CN112688973A - Network space asset description method based on fingerprint technology - Google Patents

Network space asset description method based on fingerprint technology Download PDF

Info

Publication number
CN112688973A
CN112688973A CN202110300746.4A CN202110300746A CN112688973A CN 112688973 A CN112688973 A CN 112688973A CN 202110300746 A CN202110300746 A CN 202110300746A CN 112688973 A CN112688973 A CN 112688973A
Authority
CN
China
Prior art keywords
fingerprint
cyberspace
application layer
assets
protocol stack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110300746.4A
Other languages
Chinese (zh)
Inventor
权晓文
韩卫东
王忠新
聂晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Webray Beijing Network Safety Technology Co ltd
Original Assignee
Webray Beijing Network Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Webray Beijing Network Safety Technology Co ltd filed Critical Webray Beijing Network Safety Technology Co ltd
Priority to CN202110300746.4A priority Critical patent/CN112688973A/en
Publication of CN112688973A publication Critical patent/CN112688973A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a network space asset description method based on a fingerprint technology, which comprises the following steps: describing the network space assets through the constructed equipment fingerprint model; the device fingerprint model is formed by combining different protocol stack fingerprints and at least one application layer fingerprint, and is shown in the following formula: FP(apparatus)=FP(protocol stack fingerprint)+{FP1(application layer fingerprint)…FPn(application layer fingerprint)}. Different cyberspace assets are expressed through an equipment fingerprint model formed by combining different protocol stack fingerprints and at least one application layer fingerprint, so that the expression of the cyberspace assets has standard and normative properties, and the subsequent identification and classification of the cyberspace assets are facilitated.

Description

Network space asset description method based on fingerprint technology
Technical Field
The invention relates to the technical field of network space asset description, in particular to a network space asset description method based on a fingerprint technology.
Background
With the rise of the concepts of the internet of things, the 5G network and the cyberspace, cyberspace assets are gradually developed into new fields. The definition of information assets in ISO27001 has not been able to accommodate the evolving demands of network space.
ISO27001 classifies assets including: 1) information assets, database files, system documents, user manuals, training materials, operational or support procedures, etc. 2) Software assets: applications, system software, development tools, and utilities. 3) And (3) entity assets: computer device (processor, monitor, notebook, modem) 4) written document: including system files, instruction manuals, various programs and guide files, contract books, etc.; 5) service: computing and communication services, general-purpose devices such as heaters, lighting, power supplies, and air conditioners.
The comb ISO27001 defines information assets, and the discovery information asset definition describes related goals related to informatization from a static dimension. However, the expression form of the cyberspace asset is a behavior state expressed based on a TCP/IP protocol stack, and the information asset with the network behavior expression characteristic is called the cyberspace asset.
CyberSpace (CyberSpace) assets are distinct from information assets, and CyberSpace assets are representations of information assets in CyberSpace. The identification of the cyberspace assets is the first step of cyberspace management, however, the information asset category defined by ISO27001 cannot correctly describe the cyberspace assets, and meanwhile, the industry boundary has no unified standard definition and related specifications for the cyberspace assets, so that the cyberspace asset identification and classification have respective aspects.
Disclosure of Invention
An object of the present invention is to solve at least the above problems and to provide at least the advantages described later.
It is still another object of the present invention to provide a method for describing cyberspace assets based on fingerprint technology, which expresses different cyberspace assets through a device fingerprint model composed of different protocol stack fingerprints and at least one application layer fingerprint combination, so that the expression of cyberspace assets has standardization and normalization, and facilitates the subsequent identification and classification of cyberspace assets.
To achieve these objects and other advantages and in accordance with the purpose of the invention, as embodied and broadly described herein, there is provided a method for describing a cyberspace asset based on a fingerprint technology, comprising:
describing the network space assets through the constructed equipment fingerprint model;
the device fingerprint model is formed by combining different protocol stack fingerprints and at least one application layer fingerprint, as shown in formula 1:
FP(apparatus)=FP(protocol stack fingerprint)+ { FP1(application layer fingerprint)… FPn(application layer fingerprint)Equation 1.
Preferably, in the method for describing a cyberspace asset based on a fingerprint technology, the protocol stack fingerprint at least includes a TOS field of an IP Header, a TTL variable, a DF flag bit of the IP Header, and four factors of Windows/Windows Size; the application layer fingerprint at least comprises two factors of a service name and a service version number.
A cyberspace asset description device based on fingerprint technology comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the cyberspace asset description method based on fingerprint technology as described above when executing the computer program.
A computer-readable storage medium, storing a computer program which, when executed by a processor, implements the steps of the method for network-space asset description based on fingerprinting technology as described above.
The invention at least comprises the following beneficial effects:
in the method for describing the cyberspace asset based on the fingerprint technology, the cyberspace asset is the expression of the information asset in the cyberspace, in short, the information asset which is in an operable state and has a network exposed surface is called the cyberspace asset, and the exposed surface of the cyberspace asset is expressed as three basic elements of an IP address, a protocol and a service port, so that different cyberspace assets in the current cyberspace are expressed by an equipment fingerprint model which is formed by combining different protocol stack fingerprints and at least one application layer fingerprint based on a TCP/IP protocol model, the expression of the cyberspace asset has standard and normative, and the subsequent identification and classification of the cyberspace asset are convenient.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Drawings
FIG. 1 is a fingerprint classification model of a cyberspace asset description method based on fingerprint technology according to the present invention;
FIG. 2 is a diagram of TCP/IP data format.
Detailed Description
The present invention is further described in detail below with reference to the attached drawings so that those skilled in the art can implement the invention by referring to the description text.
It should be understood that terms such as "having," "including," and "comprising," as used herein, do not preclude the presence or addition of one or more other elements or groups thereof, and that various approximations, non-ideal modifications, or changes in the configuration of non-critical elements are within the scope of the present application.
As shown in fig. 1, the present invention provides a method for describing a cyberspace asset based on a fingerprint technology, which includes:
describing the network space assets through the constructed equipment fingerprint model;
the device fingerprint model is formed by combining different protocol stack fingerprints and at least one application layer fingerprint, as shown in formula 1:
FP(apparatus)=FP(protocol stack fingerprint)+ { FP1(application layer fingerprint)… FPn(application layer fingerprint)Equation 1.
In the above scheme, the TCP/IP protocol is an important part of the implementation of the operating system, or the TCP/IP characteristics and characteristics represent different types of operating systems, and the application layer fingerprint is an abstract expression of the application layer service, and the application and the expression methods are different. The application layer sends the associated data packet according to the opened service port, and detects the obtained response data packet, so as to judge the application layer attribute of the response target, and can obtain information such as a service name, a service version number and the like. For example, as shown in fig. 1, the fingerprint of a Juniper firewall device is described as: juniper SRX3600 = FreeBSD + AppWeb + PostgreSQL + title.
In a preferred scheme, the protocol stack fingerprint at least comprises a TOS field of an IP Header, a TTL variable, a DF zone bit of the IP Header and four factors of Windows/Windows Size; the application layer fingerprint at least comprises two factors of a service name and a service version number.
In the above solution, fig. 2 is a format diagram of a TCP/IP packet, and when analyzing the format of the TCP/IP packet, 13 variables of 20 bytes of the IP Header form a behavior combination below the network layer of the operating system; the 13 variables 20 bytes of the TCP Header form the network layer representation of the transport layer, and one or more of these total 26 variables form the core elements of the protocol stack identifying the operating system. The TOS field of the IP Header, the TTL variable, the DF flag of the IP Header, and the Windows/Windows Size may be considered as main elements for identification, specifically because: the TOS field has four different values: minimize Delay, Maximize Throughput, Maximize Reliability, and Minimize money Cost; TTL is a variable that traditionally marks different operating systems. For example: windows defaults to 128, Linux defaults to 64, and so on; the DF bit of the IP Header is a mark for setting whether to fragment or not, not fragment or multi-fragment, and the DF bit is processed differently when different protocol stacks process different data packets; and the field Windows/Windows Size is used to indicate the Size of the TCP stack buffer packet, and different operating systems have different processing methods for WSS and Windows, as shown in table 1:
TABLE 1 different operating System protocol Stack characteristics
Figure 572837DEST_PATH_IMAGE001
It can be seen that the protocol stack fingerprint is identified by a relatively accurate method, and by analyzing the exposed surfaces of different operating systems, the port and the service are only exposed information, and the port and the service depend on the TCP/IP protocol stack implementation.
Such as Ripple20 from the last burst: the Treck TCP/IP protocol stack is widely used in embedded and internet of things devices, affecting multiple industries including medical, transportation, energy, telecommunications, industrial control, retail, and commerce, involving well-known vendors including HP, Schneider Electric, Intel, Rockwell Automation, Caterpillar, Baxter, etc. Then how to quickly and accurately identify the device using the Ripple20 protocol stack. It was found that the Treck protocol stack customized a type 165(0xa5) ICMP packet and responded with a type 166 ICMP packet once a 165 ICMP packet is received. Sending an ICMP packet with type =0xa5 and code =0 to a target system, and receiving ICMP response packet data returned by the target, wherein type =0xa6 and code =0, six bytes after the 9 th byte of the ICMP packet are 0x01,0x51,0x35,0x28,0x57,0x32 (large end) or 0x51,0x01,0x28,0x35,0x32 and 0x57 (small end). And if the condition is met, the target equipment is indicated to be a Treck protocol stack.
And the application layer sends a related data packet to the open service port and detects the obtained response data packet, so that the application layer attribute of the response target is judged, and information such as the service name, the service version number and the like can be obtained. Such as the target system opening 3389 port, by detecting 3389 negotiation protocol for sending TCP, and confirming 3389 whether it is RDP protocol by feedback.
A cyberspace asset description device based on fingerprint technology comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the cyberspace asset description method based on fingerprint technology as described above when executing the computer program.
In the above scheme, the network space asset description device based on fingerprint technology may be a robot. The fingerprint-based cyber-space asset description device may include, but is not limited to, a processor, a memory, for example, the fingerprint-based cyber-space asset description device may also include an input-output device, a network access device, a bus, etc. The processor may be a central processing unit, other general purpose processors, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The storage may be an internal storage unit of the webspace asset description device based on the fingerprint technology, for example, a hard disk or a memory of the webspace asset description device based on the fingerprint technology. The memory may also be an external storage device of the network space asset description device based on fingerprint technology, such as a plug-in hard disk, a smart memory card, a secure digital card, a flash memory card, etc. provided on the network space asset description device based on fingerprint technology.
A computer-readable storage medium, storing a computer program which, when executed by a processor, implements the steps of the method for network-space asset description based on fingerprinting technology as described above.
In the above solution, the memory may further include both an internal storage unit and an external storage device of the webspace asset description device based on the fingerprint technology, and the memory is used for storing the computer program and other programs and data required by the webspace asset description device based on the fingerprint technology.
While embodiments of the invention have been described above, it is not limited to the applications set forth in the description and the embodiments, which are fully applicable in various fields of endeavor to which the invention pertains, and further modifications may readily be made by those skilled in the art, it being understood that the invention is not limited to the details shown and described herein without departing from the general concept defined by the appended claims and their equivalents.

Claims (4)

1. A network space asset description method based on fingerprint technology is characterized by comprising the following steps:
describing the network space assets through the constructed equipment fingerprint model;
the device fingerprint model is formed by combining different protocol stack fingerprints and at least one application layer fingerprint, as shown in formula 1:
FP(apparatus)=FP(protocol stack fingerprint)+ { FP1 (application layer fingerprint)… FPn (application layer fingerprint)Equation 1.
2. The method for describing cyberspace assets based on fingerprint technology according to claim 1, wherein the protocol stack fingerprint comprises at least TOS field of IP Header, TTL variable, DF flag bit of IP Header, and Windows/Windows Size four factors; the application layer fingerprint at least comprises two factors of a service name and a service version number.
3. A cyberspace asset description device based on fingerprinting technology, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor, when executing the computer program, implements the steps of the method according to any of claims 1 and 2.
4. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 and 2.
CN202110300746.4A 2021-03-22 2021-03-22 Network space asset description method based on fingerprint technology Pending CN112688973A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110300746.4A CN112688973A (en) 2021-03-22 2021-03-22 Network space asset description method based on fingerprint technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110300746.4A CN112688973A (en) 2021-03-22 2021-03-22 Network space asset description method based on fingerprint technology

Publications (1)

Publication Number Publication Date
CN112688973A true CN112688973A (en) 2021-04-20

Family

ID=75455706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110300746.4A Pending CN112688973A (en) 2021-03-22 2021-03-22 Network space asset description method based on fingerprint technology

Country Status (1)

Country Link
CN (1) CN112688973A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114070760A (en) * 2021-11-16 2022-02-18 北京知道创宇信息技术股份有限公司 Network space asset mapping method and device, network space asset database and computer readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801980B1 (en) * 2003-05-12 2010-09-21 Sourcefire, Inc. Systems and methods for determining characteristics of a network
CN109726763A (en) * 2018-12-29 2019-05-07 北京神州绿盟信息安全科技股份有限公司 A kind of information assets recognition methods, device, equipment and medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801980B1 (en) * 2003-05-12 2010-09-21 Sourcefire, Inc. Systems and methods for determining characteristics of a network
CN109726763A (en) * 2018-12-29 2019-05-07 北京神州绿盟信息安全科技股份有限公司 A kind of information assets recognition methods, device, equipment and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114070760A (en) * 2021-11-16 2022-02-18 北京知道创宇信息技术股份有限公司 Network space asset mapping method and device, network space asset database and computer readable storage medium

Similar Documents

Publication Publication Date Title
US8881271B2 (en) System and method for forensic identification of elements within a computer system
EP3301595A1 (en) Browser extension for contemporaneous in-browser tagging and harvesting of internet content
US20080196016A1 (en) Processing of Expressions
CN108614862A (en) Real-time tag treating method and apparatus based on stream calculation engine
CN112688973A (en) Network space asset description method based on fingerprint technology
US10970391B2 (en) Classification method, classification device, and classification program
CN117171711B (en) Cloud platform-based enterprise internal and external data fusion sharing method and system
De Lucia et al. Identifying and detecting applications within TLS traffic
Jung et al. Deep neural network-based automatic unknown protocol classification system using histogram feature
CN115378619A (en) Sensitive data access method, electronic equipment and computer readable storage medium
CN112436980A (en) Method, device and equipment for reading test data packet and storage medium
EP2214099A1 (en) Method for software package deployment in a network node
US20160357918A1 (en) User-configurable radiological data transformation, routing and archiving engine
CN113595959B (en) Network traffic data processing method and server
Taghiyarrenani et al. Domain adaptation with maximum margin criterion with application to network traffic classification
CN115378806A (en) Flow distribution method and device, computer equipment and storage medium
CN114896293A (en) Data integration management method and device, storage medium and electronic equipment
Thomsen et al. Smart lamp or security camera? Automatic identification of IoT devices
US11140183B2 (en) Determining criticality of identified enterprise assets using network session information
CN110134909B (en) Curved surface drawing method, equipment, storage medium and device
US20110202317A1 (en) Information Technology Infrastructure Architecture Design
CN111143291A (en) Encrypted file searching method and device and electronic equipment
CN117596029A (en) Attack surface analysis method and device
CN114724069B (en) Video equipment model confirming method, device, equipment and medium
CN114679339B (en) Internet of things asset scoring method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210420

RJ01 Rejection of invention patent application after publication