CN111885040A - Distributed network situation perception method, system, server and node equipment - Google Patents

Distributed network situation perception method, system, server and node equipment Download PDF

Info

Publication number
CN111885040A
CN111885040A CN202010694100.4A CN202010694100A CN111885040A CN 111885040 A CN111885040 A CN 111885040A CN 202010694100 A CN202010694100 A CN 202010694100A CN 111885040 A CN111885040 A CN 111885040A
Authority
CN
China
Prior art keywords
network
security
data
threat
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010694100.4A
Other languages
Chinese (zh)
Inventor
胡浩
刘玉岭
张玉臣
汪永伟
李炳龙
刘璟
董书琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
PLA Information Engineering University
Original Assignee
Institute of Information Engineering of CAS
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS, PLA Information Engineering University filed Critical Institute of Information Engineering of CAS
Priority to CN202010694100.4A priority Critical patent/CN111885040A/en
Publication of CN111885040A publication Critical patent/CN111885040A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明属于网络安全技术领域,特别涉及一种分布式网络态势感知方法、系统、服务器及节点设备,该方法包含:针对网络节点安全数据源,通过调用HADOOP接口利用MapReduce模型进行数据融合,获取当前时间段内的安全事件;通过量化安全事件威胁风险进行网络安全态势评估;依据量化过程中识别的攻击阶段并结合网络攻击图,对安全态势进行预测,以获取攻击意图。本发明将系统中需要巨大计算能力的计算和存储扩展到HADOOP集群中的各个节点上,利用集群的并行计算和存储能力来运算和处理,并利用MapReduce实现并行计算,可以实现面向大规模数据的分布式网络安全态势感知,优化网络安全态势感知存储规模与时效,提升对诸如APT攻击等隐蔽、协同、大规模和多阶段攻击的感知防护能力。

Figure 202010694100

The invention belongs to the technical field of network security, and in particular relates to a distributed network situational awareness method, system, server and node device. The method includes: for network node security data sources, by invoking a HADOOP interface and using a MapReduce model for data fusion, obtaining current Security events within a time period; network security situation assessment by quantifying the threat risk of security events; based on the attack stages identified in the quantification process and combined with the network attack map, the security situation is predicted to obtain attack intentions. The invention expands the computing and storage that requires huge computing power in the system to each node in the HADOOP cluster, utilizes the parallel computing and storage capabilities of the cluster for computing and processing, and uses MapReduce to realize parallel computing, which can realize large-scale data-oriented computing and processing. Distributed network security situational awareness, optimize the storage scale and timeliness of network security situational awareness, and improve the perception and protection capabilities of covert, coordinated, large-scale and multi-stage attacks such as APT attacks.

Figure 202010694100

Description

分布式网络态势感知方法、系统、服务器及节点设备Distributed network situational awareness method, system, server and node device

技术领域technical field

本发明属于网络安全技术领域,特别涉及一种分布式网络态势感知方法、系统、服务器及节点设备。The invention belongs to the technical field of network security, and in particular relates to a distributed network situational awareness method, system, server and node device.

背景技术Background technique

随着信息技术的迅猛发展,网络空间安全面临的攻击与威胁日益增多,而传统安全产品越来越无法满足防护需求。网络安全态势感知技术作为一种新的防护手段,是在复杂多变的网络环境中认知、理解并预测网络的安全状态及其发展趋势,有助于管理人员及时掌握网络安全状况,并对未来可能出现的威胁提前做出防护。为全面、准确、实时地实现对网络安全态势的感知。美国空军通信与信息中心的Tim Bass于1999年首次提出网络态势感知的概念,并指出该技术将成为下一代网络防御研究的重点。经过十多年的发展,网络安全态势感知已经取得了许多成果。With the rapid development of information technology, cyberspace security faces more and more attacks and threats, and traditional security products are increasingly unable to meet the protection needs. As a new protection method, network security situational awareness technology is to recognize, understand and predict the security status and development trend of the network in the complex and changeable network environment, which helps managers to grasp the network security status in a timely manner, and respond to the situation of network security in a timely manner. Threats that may arise in the future are protected in advance. In order to realize the awareness of the network security situation in a comprehensive, accurate and real-time manner. Tim Bass of the U.S. Air Force Communications and Information Center first proposed the concept of network situational awareness in 1999, and pointed out that the technology will be the focus of next-generation network defense research. After more than ten years of development, network security situational awareness has achieved many results.

目前已有大量的研究工作致力于网络安全态势感知,但是其主要面向于单步、简单攻击,以网络安全传感器为数据源,采用层次化的分析方式进行态势感知,导致其无法准确反映新型APT攻击、勒索攻击等逐渐呈现出的大规模、协同、隐蔽和多阶段等特点。如何从海量、复杂、多源异构的网络安全日志和流量中识别潜在的APT攻击,挖掘非线性的攻击特征,需要具有大规模运算能力的服务器集群做支撑。APT攻击的特点、现有大规模数据网络和网络多节点设备集成需要复杂的数据运算处理,均给网络安全态势感知和防护带来了诸多挑战性的问题。At present, a large amount of research work has been devoted to network security situational awareness, but it is mainly oriented to single-step and simple attacks. It uses network security sensors as data sources and adopts a hierarchical analysis method for situational awareness, which makes it unable to accurately reflect the new APT. Attacks, ransomware attacks, etc. gradually show the characteristics of large-scale, coordinated, covert and multi-stage. How to identify potential APT attacks from massive, complex, multi-source heterogeneous network security logs and traffic, and mine nonlinear attack characteristics, requires server clusters with large-scale computing capabilities. The characteristics of APT attacks and the complex data computing and processing required for the integration of existing large-scale data networks and network multi-node devices have brought many challenging problems to network security situational awareness and protection.

发明内容SUMMARY OF THE INVENTION

为此,本发明提供一种分布式网络态势感知方法、系统、服务器及节点设备,利用HADOOP 实现分布式网络安全态势感知,优化网络安全态势感知的存储规模与时效性,提升对诸如APT 攻击等隐蔽、协同、大规模和多阶段攻击的感知防护能力,以准确、及时感知网络攻击动作,保障网络安全和可靠稳定性。To this end, the present invention provides a distributed network situational awareness method, system, server and node device, using HADOOP to realize distributed network security situational awareness, optimize the storage scale and timeliness of network security situational awareness, and improve protection against attacks such as APT. The perception and protection capability of covert, coordinated, large-scale and multi-stage attacks can accurately and timely perceive network attack actions to ensure network security and reliability.

按照本发明所提供的设计方案,一种分布式网络态势感知方法,包含如下内容:According to the design scheme provided by the present invention, a distributed network situational awareness method includes the following contents:

针对网络节点安全数据源,通过调用HADOOP接口利用MapReduce模型进行数据融合,获取当前时间段内的安全事件;For network node security data sources, by calling the HADOOP interface, the MapReduce model is used for data fusion to obtain security events in the current time period;

通过量化安全事件威胁风险进行网络安全态势评估;依据量化过程中识别的攻击阶段并结合网络攻击图,对安全态势进行预测,以获取攻击意图。The network security situation is assessed by quantifying the threat risk of security events; based on the attack stages identified in the quantification process and combined with the network attack map, the security situation is predicted to obtain the attack intent.

作为本发明分布式网络态势感知方法,进一步地,安全数据源包含攻防双方数据及网络环境数据,其中,攻击方包含原子攻击动作信息;防御方包含网络防护策略及安全配置信息;网络环境数据包含主机、服务器和终端设备信息,网络连通性信息及网络漏洞扫描信息。As the distributed network situational awareness method of the present invention, further, the security data source includes both attack and defense data and network environment data, wherein the attacker includes atomic attack action information; the defender includes network protection strategy and security configuration information; the network environment data includes Host, server and terminal device information, network connectivity information and network vulnerability scanning information.

作为本发明分布式网络态势感知方法,进一步地,针对安全数据源,首先对其进行预处理,通过设置过滤规则,剔除不规范数据,通过XML公共数据模型进行数据格式化处理,得到统一格式的XML文件。As the distributed network situational awareness method of the present invention, further, for the security data source, first preprocess it, set filtering rules, eliminate irregular data, and perform data formatting processing through the XML public data model to obtain a unified format of data. XML file.

作为本发明分布式网络态势感知方法,进一步地,在数据集成服务器上调用HADOOP 接口,在HADOOP中完成XML文件聚类的运算处理和存储,聚类结束后将结果回传至数据集成服务器,在数据集成服务器中进行数据融合,得到当前时间段的安全事件。As the distributed network situational awareness method of the present invention, further, call the HADOOP interface on the data integration server, complete the operation processing and storage of XML file clustering in HADOOP, and return the result to the data integration server after the clustering is completed. Data fusion is performed in the data integration server to obtain the security events of the current time period.

作为本发明分布式网络态势感知方法,进一步地,量化安全事件威胁风险,按网络体系规模和层次关系,将该量化分为系统层、主机层和服务层;根据网络系统组织结构,采取自下而上先局部后整体的评估策略。As the distributed network situational awareness method of the present invention, further, the threat risk of security events is quantified, and the quantification is divided into system layer, host layer and service layer according to the scale and hierarchical relationship of the network system; On the other hand, the evaluation strategy is based on the local first and then the whole.

作为本发明分布式网络态势感知方法,进一步地,自下而上先局部后整体的评估策略,包含如下内容:以安全事件为线索,结合网络资源耗用,获取各个主机所提供服务的威胁情况,统计分析安全事件的严重程度、发生次数以及网络带宽占用率,评估各项服务的安全威胁状况;综合评估网络系统中各主机的安全状况;根据网络系统结构评估整个局域网系统的安全威胁态势。As the distributed network situational awareness method of the present invention, further, the bottom-up evaluation strategy of the part and then the whole includes the following content: taking the security event as a clue and combining the consumption of network resources to obtain the threat situation of the services provided by each host , Statistically analyze the severity, frequency and network bandwidth occupancy rate of security events, evaluate the security threat status of each service; comprehensively evaluate the security status of each host in the network system; evaluate the security threat status of the entire LAN system according to the network system structure.

作为本发明分布式网络态势感知方法,进一步地,通过给定时间段内服务攻击严重程度、发生攻击次数、网络带宽占用率及APT攻击威胁等级向量获取服务威胁指数;通过主机的服务安全威胁向量、服务在主机所有服务中心所占权重向量及服务威胁指数来获取给定时间段内主机威胁指数;通过主机威胁指数和主机在待评估局域网中所占重要性权重得到给定时间段内网络系统局域网的威胁指数。As the distributed network situational awareness method of the present invention, further, the service threat index is obtained through the service attack severity, the number of attacks, the network bandwidth occupancy rate and the APT attack threat level vector within a given time period; 、The weight vector of the service in all service centers of the host and the service threat index are used to obtain the host threat index within a given time period; the network system within a given time period is obtained through the host threat index and the importance weight of the host in the LAN to be evaluated. LAN threat index.

进一步地,本发明还提供一种分布式网络态势感知系统,包含:数据集成服务器、HADOOP平台及与两者连接的态势感知可视化服务器,其中,Further, the present invention also provides a distributed network situational awareness system, comprising: a data integration server, a HADOOP platform, and a situational awareness visualization server connected to the two, wherein,

数据集成服务器,用于获取网络各节点安全数据源,并通过调用HADOOP接口利用HADOOP平台中的MapReduce模型进行数据融合,获取当前时间段内的安全事件;The data integration server is used to obtain the security data sources of each node of the network, and uses the MapReduce model in the HADOOP platform to perform data fusion by calling the HADOOP interface to obtain security events in the current time period;

态势感知可视化服务器,用于调用数据集成服务器与HADOOP平台上的安全数据,量化安全事件威胁风险,对当前态势进行预测并图形化展示。The situational awareness visualization server is used to call the data integration server and the security data on the HADOOP platform, quantify the threat risk of security incidents, predict the current situation and display it graphically.

本发明的有益效果:Beneficial effects of the present invention:

本发明通过建立网络安全态势感知框架,通过HADOOP平台对原始安全数据进行数据融合处理,进而完成网络安全态势评估和预测;将系统中需要巨大计算能力的计算和存储扩展到HADOOP集群中的各个节点上,利用集群的并行计算和存储能力来运算和处理;通过使用 HADOOP平台中HDFS存储文件和数据并利用MapReduce实现并行计算,可以实现面向大规模数据的分布式网络安全态势感知,优化网络安全态势感知存储规模与时效,提升对诸如APT 攻击等隐蔽、协同、大规模和多阶段攻击的感知防护能力。The invention establishes a network security situational awareness framework, performs data fusion processing on the original security data through the HADOOP platform, and then completes the network security situation assessment and prediction; the computing and storage that require huge computing power in the system are extended to each node in the HADOOP cluster On the other hand, the parallel computing and storage capabilities of the cluster are used for computing and processing; by using HDFS in the HADOOP platform to store files and data and using MapReduce to realize parallel computing, distributed network security situation awareness for large-scale data can be realized, and network security situation can be optimized. Perceive the storage scale and timeliness, and improve the perception and protection capabilities of covert, coordinated, large-scale and multi-stage attacks such as APT attacks.

附图说明:Description of drawings:

图1为实施例中分布式网络态势感知方法流程示意图;1 is a schematic flowchart of a distributed network situational awareness method in an embodiment;

图2为实施例中分布式态势感知框架示意图;2 is a schematic diagram of a distributed situational awareness framework in an embodiment;

图3为实施例中分布式态势存储HDFS结构示意图;FIG. 3 is a schematic diagram of the HDFS structure of distributed situation storage in the embodiment;

图4为实施例中分布式态势MapReduce框架示意图;4 is a schematic diagram of a distributed situation MapReduce framework in an embodiment;

图5为实施例中分布式态势感知系统工作原理示意图;5 is a schematic diagram of the working principle of the distributed situational awareness system in the embodiment;

图6为实施例中分布式态势感知系统框架示意图;6 is a schematic diagram of a distributed situational awareness system framework in an embodiment;

图7为实施例中分布式态势感知系统工作流程示意图;7 is a schematic diagram of the workflow of the distributed situational awareness system in the embodiment;

图8为实施例中网络拓扑结构示意图;8 is a schematic diagram of a network topology in an embodiment;

图9为实施例中网络安全态势可视化展示示意图;FIG. 9 is a schematic diagram showing the visualization of the network security situation in the embodiment;

图10为实施例中实时攻击场景展示示意图;10 is a schematic diagram showing a real-time attack scenario in an embodiment;

图11为实施例中实时告警信息展示示意图。FIG. 11 is a schematic diagram of displaying real-time alarm information in an embodiment.

具体实施方式:Detailed ways:

为使本发明的目的、技术方案和优点更加清楚、明白,下面结合附图和技术方案对本发明作进一步详细的说明。In order to make the objectives, technical solutions and advantages of the present invention clearer and more comprehensible, the present invention will be described in further detail below with reference to the accompanying drawings and technical solutions.

HADOOP是一个能在大量集群计算机中进行分布式并行运算的框架平台,能够处理PB级别的数据量,具有高可靠、高效和可伸缩特性的优势。主要组成包括分布式存储HDFS与分布式计算MapReduce。HDFS采用master/slave结构,负责集群数据的存储与管理,具备高数据吞吐和高容错率的特点。MapReduce是一种分布式编程模型,包含Map与Reduce两种操作。本发明实施例,参见图1所示,提供一种分布式网络态势感知方法,包含如下内容:HADOOP is a framework platform that can perform distributed parallel computing in a large number of cluster computers, can handle PB level data volume, and has the advantages of high reliability, high efficiency and scalability. The main components include distributed storage HDFS and distributed computing MapReduce. HDFS adopts the master/slave structure, which is responsible for the storage and management of cluster data, and has the characteristics of high data throughput and high fault tolerance. MapReduce is a distributed programming model that includes two operations, Map and Reduce. An embodiment of the present invention, as shown in FIG. 1 , provides a distributed network situational awareness method, including the following content:

S101、针对网络节点安全数据源,通过调用HADOOP接口利用MapReduce模型进行数据融合,获取当前时间段内的安全事件;S101. For the security data source of the network node, use the MapReduce model to perform data fusion by invoking the HADOOP interface, and obtain security events in the current time period;

S102、通过量化安全事件威胁风险进行网络安全态势评估;依据量化过程中识别的攻击阶段并结合网络攻击图,对安全态势进行预测,以获取攻击意图。S102 , assessing the network security situation by quantifying the threat risk of security events; predicting the security situation according to the attack stages identified in the quantification process and in combination with the network attack graph, so as to obtain attack intentions.

参见图2所示,本发明实施例结合HADOOP,优化网络安全态势感知的存储规模与时效性。首先建立态势感知系统框架,采用的思想是“分布式采集,结构化处理”,主要包括数据预处理、态势感知、态势展示和态势决策四个部分。其中,数据预处理收集设备性能、设备日志和流量信息等信息,并对其进行数据清理、数据变换等,形成态势基础信息库;态势感知以态势评估信息库为处理对象,对其进行知识获取,并将获取的知识用于态势判断;态势展示将态势评估结果进行展现;态势决策是网络管理员根据态势结论所采取的一系列动作。Referring to FIG. 2 , the embodiment of the present invention combines HADOOP to optimize the storage scale and timeliness of network security situational awareness. Firstly, the framework of situational awareness system is established, and the idea adopted is "distributed acquisition, structured processing", which mainly includes four parts: data preprocessing, situational awareness, situational display and situational decision-making. Among them, data preprocessing collects information such as equipment performance, equipment logs and traffic information, and performs data cleaning and data transformation on them to form a basic situation information database; situation awareness takes the situation assessment information database as the processing object, and acquires knowledge about it. , and use the acquired knowledge for situation judgment; situation display shows the results of situation assessment; situation decision is a series of actions taken by network administrators based on situation conclusions.

HDFS为主从结构,其包括一个NameNode与若干DataNode节点。前者管理对文件访问操作;后者负责存储数据,如图3所示。从数据内部来看,文件会划分成若干数据块。通常情况下,文件会按照64M的标准,切分成若干数据块,并且每个数据块尽可能地分散开,分存与多个DataNode节点上。NameNode负责文件打开、关闭和重命名等操作,生成DataNode与数据块之间的映射表。DataNode负责文件的读/写请求进行响应,创建、复制和删除数据块。MapReduce架构用于互联网大规模数据的处理,其数据处理接口简单且功能强大,同时能够对分布式并行运算进行较好的封装,可用于数据分析和机器学习等应用领域。MapReduce的核心是Map(映射)和Reduce(化简),它将待执行程序拆解成Map和Reduce方式。将输入的<key,value>对转换成另一个或一批<key,value>对输出。其数据处理过程如图4所示,具体工作流程如下:HDFS is a master-slave structure, which includes a NameNode and several DataNodes. The former manages access operations to files; the latter is responsible for storing data, as shown in Figure 3. From the internal point of view of the data, the file is divided into several data blocks. Under normal circumstances, the file will be divided into several data blocks according to the 64M standard, and each data block will be dispersed as much as possible, and stored on multiple DataNode nodes. The NameNode is responsible for operations such as file opening, closing, and renaming, and generates a mapping table between DataNodes and data blocks. The DataNode is responsible for responding to file read/write requests, creating, replicating, and deleting data blocks. The MapReduce architecture is used to process large-scale data on the Internet. Its data processing interface is simple and powerful, and it can better encapsulate distributed parallel operations, which can be used in data analysis and machine learning applications. The core of MapReduce is Map (mapping) and Reduce (simplification), which disassembles the program to be executed into Map and Reduce methods. Convert an input <key, value> pair to another or a batch of <key, value> pairs output. The data processing process is shown in Figure 4, and the specific workflow is as follows:

Map端:1.切片:对输入文切割(默认按照最大切片(Long最大值),最小切片(>=1),块大小取(默认128M)三者中间值)形成切片(map个数),在集群并发执行;2.执行任务:通常情况,输入切片中有多少行,就执行多少次map函数。最终会形成<key,value>(键值对)集合;3.将map的输出写入缓冲,每个map都有一个环形内存缓冲区(默认100),当达到阀值(0.8),溢出到磁盘,并对溢出文件进行归并排序;4.分区(Partition):对每个 map的结果进行分区,分区数通常为reduce的个数,分区规则为对key进行Hash(随机) 分区;5.排序:对不同分区的数据进行排序;6.聚合(Combiner):用Combiner函数对排序的结果进行聚合;7.一个map结束后,通对HTTP,TaskTracker会得到消息,汇报给JobTracker, Reduce定时获取消息;8.复制:从每个map中复制数据到缓冲;9.合并排序:使用堆排序合并一个reduce中的所有map,按key排序;10.分组:相同的key分为一组,形成个集合系 K.list(V)。Map side: 1. Slice: Cut the input text (the default is the largest slice (Long maximum value), the smallest slice (>=1), and the block size (default 128M) is the middle value of the three) to form slices (number of maps), Execute concurrently in the cluster; 2. Execute the task: Usually, the map function is executed as many times as there are rows in the input slice. Finally, a set of <key, value> (key-value pairs) will be formed; 3. Write the output of the map to the buffer, each map has a ring memory buffer (default 100), when the threshold (0.8) is reached, it overflows to Disk, and merge and sort the overflow file; 4. Partition: Partition the result of each map, the number of partitions is usually the number of reduce, and the partitioning rule is to perform Hash (random) partition on the key; 5. Sort : Sort the data of different partitions; 6. Aggregation (Combiner): Use the Combiner function to aggregate the sorted results; 7. After a map is finished, through HTTP, the TaskTracker will get the message and report it to the JobTracker, Reduce will get the message regularly ; 8. Copy: Copy data from each map to the buffer; 9. Merge sort: Use heap sort to merge all maps in a reduce, sorted by key; 10. Group: The same key is grouped into a group to form a set Department K.list(V).

Reduce端:1.执行任务:同一组的reduce数据执行一次reduce函数;2.输出:一个reduce对应一个文件输出。Reduce side: 1. Execution task: the same group of reduce data executes the reduce function once; 2. Output: one reduce corresponds to one file output.

基于上述的方法,本发明实施例还提供一种分布式网络态势感知系统,参见图5和6所示,包含:数据集成服务器、HADOOP平台及与两者连接的态势感知可视化服务器,其中,Based on the above method, an embodiment of the present invention further provides a distributed network situational awareness system, as shown in FIGS. 5 and 6 , including: a data integration server, a HADOOP platform, and a situational awareness visualization server connected to both, wherein,

数据集成服务器,用于获取网络各节点安全数据源,并通过调用HADOOP接口利用HADOOP平台中的MapReduce模型进行数据融合,获取当前时间段内的安全事件;The data integration server is used to obtain the security data sources of each node of the network, and uses the MapReduce model in the HADOOP platform to perform data fusion by calling the HADOOP interface to obtain security events in the current time period;

态势感知可视化服务器,用于调用数据集成服务器与HADOOP平台上的安全数据,量化安全事件威胁风险,对当前态势进行预测并图形化展示。The situational awareness visualization server is used to call the data integration server and the security data on the HADOOP platform, quantify the threat risk of security incidents, predict the current situation and display it graphically.

本发明实施例中,进一步地,安全数据源包含攻防双方数据及网络环境数据,其中,攻击方包含原子攻击动作信息;防御方包含网络防护策略及安全配置信息;网络环境数据包含主机、服务器和终端设备信息,网络连通性信息及网络漏洞扫描信息。In the embodiment of the present invention, further, the security data source includes the data of both attacking and defending parties and network environment data, wherein the attacking party includes atomic attack action information; the defending party includes network protection strategy and security configuration information; the network environment data includes host, server and Terminal device information, network connectivity information and network vulnerability scanning information.

通过部署在网络中的多种安全传感器,对影响网络安全状况的安全要素进行收集,为后面的态势分析提供数据支撑,是态势感知的前提;对收集到的海量、冗余、异构的态势要素进行预处理,为后面的态势分析提供基础数据,对报警、日志和系统运维信息进行格式化片。态势分析主要的数据源包括攻击方、防御方、环境信息三类,其中攻击方信息主要为原子攻击动作;防御方信息包含网络防护策略、安全配置信息等解决方案的汇总;网络环境信息包含网络中的各类主机、服务器和终端设备信息,网络拓扑结构等连通性信息;利用漏扫工具 Scanner采集网络漏洞信息,利用拓扑分析工具收集网络拓扑信息,依据防火墙配置信息得到网络连通信息。Through a variety of security sensors deployed in the network, the security elements that affect the network security status are collected to provide data support for the subsequent situation analysis, which is the premise of situational awareness; The elements are preprocessed to provide basic data for the subsequent situation analysis, and format the alarms, logs, and system operation and maintenance information. The main data sources for situation analysis include attackers, defenders, and environmental information. The attackers’ information is mainly atomic attack actions; the defenders’ information includes a summary of solutions such as network protection strategies and security configuration information; the network environment information includes network Various types of host, server and terminal equipment information, network topology and other connectivity information in the network; use the scan tool Scanner to collect network vulnerability information, use the topology analysis tool to collect network topology information, and obtain network connectivity information based on firewall configuration information.

本发明实施例中,进一步地,针对安全数据源,首先对其进行预处理,通过设置过滤规则,剔除不规范数据,通过XML公共数据模型进行数据格式化处理,得到统一格式的XML文件。In the embodiment of the present invention, further, for the security data source, firstly preprocess it, set filtering rules to eliminate irregular data, and perform data formatting processing through the XML public data model to obtain an XML file in a unified format.

如图7所示,部署在网络系统各节点的网络安全传感器收集到的原始安全数据,为保证数据的准确性以及规范化,首先对原始安全数据进行数据融合,生成安全事件,该过程主要在数据集成服务器中完成。数据融合过程中,首先清洗数据,设置过滤规则,将不规范的数据剔除。例如字段缺省等,采用目前通用的XML公共数据模型实现数据格式化处理。然后对统一格式的XML文件进行聚类,在聚类时算法需要面对海量的原始数据,其运算量巨大,为满足其实时处理,该阶段在数据集成服务器上调用HADOOP接口,将运算与存储在HADOOP中完成。目前聚类算法在HADOOP中的研究已较为成熟,该系统中也取得了较好效果。聚类结束后,将聚类的结果回传到数据集成服务器的MySQL数据库中,其数据量相较原始报警数据已大大减小。最后对其进行数据融合,该阶段运算量相对较小,其直接在传统数据库中进行读写操作,其算法也在数据集成服务器中完成。最终得到当前时间段内的安全事件,可利用C语言进行实现,其中聚类算法在HADOOP中利用MapReduce语言实现。As shown in Figure 7, the original security data collected by the network security sensors deployed in each node of the network system, in order to ensure the accuracy and standardization of the data, first perform data fusion on the original security data to generate security events. done in the integration server. In the process of data fusion, first clean the data, set filtering rules, and eliminate irregular data. For example, field defaults, etc., use the current common XML public data model to realize data formatting. Then cluster the XML files in a unified format. During clustering, the algorithm needs to face a large amount of original data, which requires a huge amount of calculation. In order to meet its real-time processing, the HADOOP interface is called on the data integration server at this stage to integrate the calculation and storage. Done in HADOOP. At present, the research of clustering algorithm in HADOOP is relatively mature, and good results have been achieved in this system. After the clustering is completed, the clustering results are sent back to the MySQL database of the data integration server, and the data volume is greatly reduced compared with the original alarm data. Finally, data fusion is performed on it. This stage has a relatively small amount of computation. It directly performs read and write operations in the traditional database, and its algorithm is also completed in the data integration server. Finally, the security events in the current time period are obtained, which can be implemented by C language, and the clustering algorithm is implemented by MapReduce language in HADOOP.

本发明实施例中,进一步地,量化安全事件威胁风险,按网络体系规模和层次关系,将该量化分为系统层、主机层和服务层;根据网络系统组织结构,采取自下而上先局部后整体的评估策略。In the embodiment of the present invention, further, the threat risk of security events is quantified, and the quantification is divided into a system layer, a host layer and a service layer according to the scale and hierarchical relationship of the network system; the overall evaluation strategy.

在数据融合得到安全事件后,系统开始进行网络安全态势评估阶段,该模块主要在态势分析&可视化服务器中运行。该模块通过访问数据集成服务器MySQL数据库中的安全事件,量化不同安全事件的威胁风险,考虑实际网络系统按规模和层次关系可分解为系统、主机、服务3层,而且大多数攻击是针对系统中主机上某一服务的。After the data fusion gets the security event, the system starts the network security situation assessment stage, and this module mainly runs in the situation analysis & visualization server. This module quantifies the threat risk of different security events by accessing the security events in the MySQL database of the data integration server, considering that the actual network system can be decomposed into three layers: system, host and service according to the scale and hierarchical relationship, and most attacks are aimed at the system. a service on the host.

本发明实施例中,进一步地,自下而上先局部后整体的评估策略,包含如下内容:以安全事件为线索,结合网络资源耗用,获取各个主机所提供服务的威胁情况,统计分析安全事件的严重程度、发生次数以及网络带宽占用率,评估各项服务的安全威胁状况;综合评估网络系统中各主机的安全状况;根据网络系统结构评估整个局域网系统的安全威胁态势。In the embodiment of the present invention, further, the bottom-up, first-part, and then-whole evaluation strategy includes the following content: taking security events as clues, combining network resource consumption, obtaining the threat situation of services provided by each host, and performing statistical analysis on security The severity of the event, the number of occurrences and the network bandwidth occupancy rate, evaluate the security threat status of each service; comprehensively evaluate the security status of each host in the network system; evaluate the security threat status of the entire LAN system according to the network system structure.

本发明实施例中,进一步地,通过给定时间段内服务攻击严重程度、发生攻击次数、网络带宽占用率及APT攻击威胁等级向量获取服务威胁指数;通过主机的服务安全威胁向量、服务在主机所有服务中心所占权重向量及服务威胁指数来获取给定时间段内主机威胁指数;通过主机威胁指数和主机在待评估局域网中所占重要性权重得到给定时间段内网络系统局域网的威胁指数。In the embodiment of the present invention, further, the service threat index is obtained through the service attack severity, the number of attacks, the network bandwidth occupancy rate, and the APT attack threat level vector within a given time period; The weight vector of all service centers and the service threat index are used to obtain the host threat index in a given time period; the threat index of the network system LAN in a given time period is obtained through the host threat index and the importance weight of the host in the LAN to be evaluated. .

安全事件发生对服务的威胁程度与服务的正常访问量、威胁强度和攻击严重程度相关,而且,不同时段内服务的正常访问量不同,即同一攻击在不同时段内对服务造成不同的影响,给定分析时间窗Δt,定义t时刻服务Sj的威胁指数为The degree of threat to services caused by security incidents is related to the normal access volume, threat intensity, and attack severity of the service. Moreover, the normal access volume of the service in different time periods is different, that is, the same attack has different impacts on the service in different time periods. Determine the analysis time window Δt, and define the threat index of service S j at time t as

Figure RE-GDA0002653395350000051
Figure RE-GDA0002653395350000051

其中:in:

(1)

Figure RE-GDA0002653395350000052
为正常访问量向量,h为把一天划分的时段数,比如一天分为3个时段:Δt1=Night(0:00-8:00),Δt2=OfficeHour(8:00-18:00),Δt3=Evening(18:00-24:00),即
Figure RE-GDA0002653395350000053
Figure RE-GDA0002653395350000054
的元素初值由系统管理员根据被保护网络系统不同时段的正常平均访问量Fi(i=1,…,h)进行定量赋值,分别用1,2,3,4,5表示访问量,非常低、低、中、高、非常高,其取值越大,表示访问量越大,然后,对此进行归一化处理,得到
Figure RE-GDA0002653395350000061
的元素值,即
Figure RE-GDA0002653395350000062
(1)
Figure RE-GDA0002653395350000052
is the normal traffic vector, h is the number of time periods divided a day, for example, a day is divided into 3 time periods: Δt 1 =Night(0:00-8:00), Δt 2 =OfficeHour(8:00-18:00) , Δt 3 =Evening (18:00-24:00), that is
Figure RE-GDA0002653395350000053
Figure RE-GDA0002653395350000054
The initial value of the element of is quantitatively assigned by the system administrator according to the normal average access volume F i (i=1,...,h) of the protected network system in different periods, and the access volume is represented by 1, 2, 3, 4, and 5, respectively. Very low, low, medium, high, and very high, the larger the value, the greater the number of visits. Then, normalize this to get
Figure RE-GDA0002653395350000061
the element value of , that is
Figure RE-GDA0002653395350000062

(2)

Figure RE-GDA0002653395350000063
分别为t时刻攻击严重程度和发生次数向量,其元素
Figure RE-GDA0002653395350000064
为第i个时段内从t至t+Δt时刻,针对服务 Sj的各种攻击的严重程度和发生次数,u为Δt时间内攻击种类数,u和
Figure RE-GDA0002653395350000065
的取值通过统计攻击事件日志数据库得到。(2)
Figure RE-GDA0002653395350000063
are the vector of attack severity and occurrence times at time t, respectively, and its elements
Figure RE-GDA0002653395350000064
is the severity and the number of occurrences of various attacks on service S j from t to t+Δt in the i-th period, u is the number of attack types within Δt, and u and
Figure RE-GDA0002653395350000065
The value of is obtained from the statistical attack event log database.

(3)

Figure RE-GDA0002653395350000066
分别为网络带宽占用率和APT攻击的威胁等级向量,其元素
Figure RE-GDA0002653395350000067
为第i个时段内各个时间窗的网络带宽占用率和APT攻击的威胁等级,v为第i个时段内的分析时间窗口数,
Figure RE-GDA0002653395350000068
的系数100是为了把网络带宽占用率转为整数,进而评估APT攻击的威胁。(3)
Figure RE-GDA0002653395350000066
are the network bandwidth occupancy rate and the threat level vector of APT attacks, respectively, and its elements
Figure RE-GDA0002653395350000067
is the network bandwidth occupancy rate and the threat level of APT attacks in each time window in the ith period, v is the number of analysis time windows in the ith period,
Figure RE-GDA0002653395350000068
The coefficient of 100 is to convert the network bandwidth occupancy rate to an integer, and then evaluate the threat of APT attacks.

(4)

Figure RE-GDA0002653395350000069
值越大,表示威胁程度越高,应该引起管理员的高度重视,而且,计算
Figure RE-GDA00026533953500000610
的意义在于计算出一段连续时期内的安全威胁值,绘制服务级安全态势图,将这些值进行比较,从而判断出服务Sj的安全威胁趋势。(4)
Figure RE-GDA0002653395350000069
The larger the value is, the higher the threat level is, and the administrator should pay great attention to it.
Figure RE-GDA00026533953500000610
The significance of is to calculate the security threat value in a continuous period, draw the service-level security situation map, and compare these values, so as to judge the security threat trend of service Sj .

主机级:在时刻t主机Hk的威胁指数为

Figure RE-GDA00026533953500000611
其中:Host level: the threat index of the host H k at time t is
Figure RE-GDA00026533953500000611
in:

(1)

Figure RE-GDA00026533953500000612
为t时刻主机Hk的服务安全威胁向量,元素
Figure RE-GDA00026533953500000613
为计算出来的服务Si的安全威胁指数,m为主机Hk开通的服务数。(1)
Figure RE-GDA00026533953500000612
is the service security threat vector of the host H k at time t, element
Figure RE-GDA00026533953500000613
is the calculated security threat index of the service Si, m is the number of services opened by the host H k .

(2)

Figure RE-GDA00026533953500000614
为服务在主机开通的所有服务中所占权重向量,其元素取值根据主机Hk提供服务的重要性IMi(i=1,…,m)来确定,分别用1,2,3表示服务的的重要程度:低、中、高。然后,对重要性IMi进行归一化处理得到向量
Figure RE-GDA00026533953500000615
的元素值,即(2)
Figure RE-GDA00026533953500000614
The weight vector occupied by the service in all the services opened by the host, the value of its elements is determined according to the importance IM i (i=1,...,m) of the service provided by the host H k , and the services are represented by 1, 2, and 3 respectively. of importance: low, medium, high. Then, normalize the importance IM i to get the vector
Figure RE-GDA00026533953500000615
the element value of , that is

Figure RE-GDA00026533953500000616
Figure RE-GDA00026533953500000616

(3)威胁指数

Figure RE-GDA00026533953500000617
取值越大,表示主机Hk威胁程度越高,其意义还在于计算出一段连续时期内
Figure RE-GDA00026533953500000618
值,并进行比较,从而判断主机Hk在这一段时期内的安全威胁趋势。(3) Threat Index
Figure RE-GDA00026533953500000617
The larger the value is, the higher the threat level of the host H k is, and its significance lies in the calculation of a continuous period of time.
Figure RE-GDA00026533953500000618
value, and compare them, so as to judge the security threat trend of the host H k in this period.

网络(系统)级:在时刻t网络系统LAN的威胁指数为Network (system) level: The threat index of the network system LAN at time t is

Figure RE-GDA00026533953500000619
Figure RE-GDA00026533953500000619

其中:in:

(1)

Figure RE-GDA0002653395350000071
为t时刻网络系统内主机的安全威胁向量,元素
Figure RE-GDA0002653395350000072
为计算出来的主机Hl的威胁指数,n为网络系统内的主机数。(1)
Figure RE-GDA0002653395350000071
is the security threat vector of the host in the network system at time t, element
Figure RE-GDA0002653395350000072
is the calculated threat index of the host H l , and n is the number of hosts in the network system.

(2)

Figure RE-GDA0002653395350000073
为主机在被评估局域网中所占重要性的权重向量,其元素取值根据各主机在局域网中的地位STi(i=1,…,n)来确定。(2)
Figure RE-GDA0002653395350000073
is the weight vector of the importance of the host in the evaluated local area network, and the value of its elements is determined according to the position ST i (i=1, . . . , n) of each host in the local area network.

(3)网络系统威胁指数RL取值越大,表示危险程度越高,其含义也在于计算出一段连续时期内RL的值,并进行比较,进而判断这段时期网络系统的安全威胁趋势。(3) The larger the value of the network system threat index RL is, the higher the degree of danger is, and its meaning is also to calculate the value of RL in a continuous period of time, and compare them, and then judge the security threat trend of the network system during this period. .

利用网络拓扑和脆弱性信息生成网络攻击图,依据量化过程中识别出的攻击阶段,并结合生成的攻击图进行攻击行为预测。然后,对网络的安全态势进行预测,并依据态势预测结果进行攻击意图识别。以上攻击图生成和行为预测,可在态势分析&可视化服务器中完成,其中态势行为预测算法可在HADOOP上利用MapReduce语言实现。The network attack graph is generated using network topology and vulnerability information, and the attack behavior is predicted according to the attack stages identified in the quantization process and combined with the generated attack graph. Then, the security situation of the network is predicted, and the attack intent is identified according to the situation prediction result. The above attack graph generation and behavior prediction can be completed in the situation analysis & visualization server. The situation behavior prediction algorithm can be implemented in HADOOP using MapReduce language.

为进一步验证本发明技术方案有效性,下面通过搭建具体平台做模拟测试:In order to further verify the validity of the technical solution of the present invention, a simulation test is done by building a concrete platform below:

搭建5个节点的HADOOP平台,其中1个master节点,4个slave节点。平台基于Ubuntu操作系统,版本为HADOOP 2.0.2。数据采集模块,采用C语言将传感器产生的数据通过Socket 传给服务器。在态势理解中采用C与Map/Reduce并行语言交叉使用。态势评估与预测模块底层程序采用C语言开发,其中可视化部分利用Eclipse进行开发,系统基于Windows7系统。数据管理使用时针对数据规模,采用传统MySQL数据库和HDFS交叉使用的模式,将需要大量存储与计算的数据存储在HDFS上。对监控的网络拓扑结构与连通性进行构建,其界面如图8所示。进行态势评估与预测,得到态势图如图9所示,其中即有每一个主机的态势变化,也包括整体网络的态势情况。通过分析,得到的攻击场景重构图如图10所示,通过该图可以清晰的看出攻击者的入侵路径。对网络安全事件的实时告警如图11所示,其包含实时发生的安全事件。Build a HADOOP platform with 5 nodes, including 1 master node and 4 slave nodes. The platform is based on the Ubuntu operating system, and the version is HADOOP 2.0.2. The data acquisition module adopts C language to transmit the data generated by the sensor to the server through Socket. In the situational understanding, C and Map/Reduce parallel language are used cross-purpose. The underlying program of the situation assessment and prediction module is developed in C language, and the visualization part is developed using Eclipse, and the system is based on Windows7 system. For data management and use, according to the data scale, the traditional MySQL database and HDFS are used in cross-use mode, and the data that requires a large amount of storage and calculation is stored on HDFS. Build the monitored network topology and connectivity, and its interface is shown in Figure 8. Carry out situational assessment and prediction, and obtain the situation diagram as shown in Figure 9, which includes the situational changes of each host and the situation of the overall network. Through the analysis, the obtained attack scene reconstruction diagram is shown in Figure 10, through which the attacker's intrusion path can be clearly seen. The real-time alarm for network security events is shown in Figure 11, which includes security events that occur in real time.

通过以上搭建的平台,比较清晰直观的显示网络态势变化趋势,可以进一步验证本发明技术方案可以实现面向大规模数据的分布式网络安全态势感知,能够优化网络安全态势感知存储规模与时效,以提升对诸如APT攻击等隐蔽、协同、大规模和多阶段攻击的感知防护能力。Through the platform constructed above, the changing trend of the network situation can be displayed more clearly and intuitively, and it can be further verified that the technical solution of the present invention can realize distributed network security situational awareness for large-scale data, and can optimize the storage scale and timeliness of network security situational awareness, so as to improve the Perceptual protection against covert, coordinated, large-scale and multi-stage attacks such as APT attacks.

除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对步骤、数字表达式和数值并不限制本发明的范围。The relative steps, numerical expressions and numerical values of the components and steps set forth in these embodiments do not limit the scope of the invention unless specifically stated otherwise.

基于上述的系统,本发明实施例还提供一种服务器,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现上述的系统。Based on the above system, an embodiment of the present invention further provides a server, including: one or more processors; and a storage device for storing one or more programs, when the one or more programs are stored by the one or more programs Execution of the one or more processors causes the one or more processors to implement the system described above.

基于上述的系统,本发明实施例还提供一种计算机可读节点设备,其上存储有计算机程序,其中,该程序被处理器执行时实现上述的系统。Based on the above system, an embodiment of the present invention further provides a computer-readable node device on which a computer program is stored, wherein the above-mentioned system is implemented when the program is executed by a processor.

本发明实施例所提供的装置,其实现原理及产生的技术效果和前述系统实施例相同,为简要描述,装置实施例部分未提及之处,可参考前述系统实施例中相应内容。The implementation principle and technical effect of the device provided by the embodiment of the present invention are the same as those of the foregoing system embodiment. For brief description, for the parts not mentioned in the device embodiment, reference may be made to the corresponding content in the foregoing system embodiment.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统和装置的具体工作过程,可以参考前述系统实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, for the specific working process of the system and device described above, reference may be made to the corresponding process in the foregoing system embodiments, which will not be repeated here.

在这里示出和描述的所有示例中,任何具体值应被解释为仅仅是示例性的,而不是作为限制,因此,示例性实施例的其他示例可以具有不同的值。In all examples shown and described herein, any specific value should be construed as merely exemplary and not as limiting, as other examples of exemplary embodiments may have different values.

应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。It should be noted that like numerals and letters refer to like items in the following figures, so once an item is defined in one figure, it does not require further definition and explanation in subsequent figures.

附图中的流程图和框图显示了根据本发明的多个实施例的系统、系统和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/ 或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, systems and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more functions for implementing the specified logical function(s) executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented in dedicated hardware-based systems that perform the specified functions or actions. , or can be implemented in a combination of dedicated hardware and computer instructions.

在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和系统,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and systems may be implemented in other manners. The apparatus embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some communication interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.

所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个处理器可执行的非易失的计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备 (可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述系统的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The functions, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a processor-executable non-volatile computer-readable storage medium. Based on such understanding, the technical solution of the present invention can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the system described in various embodiments of the present invention. The aforementioned storage medium includes: U disk, removable hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .

最后应说明的是:以上所述实施例,仅为本发明的具体实施方式,用以说明本发明的技术方案,而非对其限制,本发明的保护范围并不局限于此,尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本发明实施例技术方案的精神和范围,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。Finally, it should be noted that the above-mentioned embodiments are only specific implementations of the present invention, and are used to illustrate the technical solutions of the present invention, but not to limit them. The protection scope of the present invention is not limited thereto, although referring to the foregoing The embodiment has been described in detail the present invention, those of ordinary skill in the art should understand: any person skilled in the art who is familiar with the technical field within the technical scope disclosed by the present invention can still modify the technical solutions described in the foregoing embodiments. Or can easily think of changes, or equivalently replace some of the technical features; and these modifications, changes or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the embodiments of the present invention, and should be covered in the present invention. within the scope of protection. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.

Claims (10)

1. A distributed network situation awareness method is characterized by comprising the following contents:
aiming at a network node security data source, carrying out data fusion by calling a HADOOP interface and utilizing a MapReduce model to obtain a security event in the current time period;
network security situation assessment is carried out by quantifying security event threat risks; and predicting the security situation according to the identified attack stage in the quantization process and combining a network attack graph to obtain an attack intention.
2. The distributed network situation awareness method according to claim 1, wherein the secure data source includes data of both attacking and defending parties and network environment data, wherein the attacking party includes atomic attack action information; the defender comprises a network protection strategy and security configuration information; the network environment data comprises information of a host, a server and terminal equipment, network connectivity information and network vulnerability scanning information.
3. The distributed network situation awareness method according to claim 1 or 2, characterized in that for the secure data source, preprocessing is performed first, filtering rules are set, non-standard data are eliminated, and data formatting processing is performed through an XML public data model to obtain an XML file with a uniform format.
4. The distributed network situation awareness method according to claim 3, wherein an HADOOP interface is called on the data integration server, operation processing and storage of XML file clustering are completed in the HADOOP, a result is transmitted back to the data integration server after clustering is completed, and data fusion is performed in the data integration server to obtain a security event of a current time period.
5. The distributed network situational awareness method of claim 1, wherein the security event threat risk is quantified, and the quantification is divided into a system layer, a host layer and a service layer according to the network system scale and hierarchical relationship; and according to the organization structure of the network system, adopting an evaluation strategy of from bottom to top, firstly, locally and then integrally.
6. The distributed network situational awareness method of claim 5, wherein the bottom-up local-first-then-global evaluation strategy comprises the following: the method comprises the steps of taking a security event as a clue, combining network resource consumption, obtaining threat conditions of services provided by each host, carrying out statistical analysis on the severity, the occurrence frequency and the network bandwidth occupancy rate of the security event, and evaluating the security threat conditions of each service; comprehensively evaluating the safety condition of each host in the network system; and evaluating the security threat situation of the whole local area network system according to the network system structure.
7. The distributed network situation awareness method according to claim 5, wherein a service threat index is obtained by a service attack severity, an attack occurrence frequency, a network bandwidth occupancy rate and an APT attack threat level vector within a given time period; obtaining a host threat index in a given time period through a service security threat vector of the host, weight vectors occupied by the service in all service centers of the host and the service threat index; and obtaining the threat index of the network system local area network in a given time period through the host threat index and the importance weight of the host in the local area network to be evaluated.
8. A distributed network situational awareness system, comprising: a data integration server, a HADOOP platform and a situation awareness visualization server connected with the data integration server and the HADOOP platform, wherein,
the data integration server is used for acquiring the security data source of each node of the network, performing data fusion by calling the HADOOP interface and utilizing a MapReduce model in the HADOOP platform, and acquiring the security event in the current time period;
and the situation awareness visualization server is used for calling the safety data on the data integration server and the HADOOP platform, quantifying the threat risk of the safety event, predicting the current situation and graphically displaying the current situation.
9. A server, comprising: a memory, and one or more processors coupled to the memory; the processor is configured to execute the method of any one of claims 1-7 based on instructions stored in the memory.
10. A computer readable node device having stored thereon a computer program for execution by a processor, the computer program being adapted to perform the method of any of claims 1 to 7.
CN202010694100.4A 2020-07-17 2020-07-17 Distributed network situation perception method, system, server and node equipment Pending CN111885040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010694100.4A CN111885040A (en) 2020-07-17 2020-07-17 Distributed network situation perception method, system, server and node equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010694100.4A CN111885040A (en) 2020-07-17 2020-07-17 Distributed network situation perception method, system, server and node equipment

Publications (1)

Publication Number Publication Date
CN111885040A true CN111885040A (en) 2020-11-03

Family

ID=73154979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010694100.4A Pending CN111885040A (en) 2020-07-17 2020-07-17 Distributed network situation perception method, system, server and node equipment

Country Status (1)

Country Link
CN (1) CN111885040A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380514A (en) * 2020-11-13 2021-02-19 支付宝(杭州)信息技术有限公司 Biological identification security situation prediction method and device and electronic equipment
CN112528223A (en) * 2020-12-11 2021-03-19 中国空间技术研究院 Distributed situation perception consistency method and device
CN112685459A (en) * 2020-11-16 2021-04-20 中国南方电网有限责任公司 Attack source feature identification method based on K-means clustering algorithm
CN112769825A (en) * 2021-01-07 2021-05-07 深圳市永达电子信息股份有限公司 Network security guarantee method, system and computer storage medium
CN112764852A (en) * 2021-01-18 2021-05-07 深圳供电局有限公司 Operation and maintenance safety monitoring method and system for intelligent wave recording master station and computer readable storage medium
CN113642002A (en) * 2021-07-28 2021-11-12 上海纽盾科技股份有限公司 Rapid positioning situation perception method and system for cloud data security events
CN113746832A (en) * 2021-09-02 2021-12-03 华中科技大学 Multi-method mixed distributed APT malicious traffic detection and defense system and method
CN113949554A (en) * 2021-10-13 2022-01-18 东南大学 A high-speed transmission method for global situational awareness data in distributed network
CN114598534A (en) * 2022-03-14 2022-06-07 葛晓磊 Big data-based equipment detection early warning system
CN114745286A (en) * 2022-04-13 2022-07-12 电信科学技术第五研究所有限公司 Intelligent network situation perception system facing dynamic network based on knowledge graph technology
CN114915491A (en) * 2022-06-20 2022-08-16 北京猎鹰安全科技有限公司 Method and device for evaluating security state of network terminal and storage medium
CN115277249A (en) * 2022-09-22 2022-11-01 山东省计算中心(国家超级计算济南中心) A Network Security Situational Awareness Method for Multi-layer Heterogeneous Network Collaboration
CN116132311A (en) * 2023-02-17 2023-05-16 成都工业职业技术学院 Network security situation awareness method based on time sequence
CN116436666A (en) * 2023-04-11 2023-07-14 山东省计算中心(国家超级计算济南中心) A Security Situational Awareness Method for Distributed Heterogeneous Networks
CN117014224A (en) * 2023-09-12 2023-11-07 联通(广东)产业互联网有限公司 Network attack defense method and system based on Gaussian process regression
CN117130566A (en) * 2023-10-27 2023-11-28 睿至科技集团有限公司 Distributed storage method and storage platform
CN117375982A (en) * 2023-11-07 2024-01-09 广州融服信息技术有限公司 Network situation safety monitoring system
CN118590314A (en) * 2024-08-02 2024-09-03 网思科技集团有限公司 Artificial intelligence-based network threat detection method, system and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098180A (en) * 2011-02-17 2011-06-15 华北电力大学 Network security situational awareness method
CN108494810A (en) * 2018-06-11 2018-09-04 中国人民解放军战略支援部队信息工程大学 Network security situation prediction method, apparatus and system towards attack

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098180A (en) * 2011-02-17 2011-06-15 华北电力大学 Network security situational awareness method
CN108494810A (en) * 2018-06-11 2018-09-04 中国人民解放军战略支援部队信息工程大学 Network security situation prediction method, apparatus and system towards attack

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
刘宇等: "一种松耦合网络安全态势感知模型", 《计算机工程》 *
刘玉岭,冯登国,连一峰,陈恺,吴迪: ""基于时空维度分析的网络安全态势预测方法"", 《计算机研究与发展》 *
王代远等: "基于攻击模式识别的高校网络安全态势评估方法", 《广西教育》 *
管磊等: "基于大数据的网络安全态势感知技术研究", 《信息网络安全》 *
陈秀真,郑庆华,管晓宏,林晨光: ""层次化网络安全威胁态势量化评估方法"", 《软件学报》 *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380514B (en) * 2020-11-13 2022-11-22 支付宝(杭州)信息技术有限公司 Biological identification security situation prediction method and device and electronic equipment
CN112380514A (en) * 2020-11-13 2021-02-19 支付宝(杭州)信息技术有限公司 Biological identification security situation prediction method and device and electronic equipment
CN112685459A (en) * 2020-11-16 2021-04-20 中国南方电网有限责任公司 Attack source feature identification method based on K-means clustering algorithm
CN112528223A (en) * 2020-12-11 2021-03-19 中国空间技术研究院 Distributed situation perception consistency method and device
CN112528223B (en) * 2020-12-11 2024-05-31 中国空间技术研究院 Distributed situational awareness consistent method and device
CN112769825A (en) * 2021-01-07 2021-05-07 深圳市永达电子信息股份有限公司 Network security guarantee method, system and computer storage medium
CN112769825B (en) * 2021-01-07 2023-02-21 深圳市永达电子信息股份有限公司 Network security guarantee method, system and computer storage medium
CN112764852A (en) * 2021-01-18 2021-05-07 深圳供电局有限公司 Operation and maintenance safety monitoring method and system for intelligent wave recording master station and computer readable storage medium
CN113642002A (en) * 2021-07-28 2021-11-12 上海纽盾科技股份有限公司 Rapid positioning situation perception method and system for cloud data security events
CN113642002B (en) * 2021-07-28 2024-02-02 上海纽盾科技股份有限公司 Rapid positioning situation awareness method and system for cloud data security event
CN113746832A (en) * 2021-09-02 2021-12-03 华中科技大学 Multi-method mixed distributed APT malicious traffic detection and defense system and method
CN113746832B (en) * 2021-09-02 2022-04-29 华中科技大学 Multi-method mixed distributed APT malicious traffic detection and defense system and method
CN113949554A (en) * 2021-10-13 2022-01-18 东南大学 A high-speed transmission method for global situational awareness data in distributed network
CN113949554B (en) * 2021-10-13 2024-02-02 东南大学 High-speed transmission method for global situation awareness data of distributed network
CN114598534B (en) * 2022-03-14 2024-03-19 郑州市数字政通信息技术有限公司 Equipment detection early warning system based on big data
CN114598534A (en) * 2022-03-14 2022-06-07 葛晓磊 Big data-based equipment detection early warning system
CN114745286B (en) * 2022-04-13 2023-11-21 电信科学技术第五研究所有限公司 Intelligent network situation awareness system oriented to dynamic network based on knowledge graph technology
CN114745286A (en) * 2022-04-13 2022-07-12 电信科学技术第五研究所有限公司 Intelligent network situation perception system facing dynamic network based on knowledge graph technology
CN114915491B (en) * 2022-06-20 2023-12-26 北京猎鹰安全科技有限公司 Evaluation method, device and storage medium for network terminal security state
CN114915491A (en) * 2022-06-20 2022-08-16 北京猎鹰安全科技有限公司 Method and device for evaluating security state of network terminal and storage medium
CN115277249B (en) * 2022-09-22 2022-12-20 山东省计算中心(国家超级计算济南中心) Network security situation perception method based on cooperation of multi-layer heterogeneous network
CN115277249A (en) * 2022-09-22 2022-11-01 山东省计算中心(国家超级计算济南中心) A Network Security Situational Awareness Method for Multi-layer Heterogeneous Network Collaboration
CN116132311A (en) * 2023-02-17 2023-05-16 成都工业职业技术学院 Network security situation awareness method based on time sequence
CN116132311B (en) * 2023-02-17 2023-11-21 成都工业职业技术学院 Network security situation awareness method based on time sequence
CN116436666B (en) * 2023-04-11 2024-01-26 山东省计算中心(国家超级计算济南中心) A security situation awareness method for distributed heterogeneous networks
CN116436666A (en) * 2023-04-11 2023-07-14 山东省计算中心(国家超级计算济南中心) A Security Situational Awareness Method for Distributed Heterogeneous Networks
CN117014224B (en) * 2023-09-12 2024-01-30 联通(广东)产业互联网有限公司 Network attack defense method and system based on Gaussian process regression
CN117014224A (en) * 2023-09-12 2023-11-07 联通(广东)产业互联网有限公司 Network attack defense method and system based on Gaussian process regression
CN117130566A (en) * 2023-10-27 2023-11-28 睿至科技集团有限公司 Distributed storage method and storage platform
CN117375982A (en) * 2023-11-07 2024-01-09 广州融服信息技术有限公司 Network situation safety monitoring system
CN117375982B (en) * 2023-11-07 2024-03-15 广州融服信息技术有限公司 Network situation safety monitoring system
CN118590314A (en) * 2024-08-02 2024-09-03 网思科技集团有限公司 Artificial intelligence-based network threat detection method, system and medium
CN118590314B (en) * 2024-08-02 2024-10-11 网思科技集团有限公司 Artificial intelligence-based network threat detection method, system and medium

Similar Documents

Publication Publication Date Title
CN111885040A (en) Distributed network situation perception method, system, server and node equipment
US12047396B2 (en) System and method for monitoring security attack chains
CN108270785B (en) A distributed security event correlation analysis method based on knowledge graph
US10108411B2 (en) Systems and methods of constructing a network topology
CN106778253A (en) Threat context aware information security Initiative Defense model based on big data
Puthal et al. A secure big data stream analytics framework for disaster management on the cloud
CN107294764A (en) Intelligent supervision method and intelligent monitoring system
WO2017080161A1 (en) Alarm information processing method and device in cloud computing
CN115987544A (en) Network security threat prediction method and system based on threat intelligence
Du Application of information communication network security management and control based on big data technology
Chen et al. Intrusion detection system in cloud computing environment
CN116366673A (en) Data analysis and sharing method oriented to management of power grid information machine room
KR102592868B1 (en) Methods and electronic devices for analyzing cybersecurity threats to organizations
CN118646754A (en) Urban heterogeneous data control and access system and method based on edge computing
Arass et al. Data life cycle: towards a reference architecture
KR101878291B1 (en) Big data management system and management method thereof
US20230231862A1 (en) Method, apparatus, electronic device, and medium for detecting abnormality in network
CN113132351B (en) Method and system for abnormal detection of internal state of mimic router system based on graph convolutional network
CN116318907A (en) Method and system for analyzing computer network situation based on big data and neural network
Zhang et al. A security monitoring method based on autonomic computing for the cloud platform
Pavlikov et al. Architecture and security tools in distributed information systems with Big Data
WO2021055964A1 (en) System and method for crowd-sourced refinement of natural phenomenon for risk management and contract validation
Xia et al. Research on hidden danger risk perception technology based on big data
CN118713927B (en) An information security asset cyberspace mapping system
Geng et al. Robustness of complex networks considering load and cascading failure under edge-removal attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103

RJ01 Rejection of invention patent application after publication