CN113079180A - Execution context based firewall fine-grained access control method and system - Google Patents

Execution context based firewall fine-grained access control method and system Download PDF

Info

Publication number
CN113079180A
CN113079180A CN202110424080.3A CN202110424080A CN113079180A CN 113079180 A CN113079180 A CN 113079180A CN 202110424080 A CN202110424080 A CN 202110424080A CN 113079180 A CN113079180 A CN 113079180A
Authority
CN
China
Prior art keywords
access control
execution context
information
firewall
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110424080.3A
Other languages
Chinese (zh)
Other versions
CN113079180B (en
Inventor
刘颖
范渊
吴永越
郑学新
刘韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN202110424080.3A priority Critical patent/CN113079180B/en
Publication of CN113079180A publication Critical patent/CN113079180A/en
Application granted granted Critical
Publication of CN113079180B publication Critical patent/CN113079180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Abstract

The invention discloses a firewall fine-grained access control method and a firewall fine-grained access control system based on execution context. According to the firewall access control method and the firewall access control device, the agent installed on the terminal acquires the execution context information, so that firewall access control can be performed with finer granularity, particularly, when a network or the terminal is invaded, possible attack behaviors can still be effectively detected, the firewall detection accuracy can be greatly improved, and the firewall access control method and the firewall access control device have better practicability.

Description

Execution context based firewall fine-grained access control method and system
Technical Field
The invention belongs to the technical field of data security protection, and particularly relates to a firewall fine-grained access control method and system based on execution context.
Background
The network firewall is deployed on the network boundary, checks data messages flowing through the network firewall, and blocks or releases the messages. The minimum granularity of access control in a general firewall access control technology is a host (identified by a network address, such as an IP address, a MAC address, and the like), and a security policy can prevent or pass access of a certain host to a certain application. However, this access control policy cannot accurately block or pass access from a certain user of a certain host. Fine-grained access control the minimum granularity can be based on user access control (such as a user name), so that the security policy can be more accurate.
The existing network firewall determines whether the data packet is an abnormal flow by analyzing the data packet flowing through the firewall, for example, rejecting the data packet from the source ip address of 1.1.1.1 and addressed to the destination address of 2.2.2.2 and the tcp port 80. However, as attacks become more complex, there are significant limitations to this type of protection. For example: a hacker may forge the source IP address by means of ARP spoofing or the like, thereby bypassing the check of the above-mentioned guard wall. Thus, the firewall needs to know whether a piece of data is really coming from a device, not a fake device. In addition, a hacker may also directly invade the target device, launch an attack through the real target device, and in order to defend such an attack, the firewall needs to know context environment information when a certain section of data is sent, such as a process, a thread, a call stack and the like for sending the data. Since the execution context information is not included in the normal data, such fine-grained access control is impossible in the conventional firewall.
In view of the above disadvantages, the present invention completes the collection of the execution context information through the agent program installed in the terminal, because all information on the terminal is complete, and a certain network access is necessarily performed by a certain user on the operating system through executing a certain program, and the information does not appear in the application traffic, but can be found in the agent.
The invention also provides a method for encapsulating the execution context information and the user data together in the tunnel and sending the encapsulated execution context information and the user data, so that the firewall can simultaneously receive the user data and the execution context after unlocking the tunnel, and the firewall knows which user, which process and which equipment send a certain section of user data, and can carry out fine-grained access control.
Disclosure of Invention
The invention aims to provide a firewall fine-grained access control method based on execution context, and aims to solve the problems.
The invention also aims to provide a firewall fine-grained access control system based on the execution context, so as to realize more accurate fine-grained access control.
The invention is mainly realized by the following technical scheme: a firewall fine-grained access control method based on execution context intercepts a data sending request through an agent deployed on a terminal to obtain execution context information of a data sender, and injects the information into normal data in a tunnel mode, and the firewall end obtains the execution context information by unlocking the tunnel and analyzes the normal data and the corresponding execution context information to perform fine-grained access control.
In order to better implement the present invention, further, the execution context information includes any one or more of device information, user information, process information, and call stack information; the device information is used for uniquely identifying one device, the user information is used for determining a user sending the current data, the process information is used for identifying a program sending the current data, and the call stack information is used for distinguishing whether a malicious program sends the data in a code injection mode.
To better implement the present invention, further, the device information includes a device ID and/or a device fingerprint, the user information includes a user ID and/or a user group ID, and the process information includes any one or more of a process name, a process ID, and a process executable file.
In order to better implement the present invention, further, the agent is deployed in a kernel layer of an operating system of the terminal device, the agent intercepts message transmission through a hook function, then collects current execution context information, then encapsulates the current execution context information and a normal message in different tunnels, and finally invokes an original message transmission function to complete message transmission.
In order to better implement the present invention, further, after the firewall end receives the data, the firewall end first splits the received data into different tunnels, then separates the normal data and the corresponding execution context information from the tunnels, and the access control engine identifies the attack according to the corresponding access control rule.
The invention is mainly realized by the following technical scheme: a firewall fine-grained access control system based on execution context comprises an agent deployed at a terminal, wherein the agent comprises a message sending hook function module and a context acquisition module, and a firewall end comprises a tunnel decapsulation module and an access control engine; the message sending hook function module intercepts a message, collects current execution context information through a context collection module, then packages the current execution context information and a normal message in different tunnels, and finally calls an original message sending function to finish sending the message; the tunnel decapsulation module decapsulates the received data to obtain a normal data message and corresponding execution context information, and the access control engine performs corresponding identification according to a fine-grained access control rule.
The fine-grained access control rule mentioned in the invention not only includes the information of traditional firewalls such as source address and destination address, but also includes the execution context information such as equipment information, user information, process information and call stack information. Thus, finer-grained access control can be performed against increasingly complex attack behavior.
The invention has the beneficial effects that:
according to the firewall access control method and the firewall access control system, the execution context information is collected by the Agent installed on the terminal, so that firewall access control can be performed with finer granularity, particularly, when a network or the terminal is invaded, possible attack behaviors can still be effectively detected, the firewall detection accuracy can be greatly improved, and the firewall access control method and the firewall access control system have better practicability.
Drawings
FIG. 1 is a schematic diagram of prior art data transmission;
FIG. 2 is a schematic diagram of the present invention for transmitting data;
fig. 3 is a schematic diagram of the firewall side parsing data.
Detailed Description
Example 1:
a firewall fine-grained access control method based on execution context intercepts a data sending request through an agent deployed on a terminal to obtain execution context information of a data sender, and injects the information into normal data in a tunnel mode, and the firewall end obtains the execution context information by unlocking the tunnel and analyzes the normal data and the corresponding execution context information to perform fine-grained access control.
According to the firewall access control method and the firewall access control system, the execution context information is collected by the Agent installed on the terminal, so that firewall access control can be performed with finer granularity, particularly, when a network or the terminal is invaded, possible attack behaviors can still be effectively detected, the firewall detection accuracy can be greatly improved, and the firewall access control method and the firewall access control system have better practicability.
Example 2:
in this embodiment, optimization is performed on the basis of embodiment 1, where the execution context information includes any one or more of device information, user information, process information, and call stack information; the device information is used for uniquely identifying one device, the user information is used for determining a user sending the current data, the process information is used for identifying a program sending the current data, and the call stack information is used for distinguishing whether a malicious program sends the data in a code injection mode.
Further, the device information includes a device ID and/or a device fingerprint, the user information includes a user ID and/or a user group ID, and the process information includes any one or more of a process name, a process ID, and a process executable file.
Other parts of this embodiment are the same as embodiment 1, and thus are not described again.
Example 3:
the embodiment is optimized based on embodiment 1 or 2, and as shown in fig. 2 and fig. 3, the agent is deployed in a kernel layer of an operating system of a terminal device, and the agent intercepts packet transmission through a hook function, then collects current execution context information, then encapsulates the current execution context information and a normal packet in different tunnels, and finally invokes an original packet transmission function to complete packet transmission.
Furthermore, after the firewall side receives the data, the firewall side firstly splits the received data into different tunnels, then normal data and corresponding execution context information are separated from the tunnels, and the access control engine identifies attacks according to corresponding access control rules.
According to the firewall access control method and the firewall access control system, the execution context information is collected by the Agent installed on the terminal, so that firewall access control can be performed with finer granularity, particularly, when a network or the terminal is invaded, possible attack behaviors can still be effectively detected, the firewall detection accuracy can be greatly improved, and the firewall access control method and the firewall access control system have better practicability.
The rest of this embodiment is the same as embodiment 1 or 2, and therefore, the description thereof is omitted.
Example 4:
a firewall fine-grained access control system based on execution context is disclosed, as shown in FIG. 2 and FIG. 3, and comprises an agent deployed at a terminal, wherein the agent comprises a message sending hook function module and a context acquisition module, and the firewall end comprises a tunnel decapsulation module and an access control engine; the message sending hook function module intercepts a message, collects current execution context information through a context collection module, then packages the current execution context information and a normal message in different tunnels, and finally calls an original message sending function to finish sending the message; the tunnel decapsulation module decapsulates the received data to obtain a normal data message and corresponding execution context information, and the access control engine performs corresponding identification according to a fine-grained access control rule.
Comparing fig. 1 and fig. 2, the present invention collects the execution context information through the Agent installed in the terminal, and the present invention can perform firewall access control with finer granularity, especially when the network or the terminal is invaded, the present invention can still effectively detect possible attack behaviors, can greatly improve the accuracy of firewall detection, and has better practicability.
Example 5:
a firewall fine-grained access control method based on execution context intercepts a data sending request by deploying an agent at a terminal, acquires execution context information of a data sender, and injects the information into normal data in a tunnel mode. And obtaining execution context information at one end of the firewall by opening the tunnel, and analyzing the normal data and the execution context information corresponding to the normal data to perform fine-grained access control.
Comparing fig. 1 and fig. 2, the agent program is installed on the terminal, when sending data, the agent program obtains the current execution context, and injects the execution context data into the normal data, when detecting the firewall, the normal data and the execution context are separated, and the malicious attack is detected and blocked, and the harmless data is released.
The execution context information that the agent of the present invention needs to collect includes but is not limited to:
the device information, including device ID, device fingerprint, etc., is used to uniquely identify a device.
The user information includes a user ID, a user group ID, etc. for which user is transmitting the current data.
The process information, including process name, process ID, process executable, etc., is used to identify which program is sending the current data.
The call stack information is a call stack (callstack) condition during data transmission, and can be used to distinguish whether a malicious program transmits data by means of code injection (code injection).
The Agent is deployed in a kernel layer of the terminal equipment operating system, and when data is sent, the Agent obtains execution and acquires current execution context information. The agent kernel module intercepts message transmission through a hook function, then acquires the current execution context through the context acquisition module, then encapsulates the current execution context and a normal message in different tunnels, and finally calls the original message transmission function to finish message transmission.
After receiving the data, the firewall needs to first split the received data into different tunnels, and then separate the normal data and the corresponding execution context information from the tunnels. The access control engine then identifies possible attacks based on the corresponding access control rules.
The fine-grained access control rule not only comprises information of a source address, a destination address and other traditional firewalls, but also comprises execution context information such as equipment information, user information, process information, call stack information and the like. Thus, finer-grained access control can be performed against increasingly complex attack behavior.
According to the firewall access control method and the firewall access control system, the execution context information is collected by the Agent installed on the terminal, so that firewall access control can be performed with finer granularity, particularly, when a network or the terminal is invaded, possible attack behaviors can still be effectively detected, the firewall detection accuracy can be greatly improved, and the firewall access control method and the firewall access control system have better practicability.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (6)

1. A firewall fine-grained access control method based on execution context is characterized in that an agent deployed on a terminal intercepts a data sending request to obtain execution context information of a data sender, the information is injected into normal data in a tunnel mode, the firewall side obtains the execution context information by unlocking the tunnel, and the normal data and the corresponding execution context information are analyzed to perform fine-grained access control.
2. The firewall fine-grained access control method based on execution context according to claim 1, characterized in that the execution context information includes any one or more of device information, user information, process information, call stack information; the device information is used for uniquely identifying one device, the user information is used for determining a user sending the current data, the process information is used for identifying a program sending the current data, and the call stack information is used for distinguishing whether a malicious program sends the data in a code injection mode.
3. The execution context based firewall fine-grained access control method according to claim 2, characterized in that the device information comprises a device ID and/or a device fingerprint, the user information comprises a user ID and/or a user group ID, and the process information comprises any one or more of a process name, a process ID, and a process executable file.
4. The firewall fine-grained access control method based on execution context according to any one of claims 1 to 3, characterized in that the agent is deployed in a kernel layer of a terminal device operating system, the agent intercepts packet transmission through a hook function, then collects current execution context information, then encapsulates the current execution context information and a normal packet in different tunnels, and finally invokes an original packet transmission function to complete packet transmission.
5. The fine-grained access control method for firewalls based on execution context as claimed in claim 4, wherein after receiving the data, the firewall splits the received data into different tunnels, then separates the normal data and the corresponding execution context information from the tunnels, and the access control engine identifies the attack according to the corresponding access control rules.
6. A firewall fine-grained access control system based on execution context is characterized by comprising an agent deployed at a terminal, wherein the agent comprises a message sending hook function module and a context acquisition module, and the firewall end comprises a tunnel decapsulation module and an access control engine; the message sending hook function module intercepts a message, collects current execution context information through a context collection module, then packages the current execution context information and a normal message in different tunnels, and finally calls an original message sending function to finish sending the message; the tunnel decapsulation module decapsulates the received data to obtain a normal data message and corresponding execution context information, and the access control engine performs corresponding identification according to a fine-grained access control rule.
CN202110424080.3A 2021-04-20 2021-04-20 Execution context based firewall fine-grained access control method and system Active CN113079180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110424080.3A CN113079180B (en) 2021-04-20 2021-04-20 Execution context based firewall fine-grained access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110424080.3A CN113079180B (en) 2021-04-20 2021-04-20 Execution context based firewall fine-grained access control method and system

Publications (2)

Publication Number Publication Date
CN113079180A true CN113079180A (en) 2021-07-06
CN113079180B CN113079180B (en) 2023-03-10

Family

ID=76618356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110424080.3A Active CN113079180B (en) 2021-04-20 2021-04-20 Execution context based firewall fine-grained access control method and system

Country Status (1)

Country Link
CN (1) CN113079180B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116668164A (en) * 2023-06-26 2023-08-29 中国电子信息产业集团有限公司第六研究所 Industrial firewall security isolation detection processing method, system and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447627A (en) * 2011-12-05 2012-05-09 上海顶竹通讯技术有限公司 Message encapsulation/decapsulation device and method
CN104394175A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Message access control method based on network marking
CN106302371A (en) * 2015-06-12 2017-01-04 北京网御星云信息技术有限公司 A kind of firewall control method based on subscriber service system and system
CN107005555A (en) * 2014-12-02 2017-08-01 Nicira股份有限公司 The distributed fire wall of context-aware
CN107317816A (en) * 2017-07-05 2017-11-03 北京信息职业技术学院 A kind of method for network access control differentiated based on client application
US20180183759A1 (en) * 2016-12-22 2018-06-28 Nicira, Inc. Context based firewall services for data message flows for multiple concurrent users on one machine
US20190132289A1 (en) * 2017-10-31 2019-05-02 Cisco Technology, Inc. Application-context-aware firewall
CN110226155A (en) * 2016-12-22 2019-09-10 Nicira股份有限公司 Context property is collected and handled on host

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447627A (en) * 2011-12-05 2012-05-09 上海顶竹通讯技术有限公司 Message encapsulation/decapsulation device and method
CN107005555A (en) * 2014-12-02 2017-08-01 Nicira股份有限公司 The distributed fire wall of context-aware
CN104394175A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Message access control method based on network marking
CN106302371A (en) * 2015-06-12 2017-01-04 北京网御星云信息技术有限公司 A kind of firewall control method based on subscriber service system and system
US20180183759A1 (en) * 2016-12-22 2018-06-28 Nicira, Inc. Context based firewall services for data message flows for multiple concurrent users on one machine
CN110226155A (en) * 2016-12-22 2019-09-10 Nicira股份有限公司 Context property is collected and handled on host
CN107317816A (en) * 2017-07-05 2017-11-03 北京信息职业技术学院 A kind of method for network access control differentiated based on client application
US20190132289A1 (en) * 2017-10-31 2019-05-02 Cisco Technology, Inc. Application-context-aware firewall

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘毅: "基于雾计算的信息中心网络防火墙技术研究", 《中国工程科学》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116668164A (en) * 2023-06-26 2023-08-29 中国电子信息产业集团有限公司第六研究所 Industrial firewall security isolation detection processing method, system and storage medium
CN116668164B (en) * 2023-06-26 2024-01-02 中国电子信息产业集团有限公司第六研究所 Industrial firewall security isolation detection processing method, system and storage medium

Also Published As

Publication number Publication date
CN113079180B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
CN110445770B (en) Network attack source positioning and protecting method, electronic equipment and computer storage medium
US7509681B2 (en) Interoperability of vulnerability and intrusion detection systems
JP4545647B2 (en) Attack detection / protection system
US7200866B2 (en) System and method for defending against distributed denial-of-service attack on active network
KR100426317B1 (en) System for providing a real-time attacking connection traceback using of packet watermark insertion technique and method therefor
US20030084326A1 (en) Method, node and computer readable medium for identifying data in a network exploit
JP2003527793A (en) Method for automatic intrusion detection and deflection in a network
CN104135474B (en) Intrusion Detection based on host goes out the Network anomalous behaviors detection method of in-degree
CN107360182B (en) Embedded active network defense system and defense method thereof
CN114244570B (en) Illegal external connection monitoring method and device for terminal, computer equipment and storage medium
CN113079180B (en) Execution context based firewall fine-grained access control method and system
CN116055214A (en) Attack detection method, device, equipment and readable storage medium
JP3652661B2 (en) Method and apparatus for preventing denial of service attack and computer program therefor
KR101488271B1 (en) Apparatus and method for ids false positive detection
KR20100066908A (en) Windows executable file extraction method by using hardware based session matching and pattern matching and apparatus using the same
JP2002318739A (en) Device, method and system for processing intrusion data measures
KR101003094B1 (en) Cyber attack traceback system by using spy-bot agent, and method thereof
CN109274638A (en) A kind of method and router of attack source access automatic identification processing
KR100613904B1 (en) Apparatus and method for defeating network attacks with abnormal IP address
KR100951930B1 (en) Method and Apparatus for classificating Harmful Packet
CN115208596B (en) Network intrusion prevention method, device and storage medium
KR20040085266A (en) Network Intrusion Detection System with double buffer and the operating method
CN109684831B (en) Method and device for detecting computer network virus
CN116880319B (en) Method, system, terminal and medium for identifying upper computer in industrial control system
CN115225297B (en) Method and device for blocking network intrusion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant