CN116155576A - A method, device, industrial firewall and medium for industrial firewall protection - Google Patents
A method, device, industrial firewall and medium for industrial firewall protection Download PDFInfo
- Publication number
- CN116155576A CN116155576A CN202310052420.3A CN202310052420A CN116155576A CN 116155576 A CN116155576 A CN 116155576A CN 202310052420 A CN202310052420 A CN 202310052420A CN 116155576 A CN116155576 A CN 116155576A
- Authority
- CN
- China
- Prior art keywords
- request information
- target data
- address
- historical
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
本申请涉及一种工业防火墙防护的方法、装置、工业防火墙及介质,涉及工业防火墙的领域,该方法包括当接收到请求信息时,判断请求信息在预设访问控制列表中是否存在,若不存在,则确定请求信息的重要等级,基于重要等级,判断请求信息是否允许获取目标数据,目标数据为请求信息需获取的数据,将请求信息以及对应的判断结果添加至预设访问控制列表中。本申请使得工业防火墙具有自动添加请求信息的效果。
The present application relates to a method, device, industrial firewall and medium for industrial firewall protection, and relates to the field of industrial firewalls. The method includes, when receiving request information, judging whether the request information exists in the preset access control list, and if not , then determine the importance level of the request information, and based on the importance level, judge whether the request information is allowed to obtain the target data, the target data is the data to be obtained for the request information, and add the request information and the corresponding judgment result to the preset access control list. This application makes the industrial firewall have the effect of automatically adding request information.
Description
技术领域technical field
本申请涉及工业防火墙的领域,尤其是涉及一种工业防火墙防护的方法、装置、工业防火墙及介质。The present application relates to the field of industrial firewalls, in particular to an industrial firewall protection method, device, industrial firewall and media.
背景技术Background technique
工业防火墙是指一种将其他网络与工控网络分开的产品,以使得其他网络只有在获取进入许可证的情况下,才能够进入工控网络,从而达到保护工控网络的效果。Industrial firewall refers to a product that separates other networks from the industrial control network, so that other networks can enter the industrial control network only after obtaining an access permit, so as to achieve the effect of protecting the industrial control network.
目前,其他网络中的设备通过向工控网络中的设备发送请求信息的方式,获取所需要的数据,而由于众多请求信息中可能存在对公共网络造成攻击的信息,因此需工业防火墙对请求信息进行检查,而工业防火墙在对请求信息进行检查时,通常通过将请求信息与访问控制列表(ACL)中的请求信息进行匹配,当在访问控制列表中匹配失败时,即ACL中不存在该请求信息时,将会将该请求信息的访问状态确定为拒绝(思科ACL)或允许(华为ACL),即假设在华为ACL中,该请求信息需要为拒绝状态时,需安全人员手动将该请求信息添加至访问控制列表,并标明为该请求信息为拒绝状态,从而避免后续该请求信息进入工控网络并对工控网络造成攻击,或该请求信息进入其他网络,造成信息泄露等情况。即目前工业防火墙无法自动对未处于访问控制列表内的请求信息进行添加。At present, devices in other networks obtain the required data by sending request information to devices in the industrial control network. Since there may be information that may cause attacks on the public network among the many request information, it is necessary for the industrial firewall to process the request information. When checking the request information, the industrial firewall usually matches the request information with the request information in the access control list (ACL). When the match fails in the access control list, that is, the request information does not exist in the ACL , the access status of the request information will be determined as deny (Cisco ACL) or allow (Huawei ACL), that is, if the request information needs to be in deny status in the Huawei ACL, security personnel need to manually add the request information Go to the access control list, and mark the requested information as rejected, so as to prevent the subsequent request information from entering the industrial control network and causing attacks on the industrial control network, or the request information entering other networks, resulting in information leakage, etc. That is, the current industrial firewall cannot automatically add request information that is not in the access control list.
发明内容Contents of the invention
为了使得工业防火墙能够自动对未处于访问控制列表内的请求信息进行添加,本申请提供一种工业防火墙防护的方法、装置、工业防火墙及介质。In order to enable an industrial firewall to automatically add request information that is not in an access control list, the present application provides an industrial firewall protection method, device, industrial firewall and medium.
第一方面,本申请提供一种工业防火墙防护的方法,采用如下的技术方案:In the first aspect, the present application provides a method for industrial firewall protection, which adopts the following technical solution:
一种工业防火墙防护的方法,包括:A method for industrial firewall protection, comprising:
当接收到请求信息时,判断所述请求信息在预设访问控制列表中是否存在;When receiving the request information, judging whether the request information exists in the preset access control list;
若不存在,则确定所述请求信息的重要等级;If it does not exist, determining the importance level of the requested information;
基于所述重要等级,判断所述请求信息是否允许获取目标数据,所述目标数据为所述请求信息需获取的数据;Based on the importance level, judging whether the request information allows acquisition of target data, where the target data is the data to be acquired by the request information;
将所述请求信息以及对应的判断结果添加至所述预设访问控制列表中。Add the request information and the corresponding judgment result to the preset access control list.
通过采用上述技术方案,当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以确定出该请求信息的重要等级,从而根据重要等级判断出该请求信息是否允许获取目标数据,其中,目标数据为请求信息需获取的数据,从而使得后续能够将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表确定出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。By adopting the above technical solution, when the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through, and the preset access control list is a permission list set in advance, including multiple requests that can pass through the industrial firewall Information and multiple request information that cannot pass through the industrial firewall, judge whether the request information exists in the preset access control list, so as to achieve the effect of judging whether the request information can be recognized by the industrial firewall, when in the preset access control list If it exists in the list, it means that the industrial firewall can identify whether the requested information can pass through; if it does not exist in the preset access control list, it means that the industrial firewall cannot identify whether the requested information can pass through, so it can determine The importance level of the request information, so as to determine whether the request information allows the acquisition of target data according to the importance level, where the target data is the data that needs to be obtained for the request information, so that the request information and the corresponding judgment results can be added to the preset access in the future In the control list, so that when the request information is received again later, the industrial firewall can determine whether the request information can pass according to the preset access control list, and then achieve the effect that the industrial firewall can automatically add the request information.
在另一种可能实现的方式中,所述请求信息包括目的ip地址以及目的端口号;所述确定所述请求信息的重要等级,包括:In another possible implementation manner, the request information includes a destination ip address and a destination port number; the determination of the importance level of the request information includes:
判断使用所述目的ip地址对应的用户的岗级信息;Determine the post-level information of the user corresponding to the destination ip address;
基于所述岗级信息确定所述目的ip地址的地址等级;determining the address level of the destination IP address based on the post level information;
确定所述目的端口号在所述目的ip地址对应的设备上的进程信息,所述进程信息对应有预设端口等级;Determine the process information of the destination port number on the device corresponding to the destination ip address, and the process information corresponds to a preset port level;
将所述地址等级与所述预设端口等级求和,得到所述请求信息的重要等级。Summing the address level and the preset port level to obtain the importance level of the request information.
通过采用上述技术方案,请求信息中包括目的ip地址以及目的端口号,目的ip地址用于明确当前请求信息需获取的目标数据具体属于设备信息,每个端口号有对应的进程信息,目的端口号用以明确目标数据为目标端口对应的进程信息的数据。判断使用该请求信息中的目的ip地址对应的用户的岗级信息,以便于后续根据岗级信息确定出目的ip地址对应的地址等级,并确定出目的端口号在该目的ip地址对应的设备上的进程信息,其中进程信息对应有预设端口等级,从而使得后续能够将地址等级与预设端口等级求和,从而得到请求信息的重要等级,进而达到确定出请求信息的重要等级的效果。By adopting the above technical solution, the request information includes the destination ip address and the destination port number. The destination ip address is used to clarify that the target data to be obtained by the current request information belongs to the device information. Each port number has corresponding process information, and the destination port number The data used to specify the target data as the process information corresponding to the target port. Determine the post level information of the user corresponding to the destination ip address in the request information, so as to determine the address level corresponding to the destination ip address based on the post level information, and determine that the destination port number is on the device corresponding to the destination ip address The process information, wherein the process information corresponds to the preset port level, so that the address level and the preset port level can be summed subsequently, so as to obtain the importance level of the request information, and then achieve the effect of determining the importance level of the request information.
在另一种可能实现的方式中,所述请求信息包括源ip地址,所述基于所述重要等级,判断所述请求信息是否允许获取目标数据,包括:In another possible implementation manner, the request information includes a source IP address, and the judging whether the request information is allowed to obtain target data based on the importance level includes:
判断所述预设访问控制列表中是否存在所述源ip地址;judging whether the source ip address exists in the preset access control list;
若存在,则确定所述源ip地址对应的历史请求信息,并确定所述历史请求信息对应的历史重要等级,所述历史请求信息为所述源ip地址在所述预设访问控制列表内对应的请求信息;If it exists, then determine the historical request information corresponding to the source ip address, and determine the historical importance level corresponding to the historical request information, the historical request information is that the source ip address corresponds to the preset access control list request information;
将最高历史重要等级对应的历史请求信息确定为目标历史请求信息;Determining the historical request information corresponding to the highest historical importance level as the target historical request information;
若所述最高历史重要等级不小于所述重要等级,且所述目标历史请求信息允许获取目标历史目标数据,则确定所述请求信息允许获取所述目标数据,所述目标历史目标数据为所述目标历史请求信息需获取的目标数据;If the highest historical importance level is not less than the importance level, and the target history request information allows acquisition of target historical target data, it is determined that the request information allows acquisition of the target data, and the target historical target data is the The target data to be obtained for target historical request information;
若所述最高历史重要等级小于所述重要等级,且所述目标历史请求信息允许获取所述目标历史目标数据,则确定所述请求信息拒绝获取所述目标数据。If the highest historical importance level is smaller than the importance level, and the target history request information allows acquisition of the target historical target data, it is determined that the request information refuses to acquire the target data.
通过采用上述技术方案,请求信息中包括源ip地址,判断预设访问控制列表中是否存在该源ip地址,以便于判断出该源ip地址对应的设备在历史中是否存在请求信息,当存在时,说明在历史中存在包括该源ip地址对应的请求信息,因此可以确定出该源ip地址对应的历史请求信息,并确定该历史请求信息对应的历史重要等级,以便于后续能够根据历史重要等级以及重要等级判断出请求信息是否允许访问目标进程,而请求信息对应的重要等级越高,说明请求信息能够获取的数据的重要程度越高,且由于在预设控制列表中源ip地址对应的历史请求信息的数量可能不止一条,因此可以将最高历史重要等级对应的历史请求信息确定为目标历史请求信息,当最高历史重要等级不小于重要等级,且最高历史请求信息允许获取目标历史目标数据时,说明该源ip地址在历史中允许获取大于当前重要程度的目标数据,因此可以确定该请求信息允许获取目标数据。当最高历史重要等级小于重要等级,且最高历史请求信息允许获取目标历史目标数据时,说明该源ip地址在历史访问过程中,只能获取重要程度较低的数据,而目前请求信息的重要等级较高,因此可以确定该请求信息拒绝获取目标数据。从而达到根据重要等级,判断请求信息是否允许获取目标数据的效果。By adopting the above technical solution, the request information includes the source ip address, and it is judged whether the source ip address exists in the preset access control list, so as to judge whether the device corresponding to the source ip address has request information in the history, and when it exists , indicating that there is request information corresponding to the source IP address in the history, so the historical request information corresponding to the source IP address can be determined, and the historical importance level corresponding to the historical request information can be determined, so that the follow-up can be based on the historical importance level And the importance level determines whether the request information allows access to the target process, and the higher the importance level corresponding to the request information, the higher the importance of the data that the request information can obtain, and because the history corresponding to the source ip address in the preset control list The number of requested information may be more than one, so the historical request information corresponding to the highest historical importance level can be determined as the target historical request information, when the highest historical importance level is not less than the important level, and the highest historical request information allows the acquisition of target historical target data, It shows that the source IP address allows acquisition of target data with a greater importance than the current one in history, so it can be determined that the request information allows acquisition of target data. When the highest historical importance level is less than the important level, and the highest historical request information allows obtaining target historical target data, it means that the source IP address can only obtain data with a low importance level during the historical access process, and the importance level of the current request information High, so it can be determined that the request information refuses to obtain the target data. In this way, the effect of judging whether the requested information is allowed to obtain the target data according to the importance level is achieved.
在另一种可能实现的方式中,所述判断所述预设访问控制列表中是否存在所述源ip地址,之后还包括:In another possible implementation manner, the judging whether the source IP address exists in the preset access control list further includes:
若未存在,则获取所述目标数据;If it does not exist, obtain the target data;
基于所述目标数据以及预设标签信息生成待输出数据;generating data to be output based on the target data and preset label information;
基于预设传输通道输出所述待输出数据,所述预设传输通道为所述目标数据对应的传输通道;outputting the data to be output based on a preset transmission channel, where the preset transmission channel is a transmission channel corresponding to the target data;
判断在第一预设时间内是否接收到所述预设标签信息对应的反馈信号;judging whether a feedback signal corresponding to the preset tag information is received within a first preset time;
将所述请求信息以及判断结果添加至所述预设访问控制列表中。Adding the request information and the judgment result to the preset access control list.
通过采用上述技术方案,当预设访问控制列表中不存在源ip地址时,说明目前工业防火墙无法根据预设访问控制列表中的请求信息判断当前接收到的请求信息是否允许获取目标数据,而当工业防火墙对该请求信息放行,使得该请求信息进入工控网络获取目标数据时,可能对工控网络造成攻击,因此工业防火墙在无法判断当前请求信息是否安全的情况下,工业防火墙可以根据请求信息获取目标数据,并根据该目标数据以及预设标签信息生成待输出数据,其中,预设标签信息为提前设定的标签信息,且预设标签信息对应有反馈信号,并根据预设传输通道将待输出数据输出,预设传输通道为提前设定的内部传输通道,且能够通过预设传输通道接收到待输出数据的源ip地址对应的设备,说明该源ip地址对应的网络信息能够通过工业防火墙。预设标签信息用以当存在设备接收到待输出数据时,控制设备发出反馈信号,因此可以通过判断在第一预设时间内是否接收到预设标签信息对应的反馈信号,并将请求信息以及判断结果添加至预设访问控制列表中,从而达到工业防火墙能够自动添加请求信息的效果。By adopting the above technical solution, when the source ip address does not exist in the preset access control list, it means that the current industrial firewall cannot judge whether the currently received request information is allowed to obtain the target data according to the request information in the preset access control list, and when The industrial firewall releases the request information, so that when the request information enters the industrial control network to obtain the target data, it may cause an attack on the industrial control network. Therefore, when the industrial firewall cannot judge whether the current request information is safe, the industrial firewall can obtain the target data based on the request information. data, and generate the data to be output according to the target data and the preset label information, wherein the preset label information is the label information set in advance, and the preset label information corresponds to a feedback signal, and the data to be output will be output according to the preset transmission channel For data output, the preset transmission channel is an internal transmission channel set in advance, and the device corresponding to the source ip address of the data to be output can be received through the preset transmission channel, indicating that the network information corresponding to the source ip address can pass through the industrial firewall. The preset tag information is used to send a feedback signal to the control device when the existing device receives the data to be output. Therefore, it is possible to judge whether the feedback signal corresponding to the preset tag information is received within the first preset time, and send the request information and The judgment result is added to the preset access control list, so as to achieve the effect that the industrial firewall can automatically add the requested information.
在另一种可能实现的方式中,所述方法还包括:In another possible implementation manner, the method further includes:
若所述请求信息允许获取所述目标数据,且所述重要等级大于预设重要等级,则当检测到所述请求信息首次获取所述目标数据时,记录获取时间;If the request information allows acquisition of the target data, and the importance level is greater than a preset importance level, recording the acquisition time when it is detected that the request information acquires the target data for the first time;
若所述获取时间达到第二预设时间,则拒绝所述请求信息获取所述目标数据,并输出所述请求信息。If the acquisition time reaches a second preset time, rejecting the request information to acquire the target data, and outputting the request information.
通过采用上述技术方案,预设重要等级为提前设定的重要等级,作为判断重要等级是否为重要程度较高的重要等级,当请求信息允许获取目标数据,且请求信息的重要等级大于预设重要等级时,说明当前请求信息需访问的目标数据重要程度较高,即可能存在使得工控网络中信息泄露的危险,因此可以记录该请求信息获取时间,第二预设时间为提前设定的预设时间,用以判断当前获取时间是否较长的标准,当获取时间达到第二预设时间时,说明发出该请求信息的设备对工控网络造成危害的可能性较大,即当前可以拒绝该请求信息获取目标数据,并输出请求信息,从而使得工业防火墙的防护性能更佳。By adopting the above technical solution, the preset importance level is the importance level set in advance, and is used to judge whether the importance level is an important level with a high level of importance. level, it means that the target data to be accessed by the current request information is of high importance, that is, there may be a risk of information leakage in the industrial control network, so the time for obtaining the requested information can be recorded, and the second preset time is the preset time set in advance Time, the standard used to judge whether the current acquisition time is relatively long. When the acquisition time reaches the second preset time, it means that the device sending the request information is more likely to cause harm to the industrial control network, that is, the request information can be rejected at present Obtain target data and output request information, so that the protection performance of industrial firewalls is better.
在另一种可能实现的方式中,所述源ip地址对应的历史请求信息为至少一条,所述方法还包括:In another possible implementation manner, there is at least one piece of historical request information corresponding to the source IP address, and the method further includes:
判断所述目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系;Judging whether there is an association relationship between the target data and the historical target data corresponding to each piece of historical request information;
获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量,所述可获取数据为所述关联历史目标数据中允许被获取的关联历史目标数据;Obtaining the total quantity of associated historical target data that has an associated relationship, and the quantity of obtainable data, where the obtainable data is the associated historical target data that is allowed to be acquired in the associated historical target data;
基于所述数量以及所述总数量,确定目标比例;determining a target ratio based on the quantity and the total quantity;
判断所述目标比例是否达到预设比例;judging whether the target ratio reaches a preset ratio;
将所述请求信息以及判断结果添加至所述预设访问控制列表中。Adding the request information and the judgment result to the preset access control list.
通过采用上述技术方案,在预设访问控制列表中,源ip地址对应的历史请求信息的条数可能为至少一条,判断目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系,可获取数据为关联历史目标数据中允许被获取的关联历史目标数据,获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量,并且根据数量以及总数量确定出目标比例,从而便于后续根据目标比例判断请求信息是否允许获取目标数据。预设比例为提前设定的比例,作为判断当前目标比例是否达标的标准,当目标比例达到预设比例时,说明在历史记录中源ip地址对应的历史请求信息大部分均可获取各自对应的目标数据,因此可以确定当前的请求信息允许获取目标数据,当目标比例未达到预设比例时,说明在历史记录中源ip地址对应的历史请求信息大部分均拒绝获取各自对应的目标数据,因此可以确定当前的请求信息拒绝获取目标数据。即可以将请求信息以及判断结果添加到预设访问控制列表中,以使得当该请求信息再次需要获取目标数据时,工业防火墙能够根据预设访问控制列表判断出当前请求信息是否可以获取目标数据。从而达到工业防火墙能够自动添加请求信息的效果。By adopting the above technical solution, in the preset access control list, the number of historical request information corresponding to the source ip address may be at least one, and it is judged whether there is an association between the target data and the historical target data corresponding to each historical request information , the available data is the associated historical target data that is allowed to be acquired in the associated historical target data, the total number of associated historical target data that has an associated relationship, and the number of available data are obtained, and the target ratio is determined according to the quantity and the total quantity, In this way, it is convenient to subsequently determine whether the request information allows acquisition of the target data according to the target ratio. The preset ratio is a ratio set in advance as a standard for judging whether the current target ratio is up to standard. When the target ratio reaches the preset ratio, it means that most of the historical request information corresponding to the source IP address in the historical records can be obtained from the respective corresponding Target data, so it can be determined that the current request information allows the acquisition of target data. When the target ratio does not reach the preset ratio, it means that most of the historical request information corresponding to the source IP address in the historical records refuses to obtain the corresponding target data. Therefore, It may be determined that the current request information denies obtaining the target data. That is, the request information and the judgment result can be added to the preset access control list, so that when the request information needs to obtain the target data again, the industrial firewall can judge whether the current request information can obtain the target data according to the preset access control list. So as to achieve the effect that the industrial firewall can automatically add the requested information.
在另一种可能实现的方式中,所述确定所述历史请求信息对应的历史重要等级,之后还包括:In another possible implementation manner, the determining the historical importance level corresponding to the historical request information further includes:
基于所述历史请求信息,确定所述源ip地址对应的历史MAC地址;Based on the historical request information, determine the historical MAC address corresponding to the source IP address;
获取所述请求信息的MAC地址;Obtain the MAC address of the request information;
判断所述MAC地址与所述历史MAC地址是否相同;judging whether the MAC address is the same as the historical MAC address;
若不相同,则确定所述源ip地址属于被修改ip地址,并确定所述请求信息拒绝获取所述目标数据。If not, it is determined that the source ip address belongs to the modified ip address, and it is determined that the request information refuses to obtain the target data.
通过采用上述技术方案,根据历史请求信息确定源ip地址对应的历史MAC地址,获取当前的请求信息的MAC地址,以便于后续判断出MAC地址与历史MAC地址是否相同,进而判断出当前源ip地址是否为修改后的源ip地址,当不相同时,说明当前源ip地址为经过修改后的ip地址,则确定源ip地址属于被修改ip地址,并确定该请求信息拒绝获取目标数据,从而使得工业防火墙能够识别出源ip地址是否为真实的ip地址,进而提高工业防火墙的防护能力。By adopting the above technical solution, the historical MAC address corresponding to the source ip address is determined according to the historical request information, and the MAC address of the current request information is obtained, so as to subsequently determine whether the MAC address is the same as the historical MAC address, and then determine the current source ip address Whether it is a modified source ip address, if not the same, it means that the current source ip address is a modified ip address, then determine that the source ip address belongs to the modified ip address, and determine that the request information refuses to obtain the target data, so that The industrial firewall can identify whether the source IP address is a real IP address, thereby improving the protection capability of the industrial firewall.
第二方面,本申请提供一种工业防火墙防护的装置,采用如下的技术方案:In the second aspect, the present application provides an industrial firewall protection device, which adopts the following technical solution:
一种工业防火墙防护的装置,包括:An industrial firewall protection device, comprising:
第一判断模块,用于当接收到请求信息时,判断所述请求信息在预设访问控制列表中是否存在;The first judging module is used to judge whether the request information exists in the preset access control list when the request information is received;
第一确定模块,用于当不存在时,确定所述请求信息的重要等级;A first determination module, configured to determine the importance level of the requested information when it does not exist;
第二判断模块,用于基于所述重要等级,判断所述请求信息是否允许获取目标数据,所述目标数据为所述请求信息需获取的数据;A second judging module, configured to judge whether the request information allows acquisition of target data based on the importance level, and the target data is the data to be acquired by the request information;
第一添加模块,用于将所述请求信息以及对应的判断结果添加至所述预设访问控制列表中。A first adding module, configured to add the request information and the corresponding judgment result to the preset access control list.
通过采用上述技术方案,当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,第一判断模块判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以通过第一确定模块确定出该请求信息的重要等级,以使得第二判断模块根据重要等级判断出该请求信息是否允许获取目标数据,其中,目标数据为请求信息需获取的数据,从而使得后续第一添加模块能够将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表确定出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。By adopting the above technical solution, when the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through, and the preset access control list is a permission list set in advance, including multiple requests that can pass through the industrial firewall Information and multiple request information that cannot pass through the industrial firewall, the first judging module judges whether the request information exists in the preset access control list, so as to achieve the effect of judging whether the request information can be identified by the industrial firewall. If it exists in the preset access control list, it means that the industrial firewall can identify whether the requested information can pass. If it does not exist in the preset access control list, it means that the industrial firewall cannot identify whether the requested information can pass. Therefore The importance level of the request information can be determined by the first determination module, so that the second judgment module can determine whether the request information allows acquisition of target data according to the importance level, wherein the target data is the data to be acquired by the request information, so that the subsequent The first adding module can add the request information and the corresponding judgment result to the preset access control list, so that when the request information is received again later, the industrial firewall can determine whether the request information can pass according to the preset access control list , so as to achieve the effect that the industrial firewall can automatically add the requested information.
在另一种可能的实现方式中,所述第一确定模块在确定所述请求信息的重要等级时,具体用于:In another possible implementation manner, when the first determination module determines the importance level of the request information, it is specifically configured to:
判断使用所述目的ip地址对应的用户的岗级信息;Determine the post-level information of the user corresponding to the destination ip address;
基于所述岗级信息确定所述目的ip地址的地址等级;determining the address level of the destination IP address based on the post level information;
确定所述目的端口号在所述目的ip地址对应的设备上的进程信息,所述进程信息对应有预设端口等级;Determine the process information of the destination port number on the device corresponding to the destination ip address, and the process information corresponds to a preset port level;
将所述地址等级与所述预设端口等级求和,得到所述请求信息的重要等级。Summing the address level and the preset port level to obtain the importance level of the request information.
在另一种可能的实现方式中,所述第二判断模块在基于所述重要等级,判断所述请求信息是否允许获取目标数据,具体用于:In another possible implementation manner, the second judging module judges whether the request information allows acquisition of target data based on the importance level, and is specifically used for:
判断所述预设访问控制列表中是否存在所述源ip地址;judging whether the source ip address exists in the preset access control list;
若存在,则确定所述源ip地址对应的历史请求信息,并确定所述历史请求信息对应的历史重要等级,所述历史请求信息为所述源ip地址在所述预设访问控制列表内对应的请求信息;If it exists, then determine the historical request information corresponding to the source ip address, and determine the historical importance level corresponding to the historical request information, the historical request information is that the source ip address corresponds to the preset access control list request information;
将最高历史重要等级对应的历史请求信息确定为目标历史请求信息;Determining the historical request information corresponding to the highest historical importance level as the target historical request information;
若所述最高历史重要等级不小于所述重要等级,且所述目标历史请求信息允许获取目标历史目标数据,则确定所述请求信息允许获取所述目标数据,所述目标历史目标数据为所述目标历史请求信息需获取的目标数据;If the highest historical importance level is not less than the importance level, and the target history request information allows acquisition of target historical target data, it is determined that the request information allows acquisition of the target data, and the target historical target data is the The target data to be obtained for target historical request information;
若所述最高历史重要等级小于所述重要等级,且所述目标历史请求信息允许获取所述目标历史目标数据,则确定所述请求信息拒绝获取所述目标数据。If the highest historical importance level is smaller than the importance level, and the target history request information allows acquisition of the target historical target data, it is determined that the request information refuses to acquire the target data.
在另一种可能的实现方式中,所述装置还包括:In another possible implementation manner, the device further includes:
第一获取模块,用于当未存在时,获取所述目标数据;A first acquisition module, configured to acquire the target data when it does not exist;
生成模块,用于基于所述目标数据以及预设标签信息生成待输出数据;A generating module, configured to generate data to be output based on the target data and preset label information;
第一输出模块,用于基于预设传输通道输出所述待输出数据,所述预设传输通道为所述目标数据对应的传输通道;A first output module, configured to output the data to be output based on a preset transmission channel, where the preset transmission channel is a transmission channel corresponding to the target data;
第三判断模块,用于判断在第一预设时间内是否接收到所述预设标签信息对应的反馈信号;A third judging module, configured to judge whether a feedback signal corresponding to the preset tag information is received within the first preset time;
第二添加模块,用于将所述请求信息以及判断结果添加至所述预设访问控制列表中。A second adding module, configured to add the request information and the judgment result to the preset access control list.
在另一种可能的实现方式中,所述装置还包括:In another possible implementation manner, the device further includes:
记录模块,用于当所述请求信息允许获取所述目标数据,且所述重要等级大于预设重要等级时,若检测到所述请求信息首次获取所述目标数据,则记录获取时间;A recording module, configured to record the acquisition time if it is detected that the request information acquires the target data for the first time when the request information allows acquisition of the target data and the importance level is greater than a preset importance level;
第二输出模块,用于当所述获取时间达到第二预设时间时,拒绝所述请求信息获取所述目标数据,并输出所述请求信息。The second output module is configured to reject the request information to acquire the target data and output the request information when the acquisition time reaches a second preset time.
在另一种可能的实现方式中,所述装置还包括:In another possible implementation manner, the device further includes:
第四判断模块,用于判断所述目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系;A fourth judging module, configured to judge whether there is an association between the target data and the historical target data corresponding to each piece of historical request information;
第二获取模块,用于获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量,所述可获取数据为所述关联历史目标数据中允许被获取的关联历史目标数据;The second acquiring module is used to acquire the total quantity of associated historical target data with associated relationship, and the quantity of obtainable data, where the obtainable data is the associated historical target data allowed to be acquired in the associated historical target data;
第三确定模块,用于基于所述数量以及所述总数量,确定目标比例;A third determining module, configured to determine a target ratio based on the quantity and the total quantity;
第五判断模块,用于判断所述目标比例是否达到预设比例;The fifth judging module is used to judge whether the target ratio reaches a preset ratio;
第三添加模块,用于将所述请求信息以及判断结果添加至所述预设访问控制列表中。A third adding module, configured to add the request information and the judgment result to the preset access control list.
在另一种可能的实现方式中,所述装置还包括:In another possible implementation manner, the device further includes:
第三确定模块,用于基于所述历史请求信息,确定所述源ip地址对应的历史MAC地址;A third determining module, configured to determine the historical MAC address corresponding to the source IP address based on the historical request information;
第三获取模块,用于获取所述请求信息的MAC地址;A third obtaining module, configured to obtain the MAC address of the request information;
第六判断模块,用于判断所述MAC地址与所述历史MAC地址是否相同;A sixth judging module, configured to judge whether the MAC address is the same as the historical MAC address;
第四确定模块,用于当不相同时,确定所述源ip地址属于被修改ip地址,并确定所述请求信息拒绝获取所述目标数据。A fourth determination module, configured to determine that the source ip address belongs to the modified ip address when they are different, and determine that the request information refuses to obtain the target data.
第三方面,本申请提供一种工业防火墙,采用如下的技术方案:In a third aspect, the present application provides an industrial firewall, which adopts the following technical solution:
一种工业防火墙,该工业防火墙包括:An industrial firewall, the industrial firewall includes:
至少一个处理器;at least one processor;
存储器;memory;
至少一个应用程序,其中至少一个应用程序被存储在存储器中并被配置为由至少一个处理器执行,至少一个应用程序配置用于:执行根据第一方面任一种可能的实现方式所示的一种工业防火墙防护的方法。At least one application program, wherein the at least one application program is stored in a memory and configured to be executed by at least one processor, and the at least one application program is configured to: execute a program according to any possible implementation manner of the first aspect A method for industrial firewall protection.
第四方面,本申请提供一种计算机可读存储介质,采用如下的技术方案:In the fourth aspect, the present application provides a computer-readable storage medium, adopting the following technical solution:
一种计算机可读存储介质,当所述计算机程序在计算机中执行时,令所述计算机执行第一方面任一项所述的工业防火墙防护的方法。A computer-readable storage medium, when the computer program is executed in a computer, it causes the computer to execute the industrial firewall protection method according to any one of the first aspect.
综上所述,本申请包括以下至少一种有益技术效果:In summary, the present application includes at least one of the following beneficial technical effects:
1. 当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以确定出该请求信息的重要等级,从而根据重要等级判断出该请求信息是否允许获取目标数据,其中,目标数据为请求信息需获取的数据,从而使得后续能够将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表确定出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果;1. When the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through. The default access control list is a list of permissions set in advance, including multiple request information that can pass through the industrial firewall and those that cannot Through the multiple request information of the industrial firewall, judge whether the request information exists in the preset access control list, so as to achieve the effect of judging whether the request information can be recognized by the industrial firewall, when it exists in the preset access control list , indicating that the industrial firewall can identify whether the requested information can pass. If it does not exist in the preset access control list, it indicates that the industrial firewall cannot identify whether the requested information can pass. Therefore, the importance of the requested information can be determined. Level, so as to determine whether the request information allows acquisition of target data according to the importance level, wherein the target data is the data to be acquired by the request information, so that the request information and the corresponding judgment result can be added to the preset access control list later, So that when the request information is received again later, the industrial firewall can determine whether the request information can pass according to the preset access control list, and then achieve the effect that the industrial firewall can automatically add the request information;
2. 当预设访问控制列表中不存在源ip地址时,说明目前工业防火墙无法根据预设访问控制列表中的请求信息判断当前接收到的请求信息是否允许获取目标数据,而当工业防火墙对该请求信息放行,使得该请求信息进入工控网络获取目标数据时,可能对工控网络造成攻击,因此防火墙在无法判断当前请求信息是否安全的情况下,可防火墙可以根据请求信息获取目标数据,并根据该目标数据以及预设标签信息生成待输出数据,其中,预设标签信息为提前设定的标签信息,且预设标签信息对应有反馈信号,并根据预设传输通道将待输出数据输出,预设传输通道为提前设定的内部传输通道,且能够通过预设传输通道接收到待输出数据的源ip地址对应的设备,说明该源ip地址对应的网络信息能够通过工业防火墙。预设标签信息用以当存在设备接收到待输出数据时,控制设备发出反馈信号,因此可以通过判断在第一预设时间内是否接收到预设标签信息对应的反馈信号,并将请求信息以及判断结果添加至预设访问控制列表中,从而达到工业防火墙能够自动添加请求信息的效果。2. When the source IP address does not exist in the preset access control list, it means that the current industrial firewall cannot judge whether the currently received request information is allowed to obtain the target data according to the request information in the preset access control list. The request information is released, so that when the request information enters the industrial control network to obtain the target data, it may cause an attack on the industrial control network. Therefore, when the firewall cannot judge whether the current request information is safe, the firewall can obtain the target data according to the request information, and according to the The target data and the preset tag information generate the data to be output, wherein the preset tag information is the tag information set in advance, and the preset tag information corresponds to a feedback signal, and the data to be output is output according to the preset transmission channel, and the preset The transmission channel is an internal transmission channel set in advance, and the device corresponding to the source ip address of the data to be output can be received through the preset transmission channel, indicating that the network information corresponding to the source ip address can pass through the industrial firewall. The preset tag information is used to send a feedback signal to the control device when the existing device receives the data to be output. Therefore, it is possible to judge whether the feedback signal corresponding to the preset tag information is received within the first preset time, and send the request information and The judgment result is added to the preset access control list, so as to achieve the effect that the industrial firewall can automatically add the requested information.
附图说明Description of drawings
图1是本申请实施例中的一种工业防火墙防护的方法的流程示意图。Fig. 1 is a schematic flowchart of a method for protecting an industrial firewall in an embodiment of the present application.
图2是本申请实施例中的一种工业防火墙防护的装置的结构示意图。Fig. 2 is a schematic structural diagram of an industrial firewall protection device in an embodiment of the present application.
图3是本申请实施例中的一种工业防火墙的结构示意图。Fig. 3 is a schematic structural diagram of an industrial firewall in an embodiment of the present application.
具体实施方式Detailed ways
以下结合附图1-3对本申请作进一步详细说明。The present application will be described in further detail below in conjunction with accompanying drawings 1-3.
本领域技术人员在阅读完本说明书后可以根据需要对本实施例做出没有创造性贡献的修改,但只要在本申请的权利要求范围内都受到专利法的保护。After reading this specification, those skilled in the art can make modifications to this embodiment without creative contribution according to needs, but as long as they are within the scope of the claims of this application, they are all protected by the patent law.
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.
另外,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,如无特殊说明,一般表示前后关联对象是一种“或”的关系。In addition, the term "and/or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and/or B may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character "/" in this article, unless otherwise specified, generally indicates that the contextual objects are an "or" relationship.
下面结合说明书附图对本申请实施例作进一步详细描述。The embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.
本申请实施例提供了一种工业防火墙防护的方法,由工业防火墙执行,如图1所示,该方法包括:步骤S101、步骤S102、步骤S103以及步骤S104,其中,The embodiment of the present application provides a method for industrial firewall protection, which is executed by an industrial firewall. As shown in FIG. 1 , the method includes: step S101, step S102, step S103, and step S104, wherein,
步骤S101,当接收到请求信息时,判断请求信息在预设访问控制列表中是否存在。Step S101, when request information is received, it is judged whether the request information exists in the preset access control list.
对于本申请实施例,当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果。假设,接收到的请求信息为请求信息A。For the embodiment of this application, when the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through, and the preset access control list is a permission list set in advance, including multiple requests that can pass through the industrial firewall Information and multiple request information that cannot pass through the industrial firewall, and judge whether the request information exists in the preset access control list, so as to achieve the effect of judging whether the request information can be recognized by the industrial firewall. Assume that the received request information is request information A.
步骤S102,若不存在,则确定请求信息的重要等级。Step S102, if it does not exist, determine the importance level of the requested information.
对于本申请实施例,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以确定出该请求信息的重要等级,以使得后续能够根据重要等级判断出该请求信息是否允许获取目标数据。以步骤S101为例,请求信息为请求信息A,预设访问控制列表中包括请求信息B、请求信息C以及请求信息D,则预设访问控制列表中不存在请求信息A,即可以确定请求信息A的重要等级,以便于后续能够根据重要等级,判断请求信息A是否允许获取目标数据。For the embodiment of this application, if it does not exist in the preset access control list, it means that the industrial firewall cannot identify whether the request information can pass through, so the importance level of the request information can be determined, so that the subsequent information can be accessed according to the importance level. It is judged whether the request information allows acquisition of the target data. Taking step S101 as an example, the request information is request information A, and the preset access control list includes request information B, request information C, and request information D, then there is no request information A in the preset access control list, that is, the request information can be determined The importance level of A, so that the follow-up can judge whether the request information A is allowed to obtain the target data according to the importance level.
在本申请实施例中,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,假设当前接收到的请求信息为请求信息B,预设访问控制列表中存在请求信息B,且请求信息B能够获取目标数据,则可以确定接收到的请求信息B允许获取目标数据。In the embodiment of this application, when it exists in the preset access control list, it means that the industrial firewall can identify whether the request information can pass through. Assume that the currently received request information is request information B, and the default access control list If there is request information B, and the request information B can obtain the target data, it can be determined that the received request information B allows the target data to be obtained.
步骤S103,基于重要等级,判断请求信息是否允许获取目标数据。Step S103, based on the importance level, it is judged whether the request information allows acquisition of the target data.
其中,目标数据为请求信息需获取的数据。Wherein, the target data is the data to be acquired for the requested information.
对于本申请实施例,目标数据为请求信息需获取的数据,假设请求信息A需获取的目标数据为数据A,根据请求信息A的重要等级,判断请求信息A是否允许获取数据A,以便于后续能够将请求信息A以及对应的判断结果添加至预设访问控制列表中。For this embodiment of the application, the target data is the data to be obtained by the request information, assuming that the target data to be obtained by the request information A is data A, and according to the importance level of the request information A, it is judged whether the request information A is allowed to obtain the data A, so as to facilitate subsequent The request information A and the corresponding judgment result can be added to the preset access control list.
步骤S104,将请求信息以及对应的判断结果添加至预设访问控制列表中。Step S104, adding the request information and the corresponding judgment result to the preset access control list.
对于本申请实施例,判断结果包括允许获取目标数据以及拒绝获取目标数据,将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表判断出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。For this embodiment of the application, the judgment result includes permission to obtain the target data and refusal to obtain the target data, and the request information and the corresponding judgment result are added to the preset access control list, so that when the request information is received again later, the industrial firewall can According to the preset access control list, it is judged whether the requested information can pass, and then the effect that the industrial firewall can automatically add the requested information is achieved.
本申请实施例的一种可能的实现方式,步骤S102在确定请求信息的重要等级时,具体包括步骤S1021(图中未示出)、步骤S1022(图中未示出)、步骤S1023(图中未示出)以及步骤S1024(图中未示出),其中,A possible implementation of the embodiment of the present application, when determining the importance level of the request information in step S102, specifically includes step S1021 (not shown in the figure), step S1022 (not shown in the figure), step S1023 (not shown in the figure) not shown) and step S1024 (not shown in the figure), wherein,
步骤S1021,判断使用目的ip地址对应的用户的岗级信息。Step S1021, determine the post level information of the user corresponding to the destination ip address.
对于本申请实施例,请求信息中包括目的ip地址以及目的端口号,目的ip地址用于明确当前请求信息需获取的目标数据具体属于设备信息,每个端口号有对应的进程信息,目的端口号用以明确目标数据为目标端口对应的进程信息的数据。判断使用该请求信息中的目的ip地址对应的用户的岗级信息,以便于后续根据岗级信息确定出目的ip地址对应的地址等级。假设当前接收到的请求信息A中的目的ip地址对应的设备为设备A,使用设备A的用户为用户A,用户A的岗级信息为p1级,在工作中p级越高对应的岗位等级越高。For the embodiment of this application, the request information includes the destination ip address and the destination port number. The destination ip address is used to clarify that the target data to be obtained by the current request information specifically belongs to the device information. Each port number has corresponding process information, and the destination port number The data used to specify the target data as the process information corresponding to the target port. Determine and use the post level information of the user corresponding to the destination ip address in the request information, so as to determine the address level corresponding to the destination ip address according to the post level information. Assume that the device corresponding to the destination ip address in the currently received request information A is device A, the user using device A is user A, and the post level information of user A is p1 level. The higher the p level is at work, the corresponding post level higher.
步骤S1022,基于岗级信息确定目的ip地址的地址等级。Step S1022, determine the address level of the destination IP address based on the post level information.
对于本申请实施例,以步骤S1021为例,岗级信息为p1级,则可以确定目的ip地址的地址等级为1级。For this embodiment of the application, taking step S1021 as an example, if the post level information is level p1, then it can be determined that the address level of the destination ip address is level 1.
步骤S1023,确定目的端口号在目的ip地址对应的设备上的进程信息。Step S1023, determine the process information of the destination port number on the device corresponding to the destination ip address.
其中,进程信息对应有预设端口等级。Wherein, the process information corresponds to a preset port level.
对于本申请实施例,进程信息对应有预设端口等级,确定目的端口号在目的ip地址对应的设备上的进程信息,以便于后续能够根据目的端口号对应的预设端口等级,确定出请求信息的重要等级。假设目的端口号对应的进程信息为进程A,进程A对应的预设端口等级为1级。For the embodiment of this application, the process information corresponds to the preset port level, and the process information of the destination port number on the device corresponding to the destination ip address is determined, so that the request information can be determined later according to the preset port level corresponding to the destination port number importance level. Assume that the process information corresponding to the destination port number is process A, and the default port level corresponding to process A is level 1.
步骤S1024,将地址等级与预设端口等级求和,得到请求信息的重要等级。Step S1024, summing the address level and the preset port level to obtain the importance level of the request information.
对于本申请实施例,以步骤S1022以及步骤S1023为例,预设端口等级为1级,地址等级为1级,将地址等级与预设端口等级求和,得到请求信息的重要等级为2级。从而达到确定出请求信息A的重要等级的效果。For this embodiment of the application, taking steps S1022 and S1023 as an example, the preset port level is 1, and the address level is 1, and the address level and the preset port level are summed to obtain the importance level of the request information as 2. In this way, the effect of determining the importance level of the requested information A is achieved.
本申请实施例的一种可能的实现方式,步骤S103在基于重要等级,判断请求信息是否允许获取目标数据时,具体包括步骤S1031(图中未示出)、步骤S1032(图中未示出)、步骤S1033(图中未示出)、步骤S1034(图中未示出)以及步骤S1035(图中未示出),其中,In a possible implementation of the embodiment of the present application, step S103 specifically includes step S1031 (not shown in the figure) and step S1032 (not shown in the figure) when judging whether the request information allows acquisition of target data based on the importance level , step S1033 (not shown in the figure), step S1034 (not shown in the figure) and step S1035 (not shown in the figure), wherein,
步骤S1031,判断预设访问控制列表中是否存在源ip地址。Step S1031, judging whether the source ip address exists in the preset access control list.
对于本申请实施例,请求信息中包括源ip地址,判断预设访问控制列表中是否存在该源ip地址,以便于判断出该源ip地址对应的设备在历史中是否存在请求信息。假设请求信息A的源ip地址为A地址,判断预设访问控制列表中是否存在A地址,以便于判断历史中是否存在来自A地址的请求信息。For this embodiment of the application, the request information includes the source ip address, and it is determined whether the source ip address exists in the preset access control list, so as to determine whether the device corresponding to the source ip address has request information in the history. Assuming that the source ip address of the request information A is the address A, judge whether there is an address A in the preset access control list, so as to judge whether there is any request information from the address A in the history.
步骤S1032,若存在,则确定源ip地址对应的历史请求信息,并确定历史请求信息对应的历史重要等级。Step S1032, if it exists, determine the historical request information corresponding to the source ip address, and determine the historical importance level corresponding to the historical request information.
其中,历史请求信息为源ip地址在预设访问控制列表内对应的请求信息。Wherein, the historical request information is the request information corresponding to the source IP address in the preset access control list.
对于本申请实施例,当存在时,说明在历史中存在包括该源ip地址对应的请求信息,因此可以确定出该源ip地址对应的历史请求信息,并确定该历史请求信息对应的历史重要等级,以便于后续能够根据历史重要等级以及重要等级判断出请求信息是否允许访问目标进程。以步骤S1031为例,预设访问控制列表包括A地址的请求信息有请求信息B以及请求信息C。请求信息B对应的重要等级为1级,请求等级C对应的重要等级为5级。For the embodiment of this application, when it exists, it means that there is request information corresponding to the source ip address in the history, so the historical request information corresponding to the source ip address can be determined, and the historical importance level corresponding to the historical request information can be determined , so that it can be determined whether the request information is allowed to access the target process according to the historical importance level and the importance level. Taking step S1031 as an example, the preset access control list includes the request information of A's address, including request information B and request information C. The importance level corresponding to request information B is level 1, and the importance level corresponding to request level C is level 5.
步骤S1033,将最高历史重要等级对应的历史请求信息确定为目标历史请求信息。Step S1033, determining the historical request information corresponding to the highest historical importance level as the target historical request information.
对于本申请实施例,请求信息对应的重要等级越高,说明请求信息能够获取的数据的重要程度越高,且由于在预设控制列表中源ip地址对应的历史请求信息的数量可能不止一条,因此可以将最高历史重要等级对应的历史请求信息确定为目标历史请求信息。以步骤S1032为例,目标历史请求信息为请求信息C。For this embodiment of the application, the higher the importance level corresponding to the request information, the higher the importance of the data that the request information can obtain, and since there may be more than one historical request information corresponding to the source ip address in the preset control list, Therefore, the historical request information corresponding to the highest historical importance level can be determined as the target historical request information. Taking step S1032 as an example, the target historical request information is request information C.
步骤S1034,若最高历史重要等级不小于重要等级,且目标历史请求信息允许获取目标历史目标数据,则确定请求信息允许获取目标数据。Step S1034, if the highest historical importance level is not less than the importance level, and the target history request information allows acquisition of target historical target data, then determine that the request information allows acquisition of target data.
其中,目标历史目标数据为目标历史请求信息需获取的目标数据。Wherein, the target historical target data is the target data to be obtained for the target historical request information.
对于本申请实施例,当最高历史重要等级不小于重要等级,且最高历史请求信息允许获取目标历史目标数据时,说明该源ip地址在历史中允许获取大于当前重要程度的目标数据,因此可以确定该请求信息允许获取目标数据。以步骤S1032为例,最高历史重要等级为5级,且请求信息C允许获取请求信息C对应的目标数据,请求信息A的重要等级为2级,最高历史重要等级不小于重要等级,即请求信息A对应的A地址能够获取重要等级为5级的数据,那么重要等级为2级的请求信息A也允许获取目标数据,从而达到确定出当前请求信息能够允许获取目标数据的效果。For the embodiment of this application, when the highest historical importance level is not less than the important level, and the highest historical request information allows acquisition of target historical target data, it means that the source IP address allows acquisition of target data greater than the current importance level in history, so it can be determined This request message allows acquisition of target data. Taking step S1032 as an example, the highest historical importance level is 5, and the request information C is allowed to obtain the target data corresponding to the request information C, the importance level of the request information A is 2, and the highest historical importance level is not less than the importance level, that is, the request information The A address corresponding to A can obtain data with an importance level of 5, then the request information A with an importance level of 2 is also allowed to obtain the target data, so as to achieve the effect of determining that the current request information can allow the target data to be obtained.
步骤S1035,若最高历史重要等级小于重要等级,且目标历史请求信息允许获取目标历史目标数据,则确定请求信息拒绝获取目标数据。Step S1035, if the highest historical importance level is less than the importance level, and the target history request information allows acquisition of target historical target data, then determine that the request information refuses to acquire target data.
对于本申请实施例,假设最高历史重要等级为1级时,假设请求信息A的重要等级为2级,即请求信息A对应的源ip地址A地址历史中访问过的最高重要等级为1级,而由于目前请求信息A的重要等级为2级,高于最高历史重要等级,因此可以确定请求信息A拒绝获取目标数据。从而达到确定出请求信息A无法获取目标数据的效果。For the embodiment of this application, assuming that the highest historical importance level is level 1, it is assumed that the importance level of request information A is level 2, that is, the highest level of importance visited in the history of the source ip address A corresponding to request information A is level 1, However, since the current importance level of the request information A is level 2, which is higher than the highest historical importance level, it can be determined that the request information A refuses to obtain the target data. In this way, the effect of determining that the request information A cannot obtain the target data is achieved.
本申请实施例的一种可能的实现方式,步骤S1031之后还包括步骤S105(图中未示出)、步骤S106(图中未示出)、步骤S107(图中未示出)、步骤S108(图中未示出)以及步骤S109(图中未示出),其中,A possible implementation of the embodiment of the present application, after step S1031, further includes step S105 (not shown in the figure), step S106 (not shown in the figure), step S107 (not shown in the figure), step S108 ( not shown in the figure) and step S109 (not shown in the figure), wherein,
步骤S105,若未存在,则获取目标数据。Step S105, if it does not exist, acquire the target data.
对于本申请实施例,当预设访问控制列表中不存在源ip地址时,说明目前工业防火墙无法根据预设访问控制列表中的请求信息判断当前接收到的请求信息是否允许获取目标数据,而当工业防火墙对该请求信息放行,使得该请求信息进入工控网络获取目标数据时,可能对工控网络造成攻击,因此工业防火墙在无法判断当前请求信息是否安全的情况下,工业防火墙可以根据请求信息获取目标数据。假设请求信息A需获取的目标数据为数据A,为避免请求信息A进入工控网络,可以由工业防火墙在工控网络中获取到数据A,以使得后续能够将数据A输出,进而确定出请求信息A是否允许通过工业防火墙并获取数据A。For this embodiment of the application, when the source ip address does not exist in the preset access control list, it means that the current industrial firewall cannot judge whether the currently received request information is allowed to obtain the target data according to the request information in the preset access control list, and when The industrial firewall releases the request information, so that when the request information enters the industrial control network to obtain the target data, it may cause an attack on the industrial control network. Therefore, when the industrial firewall cannot judge whether the current request information is safe, the industrial firewall can obtain the target data based on the request information. data. Assuming that the target data to be acquired by request information A is data A, in order to prevent request information A from entering the industrial control network, the industrial firewall can obtain data A in the industrial control network, so that data A can be output later, and then the request information A can be determined Is it allowed to pass through the industrial firewall and obtain data A.
步骤S106,基于目标数据以及预设标签信息生成待输出数据。Step S106, generating data to be output based on the target data and preset label information.
对于本申请实施例,预设标签信息为提前设定的标签信息,且预设标签信息对应有反馈信号,根据目标数据以及预设标签信息生成待输出数据,从而便于后续能够根据待输出数据判断当前请求信息是否允许获取目标数据。假设标签信息对应的反馈信号为“我已接收到”。For the embodiment of the present application, the preset tag information is the tag information set in advance, and the preset tag information corresponds to a feedback signal, and the data to be output is generated according to the target data and the preset tag information, so that subsequent judgment can be made based on the data to be output Whether the current request information allows to obtain the target data. Assume that the feedback signal corresponding to the tag information is "I have received it".
步骤S107,基于预设传输通道输出待输出数据。Step S107, outputting the data to be output based on the preset transmission channel.
其中,预设传输通道为目标数据对应的传输通道。Wherein, the preset transmission channel is a transmission channel corresponding to the target data.
对于本申请实施例,预设传输通道为提前设定的内部传输通道,且能够通过预设传输通道接收到待输出数据的源ip地址对应的设备,说明该源ip地址对应的网络信息能够通过工业防火墙。预设标签信息用以当存在设备接收到待输出数据时,控制设备发出反馈信号。因此根据预设传输通道输出待传输数据,以便于后续判断请求信息A是否允许获取数据A。假设数据A对应的预设传输通道为1通道,若设备能够接收到1通道输出的数据,则说明该设备为允许获取数据的设备,因此将根据数据A以及预设标签信息生成的待输出数据A通过1通道输出,能够判断出请求信息A是否允许获取数据A。For the embodiment of this application, the preset transmission channel is an internal transmission channel set in advance, and the device corresponding to the source ip address of the data to be output can be received through the preset transmission channel, indicating that the network information corresponding to the source ip address can pass through Industrial firewall. The preset tag information is used for the control device to send a feedback signal when the existing device receives the data to be output. Therefore, the data to be transmitted is output according to the preset transmission channel, so as to subsequently determine whether the request information A allows the acquisition of the data A. Assuming that the preset transmission channel corresponding to data A is channel 1, if the device can receive the data output by channel 1, it means that the device is allowed to obtain data, so the data to be output generated based on data A and the preset label information A is output through 1 channel, and it can be judged whether request information A is allowed to obtain data A.
步骤S108,判断在第一预设时间内是否接收到预设标签信息对应的反馈信号。Step S108, judging whether a feedback signal corresponding to preset tag information is received within a first preset time.
对于本申请实施例,第一预设时间为提前设定的时间,假设第一预设时间为10s(秒),以步骤S106为例,假设在10s内接收到“我已接收到”的信号,则说明请求信息A允许获取目标数据A。若在10S内未接收到“我已接收到”的信号,则说明请求信息A拒绝获取数据A。For the embodiment of this application, the first preset time is the time set in advance, assuming that the first preset time is 10s (seconds), taking step S106 as an example, assuming that the "I have received" signal is received within 10s , it means that the request information A allows the acquisition of the target data A. If the "I have received" signal is not received within 10S, it means that the request information A refuses to obtain the data A.
步骤S109,将请求信息以及判断结果添加至预设访问控制列表中。Step S109, adding the request information and the judgment result to the preset access control list.
对于本申请实施例,将请求信息以及判断结果添加至预设访问控制列表中,从而达到工业防火墙能够自动添加请求信息的效果。假设判断结果为接收到反馈信号,说明当前请求信息A对应的源ip地址的设备获取到数据A,则可以确定请求信息A允许获取目标数据A,即可以将请求信息A以及允许获取数据A添加至预设访问控制列表中。若判断结果为未接收到反馈信号,说明当前请求信息A对应的源ip地址的设备未获取到数据A,则可以确定请求信息A拒绝获取目标数据A,则可以将请求信息A以及拒绝获取数据A添加至预设访问控制列表中。从而便于后续当再次接收到请求信息A时,能够较快判断出请求信息A是否允许获取数据A的效果,进而达到工业防火墙能够自动添加请求信息的效果。For this embodiment of the application, the request information and the judgment result are added to the preset access control list, so as to achieve the effect that the industrial firewall can automatically add the request information. Assuming that the judgment result is that a feedback signal is received, indicating that the device with the source ip address corresponding to the current request information A has obtained data A, it can be determined that the request information A allows the acquisition of the target data A, that is, the request information A and the data A allowed to be obtained can be added to the default access control list. If the judgment result is that the feedback signal has not been received, it means that the device with the source ip address corresponding to the current request information A has not obtained the data A, then it can be determined that the request information A refuses to obtain the target data A, then the request information A and the refusal to obtain the data can be sent to A is added to the default access control list. In this way, when the request information A is received again, it is convenient to quickly determine whether the request information A is allowed to obtain the data A, and then achieve the effect that the industrial firewall can automatically add the request information.
本申请实施例的一种可能的实现方式,步骤S104之后还包括步骤S110(图中未示出)以及步骤S111(图中未示出),其中,A possible implementation of the embodiment of the present application further includes step S110 (not shown in the figure) and step S111 (not shown in the figure) after step S104, wherein,
步骤S110,若请求信息允许获取目标数据,且重要等级大于预设重要等级,则当检测到请求信息首次获取目标数据时,记录获取时间。Step S110, if the request information allows acquisition of the target data, and the importance level is greater than the preset importance level, when it is detected that the request information acquires the target data for the first time, record the acquisition time.
对于本申请实施例,预设重要等级为提前设定的重要等级,作为判断重要等级是否为重要程度较高的重要等级,假设预设重要等级为5级,当请求信息允许获取目标数据,且请求信息的重要等级大于5级时,说明当前请求信息需访问的目标数据重要程度较高,即可能存在使得工控网络中信息泄露的危险,因此可以记录该请求信息获取时间,以便于后续能够根据获取时间判断是否发生了信息泄露等危险。假设获取时间为10min(分钟)。For the embodiment of the present application, the preset importance level is the importance level set in advance, and is used to judge whether the importance level is an important level with a high degree of importance, assuming that the preset importance level is 5, when the request information allows the acquisition of target data, and When the importance level of the requested information is greater than level 5, it means that the target data to be accessed by the current requested information is of high importance, that is, there may be a danger of information leakage in the industrial control network. Obtain the time to judge whether there is a danger such as information leakage. Suppose the acquisition time is 10min (minutes).
步骤S111,若获取时间达到第二预设时间,则拒绝请求信息获取目标数据,并输出请求信息。In step S111, if the acquisition time reaches the second preset time, deny the request information to acquire the target data, and output the request information.
对于本申请实施例,第二预设时间为提前设定的预设时间,用以判断当前获取时间是否较长的标准,假设第二预设时间为10min,以步骤S110为例,获取时间达到第二预设时间,说明发出该请求信息的设备对工控网络造成危害的可能性较大,即当前可以拒绝该请求信息获取目标数据,并输出请求信息,以使得网络管理人员能够及时查看到存在权限变更的请求信息,从而使得工业防火墙的防护性能更佳。For the embodiment of the present application, the second preset time is a preset time set in advance, which is used to judge whether the current acquisition time is longer. Assuming that the second preset time is 10 minutes, taking step S110 as an example, the acquisition time reaches The second preset time indicates that the device sending the request information is more likely to cause harm to the industrial control network, that is, the request information can be rejected to obtain the target data at present, and the request information can be output, so that the network management personnel can check the existing information in time. Request information for permission changes, so that the protection performance of industrial firewalls is better.
本申请实施例的一种可能的实现方式,还包括步骤S112(图中未示出)、步骤S113(图中未示出)、步骤S114(图中未示出)、步骤S115(图中未示出)以及步骤S116(图中未示出),其中,步骤S112可在步骤S104之前执行,其中,A possible implementation of the embodiment of this application also includes step S112 (not shown in the figure), step S113 (not shown in the figure), step S114 (not shown in the figure), step S115 (not shown in the figure) shown) and step S116 (not shown in the figure), wherein, step S112 can be performed before step S104, wherein,
步骤S112,判断目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系。Step S112, judging whether there is an association relationship between the target data and the historical target data corresponding to each piece of historical request information.
对于本申请实施例,在预设访问控制列表中,源ip地址对应的历史请求信息的条数可能为至少一条,判断目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系,以便于后续确定出存在关联关系的请求信息的总数量以及其中允许获取数据的请求信息的数量。For this embodiment of the application, in the preset access control list, there may be at least one piece of historical request information corresponding to the source ip address, and it is judged whether there is an association relationship between the target data and the historical target data corresponding to each piece of historical request information , so as to subsequently determine the total number of request information that has an association relationship and the number of request information that allows data acquisition.
假设,请求信息A的源ip地址为地址A,在预设访问控制列表中地址A对应的请求信息有请求信息B、请求信息C、请求信息D以及请求信息E,分别对应的目标数据为数据B、数据C、数据D以及数据E。判断数据A分别与数据B、数据C、数据D、数据E之间是否存在关联关系。Assume that the source ip address of request information A is address A, and the request information corresponding to address A in the preset access control list includes request information B, request information C, request information D, and request information E, and the corresponding target data are data B, data C, data D and data E. It is judged whether there is an association relationship between data A and data B, data C, data D, and data E respectively.
步骤S113,获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量。Step S113, acquiring the total quantity of associated historical target data and the quantity of obtainable data.
其中,可获取数据为关联历史目标数据中允许被获取的关联历史目标数据。Wherein, the obtainable data is associated historical target data that is allowed to be acquired in the associated historical target data.
对于本申请实施例,可获取数据为关联历史目标数据中允许被获取的关联历史目标数据,获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量,以便于后续能根据总数量以及数量判断出当前请求信息是否允许获取目标数据。以步骤S112为例,假设数据A分别与数据B、数据C、数据D、数据E之间存在关联关系。则总数量为4,假设数据B、数据C以及数据D分别能够被各自对应的请求信息获取,则可获取数据的数量为3。For this embodiment of the application, the data that can be obtained is the associated historical object data that is allowed to be obtained in the associated historical object data, the total number of associated historical object data that has an associated relationship, and the amount of data that can be obtained, so that the follow-up can be based on the total Quantity and Quantity determine whether the current request information allows to obtain the target data. Taking step S112 as an example, it is assumed that data A is associated with data B, data C, data D, and data E respectively. Then the total number is 4, assuming that data B, data C, and data D can be obtained by their corresponding request information, then the number of data that can be obtained is 3.
步骤S114,基于数量以及总数量,确定目标比例。Step S114, based on the quantity and the total quantity, determine the target ratio.
对于本申请实施例,以步骤S113为例,可以将数量3与总数量4作除,得到目标比例为75%。以便于后续能够根据75%判断当前请求信息A是否允许获取数据A。For the embodiment of the present application, taking step S113 as an example, the quantity 3 can be divided by the total quantity 4 to obtain a target ratio of 75%. In order to facilitate subsequent judgment based on 75% whether the current request information A is allowed to obtain data A.
步骤S115,判断目标比例是否达到预设比例。Step S115, judging whether the target ratio reaches the preset ratio.
对于本申请实施例,预设比例为提前设定的比例,作为判断当前目标比例是否达标的标准,当目标比例达到预设比例时,说明在历史记录中源ip地址对应的历史请求信息大部分均可获取各自对应的目标数据,因此可以确定当前的请求信息允许获取目标数据,当目标比例未达到预设比例时,说明在历史记录中源ip地址对应的历史请求信息大部分均拒绝获取各自对应的目标数据,因此可以确定当前的请求信息拒绝获取目标数据。For the embodiment of this application, the preset ratio is the ratio set in advance, as the standard for judging whether the current target ratio reaches the standard. When the target ratio reaches the preset ratio, it means that most of the historical request information corresponding to the source IP address in the historical records The corresponding target data can be obtained, so it can be determined that the current request information allows the acquisition of the target data. When the target ratio does not reach the preset ratio, it means that most of the historical request information corresponding to the source IP address in the historical records refuses to obtain the respective target data. The corresponding target data, so it can be determined that the current request information refuses to obtain the target data.
以步骤S114为例,假设预设比例为70%,当前计算出的目标比例为75%达到预设比例,则可以说明请求信息A的A地址在历史中对应的众多请求信息中,允许获取目标数据的可能性较大。因此可以确定请求信息A允许获取数据A。Taking step S114 as an example, assuming that the preset ratio is 70%, and the currently calculated target ratio is 75% to reach the preset ratio, it can be explained that the A address of the request information A is allowed to obtain the target among the many corresponding request information in history. data are more likely. Therefore, it can be determined that the request information A allows data A to be acquired.
步骤S116,将请求信息以及判断结果添加至预设访问控制列表中。Step S116, adding the request information and the judgment result to the preset access control list.
对于本申请实施例,判断结果包括目标比例达到预设比例,说明当前请求信息允许获取目标数据,以及目标比例未达到预设比例,说明当前请求信息拒绝获取目标数据,将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表判断出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。以步骤S115为例,目标比例达到预设比例,说明请求信息A允许获取数据A,则可以将请求信息A允许获取数据A以及请求信息A添加至预设访问控制列表中,以便于后续当再次接收到请求信息A时,工业防火墙能够根据预设访问控制列表确定出请求信息A允许获取数据A,从而达到工业防火墙能够对请求信息A进行自动添加的效果。For this embodiment of the application, the judgment result includes that the target ratio reaches the preset ratio, indicating that the current request information allows acquisition of the target data, and that the target ratio does not reach the preset ratio, indicating that the current request information refuses to obtain the target data, and the request information and the corresponding judgment The result is added to the preset access control list, so that when the request information is received again later, the industrial firewall can judge whether the request information can pass through according to the preset access control list, so that the industrial firewall can automatically add the request information Effect. Taking step S115 as an example, if the target ratio reaches the preset ratio, it means that the request information A allows data A to be obtained, then the request information A allows data A to be obtained and the request information A can be added to the preset access control list, so that when the request information A is allowed to be obtained again When receiving the request information A, the industrial firewall can determine that the request information A is allowed to obtain the data A according to the preset access control list, so as to achieve the effect that the industrial firewall can automatically add the request information A.
本申请实施例的一种可能的实现方式,步骤S1032之后还包括步骤S117(图中未示出)、步骤S118(图中未示出)、步骤S119(图中未示出)以及步骤S120(图中未示出),其中,A possible implementation of the embodiment of the present application, after step S1032, further includes step S117 (not shown in the figure), step S118 (not shown in the figure), step S119 (not shown in the figure) and step S120 ( not shown in the figure), where,
步骤S117,基于历史请求信息,确定源ip地址对应的历史MAC地址。Step S117, based on the historical request information, determine the historical MAC address corresponding to the source ip address.
对于本申请实施例,由于目前许多黑客在对工控网络进行攻击,可能对自身的ip地址进行封装,使自身ip地址转变为工业防火墙能够识别的ip地址,从而达到通过工业防火墙,并进入工控网络的目的。MAC地址为ip地址对应的设备的网关地址,属于地理位置地址,根据历史请求信息,确定出A地址对应的历史MAC地址为A1地址,以便于后续能够根据A1地址判断当前 A地址是否为修改后的地址。For the embodiment of this application, because many hackers are attacking the industrial control network at present, they may encapsulate their own ip address to change their own ip address into an ip address that can be recognized by the industrial firewall, so as to pass through the industrial firewall and enter the industrial control network the goal of. The MAC address is the gateway address of the device corresponding to the ip address, which belongs to the geographic location address. According to the historical request information, it is determined that the historical MAC address corresponding to the A address is the A1 address, so that the subsequent judgment can be made based on the A1 address. Whether the current A address is modified the address of.
步骤S118,获取请求信息的MAC地址。Step S118, acquiring the MAC address of the requested information.
对于本申请实施例,获取请求信息A的MAC地址,以便于后续判断该MAC地址与历史MAC地址是否相同。假设请求信息A的MAC地址为A2地址。For this embodiment of the application, the MAC address of the request information A is obtained, so as to subsequently determine whether the MAC address is the same as the historical MAC address. Assume that the MAC address of request information A is A2 address.
步骤S119,判断MAC地址与历史MAC地址是否相同。Step S119, judging whether the MAC address is the same as the historical MAC address.
对于本申请实施例,当MAC地址与历史MAC地址相同时,说明当前请求信息A中的A地址与历史中的A地址为同一地址,并未进行过修改。当MAC地址与历史MAC地址不同时,说明当前请求信息A中的A地址真实情况下可能不为A地址,可能为B地址,是黑客使用某种手段,将B地址修改为A地址,以扰乱工业防火墙的识别结果。For this embodiment of the application, when the MAC address is the same as the historical MAC address, it means that the A address in the current request information A is the same address as the A address in the history, and has not been modified. When the MAC address is different from the historical MAC address, it means that the A address in the current request information A may not be the A address in the real situation, but may be the B address. The hacker used some means to change the B address to the A address to disturb The identification result of the industrial firewall.
步骤S120,若不相同,则确定源ip地址属于被修改ip地址,并确定请求信息拒绝获取目标数据。Step S120, if not the same, determine that the source ip address belongs to the modified ip address, and determine that the request information refuses to obtain the target data.
对于本申请实施例,以步骤S118为例,MAC地址为A2地址,历史MAC地址为A1地址,说明不相同,即在请求信息A中,A地址可能为经过修改后的地址,因此可以确定A地址为修改地址,并且拒绝请求信息A获取数据A。For this embodiment of the application, taking step S118 as an example, the MAC address is the A2 address, and the historical MAC address is the A1 address. The address is a modified address, and the request for information A to obtain data A is denied.
上述实施例从方法流程的角度介绍一种工业防火墙防护的方法,下述实施例从虚拟模块或者虚拟单元的角度介绍了一种工业防火墙防护的装置20,具体详见下述实施例。The above-mentioned embodiment introduces an industrial firewall protection method from the perspective of method flow, and the following embodiments introduce an industrial
本申请实施例提供一种工业防火墙防护的装置20,如图2所示,该工业防火墙防护的装置20具体可以包括:The embodiment of the present application provides an industrial
第一判断模块201,用于当接收到请求信息时,判断请求信息在预设访问控制列表中是否存在;The
第一确定模块202,用于当不存在时,确定请求信息的重要等级;The
第二判断模块203,用于基于重要等级,判断请求信息是否允许获取目标数据,目标数据为请求信息需获取的数据;The
第一添加模块204,用于将请求信息以及对应的判断结果添加至预设访问控制列表中。The first adding
通过采用上述技术方案,当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,第一判断模块201判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以通过第一确定模块202确定出该请求信息的重要等级,以使得第二判断模块203根据重要等级判断出该请求信息是否允许获取目标数据,其中,目标数据为请求信息需获取的数据,从而使得后续第一添加模块204能够将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表确定出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。By adopting the above technical solution, when the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through, and the preset access control list is a permission list set in advance, including multiple requests that can pass through the industrial firewall Information and multiple request information that cannot pass through the industrial firewall, the first judging
本申请实施例的一种可能的实现方式,第一确定模块202在确定请求信息的重要等级时,具体用于:In a possible implementation of the embodiment of the present application, when the
判断使用目的ip地址对应的用户的岗级信息;Determine the post level information of the user corresponding to the destination ip address;
基于岗级信息确定目的ip地址的地址等级;Determine the address level of the destination IP address based on the post level information;
确定目的端口号在目的ip地址对应的设备上的进程信息,进程信息对应有预设端口等级;Determine the process information of the destination port number on the device corresponding to the destination ip address, and the process information corresponds to a preset port level;
将地址等级与预设端口等级求和,得到请求信息的重要等级。Add the address class and the preset port class to get the importance class of the requested information.
本申请实施例的一种可能的实现方式,第二判断模块203在基于重要等级,判断请求信息是否允许获取目标数据,具体用于:In a possible implementation of the embodiment of the present application, the
判断预设访问控制列表中是否存在源ip地址;Determine whether the source ip address exists in the preset access control list;
若存在,则确定源ip地址对应的历史请求信息,并确定历史请求信息对应的历史重要等级,历史请求信息为源ip地址在预设访问控制列表内对应的请求信息;If it exists, determine the historical request information corresponding to the source ip address, and determine the historical importance level corresponding to the historical request information, where the historical request information is the corresponding request information of the source ip address in the preset access control list;
将最高历史重要等级对应的历史请求信息确定为目标历史请求信息;Determining the historical request information corresponding to the highest historical importance level as the target historical request information;
若最高历史重要等级不小于重要等级,且目标历史请求信息允许获取目标历史目标数据,则确定请求信息允许获取目标数据,目标历史目标数据为目标历史请求信息需获取的目标数据;If the highest historical importance level is not less than the importance level, and the target historical request information allows acquisition of target historical target data, then it is determined that the request information allows acquisition of target data, and the target historical target data is the target data that needs to be obtained for the target historical request information;
若最高历史重要等级小于重要等级,且目标历史请求信息允许获取目标历史目标数据,则确定请求信息拒绝获取目标数据。If the highest historical importance level is smaller than the importance level, and the target historical request information allows acquisition of the target historical target data, it is determined that the request information refuses to acquire the target data.
本申请实施例的一种可能的实现方式,装置20还包括:In a possible implementation manner of the embodiment of the present application, the
第一获取模块,用于当未存在时,获取目标数据;The first acquisition module is used to acquire the target data when it does not exist;
生成模块,用于基于目标数据以及预设标签信息生成待输出数据;A generating module, configured to generate data to be output based on target data and preset label information;
第一输出模块,用于基于预设传输通道输出待输出数据,预设传输通道为目标数据对应的传输通道;The first output module is configured to output data to be output based on a preset transmission channel, where the preset transmission channel is a transmission channel corresponding to the target data;
第三判断模块,用于判断在第一预设时间内是否接收到预设标签信息对应的反馈信号;The third judging module is used to judge whether the feedback signal corresponding to the preset tag information is received within the first preset time;
第二添加模块,用于将请求信息以及判断结果添加至预设访问控制列表中。The second adding module is used to add the request information and the judgment result to the preset access control list.
本申请实施例的一种可能的实现方式,装置20还包括:In a possible implementation manner of the embodiment of the present application, the
记录模块,用于当请求信息允许获取目标数据,且重要等级大于预设重要等级时,若检测到请求信息首次获取目标数据,则记录获取时间;A recording module, configured to record the acquisition time if it is detected that the request information acquires the target data for the first time when the request information allows acquisition of the target data and the importance level is greater than the preset importance level;
第二输出模块,用于当获取时间达到第二预设时间时,拒绝请求信息获取目标数据,并输出请求信息。The second output module is configured to reject the request information to acquire the target data and output the request information when the acquisition time reaches a second preset time.
本申请实施例的一种可能的实现方式,装置20还包括:In a possible implementation manner of the embodiment of the present application, the
第四判断模块,用于判断目标数据与每条历史请求信息对应的历史目标数据之间是否存在关联关系;The fourth judging module is used to judge whether there is a relationship between the target data and the historical target data corresponding to each piece of historical request information;
第二获取模块,用于获取存在关联关系的关联历史目标数据的总数量,以及可获取数据的数量,可获取数据为关联历史目标数据中允许被获取的关联历史目标数据;The second obtaining module is used to obtain the total quantity of associated historical target data with associated relationship and the quantity of obtainable data, the obtainable data is the associated historical target data that is allowed to be acquired in the associated historical target data;
第三确定模块,用于基于数量以及总数量,确定目标比例;The third determination module is used to determine the target ratio based on the quantity and the total quantity;
第五判断模块,用于判断目标比例是否达到预设比例;The fifth judging module is used to judge whether the target ratio reaches the preset ratio;
第三添加模块,用于将请求信息以及判断结果添加至预设访问控制列表中。The third adding module is used to add the request information and the judgment result to the preset access control list.
本申请实施例的一种可能的实现方式,装置20还包括:In a possible implementation manner of the embodiment of the present application, the
第三确定模块,用于基于历史请求信息,确定源ip地址对应的历史MAC地址;The third determination module is used to determine the historical MAC address corresponding to the source IP address based on the historical request information;
第三获取模块,用于获取请求信息的MAC地址;The third obtaining module is used to obtain the MAC address of the requested information;
第六判断模块,用于判断MAC地址与历史MAC地址是否相同;The sixth judging module is used to judge whether the MAC address is the same as the historical MAC address;
第四确定模块,用于当不相同时,确定源ip地址属于被修改ip地址,并确定请求信息拒绝获取目标数据。The fourth determination module is used to determine that the source ip address belongs to the modified ip address when they are different, and determine that the request information refuses to obtain the target data.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述工业防火墙防护的装置20具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of description, the specific working process of the above-mentioned industrial
本申请实施例中提供了一种工业防火墙,如图3所示,图3所示的工业防火墙30包括:处理器301和存储器303。其中,处理器301和存储器303相连,如通过总线302相连。可选地,工业防火墙30还可以包括收发器304。需要说明的是,实际应用中收发器304不限于一个,该工业防火墙30的结构并不构成对本申请实施例的限定。An embodiment of the present application provides an industrial firewall. As shown in FIG. 3 , the
处理器301可以是CPU(Central Processing Unit,中央处理器),通用处理器,DSP(Digital Signal Processor,数据信号处理器),ASIC(Application SpecificIntegrated Circuit,专用集成电路),FPGA(Field Programmable Gate Array,现场可编程门阵列)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器301也可以是实现计算功能的组合,例如包含至少一个微处理器组合,DSP和微处理器的组合等。The
总线302可包括一通路,在上述组件之间传送信息。总线302可以是PCI(Peripheral Component Interconnect,外设部件互连标准)总线或EISA(ExtendedIndustry Standard Architecture,扩展工业标准结构)总线等。总线302可以分为地址总线、数据总线、控制总线等。为便于表示,图3中仅用一条粗线表示,但并不表示仅有一根总线或一型的总线。
存储器303可以是ROM(Read Only Memory,只读存储器)或可存储静态信息和指令的其他类型的静态存储设备,RAM(Random Access Memory,随机存取存储器)或者可存储信息和指令的其他类型的动态存储设备,也可以是EEPROM(Electrically ErasableProgrammable Read Only Memory,电可擦可编程只读存储器)、CD-ROM(Compact DiscRead Only Memory,只读光盘)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。The
存储器303用于存储执行本申请方案的应用程序代码,并由处理器301来控制执行。处理器301用于执行存储器303中存储的应用程序代码,以实现前述方法实施例所示的内容。The
其中,工业防火墙包括但不限于:移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。还可以为服务器等。图3示出的工业防火墙仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。Among them, industrial firewalls include but are not limited to: mobile phones, notebook computers, digital broadcast receivers, PDA (personal digital assistant), PAD (tablet computer), PMP (portable multimedia player), vehicle-mounted terminals (such as vehicle-mounted navigation terminals), etc. Mobile terminals such as digital TVs, desktop computers, etc. and fixed terminals. Also for servers etc. The industrial firewall shown in FIG. 3 is only an example, and should not limit the functions and scope of use of this embodiment of the present application.
本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,当其在计算机上运行时,使得计算机可以执行前述方法实施例中相应内容。与相关技术相比,本申请实施例中,当接收到请求信息时,说明当前工业防火墙需判断该请求信息是否能够通行,预设访问控制列表为提前设定的权限列表,其中包括能够通过该工业防火墙的多个请求信息以及不能够通过该工业防火墙的多个请求信息,判断该请求信息在预设访问控制列表中是否存在,从而达到判断该请求信息是否能够被工业防火墙进行识别的效果,当在预设访问控制列表中存在时,说明该工业防火墙能够识别出该请求信息是否能够通过,当在预设访问控制列表中不存在时,说明该工业防火墙无法识别出该请求信息是否能够通过,因此可以确定出该请求信息的重要等级,从而根据重要等级判断出该请求信息是否允许获取目标数据,其中,目标数据为请求信息需获取的数据,从而使得后续能够将请求信息以及对应的判断结果添加至预设访问控制列表中,以便于后续再次接收到该请求信息时,工业防火墙能够根据预设访问控制列表确定出该请求信息是否能够通行,进而达到工业防火墙能够自动对请求信息进行添加的效果。An embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when it is run on a computer, the computer can execute the corresponding content in the foregoing method embodiments. Compared with the related technology, in the embodiment of the present application, when the request information is received, it means that the current industrial firewall needs to judge whether the request information can pass through, and the preset access control list is a permission list set in advance, including the Multiple request information of the industrial firewall and multiple request information that cannot pass through the industrial firewall, judge whether the request information exists in the preset access control list, so as to achieve the effect of judging whether the request information can be recognized by the industrial firewall, When it exists in the preset access control list, it means that the industrial firewall can identify whether the requested information can pass; when it does not exist in the preset access control list, it means that the industrial firewall cannot identify whether the requested information can pass , so the importance level of the request information can be determined, so as to determine whether the request information is allowed to obtain the target data according to the importance level. The result is added to the preset access control list, so that when the request information is received again later, the industrial firewall can determine whether the request information can pass according to the preset access control list, so that the industrial firewall can automatically add the request information Effect.
应该理解的是,虽然附图的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,附图的流程图中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the various steps in the flow chart of the accompanying drawings are displayed sequentially according to the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and they can be executed in other orders. Moreover, at least some of the steps in the flowcharts of the accompanying drawings may include multiple sub-steps or multiple stages, and these sub-steps or stages may not necessarily be executed at the same time, but may be executed at different times, and the order of execution is also It is not necessarily performed sequentially, but may be performed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.
以上仅是本申请的部分实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。The above are only some implementations of the present application. It should be pointed out that for those of ordinary skill in the art, some improvements and modifications can be made without departing from the principle of the application, and these improvements and modifications should also be considered as For the scope of protection of this application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310052420.3A CN116155576B (en) | 2023-02-02 | 2023-02-02 | Industrial firewall protection method, device, industrial firewall and medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310052420.3A CN116155576B (en) | 2023-02-02 | 2023-02-02 | Industrial firewall protection method, device, industrial firewall and medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN116155576A true CN116155576A (en) | 2023-05-23 |
| CN116155576B CN116155576B (en) | 2025-08-22 |
Family
ID=86340232
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310052420.3A Active CN116155576B (en) | 2023-02-02 | 2023-02-02 | Industrial firewall protection method, device, industrial firewall and medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116155576B (en) |
Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080184357A1 (en) * | 2007-01-25 | 2008-07-31 | Drako Dean M | Firewall based on domain names |
| CN101572718A (en) * | 2008-04-30 | 2009-11-04 | 张文 | IP QoS unified strategic system based on oriented application and method thereof |
| CN108200068A (en) * | 2018-01-08 | 2018-06-22 | 平安科技(深圳)有限公司 | Port monitoring method, apparatus, computer equipment and storage medium |
| CN111931140A (en) * | 2020-07-31 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Authority management method, resource access control method and device and electronic equipment |
| WO2021008028A1 (en) * | 2019-07-18 | 2021-01-21 | 平安科技(深圳)有限公司 | Network attack source tracing and protection method, electronic device and computer storage medium |
| CN112953927A (en) * | 2021-02-07 | 2021-06-11 | 中国科学院计算技术研究所 | Flow table query method and system based on flow table structure isolation in virtual switch |
| WO2021114925A1 (en) * | 2019-12-13 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Access control method and access control apparatus |
| CN113315704A (en) * | 2021-05-20 | 2021-08-27 | 中国联合网络通信集团有限公司 | Message forwarding method, SDN controller, switch and system |
| CN113783889A (en) * | 2021-09-22 | 2021-12-10 | 南方电网数字电网研究院有限公司 | Firewall control method for linkage access of network layer and application layer and firewall thereof |
| CN114510738A (en) * | 2021-12-31 | 2022-05-17 | 华能烟台八角热电有限公司 | Data use risk assessment method and system |
| CN115412302A (en) * | 2022-08-03 | 2022-11-29 | 中国电信股份有限公司 | Weak password detection method, device, electronic equipment and storage medium |
-
2023
- 2023-02-02 CN CN202310052420.3A patent/CN116155576B/en active Active
Patent Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080184357A1 (en) * | 2007-01-25 | 2008-07-31 | Drako Dean M | Firewall based on domain names |
| CN101572718A (en) * | 2008-04-30 | 2009-11-04 | 张文 | IP QoS unified strategic system based on oriented application and method thereof |
| CN108200068A (en) * | 2018-01-08 | 2018-06-22 | 平安科技(深圳)有限公司 | Port monitoring method, apparatus, computer equipment and storage medium |
| WO2021008028A1 (en) * | 2019-07-18 | 2021-01-21 | 平安科技(深圳)有限公司 | Network attack source tracing and protection method, electronic device and computer storage medium |
| WO2021114925A1 (en) * | 2019-12-13 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Access control method and access control apparatus |
| CN111931140A (en) * | 2020-07-31 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Authority management method, resource access control method and device and electronic equipment |
| CN112953927A (en) * | 2021-02-07 | 2021-06-11 | 中国科学院计算技术研究所 | Flow table query method and system based on flow table structure isolation in virtual switch |
| CN113315704A (en) * | 2021-05-20 | 2021-08-27 | 中国联合网络通信集团有限公司 | Message forwarding method, SDN controller, switch and system |
| CN113783889A (en) * | 2021-09-22 | 2021-12-10 | 南方电网数字电网研究院有限公司 | Firewall control method for linkage access of network layer and application layer and firewall thereof |
| CN114510738A (en) * | 2021-12-31 | 2022-05-17 | 华能烟台八角热电有限公司 | Data use risk assessment method and system |
| CN115412302A (en) * | 2022-08-03 | 2022-11-29 | 中国电信股份有限公司 | Weak password detection method, device, electronic equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116155576B (en) | 2025-08-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111416811B (en) | Unauthorized vulnerability detection method, system, equipment and storage medium | |
| US10313322B2 (en) | Distinguishing human-generated input from programmatically-generated input | |
| US20160028774A1 (en) | Data Access Policies | |
| CN110611723A (en) | A method and device for scheduling service resources | |
| US10701179B2 (en) | Adaptive scoring of service requests and determining whether to fulfill service requests | |
| CN111726364B (en) | Host intrusion prevention method, system and related device | |
| WO2020000749A1 (en) | Method and apparatus for detecting unauthorized vulnerabilities | |
| US11630895B2 (en) | System and method of changing the password of an account record under a threat of unlawful access to user data | |
| CN116611058A (en) | Lexovirus detection method and related system | |
| EP3172692A1 (en) | Remedial action for release of threat data | |
| CN110069911A (en) | Access control method, device, system, electronic equipment and readable storage medium | |
| CN119167386A (en) | API interface request access control method, device, computer equipment and storage medium | |
| WO2019052469A1 (en) | Network request processing method and apparatus, electronic device, and storage medium | |
| CN103067465B (en) | file sharing method and system | |
| CN114401126A (en) | Interface safety monitoring method and device | |
| US11425162B2 (en) | Detection of malicious C2 channels abusing social media sites | |
| US8635692B2 (en) | System and method for user friendly detection of spammers | |
| CN116155576B (en) | Industrial firewall protection method, device, industrial firewall and medium | |
| CN118337403B (en) | Attack path restoration method and device based on IOC, electronic equipment and medium | |
| CN115203676B (en) | Database connection method, database connection device, proxy server and medium | |
| WO2020238971A1 (en) | File sharing method, apparatus and system, server, terminal, and storage medium | |
| US12132758B1 (en) | Host-level bot detection | |
| CN116938821A (en) | Data flow limiting method, device, computer equipment and storage medium | |
| CN116405578A (en) | Asset identification method and device | |
| CN113836371A (en) | Security event display method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |
