CN110198303A - Threaten the generation method and device, storage medium, electronic device of information - Google Patents

Threaten the generation method and device, storage medium, electronic device of information Download PDF

Info

Publication number
CN110198303A
CN110198303A CN201910345207.5A CN201910345207A CN110198303A CN 110198303 A CN110198303 A CN 110198303A CN 201910345207 A CN201910345207 A CN 201910345207A CN 110198303 A CN110198303 A CN 110198303A
Authority
CN
China
Prior art keywords
information
sample
common feature
malice
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910345207.5A
Other languages
Chinese (zh)
Inventor
白敏�
潘博文
刘爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201910345207.5A priority Critical patent/CN110198303A/en
Publication of CN110198303A publication Critical patent/CN110198303A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • G06F18/232Non-hierarchical techniques
    • G06F18/2321Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
    • G06F18/23213Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides a kind of generation methods and device, storage medium, electronic device for threatening information, wherein this method comprises: from the multiple malice samples of business system acquisition;Homogeneous assays are carried out to the multiple malice sample, determine the common feature of every group of malice sample;The threat information that advanced duration threatens APT attack is generated according to the common feature.Through the invention, the technical issues of threat information inefficiency of production APT attack in the related technology is solved.

Description

Threaten the generation method and device, storage medium, electronic device of information
Technical field
The present invention relates to network safety fileds, in particular to a kind of generation method and device, storage for threatening information Medium, electronic device.
Background technique
Network attack is the attack that hacker or viral wooden horse etc. initiate electronic equipment, gives user by steal files etc. Bring massive losses.
When threatening (Advanced Persistent Threat, APT) clique to be tracked discovery advanced duration, The attacks such as main malicious file, fishing mail according in Internet communication carry out context relation analysis.Attacker utilizes malice Program carries out invasion control to network and information system, achievees the purpose that steal sensitive data and destruction system and network environment, It is in urgent need to be improved to the malice pattern detection rate and batch quantity analysis ability propagated in enterprise network.
In the related technology, in computer safety field, network attack becomes more and more specialized and specific aim at present.Face To such attack, often lack the entirety understanding to the attack, and it is defendd to be also to fight separately, not Form a good defense system.For example APT (advanced duration threat) is attacked or " shake net " virus, this attack is that have Purpose and targetedly only just has aggressiveness to specific industry or certain goal systems.And work as currently without scheme These attacks can obtain threat information when a small range occurs in advance, and in a wide range of interior progress early warning and defence. The defence of network attack is caused to lag.
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Summary of the invention
The embodiment of the invention provides a kind of generation methods and device, storage medium, electronic device for threatening information.
According to one embodiment of present invention, a kind of generation method for threatening information is provided, comprising: adopt from operation system Collect multiple malice samples;Homogeneous assays are carried out to the multiple malice sample, determine the common feature of every group of malice sample;According to The common feature generates the threat information that advanced duration threatens APT attack.
Optionally, homogeneous assays are carried out to the multiple malice sample, determines the common feature of every group of malice sample, wrapped It includes: classifying to the known sample in the multiple malice sample, and to the unknown sample in the multiple malice sample It is clustered;Every group of sample after labeled bracketing or cluster, and record the behavioural information of every group of sample;By identical behavioural information It is determined as the common feature of every group of malice sample.
Optionally, to the unknown sample in the multiple malice sample carry out cluster include: using K mean cluster algorithm by Cutting is carried out according to the object properties of unknown sample, wherein the object properties include: hash value, compilation time, characteristic character String, imports table Hash imphash, derivative list at file type, wherein the feature string includes at least one of: Program data library file PDB, domain name, IP address, uniform resource position mark URL, the derivative list include: for compression text Listed files in part, for the non-transplantable structural information list for executing body PE class;Calculate the object of each unknown sample The distance between attribute value and each cluster centre distribute to each unknown sample apart from nearest cluster centre, wherein every A cluster centre is one group.
It optionally, include: by the behavior by the common feature that identical behavioural information is determined as every group of malice sample Message Digest 5 MD5 value in information reversely searches IP address;By the execution of each class behavior executed in the IP address Main body is determined as an attack source of APT attack.
It optionally, include: determining according to correlation rule is preset according to the threat information that the common feature generates APT attack The contextual information of the common feature;Identify at least one following information according to the contextual information: APT organizes body Part, capture index IOC information, tactics technology program TTP information;It is generated according to the information related to the common feature Threat information.
Optionally, described after generating the threat information that advanced duration threatens APT to attack according to the common feature Method further include: mark the IP information of the malice sample;After the IP information is associated with the threat information, it is added and threatens In information bank.
According to another embodiment of the invention, a kind of generating means for threatening information are provided, comprising: acquisition module, For from the multiple malice samples of business system acquisition;Analysis module, for carrying out homogeneous assays to the multiple malice sample, really The common feature of fixed every group of malice sample;Generation module threatens APT to attack for generating advanced duration according to the common feature The threat information hit.
Optionally, the analysis module includes: grouped element, for the known sample in the multiple malice sample into Row classification, and the unknown sample in the multiple malice sample is clustered;Recording unit is used for labeled bracketing or cluster Every group of sample afterwards, and record the behavioural information of every group of sample;Determination unit, for identical behavioural information to be determined as every group The common feature of malice sample.
Optionally, the grouped element includes: cutting subelement, for using K mean cluster algorithm according to unknown sample Object properties carry out cutting, wherein the object properties include: hash value, compilation time, feature string, file type, Import table Hash imphash, derivative list, wherein the feature string includes at least one of: program data library text Part PDB, domain name, IP address, uniform resource position mark URL, the derivative list include: for the file column in compressed file Table, for the non-transplantable structural information list for executing body PE class;Subelement is distributed, for calculating pair of each unknown sample As the distance between attribute value and each cluster centre, each unknown sample is distributed to apart from nearest cluster centre, wherein Each cluster centre is one group.
Optionally, the determination unit includes: lookup subelement, for being calculated by the eap-message digest in the behavioural information Method MD5 value reversely searches IP address;Determine subelement, the executing subject of each class behavior for will execute in the IP address It is determined as an attack source of APT attack.
Optionally, the generation module comprises determining that unit, for determining the common feature according to default correlation rule Contextual information;Recognition unit, for identifying at least one following information according to the contextual information: APT is organized Identity captures index IOC information, tactics technology program TTP information;Generation unit, for according to the information generate with The relevant threat information of the common feature.
Optionally, described device further include: mark module, for being generated in the generation module according to the common feature After advanced duration threatens the threat information of APT attack, the IP information of the malice sample is marked;Adding module, being used for will After the IP information is associated with the threat information, it is added and threatens in information bank.
According to still another embodiment of the invention, a kind of storage medium is additionally provided, meter is stored in the storage medium Calculation machine program, wherein the computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
According to still another embodiment of the invention, a kind of electronic device, including memory and processor are additionally provided, it is described Computer program is stored in memory, the processor is arranged to run the computer program to execute any of the above-described Step in embodiment of the method.
Through the invention, from the multiple malice samples of business system acquisition, then the multiple malice sample is carried out homologous Analysis, determines the common feature of every group of malice sample, finally generates advanced duration according to the common feature and threatens APT attack Threat information, solve in the related technology production APT attack threat information inefficiency the technical issues of.Improve discovery The ability of unknown IOC greatly improves OA operation analysis personnel to the analysis tracing and positioning ability of malice sample, chases after to Security Officer The identity information of track APT attacker has great help.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the generation server of threat information of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of generation method for threatening information according to an embodiment of the present invention;
Fig. 3 is the complete service logic figure of the embodiment of the present invention;
Fig. 4 is the business process map of the embodiment of the present invention;
Fig. 5 is the structural block diagram of the generating means according to an embodiment of the present invention for threatening information.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can be mutual group It closes.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
Embodiment of the method provided by the embodiment of the present application one can execute in server or similar arithmetic unit. For running on the server, Fig. 1 is a kind of hardware configuration frame of the generation server of threat information of the embodiment of the present invention Figure.As shown in Figure 1, server 10 may include that (processor 102 can for one or more (only showing one in Fig. 1) processors 102 To include but is not limited to the processing unit of Micro-processor MCV or programmable logic device FPGA etc.) and depositing for storing data Reservoir 104, optionally, above-mentioned server can also include the transmission device 106 and input-output equipment for communication function 108.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate, not to the structure of above-mentioned server It causes to limit.For example, server 10 may also include than shown in Fig. 1 more perhaps less component or have with shown in Fig. 1 Different configurations.
Memory 104 can be used for storing computer program, for example, the software program and module of application software, such as this hair One of bright embodiment threatens the corresponding computer program of generation method of information, and processor 102 is stored in by operation Computer program in reservoir 104 realizes above-mentioned method thereby executing various function application and data processing.Storage Device 104 may include high speed random access memory, may also include nonvolatile memory, as one or more magnetic storage device, Flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise relative to processing The remotely located memory of device 102, these remote memories can pass through network connection to server 10.The example of above-mentioned network Including but not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of server 10 provide.In an example, transmitting device 106 includes a network adapter (Network Interface Controller, referred to as NIC), can be connected by base station with other network equipments so as to It is communicated with internet.In an example, transmitting device 106 can be radio frequency (Radio Frequency, referred to as RF) Module is used to wirelessly be communicated with internet.
A kind of generation method for threatening information is provided in the present embodiment, and Fig. 2 is one kind according to an embodiment of the present invention The flow chart for threatening the generation method of information, as shown in Fig. 2, the process includes the following steps:
Step S202, from the multiple malice samples of business system acquisition;
The malice sample of the present embodiment is using loophole existing for network or hardware entities and safety defect to network system Hardware, software and its code of the attack of the data progress in system of system, software, program, file etc..
After obtaining malice sample, the file type of malice sample or the equipment class of the operation malice sample are also detected Type, wherein file type includes publicly-owned file, and malice sample is sent to by privately owned file when malice sample is publicly-owned file Malice sample is sent to privately owned cloud server or sheet when malice sample is privately owned file by common cloud server Ground server, on the other hand, device type be designated environment equipment (such as government bodies, the confidentiality such as financial structure compared with The equipment of strong unit) when, malice sample is sent to privately owned cloud server or local server, is logical in device type When with the equipment of environment, malice sample is sent to common cloud server.
Step S204 carries out homogeneous assays to the multiple malice sample, determines the common feature of every group of malice sample;
Step S206 generates the threat information that advanced duration threatens APT attack according to the common feature.The present embodiment APT attack threat information include APT organizational information, member identities' information and APT attack means, range, the time, The information such as object.
Through the above steps, from the multiple malice samples of business system acquisition, then the multiple malice sample is carried out same Source analysis, determines the common feature of every group of malice sample, finally generates advanced duration according to the common feature and APT is threatened to attack The threat information hit solves the technical issues of threat information inefficiency of production APT attack in the related technology.Improve hair The ability of existing unknown IOC, greatly improves OA operation analysis personnel to the analysis tracing and positioning ability of malice sample, to Security Officer The identity information of tracking APT attacker has great help.
In an embodiment of the present embodiment, homogeneous assays are carried out to the multiple malice sample, determine every group of evil The common feature of meaning sample, comprising:
S11 classifies to the known sample in the multiple malice sample, and in the multiple malice sample Unknown sample is clustered;
Optionally, to the unknown sample in the multiple malice sample carry out cluster include: using K mean cluster algorithm by Cutting is carried out according to the object properties of unknown sample, wherein the object properties include: hash value, compilation time, characteristic character String, imports table Hash imphash, derivative list at file type, wherein the feature string includes at least one of: Program data library file PDB, domain name, IP address, uniform resource position mark URL, the derivative list include: for compression text Listed files in part, for the non-transplantable structural information list for executing body PE class;Calculate the object of each unknown sample The distance between attribute value and each cluster centre distribute to each unknown sample apart from nearest cluster centre, wherein every A cluster centre is one group.
Every group of sample after S12, labeled bracketing or cluster, and record the behavioural information of every group of sample;
By malice sample homogeneous assays, sample is classified, cluster and unknown sample label, record each sample Behavioural information, shown and grouping information and stored by taxonomic clustering, sample it is homologous to may be apt, it is also possible to The black production duplex structure of certain apt+.
The taxonomic clustering of the present embodiment is the process of a machine learning, by the taxonomic clustering algorithm in machine learning, If K-means algorithm is classified sample automatically, the attribute of object is carried out cutting, such as following classes of information 1.hash; 2. compilation time;3. feature string: pdb, domain name, ip, url;4. file type;5.imphash;6. derivative list is (right Listed files in compressed file, the structural information list for non-PE class);7. detecting label;8. known attack source label; After information above is carried out taxonomic clustering, is classified automatically by algorithm, find the total characteristic of the file information.Due to sample itself Operation has the relevant DNA attribute of many systems, needs to exclude, and otherwise influences grouping accuracy.It can be by newfound information data Secondary production generates new threat information IOC information again.
Identical behavioural information is determined as the common feature of every group of malice sample by S13.
It optionally, include: by the behavior by the common feature that identical behavioural information is determined as every group of malice sample Message Digest 5 MD5 value in information reversely searches IP address;By the execution of each class behavior executed in the IP address Main body is determined as an attack source of APT attack.
Information association is done based on chart database, there will be the data of common feature to be marked, is such as found by the way that a md5 is counter One IP, that had the MD5 of each class behavior that may be judged as an attack source on this IP.
In an embodiment of the present embodiment, include: according to the threat information that the common feature generates APT attack The contextual information of the common feature is determined according to default correlation rule;Following information letter is identified according to the contextual information At least one breath: APT organizational identities capture index IOC information, tactics technology program TTP information;It is raw according to the information At threat information relevant to the common feature.
Optionally, it after generating the threat information that advanced duration threatens APT to attack according to the common feature, also wraps It includes: marking the IP information of the malice sample;After the IP information is associated with the threat information, it is added and threatens information bank In.
By detecting malice sample file, linked character therein is found, IP address, while people are found by sample information Work intervenes event response, after marking Miscellaneous Documents sample and IP information, does secondary production to information and is put in storage, be added and threaten information bank In.
A kind of APT analysis method based on malice sample of the present embodiment is related to field of computer information security.It is whole and Speech by providing the fallacious message of a kind of pair of mass file extraction, and extracts related ATP and organizes IOC (Indicators of Compromise captures indicator, captures index or invasion index) and TTP (Tactics, Techniques, and Procedures, means technical process) maintenance of information (such as by the IOC indication information feature extraction to each inquiry, carried out Marking, Metadata Extraction processing, while related APT organizational information and associated context information are extracted, while recording tactics, war The relevant informations such as skill), at the same to mail sample, malicious file sample carry out metadata extraction management, provide malice sample and The specimen discerning and result of malious email information are shown.The IP and attack process information for recording affected user simultaneously, will attack Activity and contextual information are recorded in data storing platform, are associated analysis to the interaction of paper sample.By the method, Attack analysis and the operation that APT clique is carried out to malice sample, reach the discovery to attack source and keep track, and the device is by sample The efficiency of this analysis and operation greatly improves.
In a complete embodiment of the present embodiment, including following functions module, it is respectively as follows: network according to timing Collector, static sandbox, dynamic sandbox, height confrontation sandbox cluster, information matching module, event response module.
Network collector: sample input is docked by automation mode, such as delivering mail attachment, original document is criticized Amount automation is delivered, and sandbox interface is uploaded to;
Static sandbox: static detection is carried out to sample file first by static sandbox, matches malicious file static rule. By extraction document metadata carry out acquisition of information, including filename, file type, file type matching degree, file size, MD5 (Message Digest 5, Message-Digest Algorithm), SHA (Secure Hash Algorithm, secure hash Algorithm) 1, SHA256, SHA512, SSDeep etc..Pass through OWL (Ontology Wed Language, online Ontology Language) simultaneously Static engine rule, carries out the detection and screening of file;
Dynamic sandbox: simulation Dynamic Execution, screenshot when analyzing Host behavior and obtaining network behavior and operation grab simultaneously Network flow and sample;
Height confrontation sandbox cluster: storage mass data and each testing result information, while being stored including file type data, institute There are sandbox result relevant historical data and file type data storage in the cluster;
Information matching module: sandbox detection module matches IOC as a result, after associated context, obtains family's information and visit Malice domain name and history the parsing address asked, the family's information and APT clique that can more accurately navigate to malice sample are closed Connection analysis.Such as by inquiring some malice sample in sandbox, association threatens information and WHOIS, and (one kind is used to inquiry field The transport protocol of the information such as the IP and the owner of name) historical information, the relevant all information of this document can be given;
Event response module: statistics and disposition present analysis sample as a result, provide case management and event correlation simultaneously, Secondary production under the real-time update of each engine and detected rule, for information.
Fig. 3 is the complete service logic figure of the embodiment of the present invention, and Fig. 4 is the business process map of the embodiment of the present invention, comprising:
Flow collection process is responsible for the sample of collection carrying out automation collection and batch is delivered, predominantly flow collection Device and sample collecting device;
Sandbox testing process: it is divided into static detection sandbox and dynamic detection sandbox.Sandbox cluster is fought by height, use is quiet State OWL filtering extracts engine and carries out text semantic analysis and screening, wherein static OWL rule is based on semantic and file member letter Breath carries out Detection and Extraction to text data, and OWL engine can identify file type, extracts corresponding member according to various file types Information data, for example, PE (PortableExecutable, i.e., transplantable execution body) how many section, whether have signature, label What, PDB (Program Database File, program data library file) path name be, is delivered to corresponding static and dynamic Among sandbox;
Data storage and responding process: the APT family information association and case for being responsible for sandbox are put in storage, and produce new feelings Report.
Optionally, the executing subject of above-mentioned steps can be the one or more clients of connection or the cloud service of server Device or local server etc., client can be mobile terminal, PC etc., but not limited to this.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of generating means for threatening information are additionally provided in the present embodiment, can be server, and the device is for real Existing above-described embodiment and preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term " module " The combination of the software and/or hardware of predetermined function may be implemented.Although device described in following embodiment is preferably with software It realizes, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.
Fig. 5 is the structural block diagram of the generating means according to an embodiment of the present invention for threatening information, can be applied in server In, as shown in figure 5, the device includes: acquisition module 50, analysis module 52, generation module 54, wherein
Acquisition module 50 is used for from the multiple malice samples of business system acquisition;
Analysis module 52 determines the general character of every group of malice sample for carrying out homogeneous assays to the multiple malice sample Feature;
Generation module 54, for generating the threat information that advanced duration threatens APT attack according to the common feature.
Optionally, the analysis module includes: grouped element, for the known sample in the multiple malice sample into Row classification, and the unknown sample in the multiple malice sample is clustered;Recording unit is used for labeled bracketing or cluster Every group of sample afterwards, and record the behavioural information of every group of sample;Determination unit, for identical behavioural information to be determined as every group The common feature of malice sample.
Optionally, the grouped element includes: cutting subelement, for using K mean cluster algorithm according to unknown sample Object properties carry out cutting, wherein the object properties include: hash value, compilation time, feature string, file type, Import table Hash imphash, derivative list, wherein the feature string includes at least one of: program data library text Part PDB, domain name, IP address, uniform resource position mark URL, the derivative list include: for the file column in compressed file Table, for the non-transplantable structural information list for executing body PE class;Subelement is distributed, for calculating pair of each unknown sample As the distance between attribute value and each cluster centre, each unknown sample is distributed to apart from nearest cluster centre, wherein Each cluster centre is one group.
Optionally, the determination unit includes: lookup subelement, for being calculated by the eap-message digest in the behavioural information Method MD5 value reversely searches IP address;Determine subelement, the executing subject of each class behavior for will execute in the IP address It is determined as an attack source of APT attack.
Optionally, the generation module comprises determining that unit, for determining the common feature according to default correlation rule Contextual information;Recognition unit, for identifying at least one following information according to the contextual information: APT is organized Identity captures index IOC information, tactics technology program TTP information;Generation unit, for according to the information generate with The relevant threat information of the common feature.
Optionally, described device further include: mark module, for being generated in the generation module according to the common feature After advanced duration threatens the threat information of APT attack, the IP information of the malice sample is marked;Adding module, being used for will After the IP information is associated with the threat information, it is added and threatens in information bank.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any Combined form is located in different processors.
Embodiment 3
The embodiments of the present invention also provide a kind of storage medium, computer program is stored in the storage medium, wherein The computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
Optionally, in the present embodiment, above-mentioned storage medium can be set to store by executing based on following steps Calculation machine program:
S1, from the multiple malice samples of business system acquisition;
S2 carries out homogeneous assays to the multiple malice sample, determines the common feature of every group of malice sample;
S3 generates the threat information that advanced duration threatens APT attack according to the common feature.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read- Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard The various media that can store computer program such as disk, magnetic or disk.
The embodiments of the present invention also provide a kind of electronic device, including memory and processor, stored in the memory There is computer program, which is arranged to run computer program to execute the step in any of the above-described embodiment of the method Suddenly.
Optionally, above-mentioned electronic device can also include transmission device and input-output equipment, wherein the transmission device It is connected with above-mentioned processor, which connects with above-mentioned processor.
Optionally, in the present embodiment, above-mentioned processor can be set to execute following steps by computer program:
S1, from the multiple malice samples of business system acquisition;
S2 carries out homogeneous assays to the multiple malice sample, determines the common feature of every group of malice sample;
S3 generates the threat information that advanced duration threatens APT attack according to the common feature.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment Example, details are not described herein for the present embodiment.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
In above-described embodiment of the application, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the application whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered It is considered as the protection scope of the application.

Claims (10)

1. a kind of generation method for threatening information characterized by comprising
From the multiple malice samples of business system acquisition;
Homogeneous assays are carried out to the multiple malice sample, determine the common feature of every group of malice sample;
The threat information that advanced duration threatens APT attack is generated according to the common feature.
2. being determined the method according to claim 1, wherein carrying out homogeneous assays to the multiple malice sample The common feature of every group of malice sample, comprising:
Classify to the known sample in the multiple malice sample, and to the unknown sample in the multiple malice sample It is clustered;
Every group of sample after labeled bracketing or cluster, and record the behavioural information of every group of sample;
Identical behavioural information is determined as to the common feature of every group of malice sample.
3. according to the method described in claim 2, it is characterized in that, gathering to the unknown sample in the multiple malice sample Class includes:
Cutting is carried out according to the object properties of unknown sample using K mean cluster algorithm, wherein the object properties include: Hash value, feature string, file type, imports table Hash imphash, derivative list at compilation time, wherein the spy Levying character string includes at least one of: program data library file PDB, domain name, IP address, uniform resource position mark URL, described Derivative list includes: to arrange for the listed files in compressed file for the non-transplantable structural information for executing body PE class Table;
The object attribute values and the distance between each cluster centre for calculating each unknown sample, each unknown sample is distributed to Apart from nearest cluster centre, wherein each cluster centre is one group.
4. according to the method described in claim 2, it is characterized in that, identical behavioural information is determined as every group of malice sample Common feature includes:
IP address is reversely searched by the Message Digest 5 MD5 value in the behavioural information;
The executing subject of each class behavior executed in the IP address is determined as to an attack source of APT attack.
5. the method according to claim 1, wherein generating the threat feelings of APT attack according to the common feature Report includes:
The contextual information of the common feature is determined according to default correlation rule;
Identify at least one following information according to the contextual information: APT organizational identities capture index IOC information, war Art technical program TTP information;
Threat information relevant to the common feature is generated according to the information.
6. the method according to claim 1, wherein being threatened generating advanced duration according to the common feature After the threat information of APT attack, the method also includes:
Mark the IP information of the malice sample;
After the IP information is associated with the threat information, it is added and threatens in information bank.
7. a kind of generating means for threatening information characterized by comprising
Acquisition module is used for from the multiple malice samples of business system acquisition;
Analysis module determines the common feature of every group of malice sample for carrying out homogeneous assays to the multiple malice sample;
Generation module, for generating the threat information that advanced duration threatens APT attack according to the common feature.
8. device according to claim 7, which is characterized in that the analysis module includes:
Grouped element, for classifying to the known sample in the multiple malice sample, and to the multiple malice sample Unknown sample in this is clustered;
Recording unit for every group of sample after labeled bracketing or cluster, and records the behavioural information of every group of sample;
Determination unit, for identical behavioural information to be determined as to the common feature of every group of malice sample.
9. a kind of storage medium, which is characterized in that be stored with computer program in the storage medium, wherein the computer Program is arranged to perform claim when operation and requires method described in 1 to 6 any one.
10. a kind of electronic device, including memory and processor, which is characterized in that be stored with computer journey in the memory Sequence, the processor are arranged to run the computer program in method described in perform claim 1 to 6 any one of requirement.
CN201910345207.5A 2019-04-26 2019-04-26 Threaten the generation method and device, storage medium, electronic device of information Pending CN110198303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910345207.5A CN110198303A (en) 2019-04-26 2019-04-26 Threaten the generation method and device, storage medium, electronic device of information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910345207.5A CN110198303A (en) 2019-04-26 2019-04-26 Threaten the generation method and device, storage medium, electronic device of information

Publications (1)

Publication Number Publication Date
CN110198303A true CN110198303A (en) 2019-09-03

Family

ID=67752232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910345207.5A Pending CN110198303A (en) 2019-04-26 2019-04-26 Threaten the generation method and device, storage medium, electronic device of information

Country Status (1)

Country Link
CN (1) CN110198303A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691080A (en) * 2019-09-25 2020-01-14 光通天下网络科技股份有限公司 Automatic tracing method, device, equipment and medium
CN110955893A (en) * 2019-11-22 2020-04-03 杭州安恒信息技术股份有限公司 Malicious file threat analysis platform and malicious file threat analysis method
CN111988341A (en) * 2020-09-10 2020-11-24 奇安信科技集团股份有限公司 Data processing method, device, computer system and storage medium
CN112087465A (en) * 2020-09-17 2020-12-15 北京微步在线科技有限公司 Method and device for determining threat event based on aggregated information
CN112202759A (en) * 2020-09-28 2021-01-08 广州大学 APT attack identification and attribution method, system and storage medium based on homology analysis
CN112347474A (en) * 2020-11-06 2021-02-09 奇安信科技集团股份有限公司 Method, device, equipment and storage medium for constructing security threat information
CN113014375A (en) * 2021-03-04 2021-06-22 华控清交信息科技(北京)有限公司 Cross-organization processing method, related device and medium for network threat information
CN113839954A (en) * 2021-09-27 2021-12-24 杭州安恒信息技术股份有限公司 Method, device, equipment and storage medium for acquiring threat information
CN114238983A (en) * 2021-12-10 2022-03-25 安天科技集团股份有限公司 Threat analysis method, device, equipment and storage medium in confidential environment
CN115001868A (en) * 2022-08-01 2022-09-02 北京微步在线科技有限公司 APT attack homologous analysis method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030086541A1 (en) * 2001-10-23 2003-05-08 Brown Michael Kenneth Call classifier using automatic speech recognition to separately process speech and tones
CN104866765A (en) * 2015-06-03 2015-08-26 康绯 Behavior characteristic similarity-based malicious code homology analysis method
CN105721416A (en) * 2015-11-16 2016-06-29 哈尔滨安天科技股份有限公司 Apt event attack organization homology analysis method and apparatus
CN107169355A (en) * 2017-04-28 2017-09-15 北京理工大学 A kind of worm homology analysis method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030086541A1 (en) * 2001-10-23 2003-05-08 Brown Michael Kenneth Call classifier using automatic speech recognition to separately process speech and tones
CN104866765A (en) * 2015-06-03 2015-08-26 康绯 Behavior characteristic similarity-based malicious code homology analysis method
CN105721416A (en) * 2015-11-16 2016-06-29 哈尔滨安天科技股份有限公司 Apt event attack organization homology analysis method and apparatus
CN107169355A (en) * 2017-04-28 2017-09-15 北京理工大学 A kind of worm homology analysis method and apparatus

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691080A (en) * 2019-09-25 2020-01-14 光通天下网络科技股份有限公司 Automatic tracing method, device, equipment and medium
CN110691080B (en) * 2019-09-25 2022-06-14 光通天下网络科技股份有限公司 Automatic tracing method, device, equipment and medium
CN110955893A (en) * 2019-11-22 2020-04-03 杭州安恒信息技术股份有限公司 Malicious file threat analysis platform and malicious file threat analysis method
CN111988341A (en) * 2020-09-10 2020-11-24 奇安信科技集团股份有限公司 Data processing method, device, computer system and storage medium
CN112087465A (en) * 2020-09-17 2020-12-15 北京微步在线科技有限公司 Method and device for determining threat event based on aggregated information
CN112202759A (en) * 2020-09-28 2021-01-08 广州大学 APT attack identification and attribution method, system and storage medium based on homology analysis
CN112347474A (en) * 2020-11-06 2021-02-09 奇安信科技集团股份有限公司 Method, device, equipment and storage medium for constructing security threat information
CN113014375A (en) * 2021-03-04 2021-06-22 华控清交信息科技(北京)有限公司 Cross-organization processing method, related device and medium for network threat information
CN113839954A (en) * 2021-09-27 2021-12-24 杭州安恒信息技术股份有限公司 Method, device, equipment and storage medium for acquiring threat information
CN114238983A (en) * 2021-12-10 2022-03-25 安天科技集团股份有限公司 Threat analysis method, device, equipment and storage medium in confidential environment
CN115001868A (en) * 2022-08-01 2022-09-02 北京微步在线科技有限公司 APT attack homologous analysis method and device, electronic equipment and storage medium
CN115001868B (en) * 2022-08-01 2022-10-11 北京微步在线科技有限公司 APT attack homologous analysis method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110198303A (en) Threaten the generation method and device, storage medium, electronic device of information
US9628507B2 (en) Advanced persistent threat (APT) detection center
Ektefa et al. Intrusion detection using data mining techniques
CN110210213B (en) Method and device for filtering malicious sample, storage medium and electronic device
CN110188538A (en) Using the method and device of sandbox cluster detection data
CN110149319A (en) The method for tracing and device, storage medium, electronic device of APT tissue
CN104246786A (en) Field selection for pattern discovery
CN110149318B (en) Mail metadata processing method and device, storage medium and electronic device
CN108573146A (en) A kind of malice URL detection method and device
CN112738040A (en) Network security threat detection method, system and device based on DNS log
CN110519228B (en) Method and system for identifying malicious cloud robot in black-production scene
CN117081858B (en) Intrusion behavior detection method, system, equipment and medium based on multi-decision tree
CN115378619A (en) Sensitive data access method, electronic equipment and computer readable storage medium
CN117454376A (en) Industrial Internet data security detection response and tracing method and device
CN110188537B (en) Data separation storage method and device, storage medium and electronic device
CN110224975A (en) The determination method and device of APT information, storage medium, electronic device
Pangsuban et al. A real-time risk assessment for information system with cicids2017 dataset using machine learning
CN117041070A (en) Network space mapping node discovery and attribution judging method and device
CN117336033A (en) Traffic interception method and device, storage medium and electronic equipment
CN116886400A (en) Malicious domain name detection method, system and medium
CN115296892B (en) Data information service system
CN116227723A (en) Asset grading method and device based on feature engine, electronic equipment and medium
Protic et al. WK-FNN design for detection of anomalies in the computer network traffic
CN113037714A (en) Network security analysis method based on network big data and block chain financial cloud system
CN113572781A (en) Method for collecting network security threat information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100032 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant after: QAX Technology Group Inc.

Address before: 100032 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190903

RJ01 Rejection of invention patent application after publication