CN111371766A - Log-based firewall policy management method and system - Google Patents

Log-based firewall policy management method and system Download PDF

Info

Publication number
CN111371766A
CN111371766A CN202010122332.2A CN202010122332A CN111371766A CN 111371766 A CN111371766 A CN 111371766A CN 202010122332 A CN202010122332 A CN 202010122332A CN 111371766 A CN111371766 A CN 111371766A
Authority
CN
China
Prior art keywords
log
firewall
firewall policy
equipment
policy management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010122332.2A
Other languages
Chinese (zh)
Inventor
黄嘉诚
莫峰
蔡悦贞
戴宏鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Fufu Information Technology Co Ltd
Original Assignee
China Telecom Fufu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Fufu Information Technology Co Ltd filed Critical China Telecom Fufu Information Technology Co Ltd
Priority to CN202010122332.2A priority Critical patent/CN111371766A/en
Publication of CN111371766A publication Critical patent/CN111371766A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a log-based firewall policy management method and a log-based firewall policy management system. The method reduces the complexity of firewall policy management, realizes incremental updating of firewall policy data by butting firewall rsyslog logs of different types, and visually checks effective policies of firewall equipment. The invention is suitable for scenes with various different types of firewalls, is convenient to use, can meet business requirements by butting the user with the acquisition module and transmitting the rsyslog to the acquisition module, can update the strategy reflecting the actual use in the firewall in real time, and is convenient to manage.

Description

Log-based firewall policy management method and system
Technical Field
The invention relates to the technical field of internet, in particular to a log-based firewall policy management method and a log-based firewall policy management system.
Background
The firewall is a barrier for protecting the internal and external networks under the condition of combining hardware and software, thereby realizing the blocking of unsafe network factors of the computer. The firewall detects the data packet according to the corresponding strategy, intercepts the illegal data packet and realizes the safety protection of the network. With the development of the internet, the network scale is continuously enlarged, and the types of firewalls are continuously increasing, such as disp, H3C, huashi, natural trust, cisco and so on. In actual use, a firewall policy corresponding to the firewall is configured, but only increased operation is often performed in the configuration process; after a certain time, the firewall strategies are huge, and the search of the corresponding strategies from the huge strategies is very difficult due to the addition of various different types of firewalls; such as: the checking process is particularly troublesome when the user wants to find out whether the port is blocked by the firewall policy.
Disclosure of Invention
The invention aims to provide a log-based firewall policy management method and a log-based firewall policy management system, which aim at various types of firewalls and various firewall policies and perform centralized management and verification on the firewall policies through firewall logs.
The technical scheme adopted by the invention is as follows:
a log-based firewall policy management method comprises the following steps:
step 1, butting firewall equipment and acquisition equipment, and outputting a corresponding firewall log to the acquisition equipment;
step 2, the collection equipment transmits the log to a data cleaning module;
step 3, the data cleaning module preliminarily analyzes the log and distinguishes different firewall equipment types;
step 4, filtering the pass logs and the blocking logs corresponding to different actions according to the firewall equipment types, and matching corresponding analysis rules;
step 5, analyzing access record data from the pass log and the blocking log according to the matched analysis rule;
and 6, the firewall policy management module verifies the validity of the firewall policy based on the access record data and manages the firewall policy to the firewall policy table for management.
Further, in step 2, the data cleaning module judges the firewall device type corresponding to the log by analyzing the device to which the log belongs, the log behavior, the level and the action information.
Further, the access record data in step 5 includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction, and device type data.
Further, in step 6, based on the validity of the firewall policy verified by the access record data, access policies for different access directions and different source and destination addresses of different protocols are formed and then managed in the firewall policy table.
Furthermore, the invention also discloses a log-based firewall policy management system, which adopts the log-based firewall policy management method and is characterized in that: the system comprises the following devices:
the acquisition equipment: the firewall equipment is in butt joint with rsyslog logs, and the rsyslog logs are output to the data cleaning module;
a data cleaning module: analyzing the rsyslog to judge the type of the firewall, and analyzing access record data from the pass log and the blocking log;
firewall policy management module: and verifying the validity of the firewall policy through the pass log and the blocking log of the firewall, and managing the firewall policy into a firewall policy table for management.
Furthermore, the acquisition equipment is compatible with various different types of firewall equipment.
Further, the data cleaning module judges the firewall device type corresponding to the log by analyzing the device to which the log belongs, the log behavior, the level and the action information.
Further, the access record data includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction, and device type data.
Furthermore, the firewall policy management module verifies the validity of the firewall policy based on the access record data, forms access policies for different access directions and different source and destination addresses of different protocols, and manages the access policies to the firewall policy table for management.
According to the technical scheme, the acquisition module with high compatibility is selected and is in butt joint with different types of firewall equipment, and firewall strategies are verified and managed in a centralized mode through rsyslog logs. The method reduces the complexity of firewall policy management, realizes incremental updating of firewall policy data by butting firewall rsyslog logs of different types, and visually checks effective policies of firewall equipment. The invention is suitable for scenes with various types of firewalls, is convenient to use, and can meet business requirements by butt-jointing the user with the acquisition module and transmitting the rsyslog to the acquisition module. The invention can ensure the centralized display of the strategies of different firewall equipment and ensure the intuitiveness and the effectiveness of the strategies.
Drawings
The invention is described in further detail below with reference to the accompanying drawings and the detailed description;
fig. 1 is a schematic structural diagram of a log-based firewall policy management system according to the present invention.
Detailed Description
As shown in fig. 1, the present invention discloses a log-based firewall policy management method, which comprises the following steps:
step 1, butting firewall equipment and acquisition equipment, and outputting a corresponding firewall log to the acquisition equipment;
step 2, the collection equipment transmits the log to a data cleaning module;
step 3, the data cleaning module preliminarily analyzes the log and distinguishes different firewall equipment types;
step 4, filtering the pass logs and the blocking logs corresponding to different actions according to the firewall equipment types, and matching corresponding analysis rules;
step 5, analyzing access record data from the pass log and the blocking log according to the matched analysis rule;
and 6, the firewall policy management module verifies the validity of the firewall policy based on the access record data and manages the firewall policy to the firewall policy table for management.
Further, in step 2, the data cleaning module judges the firewall device type corresponding to the log by analyzing the device to which the log belongs, the log behavior, the level and the action information.
Further, the access record data in step 5 includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction, and device type data.
Further, in step 6, based on the validity of the firewall policy verified by the access record data, access policies for different access directions and different source and destination addresses of different protocols are formed and then managed in the firewall policy table.
Furthermore, the invention also discloses a log-based firewall policy management system, which adopts the log-based firewall policy management method and is characterized in that: the system comprises the following devices:
the acquisition equipment: the firewall equipment is in butt joint with rsyslog logs, and the rsyslog logs are output to the data cleaning module;
a data cleaning module: analyzing the rsyslog to judge the type of the firewall, and analyzing access record data from the pass log and the blocking log;
firewall policy management module: and verifying the validity of the firewall policy through the pass log and the blocking log of the firewall, and managing the firewall policy into a firewall policy table for management.
Furthermore, the acquisition equipment is compatible with various different types of firewall equipment.
Further, the data cleaning module judges the firewall device type corresponding to the log by analyzing the device to which the log belongs, the log behavior, the level and the action information.
Further, the access record data includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction, and device type data.
Furthermore, the firewall policy management module verifies the validity of the firewall policy based on the access record data, forms access policies for different access directions and different source and destination addresses of different protocols, and manages the access policies to the firewall policy table for management.
By adopting the technical scheme, the acquisition module with high compatibility is selected to be in butt joint with different types of firewall equipment, the firewall strategy is verified and managed in a centralized way through the rsyslog log, and a separate interface is not needed for butt joint. The method reduces the complexity of firewall policy management, realizes incremental updating of firewall policy data by butting firewall rsyslog logs of different types, and visually checks effective policies of firewall equipment. The invention is suitable for scenes with various different types of firewalls, is convenient to use, can meet business requirements by butting the user with the acquisition module and transmitting the rsyslog to the acquisition module, can update the strategy reflecting the actual use in the firewall in real time, and is convenient to manage. The invention can ensure the centralized display of the strategies of different firewall equipment and ensure the intuitiveness and the effectiveness of the strategies.

Claims (9)

1. A log-based firewall policy management method is characterized in that: which comprises the following steps:
step 1, butting firewall equipment and acquisition equipment, and outputting a corresponding firewall log to the acquisition equipment;
step 2, the collection equipment transmits the log to a data cleaning module,
step 3, the data cleaning module preliminarily analyzes the log and distinguishes different firewall equipment types;
step 4, filtering the pass logs and the blocking logs corresponding to different actions according to the firewall equipment types, and matching corresponding analysis rules;
step 5, analyzing the access record data from the pass log and the blocking log according to the matched analysis rule,
and 6, the firewall policy management module verifies the validity of the firewall policy based on the access record data and manages the firewall policy to the firewall policy table for management.
2. The log-based firewall policy management method according to claim 1, wherein: and in the step 2, the data cleaning module judges the firewall equipment type corresponding to the log by analyzing the equipment to which the log belongs, the log behavior, the grade and the action information.
3. The log-based firewall policy management method according to claim 1, wherein: the access record data in step 5 includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction and device type data.
4. The log-based firewall policy management method according to claim 1, wherein: and 6, verifying the validity of the firewall policy based on the access record data to form access policies aiming at different access directions and different source and destination addresses of different protocols, and managing the access policies into a firewall policy table.
5. A log-based firewall policy management system, which employs the log-based firewall policy management method of any one of claims 1 to 4, characterized in that: the system comprises the following devices:
the acquisition equipment: the firewall equipment is in butt joint with rsyslog logs, and the rsyslog logs are output to the data cleaning module;
a data cleaning module: analyzing the rsyslog to judge the type of the firewall, and analyzing access record data from the pass log and the blocking log;
firewall policy management module: and verifying the validity of the firewall policy through the pass log and the blocking log of the firewall, and managing the firewall policy into a firewall policy table for management.
6. The log-based firewall policy management system according to claim 5, wherein: the acquisition equipment is compatible with various different types of firewall equipment.
7. The log-based firewall policy management system according to claim 5, wherein: and the data cleaning module judges the firewall equipment type corresponding to the log by analyzing the equipment to which the log belongs, the log behavior, the log grade and the action information.
8. The log-based firewall policy management system according to claim 5, wherein: the access record data includes corresponding protocol type, source IP, source port, destination IP, destination port, access direction and device type data.
9. The log-based firewall policy management method according to claim 5, wherein: the firewall policy management module verifies the validity of the firewall policy based on the access record data, forms access policies aiming at different access directions and different source and destination addresses of different protocols and then manages the access policies into the firewall policy table for management.
CN202010122332.2A 2020-02-27 2020-02-27 Log-based firewall policy management method and system Pending CN111371766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010122332.2A CN111371766A (en) 2020-02-27 2020-02-27 Log-based firewall policy management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010122332.2A CN111371766A (en) 2020-02-27 2020-02-27 Log-based firewall policy management method and system

Publications (1)

Publication Number Publication Date
CN111371766A true CN111371766A (en) 2020-07-03

Family

ID=71212616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010122332.2A Pending CN111371766A (en) 2020-02-27 2020-02-27 Log-based firewall policy management method and system

Country Status (1)

Country Link
CN (1) CN111371766A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019546A (en) * 2020-08-28 2020-12-01 杭州安恒信息技术股份有限公司 Protection strategy adjusting method, system, equipment and computer storage medium
CN112583788A (en) * 2020-11-03 2021-03-30 惠州市德赛西威智能交通技术研究院有限公司 Intelligent generation method and system for vehicle-mounted firewall strategy
CN115150166A (en) * 2022-06-30 2022-10-04 广东电网有限责任公司 Log collection and analysis management system
CN115174219A (en) * 2022-07-06 2022-10-11 哈尔滨工业大学(威海) Management system capable of adapting to multiple industrial firewalls

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327211A1 (en) * 2000-12-01 2002-06-01 Nortel Networks Limited Management of log archival and reporting for data network security systems
CN103577307A (en) * 2013-11-07 2014-02-12 浙江中烟工业有限责任公司 Method for automatically extracting and analyzing firewall logs based on XML rule model
US20140164595A1 (en) * 2012-12-11 2014-06-12 International Business Machines Corporation Firewall event reduction for rule use counting
US20150163199A1 (en) * 2012-04-30 2015-06-11 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
CN108429774A (en) * 2018-06-21 2018-08-21 蔡梦臣 A kind of firewall policy centralized optimization management method and its system
CN108933791A (en) * 2018-07-09 2018-12-04 国网山东省电力公司信息通信公司 One kind being based on Electricity Information Network Safeguard tactics intelligent optimization method and device
CN110287163A (en) * 2019-06-25 2019-09-27 浙江乾冠信息安全研究院有限公司 Security log acquires analytic method, device, equipment and medium
US20190364072A1 (en) * 2018-05-22 2019-11-28 Appviewx Inc. System for monitoring and managing firewall devices and firewall management platforms

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327211A1 (en) * 2000-12-01 2002-06-01 Nortel Networks Limited Management of log archival and reporting for data network security systems
US20150163199A1 (en) * 2012-04-30 2015-06-11 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
US20140164595A1 (en) * 2012-12-11 2014-06-12 International Business Machines Corporation Firewall event reduction for rule use counting
CN103577307A (en) * 2013-11-07 2014-02-12 浙江中烟工业有限责任公司 Method for automatically extracting and analyzing firewall logs based on XML rule model
US20190364072A1 (en) * 2018-05-22 2019-11-28 Appviewx Inc. System for monitoring and managing firewall devices and firewall management platforms
CN108429774A (en) * 2018-06-21 2018-08-21 蔡梦臣 A kind of firewall policy centralized optimization management method and its system
CN108933791A (en) * 2018-07-09 2018-12-04 国网山东省电力公司信息通信公司 One kind being based on Electricity Information Network Safeguard tactics intelligent optimization method and device
CN110287163A (en) * 2019-06-25 2019-09-27 浙江乾冠信息安全研究院有限公司 Security log acquires analytic method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张俊林: "基于日志分析的网络管理与安全审计系统", 《硅谷》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019546A (en) * 2020-08-28 2020-12-01 杭州安恒信息技术股份有限公司 Protection strategy adjusting method, system, equipment and computer storage medium
CN112019546B (en) * 2020-08-28 2022-11-25 杭州安恒信息技术股份有限公司 Protection strategy adjusting method, system, equipment and computer storage medium
CN112583788A (en) * 2020-11-03 2021-03-30 惠州市德赛西威智能交通技术研究院有限公司 Intelligent generation method and system for vehicle-mounted firewall strategy
CN115150166A (en) * 2022-06-30 2022-10-04 广东电网有限责任公司 Log collection and analysis management system
CN115150166B (en) * 2022-06-30 2024-03-12 广东电网有限责任公司 Log collection and analysis management system
CN115174219A (en) * 2022-07-06 2022-10-11 哈尔滨工业大学(威海) Management system capable of adapting to multiple industrial firewalls
CN115174219B (en) * 2022-07-06 2024-04-19 哈尔滨工业大学(威海) Management system capable of adapting to various industrial firewalls

Similar Documents

Publication Publication Date Title
CN111371766A (en) Log-based firewall policy management method and system
JP3968724B2 (en) Network security system and operation method thereof
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
US7464407B2 (en) Attack defending system and attack defending method
CN107872456A (en) Network intrusion prevention method, apparatus, system and computer-readable recording medium
KR102033169B1 (en) intelligence type security log analysis method
CN104468632A (en) Loophole attack prevention method, device and system
CN112347485B (en) Processing method for acquiring loopholes and automatically penetrating multiple engines
CN110362992B (en) Method and apparatus for blocking or detecting computer attacks in cloud-based environment
US8548998B2 (en) Methods and systems for securing and protecting repositories and directories
CN104158767B (en) A kind of network admittance device and method
CN105847300B (en) The method for visualizing and device of enterprise network boundary device topology
CN112261144A (en) Novel cross-network data exchange mode and communication method
EP1241849A2 (en) Method of and apparatus for filtering access, and computer product
CN114553537A (en) Abnormal flow monitoring method and system for industrial Internet
Fovino et al. Through the description of attacks: A multidimensional view
CN1326365C (en) Worm blocking system and method using hardware-based pattern matching
Fry et al. Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
KR102494831B1 (en) Network intrusion detection system for information processing system of nuclear power plants
CN115776517A (en) Service request processing method and device, storage medium and electronic equipment
KR20070061017A (en) Apparatus and method for blocking attack into web-application
Lekkas et al. Handling and reporting security advisories: A scorecard approach
Moraes Cisco Firewalls: Concepts, Design and Deployment for Cisco Stateful Firewall Solutions
KR101498647B1 (en) Security Management System And Security Management Method Using The Same
CN115102725B (en) Security audit method, device and medium for industrial robot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200703

RJ01 Rejection of invention patent application after publication