CN116566654A - Protection system for block chain management server - Google Patents

Protection system for block chain management server Download PDF

Info

Publication number
CN116566654A
CN116566654A CN202310384813.4A CN202310384813A CN116566654A CN 116566654 A CN116566654 A CN 116566654A CN 202310384813 A CN202310384813 A CN 202310384813A CN 116566654 A CN116566654 A CN 116566654A
Authority
CN
China
Prior art keywords
server
blockchain
protection
module
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310384813.4A
Other languages
Chinese (zh)
Inventor
王文娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Jiushi Technology Co ltd
Original Assignee
Nanjing Jiushi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Jiushi Technology Co ltd filed Critical Nanjing Jiushi Technology Co ltd
Priority to CN202310384813.4A priority Critical patent/CN116566654A/en
Publication of CN116566654A publication Critical patent/CN116566654A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a protection system for a blockchain management server, which comprises gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, and the security agent is deployed in the blockchain server. According to the invention, through the blockchain server safety protection system, comprehensive protection is realized in aspects of virus protection, patch protection, malicious software protection, intrusion detection and protection, access control and integrity monitoring, and the problems of mutual attack, inconsistent safety states, inconsistent running environments and storm safety risks occupied by resources among servers in the blockchain server are solved, so that the safety threat of the system is reduced, the capability of resisting the latest safety threat is provided, the safety of the server is improved, and the high availability of the blockchain service application is ensured.

Description

Protection system for block chain management server
Technical Field
The invention relates to the technical field of protection systems, in particular to a protection system for a blockchain management server.
Background
With the rapid development of blockchain technology, the security of blockchain servers is also receiving more and more attention, and blockchain servers are called nodes in a blockchain system, and they provide storage space and computational support for the whole blockchain system.
However, the prior blockchain servers have no safety protection measures in the process of operation, the phenomenon of mutual attack easily occurs between the blockchain servers, meanwhile, the technical problems of inconsistent safety states, inconsistent running environments and storm safety risk of resource occupation exist between the blockchain servers, and potential safety hazards are brought to the use of the blockchain servers.
Disclosure of Invention
The present invention is directed to a protection system for a blockchain management server, so as to solve the above-mentioned problems in the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions: the protection system comprises gateway deployment, security agent, application deployment, security center and management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge safety of a virtual platform, providing DHCP, NAT, unified firewall, balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing agent-free virus killing, IDS/IPS, program protection, program control and management, integrity monitoring and log audit, the security center is used for uniformly updating a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and security update and report generation, and the security center is used for managing, deploying, reporting, recording and integrating third party security services and realizing role-based access control and responsibility separation;
the protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
Preferably, the virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: evaluating the blockchain servers through a patch technology, automatically providing comprehensive bug fixes for each blockchain server, and intercepting bug attacks before patch programs are not installed;
preferably, the malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
Preferably, the intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
Preferably, the integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
Preferably, the integrity detection module further comprises suspicious file analysis, specifically: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
Preferably, the management center further comprises establishing DNS communication with a blockchain couple.
Preferably, the Web application protection module further includes: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
The invention has the technical effects and advantages that: through the block chain server safety protection system, comprehensive protection is realized in the aspects of virus protection, patch protection, malicious software protection, intrusion detection and protection, access control and integrity monitoring, the problems of mutual attack, inconsistent safety states, inconsistent running environments and storm safety risks occupied by resources among servers in the block chain server are solved, the safety threat is reduced, the system has the capability of resisting the latest safety threat, the safety of the servers is improved, and therefore, the high availability of block chain service application is guaranteed.
Drawings
FIG. 1 is a system block diagram of a protection system for a blockchain management server in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a protection system for a blockchain management server, which comprises gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing non-agent virus searching and killing, IDS/IPS, program protection, program control management, integrity monitoring and log audit, the security center is responsible for unified updating of a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and security update and generate reports by establishing and maintaining a global cache of a scanned file, and can be used for managing, deploying, reporting, recording and integrating third-party security services, so that role-based access control and responsibility separation are realized;
the risks presented by the blockchain management server include: mutual attack among blockchain services, inconsistent security states, inconsistent running environments, resource occupation storms, tool vulnerability risks, data security risks and system replication risks.
The protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
Virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: evaluating the blockchain servers through a patch technology, automatically providing comprehensive bug fixes for each blockchain server, and intercepting bug attacks before patch programs are not installed;
malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
Intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
Integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
The integrity detection module further comprises suspicious file analysis, specifically: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
The management center also comprises a step of establishing DNS communication with the blockchain couple, and specifically comprises the following steps:
step S1: the client sends a city name query request to the server, and specific query content is provided, when the queried content of the client belongs to a host name within a domain name of the server, the DNS server directly replies to the client to inform an IP address, and when the queried content of the client belongs to other domain names, the client firstly queries self cache content of the server to see whether related information exists or not, if found, the client replies to the client to inform the IP address;
step S2: if the related information is not found in the cache content of the server, the server can inquire the root server, the root server can inform the server of the next city name, namely the position of the layer of authorized servers, namely the IP address, possibly comprising a plurality of next layers of authorized server addresses, the local server can inquire one of the authorized servers, the next layer of authorized server address list is stored in the cache, and then the client can directly answer the client when requesting similar content;
step S3: the remote authorization server responds to the inquiry of the local server, if the response of the remote authorization server is not the answer of the last layer, the remote authorization server continues to inquire downwards until the result required by the client is obtained, the local server responds to the inquiry result to the client, meanwhile, the inquiry result is stored in a cache of the server, and if the same inquiry of the client is received before the storage time of the local server is not out, the information stored in the cache of the server is used for responding.
The Web application protection module further comprises: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
What is not described in detail in this specification is prior art known to those skilled in the art. The specific embodiments described herein are offered by way of example only to illustrate the spirit of the invention. Those skilled in the art may make various modifications or additions to the described embodiments or substitutions thereof without departing from the spirit of the invention or exceeding the scope of the invention as defined in the accompanying claims.

Claims (8)

1. The protection system for the blockchain management server is characterized by comprising gateway deployment, a security agent, application deployment, a security center and a management center, wherein the gateway deployment is deployed on a protection wall and used for protecting the edge security of a virtual platform, providing DHCP, NAT, a unified firewall, being responsible for balancing, VPN and port isolation functions, the security agent is deployed in the blockchain server and used for providing an antivirus engine and an antivirus database for the whole blockchain server, the application deployment is deployed in the blockchain server and used for providing non-agent virus searching and killing, IDS/IPS, program protection, program control management, integrity monitoring and log audit, the security center is responsible for uniformly updating a virus library and providing trusted data access, the management center enables an administrator to conduct security policy management and apply the security policy to the server and conduct security update and report generation, and can be used for managing, deploying, reporting, recording and integrating third-party security services, so that role-based access control and responsibility separation are realized;
the protection system further comprises: virus protection module, patch protection module, malicious software protection module, web application protection module, intrusion protection module, access control module, intrusion detection module, integrity detection module, application isolation module and status firewall.
2. The protection system for a blockchain management server of claim 1, wherein the virus protection module: aiming at the problems of inconsistent safety state and storm occupied by resources in the service environment of the block chain server, the virus protection module is realized to provide agent-free virus protection, heuristic scanning is adopted, and viruses are timely checked and killed;
patch protection module: the blockchain servers are evaluated through a patch technology, comprehensive bug fixes are automatically provided for each blockchain server, and interception of bug attacks is provided before patch programs are not installed.
3. The protection system for a blockchain management server of claim 1, wherein the malware protection module: the integration VMware vShield Endpoint API can prevent the blockchain server from being infringed by viruses and Trojan malicious software, thereby protecting the complex attack interference security in the blockchain server environment;
web application protection module: cross-site scripting attacks and other Web application vulnerabilities are prevented, and automatic notification containing summary information of an attacker, attack time, and the like is provided.
4. The protection system for a blockchain management server of claim 1, wherein the intrusion protection module: by blocking SQL injection attack, denial of service attack, worm virus intrusion attack and other actions, high-security protection is provided for the blockchain server, all incoming and outgoing data packets are checked, protocol modification is not allowed, and attack content caused by security policy violation is provided with a multiplicative machine;
and an access control module: providing an access control function based on state detection, realizing access control based on a network port of a blockchain server, realizing logic isolation among the blockchain servers, identifying and intercepting various flooding attacks, blocking illegal traffic according to a traffic management protocol, and optimizing traffic distribution;
intrusion detection module: based on the protocol, a monitoring and analyzing tool based on a strategy is provided, the flow is monitored, analyzed and access controlled more accurately, meanwhile, network behavior analysis is carried out, and in order to rapidly and accurately detect the intrusion behavior in an unattended environment, the attack characteristics are matched with the characteristic library, new attack characteristics are recorded, and the characteristic library is continuously perfected.
5. The protection system for a blockchain management server of claim 1, wherein the integrity detection module: supporting key file monitoring functions such as files, catalogs, registries and the like based on a base line, wherein the key positions are maliciously tampered or infected with viruses, and the system automatically gives an alarm to an administrator and records problems;
and (3) an application isolation module: the method supports the separation of virtual applications, thereby avoiding mutual infection among the blockchain server applications, and protecting HTTP and FTP services by utilizing the intrusion prevention function based on signature;
status firewall: fine granularity filtering is carried out, the attacked range of the server is reduced aiming at the design strategy of the network and the position sensing function based on the IP protocol, the firewall strategy of the server is centrally managed, and the denial of service attack and detection scout scanning are prevented.
6. The protection system for a blockchain management server of claim 1, wherein the integrity detection module further includes suspicious file analysis, in particular: and selecting parameters, analyzing the selected customer service system parameters, and obtaining interested data by utilizing a disassembly technology of the instruction sequence in the analysis to obtain a final result.
7. The protection system for a blockchain management server of claim 1, wherein the management center further includes establishing DNS communication with a blockchain couple.
8. The guard system for a blockchain management server of claim 1, wherein the Web application guard module further comprises: setting IP access limit, screening user, checking if client has legal access right, setting the function in Web server filter module, by matching IP address in HTTP request with IP address in blacklist, web server can read access control file, and can obtain access control information from the process, at the same time, requiring client to provide user name and password, then browser can transfer user name and password to server, after making verification, server can meet user request content, such as sending back request page or executing JSP program.
CN202310384813.4A 2023-04-12 2023-04-12 Protection system for block chain management server Pending CN116566654A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310384813.4A CN116566654A (en) 2023-04-12 2023-04-12 Protection system for block chain management server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310384813.4A CN116566654A (en) 2023-04-12 2023-04-12 Protection system for block chain management server

Publications (1)

Publication Number Publication Date
CN116566654A true CN116566654A (en) 2023-08-08

Family

ID=87492302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310384813.4A Pending CN116566654A (en) 2023-04-12 2023-04-12 Protection system for block chain management server

Country Status (1)

Country Link
CN (1) CN116566654A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752139A (en) * 2019-03-29 2020-10-09 霍尼韦尔国际公司 Redundant controllers or input-output gateways without dedicated hardware
US20200366717A1 (en) * 2019-05-17 2020-11-19 Juniper Networks, Inc. Classification of unknown network traffic
CN112016094A (en) * 2020-08-14 2020-12-01 深圳市迈科龙电子有限公司 Block chain service safety protection strategy management and control system and method
CN112039858A (en) * 2020-08-14 2020-12-04 深圳市迈科龙电子有限公司 Block chain service security reinforcement system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752139A (en) * 2019-03-29 2020-10-09 霍尼韦尔国际公司 Redundant controllers or input-output gateways without dedicated hardware
US20200366717A1 (en) * 2019-05-17 2020-11-19 Juniper Networks, Inc. Classification of unknown network traffic
CN112016094A (en) * 2020-08-14 2020-12-01 深圳市迈科龙电子有限公司 Block chain service safety protection strategy management and control system and method
CN112039858A (en) * 2020-08-14 2020-12-04 深圳市迈科龙电子有限公司 Block chain service security reinforcement system and method

Similar Documents

Publication Publication Date Title
US11775622B2 (en) Account monitoring
US20230362189A1 (en) System and method for strategic anti-malware monitoring
US11888897B2 (en) Implementing decoys in a network environment
US10230761B1 (en) Method and system for detecting network compromise
US9942270B2 (en) Database deception in directory services
US9762543B2 (en) Using DNS communications to filter domain names
EP3289476B1 (en) Computer network security system
US9460285B2 (en) Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware
US7836501B2 (en) Client compliancy with self-policing clients
JP5845258B2 (en) System and method for local protection against malicious software
US20060259967A1 (en) Proactively protecting computers in a networking environment from malware
US8548998B2 (en) Methods and systems for securing and protecting repositories and directories
Ko et al. System health and intrusion monitoring using a hierarchy of constraints
CN112583845A (en) Access detection method and device, electronic equipment and computer storage medium
KR101910496B1 (en) Network based proxy setting detection system through wide area network internet protocol(IP) validation and method of blocking harmful site access using the same
KR101186873B1 (en) Wireless intrusion protecting system based on signature
Kfouri et al. Design of a Distributed HIDS for IoT Backbone Components.
CN116566654A (en) Protection system for block chain management server
Cardoso et al. Security vulnerabilities and exposures in internet systems and services
TW202217617A (en) Cyber security protection system and related proactive suspicious domain alert system
CN114615077A (en) Honeypot-based network access control method, device and equipment
Razmjou Toward more secure SDN: A Survey
Narayanaguru Analysis of Cloud Network Intrusion Issue and a Feasible Detection Methodology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination