WO2009033385A1 - Procédé de réalisation de gestion de réseau de confiance - Google Patents
Procédé de réalisation de gestion de réseau de confiance Download PDFInfo
- Publication number
- WO2009033385A1 WO2009033385A1 PCT/CN2008/071698 CN2008071698W WO2009033385A1 WO 2009033385 A1 WO2009033385 A1 WO 2009033385A1 CN 2008071698 W CN2008071698 W CN 2008071698W WO 2009033385 A1 WO2009033385 A1 WO 2009033385A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- trusted
- management
- host
- network
- agent
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
Definitions
- the invention belongs to the technical field of network security, and particularly relates to a method for implementing trusted network management. Background technique
- Network management is the planning, design, and control of network resources and network equipment, so that the network maintains good reliability and has the highest efficiency.
- the traditional network management system generally adopts a centralized management model.
- the management functions are centralized on the administrators of the management workstations.
- the administrators use SNMP (Simple Network Management Protocol) to communicate with the agents on the managed devices. Management information is processed and processed, and then management operation instructions are issued to implement management of the managed device.
- SNMP Simple Network Management Protocol
- Management information is processed and processed, and then management operation instructions are issued to implement management of the managed device.
- the IETF The Internet Engineering Task Force
- the drawbacks of this centralized management model are:
- the number of polling is too large, and the distributed agent has a large bandwidth overhead.
- the management information obtained by the manager from each agent is the original data.
- the transmission of a large amount of original data wastes bandwidth and consumes valuable resources of the manager CPU. Reduced efficiency.
- a network management system based on CMIP Common Management Information Protocol
- CMIP Common Management Information Protocol
- SNMP Network Management Information Protocol
- CMIP Common Management Information Protocol
- SNMP Network Management Information Protocol
- CMIP Network Management Information Protocol
- SNMP Network Management Information Protocol
- Distributed network management divides a large-scale network management into several peer-to-peer management sub-domains. One domain is responsible for one manager, and managers communicate with each other. When information about another domain is needed, the administrator and Its peer system communicates. Because distributed network management distributes network management tasks and monitoring throughout the network without relying on a separate control center, network management traffic can be reduced, providing greater management capabilities and scalability.
- the development trend of distributed network management is mainly reflected in two aspects: one is an open, standard, scalable large-scale distributed network management system designed by distributed computing tools under the existing network management framework. There are mainly CORBA-based distributed network management systems and Web-based distributed network management systems, which are characterized by simple implementation. Second, a new distributed system network management, such as: Mobile agent-based network management system, etc. Wait.
- the agent resides on the host with the possibility of an attack agent, and the existing detection-based method cannot guarantee the security of the agent.
- the agent also has the possibility of attacking the host. For example, the agent illegally accesses some private information of the host, etc. Currently, this can only use the passive defense method of intrusion detection.
- the network management user completely trusts the manager system and has security risks. If the manager system is controlled by viruses, trojans, etc., the manager system will not work according to the wishes of the network management users, and lose control and management of the network.
- the managed host completely trusts the administrator system, and there are also security risks. If the managed host does not detect whether the administrator system is eroded by viruses, Trojans, etc., when the agent hosted on the managed host receives a malicious management command, it will maliciously act on the managed host.
- the present invention provides a method for implementing trusted network management, which can solve the technical problem that the agent, the agent resident host, and the manager system have mutual attacks and cannot guarantee network management security in the background art.
- a method for implementing trusted network management comprising the following implementation steps:
- the managed host uses the trusted platform module TPM to perform integrity measurement, storage and reporting on the trusted management agent to verify the credibility of the trusted management agent on the managed host;
- the network administrator of the management host utilizes the trusted platform module
- the TPM performs integrity measurement, storage, and reporting on the trusted management system to verify the credibility of the trusted management system on the management host;
- the managed host and the management host respectively connect to the trusted network by using a trusted network connection method; when the managed host connects to the trusted network, the trusted management agent on the managed host automatically issues information for querying the corresponding trusted management system; After receiving the inquiry information of the trusted management agent, the trusted management system initiates an authentication process with the trusted management agent; the trusted management system and the trusted management agent perform two-way authentication and key agreement to obtain a trusted management agent.
- the session key between the trusted management system and the trusted management system on the management host after receiving the inquiry information of the trusted management agent, notifying the management host to perform two-way user authentication and key agreement, and the management host and the managed host perform the After two-way user authentication and key agreement, a session key between the managed host and the management host is obtained;
- the network administrator of the management host utilizes the trusted platform module TPM on the managed host to perform integrity measurement, storage, and reporting on the trusted management agent to verify the credibility of the trusted management agent on the managed host; Using the trusted platform module TPM on the management host to perform integrity measurement, storage and reporting on the trusted management system to verify the credibility of the trusted management system on the management host; when the managed host is verified to run on the management host The trusted management system and the trusted management agent running on the managed host are all trusted, then the managed host licenses the managed host to perform network management communication with the management host; when the network administrator of the management host is verified and confirmed The trusted management system running on the management host and the trusted management agent running on the managed host are all trusted, and the network administrator of the management host begins to perform network management.
- the trusted management agent and the trusted management system are software modules based on the trusted computing platform, the trusted management agent and the trusted third party of the trusted management system, and the trusted management agent
- the standard integrity metrics of the trusted management system are signed by a trusted third party and stored in a queryable network database.
- the trusted management agent is a software module that automatically runs as the system of the managed host is started.
- the trusted network management refers to: the managed host and the management host confirm the trusted tube Both the agent and the trusted management system are trusted to perform network management under this trusted condition.
- the network management may adopt a network management mode of centralized network management, distributed network management or distributed control centralized management, and the like.
- the step of implementing the distributed management centralized management network management mode comprises: the network administrator transmitting the secure network management policy to the managed host by using a session key between the trusted management system and the trusted management agent Trusted management agent;
- the trusted management agent performs monitoring and control on the managed host according to the secure network management policy, and directly controls and manages the monitoring data determinable by the secure network management policy; and the monitoring data that cannot be determined by the secure network management policy, Sending the monitoring data to a trusted management system;
- the trusted management system After receiving the monitoring data, the trusted management system analyzes and sends the analysis result to the network administrator, so that the network administrator controls and manages the managed host according to the analysis result, and implements trusted network management.
- the managed host can actively defend against the attack behavior of the trusted management agent on the managed host by verifying the credibility of the trusted management agent running on the host. At the same time, the managed host can ensure that the trusted management system on the management host is performing its management functions by verifying the trustworthiness of the trusted management system on the management host.
- the management host can prevent malicious managed hosts from maliciously attacking trusted management agents residing on the host.
- the management host can ensure that the trusted management system running on its own host is controllable by verifying the credibility of the trusted management system on its own host, thereby ensuring that the trusted management system correctly performs the management of the network administrator. command.
- both the management host and the managed host are based on the trusted computing platform, and the network management is performed under the condition that both the trusted management system and the trusted management agent are verified to be trusted, thereby implementing trusted network management.
- the trusted management agent resides on each managed host to control the managed host; and the trusted management system resides on a management host to control and manage all management hosts, thereby realizing distributed Managed, centralized management of trusted network management.
- FIG. 1 is a schematic diagram of the architecture of the present invention. detailed description
- the trusted management agent of the present invention resides in the managed host, and the trusted management system resides in the management host.
- the trusted management agent and the trusted management system are software modules based on the trusted computing platform, the trusted management agent and the trusted third party of the trusted management system, and the standard integrity metrics of the two are available.
- the third party signature is stored in a queryable network database.
- the Managed Platform Module (Trusted Platform Module) of the managed host and the management host can measure, store and report the integrity of the trusted management agent and the trusted management system. Therefore, the managed host and the management host can ensure the trust.
- Both the management agent and the trusted management system are trusted. Trusted management agents and trusted management systems perform network management functions to enable trusted network management.
- a specific implementation process of an embodiment of the present invention includes:
- the trusted management agent 101 residing in the managed host 1 is installed and configured to install and configure the trusted management system 201 residing in the management host 2.
- the installation and configuration of the trusted management system 201 is done by the network administrator.
- the installation and configuration of the trusted management agent 101 can be done by a network administrator or by a network user.
- the configuration file must be distributed by the network administrator, and the content of the configuration file is unknown to the network user.
- the configuration of the trusted management agent 101 and the trusted management system 201 can also be completed by the manufacturer in a pre-installed form.
- the trusted management agent 101 and the trusted management system 201 are both software modules based on the trusted computing platform, authenticated by the trusted management agent 101 and the trusted third party of the trusted management system 201, and the standard integrity of the two.
- the metrics are signed by a trusted third party and stored in a queryable network database.
- the managed host 1 utilizes the trusted platform module to perform integrity measurement, storage and reporting on the trusted management agent 101 to verify the credibility of the trusted management agent 101 on the managed host 1, and actively defend against the trusted management agent. 101 attack behavior on managed host 1.
- the network administrator of the management host 2 utilizes the trusted platform module to perform integrity measurement, storage, and reporting on the trusted management system 201 to verify the credibility of the trusted management system 201 on the management host 2, ensuring operation in management.
- the trusted management system 201 on the host 2 is controllable, thereby ensuring that the trusted management system 201 correctly executes the management commands of the network administrator.
- the managed host and the management host respectively connect to the trusted network using the trusted network connection method.
- the trusted network connection method corresponds to the trusted network connection architecture. After the trusted network connection architecture is determined, the corresponding trusted network connection method is determined.
- the trusted management agent and the trusted management system perform two-way authentication and key agreement.
- the trusted management agent 101 is a software module that automatically runs as the system of the managed host 1 is started.
- the trusted management agent 101 on the managed host 1 automatically issues information for polling the corresponding trusted management system 201; after receiving the inquiry information of the trusted management agent 101, the trusted management system 201 receives the inquiry information from the trusted management agent 101.
- the trusted management system 201 and the trusted management agent 101 utilize the configuration information pre-installed by the manufacturer or the configuration information set by the network administrator during installation or the configuration distributed by the network administrator
- the file performs two-way authentication and key agreement, and obtains a session key between the trusted management agent 101 and the trusted management system 201.
- a session key between the trusted management agent 101 and the trusted management system 201 is used to secure communication between the trusted management system 201 and the trusted management agent 101.
- the trusted management system 201 After the trusted management system 201 receives the inquiry information of the trusted management agent 101, the trusted management system 201 on the management host 2 notifies the management host 2 to perform two-way user authentication and key agreement, and the management host 2 performs two-way with the managed host 1. After the user authentication and key agreement, the session key between the managed host 1 and the management host 2 is obtained. The session key between the managed host 1 and the management host 2 is used to protect the data transmission of the remote integrity assessment of the trusted management agent 101 and the trusted management system 201.
- the integrity management, storage, and reporting of the trusted management agent 101 based on the trusted platform module TPM on the managed host 1 can verify the credibility of the trusted management agent 101 on the managed host 1.
- the management host 2 firstly obtains the platform configuration register PCR value and the metric log corresponding to the trusted management agent 101 on the managed host 1, and the PCR value of the platform configuration register corresponding to the trusted management agent 101 is determined by the trusted platform module of the managed host 1.
- the TPM performs AIK signature; then verifies the validity of the platform configuration register PCR value and the metric log corresponding to the trusted management agent 101, and verifies the managed host according to the standard integrity metric corresponding to the trusted management agent 101 in the queryable network database.
- the TPM Based on the trusted platform module on the management host 2, the TPM performs integrity metrics, storage, and reporting on the trusted management system 201 to verify the credibility of the trusted management system 201 on the management host 2.
- the managed host 1 firstly obtains the platform configuration register PCR value and the metric log corresponding to the trusted management system 201 on the management host 2, and the PCR value of the platform configuration register corresponding to the trusted management system 201 is determined by the trusted platform module TPM of the management host 2. Performing an AIK signature; then verifying the validity of the platform configuration register PCR value and the metric log corresponding to the trusted management system 201, and verifying the management host 2 based on the standard integrity metric value of the trusted management system 201 in the queryable network database.
- the credibility of the trusted management system 201 To ensure that the trusted management system 201 running on the management host 2 is controllable, the trusted management system 201 is a management command that normally executes the network administrator.
- the managed host 1 When the managed host 1 is verified and confirmed: the trusted management system 201 running on the management host 2 and the trusted management agent 101 running on the managed host 1 are all trusted, the managed host 1 permits the managed host. 1 Perform network management communication with the management host 2.
- the network administrator of the management host 2 verifies that the trusted management system 201 running on the management host 2 and the trusted management agent 101 running on the managed host 1 are all trusted, the network of the host 2 is managed. The administrator begins to perform network management. Since both the trusted management agent 101 and the trusted management system 201 are trusted in this case, the network management is trusted network management.
- steps (ii) and (iii) of the present invention may be carried out sequentially or in parallel, and the order may be interchanged in sequence.
- steps (iv) and (V) described above may also be performed sequentially or in parallel, and the order may be interchanged in sequence.
- the network management mode of the present invention can employ centralized network management, distributed network management, network management of distributed control centralized management, and the like.
- the network administrator uses the session key between the trusted management system 201 and the trusted management agent 101 to implement a secure network management policy. Sended to the trusted management agent 101 on the managed host 1, the trusted management agent 101 performs monitoring and control functions on the managed host 1 according to the secure network management policy, and the monitoring data that can be determined by the secure network management policy is directly Control and management. For monitoring data that cannot be determined by the security network management policy, the monitoring data needs to be sent to the trusted tube.
- the trusted management system 201 After receiving the monitoring data, the trusted management system 201 first analyzes the data; then sends the analysis result to the network administrator, and the network administrator controls and manages the managed host 1 according to the analysis result, thereby finally achieving Letter network management. Suspicious data refers to data that is not certain for monitoring results.
- the trusted management system 201 resides on a management host 2 to control and manage all the management hosts 2, thereby realizing distributed network management of distributed control and centralized management.
- Each host has a trusted management agent, which performs monitoring and control according to a secure network management policy sent by the network administrator through the trusted management system, and is required for some undecidable data.
- the trusted management system controls.
- the centralized management of the present invention is mainly embodied in: Only one host installs a trusted management system, which formulates a secure network management policy, and then distributes it to each trusted management agent execution policy, which is required for data that cannot be controlled and managed by the trusted management agent.
- the trusted management system controls to achieve centralized management.
- the managed host can actively defend against the attack behavior of the trusted management agent on the managed host by verifying the credibility of the trusted management agent running on the host.
- the managed host can ensure that the trusted management system on the management host is performing its management function by verifying the trustworthiness of the trusted management system on the management host, thereby achieving protection against the trusted management system.
- the purpose of the host is not limited to the above embodiment of the present invention.
- the management host can prevent malicious managed hosts from maliciously attacking trusted management agents residing on the host.
- the management host can ensure that the trusted management system running on its own host is controllable by verifying the credibility of the trusted management system on its own host, thereby ensuring that the trusted management system correctly performs the management of the network administrator. command.
- both the management host and the managed host are based on the trusted computing platform, and the network management is performed under the condition that both the trusted management system and the trusted management agent are verified to be trusted, thereby implementing trusted network management.
- the trusted management agent resides on each managed host to control the managed host; and the trusted management system resides on a management host to control and manage all management hosts, thereby realizing distributed Managed, centralized management of trusted network management.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
一种实现可信网络管理的方法
本申请要求于 2007 年 9 月 14 日提交中国专利局、 申请号为 200710018673.X、发明名称为 "一种实现可信网络管理的方法,,的中国专利申请 的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明属于网络安全技术领域, 具体涉及一种实现可信网络管理的方法。 背景技术
网络管理是对网络资源和网络设备的规划、设计、 控制, 以使网络保持良 好的可靠性、 具有最高的效率。
网络管理的概念是随着 Internet的发展而逐渐引入的。 早期, Internet入网 节点比较少, 结构也非常简单, 大多是平坦型结构, 因此, 有关网络的故障检 测和性能监控等管理简单而容易。 随着网络技术的不断发展, 网络规模不断扩 大,功能复杂性不断增加,异构类型的网络逐渐融合,使网络管理越来越困难。
传统的网络管理系统普遍釆用集中式管理模型,管理功能集中在管理工作 站的管理者身上, 管理者利用 SNMP ( Simple Network Management Protocol , 简单网络管理协议)和被管设备上的代理进行通信,获取管理信息并进行处理, 然后发出管理操作指令, 实施对被管设备的管理。 例如, IETF ( The Internet Engineering Task Force, 互联网工程任务组 ) 于 1988年提出的基于 SNMP的 管理者 /代理模型。 这种集中式管理模型存在的缺陷是:
1.主要适用于数据网络的管理, 只适合于结构简单的小型网络或者不需要 频繁访问管理信息的应用。
2.随着网络规模的扩大, 用户不断增加, 管理节点日趋成为网络管理的瓶 颈。
3.轮询数目太多, 分布较广的代理使带宽开销大, 管理者从各代理获取的 管理信息是原始数据, 传输大量的原始数据既浪费带宽, 又消耗管理者 CPU 的宝贵资源, 网管效率降低。
一种基于 CMIP ( Common Management Information Protocol , 公共管理信 息协议)的网络管理系统, 较 SNMP协议复杂, 釆用的也是集中式管理模型, 主要适用于电信网络管理。
目前, 网络管理逐渐朝着分布化和智能化的分布式网络管理方向快速发 展。分布式网络管理,是将一个大规模的网络管理划分为若干个对等管理子域, 一个域由一个管理者负责, 管理者之间相互通信, 当需要另一个域的信息时, 管理者与它的对等系统进行通信。由于分布式网络管理将网络管理任务和监控 分布到整个网络中,而不依赖于单独的控制中心,因此可减少网络管理的流量, 提供更大的管理能力和扩展性等。
分布式网络管理的发展趋势主要体现在两个方面:其一是在现有的网络管 理框架下, 釆用分布计算工具设计出的一个开放的、 标准的、 可扩展的大型分 布式网络管理系统, 主要有基于 CORBA的分布式网络管理系统和基于 Web 的分布式网络管理系统, 特点是实现简便; 其二是一种全新的分布式体制的网 络管理, 例如: 基于移动代理的网络管理系统等等。
然而,现有集中式网络管理系统和分布式网络管理系统都存在以下安全问 题:
1.代理驻留主机存在攻击代理的可能性, 而现有的基于检测的方法还无法 保证代理的安全。
2.代理也存在攻击驻留主机的可能性, 如: 代理非法访问驻留主机的一些 私有信息等等, 目前对此只能釆用入侵检测的被动防御方式。
3.网络管理用户完全信赖管理者系统, 存在安全隐患。 若管理者系统被病 毒、 木马等控制, 管理者系统就会不按网络管理用户的意愿工作, 而失去对网 络的控制与管理。
4.被管理主机完全信赖管理者系统, 也存在安全隐患。 如果被管理主机不 检测管理者系统是否被病毒、木马等侵蚀, 当被管理主机上驻留的代理接收到 恶意的管理命令时, 就会对被管理主机进行恶意行为。
发明内容
本发明提供一种实现可信网络管理的方法, 能够解决背景技术中代理、代 理驻留主机及管理者系统存在相互攻击, 无法保证网络管理安全的技术问题。
本发明的技术实现方案如下:
一种实现可信网络管理的方法, 该方法包括以下实现步骤:
安装并配置驻留于被管理主机中的可信管理代理,安装并配置驻留于管理
主机中的可信管理系统;
被管理主机利用可信平台模块 TPM对可信管理代理进行完整性度量、 存 储和报告, 以验证可信管理代理在被管理主机上的可信性; 管理主机的网络管 理员利用可信平台模块 TPM对可信管理系统进行完整性度量、 存储和报告, 以验证可信管理系统在管理主机上的可信性;
被管理主机和管理主机分别釆用可信网络连接方法连接至可信网络; 被管理主机连接至可信网络时,被管理主机上的可信管理代理自动发出探 询相应可信管理系统的信息; 可信管理系统收到可信管理代理的探询信息后, 启动与该可信管理代理之间的鉴别过程;可信管理系统与可信管理代理进行双 向鉴别及密钥协商, 得到可信管理代理与可信管理系统之间的会话密钥; 管理主机上的可信管理系统收到可信管理代理的探询信息后,通知管理主 机进行双向用户鉴别及密钥协商 ,管理主机与被管理主机进行双向用户鉴别及 密钥协商后, 得到被管理主机与管理主机之间的会话密钥;
管理主机的网络管理员利用被管理主机上的可信平台模块 TPM对可信管 理代理进行完整性度量、存储和报告, 以验证可信管理代理在被管理主机上的 可信性; 被管理主机利用管理主机上的可信平台模块 TPM对可信管理系统进 行完整性度量、 存储和报告, 以验证可信管理系统在管理主机上的可信性; 当被管理主机经验证确认运行在管理主机上的可信管理系统以及运行在 被管理主机上的可信管理代理均是可信的,则被管理主机许可被管理主机与管 理主机进行网络管理通信;当管理主机的网络管理员经验证确认运行在管理主 机上的可信管理系统以及运行在被管理主机上的可信管理代理均是可信的,则 管理主机的网络管理员开始执行网络管理。
优选的, 所述的可信管理代理和可信管理系统都是基于可信计算平台、 经 过可信管理代理和可信管理系统的可信第三方鉴定后签名的软件模块,且可信 管理代理和可信管理系统的标准完整性度量值经可信第三方签名后存储于可 查询的网络数据库中。
优选的,所述的可信管理代理是随着被管理主机的系统启动而自动运行的 软件模块。
优选的, 所述的可信网络管理是指: 被管理主机和管理主机在确认可信管
理代理和可信管理系统均是可信的, 在该可信条件下所执行的网络管理。 优选的, 所述的网络管理可釆用集中式网络管理、分布式网络管理或分布 式控制集中式管理的网络管理模式等等。
优选的, 所述分布式控制集中式管理的网络管理模式的实施步骤包括: 网络管理员利用可信管理系统与可信管理代理之间的会话密钥将安全网 络管理策略发送给被管理主机上的可信管理代理;
可信管理代理依据该安全网络管理策略在被管理主机上执行监测和控制, 对于安全网络管理策略可判定的监测数据, 则直接进行控制与管理; 而对于安 全网络管理策略不可判定的监测数据, 则将所述监测数据发送至可信管理系 统;
可信管理系统接收到所述监测数据后, 进行分析, 并将分析结果发送给网 络管理员, 以使网络管理员依据该分析结果对被管理主机进行控制与管理, 实 现可信网络管理。
本发明上述实施例中,被管理主机通过验证运行在自身主机上的可信管理 代理的可信性, 可以主动防御可信管理代理对被管理主机的攻击行为。 同时, 被管理主机通过验证管理主机上的可信管理系统的可信性 ,可确保管理主机上 的可信管理系统是在正常执行它的管理功能。
另外, 管理主机通过验证被管理主机上的可信管理代理的可信性, 可防止 恶意的被管理主机对驻留在该主机上的可信管理代理进行恶意攻击。 同时, 管 理主机通过验证自身主机上的可信管理系统的可信性,可确保运行在自身主机 上的可信管理系统是可控的,进而可保证可信管理系统正确执行网络管理员的 管理命令。
此外, 管理主机和被管理主机都基于可信计算平台,在验证可信管理系统 和可信管理代理的均是可信的条件下进行网络管理, 从而实现可信网络管理。
再者, 可信管理代理驻留在各个被管理主机上, 对被管理主机进行控制; 而可信管理系统驻留在一个管理主机上对所有的管理主机进行控制与管理,从 而可实现分布式控制、 集中式管理的可信网络管理。
附图说明
图 1为本发明的架构示意图。
具体实施方式
本发明的可信管理代理驻留在被管理主机中,可信管理系统驻留在管理主 机中。可信管理代理和可信管理系统都是基于可信计算平台、经过可信管理代 理和可信管理系统的可信第三方鉴定后签名的软件模块,且二者的标准完整性 度量值经可信第三方签名后存储于可查询的网络数据库中。被管理主机和管理 主机的 TPM ( Trusted Platform Module, 可信平台模块)可以对可信管理代理 和可信管理系统进行完整性度量、 存储和报告, 因此, 被管理主机和管理主机 可以确保可信管理代理和可信管理系统都是可信的。可信管理代理和可信管理 系统执行网络管理的职能, 从而可实现可信网络管理。
参见图 1 , 本发明实施例的具体实现过程包括:
( i ) 安装并配置可信管理代理和可信管理系统。
安装并配置驻留于被管理主机 1中的可信管理代理 101 , 安装并配置驻留 于管理主机 2中的可信管理系统 201。 可信管理系统 201的安装与配置由网络 管理员来完成。可信管理代理 101的安装与配置可以由网络管理员来完成,也 可以由网络用户来完成。 当由网络用户完成可信管理代理 101 的安装与配置 时, 配置文件一定是网络管理员分发的、且配置文件的内容对于网络用户而言 是不可知的。此外, 可信管理代理 101和可信管理系统 201的配置还可以由厂 商以预安装的形式完成。可信管理代理 101和可信管理系统 201都是基于可信 计算平台、经过可信管理代理 101和可信管理系统 201的可信第三方鉴定后签 名的软件模块,且二者的标准完整性度量值经可信第三方签名后存储于可查询 的网络数据库中。
( ϋ ) 险证可信管理代理和可信管理系统在本地的可信性。
被管理主机 1利用可信平台模块 ΤΡΜ对可信管理代理 101进行完整性度 量、 存储和报告, 以验证可信管理代理 101在被管理主机 1上的可信性, 可主 动防御可信管理代理 101对被管理主机 1的攻击行为。
管理主机 2的网络管理员利用可信平台模块 ΤΡΜ对可信管理系统 201进 行完整性度量、存储和报告, 以验证可信管理系统 201在管理主机 2上的可信 性, 可确保运行在管理主机 2上的可信管理系统 201是可控的, 即可确保可信 管理系统 201正确执行网络管理员的管理命令。
(iii) 被管理主机和管理主机分别釆用可信网络连接方法连接至可信网 络。
可信网络连接方法与可信网络连接架构相应。 可信网络连接架构确定之 后, 与之相应的可信网络连接方法即确定。
(iv) 可信管理代理与可信管理系统进行双向鉴别及密钥协商。
可信管理代理 101是随着被管理主机 1 的系统启动而自动运行的软件模 块。 被管理主机 1 连接至可信网络时, 被管理主机 1 上的可信管理代理 101 自动发出探询相应可信管理系统 201的信息;可信管理系统 201收到可信管理 代理 101的探询信息后, 启动与该可信管理代理 101之间的鉴别过程; 可信管 理系统 201与可信管理代理 101利用厂商预安装的配置信息或网络管理员安装 时设置的配置信息或网络管理员分发的配置文件进行双向鉴别及密钥协商,得 到可信管理代理 101与可信管理系统 201之间的会话密钥。 可信管理代理 101 与可信管理系统 201之间的会话密钥,用于保护可信管理系统 201与可信管理 代理 101之间的安全通信。
( V )被管理主机与管理主机进行双向用户鉴别及密钥协商。
可信管理系统 201收到可信管理代理 101的探询信息后,管理主机 2上的 可信管理系统 201通知管理主机 2进行双向用户鉴别及密钥协商, 管理主机 2 与被管理主机 1进行双向用户鉴别及密钥协商后,得到被管理主机 1与管理主 机 2之间的会话密钥。被管理主机 1与管理主机 2之间的会话密钥, 用于保护 可信管理代理 101和可信管理系统 201的远程完整性评估的数据传输。
(vi) 险证可信管理代理和可信管理系统的远程可信性。
基于被管理主机 1上的可信平台模块 TPM对可信管理代理 101进行完整 性度量、存储和报告,从而可验证可信管理代理 101在被管理主机 1上的可信 性。管理主机 2先远程获取被管理主机 1上的可信管理代理 101对应的平台配 置寄存器 PCR值及度量日志, 可信管理代理 101对应的平台配置寄存器 PCR 值由被管理主机 1的可信平台模块 TPM进行 AIK签名; 然后验证可信管理代 理 101对应的平台配置寄存器 PCR值和度量日志的有效性, 并根据可查询网 络数据库中可信管理代理 101 对应的标准完整性度量值来验证被管理主机 1 上的可信管理代理 101的可信性。以防止恶意的被管理主机 1对驻留在该主机
上的可信管理代理 101进行恶意攻击。
基于管理主机 2上的可信平台模块 TPM对可信管理系统 201进行完整性 度量、 存储和报告, 从而可验证可信管理系统 201在管理主机 2上的可信性。 被管理主机 1先远程获取管理主机 2上的可信管理系统 201对应的平台配置寄 存器 PCR值及度量日志, 可信管理系统 201对应的平台配置寄存器 PCR值由 管理主机 2的可信平台模块 TPM进行 AIK签名; 然后验证可信管理系统 201 对应的平台配置寄存器 PCR值和度量日志的有效性, 并根据可查询网络数据 库中可信管理系统 201的标准完整性度量值来验证管理主机 2上的可信管理系 统 201的可信性。 以确保运行在管理主机 2上的可信管理系统 201是可控的, 可信管理系统 201是在正常执行网络管理员的管理命令。
(vii)执行可信网络管理。
当被管理主机 1 经验证确认: 运行在管理主机 2上的可信管理系统 201 以及运行在被管理主机 1上的可信管理代理 101均是可信的, 则被管理主机 1 许可被管理主机 1与管理主机 2进行网络管理通信。
当管理主机 2的网络管理员经验证确认:运行在管理主机 2上的可信管理 系统 201以及运行在被管理主机 1上的可信管理代理 101均是可信的,则管理 主机 2的网络管理员开始执行网络管理。因为此情况下可信管理代理 101和可 信管理系统 201都为可信的, 所以网络管理即为可信网络管理。
需要说明的是, 本发明的步骤(ii )和 (iii)可以依次或并列进行, 依次进行 时顺序可互换。 以上所述的步骤(iv)和(V ) 亦可以依次或并列进行, 依次进行 时顺序也可互换。
本发明的网络管理模式可釆用集中式网络管理、分布式网络管理和分布式 控制集中式管理的网络管理等等。
当网络规模比较大时推荐使用分布式控制集中式管理的网络管理,其具体 实施步骤是:网络管理员利用可信管理系统 201与可信管理代理 101之间的会 话密钥将安全网络管理策略发送给被管理主机 1上的可信管理代理 101 , 可信 管理代理 101依据该安全网络管理策略在被管理主机 1 上执行监测和控制功 能, 对于安全网络管理策略可判定的监测数据, 则直接进行控制与管理。 而对 于安全网络管理策略不可判定的监测数据,则需将这些监测数据发送至可信管
理系统 201 , 可信管理系统 201接收到这些监测数据后, 先进行分析; 然后将 分析结果发送给网络管理员,网络管理员依据分析结果对被管理主机 1进行控 制与管理,从而最终实现可信网络管理。可疑数据是指一些监测结果不能肯定 的数据。可信管理系统 201驻留在一个管理主机 2上对所有的管理主机 2进行 控制与管理, 从而可实现分布式控制、 集中式管理的可信网络管理。
本发明分布式控制主要体现在: 每台主机都有一个可信管理代理, 它根据 网络管理员通过可信管理系统发送过来的安全网络管理策略执行监测与控制, 对于一些不可判定的数据才需可信管理系统进行控制。
本发明集中式管理主要体现在: 只有一台主机安装可信管理系统, 它制定 安全网络管理策略, 然后分发给各个可信管理代理执行策略,对于可信管理代 理不能控制与管理的数据才需可信管理系统进行控制, 从而实现集中管理。
本发明上述实施例中,被管理主机通过验证运行在自身主机上的可信管理 代理的可信性, 可以主动防御可信管理代理对被管理主机的攻击行为。 同时, 被管理主机通过验证管理主机上的可信管理系统的可信性 ,可确保管理主机上 的可信管理系统是在正常执行它的管理功能,从而可以达到防御可信管理系统 攻击被管理主机的目的。
另外, 管理主机通过验证被管理主机上的可信管理代理的可信性, 可防止 恶意的被管理主机对驻留在该主机上的可信管理代理进行恶意攻击。 同时, 管 理主机通过验证自身主机上的可信管理系统的可信性,可确保运行在自身主机 上的可信管理系统是可控的,进而可保证可信管理系统正确执行网络管理员的 管理命令。
此外, 管理主机和被管理主机都基于可信计算平台,在验证可信管理系统 和可信管理代理的均是可信的条件下进行网络管理, 从而实现可信网络管理。
再者, 可信管理代理驻留在各个被管理主机上, 对被管理主机进行控制; 而可信管理系统驻留在一个管理主机上对所有的管理主机进行控制与管理,从 而可实现分布式控制、 集中式管理的可信网络管理。
以上对本发明所提供的实现可信网络管理的方法进行了详细介绍 ,本文中 是用于帮助理解本发明的方案; 同时, 对于本领域的一般技术人员, 依据本发
明的思想, 在具体实施方式及应用范围上均会有改变之处, 综上所述, 本说明 书内容不应理解为对本发明的限制。
Claims
1.一种实现可信网络管理的方法, 其特征在于, 包括:
安装并配置驻留于被管理主机中的可信管理代理,安装并配置驻留于管理 主机中的可信管理系统;
被管理主机利用可信平台模块 TPM对可信管理代理进行完整性度量、 存 储和报告, 以验证可信管理代理在被管理主机上的可信性; 管理主机的网络管 理员利用可信平台模块 TPM对可信管理系统进行完整性度量、 存储和报告, 以验证可信管理系统在管理主机上的可信性;
被管理主机和管理主机分别釆用可信网络连接方法连接至可信网络; 被管理主机连接至可信网络时,被管理主机上的可信管理代理自动发出探 询相应可信管理系统的信息; 可信管理系统收到可信管理代理的探询信息后, 启动与该可信管理代理之间的鉴别过程;可信管理系统与可信管理代理进行双 向鉴别及密钥协商, 得到可信管理代理与可信管理系统之间的会话密钥; 管理主机上的可信管理系统收到可信管理代理的探询信息后,通知管理主 机进行双向用户鉴别及密钥协商,管理主机与被管理主机进行双向用户鉴别及 密钥协商后, 得到被管理主机与管理主机之间的会话密钥;
管理主机的网络管理员利用被管理主机上的可信平台模块 TPM对可信管 理代理进行完整性度量、存储和报告, 以验证可信管理代理在被管理主机上的 可信性; 被管理主机利用管理主机上的可信平台模块 TPM对可信管理系统进 行完整性度量、 存储和报告, 以验证可信管理系统在管理主机上的可信性; 当被管理主机经验证确认运行在管理主机上的可信管理系统以及运行在 被管理主机上的可信管理代理均是可信的,则被管理主机许可被管理主机与管 理主机进行网络管理通信;当管理主机的网络管理员经验证确认运行在管理主 机上的可信管理系统以及运行在被管理主机上的可信管理代理均是可信的,则 管理主机的网络管理员开始执行网络管理。
2.根据权利要求 1所述的实现可信网络管理的方法, 其特征在于, 所述的 可信管理代理和可信管理系统都是基于可信计算平台、经过可信管理代理和可 信管理系统的可信第三方鉴定后签名的软件模块,且可信管理代理和可信管理 系统的标准完整性度量值经可信第三方签名后存储于可查询的网络数据库中。
3.根据权利要求 1所述的实现可信网络管理的方法, 其特征在于, 所述的 可信管理代理是随着被管理主机的系统启动而自动运行的软件模块。
4.根据权利要求 1所述的实现可信网络管理的方法, 其特征在于, 所述的 可信网络管理是指:被管理主机和管理主机在确认可信管理代理和可信管理系 统均是可信的, 在该可信条件下所执行的网络管理。
5.根据权利要求 4所述的实现可信网络管理的方法, 其特征在于, 所述的 网络管理为: 集中式网络管理、分布式网络管理或分布式控制集中式管理的网 络管理模式。
6.根据权利要求 5所述的实现可信网络管理的方法, 其特征在于, 所述分 布式控制集中式管理的网络管理模式的实现步骤包括:
网络管理员利用可信管理系统与可信管理代理之间的会话密钥将安全网 络管理策略发送给被管理主机上的可信管理代理;
可信管理代理依据该安全网络管理策略在被管理主机上执行监测和控制, 对于安全网络管理策略可判定的监测数据, 则直接进行控制与管理; 而对于安 全网络管理策略不可判定的监测数据, 则将所述监测数据发送至可信管理系 统;
可信管理系统接收到所述监测数据后, 进行分析, 并将分析结果发送给网 络管理员, 以使网络管理员依据该分析结果对被管理主机进行控制与管理, 实 现可信网络管理。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020097027317A KR101135346B1 (ko) | 2007-09-14 | 2008-07-21 | 트러스티드 네트워크 관리 실현 방법 |
US12/631,491 US8230220B2 (en) | 2007-09-14 | 2009-12-04 | Method for realizing trusted network management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710018673A CN100581116C (zh) | 2007-09-14 | 2007-09-14 | 一种实现可信网络管理的方法 |
CN200710018673.X | 2007-09-14 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/631,491 Continuation US8230220B2 (en) | 2007-09-14 | 2009-12-04 | Method for realizing trusted network management |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009033385A1 true WO2009033385A1 (fr) | 2009-03-19 |
Family
ID=39933523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/071698 WO2009033385A1 (fr) | 2007-09-14 | 2008-07-21 | Procédé de réalisation de gestion de réseau de confiance |
Country Status (4)
Country | Link |
---|---|
US (1) | US8230220B2 (zh) |
KR (2) | KR20110128370A (zh) |
CN (1) | CN100581116C (zh) |
WO (1) | WO2009033385A1 (zh) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100581170C (zh) * | 2008-08-21 | 2010-01-13 | 西安西电捷通无线网络通信有限公司 | 一种基于三元对等鉴别可信网络连接的可信网络管理方法 |
CN101345660B (zh) * | 2008-08-21 | 2010-06-09 | 西安西电捷通无线网络通信有限公司 | 一种基于tcpa/tcg可信网络连接的可信网络管理方法 |
US8321926B1 (en) * | 2008-12-02 | 2012-11-27 | Lockheed Martin Corporation | System and method of protecting a system that includes unprotected computer devices |
US8176150B2 (en) * | 2009-08-12 | 2012-05-08 | Dell Products L.P. | Automated services procurement through multi-stage process |
EP2447889A1 (en) * | 2010-10-29 | 2012-05-02 | Siemens Aktiengesellschaft | Method for modeling a defect management in a manufacturing process and for handling the defect during the production process based on said modeled defect management |
CN102662871B (zh) * | 2012-03-29 | 2016-05-11 | 山东超越数控电子有限公司 | 一种基于可信密码模块的虚拟磁盘完整性保护系统及方法 |
CN103458041A (zh) * | 2013-09-10 | 2013-12-18 | 李传双 | 一种集中控制分散式运算的云计算方法及系统 |
CN103559591B (zh) * | 2013-11-20 | 2016-10-26 | 北京可信华泰信息技术有限公司 | 基于可信计算的软件管理系统和管理方法 |
CN104410636A (zh) * | 2014-12-01 | 2015-03-11 | 浪潮集团有限公司 | 一种云计算系统中增强bmc/smc安全性的方法 |
CN105007283B (zh) * | 2015-08-12 | 2018-01-30 | 四川神琥科技有限公司 | 一种网络安全防护方法 |
CN107133520B (zh) * | 2016-02-26 | 2021-05-14 | 华为技术有限公司 | 云计算平台的可信度量方法和装置 |
CN110401640B (zh) * | 2019-07-05 | 2021-10-22 | 北京可信华泰信息技术有限公司 | 一种基于可信计算双体系架构的可信连接方法 |
CN113839969B (zh) * | 2021-11-29 | 2022-03-15 | 军事科学院系统工程研究院网络信息研究所 | 一种双向认证的网络管理协议方法和系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1521990A (zh) * | 2003-01-28 | 2004-08-18 | 华为技术有限公司 | 全动态分布式网络服务管理系统及其服务方法 |
CN1983970A (zh) * | 2006-05-30 | 2007-06-20 | 北京邮电大学 | 基于移动代理的光子网格网络管理系统及管理方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030131088A1 (en) * | 2002-01-10 | 2003-07-10 | Ibm Corporation | Method and system for automatic selection of a test system in a network environment |
US20050091496A1 (en) * | 2003-10-23 | 2005-04-28 | Hyser Chris D. | Method and system for distributed key management in a secure boot environment |
US20050166051A1 (en) * | 2004-01-26 | 2005-07-28 | Mark Buer | System and method for certification of a secure platform |
US20050213768A1 (en) * | 2004-03-24 | 2005-09-29 | Durham David M | Shared cryptographic key in networks with an embedded agent |
US7631354B2 (en) * | 2004-12-30 | 2009-12-08 | Intel Corporation | System security agent authentication and alert distribution |
US7571474B2 (en) * | 2004-12-30 | 2009-08-04 | Intel Corporation | System security event notification aggregation and non-repudiation |
US7827550B2 (en) * | 2005-08-17 | 2010-11-02 | Intel Corporation | Method and system for measuring a program using a measurement agent |
CN100369421C (zh) | 2005-08-26 | 2008-02-13 | 南京邮电大学 | 一种面向移动代理网管的安全保护方法 |
CN100534044C (zh) | 2005-09-26 | 2009-08-26 | 深圳市深信服电子科技有限公司 | 一种在网关或网桥上实现用户安全接入外网的方法 |
CN100426753C (zh) | 2006-07-24 | 2008-10-15 | Ut斯达康通讯有限公司 | 一种基于snmp的网络管理方法 |
-
2007
- 2007-09-14 CN CN200710018673A patent/CN100581116C/zh active Active
-
2008
- 2008-07-21 KR KR1020117027101A patent/KR20110128370A/ko not_active Application Discontinuation
- 2008-07-21 KR KR1020097027317A patent/KR101135346B1/ko active IP Right Grant
- 2008-07-21 WO PCT/CN2008/071698 patent/WO2009033385A1/zh active Application Filing
-
2009
- 2009-12-04 US US12/631,491 patent/US8230220B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1521990A (zh) * | 2003-01-28 | 2004-08-18 | 华为技术有限公司 | 全动态分布式网络服务管理系统及其服务方法 |
CN1983970A (zh) * | 2006-05-30 | 2007-06-20 | 北京邮电大学 | 基于移动代理的光子网格网络管理系统及管理方法 |
Also Published As
Publication number | Publication date |
---|---|
KR101135346B1 (ko) | 2012-04-17 |
KR20100017951A (ko) | 2010-02-16 |
US8230220B2 (en) | 2012-07-24 |
US20100083349A1 (en) | 2010-04-01 |
CN100581116C (zh) | 2010-01-13 |
CN101242297A (zh) | 2008-08-13 |
KR20110128370A (ko) | 2011-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009033385A1 (fr) | Procédé de réalisation de gestion de réseau de confiance | |
WO2010020188A1 (zh) | 一种基于tcpa/tcg可信网络连接的可信网络管理方法 | |
WO2010020187A1 (zh) | 一种基于三元对等鉴别可信网络连接的可信网络管理方法 | |
US8255977B2 (en) | Trusted network connect method based on tri-element peer authentication | |
US8191113B2 (en) | Trusted network connect system based on tri-element peer authentication | |
US8826378B2 (en) | Techniques for authenticated posture reporting and associated enforcement of network access | |
US20080005359A1 (en) | Method and apparatus for OS independent platform based network access control | |
US20200322423A1 (en) | Attestation-based scheme for validating peering setups for critical infrastructure protocols | |
US20070271360A1 (en) | Network vulnerability assessment of a host platform from an isolated partition in the host platform | |
JP2011503732A (ja) | 3エレメントピア認証に基づく信頼されているネットワークアクセス制御方法 | |
CN117834218A (zh) | 一种基于零信任架构的统一身份认证方法及平台 | |
KR20200098181A (ko) | 통합보안네트워크카드에의한네트워크보안시스템 | |
Aliyu et al. | Secure communication between network applications and controller in software defined network | |
WO2012146100A1 (zh) | 简单网络管理协议的安全保护方法及装置 | |
JP2002158660A (ja) | 不正アクセス防御システム | |
Liu et al. | Secure and efficient BMC-based centralized management method for large-scale data centers | |
WO2012083667A1 (zh) | 一种适合可信连接架构的平台鉴别过程管理方法及装置 | |
Carthern et al. | Management Plane | |
Shoaib et al. | VADSEC: A Lightweight Protection Scheme for Secure Topology Discovery in SDN | |
Kim et al. | Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer Protocol. | |
CN116723023A (zh) | 一种基于ssh协议的内网穿透登录方法及系统 | |
Kenchaiah | TRUSTWORTHINESS AMONG CONTROLLERS AND SWITCHES IN MULTI-PROVIDER SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRUSTED PLATFORM MODULE (TPM) AND SECURE LEDGER | |
CN118054934A (zh) | 一种基于可信计算的电力系统安全实现方法和架构 | |
Kwiatkowski et al. | Dynamic clusters available under Clusterix Grid | |
Tian et al. | Securing ARP From the Bottom Up |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08773224 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20097027317 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08773224 Country of ref document: EP Kind code of ref document: A1 |