CN115001876B - Method, system, terminal equipment and storage medium for protecting gateway on WAN side - Google Patents

Method, system, terminal equipment and storage medium for protecting gateway on WAN side Download PDF

Info

Publication number
CN115001876B
CN115001876B CN202210935871.7A CN202210935871A CN115001876B CN 115001876 B CN115001876 B CN 115001876B CN 202210935871 A CN202210935871 A CN 202210935871A CN 115001876 B CN115001876 B CN 115001876B
Authority
CN
China
Prior art keywords
file
copied
gateway
state
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210935871.7A
Other languages
Chinese (zh)
Other versions
CN115001876A (en
Inventor
李科
肖端良
王喜祝
陈政
王周锋
陈秋平
董启凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yilian Unlimited Technology Co ltd
Original Assignee
Shenzhen Comnect Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Comnect Technology Co ltd filed Critical Shenzhen Comnect Technology Co ltd
Priority to CN202210935871.7A priority Critical patent/CN115001876B/en
Publication of CN115001876A publication Critical patent/CN115001876A/en
Application granted granted Critical
Publication of CN115001876B publication Critical patent/CN115001876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Abstract

The application discloses a method, a system, terminal equipment and a storage medium for protecting a gateway on a WAN side, which relate to the technical field of network security, and the method comprises the following steps: copying the source file and hiding the source file, renaming the copied file to finish disguising the source file; writing the copied file into a file monitoring list, monitoring the file state of the copied file through the file monitoring list, and tracking the change of the file state to generate an information list; and after the file state changes, closing the network connection service port at the WAN side. The security of the gateway is improved by the method of protecting the gateway on the WAN side, and the exposure of the data and configuration of the gateway is avoided.

Description

Method, system, terminal equipment and storage medium for protecting gateway on WAN side
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method, a system, a terminal device, and a storage medium for protecting a gateway on a WAN side.
Background
Most gateways now open up TELNET, SSH, FTPD, TFTPD ports and then access TELNET, SSH, FTPD, TFTPD services of the gateway through WAN side IP.
If a hacker initiates these connections on the WAN side, the data and configuration of the gateway will likely be exposed, and protection measures need to be implemented on the gateway in order to prevent hackers from maliciously attacking the gateway, stealing the gateway data and breaking the configuration.
Disclosure of Invention
Purpose of (one) application
Based on the above, in order to prevent hackers from initiating connection through the network connection service port on the WAN side, maliciously attacking the gateway, and improving the security of the gateway, the present application discloses the following technical solutions.
(II) technical scheme
The application discloses a method for protecting a gateway on a WAN side, which comprises the following steps:
copying the source file and hiding the source file, renaming the copy file of the source file to finish disguising the source file;
creating a file directory according to the storage path of the copied file, adding the file directory to a file monitoring list, monitoring the file state of the copied file through the file monitoring list, changing the file state of the copied file, wherein the file state of the copied file is correspondingly changed, the file state of the copied file comprises accessed, modified and changed CHANGE, and when the copied file is accessed, modified or changed, the file monitoring list feeds back corresponding information to an information list;
the attack intention of a hacker can be analyzed through feedback information in an information list, wherein the information list comprises an access file name, an access time, an access network connection service name and an access IP address;
and after the file state of the copied file is changed, closing the network connection service port at the WAN side.
In one possible implementation, the source file hiding method includes:
newly creating a hidden folder, and moving a source file into the hidden folder;
renaming the hidden folder by using the class identifier, disguising the hidden folder as a system icon, and jumping to the system icon when accessing.
In one possible implementation manner, the duplicate file renaming method is as follows: changing the first letter of the file name of the copied file, changing to uppercase if the first letter of the file name is lowercase, and changing to lowercase if the first letter of the file name is uppercase.
In a possible implementation manner, when the copied file is attacked, the file state of the copied file is changed correspondingly, and the attack intention of a hacker is analyzed through feedback information in the information list.
As a second aspect of the present application, the present application also discloses a system of WAN side protection gateway, including:
a copy module for copying the source file;
a hiding module for hiding the source file;
a masquerading module for renaming the copy file of the source file to finish masquerading the source file;
the file catalog generation module is used for creating a file catalog according to the storage path of the copied file;
the monitoring module is used for adding the file catalogue to a file monitoring list and monitoring the file state of the copied file through the file monitoring list;
the tracking module is used for tracking the CHANGE of the file state to generate an information list, the file state of the copied file comprises accessed, modified and changed CHANGE, and when the copied file is accessed, modified or changed, the file monitoring list feeds corresponding information back to the information list;
the analysis module analyzes attack intention of a hacker through feedback information in an information list, wherein the information list comprises an access file name, an access time, an access network connection service name and an access IP address;
and the closing module is used for closing the network connection service port at the WAN side after the file state of the copied file changes.
As a third aspect of the present application, the present application also discloses a terminal device of a WAN side protection gateway, comprising a memory, a processor and a script program, characterized in that the script program is stored in the memory, and the script program is executed by the processor to implement the steps of the method of protecting a WAN side protection gateway as described above.
In one possible embodiment, a path is marked in the script program, through which the copy file is uploaded into the script program.
As a fourth aspect of the present application, the present application also discloses a storage medium of the WAN side protection gateway, the storage medium storing a script program which, when executed by a processor, implements the steps of the method of the WAN side protection gateway as described above.
(III) beneficial effects
According to the WAN side gateway protection method disclosed by the application, the important source file is copied, the copied file is renamed, the purpose of disguising the source file is achieved, after the source file is hidden, the security of the copied file and the source file is improved, the file state of the copied file is monitored, the effect that a network connection service port can be disconnected in time when a hacker accesses the copied file is achieved, and active defense is carried out on malicious attacks of the hacker.
Drawings
The embodiments described below with reference to the drawings are exemplary and intended for the purpose of illustrating and explaining the present application and are not to be construed as limiting the scope of protection of the present application.
Fig. 1 is a flow chart of a method of protecting a gateway on the WAN side as disclosed herein.
Fig. 2 is a flowchart of a source file hiding method in the method of WAN side protection gateway disclosed in the present application.
Fig. 3 is a block diagram of a system of WAN side protection gateways as disclosed herein.
Detailed Description
In order to make the purposes, technical solutions and advantages of the implementation of the present application more clear, the technical solutions in the embodiments of the present application will be described in more detail below with reference to the accompanying drawings in the embodiments of the present application.
An embodiment of a method of WAN side protection gateway disclosed in the present application is described in detail below with reference to fig. 1. Referring to fig. 1, the method disclosed in this embodiment mainly includes: and step S10-S30.
S10: the source file is copied and hidden, and the copied file of the source file is renamed to complete disguising of the source file.
Wherein, referring to fig. 2, the source file hiding method comprises:
s11: newly creating a hidden folder, and moving a source file into the hidden folder;
s12: renaming the hidden folder by using the class identifier, disguising the hidden folder as a system icon, and jumping to the system icon when accessing.
The method for renaming the copy file comprises the following steps: changing the first letter of the file name of the copied file, changing to uppercase if the first letter of the file name is lowercase, and changing to lowercase if the first letter of the file name is uppercase.
S20: creating a file directory according to the storage path of the copied file, adding the file directory to a file monitoring list, monitoring the file state of the copied file through the file monitoring list, tracking the change of the file state of the copied file, and generating an information list;
s30: and after the file state of the copied file is changed, closing the network connection service port at the WAN side.
The file state of the copied file comprises accessed ACCESS, modified CHANGE and changed CHANGE, and when the copied file is accessed, modified or changed, the file state of the copied file CHANGEs, and the file monitoring list immediately feeds back corresponding information.
In one embodiment, the file status of the duplicate file may be set to be accessed ACCESS, and when a hacker reads the duplicate file, the file status of the duplicate file changes, and after the file monitoring list monitors the change, information is fed back to the information list.
In one embodiment, the file status of the copy file may be set to modified mode, and when a hacker modifies the copy file, the file status of the copy file changes, and after the file monitoring list monitors the change, information is fed back to the information list.
In one embodiment, the file status of the duplicate file may be set to changed CHANGE, and when a hacker modifies the attribute of the duplicate file, the file status of the duplicate file CHANGEs, and after the file monitor list monitors the CHANGE, information is fed back to the information list.
In summary, when a hacker attacks the copied file, the file state of the copied file is changed correspondingly, and the attack intention of the hacker can be analyzed through the feedback information in the information list.
The information list comprises an access file name, an access time, an access network connection service name and an access IP address.
Network connection services include SSH, TELENT, HTTP, FTP, TFTP, and the like.
Based on the same inventive concept, the embodiment of the present invention further provides a system for protecting a gateway on a WAN side, referring to fig. 3, including:
a copy module for copying the source file;
the hidden module is used for creating a hidden folder, moving the source file into the hidden folder, renaming the hidden folder by using the class identifier, disguising the hidden folder into a system icon, and jumping to the system icon when accessing.
A masquerading module for renaming a copy file of the source file;
specifically, the disguising module is configured to change a first letter of a file name of the copied file, to be uppercase if the first letter of the file name is lowercase, and to be lowercase if the first letter of the file name is uppercase.
The file catalog generation module is used for creating a file catalog according to the storage path of the copied file;
the monitoring module is used for adding the file catalogue to a file monitoring list and monitoring the file state of the copied file through the file monitoring list;
the tracking module is used for tracking the change of the file state of the copied file and generating an information list;
and the closing module is used for closing the network connection service port at the WAN side after the file state changes.
The file state changing module is used for changing the file state of the copied file when the copied file is attacked;
and the intention analysis module is used for analyzing the attack intention of the hacker through feedback information in an information list, wherein the information list comprises an access file name, an access time, an access network connection service name and an access IP address.
Based on the same inventive concept, the embodiment of the invention also provides a terminal device of the WAN side protection gateway, which comprises a memory, a processor and a script program, and is characterized in that the script program is stored in the memory, and the script program realizes the steps of the method for protecting the WAN side protection gateway when being run by the processor.
The path is marked in the script program, and the copy file is uploaded to the script program through the path.
Based on the same inventive concept, the embodiments of the present invention also provide a storage medium of the WAN side protection gateway, and the script program, when executed by the processor, implements the steps of the method for protecting the gateway on the WAN side as above. Specifically, the script program includes a step process of implementing the method for protecting the gateway on the WAN side, for example, a process: add_file, the file a.txt is camouflaged by the process, and a.txt is automatically generated.
The script program is realized through a C language, can also be realized through languages such as python, C++, java and the like, and is executed in a LINUX operating system.
In summary, the developer uploads the important source files through the specified path in the script program, the source files can be one or a plurality of source files, the source files can automatically copy and hide the source files in the script program, the monitoring of the copied files is also realized, after the state of the files changes, an information list is automatically generated, the network connection service port of the WAN side is automatically closed, the leakage of the important files is prevented, and the security of the gateway is improved.
The division of modules, units or components herein is merely a division of logic functions, and other manners of division are possible in actual implementation, e.g., multiple modules and/or units may be combined or integrated in another system. The modules, units, and components illustrated as separate components may or may not be physically separate. The components displayed as cells may be physical cells or may not be physical cells, i.e., may be located in a specific place or may be distributed in grid cells. And therefore some or all of the elements may be selected according to actual needs to implement the solution of the embodiment.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

  1. A method for protecting a gateway on a wan side, comprising:
    copying the source file and hiding the source file, renaming the copy file of the source file to finish disguising the source file;
    creating a file directory according to the storage path of the copied file, adding the file directory to a file monitoring list, monitoring the file state of the copied file through the file monitoring list, tracking the CHANGE of the file state of the copied file, and generating an information list, wherein the file state of the copied file comprises accessed ACCESS, modified CHANGE and changed CHANGE;
    the attack intention of a hacker can be analyzed through feedback information in an information list, wherein the information list comprises an access file name, an access time, an access network connection service name and an access IP address;
    and after the file state of the copied file is changed, closing the network connection service port at the WAN side.
  2. 2. The method of WAN-side protection gateway of claim 1, wherein the source file hiding method comprises:
    newly creating a hidden folder, and moving a source file into the hidden folder;
    renaming the hidden folder by using the class identifier, disguising the hidden folder as a system icon, and jumping to the system icon when accessing.
  3. 3. The method of WAN side protection gateway of claim 1, wherein the duplicate file renaming method is: changing the first letter of the file name of the copied file, changing to uppercase if the first letter of the file name is lowercase, and changing to lowercase if the first letter of the file name is uppercase.
  4. 4. The method for protecting a gateway on a WAN side according to claim 1, wherein when the duplicated file is attacked, changing a file state of the duplicated file, and the file state of the duplicated file is changed accordingly, and analyzing an attack intention of a hacker through feedback information in the information list.
  5. A system for wan side protection gateway, comprising:
    a copy module for copying the source file;
    a hiding module for hiding the source file;
    a masquerading module for renaming the copy file of the source file to finish masquerading the source file;
    the file catalog generation module is used for creating a file catalog according to the storage path of the copied file;
    the monitoring module is used for adding the file catalogue to a file monitoring list and monitoring the file state of the copied file through the file monitoring list;
    the tracking module is used for tracking the CHANGE of the file state to generate an information list, the file state of the copied file comprises accessed, modified and changed CHANGE, and when the copied file is accessed, modified or changed, the file monitoring list feeds corresponding information back to the information list;
    the intention analysis module analyzes attack intention of a hacker through feedback information in an information list, wherein the information list comprises an access file name, an access time, an access network connection service name and an access IP address;
    and the closing module is used for closing the network connection service port at the WAN side after the file state of the copied file changes.
  6. Terminal equipment of a WAN side protection gateway, comprising a memory, a processor and a script program, characterized in that the script program is stored in the memory, which script program, when run by the processor, performs the steps of the method of any of claims 1 to 4.
  7. 7. The WAN-side protection gateway terminal device of claim 6, wherein a path is marked in the script program, and the copy file is uploaded to the script program through the path.
  8. A storage medium for a WAN-side protection gateway, wherein the storage medium stores a script program which, when executed by a processor, implements the steps of the method of the WAN-side protection gateway of any one of claims 1 to 4.
CN202210935871.7A 2022-08-05 2022-08-05 Method, system, terminal equipment and storage medium for protecting gateway on WAN side Active CN115001876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210935871.7A CN115001876B (en) 2022-08-05 2022-08-05 Method, system, terminal equipment and storage medium for protecting gateway on WAN side

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210935871.7A CN115001876B (en) 2022-08-05 2022-08-05 Method, system, terminal equipment and storage medium for protecting gateway on WAN side

Publications (2)

Publication Number Publication Date
CN115001876A CN115001876A (en) 2022-09-02
CN115001876B true CN115001876B (en) 2023-04-21

Family

ID=83023006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210935871.7A Active CN115001876B (en) 2022-08-05 2022-08-05 Method, system, terminal equipment and storage medium for protecting gateway on WAN side

Country Status (1)

Country Link
CN (1) CN115001876B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495443A (en) * 2018-09-13 2019-03-19 中国科学院信息工程研究所 The method and system of software attacks is extorted in a kind of Intrusion Detection based on host honey jar confrontation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604268B (en) * 2009-07-13 2011-04-06 浪潮电子信息产业股份有限公司 Method for filtering monitored directory change events
CN109271804B (en) * 2018-08-09 2022-02-22 山东中孚安全技术有限公司 File auditing and protecting method based on Linux security module
CN110750788A (en) * 2019-10-16 2020-02-04 杭州安恒信息技术股份有限公司 Virus file detection method based on high-interaction honeypot technology
CN111400674A (en) * 2020-03-12 2020-07-10 北京北信源软件股份有限公司 Security software self-protection method and device based on Hook technology

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495443A (en) * 2018-09-13 2019-03-19 中国科学院信息工程研究所 The method and system of software attacks is extorted in a kind of Intrusion Detection based on host honey jar confrontation

Also Published As

Publication number Publication date
CN115001876A (en) 2022-09-02

Similar Documents

Publication Publication Date Title
Lemay et al. Survey of publicly available reports on advanced persistent threat actors
Binsalleeh et al. On the analysis of the zeus botnet crimeware toolkit
Parampalli et al. A practical mimicry attack against powerful system-call monitors
EP1643408B1 (en) Isolating software deployment over a network from external malicious intrusion
Lockhart Network Security Hacks: Tips & Tools for Protecting Your Privacy
US11374964B1 (en) Preventing lateral propagation of ransomware using a security appliance that dynamically inserts a DHCP server/relay and a default gateway with point-to-point links between endpoints
Peter et al. A practical guide to honeypots
CA2688553A1 (en) System and method for providing network and computer firewall protection with dynamic address isolation to a device
CN103634786A (en) Method and system for security detection and repair of wireless network
JP2024023875A (en) Inline malware detection
CN115001876B (en) Method, system, terminal equipment and storage medium for protecting gateway on WAN side
Rahalkar Certified Ethical Hacker (CEH) Foundation Guide
Velu Mastering Kali Linux for advanced penetration testing
Rawat et al. ZeroAccess botnet investigation and analysis
Fenzi et al. Linux security HOWTO
Karagiannis et al. A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios-A Rootkit Case Study
Massoud Threat Simulations of Cloud-Native Telecom Applications
Mokhov et al. Automating MAC spoofer evidence gathering and encoding for investigations
Lihet et al. How to build a honeypot System in the cloud
US20240022589A1 (en) Risk analysis device, analysis target element determination device, and method
Dubrawsky Eleventh Hour Security+: Exam SY0-201 Study Guide
Hovmark et al. Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS
Clinton Linux security fundamentals
Bergande et al. Using honeypots to analyze bots and botnets
Matza Development of an Experimental C2 Utilizing Network Sockets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518000 Room 501, block a, building 8, Shenzhen International Innovation Valley, Dashi Road, Xili community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: Shenzhen Yilian Unlimited Technology Co.,Ltd.

Address before: 518000 Room 501, block a, building 8, Shenzhen International Innovation Valley, Dashi Road, Xili community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee before: SHENZHEN COMNECT TECHNOLOGY CO.,LTD.

CP01 Change in the name or title of a patent holder