Disclosure of Invention
In view of the foregoing background, the present invention is directed to a method for processing a security event, which collects log information, obtains a security event existing on a host through analysis of big data, analyzes and discovers a risky host, measures a risk level of the risky host, and further performs a targeted handling action, and the specific technical solution is as follows.
A network security event processing method comprises the following steps: different analysis engines are called to respectively process log data of different protocols or different sources, and the processing result and threat information are subjected to correlation analysis to generate a security event; and determining host risk values in the security events, and executing preset corresponding-level handling actions on the risk hosts reaching the specific risk values.
The determining of the host risk value includes determining that the host type is a server or a terminal according to the IP, and if the host is the server, determining the host risk value according to the collapse level of the host, the threat level of the host to the intranet, and the vulnerability level of the host; and if the host is a terminal, determining the risk value of the host according to the defect level of the host, the threat level of the host to the intranet and the threat level of the file/mail.
Further, according to the risk value of the host, determining the risk rating of the security domain to which the host belongs, specifically, specifying the corresponding relation between the rating of the security domain and the score, specifying the assigned points of the hosts with different risk values, when the host with a specific risk value appears, deducting the corresponding assigned points from the total points of the security domain until the deducted points reach the upper limit, and determining the rating according to the remaining score of the security domain.
Preferably, the level of vulnerability includes lost, high suspicious and low suspicious, the level of threat includes high threat, medium threat and low threat, and the level of vulnerability includes severe, high risk, medium risk, low risk and security for evaluating the host vulnerability level;
the host risk value is positively correlated with the collapse grade; when the collapse grades are the same, the risk value is positively correlated with the threat grade;
and when the failure levels of the servers are low and suspicious, determining that the risk values are high threat, medium threat, low threat, serious or high risk vulnerability, medium risk or low risk vulnerability in turn from large to small.
Preferably, behavior characteristics of the host are extracted from log data, an attack stage where the host is located is determined, and the sink level is higher the later the attack stage where the host is located is; extracting external attack behavior characteristics from log data, and judging that the larger the attack threat is, the higher the threat level of the host computer to the intranet is according to threat information; the more serious the vulnerability of the host is determined according to vulnerability scanning, the higher the vulnerability risk of the host.
In addition, the safety event processing method further comprises the steps of outputting a treatment suggestion according to the risk analysis of the host; the risk analysis content comprises a host threat range, an attack time axis, an attack chain tracing source and a host access relation, wherein,
the host threat range comprises attack and abnormal access of the host to other hosts in the intranet, and IP and/or URL connected with the intranet by the host;
the attack timeline comprises the following time points for judging specific events: a point of failure and a point of attack;
the attack chain tracing comprises tracing the attack behavior of the risk host, and distinguishing indirect and direct attack sources from an internal network and an external network;
the host access relation comprises determining the transverse network access of the host according to the flow log so as to determine the potential threat of the risk host;
the treatment suggestion comprises a preset treatment strategy which is manually or automatically executed, wherein the treatment strategy comprises the steps of sending out a notice, carrying out equipment linkage and creating a treatment work order.
Preferably, in the present invention, the process of generating the security event includes: acquiring detection, audit and flow logs and collecting third-party logs, respectively submitting the third-party logs to different analysis engines for behavior analysis according to log data protocols and sources, wherein the behavior analysis comprises security log analysis, DNS analysis, HTTP analysis, NetFlow analysis, mail analysis, AD domain analysis, SmbFlow analysis and file threat analysis, judging whether related IP, URL, domain name and file MD5 values are in a threat information white list, if so, finishing, otherwise, performing association analysis on threat information and generating a security event;
before performing behavior analysis on the safety detection log, judging whether the log belongs to a global white list, if so, discarding, and otherwise, marking the service attribute.
Preferably, in the present invention, the correlation analysis between the log data processing result and the threat intelligence information specifically includes: and querying a threat intelligence library according to the IP, URL, domain name or MD5 value information of the log data, and if the threat intelligence library is queried, returning the corresponding intelligence type, attack stage and threat level.
Preferably, in the invention, the security events after pre-screening are aggregated to obtain an aggregation list; the aggregation list includes: the failure level, threat level, risk host number and disposal state of the public field, and the risk host IP, host type, recent occurrence time and disposal state of the aggregated event field; and if at most one event is not processed, the aggregated handling state is not handled. And respectively outputting the statistical results and the variation trends of the events and the host according to the information of the aggregation list.
The technical scheme of the invention is as follows: analyzing different types of log data by analysis engines with different responsibilities to generate corresponding security events, and calculating risk values of risk hosts according to types of the hosts involved in the security events to determine risk levels of the hosts; the risk of the host is further analyzed, and output proposal and information display are carried out; for the risk host, the corresponding handling action is performed. The technical scheme at least has the following beneficial effects: performing systematic and comprehensive association analysis on log data from multiple sources to generate a security event; and further risk analysis is carried out on the host of the network security event to output more specific risk information, and finer-grained treatment suggestions and treatment actions are given.
Detailed Description
The technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.
To facilitate understanding of the embodiments of the present invention, related art terminology and the background are briefly described.
Traditional security defense mainly based on IDS, Firewall, VDS and other single-point defense actually divides network security into various security islands, and mutual correlation and cooperation are lacked. A network security situation awareness product is used for analyzing network security conditions and predicting network security trends by acquiring, extracting and fusing network environment elements (such as assets, network traffic, operation states, equipment alarms, vulnerability, security events, threat information and other data) which can cause network security state and trend changes in a large-scale network environment and utilizing analysis technologies such as data mining and the like, so as to assist emergency disposal and security decision-making.
The network security event is a situation that a potential hazard is formed to the information system and even the normal service provision of the information system is influenced due to human factors and defects or faults of software and hardware.
Threat intelligence is evidence-based knowledge, and comprises context, an attack mechanism, an attack index, revelation and feasible suggestions; existing, or imminent, threats or dangers to an asset are described and may be used to notify a subject to take some response to the relevant threat or danger; it is intended to provide the entity of the asset that faces the threat (typically the enterprise or organization to which the asset belongs) with comprehensive, accurate knowledge and information related thereto that can be performed and decided upon.
Vulnerabilities, vulnerabilities of the asset or assets that may be compromised, including vulnerabilities, unsafe configurations, and the like.
Network traffic, the collection of data packets generated on the network by the devices connected to the network (including various network devices, security devices, servers, etc.).
The association analysis is a rule that a user defines the association between various security events (log information, alarm information and the like) in terms of occurrence sequence, after-the-fact influence and the like according to the actual environment, and then makes a preventive response according to a known situation. Some association analysis rules such as the following: taking partial content of a single log as alarm information, wherein login, startup and shutdown occurring in the log can be taken as the alarm information; according to the frequency of special events in unit time, if the user password error occurs 3 times in 1 minute in the log, the user password can be cracked by brute force; the correlation analysis among the logs of the multiple devices can be used as a DDOS attack if a plurality of logs with the same IP address and different IP addresses are used as the logs.
Advanced persistent threat attacks are typically composed of multiple stages. For example, one of the dividing methods of the attack stage (link): investigation and tracking, load delivery, defense utilization, installation and implantation, communication control and osmotic damage.
Detection and tracking: an attacker knows personnel information, an IT framework, defense measures and the like of a target organization through social networks, social engineering and other modes, and the process is a 'stepping on point' stage before attack; common behavioral characteristics such as port scans, network scans, system scans, vulnerability scans, SSH scans, and so forth. An attacker collects information such as a target network topology structure, an IP distribution situation, network connection equipment information, server distribution situation and the like through Google Hacking, WHOIS, DNS query and a network topology scanner (such as Solar windows and the like).
Load delivery: based on the investigation and tracking result of the target, purchase or writeAiming at malicious codes attacking existing vulnerabilities of a target, performing escape testing to ensure that the attack can successfully bypass the existing protection system of the target organization; launching a spear attack by means of phishing mails, phishing webpages, USB storage and the like, inducing attack targets to click and downloading malicious codes prepared in advance;
common ways are: a DOS possible Memcached DDoS amplification query (set), a VOIP REGISTER message Flood UDP, a VOIP INVITE message Flood UDP, a GPL VOIP SIP INVITE message Flood, a DOS possible Sentinal LM amplification attack (request) inbound, a DOS DNS amplification attack inbound, a DOS possible NTP DDoS inbound frequent unverified MON _ LIST requests IMPL 0x03, and so on.
And (3) emergent defense utilization: the malicious codes are successfully implanted into equipment and a system of an attack target, and higher execution authority is obtained by utilizing vulnerabilities existing in the target equipment and the system; common ways are: brute force cracking, harpoon attack, water pit attack, U disk ferry, access malicious links and malicious mails.
Installing and implanting: and controlling the target equipment to download malicious software with richer functions by using the successfully obtained execution authority, and installing and starting the software.
And (3) communication control: command and control to be deployed remotely from an attacker after malware launch (C)&C) The server actively establishes connection and receives C&C, control signaling sent by the server; common are as follows: DNS hidden channel detection (legal DNS request base line, frequency and rule, information entropy and semantic identification), authority abnormity promotion, service monitoring and the like.
And (3) osmotic destruction: attacker pass through C&The C server controls the target equipment to initiate further malicious behaviors, such as scanning bugs of other equipment in the intranet, invading a new target, mining valuable data or externally transmitting stolen data; common modes of penetration are: TROJAN Windows executable base64 code, INFO suspected Mozilla user agent-possible fake (Mozilla/4.0), malline suspected user agent, etpoliwin 32/Sogou user agent (Sogou _ UPDATER), malline-CNC win.
And in different attack stages, the threat of the equipment to the network is different. As an example, when the behavior of the attack conforms to the last two phases (i.e., "communication control" or "penetration destruction" phases), the device may be defined as lost, where the device has a greater threat; the devices conforming to the first two stages (i.e., "investigation and tracking" or "load delivery" stage) are relatively less threatening and are low suspicious; and the devices conforming to the two intermediate stages (i.e., the "defense utilization" and "installation placement" stages) are mostly between low suspicious and lost, and are defined as high suspicious. It should be noted here that the foregoing attacking or attacked device includes various network accessible devices such as a server, a router, a switch, and a PC.
The embodiment of the security event processing method is one of important components of a situation awareness product, analysis engines with different responsibilities analyze different types of data to generate security events with corresponding levels, then a risk host is calculated by combining asset vulnerability and analysis center data, and then analysis display and corresponding handling behaviors are performed according to two perspectives of the security events and the risk host.
As shown in fig. 1, a method for processing network security events mainly includes: different analysis engines are called to respectively process log data of different protocols or different sources, and the processing result and threat information are subjected to correlation analysis to generate a security event; and determining host risk values in the security events, and executing preset corresponding-level handling actions on the risk hosts reaching the specific risk values.
The process of generating the security event according to S100 and S200 is as shown in fig. 2:
and acquiring a security detection log, a security audit and a network flow log, collecting a third-party log (such as other network equipment, security equipment, an operating system log and the like), storing the third-party log into Kafka message middleware, judging whether log data are in a global white list, if so, ending, and otherwise, carrying out the next step.
And the Flink engine processes the data stream, including marking a service label for the data, wherein the service label comprises time, a protocol, a source (including an equipment IP), an internal/external network and the like, judging whether the data stream is in a host detection white list or not according to the service label, if so, ending, and otherwise, carrying out the next step.
And respectively submitting the log data to different analysis engines for behavior analysis according to the protocol and the source of the log data, wherein the behavior analysis specifically comprises security log analysis, DNS analysis, HTTP analysis, NetFlow analysis, mail analysis, AD domain analysis, SmbFlow analysis, file threat analysis and the like. And further judging whether the IP, URL, domain name and the MD5 value related to the analysis result are in a threat information white list, if so, ending, otherwise, carrying out correlation analysis on the IP, URL, domain name and MD5 value and generating a security event.
As a preferred embodiment, the correlation analysis between the log data processing result and the threat intelligence information specifically includes: and querying a threat intelligence library according to the IP, URL, domain name or MD5 value information of the log data, and if the threat intelligence library is queried, returning the corresponding intelligence type, attack stage and threat level.
In another preferred embodiment, the data processed by the Flink engine is stored as original log information.
Calculating a risk value of the risk host, specifically including the following:
extracting host behavior characteristics from log data, and determining the attack stage of the host, wherein the higher the attack stage of the host is, the higher the collapse level is; extracting external attack behavior characteristics from log data, and judging that the larger the attack threat is, the higher the threat level of the host computer to the intranet is according to threat information; the more serious the vulnerability of the host is determined according to vulnerability scanning, the higher the vulnerability risk of the host.
Determining the host risk value, firstly judging whether the host type is a server or a terminal according to the IP, and,
if the host is a server, the following steps are carried out: determining a risk value of the host according to the collapse grade of the host, the threat grade of the host to an intranet and the vulnerability grade of the host;
if the host is a terminal, the following steps are carried out: the risk value of the host is determined according to the defect level of the host, the threat level of the host to the intranet and the threat level of the file/mail.
As a preferred embodiment, the level of vulnerability includes lost, high suspicious and low suspicious, the level of threat includes high threat, medium threat and low threat, the level of vulnerability includes severe, high risk, medium risk, low risk and security for evaluating the host vulnerability level;
the host risk value is positively correlated with the collapse grade; when the collapse grades are the same, the risk value is positively correlated with the threat grade;
and when the failure levels of the servers are low and suspicious, determining that the risk values are high threat, medium threat, low threat, serious or high risk vulnerability, medium risk or low risk vulnerability in turn from large to small.
For example, tables 1 and 2 below show one way to calculate the risk value for the risk host.
TABLE 1 calculation of risk values for servers
Has lost its fall 10
| Occurrence of a lost event with a high threat level
|
Has lost the subsidence 9
| Event of a failed threat with medium threat level
|
Has lost its fall 8
| Event that has been lost and has a threat level of low threat occurs
|
High risk 7
| Occurrence of highly suspicious events with low threat level
|
High risk 6
| Event with high suspicion and medium threat level
|
High risk 5
| Occurrence of highly suspicious events with low threat level
|
Middle risk 4
| Suffering from external high risk events
|
Low risk 3
| Occurrence of low suspicious events
|
Low risk 2
| The vulnerability risks such as high-risk loopholes, configuration risks, WEB plaintext transmission or weak passwords exist
|
Information 1
| Only has middle-low risk loopholes |
TABLE 2 calculation of terminal Risk values
Has lost its fall 10
| Occurrence of a lost event with a high threat level
|
Has lost the subsidence 9
| Event of a failed threat with medium threat level
|
Has lost its fall 8
| Event that has been lost and has a threat level of low threat occurs
|
High risk 7
| Occurrence of highly suspicious events with low threat level
|
High risk 6
| Event with high suspicion and medium threat level
|
High risk 5
| Occurrence of highly suspicious events with low threat level
|
Middle risk 4
| Threatened by external virus files or malicious mails
|
Low risk 3
| Occurrence of highly suspicious and threat-rated high threat events
|
Low risk 2
| Event that is suspicious in occurrence and has threat level of medium threat
|
Information 1
| Occurrence of low suspicious event with low threat level |
As another embodiment, according to the host risk value, a risk rating of a security domain to which the host belongs may be determined, which specifically includes: and when the host with a specific risk value appears, deducting the corresponding points from the total points of the security domain until the deduction points reach the upper limit, and determining the grades according to the residual points of the security domain.
For example, the risk hosts of the whole network are ranked according to regions, and are divided into 4 grades, namely, a good grade (100 grades), (91-100 grades), a good grade (81-90 grades), a medium grade (61-80 grades) and a poor grade (60 grades and below), wherein the total grades are divided into 100 grades; table 3 shows one of the scoring criteria (of course, the scoring rules could be in other forms).
TABLE 3 Security Domain score criteria
Button item
| Score value
| Upper limit of deduction
|
Lost host
| 10
| 100
|
High-risk host
| 3
| 39
|
Medium-risk host
| 2
| 19
|
Low-risk host
| 1
| 9
|
InformationMain unit
| 0.1
| 2 |
In addition, the safety event processing method further comprises the steps of outputting a treatment suggestion according to the risk analysis of the host; the risk analysis content comprises a host threat range, an attack time axis, an attack chain tracing source and a host access relation, wherein,
the host threat range comprises attack and abnormal access of the host to other hosts in the intranet, and IP and/or URL connected with the intranet by the host;
the attack timeline comprises the following time points for judging specific events: a point of failure and a point of attack;
the attack chain tracing comprises tracing the attack behavior of the risk host, and distinguishing indirect and direct attack sources from an internal network and an external network;
the host access relation comprises determining the transverse network access of the host according to the flow log so as to determine the potential threat of the risk host;
the treatment suggestion comprises a preset treatment strategy which is manually or automatically executed, and comprises the steps of sending out a notice, carrying out equipment linkage and creating a treatment work order.
Preferably, in the invention, the security events after pre-screening are aggregated to obtain an aggregation list; the aggregation list includes: the failure level, threat level, risk host number and disposal state of the public field, and the risk host IP, host type, recent occurrence time and disposal state of the aggregated event field; and if at most one event is not processed, the aggregated handling state is not handled. And respectively outputting the statistical results and the variation trends of the events and the host according to the information of the aggregation list.
The technical scheme is as follows: analyzing different types of log data by analysis engines with different responsibilities to generate corresponding security events, and calculating risk values of risk hosts according to types of the hosts involved in the security events to determine risk levels of the hosts; the risk of the host is further analyzed, and output proposal and information display are carried out; for the risk host, the corresponding handling action is performed. The technical scheme at least has the following beneficial effects: performing systematic and comprehensive association analysis on log data from multiple sources to generate a security event; and further risk analysis is carried out on the host computer of the network security event to output more specific risk information and give treatment suggestions.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by a program instructing associated hardware, and the program may be stored in a computer-readable storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.