CN114238950A - Method and system for intelligently generating mandatory access control strategy and checking strategy - Google Patents

Method and system for intelligently generating mandatory access control strategy and checking strategy Download PDF

Info

Publication number
CN114238950A
CN114238950A CN202111291678.6A CN202111291678A CN114238950A CN 114238950 A CN114238950 A CN 114238950A CN 202111291678 A CN202111291678 A CN 202111291678A CN 114238950 A CN114238950 A CN 114238950A
Authority
CN
China
Prior art keywords
strategy
access control
vulnerability
safety
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111291678.6A
Other languages
Chinese (zh)
Inventor
陈志鑫
张裁会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Desay SV Intelligent Transport Technology Research Institute Co Ltd
Original Assignee
Huizhou Desay SV Intelligent Transport Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Desay SV Intelligent Transport Technology Research Institute Co Ltd filed Critical Huizhou Desay SV Intelligent Transport Technology Research Institute Co Ltd
Priority to CN202111291678.6A priority Critical patent/CN114238950A/en
Publication of CN114238950A publication Critical patent/CN114238950A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Abstract

The invention provides a method and a system for intelligently generating a mandatory access control strategy and checking the strategy, which are characterized in that the mandatory access control strategy is intelligently generated based on a blocking attack path, the existing vulnerability of the system is analyzed, the attack path corresponding to the vulnerability is taken as input, and the mandatory access control strategy for blocking the attack path is output; and/or checking the security of the manual writing strategy based on the security model, inputting the manual writing strategy into the system, analyzing the strategy according to the security model, outputting the strategy violating the security model, improving the writing efficiency and effectiveness of the mandatory access control strategy, and intelligently generating the mandatory access control strategy capable of effectively protecting the system to avoid developers writing the strategy of the illegal access control principle due to insufficient knowledge and experience.

Description

Method and system for intelligently generating mandatory access control strategy and checking strategy
Technical Field
The invention relates to the technical field of driving assistance, in particular to a method and a system for intelligently generating a mandatory access control strategy and checking the strategy.
Background
Mandatory access control is a common and effective protection mechanism in system security, and can effectively alleviate zero-day bugs and reduce harm after privilege escalation. By writing the strategy, strict limitation is performed on the behavior of accessing resources by the process, so that sensitive resources of the system are effectively protected. The effectiveness and the safety of the strategy depend on the mastering degree of the strategy writer on safety knowledge and the understanding degree of a system framework and a service, so that the requirement on the capability of the strategy writer is high; common software developers also need to open required resource access rights for own applications/processes by writing strategies, and if common software development engineers lack necessary security knowledge, the common software developers may allocate too high rights to own responsible processes, thereby increasing the security risk of system intrusion and rights-lifting. Therefore, a method for intelligently generating a high-efficiency mandatory access control policy and simultaneously checking the security of a manually written policy is needed.
Disclosure of Invention
Aiming at the technical problems, the invention provides a method and a system for intelligently generating a mandatory access control strategy and checking the strategy, which analyze the loophole existing in the system, take an attack path corresponding to the loophole as input, output the mandatory access control strategy for blocking the attack path and prevent the loophole from being utilized; and inputting the strategy written by the manual into the system, and analyzing the strategy by the system according to the security model to output the strategy violating the security model. Therefore, the writing efficiency and effectiveness of the mandatory access control strategy are improved, the strategy checking module can be used for detecting the strategy written by the personnel lacking the security knowledge manually, and the operation authority of sensitive resources is prevented from being opened to unnecessary processes.
Specifically, the method for intelligently generating the mandatory access control policy and checking the policy of the invention includes:
intelligently generating a mandatory access control strategy based on the blocking attack path, analyzing the vulnerability existing in the system, taking the attack path corresponding to the vulnerability as input, and outputting the mandatory access control strategy of the blocking attack path;
and/or checking the safety of the manual writing strategy based on the safety model, inputting the manual writing strategy into the system, analyzing the strategy according to the safety model, and outputting the strategy violating the safety model.
Further, the intelligent generation of the mandatory access control policy by the blocking attack path further includes the following steps:
s11: collecting a system vulnerability library and a corresponding attack path, and scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
s12: collecting attack paths which can lead the vulnerabilities to be utilized, inputting a vulnerability list into a vulnerability analysis module, checking whether each vulnerability has an available method or not, and collecting the attack paths corresponding to each utilization method;
s13: and generating a strategy based on the resource access operation of the attack path, identifying the resource access operation on the attack path of each vulnerability utilization method, generating a mandatory access control strategy to prevent the access operation of the resources, and interrupting the attack path.
Further, the checking the security of the manual writing policy based on the security model further comprises the following steps:
s21: selecting a safety model according to the type of the product;
s22: judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, then go to S23; continuing to judge whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, if so, turning to S23; otherwise, continuing the next strategy check;
s23: and recording the inspection result, describing a specific error reason for illegal operation strategies or processes which are not allowed to be distributed, and generating a final inspection report.
And the final inspection report records information which is not matched with the security model, including process information for carrying out illegal operation on sensitive resources and process allocation error information.
As another preferred embodiment, the present invention further provides a system for intelligently generating a mandatory access control policy and a check policy, which at least includes: automatically generating a mandatory access control strategy module and checking a manual writing strategy module;
the automatic generation mandatory access control strategy module intelligently generates a mandatory access control strategy based on the blocking attack path, analyzes the vulnerability existing in the system, takes the attack path corresponding to the vulnerability as input, and outputs the mandatory access control strategy of the blocking attack path;
the checking manual writing strategy module checks the safety of the manual writing strategy based on the safety model, inputs the manual writing strategy into the system, analyzes the strategy according to the safety model and outputs the strategy violating the safety model.
Further, the module for automatically generating a mandatory access control policy further includes:
the vulnerability scanning module is used for scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
the vulnerability analysis module is used for inputting a vulnerability list, analyzing the vulnerabilities existing in the system, searching a vulnerability utilization method existing in each vulnerability for each vulnerability and outputting an attack path corresponding to the vulnerability utilization method;
and the strategy generation module identifies the resource access operation in each attack path and generates a mandatory access control strategy for rejecting the operation.
Further, the checking and manually writing the policy module further includes:
the safety model database inputs safety module rules, establishes a corresponding safety module and switches corresponding safety models according to the types of products;
the strategy checker inputs a manually written strategy, performs matching analysis based on the selected safety model, and identifies the strategy violating the safety model;
and the report generator is used for outputting a visualized report, wherein the visualized report contains illegal operation strategies or processes which are not allowed to be distributed, and corresponding error reasons.
Wherein the security model database further comprises: the method comprises the steps of establishing a safety model according to requirements in advance, storing the safety model in a safety model database, searching and calling the safety model in the safety model database when the safety model is selected, reconstructing a new safety model and updating the new safety model into the safety model database when a search result is that no matched safety model exists, and automatically updating real-time data in a preset time period by the safety model database.
The policy checker further comprises:
judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, recording an output result; continuously judging whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, and if so, recording the inspection result; otherwise, the next policy check is continued.
In summary, the present invention provides a method and a system for intelligently generating a mandatory access control policy and checking a policy, wherein the mandatory access control policy is intelligently generated based on a blocking attack path, a vulnerability existing in the system is analyzed, the attack path corresponding to the vulnerability is used as an input, and the mandatory access control policy blocking the attack path is output; and/or checking the security of the manual writing strategy based on the security model, inputting the manual writing strategy into the system, analyzing the strategy according to the security model, outputting the strategy violating the security model, improving the writing efficiency and effectiveness of the mandatory access control strategy, and intelligently generating the mandatory access control strategy capable of effectively protecting the system to avoid developers writing the strategy of the illegal access control principle due to insufficient knowledge and experience.
Drawings
Fig. 1 is a flowchart of intelligently generating a mandatory access control policy based on a blocking attack path according to the present invention.
FIG. 2 is a flow chart of checking the security of a manually written policy based on a security model according to the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention discloses a method for intelligently generating a mandatory access control strategy and checking the strategy, which comprises the following steps:
intelligently generating a mandatory access control strategy based on the blocking attack path, analyzing the vulnerability existing in the system, taking the attack path corresponding to the vulnerability as input, and outputting the mandatory access control strategy of the blocking attack path;
and/or checking the safety of the manual writing strategy based on the safety model, inputting the manual writing strategy into the system, analyzing the strategy according to the safety model, and outputting the strategy violating the safety model.
Further, the intelligent generation of the mandatory access control policy by the blocking attack path, as shown in fig. 1, further includes the following steps:
s11: collecting a system vulnerability library and a corresponding attack path, and scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
furthermore, a crawler of the system vulnerability library and the corresponding attack path is conducted from the existing data cloud, the vulnerability of the existing latest common vehicle-mounted operating system (such as Linux and Android) is obtained, the vulnerability is added to a vulnerability scanning module, and the vehicle-mounted operating system is scanned by the vulnerability scanning module to obtain a vulnerability list of the vehicle-mounted operating system.
S12: collecting attack paths which can lead the vulnerabilities to be utilized, inputting a vulnerability list into a vulnerability analysis module, checking whether each vulnerability has an available method or not, and collecting the attack paths corresponding to each utilization method;
further, by collecting the attack paths that may cause the vulnerability to be exploited, all resource access operations, such as reading/writing system configuration files, modifying security policies, etc., are found from the attack paths.
S13: and generating a strategy based on the resource access operation of the attack path, identifying the resource access operation on the attack path of each vulnerability utilization method, generating a mandatory access control strategy to prevent the access operation of the resources, and interrupting the attack path.
Furthermore, the resource access operation, such as copying personal data of a user, replacing a key file, tampering system security configuration and the like, prevents the access operation of the resources by generating a mandatory access control strategy, interrupts an attack path, and makes an attack method invalid.
Further, the checking the security of the manual writing policy based on the security model, as shown in fig. 2, further includes the following steps:
s21: selecting a safety model according to the type of the product;
s22: judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, then go to S23; continuing to judge whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, if so, turning to S23; otherwise, continuing the next strategy check;
s23: and recording the inspection result, describing a specific error reason for illegal operation strategies or processes which are not allowed to be distributed, and generating a final inspection report.
And the final inspection report records information which is not matched with the security model, including process information for carrying out illegal operation on sensitive resources and process allocation error information.
The method has the advantages that the mandatory access control strategy capable of effectively protecting the system is intelligently generated, developers are prevented from writing a strategy of an illegal access control principle due to insufficient knowledge and experience, writing efficiency and effectiveness of the mandatory access control strategy are improved, and the strategy written manually by the personnel lacking safety knowledge is detected by the strategy checking module, so that the operation authority of sensitive resources is prevented from being opened to unnecessary processes.
As another preferred embodiment, the present invention further provides a system for intelligently generating a mandatory access control policy and a check policy, which at least includes: automatically generating a mandatory access control strategy module and checking a manual writing strategy module;
the automatic generation mandatory access control strategy module intelligently generates a mandatory access control strategy based on the blocking attack path, analyzes the vulnerability existing in the system, takes the attack path corresponding to the vulnerability as input, and outputs the mandatory access control strategy of the blocking attack path;
the checking manual writing strategy module checks the safety of the manual writing strategy based on the safety model, inputs the manual writing strategy into the system, analyzes the strategy according to the safety model and outputs the strategy violating the safety model.
Further, the module for automatically generating a mandatory access control policy further includes:
the vulnerability scanning module is used for scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
the vulnerability analysis module is used for inputting a vulnerability list, analyzing the vulnerabilities existing in the system, searching a vulnerability utilization method existing in each vulnerability for each vulnerability and outputting an attack path corresponding to the vulnerability utilization method;
and the strategy generation module identifies the resource access operation in each attack path and generates a mandatory access control strategy for rejecting the operation.
Further, the checking and manually writing the policy module further includes:
and the safety model database inputs safety module rules, establishes a corresponding safety module, and switches corresponding safety models according to the types of products.
And the strategy checker inputs the manually written strategy, performs matching analysis based on the selected safety model, and identifies the strategy violating the safety model.
And the report generator is used for outputting a visualized report, wherein the visualized report contains illegal operation strategies or processes which are not allowed to be distributed, and corresponding error reasons.
Wherein the security model database further comprises: the method comprises the steps of establishing a safety model according to requirements in advance, storing the safety model in a safety model database, searching and calling the safety model in the safety model database when the safety model is selected, reconstructing a new safety model and updating the new safety model into the safety model database when a search result is that no matched safety model exists, and automatically updating real-time data in a preset time period by the safety model database.
The policy checker further comprises: judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, recording an output result; continuously judging whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, and if so, recording the inspection result; otherwise, the next policy check is continued.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for intelligently generating a mandatory access control policy and checking the policy is characterized by comprising the following steps:
intelligently generating a mandatory access control strategy based on the blocking attack path, analyzing the vulnerability existing in the system, taking the attack path corresponding to the vulnerability as input, and outputting the mandatory access control strategy of the blocking attack path;
and/or checking the safety of the manual writing strategy based on the safety model, inputting the manual writing strategy into the system, analyzing the strategy according to the safety model, and outputting the strategy violating the safety model.
2. The method for intelligently generating mandatory access control policies and checking policies according to claim 1, wherein the blocking attack path intelligently generates mandatory access control policies, further comprising the following steps:
s11: collecting a system vulnerability library and a corresponding attack path, and scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
s12: collecting attack paths which can lead the vulnerabilities to be utilized, inputting a vulnerability list into a vulnerability analysis module, checking whether each vulnerability has an available method or not, and collecting the attack paths corresponding to each utilization method;
s13: and generating a strategy based on the resource access operation of the attack path, identifying the resource access operation on the attack path of each vulnerability utilization method, generating a mandatory access control strategy to prevent the access operation of the resources, and interrupting the attack path.
3. The method for intelligently generating mandatory access control policies and checking policies according to claim 1, wherein the checking of the security of the manually written policies based on the security model further comprises the following steps:
s21: selecting a safety model according to the type of the product;
s22: judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, then go to S23; continuing to judge whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, if so, turning to S23; otherwise, continuing the next strategy check;
s23: and recording the inspection result, describing a specific error reason for illegal operation strategies or processes which are not allowed to be distributed, and generating a final inspection report.
4. The method as claimed in claim 3, wherein the security model is a security model that is created in advance according to a requirement, and is stored in a security model database, when the security model is selected, the security model is searched and called in the security model database, if the search result is a security model that is not matched, a new security model is reconstructed and updated in the security model database, and the security model database automatically updates real-time data in a preset time period.
5. The method of claim 4, wherein the final inspection report records information that does not match the security model, including process information for illegal operations on sensitive resources and process allocation error information.
6. A system for intelligently generating mandatory access control policies and checking policies, comprising at least: automatically generating a mandatory access control strategy module and checking a manual writing strategy module;
the automatic generation mandatory access control strategy module intelligently generates a mandatory access control strategy based on the blocking attack path, analyzes the vulnerability existing in the system, takes the attack path corresponding to the vulnerability as input, and outputs the mandatory access control strategy of the blocking attack path;
the checking manual writing strategy module checks the safety of the manual writing strategy based on the safety model, inputs the manual writing strategy into the system, analyzes the strategy according to the safety model and outputs the strategy violating the safety model.
7. The system of claim 6, wherein the automatically generating a mandatory access control policy module further comprises:
the vulnerability scanning module is used for scanning vulnerabilities of the system to obtain a vulnerability list existing in the system;
the vulnerability analysis module is used for inputting a vulnerability list, analyzing the vulnerabilities existing in the system, searching a vulnerability utilization method existing in each vulnerability for each vulnerability and outputting an attack path corresponding to the vulnerability utilization method;
and the strategy generation module identifies the resource access operation in each attack path and generates a mandatory access control strategy for rejecting the operation.
8. The system of claim 7, wherein the inspection hand-written policy module further comprises:
the safety model database inputs safety module rules, establishes a corresponding safety module and switches corresponding safety models according to the types of products;
the strategy checker inputs a manually written strategy, performs matching analysis based on the selected safety model, and identifies the strategy violating the safety model;
and the report generator is used for outputting a visualized report, wherein the visualized report contains illegal operation strategies or processes which are not allowed to be distributed, and corresponding error reasons.
9. The system of claim 8, wherein the security model database further comprises: the method comprises the steps of establishing a safety model according to requirements in advance, storing the safety model in a safety model database, searching and calling the safety model in the safety model database when the safety model is selected, reconstructing a new safety model and updating the new safety model into the safety model database when a search result is that no matched safety model exists, and automatically updating real-time data in a preset time period by the safety model database.
10. The system of claim 9, wherein the policy checker further comprises:
judging whether the manual compiling strategy allows illegal operation of the process on the sensitive resource according to the security model, and if so, continuing to access; if not, recording an output result; continuously judging whether the manual writing strategy allocates the special type with high authority to the process which is not allowed to be allocated, and if so, recording the inspection result; otherwise, the next policy check is continued.
CN202111291678.6A 2021-11-03 2021-11-03 Method and system for intelligently generating mandatory access control strategy and checking strategy Pending CN114238950A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111291678.6A CN114238950A (en) 2021-11-03 2021-11-03 Method and system for intelligently generating mandatory access control strategy and checking strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111291678.6A CN114238950A (en) 2021-11-03 2021-11-03 Method and system for intelligently generating mandatory access control strategy and checking strategy

Publications (1)

Publication Number Publication Date
CN114238950A true CN114238950A (en) 2022-03-25

Family

ID=80743627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111291678.6A Pending CN114238950A (en) 2021-11-03 2021-11-03 Method and system for intelligently generating mandatory access control strategy and checking strategy

Country Status (1)

Country Link
CN (1) CN114238950A (en)

Similar Documents

Publication Publication Date Title
Razgallah et al. A survey of malware detection in Android apps: Recommendations and perspectives for future research
US11455400B2 (en) Method, system, and storage medium for security of software components
US10154066B1 (en) Context-aware compromise assessment
CN102651061B (en) System and method of protecting computing device from malicious objects using complex infection schemes
US9424426B2 (en) Detection of malicious code insertion in trusted environments
US8732836B2 (en) System and method for correcting antivirus records to minimize false malware detections
CN102667712B (en) System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
US20160021174A1 (en) Computer implemented method for classifying mobile applications and computer programs thereof
US20040205411A1 (en) Method of detecting malicious scripts using code insertion technique
US7983900B2 (en) Method, computer program and apparatus for analysing symbols in a computer system
KR20090065183A (en) Apparatus and method automatically generating security policy of selinux based on selt
CN103065088A (en) System and method for detecting computer security threat based on decision of computer use
CN101604361A (en) A kind of detection method of Malware and device
CN112560043A (en) Vulnerability similarity measurement method based on context semantics
CN116846619A (en) Automatic network security risk assessment method, system and readable storage medium
Raymond et al. Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm.
Pandey et al. A framework for producing effective and efficient secure code through malware analysis
Liu et al. A smart contract vulnerability detection mechanism based on deep learning and expert rules
CN107885489A (en) A kind of method and system of quick detection real name registration data index
CN109299610B (en) Method for verifying and identifying unsafe and sensitive input in android system
Moffie et al. Hunting trojan horses
CN114238950A (en) Method and system for intelligently generating mandatory access control strategy and checking strategy
Kothari et al. A “Human-in-the-loop” approach for resolving complex software anomalies
CN113392016A (en) Protocol generation method, device, equipment and medium for processing program abnormal condition
Abbadini et al. Lightweight cloud application sandboxing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination