CN113949571A - Software behavior identification method and system based on behavior feature knowledge base - Google Patents

Software behavior identification method and system based on behavior feature knowledge base Download PDF

Info

Publication number
CN113949571A
CN113949571A CN202111211216.9A CN202111211216A CN113949571A CN 113949571 A CN113949571 A CN 113949571A CN 202111211216 A CN202111211216 A CN 202111211216A CN 113949571 A CN113949571 A CN 113949571A
Authority
CN
China
Prior art keywords
software
behavior
data
terminal side
network protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111211216.9A
Other languages
Chinese (zh)
Other versions
CN113949571B (en
Inventor
田国新
孙晋超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Antiy Technology Group Co Ltd
Original Assignee
Antiy Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Antiy Technology Group Co Ltd filed Critical Antiy Technology Group Co Ltd
Priority to CN202111211216.9A priority Critical patent/CN113949571B/en
Publication of CN113949571A publication Critical patent/CN113949571A/en
Application granted granted Critical
Publication of CN113949571B publication Critical patent/CN113949571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/18Protocol analysers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention relates to a software behavior identification method and a system based on a behavior feature knowledge base, comprising the following steps: determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, and aligning the collected data timeline by using an end flow timeline data alignment technology; performing statistical analysis on the data of the aligned time line by combining URL access information and a network protocol in the data of the aligned time line to obtain standard behaviors of the terminal side software; and the obtained standard behaviors of the terminal side software are arranged into behavior rules to form a software behavior characteristic knowledge base. And identifying the specific behavior credibility of the software actually operated at the terminal side by using the software behavior feature library. The method and the system can provide a network behavior baseline of the terminal software, assist the user in judging the behaviors of the trusted software and the untrusted software, assist operation and maintenance personnel in mastering the network behavior condition of the equipment, and find and dispose abnormal behaviors in time.

Description

Software behavior identification method and system based on behavior feature knowledge base
Technical Field
The invention relates to the technical field of network security, in particular to a software behavior identification method and system based on a behavior characteristic knowledge base.
Background
The mainstream network security traffic detection equipment mainly has the primary capabilities of detecting malicious attacks and restoring and analyzing network traffic. However, some suspicious network behaviors cannot be judged accurately, and in an actual user environment, operation and maintenance personnel have limited knowledge on information such as specific functions and network behaviors of network devices in the jurisdiction of the operation and maintenance personnel, and the postposition of device use information update iteration occurs. Therefore, it is impossible to determine whether the network behavior of the device is normal in the actual operation and maintenance work.
Disclosure of Invention
In view of the above, the present invention provides a software behavior identification method and system based on a behavior feature knowledge base, which judges the standard behavior of terminal software by collecting data at a terminal side and a traffic side and combining with a behavior information boundary of the terminal software, and forms a software behavior feature knowledge base to provide a network behavior baseline of the terminal software, so as to judge which behaviors of the terminal software are credible and which behaviors are incredible, thereby at least partially solving the problems existing in the prior art.
The specific invention content is as follows:
a method for constructing a software behavior feature knowledge base comprises the following steps:
determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, and aligning the collected data timeline by using an end flow timeline data alignment technology; after aligning the time lines, the behavior information boundary of the terminal side software can be identified;
performing statistical analysis on the data of the aligned time line by combining URL access information and a network protocol in the data of the aligned time line to obtain standard behaviors of the terminal side software;
and the obtained standard behaviors of the terminal side software are arranged into behavior rules to form a software behavior characteristic knowledge base.
The software behavior feature library is used for providing a terminal side software behavior baseline and comprises a plurality of standard behavior rules of software, and each software comprises a plurality of standard behaviors.
Further, the performing statistical analysis on the data of the aligned timeline by combining the URL access information and the network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data; the common network protocols comprise HTTP, DNS, TCP/IP and the like;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and judging specific software behavior by combining specific parameter information of the URL; the process can be combined with modes such as a search engine, direct access and the like to analyze the function of the domain name;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and judging specific software behaviors according to the specified character information of the specified position.
A software behavior credibility identification method comprises the following steps:
monitoring the terminal side software process and the flow side data flow in real time to obtain the specific behavior of the terminal side software;
and comparing the specific behavior of the terminal side software with the standard behavior rule of the corresponding software in the software behavior characteristic knowledge base, and judging that the corresponding software behavior belongs to an unreliable behavior when the software behavior which does not conform to the standard rule of the corresponding software exists in the comparison, so as to give an early warning. The software behavior characteristic knowledge base defines boundaries for terminal side software behaviors, daily running conditions of the software are recorded by log files, and unreliable behavior conditions can be accurately positioned in the log records by combining early warning information, so that abnormal behavior data can be better provided for service personnel to investigate and obtain evidence.
A software behavior feature knowledge base building system, comprising:
the data acquisition module is used for determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, aligning the collected data timeline by using an end flow timeline data alignment technology, and sending the data of the aligned timeline to the statistical analysis module; after aligning the time lines, the behavior information boundary of the terminal side software can be identified;
the statistical analysis module is used for receiving the data of the aligned time line sent by the data acquisition module, performing statistical analysis on the data of the aligned time line by combining URL (uniform resource locator) access information and a network protocol in the data of the aligned time line to obtain the standard behavior of the terminal side software, and sending the obtained standard behavior information of the terminal side software to the characteristic knowledge base construction module; the URL access information and the network protocol form a behavior information boundary of terminal side software;
and the characteristic knowledge base construction module is used for receiving the standard behavior information of the terminal side software sent by the statistical analysis module, and arranging the standard behavior information into behavior rules to form a software behavior characteristic knowledge base.
The software behavior feature library is used for providing a terminal side software behavior baseline and comprises a plurality of standard behavior rules of software, and each software comprises a plurality of standard behaviors.
Further, the performing statistical analysis on the data of the aligned timeline by combining the URL access information and the network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data; the common network protocols comprise HTTP, DNS, TCP/IP and the like;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and judging specific software behavior by combining specific parameter information of the URL; the process can be combined with modes such as a search engine, direct access and the like to analyze the function of the domain name;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and judging specific software behaviors according to the specified character information of the specified position.
A software behavior trustworthiness identification system, comprising:
the software behavior acquisition module is used for monitoring the terminal side software process and the flow side data flow in real time to obtain the specific behavior of the terminal side software and sending the specific behavior of the terminal side software to the software behavior judgment module;
and the software behavior judging module is used for receiving the specific behavior of the terminal side software sent by the software behavior acquiring module, comparing the specific behavior of the terminal side software with the standard behavior rule of the corresponding software in the software behavior characteristic knowledge base, and judging that the corresponding software behavior belongs to the unreliable behavior when the software behavior which does not conform to the standard rule of the corresponding software exists, so as to give an early warning. The software behavior characteristic knowledge base defines boundaries for terminal side software behaviors, daily running conditions of the software are recorded by log files, and unreliable behavior conditions can be accurately positioned in the log records by combining early warning information, so that abnormal behavior data can be better provided for service personnel to investigate and obtain evidence.
A software behavior recognition system based on a behavioral characteristic knowledge base, comprising:
the software behavior characteristic knowledge base construction system is used for constructing a software behavior characteristic knowledge base according to the standard behavior of the terminal side software;
the software behavior credibility identification system is used for judging the credibility of the software behavior at the terminal side according to the software behavior characteristic knowledge base and giving an early warning when an incredible software behavior is found.
An electronic device, the electronic device comprising: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for executing the aforementioned method.
A computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the aforementioned method.
The invention has the beneficial effects that:
the invention judges the standard behavior of the terminal software by the data collection of the terminal side and the flow side and combining the behavior information boundary of the terminal software to form a software behavior characteristic knowledge base. The software behavior characteristic knowledge base can provide a network behavior baseline of the terminal software and assist a user in judging the behaviors of the trusted software and the untrusted software. The invention can enrich the behavior portrayal of the terminal equipment and support the data for asset identification and asset function conjecture. Meanwhile, the invention can define the boundary for the network behavior of the terminal equipment, assist operation and maintenance personnel to master the network behavior condition of the equipment, and find and dispose abnormal behaviors in time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a software behavior feature knowledge base construction method according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating network protocol information content according to an embodiment of the present invention;
FIG. 3 is a flow chart of a software behavior feature knowledge base construction method according to another embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for identifying trustworthiness of software behavior according to an embodiment of the present invention;
FIG. 5 is a diagram of a system for constructing a knowledge base of behavior characteristics of software according to an embodiment of the present invention;
FIG. 6 is a block diagram of a software behavior credibility identification system according to an embodiment of the present invention;
FIG. 7 is a block diagram of a software behavior recognition system based on a knowledge base of behavior features according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be noted that, in the case of no conflict, the features in the following embodiments and examples may be combined with each other; moreover, all other embodiments that can be derived by one of ordinary skill in the art from the embodiments disclosed herein without making any creative effort fall within the scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
The invention provides an embodiment of a method for constructing a software behavior characteristic knowledge base, which comprises the following steps of:
s11: determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, and aligning the collected data timeline by using an end flow timeline data alignment technology; after aligning the time lines, the behavior information boundary of the terminal side software can be identified;
s12: performing statistical analysis on the data of the aligned time line by combining URL access information and a network protocol in the data of the aligned time line to obtain standard behaviors of the terminal side software;
s13: and the obtained standard behaviors of the terminal side software are arranged into behavior rules to form a software behavior characteristic knowledge base.
The software behavior feature library is used for providing a terminal side software behavior baseline and comprises a plurality of standard behavior rules of software, and each software comprises a plurality of standard behaviors.
Preferably, the performing statistical analysis on the data of the aligned timeline by combining the URL access information and the network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data; the common network protocols comprise HTTP, DNS, TCP/IP and the like;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and obtaining specific software behaviors by combining specific parameter information of the URL; the process can be combined with modes such as a search engine, direct access and the like to analyze the function of the domain name;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and then obtaining specific software behaviors according to the specified character information of the specified position.
For example, as shown in fig. 2, it can be obtained that the network behavior is system update according to hostname, url, and http _ user _ agent fields.
In order to further explain the above method, in combination with the above preferred solution, another embodiment of the method for constructing a knowledge base of behavior characteristics of software is provided, as shown in fig. 3, including:
s31: determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, and aligning the collected data timeline by using an end flow timeline data alignment technology;
s32: according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data; for data in a common network protocol, go to S33; for data in the special network protocol, go to S34;
s33: for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and obtaining specific software behaviors by combining specific parameter information of the URL;
s34: analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and then obtaining specific software behaviors according to the specified character information of the specified position;
s35: and the obtained standard behaviors of the terminal side software are arranged into behavior rules to form a software behavior characteristic knowledge base.
In order to more accurately obtain the data of the software behavior characteristic knowledge base, the invention can do the following work in the implementation process, firstly, prepare a plurality of virtual machines or virtual devices of different operating systems, install a main stream operating system and software, and prepare a database and related tool scripts. And secondly, terminal process monitoring software and a network flow monitoring tool are installed in the virtual machine or the virtual equipment and are used for collecting the data flow of the terminal side software process and the flow side.
The invention provides an embodiment of a software behavior credibility identification method, as shown in fig. 4, comprising:
s41: monitoring the terminal side software process and the flow side data flow in real time to obtain the specific behavior of the terminal side software;
s42: comparing the specific behavior of the terminal side software with the standard behavior rule of the corresponding software in the software behavior characteristic knowledge base;
s43: judging whether software behaviors which do not accord with the standard rule of the corresponding software exist or not, if so, judging that the corresponding software behaviors belong to untrusted behaviors, and giving an early warning; otherwise, return to S42.
The software behavior characteristic knowledge base can provide a network behavior baseline of the terminal software, assist a user in judging trusted network behaviors and untrusted network behaviors, assist operation and maintenance personnel in mastering equipment network behavior conditions, and find and dispose abnormal behaviors in time. Daily running conditions of the software are recorded by log files, and by combining with early warning information, unreliable behavior conditions can be accurately positioned in the log records, so that abnormal behavior data can be better provided for the unsuccessfully taken evidence by service personnel during investigation.
The invention provides an embodiment of a software behavior feature knowledge base construction system, as shown in fig. 5, comprising:
the data acquisition module 51 is configured to determine terminal side software to be identified, collect a process of the terminal side software and data traffic of a corresponding traffic side, align collected data timelines by using an end-stream timeline data alignment technology, and send data of the aligned timelines to the statistical analysis module 52; after aligning the time lines, the behavior information boundary of the terminal side software can be identified;
the statistical analysis module 52 is configured to receive the data of the aligned timeline sent by the data acquisition module 51, perform statistical analysis on the data of the aligned timeline in combination with URL access information and a network protocol in the data of the aligned timeline to obtain a standard behavior of the terminal-side software, and send the obtained standard behavior information of the terminal-side software to the feature knowledge base construction module 53; the URL access information and the network protocol form a behavior information boundary of terminal side software;
and the feature knowledge base construction module 53 is configured to receive the standard behavior information of the terminal-side software sent by the statistical analysis module, and arrange the standard behavior information into behavior rules to form a software behavior feature knowledge base.
Preferably, the performing statistical analysis on the data of the aligned timeline by combining the URL access information and the network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data; the common network protocols comprise HTTP, DNS, TCP/IP and the like;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and obtaining specific software behaviors by combining specific parameter information of the URL; the process can be combined with modes such as a search engine, direct access and the like to analyze the function of the domain name;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and then obtaining specific software behaviors according to the specified character information of the specified position.
The present invention provides an embodiment of a software behavior credibility identification system, as shown in fig. 6, including:
the software behavior acquisition module 61 is configured to monitor a terminal side software process and a traffic side data traffic in real time to obtain a specific behavior of the terminal side software, and send the specific behavior of the terminal side software to the software behavior determination module 62;
a software behavior determination module 62, configured to receive the specific behavior of the terminal-side software sent by the software behavior acquisition module 61, compare the specific behavior of the terminal-side software with the standard behavior rule of the corresponding software in the software behavior feature knowledge base, and when a software behavior that does not meet the standard rule of the corresponding software is compared, determine that the corresponding software behavior belongs to an untrusted behavior, and perform an early warning. The software behavior characteristic knowledge base defines boundaries for terminal side software behaviors, daily running conditions of the software are recorded by log files, and unreliable behavior conditions can be accurately positioned in the log records by combining early warning information, so that abnormal behavior data can be better provided for service personnel to investigate and obtain evidence.
The invention provides an embodiment of a software behavior recognition system based on a behavior feature knowledge base, as shown in fig. 7, comprising:
the software behavior characteristic knowledge base construction system specifically comprises a data acquisition module 51, a statistical analysis module 52 and a characteristic knowledge base construction module 53, and is used for constructing a software behavior characteristic knowledge base according to the standard behavior of terminal-side software;
the software behavior credibility identification system specifically comprises a software behavior acquisition module 61 and a software behavior judgment module 62, and is used for judging the credibility of the software behavior at the terminal side according to the software behavior feature knowledge base and giving an early warning when an untrusted software behavior is found.
The partial process of the system embodiment of the invention is similar to that of the method embodiment, the description of the system embodiment is simpler, and the method embodiment is referred to for the corresponding part.
An embodiment of the present invention further provides an electronic device, as shown in fig. 8, which can implement the processes in the embodiments shown in fig. 1, 3, and 4 of the present invention, where the electronic device includes: the device comprises a shell 81, a processor 82, a memory 83, a circuit board 84 and a power circuit 85, wherein the circuit board 84 is arranged inside a space surrounded by the shell 81, and the processor 82 and the memory 83 are arranged on the circuit board 84; a power supply circuit 85 for supplying power to each circuit or device of the electronic apparatus; the memory 83 is used for storing executable program codes; the processor 82 runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the method described in the foregoing embodiment.
For the specific execution process of the above steps by the processor 82 and the steps further executed by the processor 82 by running the executable program code, reference may be made to the description of the embodiments shown in fig. 1, 3, and 4 of the present invention, which is not described herein again.
The electronic device exists in a variety of forms, including but not limited to:
(1) a server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(2) And other electronic equipment with data interaction function.
Embodiments of the present invention also provide a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the method described in the foregoing embodiments.
The invention judges the standard behavior of the terminal software by the data collection of the terminal side and the flow side and combining the behavior information boundary of the terminal software to form a software behavior characteristic knowledge base. The software behavior characteristic knowledge base can provide a network behavior baseline of the terminal software and assist a user in judging the behaviors of the trusted software and the untrusted software. The invention can enrich the behavior portrayal of the terminal equipment and support the data for asset identification and asset function conjecture. Meanwhile, the invention can define the boundary for the network behavior of the terminal equipment, assist operation and maintenance personnel to master the network behavior condition of the equipment, and find and dispose abnormal behaviors in time.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. A method for constructing a knowledge base of software behavior characteristics is characterized by comprising the following steps:
determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, and aligning the collected data timeline by using an end flow timeline data alignment technology;
performing statistical analysis on the data of the aligned time line by combining URL access information and a network protocol in the data of the aligned time line to obtain standard behaviors of the terminal side software;
and the obtained standard behaviors of the terminal side software are arranged into behavior rules to form a software behavior characteristic knowledge base.
2. The method according to claim 1, wherein the performing statistical analysis on the data of the aligned timeline in combination with URL access information and a network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and obtaining specific software behaviors by combining specific parameter information of the URL;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and then obtaining specific software behaviors according to the specified character information of the specified position.
3. A software behavior credibility identification method is characterized by comprising the following steps:
monitoring the terminal side software process and the flow side data flow in real time to obtain the specific behavior of the terminal side software;
and comparing the specific behavior of the terminal side software with the standard behavior rule of the corresponding software in the software behavior characteristic knowledge base, and judging that the corresponding software behavior belongs to an unreliable behavior when the software behavior which does not conform to the standard rule of the corresponding software exists in the comparison, so as to give an early warning.
4. A software behavior feature knowledge base construction system is characterized by comprising:
the data acquisition module is used for determining terminal side software to be identified, collecting the progress of the terminal side software and the data traffic of a corresponding traffic side, aligning the collected data timeline by using an end flow timeline data alignment technology, and sending the data of the aligned timeline to the statistical analysis module;
the statistical analysis module is used for receiving the data of the aligned time line sent by the data acquisition module, performing statistical analysis on the data of the aligned time line by combining URL (uniform resource locator) access information and a network protocol in the data of the aligned time line to obtain the standard behavior of the terminal side software, and sending the obtained standard behavior information of the terminal side software to the characteristic knowledge base construction module;
and the characteristic knowledge base construction module is used for receiving the standard behavior information of the terminal side software sent by the statistical analysis module, and arranging the standard behavior information into behavior rules to form a software behavior characteristic knowledge base.
5. The system according to claim 4, wherein the performing statistical analysis on the data of the aligned timeline in combination with the URL access information and the network protocol in the data of the aligned timeline specifically includes:
according to a specific related network protocol, splitting the data of the aligned time lines according to a common network protocol and a special network protocol, and filtering out interference data;
for data in a common network protocol, extracting URL access information in the data, analyzing the function of a domain name requested by the URL, and obtaining specific software behaviors by combining specific parameter information of the URL;
and analyzing the original flow packet of the corresponding flow side of the data in the special network protocol to obtain specific network protocol information, and then obtaining specific software behaviors according to the specified character information of the specified position.
6. A software behavior credibility identification system, comprising:
the software behavior acquisition module is used for monitoring the terminal side software process and the flow side data flow in real time to obtain the specific behavior of the terminal side software and sending the specific behavior of the terminal side software to the software behavior judgment module;
and the software behavior judging module is used for receiving the specific behavior of the terminal side software sent by the software behavior acquiring module, comparing the specific behavior of the terminal side software with the standard behavior rule of the corresponding software in the software behavior characteristic knowledge base, and judging that the corresponding software behavior belongs to the unreliable behavior when the software behavior which does not conform to the standard rule of the corresponding software exists, so as to give an early warning.
7. A software behavior recognition system based on a behavior feature knowledge base, comprising:
the software behavior characteristic knowledge base construction system is used for constructing a software behavior characteristic knowledge base according to the standard behavior of the terminal side software;
the software behavior credibility identification system is used for judging the credibility of the software behavior at the terminal side according to the software behavior characteristic knowledge base and giving an early warning when an incredible software behavior is found.
8. An electronic device, characterized in that the electronic device comprises: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the method of any one of claims 1 to 3.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium stores one or more programs which are executable by one or more processors to implement the method of any one of claims 1-3.
CN202111211216.9A 2021-10-18 2021-10-18 Software behavior recognition method and system based on behavior feature knowledge base Active CN113949571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111211216.9A CN113949571B (en) 2021-10-18 2021-10-18 Software behavior recognition method and system based on behavior feature knowledge base

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111211216.9A CN113949571B (en) 2021-10-18 2021-10-18 Software behavior recognition method and system based on behavior feature knowledge base

Publications (2)

Publication Number Publication Date
CN113949571A true CN113949571A (en) 2022-01-18
CN113949571B CN113949571B (en) 2023-12-22

Family

ID=79331244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111211216.9A Active CN113949571B (en) 2021-10-18 2021-10-18 Software behavior recognition method and system based on behavior feature knowledge base

Country Status (1)

Country Link
CN (1) CN113949571B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110231519A1 (en) * 2006-06-09 2011-09-22 Qualcomm Incorporated Enhanced block-request streaming using url templates and construction rules
CN103699489A (en) * 2014-01-03 2014-04-02 中国人民解放军装甲兵工程学院 Software remote fault diagnosis and repair method based on knowledge base
CN106664254A (en) * 2014-08-21 2017-05-10 七网络有限责任公司 Optimizing network traffic management in a mobile network
CN108573308A (en) * 2018-04-11 2018-09-25 湖南女子学院 The automated construction method and system of soft project knowledge base based on big data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110231519A1 (en) * 2006-06-09 2011-09-22 Qualcomm Incorporated Enhanced block-request streaming using url templates and construction rules
CN103699489A (en) * 2014-01-03 2014-04-02 中国人民解放军装甲兵工程学院 Software remote fault diagnosis and repair method based on knowledge base
CN106664254A (en) * 2014-08-21 2017-05-10 七网络有限责任公司 Optimizing network traffic management in a mobile network
CN108573308A (en) * 2018-04-11 2018-09-25 湖南女子学院 The automated construction method and system of soft project knowledge base based on big data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DAVID SINGER, WILLIAM BELKNAP, GUIDO FRANCESCHINI: "ISO Media File format specification MP4 Technology under consideration for ISO/IEC 14496-1:2001/Amd 3", INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION *
张凤斌, 杨永田: "基于网络性能异常检测算法的研究", 哈尔滨理工大学学报, no. 03 *

Also Published As

Publication number Publication date
CN113949571B (en) 2023-12-22

Similar Documents

Publication Publication Date Title
US7752663B2 (en) Log analysis system, method and apparatus
CN108667855B (en) Network flow abnormity monitoring method and device, electronic equipment and storage medium
US20120311562A1 (en) Extendable event processing
CN112114995A (en) Process-based terminal anomaly analysis method, device, equipment and storage medium
CN110943984B (en) Asset safety protection method and device
CN107426196B (en) Method and system for identifying WEB invasion
CN103095821B (en) Continuous auditing system based on virtual machine migration recognition
CN112953917B (en) Network attack source identification method and device, computer equipment and storage medium
CN110868403B (en) Method and equipment for identifying advanced persistent Attack (APT)
CN114244564B (en) Attack defense method, device, equipment and readable storage medium
CN112131571B (en) Threat tracing method and related equipment
CN107666464B (en) Information processing method and server
CN108566392B (en) Machine learning-based system and method for preventing CC attack
KR101266930B1 (en) A visualization system for Forensics audit data
CN114189378A (en) Network security event analysis method and device, electronic equipment and storage medium
CN114298558B (en) Electric power network safety research and judgment system and research and judgment method thereof
CN115296888A (en) Data radar monitoring system
CN115174205A (en) Network space safety real-time monitoring method, system and computer storage medium
US20240080330A1 (en) Security monitoring apparatus, security monitoring method, and computer readable medium
CN117973347A (en) Automatic traceability report automatic generation method and system based on automatic template filling technology
CN113987508A (en) Vulnerability processing method, device, equipment and medium
CN112699369A (en) Method and device for detecting abnormal login through stack backtracking
CN113949571B (en) Software behavior recognition method and system based on behavior feature knowledge base
CN115913634A (en) Network security abnormity detection method and system based on deep learning
CN117056918A (en) Code analysis method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant