CN110445802A - Threat based on digital certificate finds model construction techniques - Google Patents

Threat based on digital certificate finds model construction techniques Download PDF

Info

Publication number
CN110445802A
CN110445802A CN201910759084.XA CN201910759084A CN110445802A CN 110445802 A CN110445802 A CN 110445802A CN 201910759084 A CN201910759084 A CN 201910759084A CN 110445802 A CN110445802 A CN 110445802A
Authority
CN
China
Prior art keywords
certificate
port
model construction
construction techniques
digital certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910759084.XA
Other languages
Chinese (zh)
Inventor
孙波
李应博
张伟
司成祥
张建松
李胜男
毛蔚轩
盖伟麟
王亿芳
胡晓旭
王梦禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201910759084.XA priority Critical patent/CN110445802A/en
Publication of CN110445802A publication Critical patent/CN110445802A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The present invention relates to network protection technical field, especially a kind of threat based on digital certificate finds model construction techniques, the steps include: that (1) detects the port at the specified end IP: the details of (1.1) acquisition port certificate;(1.2) the connection response time difference is obtained;(1.3) it obtains port and connects First page information;(1.4) other port informations are obtained;(2) analyze the data of acquisition: (2.1) analyze certificate;(2.2) homepage hyper linking amount is calculated;(2.3) the connection response time is analyzed;(2.4) size of data analysis is carried out for First page information;(2.5) corresponding other ports detected carry out screening analysis, and the present invention can construct suspicious fingerprint analysis model of stealing secret information, and realize specific aim monitoring and discovery to special scenes.

Description

Threat based on digital certificate finds model construction techniques
Technical field
The present invention relates to network protection technical field, specific field is a kind of threat discovery model structure based on digital certificate Build technology.
Background technique
In recent years, the network facilities and data of key unit, China organize attack to steal by espionage agency overseas and anti-communism hacker Close event takes place frequently, and overseas spy's tissue, can be light using a series of extremely advanced attacking ways such as APT attack, 0day loopholes Loose ground breaks through traditional network safety prevention facility, carries out attack to my important sensitive department and emphasis infrastructure, control, steals It is close, destroy, and network security response knows aftersensation, situation passive and vulnerable to attack after being always at, and lacks to high-level derived from overseas Attack timely respond to the ability with early warning in advance.
Summary of the invention
The threat based on digital certificate that the purpose of the present invention is to provide a kind of finds model construction techniques, existing to solve The problem of data safety is passively checked in technology.
To achieve the above object, the invention provides the following technical scheme: a kind of threat based on digital certificate finds model Constructing technology the steps include:
(1) port at the specified end IP is detected:
(1.1) details of port certificate are obtained;
(1.2) the connection response time difference is obtained;
(1.3) it obtains port and connects First page information;
(1.4) other port informations are obtained;
(2) data of acquisition are analyzed:
(2.1) certificate is analyzed;
(2.2) homepage hyper linking amount is calculated;
(2.3) the connection response time is analyzed;
(2.4) size of data analysis is carried out for First page information;
(2.5) corresponding other ports detected carry out screening analysis.
Preferably, the port in step (1.1) is 443 ports.
Preferably, the details of the certificate information of 443 ports, including the certificate acquisition time, certificate version, sequence number, Signature algorithm, signature hash algorithm, issuer, user, user's key identifier, authorization key identifier.
Preferably, response time difference is after https connection is established in step (1.2), and client sends http get and asks The time interval that server responds after asking.
Preferably, First page information includes server-side IP address, port numbers, ttl value, protocol type, geography in step (1.3) Position, operator, time, service type, application component.
Preferably, in step (2.1), modeling analysis, the certificate confirmed the validity, with existing card are carried out for information is obtained Stack room compare, and form the black, white of certificate, gray list,
The main confirmation method of black, white, the grey label of certificate are as follows:
White certificate: the normal website of legal entity or using certificate
Black certificate: wooden horse communicates the certificate used
Grey certificate: the expired certificate of non-black non-white certificate, loom structure.
Preferably, step (2.2) its specific method is to calculate homepage hyper linking amount, carries out feature judgement, screens 5 connections Measure IP below.
Preferably, its concrete analysis mode of step (2.3) is after https connection is established, and client sends http get The time interval that server responds after request, part wooden horse can be long to response time interval, the sound more than 1 minute or more Between seasonable, and general locator includes that common shodan is obtained less than homepage.
Preferably, step (2.4) homepage size analysis is that the homepage of general wooden horse did not included multi information, and normal use Or the page of website includes that content is more, general normal page is based on this, can sift out and be less than all more than 500K size The page of 500K is suspicious target.
Preferably, according to step (1.4) and step (2.5), the opening status of other ports is detected, other open ports IP may be normal target, then carry out port discarding, and filter out the IP for only opening 443 ports.
Compared with prior art, the beneficial effects of the present invention are: changing existing passive monitoring to actively discover, carry out and continue Monitoring obtains the data such as 443 port certificate informations, the homepage response message of Target IP, while carrying out to the target after screening complete Port depth detection obtains its system information.For acquisition data according to the novel attack occurred in current network Spatial Countermeasure Technology constructs suspicious fingerprint analysis model of stealing secret information, and realizes specific aim monitoring and discovery to special scenes.
Detailed description of the invention
Fig. 1 is detection analysis flow diagram of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of threat discovery model construction skill based on digital certificate Art the steps include:
(1) port at the specified end IP is detected:
(1.1) details of port certificate are obtained;
(1.2) the connection response time difference is obtained;
(1.3) it obtains port and connects First page information;
(1.4) other port informations are obtained;
(2) data of acquisition are analyzed:
(2.1) certificate is analyzed;
(2.2) homepage hyper linking amount is calculated;
(2.3) the connection response time is analyzed;
(2.4) size of data analysis is carried out for First page information;
(2.5) corresponding other ports detected carry out screening analysis.
Port in step (1.1) is 443 ports.
The details of the certificate information of 443 ports, including certificate acquisition time, certificate version, sequence number, signature calculation Method, signature hash algorithm, issuer, user, user's key identifier, authorization key identifier.
The details of the certificate information of 443 ports, including
The certificate acquisition time (timestamp),
Version (version), as V3,
Sequence number (serial_number), such as 00 a8,60 38 e5,04 78 3e 43,
Signature algorithm (signature_algorithm.name), as sha256RS,
It signs hash algorithm (signature_algorithm.oid), such as sha256, public key, such as RSA (2048Bits) Algorithm and digit,
Issuer (issuer_dn),
User (subject_dn),
User's key identifier, (extensions.subject_key_id),
Authorization key identifier (extensions.authority_key_id), i.e. issuer, time started validity period (validity.start) etc..
Response time difference is after https connection is established in step (1.2), and client takes after sending http get request The time interval of business device response.
First page information includes server-side IP address, port numbers, ttl value, protocol type, geographical location, fortune in step (1.3) Seek quotient, time, service type, application component.
First page information
Server-side IP address
Port numbers, such as 443
Ttl value
Protocol type, such as tcp, http, https
The information such as geographical location, including country, city, longitude and latitude
Operator
Time, including sweep time, addition time
Service type
Application component.
In step (2.1), for obtain information carry out modeling analysis, the certificate confirmed the validity, with existing certificate repository into Row comparison, forms the black, white of certificate, gray list,
The main confirmation method of black, white, the grey label of certificate are as follows:
White certificate: the normal website of legal entity or using certificate, mainly from mechanism, usage amount issued etc. tie up Degree is analyzed.
White certificate is mostly from the certificate issued in CA authoritative institution.
Usage amount: the website visiting amount counted according to www.alexa.cn, the certificate of ten thousand mechanism of amount of access top100 can base Originally it is confirmed as white certificate
Black certificate: wooden horse communicates the certificate used, and main source includes:
Sample analysis: by the sample of acquisition, the certificate that wooden horse or Botnet use is analyzed, black card is determined it as Book.
The certificate of the APT attack used Malware institute band of tissue.The APT that we persistently track attacking ways for many years is attacked Hit 50, tissue or more, comprising: TeleBots, TA554, Apt-c-06, Apt-c-27, TA505, Muddywater, APT32, BRONZE BUTLER, WhiteElephant, DustSquad, FruityArmor, Gallmaker etc..
Outside source: SSL blacklist (SSLBL) is the project safeguarded by abuse.ch, main to provide abuse.ch mark " bad " SSL certificate list known, these lists are associated with Malware or Botnet activity.SLBL provides malice SSL card The SHA1 fingerprint of book.
The Model On Relationship Analysis such as certificate of utility information, open-ended, the abnormal certificate determined.
Grey certificate: non-black non-white certificate can be grouped into grey certificate, need further to analyze.
At present mainly include the expired certificate of organization in grey certificate repository: CNNIC, T-Systems, Retired (expired) certificate that the mechanisms such as Symantec, google are issued.
Step (2.2) its specific method is to calculate homepage hyper linking amount, carries out feature judgement, screens 5 connection amounts or less IP, the number of links of general website or application is decidedly superior to this numerical value.
Its concrete analysis mode of step (2.3) is after https connection is established, and client is sent after http get request The time interval of server response, part wooden horse can be long to response time interval, the response time more than 1 minute or more, And general locator includes that common shodan is obtained less than homepage.
The analysis of step (2.4) homepage size is that the homepage of general wooden horse did not included multi information, and normal use or website The page include content it is more, general normal page all more than 500K size, be based on this, the page less than 500K can be sifted out Face is suspicious target.
According to step (1.4) and step (2.5), the opening status of other ports is detected, the IP of other open ports may For normal target, then port discarding is carried out, and filters out the IP for only opening 443 ports.
443 ports that target can be opened when wherein attacking by analyzing the related protocol attacked in U.S. discovery are counted According to agency transmission and control, wherein use HTTPS agreement.443 or 993 ports can be opened when by transfer for target HTTPS channel case carries out these IP to continue detection transmission probe data packet, receives target by obtaining network objectives IP The response data of return, carries out signature analysis and fingerprint comparison finds accurate information and made when extracting HTTPS encryption communication Digital certificate can effectively find controlled target.
The acquisition of depth scan and digital certificate to particular port, and the analysis for carrying out system to certificate format is extracted, Based on scanning and analyzing, result is carried out abnormality detection and clue is excavated.According to our analyses to some typical case's APT events, especially It is to carry out encryption communication using ssl tunneling, corresponding PORT COM is only swashing in some attacks in the APT attack to China It is just opened after work, after use 1 to a few houres, the end of transmission, corresponding port shutdown, every time there is centainly the certificate that uses in communication Variation, such as validity period, in time period, the working time is substantially secured to the local corresponding working time, separately It is also to belong to a kind of abnormal situation that agreement in outer ssl tunneling, which is the agreements such as non-common https,.In conjunction with port responses spy Sign, certificate characteristic etc., can accomplish the equipment to note abnormalities.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of threat based on digital certificate finds model construction techniques, it is characterised in that: the steps include:
(1) port at the specified end IP is detected:
(1.1) details of port certificate are obtained;
(1.2) the connection response time difference is obtained;
(1.3) it obtains port and connects First page information;
(1.4) other port informations are obtained;
(2) data of acquisition are analyzed:
(2.1) certificate is analyzed;
(2.2) homepage hyper linking amount is calculated;
(2.3) the connection response time is analyzed;
(2.4) size of data analysis is carried out for First page information;
(2.5) corresponding other ports detected carry out screening analysis.
2. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (1.1) port in is 443 ports.
3. the threat according to claim 2 based on digital certificate finds model construction techniques, it is characterised in that: 443 ends The details of the certificate information of mouth, including certificate acquisition time, certificate version, sequence number, signature algorithm, signature Hash calculation Method, issuer, user, user's key identifier, authorization key identifier.
4. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (1.2) in response time difference be https connection establish after, client send http get request after server response when Between be spaced.
5. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (1.3) First page information includes server-side IP address, port numbers, ttl value, protocol type, geographical location, operator, time, clothes in Service type, application component.
6. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (2.1) in, modeling analysis is carried out for information is obtained, the certificate confirmed the validity is compared with existing certificate repository, forms card The black, white of book, gray list,
The main confirmation method of black, white, the grey label of certificate are as follows:
White certificate: the normal website of legal entity or using certificate
Black certificate: wooden horse communicates the certificate used
Grey certificate: the expired certificate of non-black non-white certificate, loom structure.
7. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (2.2) its specific method is to calculate homepage hyper linking amount, carries out feature judgement, screens 5 connection amount IP below.
8. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (2.3) it is after https connection is established that it, which makes a concrete analysis of mode, and client sends what server after http get is requested responded Time interval, part wooden horse can be long to response time interval, the response time more than 1 minute or more, and general detection Program includes that common shodan is obtained less than homepage.
9. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: step (2.4) analysis of homepage size is that the homepage of general wooden horse did not included multi information, and the page of normal use or website includes interior Hold more, general normal page is based on this, can sift out the page less than 500K, to be suspicious all more than 500K size Target.
10. the threat according to claim 1 based on digital certificate finds model construction techniques, it is characterised in that: according to Step (1.4) and step (2.5) detect the opening status of other ports, and the IP of other open ports may be normal target, Port discarding is then carried out, and filters out the IP for only opening 443 ports.
CN201910759084.XA 2019-08-16 2019-08-16 Threat based on digital certificate finds model construction techniques Pending CN110445802A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910759084.XA CN110445802A (en) 2019-08-16 2019-08-16 Threat based on digital certificate finds model construction techniques

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910759084.XA CN110445802A (en) 2019-08-16 2019-08-16 Threat based on digital certificate finds model construction techniques

Publications (1)

Publication Number Publication Date
CN110445802A true CN110445802A (en) 2019-11-12

Family

ID=68436060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910759084.XA Pending CN110445802A (en) 2019-08-16 2019-08-16 Threat based on digital certificate finds model construction techniques

Country Status (1)

Country Link
CN (1) CN110445802A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141243A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Device and method for carrying out security check and content filtering on communication data
US20150007302A1 (en) * 2013-06-26 2015-01-01 Yoshinaga Kato Communication apparatus, communication system, and recording medium
US20150106889A1 (en) * 2013-10-13 2015-04-16 Skycure Ltd Potential attack detection based on dummy network traffic
CN104933362A (en) * 2015-06-15 2015-09-23 福州大学 Automatic detection method of API (Application Program Interface) misuse-type bug of Android application software
CN107623695A (en) * 2017-09-30 2018-01-23 亚数信息科技(上海)有限公司 HTTPS web page resources safety evaluation method and equipment
WO2018030289A1 (en) * 2016-08-08 2018-02-15 株式会社エヌティーアイ Ssl communication system, client, server, ssl communication method, and computer program
CN108769086A (en) * 2018-08-31 2018-11-06 连尚(新昌)网络科技有限公司 A kind of method and apparatus for detecting man-in-the-middle attack by user equipment
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN109413196A (en) * 2018-11-13 2019-03-01 四川长虹电器股份有限公司 A kind of method of intelligent Matching HTTPS access certificate
CN109450931A (en) * 2018-12-14 2019-03-08 北京知道创宇信息技术有限公司 A kind of secure internet connection method, apparatus and PnP device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141243A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Device and method for carrying out security check and content filtering on communication data
US20150007302A1 (en) * 2013-06-26 2015-01-01 Yoshinaga Kato Communication apparatus, communication system, and recording medium
US20150106889A1 (en) * 2013-10-13 2015-04-16 Skycure Ltd Potential attack detection based on dummy network traffic
CN104933362A (en) * 2015-06-15 2015-09-23 福州大学 Automatic detection method of API (Application Program Interface) misuse-type bug of Android application software
WO2018030289A1 (en) * 2016-08-08 2018-02-15 株式会社エヌティーアイ Ssl communication system, client, server, ssl communication method, and computer program
CN107623695A (en) * 2017-09-30 2018-01-23 亚数信息科技(上海)有限公司 HTTPS web page resources safety evaluation method and equipment
CN108768989A (en) * 2018-05-18 2018-11-06 刘勇 It is a kind of using the APT attack defense methods of mimicry technology, system
CN108769086A (en) * 2018-08-31 2018-11-06 连尚(新昌)网络科技有限公司 A kind of method and apparatus for detecting man-in-the-middle attack by user equipment
CN109413196A (en) * 2018-11-13 2019-03-01 四川长虹电器股份有限公司 A kind of method of intelligent Matching HTTPS access certificate
CN109450931A (en) * 2018-12-14 2019-03-08 北京知道创宇信息技术有限公司 A kind of secure internet connection method, apparatus and PnP device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴震等: "基于通信特征的APT攻击检测方法", 《计算机工程与应用》 *

Similar Documents

Publication Publication Date Title
Wang et al. Delving into internet DDoS attacks by botnets: characterization and analysis
CN107682331B (en) Block chain-based Internet of things identity authentication method
US9106695B2 (en) Method and system for user authentication using DNSSEC
CN106603519B (en) SSL/TLS encrypted malicious service discovery method based on certificate feature generalization and server transition behavior
KR101689299B1 (en) Automated verification method of security event and automated verification apparatus of security event
US20100235917A1 (en) System and method for detecting server vulnerability
US9203856B2 (en) Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network
Ahmed et al. ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
CN103155487A (en) Methods and systems for detecting suspected data leakage using traffic samples
Mangino et al. Internet-scale insecurity of consumer internet of things: An empirical measurements perspective
JP6524789B2 (en) Network monitoring method, network monitoring program and network monitoring device
KR101623068B1 (en) System for collecting and analyzing traffic on network
CN109474568A (en) For the detection method and system for realizing malicious attack using the preposition technology in domain
CN106982188B (en) Malicious propagation source detection method and device
US9661002B2 (en) Method for user authentication using DNSSEC
Xu et al. Secure the Internet, one home at a time
CN111478892A (en) Attacker portrait multi-dimensional analysis method based on browser fingerprints
Tsow et al. Warkitting: the drive-by subversion of wireless home routers
CN106790073B (en) Blocking method and device for malicious attack of Web server and firewall
KR20110029340A (en) Protection system against ddos
KR20070072835A (en) Web hacking responses through real time web log collection
CN110445802A (en) Threat based on digital certificate finds model construction techniques
US11789743B2 (en) Host operating system identification using transport layer probe metadata and machine learning
Volarević et al. Network forensics
Asaka et al. Local attack detection and intrusion route tracing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112

RJ01 Rejection of invention patent application after publication