attack event, including terminal set occurs,
Geographic range, network range etc. can determine attacking for the multiple target attack event by big data come analytical attack range
Hitting range can be, but not limited to are as follows:
Example one: the attack geographic area of the multiple target attack event is determined;Target attack thing occurs by analysis
The MAC Address and IP address of the equipment of part, it may be determined that the generation position of attack, and then can determine multiple target attack events
Attack geographic area, such as concentrate on Beijing, then the network terminal in Beijing can targetedly be reminded;Fig. 3
It is the schematic diagram that the embodiment of the present invention carries out similar attack in specific geographical area, wherein multiple objects of attack in the city A occur
The attack of same type, and there is no the events of hitting in the city B, then the attack geographic area of target attack event is the city A.
Example two: the attack enterprise of the multiple target attack event is determined;Target attack event occurs by analysis
The account information of equipment, affiliated operation user information etc. can determine the unit and enterprise that the target attack event occurs;Such as attack
The event of hitting concentrates on the computer of Microsoft employee, then can targetedly be reminded entire wechat company;
Example three: the attacking network of the multiple target attack event is determined;Target attack event occurs by analysis
The network (e.g., portal address, IP address etc.) that equipment is connected, such as company Intranet, the network clothes for specifying network operator to provide
Business etc., if attack concentrates on the user of Tie Tong network, then can remind the user equipment of entire Tie Tong net;
Example four: the attack server of the multiple target attack event is determined;Attack is possibly through server
It accesses and controlling terminal, equipment is controlled by fishing website, such as the data server of some URL connection, passes through analysis hair
The history access record of server or browser that the equipment of raw target attack event connected, can determine target attack event
Server, such as the data server of some illegal website;
Example five: the attack device type of the multiple target attack event is determined;Target attack thing occurs by analysis
The device attribute information of part determines device type, such as operating system, manufacturer, as attack concentrates on Android operation system
Equipment on, then can remind and entirely be mounted with the user equipment of Android operation system;
Example six: the attack software type of the multiple target attack event is determined.Target attack thing occurs by analysis
The software that the equipment of part is installed, or software mutually associated with target attack event attack software belonging to file etc., can
To determine that attack concentrates the designated software of attack, then user equipment or the software development for being mounted with the designated software can be reminded
Person.
Optionally, the executing subject of above-mentioned steps can be the one or more clients of connection or the cloud service of server
Device etc., client can be mobile terminal, PC etc., but not limited to this.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of defence installation of similar attack is additionally provided in the present embodiment, can be terminal or server, the device
For realizing above-described embodiment and preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term
The combination of the software and/or hardware of predetermined function may be implemented in " module ".Although device is preferably described in following embodiment
It is realized with software, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.
Fig. 4 is the structural block diagram of the defence installation of similar attack according to an embodiment of the present invention, can be applied in client
Or in server, as shown in figure 4, the device includes: detection module 40, determining module 42, sending module 44, wherein
Detection module 40, for detecting the same type of multiple target attack events occurred in predetermined period;
Determining module 42, for determining the firing area of the multiple target attack event;
Sending module 44 is sent for the target of attack into the firing area for the pre- of the target attack event
Alert information.
Optionally, the detection module includes: detection unit, for detecting the multiple attack things occurred in predetermined period
Part;Recognition unit identifies attacking for each attack in the multiple attack for the behavioural characteristic by attack
Hit type;Statistic unit, for counting the quantity of attack in each attack type;Determination unit is used for attack
Quantity be greater than the attack set of any attack type of preset threshold and be determined as the multiple target attack event.
Optionally, the recognition unit includes: acquisition subelement, for obtaining the network behavior feature of attack;Know
Small pin for the case unit, for identifying the control servomechanism of attack connection according to the network behavior feature;It determines subelement, is used for
The multiple attacks for connecting same control servomechanism are determined as same attack type.
Optionally, the sending module includes: transmission unit, sends needle for the target of attack into the firing area
To the pre-alert notification of the attack, wherein the pre-alert notification carries the defence policies of the target attack event.
Optionally, the determining module includes at least one of: the first determination unit, for determining the multiple target
The attack geographic area of attack;Second determination unit, for determining the attack enterprise of the multiple target attack event;The
Three determination units, for determining the attacking network of the multiple target attack event;4th determination unit is described more for determining
The attack server of a target attack event;5th determination unit, for determining that the attack of the multiple target attack event is set
Standby type;6th determination unit, for determining the attack software type of the multiple target attack event.
The present embodiment additionally provides a kind of system of defense of similar attack, comprising: first server, second server, eventually
End, wherein the first server includes: detection module, for detect occur in predetermined period it is same type of multiple
Target attack event;Determining module, for determining the firing area of the multiple target attack event;Sending module, for
Target of attack in the firing area sends the warning information for being directed to the target attack event;Second server is connected to
Between the first server and the terminal, comprising: acquisition module, for acquiring the attack of the terminal, and by institute
It states attack and is uploaded to the first server;Forwarding module, for receiving the warning information, and by the warning information
It is transmitted to the terminal.
Optionally, first server is cloud server, connects second server, and second server is connection user terminal
Access server.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any
Combined form is located in different processors.
Embodiment 3
The embodiments of the present invention also provide a kind of storage medium, computer program is stored in the storage medium, wherein
The computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
Optionally, in the present embodiment, above-mentioned storage medium can be set to store by executing based on following steps
Calculation machine program:
S1 detects the same type of multiple target attack events occurred in predetermined period;
S2 determines the firing area of the multiple target attack event;
Target of attack in S3, Xiang Suoshu firing area sends the warning information for being directed to the target attack event.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read-
Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard
The various media that can store computer program such as disk, magnetic or disk.
The embodiments of the present invention also provide a kind of electronic device, including memory and processor, stored in the memory
There is computer program, which is arranged to run computer program to execute the step in any of the above-described embodiment of the method
Suddenly.
Optionally, above-mentioned electronic device can also include transmission device and input-output equipment, wherein the transmission device
It is connected with above-mentioned processor, which connects with above-mentioned processor.
Optionally, in the present embodiment, above-mentioned processor can be set to execute following steps by computer program:
S1 detects the same type of multiple target attack events occurred in predetermined period;
S2 determines the firing area of the multiple target attack event;
Target of attack in S3, Xiang Suoshu firing area sends the warning information for being directed to the target attack event.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment
Example, details are not described herein for the present embodiment.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
In above-described embodiment of the application, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the application whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered
It is considered as the protection scope of the application.