CN115733701A - Method, device, electronic equipment and storage medium for collecting threat intelligence sources - Google Patents
Method, device, electronic equipment and storage medium for collecting threat intelligence sources Download PDFInfo
- Publication number
- CN115733701A CN115733701A CN202211701195.3A CN202211701195A CN115733701A CN 115733701 A CN115733701 A CN 115733701A CN 202211701195 A CN202211701195 A CN 202211701195A CN 115733701 A CN115733701 A CN 115733701A
- Authority
- CN
- China
- Prior art keywords
- threat intelligence
- source
- target
- current
- source address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本发明实施例涉及互联网安全技术领域,特别涉及一种威胁情报源的采集方法、装置、电子设备及存储介质。Embodiments of the present invention relate to the technical field of Internet security, and in particular, to a method, device, electronic device, and storage medium for collecting threat intelligence sources.
背景技术Background technique
由于当今世界处于互联网的高速发展阶段,网络攻防环境也愈发复杂,快速、精准的消杀网络威胁成为了现今网络环境的必要需求。而威胁情报作为提供网络安全信息的媒介,是保障网络安全的压舱石,是助力网络安全的稳定器,亦是推进网络安全朝向良好发展的关键点。As the world today is in the stage of rapid development of the Internet, the network attack and defense environment is becoming more and more complex. Quick and accurate elimination of network threats has become a necessary requirement in today's network environment. Threat intelligence, as a medium for providing network security information, is the ballast stone to ensure network security, a stabilizer to help network security, and a key point to promote the development of network security.
现有的威胁情报源的采集方法主要是人为地对威胁情报源进行搜索采集,这无疑会影响威胁情报源的采集效率。The existing collection methods of threat intelligence sources are mainly to artificially search and collect threat intelligence sources, which will undoubtedly affect the collection efficiency of threat intelligence sources.
因此,亟需一种新的威胁情报源的采集方法。Therefore, there is an urgent need for a new method of collecting threat intelligence sources.
发明内容Contents of the invention
为了解决目前人为采集威胁情报源的采集效率低下的问题,本发明实施例提供了一种威胁情报源的采集方法、装置、电子设备及存储介质。In order to solve the problem of low collection efficiency of artificially collected threat information sources, embodiments of the present invention provide a method, device, electronic device, and storage medium for collecting threat information sources.
第一方面,本发明实施例提供了一种威胁情报源的采集方法,包括:In the first aspect, an embodiment of the present invention provides a method for collecting threat intelligence sources, including:
获取各目标威胁情报源的源地址;Obtain the source address of each target threat intelligence source;
基于所述目标威胁情报源的源地址,对所述目标威胁情报源中的威胁情报进行检测评估,以得到各所述目标威胁情报源的评估结果;Based on the source address of the target threat intelligence source, detect and evaluate the threat intelligence in the target threat intelligence source, so as to obtain the evaluation result of each target threat intelligence source;
将各所述目标威胁情报源的源地址和所述评估结果进行上报。Reporting the source address of each target threat intelligence source and the evaluation result.
优选的,所述目标威胁情报源的源地址的获取方式包括基于已知威胁情报源的第一获取方式和基于GitHub平台的第二获取方式。Preferably, the acquisition method of the source address of the target threat intelligence source includes a first acquisition method based on known threat intelligence sources and a second acquisition method based on the GitHub platform.
优选的,所述第一获取方式是通过如下方式获取各目标威胁情报源的源地址的:Preferably, the first obtaining method is to obtain the source address of each target threat intelligence source in the following manner:
获取已知威胁情报源的源地址列表;Obtain a list of source addresses of known threat intelligence sources;
针对所述源地址列表中的每一个已知威胁情报源,均执行:For each known threat intelligence source in the source address list, execute:
访问当前已知威胁情报源的源地址;Access the source address of currently known threat intelligence feeds;
获取当前已知威胁情报源的访问页面中的网站链接,以确定当前已知威胁情报源对应的目标威胁情报源的源地址。Obtain the website link in the access page of the current known threat intelligence source, so as to determine the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
优选的,在所述获取当前已知威胁情报源的访问页面中的网站链接之后,在所述确定当前已知威胁情报源对应的目标威胁情报源的源地址之前,还包括:Preferably, after obtaining the website link in the access page of the current known threat intelligence source, and before determining the source address of the target threat intelligence source corresponding to the current known threat intelligence source, the method further includes:
基于当前已知威胁情报源的源地址,获取当前已知威胁情报源的域名;Obtain the domain name of the current known threat intelligence source based on the source address of the current known threat intelligence source;
判断当前已知威胁情报源的访问页面中的每一个所述网站链接是否与当前已知威胁情报源的域名相同;Determine whether each of the website links in the access page of the current known threat intelligence source is the same as the domain name of the current known threat intelligence source;
将与当前已知威胁情报源的域名不相同的网站链接,确定为当前已知威胁情报源对应的目标威胁情报源的源地址。A website link different from the domain name of the current known threat intelligence source is determined as the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
优选的,所述第二获取方式是通过如下方式获取各目标威胁情报源的源地址的:Preferably, the second obtaining method is to obtain the source address of each target threat intelligence source in the following manner:
确定用于搜索目标威胁情报源的多个关键词;Identify multiple keywords to use in searching for targeted threat intelligence feeds;
在GitHub平台中搜索每一个所述关键词,将搜索得到的每一个仓库地址确定为目标威胁情报源的源地址。Search for each of the keywords on the GitHub platform, and determine each warehouse address obtained from the search as the source address of the target threat intelligence source.
优选的,所述基于所述目标威胁情报源的源地址,对所述目标威胁情报源中的威胁情报进行检测评估,以得到各所述目标威胁情报源的评估结果,包括:Preferably, based on the source address of the target threat intelligence source, the threat intelligence in the target threat intelligence source is detected and evaluated, so as to obtain the evaluation result of each target threat intelligence source, including:
针对每一个所述目标威胁情报源,均执行:For each of the targeted threat intelligence feeds described, do:
基于当前目标威胁情报源的源地址,检测当前目标威胁情报源中的威胁情报的数量;Based on the source address of the current target threat intelligence source, detect the amount of threat intelligence in the current target threat intelligence source;
基于检测到的当前目标威胁情报源中每一个威胁情报的类型,判断每一个威胁情报的格式是否符合要求;Based on the type of each threat intelligence detected in the current target threat intelligence source, determine whether the format of each threat intelligence meets the requirements;
判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中;Determine whether each threat intelligence in the current target threat intelligence source has been included in the pre-built threat intelligence library;
得到当前目标威胁情报源的评估结果。Get an assessment of the current target threat intelligence feed.
优选的,在所述判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中之后,在所述得到当前目标威胁情报源的评估结果之前,还包括:Preferably, after the judging whether each threat intelligence in the current target threat intelligence source has been included in the pre-built threat intelligence library, before the evaluation result of the current target threat intelligence source is obtained, the method further includes:
针对当前目标威胁情报源中的每一个威胁情报,均执行:For each threat intelligence in the currently targeted threat intelligence feed, execute:
若当前威胁情报已收录至所述威胁情报库中,则从所述威胁情报库中获取当前威胁情报的威胁类型,以将当前威胁情报的威胁类型添加至当前目标威胁情报源的评估结果中If the current threat intelligence has been included in the threat intelligence library, obtaining the threat type of the current threat intelligence from the threat intelligence library, so as to add the threat type of the current threat intelligence to the evaluation result of the current target threat intelligence source
第二方面,本发明实施例还提供了一种威胁情报源的采集装置,包括:In the second aspect, the embodiment of the present invention also provides a threat intelligence source collection device, including:
获取单元,用于获取各目标威胁情报源的源地址;an obtaining unit, configured to obtain the source address of each target threat intelligence source;
评估单元,用于基于所述目标威胁情报源的源地址,对所述目标威胁情报源中的威胁情报进行检测评估,以得到所述目标威胁情报源对应的评估结果;An evaluation unit, configured to detect and evaluate threat intelligence in the target threat intelligence source based on the source address of the target threat intelligence source, so as to obtain an evaluation result corresponding to the target threat intelligence source;
上报单元,用于将述目标威胁情报源对应的源地址和所述评估结果进行上报。A reporting unit, configured to report the source address corresponding to the target threat intelligence source and the evaluation result.
第三方面,本发明实施例还提供了一种电子设备,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器执行所述计算机程序时,实现本说明书任一实施例所述的方法。In a third aspect, an embodiment of the present invention also provides an electronic device, including a memory and a processor, wherein a computer program is stored in the memory, and when the processor executes the computer program, the computer program described in any embodiment of this specification can be realized. described method.
第四方面,本发明实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,当所述计算机程序在计算机中执行时,令计算机执行本说明书任一实施例所述的方法。In a fourth aspect, an embodiment of the present invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed in a computer, the computer is instructed to execute the method described in any embodiment of this specification .
本发明实施例提供了一种威胁情报源的采集方法、装置、电子设备及存储介质,首先,自动地获取各目标威胁情报源的源地址,并且基于获取的每一个目标威胁情报源的源地址,对每一个目标威胁情报源中的威胁情报进行检测评估,以得到每一个目标威胁情报源的评估结果;最后,将每一个目标威胁情报源的源地址和对应的评估结果进行上报,以此来自动地采集目标威胁情报源,可以增强威胁情报源的采集能力,进一步增加威胁情报的采集量。Embodiments of the present invention provide a method, device, electronic device, and storage medium for collecting threat intelligence sources. First, the source address of each target threat intelligence source is automatically acquired, and based on the acquired source address of each target threat intelligence source, , to detect and evaluate the threat intelligence in each target threat intelligence source to obtain the evaluation result of each target threat intelligence source; finally, report the source address and corresponding evaluation result of each target threat intelligence source, so as to Automatically collecting target threat intelligence sources can enhance the collection capabilities of threat intelligence sources and further increase the amount of threat intelligence collection.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are For some embodiments of the present invention, those skilled in the art can also obtain other drawings based on these drawings without creative work.
图1是本发明一实施例提供的一种威胁情报源的采集方法流程图;FIG. 1 is a flow chart of a method for collecting threat intelligence sources provided by an embodiment of the present invention;
图2是本发明一实施例提供的一种计算设备的硬件架构图;FIG. 2 is a hardware architecture diagram of a computing device provided by an embodiment of the present invention;
图3是本发明一实施例提供的一种威胁情报源的采集装置结构图。Fig. 3 is a structural diagram of a collection device of a threat intelligence source provided by an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例,基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.
如前所述,现有的威胁情报源的采集方法主要是人为地对威胁情报源进行搜索采集,这无疑会影响威胁情报源的采集效率。As mentioned above, the existing collection methods of threat intelligence sources are mainly to artificially search and collect threat intelligence sources, which will undoubtedly affect the collection efficiency of threat intelligence sources.
为了解决上述技术问题,发明人可以考虑自动地获取各目标威胁情报源的源地址,然而自动获取的各目标威胁情报源的质量参差不齐,可以基于每一个目标威胁情报源的源地址,对每一个目标威胁情报源中的威胁情报进行检测评估,并将每一个目标威胁情报源的源地址和对应的评估结果进行上报,以此来完成威胁情报源的自动搜索采集。In order to solve the above technical problems, the inventor may consider automatically obtaining the source address of each target threat intelligence source. However, the quality of each target threat intelligence source obtained automatically is uneven. Based on the source address of each target threat intelligence source, the The threat intelligence in each target threat intelligence source is detected and evaluated, and the source address and corresponding evaluation results of each target threat intelligence source are reported, so as to complete the automatic search and collection of threat intelligence sources.
下面描述以上构思的具体实现方式。The specific implementation of the above idea is described below.
请参考图1,本发明实施例提供了一种威胁情报源的采集方法,该方法包括:Please refer to FIG. 1, an embodiment of the present invention provides a method for collecting threat intelligence sources, the method includes:
步骤100:获取各目标威胁情报源的源地址;Step 100: Obtain the source address of each target threat intelligence source;
步骤102:基于目标威胁情报源的源地址,对目标威胁情报源中的威胁情报进行检测评估,以得到各目标威胁情报源的评估结果;Step 102: Based on the source address of the target threat intelligence source, detect and evaluate the threat intelligence in the target threat intelligence source, so as to obtain the evaluation results of each target threat intelligence source;
步骤104:将各目标威胁情报源的源地址和评估结果进行上报。Step 104: Report the source addresses and evaluation results of each target threat intelligence source.
本发明实施例中,首先,自动地获取各目标威胁情报源的源地址,并且基于获取的每一个目标威胁情报源的源地址,对每一个目标威胁情报源中的威胁情报进行检测评估,以得到每一个目标威胁情报源的评估结果;最后,将每一个目标威胁情报源的源地址和对应的评估结果进行上报,以此来自动地采集目标威胁情报源,可以增强威胁情报源的采集能力,进一步增加威胁情报的采集量。In the embodiment of the present invention, firstly, the source address of each target threat intelligence source is automatically acquired, and based on the acquired source address of each target threat intelligence source, the threat intelligence in each target threat intelligence source is detected and evaluated, so as to Obtain the evaluation result of each target threat intelligence source; finally, report the source address and corresponding evaluation result of each target threat intelligence source, so as to automatically collect the target threat intelligence source, which can enhance the collection ability of threat intelligence sources , to further increase the collection of threat intelligence.
下面描述图1所示的各个步骤的执行方式。The execution manner of each step shown in FIG. 1 is described below.
针对步骤100:For step 100:
在一些实施方式中,目标威胁情报源的源地址的获取方式包括基于已知威胁情报源的第一获取方式和基于GitHub平台的第二获取方式。In some implementations, the manner of obtaining the source address of the target threat intelligence source includes a first manner based on known threat intelligence sources and a second manner based on the GitHub platform.
需要说明的是,已知威胁情报源中含有若干个威胁情报以及这些威胁情报的归属网站链接,这些归属网站链接还未进行采集,因此可以基于已知威胁情报源来获取目标威胁情报源的源地址。而GitHub是一个面向开源及私有软件项目的托管平台,在该平台中可能含有很多威胁情报仓库,因此还可以从GitHub平台中获取目标威胁情报源的源地址。通过基于已知威胁情报源的第一获取方式和基于GitHub平台的第二获取方式,可以增加目标威胁情报源的源地址的获取数量,增强目标威胁情报源的采集能力,以进一步扩展威胁情报库中威胁情报的储备。It should be noted that known threat intelligence sources contain several threat intelligence sources and their attribution website links. These attribution website links have not been collected, so the source of the target threat intelligence source can be obtained based on known threat intelligence sources address. GitHub is a hosting platform for open source and private software projects. The platform may contain many threat intelligence warehouses. Therefore, the source address of the target threat intelligence source can also be obtained from the GitHub platform. Through the first acquisition method based on known threat intelligence sources and the second acquisition method based on the GitHub platform, the number of source addresses of target threat intelligence sources can be obtained, and the collection capability of target threat intelligence sources can be enhanced to further expand the threat intelligence library. Storage of threat intelligence in China.
在一些实施方式中,第一获取方式是通过如下方式获取各目标威胁情报源的源地址的:In some implementation manners, the first obtaining method is to obtain the source address of each target threat intelligence source in the following manner:
获取已知威胁情报源的源地址列表;Obtain a list of source addresses of known threat intelligence sources;
针对源地址列表中的每一个已知威胁情报源,均执行:For each known threat intelligence source in the list of source addresses, execute:
访问当前已知威胁情报源的源地址;Access the source address of currently known threat intelligence feeds;
获取当前已知威胁情报源的访问页面中的网站链接,以确定当前已知威胁情报源对应的目标威胁情报源的源地址。Obtain the website link in the access page of the current known threat intelligence source, so as to determine the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
在本实施例中,首先获取已知威胁情报源的源地址列表,利用爬虫技术,依次访问每一个已知威胁情报源的源地址,并将每一个已知威胁情报源的访问页面中的归属网站链接进行留存,以将留存的每一个网站链接确定为目标威胁情报源的源地址。In this embodiment, first obtain the source address list of known threat intelligence sources, use crawler technology to visit the source addresses of each known threat intelligence source in turn, and assign the attribution in the access page of each known threat intelligence source Website links are retained, so as to determine each retained website link as the source address of the target threat intelligence source.
在一些实施方式中,在步骤“获取当前已知威胁情报源的访问页面中的网站链接”之后,在步骤“确定当前已知威胁情报源对应的目标威胁情报源的源地址”之前,还包括:In some embodiments, after the step "obtaining the website link in the access page of the current known threat intelligence source" and before the step "determining the source address of the target threat intelligence source corresponding to the current known threat intelligence source", it also includes :
基于当前已知威胁情报源的源地址,获取当前已知威胁情报源的域名;Obtain the domain name of the current known threat intelligence source based on the source address of the current known threat intelligence source;
判断当前已知威胁情报源的访问页面中的每一个网站链接是否与当前已知威胁情报源的域名相同;Determine whether each website link in the access page of the current known threat intelligence source is the same as the domain name of the current known threat intelligence source;
将与当前已知威胁情报源的域名不相同的网站链接,确定为当前已知威胁情报源对应的目标威胁情报源的源地址。A website link different from the domain name of the current known threat intelligence source is determined as the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
在本实施例中,由于已知威胁情报源中含有的网站链接是该已知威胁情报源中的威胁情报的归属地,那么这些网站链接中与该已知威胁情报源的域名相同的网站链接中多是对该已知威胁情报源中的威胁情报的解释说明,且该已知威胁情报源中的威胁情报已经被收录至威胁情报库中,因此需要将这些与该已知威胁情报源的域名相同的网站链接排除掉,这样可以筛除掉很多没有价值的威胁情报源。In this embodiment, since the website link contained in the known threat intelligence source is the attribution of the threat information in the known threat intelligence source, then the website link with the same domain name as the known threat intelligence source among these website links Most of them are explanations of the threat intelligence in the known threat intelligence source, and the threat intelligence in the known threat intelligence source has been included in the threat intelligence library, so it is necessary to combine these with the known threat intelligence source Website links with the same domain name are excluded, so that many worthless threat intelligence sources can be screened out.
在一些实施方式中,第二获取方式是通过如下方式获取各目标威胁情报源的源地址的:In some implementation manners, the second obtaining method is to obtain the source address of each target threat intelligence source in the following manner:
确定用于搜索目标威胁情报源的多个关键词;Identify multiple keywords to use in searching for targeted threat intelligence feeds;
在GitHub平台中搜索每一个关键词,将搜索得到的每一个仓库地址确定为目标威胁情报源的源地址。Search for each keyword in the GitHub platform, and determine each warehouse address obtained from the search as the source address of the target threat intelligence source.
在本实施例中,可以将“IOC”、“Blacklist”、“Intelligence”和“Malicious”等作为关键词,在GitHub平台中递归搜索每一个关键词,将搜索到的每一个仓库地址确定为目标威胁情报源的源地址,并将这些仓库地址中的文件克隆至本地,以方便快速地获取这些仓库地址中的文件。In this embodiment, "IOC", "Blacklist", "Intelligence" and "Malicious" can be used as keywords, and each keyword can be recursively searched on the GitHub platform, and each searched warehouse address can be determined as the target The source address of the threat intelligence source, and clone the files in these warehouse addresses to the local, so as to obtain the files in these warehouse addresses conveniently and quickly.
针对步骤102:For step 102:
为了提高通过步骤100自动获取的各目标威胁情报源的可采集度,可以基于每一个目标威胁情报源的源地址,对每一个目标威胁情报源中的威胁情报进行检测评估,以得到每一个目标威胁情报源的评估报告。In order to improve the collectability of each target threat intelligence source automatically obtained through
在一些实施方式中,步骤102可以包括:In some implementations,
针对每一个目标威胁情报源,均执行:For each targeted threat intelligence feed, execute:
基于当前目标威胁情报源的源地址,检测当前目标威胁情报源中的威胁情报的数量;Based on the source address of the current target threat intelligence source, detect the amount of threat intelligence in the current target threat intelligence source;
基于检测到的当前目标威胁情报源中每一个威胁情报的类型,判断每一个威胁情报的格式是否符合要求;Based on the type of each threat intelligence detected in the current target threat intelligence source, determine whether the format of each threat intelligence meets the requirements;
判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中;Determine whether each threat intelligence in the current target threat intelligence source has been included in the pre-built threat intelligence library;
得到当前目标威胁情报源的评估结果。Get an assessment of the current target threat intelligence feed.
在本实施例中,由于步骤100获取的目标威胁情报源中可能含有博客,这些博客中会有威胁情报出现,但数量很少,属于资讯博客,故需要对每一个威胁情报源中含有的威胁情报的数量进行检测。除此之外,威胁情报含有多种类型,例如IP类型、域名类型、URL类型(链接类型)和指纹类型等,本实施例可以对目标威胁情报源中每一个威胁情报的类型进行检测,并基于每一个威胁情报的类型,来判断每一个威胁情报的格式是否符合要求。另外,还需要判断目标威胁情报源中的每一个威胁情报是否已被收录至威胁情报库中。至此,可以得到每一个目标威胁情报源的评估结果。In this embodiment, since the target threat intelligence source obtained in
在一些实施方式中,在步骤“判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中”之后,在步骤“得到当前目标威胁情报源的评估结果”之前,还包括:In some embodiments, after the step of "determining whether each threat intelligence in the current target threat intelligence source has been included in the pre-built threat intelligence library", before the step of "obtaining the evaluation result of the current target threat intelligence source" ,Also includes:
针对当前目标威胁情报源中的每一个威胁情报,均执行:For each threat intelligence in the currently targeted threat intelligence feed, execute:
若当前威胁情报已收录至威胁情报库中,则从威胁情报库中获取当前威胁情报的威胁类型,以将当前威胁情报的威胁类型添加至当前目标威胁情报源的评估结果中。If the current threat intelligence has been included in the threat intelligence database, the threat type of the current threat intelligence is obtained from the threat intelligence database, so as to add the threat type of the current threat intelligence to the evaluation result of the current target threat intelligence source.
在本实施例中,为了得到更加全面的评估结果,还可以将已收录至威胁情报库中的威胁情报的威胁类型从威胁情报库中调取出来,并添加至对应的评估结果中,以使评估结果中含有已被收录的威胁情报的威胁类型,便于步骤104中采集人员对该目标威胁情报源进行评估判断。In this embodiment, in order to obtain a more comprehensive evaluation result, the threat type of the threat intelligence that has been included in the threat intelligence library can also be retrieved from the threat intelligence library and added to the corresponding evaluation result, so that The evaluation result contains the threat type of the collected threat intelligence, which is convenient for the collectors in
需要说明的是,本实施例中的威胁类型可以分为有威胁、没有威胁和未知三类,还可以含有更为细化的威胁类型等级,故在此不对威胁类型作具体限定。It should be noted that the threat types in this embodiment can be divided into three categories: threat, no threat, and unknown, and may also contain more detailed threat type levels, so the threat types are not specifically limited here.
针对步骤104:For step 104:
在本发明实施例中,将每一个目标威胁情报源的源地址和评估结果以邮件的形式发送至威胁情报采集人员的邮箱中,由采集人员对每一个目标威胁情报源中的威胁情报进行进一步的研判和收录工作。In the embodiment of the present invention, the source address and evaluation results of each target threat intelligence source are sent to the mailbox of the threat intelligence collector in the form of email, and the threat intelligence in each target threat intelligence source is further analyzed by the collector. research and collection work.
如图2、图3所示,本发明实施例提供了一种威胁情报源的采集装置。装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。从硬件层面而言,如图2所示,为本发明实施例提供的一种威胁情报源的采集装置所在电子设备的一种硬件架构图,除了图2所示的处理器、内存、网络接口、以及非易失性存储器之外,实施例中装置所在的电子设备通常还可以包括其他硬件,如负责处理报文的转发芯片等等。以软件实现为例,如图3所示,作为一个逻辑意义上的装置,是通过其所在电子设备的CPU将非易失性存储器中对应的计算机程序读取到内存中运行形成的。As shown in FIG. 2 and FIG. 3 , an embodiment of the present invention provides a threat intelligence source collection device. The device embodiments can be implemented by software, or by hardware or a combination of software and hardware. From the perspective of hardware, as shown in Figure 2, it is a hardware architecture diagram of an electronic device where a threat intelligence source collection device provided by an embodiment of the present invention is located, except for the processor, memory, and network interface shown in Figure 2 , and non-volatile memory, the electronic device where the device in the embodiment is located may also generally include other hardware, such as a forwarding chip responsible for processing messages, and the like. Taking software implementation as an example, as shown in Figure 3, as a device in a logical sense, it is formed by reading the corresponding computer program in the non-volatile memory into the memory and running it through the CPU of the electronic device where it is located.
如图3所示,本实施例提供的一种威胁情报源的采集装置,包括:As shown in Figure 3, a threat intelligence source collection device provided in this embodiment includes:
获取单元301,用于获取各目标威胁情报源的源地址;An obtaining
评估单元302,用于基于目标威胁情报源的源地址,对目标威胁情报源中的威胁情报进行检测评估,以得到各目标威胁情报源的评估结果;The
上报单元303,用于将每一个各目标威胁情报源的源地址和评估结果进行上报。The
在本发明的一个实施例中,获取单元301中目标威胁情报源的源地址的获取方式包括基于已知威胁情报源的第一获取方式和基于GitHub平台的第二获取方式。In an embodiment of the present invention, the acquisition means of the source address of the target threat intelligence source in the
在本发明的一个实施例中,获取单元301中,第一获取方式是通过如下方式获取各目标威胁情报源的源地址的:In an embodiment of the present invention, in the obtaining
获取已知威胁情报源的源地址列表;Obtain a list of source addresses of known threat intelligence sources;
针对源地址列表中的每一个已知威胁情报源,均执行:For each known threat intelligence source in the list of source addresses, execute:
访问当前已知威胁情报源的源地址;Access the source address of currently known threat intelligence feeds;
获取当前已知威胁情报源的访问页面中的网站链接,以确定当前已知威胁情报源对应的目标威胁情报源的源地址。Obtain the website link in the access page of the current known threat intelligence source, so as to determine the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
在本发明的一个实施例中,获取单元301在执行获取当前已知威胁情报源的访问页面中的网站链接之后,在执行确定当前已知威胁情报源对应的目标威胁情报源的源地址之前,还用于:In an embodiment of the present invention, after the
基于当前已知威胁情报源的源地址,获取当前已知威胁情报源的域名;Obtain the domain name of the current known threat intelligence source based on the source address of the current known threat intelligence source;
判断当前已知威胁情报源的访问页面中的每一个网站链接是否与当前已知威胁情报源的域名相同;Determine whether each website link in the access page of the current known threat intelligence source is the same as the domain name of the current known threat intelligence source;
将与当前已知威胁情报源的域名不相同的网站链接,确定为当前已知威胁情报源对应的目标威胁情报源的源地址。A website link different from the domain name of the current known threat intelligence source is determined as the source address of the target threat intelligence source corresponding to the current known threat intelligence source.
在本发明的一个实施例中,获取单元301中,第二获取方式是通过如下方式获取各目标威胁情报源的源地址的:In an embodiment of the present invention, in the obtaining
确定用于搜索目标威胁情报源的多个关键词;Identify multiple keywords to use in searching for targeted threat intelligence feeds;
在GitHub平台中搜索每一个关键词,将搜索得到的每一个仓库地址确定为目标威胁情报源的源地址。Search for each keyword in the GitHub platform, and determine each warehouse address obtained from the search as the source address of the target threat intelligence source.
在本发明的一个实施例中,评估单元302用于执行:In one embodiment of the present invention, the
针对每一个目标威胁情报源,均执行:For each targeted threat intelligence feed, execute:
基于当前目标威胁情报源的源地址,检测当前目标威胁情报源中的威胁情报的数量;Based on the source address of the current target threat intelligence source, detect the amount of threat intelligence in the current target threat intelligence source;
基于检测到的当前目标威胁情报源中每一个威胁情报的类型,判断每一个威胁情报的格式是否符合要求;Based on the type of each threat intelligence detected in the current target threat intelligence source, determine whether the format of each threat intelligence meets the requirements;
判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中;Determine whether each threat intelligence in the current target threat intelligence source has been included in the pre-built threat intelligence library;
得到当前目标威胁情报源的评估结果。Get an assessment of the current target threat intelligence feed.
在本发明的一个实施例中,评估单元302,在执行判断当前目标威胁情报源中的每一个威胁情报是否已收录至预先构建好的威胁情报库中之后,在执行得到当前目标威胁情报源的评估结果之前,还包括:In one embodiment of the present invention, the
针对当前目标威胁情报源中的每一个威胁情报,均执行:For each threat intelligence in the currently targeted threat intelligence feed, execute:
若当前威胁情报已收录至威胁情报库中,则从威胁情报库中获取当前威胁情报的威胁类型,以将当前威胁情报的威胁类型添加至当前目标威胁情报源的评估结果中。If the current threat intelligence has been included in the threat intelligence database, the threat type of the current threat intelligence is obtained from the threat intelligence database, so as to add the threat type of the current threat intelligence to the evaluation result of the current target threat intelligence source.
可以理解的是,本发明实施例示意的结构并不构成对一种威胁情报源的采集装置的具体限定。在本发明的另一些实施例中,一种威胁情报源的采集装置可以包括比图示更多或者更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件、软件或者软件和硬件的组合来实现。It can be understood that the structure shown in the embodiment of the present invention does not constitute a specific limitation on a threat intelligence source collection device. In some other embodiments of the present invention, an apparatus for collecting threat intelligence sources may include more or fewer components than shown in the figure, or combine some components, or split some components, or arrange different components. The illustrated components may be realized in hardware, software, or a combination of software and hardware.
上述装置内的各模块之间的信息交互、执行过程等内容,由于与本发明方法实施例基于同一构思,具体内容可参见本发明方法实施例中的叙述,此处不再赘述。The information interaction and execution process among the modules in the above-mentioned device are based on the same concept as the method embodiment of the present invention, and the specific content can refer to the description in the method embodiment of the present invention, and will not be repeated here.
本发明实施例还提供了一种电子设备,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器执行所述计算机程序时,实现本发明任一实施例中的一种威胁情报源的采集方法。An embodiment of the present invention also provides an electronic device, including a memory and a processor, wherein a computer program is stored in the memory, and when the processor executes the computer program, a threat in any embodiment of the present invention is realized. Methods of collecting information sources.
本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序在被处理器执行时,使所述处理器执行本发明任一实施例中的一种威胁情报源的采集方法。The embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the processor executes any implementation of the present invention. A collection method of threat intelligence source in the example.
具体地,可以提供配有存储介质的系统或者装置,在该存储介质上存储着实现上述实施例中任一实施例的功能的软件程序代码,且使该系统或者装置的计算机(或CPU或MPU)读出并执行存储在存储介质中的程序代码。Specifically, a system or device equipped with a storage medium may be provided, on which a software program code for realizing the functions of any of the above embodiments is stored, and the computer (or CPU or MPU of the system or device) ) to read and execute the program code stored in the storage medium.
在这种情况下,从存储介质读取的程序代码本身可实现上述实施例中任何一项实施例的功能,因此程序代码和存储程序代码的存储介质构成了本发明的一部分。In this case, the program code itself read from the storage medium can realize the function of any one of the above-mentioned embodiments, so the program code and the storage medium storing the program code constitute a part of the present invention.
用于提供程序代码的存储介质实施例包括软盘、硬盘、磁光盘、光盘(如CD-ROM、CD-R、CD-RW、DVD-ROM、DVD-RAM、DVD-RW、DVD+RW)、磁带、非易失性存储卡和ROM。可选择地,可以由通信网络从服务器计算机上下载程序代码。Examples of storage media for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), Tape, non-volatile memory card, and ROM. Alternatively, the program code can be downloaded from a server computer via a communication network.
此外,应该清楚的是,不仅可以通过执行计算机所读出的程序代码,而且可以通过基于程序代码的指令使计算机上操作的操作系统等来完成部分或者全部的实际操作,从而实现上述实施例中任意一项实施例的功能。In addition, it should be clear that not only by executing the program codes read by the computer, but also by making the operating system on the computer complete some or all of the actual operations through instructions based on the program codes, so as to implement the above-mentioned embodiments. function of any one of the embodiments.
此外,可以理解的是,将由存储介质读出的程序代码写到插入计算机内的扩展板中所设置的存储器中或者写到与计算机相连接的扩展模块中设置的存储器中,随后基于程序代码的指令使安装在扩展板或者扩展模块上的CPU等来执行部分和全部实际操作,从而实现上述实施例中任一实施例的功能。In addition, it can be understood that the program code read from the storage medium is written into the memory provided in the expansion board inserted into the computer or written into the memory provided in the expansion module connected to the computer, and then based on the program code The instruction causes the CPU installed on the expansion board or the expansion module to perform some or all of the actual operations, thereby realizing the functions of any one of the above-mentioned embodiments.
需要说明的是,在本文中,诸如第一和第二之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that there is a relationship between these entities or operations. There is no such actual relationship or sequence. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device.
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still be Modifications are made to the technical solutions described in the foregoing embodiments, or equivalent replacements are made to some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211701195.3A CN115733701A (en) | 2022-12-28 | 2022-12-28 | Method, device, electronic equipment and storage medium for collecting threat intelligence sources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211701195.3A CN115733701A (en) | 2022-12-28 | 2022-12-28 | Method, device, electronic equipment and storage medium for collecting threat intelligence sources |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115733701A true CN115733701A (en) | 2023-03-03 |
Family
ID=85302105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211701195.3A Pending CN115733701A (en) | 2022-12-28 | 2022-12-28 | Method, device, electronic equipment and storage medium for collecting threat intelligence sources |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115733701A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688091A (en) * | 2018-04-25 | 2019-04-26 | 北京微步在线科技有限公司 | The method for evaluating quality and device of the threat information of multi-source |
CN110912889A (en) * | 2019-11-22 | 2020-03-24 | 上海交通大学 | Network attack detection system and method based on intelligent threat intelligence |
CN112202818A (en) * | 2020-12-01 | 2021-01-08 | 南京中孚信息技术有限公司 | Network traffic intrusion detection method and system fusing threat information |
WO2021051880A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Resource data acquisition method and apparatus, computer device and storage medium |
CN113572781A (en) * | 2021-07-28 | 2021-10-29 | 中国南方电网有限责任公司 | Method for collecting network security threat information |
-
2022
- 2022-12-28 CN CN202211701195.3A patent/CN115733701A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688091A (en) * | 2018-04-25 | 2019-04-26 | 北京微步在线科技有限公司 | The method for evaluating quality and device of the threat information of multi-source |
WO2021051880A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Resource data acquisition method and apparatus, computer device and storage medium |
CN110912889A (en) * | 2019-11-22 | 2020-03-24 | 上海交通大学 | Network attack detection system and method based on intelligent threat intelligence |
CN112202818A (en) * | 2020-12-01 | 2021-01-08 | 南京中孚信息技术有限公司 | Network traffic intrusion detection method and system fusing threat information |
CN113572781A (en) * | 2021-07-28 | 2021-10-29 | 中国南方电网有限责任公司 | Method for collecting network security threat information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10218740B1 (en) | Fuzzy hash of behavioral results | |
CN112866023B (en) | Network detection method, model training method, device, equipment and storage medium | |
CN111460445B (en) | Method and device for automatic identification of malicious degree of sample program | |
CN110691080B (en) | Automatic tracing method, device, equipment and medium | |
TWI811545B (en) | Detection method for malicious domain name in domain name system and detection device | |
CN109104421B (en) | Website content tampering detection method, device, equipment and readable storage medium | |
CN113810408B (en) | Network attack organization detection method, device, equipment and readable storage medium | |
CN109547294B (en) | A method and device for detecting the type of networked equipment based on firmware analysis | |
CN107688743A (en) | The determination method and system of a kind of rogue program | |
CN112839061B (en) | Tracing method and device based on regional characteristics | |
CN112632529A (en) | Vulnerability identification method, device, storage medium and device | |
CN108900554A (en) | Http protocol asset detecting method, system, equipment and computer media | |
CN112019519A (en) | Method and device for detecting threat degree of network security information and electronic device | |
Hong et al. | xVDB: A high-coverage approach for constructing a vulnerability database | |
Tuomi | Evolution of the Linux credits file: methodological challenges and reference data for open source research | |
KR20230174954A (en) | Method for managing externally imported files, apparatus for the same, computer program for the same, and recording medium storing computer program thereof | |
CN112632528A (en) | Threat information generation method, equipment, storage medium and device | |
CN115733701A (en) | Method, device, electronic equipment and storage medium for collecting threat intelligence sources | |
CN113992371B (en) | Threat label generation method and device for traffic log and electronic equipment | |
CN115314271B (en) | Access request detection method, system and computer storage medium | |
CN114021138B (en) | A construction method, homology analysis method and device for homology analysis knowledge base | |
CN107239704A (en) | Malicious web pages find method and device | |
CN116304209A (en) | Asset operation handling method, device, electronic equipment and storage medium | |
Bo et al. | Tom: A threat operating model for early warning of cyber security threats | |
JP6515621B2 (en) | Mail processing server, mail processing method, and mail processing program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |