CN113839912B - Method, device, medium and equipment for analyzing abnormal host by active and passive combination - Google Patents

Method, device, medium and equipment for analyzing abnormal host by active and passive combination Download PDF

Info

Publication number
CN113839912B
CN113839912B CN202010587801.8A CN202010587801A CN113839912B CN 113839912 B CN113839912 B CN 113839912B CN 202010587801 A CN202010587801 A CN 202010587801A CN 113839912 B CN113839912 B CN 113839912B
Authority
CN
China
Prior art keywords
host
suspicious
detection
abnormal
active
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010587801.8A
Other languages
Chinese (zh)
Other versions
CN113839912A (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jike Xin'an Beijing Technology Co ltd
Original Assignee
Jike Xin'an Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jike Xin'an Beijing Technology Co ltd filed Critical Jike Xin'an Beijing Technology Co ltd
Priority to CN202010587801.8A priority Critical patent/CN113839912B/en
Publication of CN113839912A publication Critical patent/CN113839912A/en
Application granted granted Critical
Publication of CN113839912B publication Critical patent/CN113839912B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method, a device, a medium and equipment for analyzing an abnormal host by combining active and passive, which comprise the following steps: continuously caching network flow logs in a first set time period, detecting data flows passing through a network boundary based on a passive rule detection method, and recording data flow characteristic information of a suspicious host IP which finds abnormal behaviors; collecting data flow information related to the suspicious host IP through the data flow characteristic information of the suspicious host IP; collecting backtracking flow and constructing an active detection rule; performing active scanning analysis on the suspicious host IP to judge whether the suspicious host is abnormal or not; and comparing and analyzing the active scanning and the passive detection result to determine whether the suspicious host is an abnormal host. The invention takes passive detection as a preliminary basis, so that the cost of active scanning is reduced; the active scanning based on the suspicious host is found to be more purposeful, and the analysis efficiency and accuracy are improved.

Description

Method, device, medium and equipment for analyzing abnormal host by active and passive combination
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, a medium and equipment for analyzing an abnormal host by active and passive combination.
Background
In the field of network security, the abnormal behavior of a host generally includes two situations, namely, the host actively implements malicious behavior, namely, the host controlled by an attacker; and secondly, some abnormal response information generated by the attack of the host, such as information leakage, opening unnecessary ports and the like. Finding out the abnormal behavior (malicious behavior) of the host and analyzing the possible cause of the localization is a necessary step to be implemented in the field of network security. At the network level, conventional abnormal host discovery and analysis are often implemented by passive traffic detection or active scanning.
The passive flow detection method has less information quantity obtained in a short time, and can not quickly and comprehensively discover host abnormality;
the active scanning method is often effective for an intranet, because the number of intranet hosts is limited, and targets are easy to determine, but for an extranet host, scanning targets are difficult to determine, and cannot be effectively implemented.
Disclosure of Invention
The invention aims to provide a method, a device, a medium and equipment for analyzing an abnormal host by combining active and passive, which can solve at least one technical problem. The specific scheme is as follows:
according to a first aspect of the present invention, there is provided a method for performing abnormal host analysis by active-passive combination, including:
continuously caching network flow logs in a first set time period, detecting data flows passing through a network boundary based on a passive rule detection method, and recording data flow characteristic information of a suspicious host IP which finds abnormal behaviors; the data flow characteristic information refers to all relevant protocol field characteristics of abnormal behavior data, and comprises the following steps: source IP address, destination IP address, source port, destination port, transport layer protocol type, application layer protocol key protocol field content and application layer load data;
collecting data flow information related to the suspicious host IP through the data flow characteristic information of the suspicious host IP;
collecting backtracking flow, and constructing an active detection rule, wherein the backtracking flow is partial flow before and after searching the alarm in the cache flow based on the basic content of the current alarm information;
performing active scanning analysis on the suspicious host IP to judge whether the suspicious host is abnormal or not;
and comparing and analyzing the active scanning and the passive detection result to determine whether the suspicious host is an abnormal host.
Optionally, the collecting, by the suspicious host IP data flow feature, data flow information related to the suspicious host IP includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior in the network flow log in the second set time period of the cache through finding the data flow characteristic of the suspicious host IP of the abnormal behavior.
Optionally, the collecting backtracking traffic includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior before and after the occurrence of the alarm information in the network flow log in the second set time period of the cache.
Optionally, the constructing an active probing rule includes: scanning detection, script detection and security detection;
the scanning detection means that when corresponding vulnerability information can be corresponding to the alarm information, various vulnerability scanning scripts which are built in advance based on a scanner are used as a scanning strategy;
the script detection refers to detecting the content triggering the alarm in the alarm information as an active detection script to form a series of detection scripts;
the security detection refers to performing security detection on the association protocol discovered by backtracking.
Optionally, the performing active scanning analysis on the suspicious host IP to determine whether the suspicious host has an abnormality includes:
and actively scanning the suspicious host IP of the abnormal behavior according to each active detection rule, and judging whether the suspicious host IP is abnormal or not according to the information obtained by the active scanning.
Optionally, the comparing and analyzing the active scan with the passive detection result to determine whether the suspicious host is an abnormal host includes:
and comparing the suspicious abnormal behavior discovered by the passive scanning with the abnormal behavior discovered by the active scanning, and confirming whether the suspicious host is an abnormal host or not according to a comparison result.
Optionally, the comparison result includes:
if the data flow characteristics of the suspicious abnormal behavior found passively are the same as those found by active scanning, judging that the suspicious host is an abnormal host, otherwise, judging that the suspicious host is a non-abnormal host.
According to a second aspect of the present invention, there is provided an apparatus for performing an abnormal host analysis in combination with active and passive, comprising: a recording unit 201, a collecting unit 202, a backtracking unit 203, an analyzing unit 204, and a comparing unit 205;
the recording unit 201 is configured to continuously cache a network traffic log in a first set period, detect a data flow passing through a network boundary based on a passive rule detection method, and record data flow characteristic information of a suspicious host IP that finds abnormal behavior;
the collecting unit 202 is configured to collect, through the data flow characteristic information of the suspicious host IP, data flow information related to the suspicious host IP;
the backtracking unit 203 is configured to collect backtracking traffic, and construct an active detection rule, where the backtracking traffic refers to a part of traffic before and after searching the alarm in the cache traffic based on the basic content of the current alarm information;
the analysis unit 204 is configured to perform active scanning analysis on the suspicious host IP, and determine whether the suspicious host has an abnormality;
the comparing unit 205 is configured to compare and analyze the active scanning and the passive detection result, and determine whether the suspicious host is an abnormal host.
Optionally, the collecting, by the suspicious host IP data flow feature, data flow information related to the suspicious host IP includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior in the network flow log in the second set time period of the cache through finding the data flow characteristic of the suspicious host IP of the abnormal behavior.
Optionally, the collecting backtracking traffic includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior before and after the occurrence of the alarm information in the network flow log in the second set time period of the cache.
Optionally, the constructing an active probing rule includes: scanning detection, script and security detection;
the scanning detection means that when corresponding vulnerability information can be corresponding to the alarm information, various vulnerability scanning scripts which are built in advance based on a scanner are used as a scanning strategy;
the script detection refers to detecting the content triggering the alarm in the alarm information as an active detection script to form a series of detection scripts;
the security detection refers to performing security detection on the association protocol discovered by backtracking.
Optionally, the performing active scanning analysis on the suspicious host IP to determine whether the suspicious host has an abnormality includes:
and actively scanning the suspicious host IP of the abnormal behavior according to each active detection rule, and judging whether the suspicious host IP is abnormal or not according to the information obtained by the active scanning.
Optionally, the comparing and analyzing the active scan with the passive detection result to determine whether the suspicious host is an abnormal host includes:
and comparing the suspicious abnormal behavior discovered by the passive scanning with the abnormal behavior discovered by the active scanning, and confirming whether the suspicious host is an abnormal host or not according to a comparison result.
Optionally, the comparison result includes:
if the data flow characteristics of the suspicious abnormal behavior found passively are the same as those found by active scanning, judging that the suspicious host is an abnormal host, otherwise, judging that the suspicious host is a non-abnormal host.
According to a third aspect of the present invention, there is provided an apparatus comprising: one or more processors; storage means for storing one or more programs that when executed by the one or more processors cause the one or more processors to implement a method of editing content in a document as claimed in any of the preceding claims.
According to a fourth aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method of editing content in a document as claimed in any of the preceding claims.
Compared with the prior art, the scheme provided by the embodiment of the invention has at least the following beneficial effects:
the invention provides a method for analyzing an abnormal host by combining active and passive, which comprises the steps of actively scanning a suspicious host detected on the basis of a passive rule, and comparing the active and passive scanning results to determine whether the suspicious host is the abnormal host or not; passive detection is taken as a preliminary basis, so that the cost of active scanning is reduced; the method has the advantages that the method has more pertinence to the problem needing scanning, a certain abnormal clue is displayed in the passive detection, and the rule to be utilized in scanning is reduced;
the active scanning adopted by the invention has more purposefulness, and suspicious hosts are found based on passive detection, so that the analysis efficiency is improved;
the invention carries out secondary analysis and confirmation on the abnormal behavior found by passive detection in an active scanning mode, and can improve the analysis accuracy.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 is a flow chart of a method for active-passive combination exception-host analysis in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of an apparatus for performing an anomaly host analysis in combination with active and passive operations according to an embodiment of the present invention;
fig. 3 shows a schematic diagram of a device connection structure according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plurality" generally includes at least two.
It should be understood that the term "and/or" as used herein is merely one relationship describing the association of the associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be understood that although the terms first, second, third, etc. may be used to describe … … in embodiments of the present invention, these … … should not be limited to these terms. These terms are only used to distinguish … …. For example, the first … … may also be referred to as the second … …, and similarly the second … … may also be referred to as the first … …, without departing from the scope of embodiments of the present invention.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a product or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such product or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a commodity or device comprising such element.
Alternative embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Example 1
As shown in fig. 1, according to a specific embodiment of the present invention, in a first aspect, the present invention provides a method for performing abnormal host analysis by active-passive combination, including:
step S101, continuously caching a network flow log in a first set time period, detecting a data flow passing through a network boundary based on a passive rule detection method, and recording data flow characteristic information of a suspicious host IP which finds abnormal behaviors;
wherein, the network traffic log is cached for a period of time, for example, if the first 10 minutes of network traffic log is cached in one hour, the second 10 minutes of network traffic log is cached after the first 10 minutes of network traffic log is cached, and so on, at the end of one hour, the sixth 10 minutes of network traffic log is cached.
The passive rule detection method is a detection method based on a rule or model commonly used for passive detection, and is used for detecting abnormality of a data stream passing through a network boundary, and if the data stream feature with abnormal behavior is found, all information of the data stream feature is recorded. Wherein the data flow characteristics include: source IP address, destination IP address, source port, destination port, transport layer protocol type, application layer protocol key protocol field content, application layer payload data, etc.
Step S102, collecting data flow information related to the suspicious host IP through the data flow characteristics of the suspicious host IP;
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior in the network flow log in the second set time period of the cache through finding the data flow characteristic of the suspicious host IP of the abnormal behavior.
The second set time period and the first set time period are set in advance, and the difference is that: the second set period of time is to begin collecting after the suspicious host IP data flow characteristics of the abnormal behavior are found, and the first set period of time is to begin collecting before the suspicious host IP data flow characteristics of the abnormal behavior are found; thus, the first set period of time is passive collection and the second set period of time is active collection.
Step 103, collecting backtracking flow and constructing an active detection rule;
the backtracking refers to collecting partial traffic before and after the alarm in the cache traffic based on the basic content of the current alarm information, and specific backtracking rules are as follows:
a. the host IP address should be the same as that associated with the alert traffic;
b. the application layer protocol has relevance, such as HTTP protocol alarm needs to obtain HTTP protocol flow of related IP and DNS interaction flow of the same IP address;
c. the backtracking time should occur for a period of time, such as 5 minutes, before and after the alarm occurs.
The basic content of the current alarm information refers to suspicious host IP related data of the abnormal behavior found in step S1021 and the alarm information.
Wherein the two time periods before and after the alarm, i.e. the second set time period.
And collecting backtracking traffic, namely collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior before and after the occurrence of the alarm information in the network traffic log in the second set period of time of the cache.
The construction of the active detection rule refers to the construction of a strategy required by active detection based on passive alarm information.
Constructing an active probing rule, comprising: scanning detection, script detection and security detection;
the scanning detection means that when corresponding vulnerability information can be corresponding to the alarm information, various vulnerability scanning scripts which are built in advance based on a scanner are used as a scanning strategy;
the warning information, such as a CVE number, is commonly known as "Common Vulnerabilities & Exposures" universal vulnerability disclosure.
The script detection refers to detecting the content triggering the alarm in the alarm information as an active detection script to form a series of detection scripts;
the content of triggering the alarm in the alarm information, such as SQL injection, XSS attack, etc.
The security detection refers to performing security detection on the association protocol discovered by backtracking.
The security detection refers to performing security detection on the association protocol of the traffic information discovery collected in step S103.
Step S104, the step of actively scanning and analyzing the suspicious host IP to judge whether the suspicious host is abnormal or not comprises the following steps:
and actively scanning the suspicious host IP of the abnormal behavior according to each active detection rule, and judging whether the suspicious host IP is abnormal or not according to the information obtained by the active scanning.
The active scanning analysis is performed on the host, and the active scanning is performed on the suspicious host IP according to scanning detection, script detection and security detection, so as to obtain more comprehensive and detailed host information, and the method is used for judging whether abnormal behaviors exist or not.
Step 105, comparing and analyzing the active scanning and the passive detection result to determine whether the suspicious host is an abnormal host, including:
and comparing the suspicious abnormal behavior discovered by the passive scanning with the abnormal behavior discovered by the active scanning, and confirming whether the suspicious host is an abnormal host or not according to a comparison result.
And comparing the data flow characteristics of the suspicious abnormal behavior passively found in the step S101 with those of the suspicious abnormal behavior actively detected in the step S105, and determining whether the suspicious host is an abnormal host or not according to the comparison result. The comparison result comprises: if the data flow characteristics of the suspicious abnormal behavior found passively are the same as those found by active scanning, judging that the suspicious host is an abnormal host, otherwise, judging that the suspicious host is a non-abnormal host.
The invention takes passive detection as a preliminary basis, so that the cost of active scanning is reduced; the method has the advantages that the method has more pertinence to the problem needing scanning, a certain abnormal clue is displayed in the passive detection, and the rule to be utilized in scanning is reduced;
the active scanning adopted by the invention has more purposefulness, and based on the host found by passive detection, the analysis task can be completed by only scanning one host and even one port corresponding to the host, thereby improving the analysis efficiency;
the invention carries out secondary analysis and confirmation on the abnormal behavior found by passive detection in an active scanning mode, and can improve the analysis accuracy.
Example 2
The invention provides a device for analyzing an abnormal host by combining active and passive, as shown in fig. 2, comprising: a recording unit 201, a collecting unit 202, a backtracking unit 203, an analyzing unit 204, and a comparing unit 205;
the recording unit 201 is configured to continuously cache a network traffic log in a first set period, detect a data flow passing through a network boundary based on a passive rule detection method, and record data flow characteristic information of a suspicious host IP that finds abnormal behavior;
the collecting unit 202 is configured to collect, through the data flow characteristic information of the suspicious host IP, data flow information related to the suspicious host IP;
the backtracking unit 203 is configured to collect backtracking traffic, and construct an active detection rule, where the backtracking traffic refers to a part of traffic before and after searching the alarm in the cache traffic based on the basic content of the current alarm information;
the analysis unit 204 is configured to perform active scanning analysis on the suspicious host IP, and determine whether the suspicious host has an abnormality;
the comparing unit 205 is configured to compare and analyze the active scanning and the passive detection result, and determine whether the suspicious host is an abnormal host.
Optionally, the collecting, by the suspicious host IP data flow feature, data flow information related to the suspicious host IP includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior in the network flow log in the second set time period of the cache through finding the data flow characteristic of the suspicious host IP of the abnormal behavior.
Optionally, the collecting backtracking traffic includes:
and collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior before and after the occurrence of the alarm information in the network flow log in the second set time period of the cache.
Optionally, the constructing an active probing rule includes: scanning detection, script detection and security detection;
the scanning detection means that when corresponding vulnerability information can be corresponding to the alarm information, various vulnerability scanning scripts which are built in advance based on a scanner are used as a scanning strategy;
the script detection refers to detecting the content triggering the alarm in the alarm information as an active detection script to form a series of detection scripts;
the security detection refers to performing security detection on the association protocol discovered by backtracking.
Optionally, the performing active scanning analysis on the suspicious host IP to determine whether the suspicious host has an abnormality includes:
and actively scanning the suspicious host IP of the abnormal behavior according to each active detection rule, and judging whether the suspicious host IP is abnormal or not according to the information obtained by the active scanning.
Optionally, the comparing and analyzing the active scan with the passive detection result to determine whether the suspicious host is an abnormal host includes:
and comparing the suspicious abnormal behavior discovered by the passive scanning with the abnormal behavior discovered by the active scanning, and confirming whether the suspicious host is an abnormal host or not according to a comparison result.
Optionally, the comparison result includes:
if the data flow characteristics of the suspicious abnormal behavior found passively are the same as those found by active scanning, judging that the suspicious host is an abnormal host, otherwise, judging that the suspicious host is a non-abnormal host.
The invention takes passive detection as a preliminary basis, so that the cost of active scanning is reduced; the method has the advantages that the method has more pertinence to the problem needing scanning, a certain abnormal clue is displayed in the passive detection, and the rule to be utilized in scanning is reduced;
the active scanning adopted by the invention has more purposefulness, and based on the host found by passive detection, the analysis task can be completed by only scanning one host and even one port corresponding to the host, thereby improving the analysis efficiency;
the invention carries out secondary analysis and confirmation on the abnormal behavior found by passive detection in an active scanning mode, and can improve the analysis accuracy.
Example 3
As shown in fig. 3, the present embodiment provides an apparatus for performing abnormal host analysis in combination with active and passive, the apparatus including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the one processor to enable the at least one processor to process an active-passive combination of abnormal host analysis.
Referring now to fig. 3, a schematic diagram of a device suitable for use in implementing embodiments of the present disclosure is shown. The terminal devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The apparatus shown in fig. 3 is merely an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 3, the apparatus may include a processing device (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage device 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for device operation are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the device to communicate wirelessly or by wire with other devices to exchange data. While fig. 3 shows an apparatus having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via a communication device 309, or installed from a storage device 308, or installed from a ROM 302. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing means 301.
Example 4
The disclosed embodiments provide a non-volatile computer storage medium storing computer executable instructions that can perform the active-passive combination of any of the method embodiments described above for abnormal host analysis.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be embodied in the apparatus; or may be present alone without being fitted into the device.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (6)

1. A method for performing an exception-host analysis in combination with active and passive, comprising:
continuously caching network traffic logs within a first set period of time, and detecting a party based on passive rules
Detecting a data flow passing through a network boundary, and recording the data flow characteristic information of a suspicious host IP which finds abnormal behaviors; the data flow characteristic information refers to all relevant protocol field characteristics of abnormal behavior data, and comprises the following steps: source IP address, destination IP address, source port, destination port, transport layer protocol type, application layer protocol key protocol field content and application layer load data;
collecting data flow information related to the suspicious host IP through the data flow characteristic information of the suspicious host IP;
collecting backtracking flow, and constructing an active detection rule, wherein the backtracking flow is the flow before and after searching the alarm in the cache flow based on the content of the current alarm information;
performing active scanning analysis on the suspicious host IP to judge whether the suspicious host is abnormal or not;
comparing and analyzing the active scanning and the passive detection result to determine whether the suspicious host is an abnormal host;
the collecting data flow information related to the suspicious host IP through the suspicious host IP data flow characteristics comprises the following steps:
collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior in a network flow log in a second set time period by finding the data flow characteristic of the suspicious host IP of the abnormal behavior;
the collecting backtracking traffic includes:
collecting data flow characteristic information related to the suspicious host IP address of the abnormal behavior before and after the occurrence of the alarm information in the network flow log in the second set time period;
the constructing the active detection rule comprises the following steps: scanning detection, script detection and security detection;
the scanning detection refers to that when corresponding vulnerability information in the alarm information is corresponding, various vulnerability scanning scripts which are built in advance based on a scanner are used as a scanning strategy;
the script detection refers to detecting the content triggering the alarm in the alarm information as an active detection script to form a series of detection scripts;
the security detection refers to performing security detection on the association protocol discovered by backtracking;
the passive rule detection method refers to detection based on rules or models commonly used for passive detection
The method comprises the steps of detecting abnormality of a data stream passing through a network boundary;
the second set time period and the first set time period are set in advance, and the difference is that: the second set period of time is to begin collecting after the suspicious host IP data flow characteristics of the abnormal behavior are found, and the first set period of time is to begin collecting before the suspicious host IP data flow characteristics of the abnormal behavior are found; thus, the first set period of time is passive collection and the second set period of time is active collection.
2. The method of claim 1, wherein the performing active scan analysis on the suspicious host IP to determine whether an anomaly exists in the suspicious host comprises:
and actively scanning the suspicious host IP of the abnormal behavior according to each active detection rule, and judging whether the suspicious host IP is abnormal or not according to the information obtained by the active scanning.
3. The method of claim 1, wherein comparing the active scan with the passive test results to determine if the suspicious host is an abnormal host comprises:
and comparing the suspicious abnormal behavior discovered by the passive scanning with the abnormal behavior discovered by the active scanning, and confirming whether the suspicious host is an abnormal host or not according to a comparison result.
4. A method according to claim 3, wherein the comparison comprises:
if the data flow characteristics of the suspicious abnormal behavior found passively are the same as those found by active scanning, judging that the suspicious host is an abnormal host, otherwise, judging that the suspicious host is a non-abnormal host.
5. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1 to 4.
6. An apparatus, comprising:
one or more processors;
storage means for storing one or more programs which when executed by the one or more processors cause the one or more processors to implement the method of any of claims 1 to 4.
CN202010587801.8A 2020-06-24 2020-06-24 Method, device, medium and equipment for analyzing abnormal host by active and passive combination Active CN113839912B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010587801.8A CN113839912B (en) 2020-06-24 2020-06-24 Method, device, medium and equipment for analyzing abnormal host by active and passive combination

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010587801.8A CN113839912B (en) 2020-06-24 2020-06-24 Method, device, medium and equipment for analyzing abnormal host by active and passive combination

Publications (2)

Publication Number Publication Date
CN113839912A CN113839912A (en) 2021-12-24
CN113839912B true CN113839912B (en) 2023-08-22

Family

ID=78964502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010587801.8A Active CN113839912B (en) 2020-06-24 2020-06-24 Method, device, medium and equipment for analyzing abnormal host by active and passive combination

Country Status (1)

Country Link
CN (1) CN113839912B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550068B (en) * 2022-11-28 2023-03-10 天津安华易科技发展有限公司 Safety auditing method for log information of host

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2408116A1 (en) * 2002-03-29 2003-09-29 Nec Infrontia Corporation Wireless lan system, host apparatus and wireless lan base station
CN101631026A (en) * 2008-07-18 2010-01-20 北京启明星辰信息技术股份有限公司 Method and device for defending against denial-of-service attacks
CN103595569A (en) * 2013-11-15 2014-02-19 南京云川信息技术有限公司 Method for handling database storage of alarm information of network management system
CN104363236A (en) * 2014-11-21 2015-02-18 西安邮电大学 Automatic vulnerability validation method
CN105933186A (en) * 2016-06-30 2016-09-07 北京奇虎科技有限公司 Security detection method, device and system
CN110138745A (en) * 2019-04-23 2019-08-16 极客信安(北京)科技有限公司 Abnormal host detection method, device, equipment and medium based on data stream sequences

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533819B2 (en) * 2006-09-29 2013-09-10 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting compromised host computers
US20120090027A1 (en) * 2010-10-12 2012-04-12 Electronics And Telecommunications Research Institute Apparatus and method for detecting abnormal host based on session monitoring

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2408116A1 (en) * 2002-03-29 2003-09-29 Nec Infrontia Corporation Wireless lan system, host apparatus and wireless lan base station
CN101631026A (en) * 2008-07-18 2010-01-20 北京启明星辰信息技术股份有限公司 Method and device for defending against denial-of-service attacks
CN103595569A (en) * 2013-11-15 2014-02-19 南京云川信息技术有限公司 Method for handling database storage of alarm information of network management system
CN104363236A (en) * 2014-11-21 2015-02-18 西安邮电大学 Automatic vulnerability validation method
CN105933186A (en) * 2016-06-30 2016-09-07 北京奇虎科技有限公司 Security detection method, device and system
CN110138745A (en) * 2019-04-23 2019-08-16 极客信安(北京)科技有限公司 Abnormal host detection method, device, equipment and medium based on data stream sequences

Also Published As

Publication number Publication date
CN113839912A (en) 2021-12-24

Similar Documents

Publication Publication Date Title
US9081961B2 (en) System and method for analyzing malicious code using a static analyzer
US10505960B2 (en) Malware detection by exploiting malware re-composition variations using feature evolutions and confusions
US9584541B1 (en) Cyber threat identification and analytics apparatuses, methods and systems
CN114124552B (en) Threat level acquisition method, device and storage medium for network attack
JP2014507718A (en) Method, computer program, and system for determining vulnerability of a computer software application to an elevation of privilege attack
US11593478B2 (en) Malware collusion detection
US20190215333A1 (en) Persistent cross-site scripting vulnerability detection
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
CN113448795A (en) Method, apparatus and computer program product for obtaining system diagnostic information
CN113839912B (en) Method, device, medium and equipment for analyzing abnormal host by active and passive combination
CN112134870B (en) Network security threat blocking method, device, equipment and storage medium
CN110808997B (en) Method and device for remotely obtaining evidence of server, electronic equipment and storage medium
CN116450533B (en) Security detection method and device for application program, electronic equipment and medium
CN109586788B (en) Monitoring system fault diagnosis method and device, computer equipment and storage medium
CN116595523A (en) Multi-engine file detection method, system, equipment and medium based on dynamic arrangement
CN113839948B (en) DNS tunnel traffic detection method and device, electronic equipment and storage medium
CN110868410B (en) Method and device for acquiring webpage Trojan horse connection password, electronic equipment and storage medium
CN109714371B (en) Industrial control network safety detection system
CN115801447B (en) Industrial safety-based flow analysis method and device and electronic equipment
CN110633566A (en) Intrusion detection method, device, terminal equipment and medium
CN110166421B (en) Intrusion control method and device based on log monitoring and terminal equipment
CN118764310A (en) Attack detection method and device for container, readable medium and electronic equipment
CN117786692A (en) Method, equipment and storage medium for detecting malicious program
CN109918913A (en) A kind of leak detection method and device
CN118432928A (en) Intrusion detection method, intrusion detection device, intrusion detection equipment, storage medium and intrusion detection product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant