WO2022174509A1 - Method for designing firewall - Google Patents

Method for designing firewall Download PDF

Info

Publication number
WO2022174509A1
WO2022174509A1 PCT/CN2021/086347 CN2021086347W WO2022174509A1 WO 2022174509 A1 WO2022174509 A1 WO 2022174509A1 CN 2021086347 W CN2021086347 W CN 2021086347W WO 2022174509 A1 WO2022174509 A1 WO 2022174509A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
data
network
firewall
security
Prior art date
Application number
PCT/CN2021/086347
Other languages
French (fr)
Chinese (zh)
Inventor
黄策
Original Assignee
黄策
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 黄策 filed Critical 黄策
Publication of WO2022174509A1 publication Critical patent/WO2022174509A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present invention relates to a method for designing a firewall.
  • Firewalls are standard components that constitute a network application system today.
  • the firewall like the server, is a necessary standard component.
  • a firewall divides the network system of a network application system into an internal network and an external network.
  • Firewalls have become more and more powerful since their appearance, and more and more viruses can be resisted, but their basic architecture—hardware, operating system, and antivirus application system—has not changed. In the offensive and defensive battle of network security, this structure is exhausted. Although the firewall can defend against more and more viruses, the security protection function it should play is getting weaker and smaller.
  • ransomware winning bids The winning bidders have gradually shifted from attacking personal computers to extorting individuals, and gradually turning to attacking the network systems of enterprises and organizations, and extorting legal persons.
  • the amount of extortion has increased from less than 1 Bitcoin ( That is, hundreds to thousands of dollars) up to now, it is often tens of millions or even tens of millions of euros, and many winning bidders eventually have to pay a lot of extortion money.
  • the present invention provides a new method for designing a firewall.
  • the described method is divided into the following design blocks:
  • Design block 1 Design two functional modules, they are the transceiver module (module 1) connected to the external network to complete the data receiving/transmitting function and the processing module (module 2) connected to the internal network to complete the data processing function.
  • the two modules are connected by a data channel.
  • Design block 2 Design two data processing business processes according to the transmission direction of the data flow.
  • the two data processing business processes are: the data input business process (process 1) of data flow from the external network to the internal network;
  • Design block 3 Design the number of data channels between module 1 and module 2 and the technical solution for data communication according to the needs of security protection and data flow input/output business processes;
  • Design block 4 According to the needs of security protection and the needs of data flow input/output business processes, design the number of data channels connecting module 1 to the external network and the technical solution for data communication;
  • Design block 5 According to the needs of security protection and the needs of data flow input/output business process, design the number of data channels connecting module 2 to the intranet and the technical scheme of data communication used.
  • the described module 2 has two basic types: simple module 2-1 and simple module 2-2.
  • the technical feature of the simple module 2-1 is that it consists of a CPU and a RAM independently managed by the CPU, the CPU runs in a non-operating system environment, and has two data channels.
  • the technical feature of the simple module 2-2 is that it consists of a CPU and a RAM independently managed by the CPU, the CPU runs in a non-operating system environment, and has at least three data channels.
  • Mode 1 A matrix of simple modules 2 composed of two or more simple modules 2 in series and/or parallel. If there is a simple type module 2-2 in the module 2 matrix, all the data channels of the simple type module 2-2 have at least one data channel, which is not connected to the external network or the internal network.
  • Mode 2 A data processing terminal matrix consisting of two or more simple modules 2 and one or more information terminals with operating systems.
  • the simple module 2 is located between the information terminal containing the operating system and the external network or the internal network, so that any one of all the information terminals containing the operating system in the matrix is connected to the internal network or external network.
  • the network has no directly connected data channel.
  • the described data input business process (process 1) is composed of two sub-business processes distributed on module 1 and module 2 respectively:
  • Process 1-1 Module 1 receives data input from the external network, and transmits the received data to Module 2 through the data channel between Module 1 and Module 2.
  • Process 1-2 Module 2 processes the received data, and the processed data is either discarded or sent to the intranet.
  • process 2 The described data output business process (process 2) is composed of two sub-business processes distributed on module 1 and module 2 respectively:
  • Process 2-1 Module 2 receives the data from the intranet and processes the received data. The processed data is either discarded or transmitted to module 1 through the data channel between module 1 and module 2.
  • Process 2-2 Module 1 sends the received data to the external network.
  • Process 1 and Process 2 includes, but is not limited to, data insertion, deletion, splitting, reorganization, verification, verification, encryption, and decryption for security purposes.
  • the data channel between module 1 and module 2 includes but is not limited to a parallel data bus and a serial data bus.
  • module 1 In order to achieve the best security purpose of safe data transmission between the firewalls designed by the method, several preferred design principles of module 1 are:
  • Module 1 has at least two connection data channels with the external network. In principle, the more data channels there are between module 1 and the external network, the higher the engineering cost for the attacker to obtain/intercept the transmitted data, and the stronger the confidentiality of data transmission. The better the firewall's effect on the security protection of transmitted data is.
  • module 1 has more than two connection data channels with the external network, at least two different communication methods are used.
  • a data channel adopts a data channel of the mobile Internet
  • a channel adopts a short message channel or a voice channel.
  • the Beidou SMS channel is the best secure data channel that can be obtained.
  • module 1 has more than two connection data channels with the external network, it is preferred to lease the communication lines of different communication operators. For example, for a firewall with two fixed network data channels, the fixed network lines of China Mobile and China Unicom are leased respectively. In this way, for network security attackers, whether they want to intercept communication data or conduct man-in-the-middle attacks, they must simultaneously invade the network lines of mobile and China Unicom, and accurately find these two communication lines, which undoubtedly increases the attack of the attacker. difficulty.
  • the present invention is a brand-new firewall design method. Compared with the traditional firewall, the firewall designed by this method has the following advantages:
  • the traditional firewall can only provide limited security protection for the server side of the network application system. For network security owners, due to the budget constraints of network security project construction, it is impossible to provide the entire network security protection with the same security strength.
  • the firewall designed by the method can provide the whole network security protection covering the whole network and the same security level for any network application system, for the server end and the user end.
  • the traditional firewall cannot effectively cut the intranet. This makes any data terminal on the intranet an injection point for attacking viruses.
  • the firewall designed by the method can effectively cut the intranet and provide security protection of different security levels for each sub-net after the cut. This makes the single-point injection of viruses under the traditional firewall, and the security attacks on the entire network become a thing of the past. This makes the popular "micro-network" security concept in the past two years a real feasible technical solution.
  • the traditional firewall does not have a clear and definite security boundary between the internal network and the external network due to the inevitable security loopholes in the operating system and anti-virus application system.
  • the firewall designed by the method makes a clear and definite security boundary between the internal network and the external network. Any virus that invades module 1 and the intranet can see data black holes that cannot be invaded or detected one by one. A virus that invades the intranet cannot transmit even one bit of data to the extranet without the help of insiders.
  • the firewall designed by the method can adopt the data security detection strategy of unique verification for the data entering and leaving the firewall. This completely gets rid of the exhaustive detection method used by traditional firewalls and the natural dependence on large storage power and large computing power. Therefore, the cost of the firewall is greatly reduced, and the miniaturization and miniaturization of the firewall designed according to the method are technically possible.
  • Figure 1 Schematic diagram of the network system structure of traditional firewall protection.
  • Figure 2 A schematic diagram of the structure of the network application system protected by the new firewall under the method.
  • Figure 3 Schematic diagram of the structure of the simple module 2-1.
  • Figure 4 Schematic diagram of the structure of the simple module 2-2.
  • Figure 5 A schematic diagram of a new firewall structure with one internal network connection channel and two external network connection channels
  • Figure 6 Schematic diagram of a new firewall structure with one internal network connection channel and one external network connection channel
  • Figure 7 A schematic diagram of a new firewall structure that provides security protection for servers.
  • Figure 8 A schematic diagram of the structure of an IoT terminal based on mobile Internet things
  • Figure 9 A schematic diagram of a new firewall structure that provides security protection for unattended IoT terminals.
  • Figure 10 Schematic diagram of a new firewall architecture that provides security for manned IoT terminals
  • FIG. 1 is a schematic diagram of a network system structure for traditional firewall protection.
  • the firewall divides the entire network system into two parts: the internal network and the external network.
  • the security loopholes in the firewall operating system there is no clear and clear boundary between the external network and the internal network.
  • FIG. 2 is a schematic structural diagram of a network application system protected by a new firewall under the method.
  • the figure shows: 1) The new firewall 1 effectively divides the internal network and the external network. 2) The new firewall 2 effectively separates the server from the intranet. 3) The new firewall 3 and the new firewall n respectively provide security protection for the external network terminal 1 and the external network terminal n.
  • the described design method provides a feasible technical solution for realizing the security of "micro-network”.
  • the owner of network security For the owner of network security, he can ask Zhang San's team to build his firewall system version 1.0, and then ask Li Si's team to review the new firewall 2 without changing the communication data format between the firewall 2's intranet and the server. Make a makeover. In this way, the trust risk of Zhang San's team can be completely avoided. At the same time, because the Li Si team cannot fully understand the data structure of the entire firewall, the trust risk to the Li Si team can also be effectively shielded. After the upgrade is completed, the network security owner can ensure that the new firewall 2 will not be invaded as long as the installation site of the firewall 2 is free from outsiders.
  • Figure 3 and Figure 4 are schematic diagrams of the structures of the simple module 2-1 and the simple module 2-2, respectively.
  • 3 is a schematic structural diagram of a simple module 2-2 with three data channels.
  • FIG. 5 is a schematic structural diagram of a new firewall with one internal network connection channel and two external network connection channels.
  • the module 2 is a simple module 2 matrix composed of a simple module 2-1 and a simple module 2-2 with four data channels according to the mode 1.
  • CPU1 is connected to a keyboard. This keyboard is used to input working parameters to CPU1 and CPU2.
  • the module 2 matrix shown in FIG. 5 is the simplest module 2 matrix connected by way 1.
  • the network security owner uses the described method 1 to form a more complex and efficient module 2 matrix.
  • FIG. 6 is a schematic structural diagram of a new firewall with one intranet connection channel and one extranet connection channel.
  • module 1 is composed of two simple modules 2-1 sandwiching a computer (that is, connected according to mode 2). This structure ensures that there is no direct data channel between the computer and the external network and the internal network. Thus, the security loopholes in the operating system and application system that must exist on the computer are guaranteed to be effectively isolated from the external network and the internal network.
  • the module 2 matrix shown in FIG. 6 is the simplest module 2 matrix connected by way 2.
  • Network security owners use the described method 2 to form a more complex and efficient module 2 matrix.
  • the structure shown in Figure 5 and Figure 6 enables network security owners; 1) It effectively shields all the connections between the security loopholes in the operating system and application system on all intranet and extranet network devices, which can effectively resist the Cyber attacks that exploit these security holes. 2) Effectively shield the trust loopholes of the firewall development team.
  • network security owners choose a firewall development team, they only need to consider the development capabilities of the team and whether they can match the development needs of the firewall, but not the trust of the firewall development team at all.
  • Considering the trust of the firewall development team is the first priority when choosing to build a security protection system with the old firewall as the core security component.
  • FIG. 7 is a schematic structural diagram of a new firewall that provides security protection for servers.
  • the firewall shown in the figure has one internal network data channel, four external network data channels, and one firewall control channel.
  • the No. 3 module 2 with the mobile network communication module as the communication component provides two data channels: a mobile data channel (that is, a so-called traffic channel) and a short message channel.
  • the keyboard is a firewall control channel. Authorized personnel input working parameters to the new firewall through the keyboard, the data transmitted from inside and outside to the external network, and the data transmitted from the external network to the internal network.
  • All network attacks are based on the use of security loopholes in the network system to intercept the communication data between networks as the starting point of the attack. In other words, effectively preventing the interception of communication data can effectively prevent network attacks initiated by exploiting security holes in the operating system and application system.
  • the multiple data channels of the new firewall can easily defeat all current network attacks that intercept data. Take the simplest two data channels (using the data channels of No. 1 module 1 and No. 2 module 1) as an example. As long as the network security owner connects the No. 1 module 1 to the network operated by the A network operator, and the No. 2 module 1 to the network operated by the B network operator, all current attack schemes for intercepting data can be abolished.
  • artificial data channels and China's Beidou SMS data channel can basically be considered as absolutely safe data channels. Especially the Beidou SMS data channel, I believe that no commercial organization dares to attack it, even if it is to intercept the attack.
  • the detection strategy adopted by the current firewall is the exhaustive method. When performing data inspection, the firewall needs to exclude all possible virus characteristics before releasing the detected data. However, in the process of engineering implementation, this strategy naturally brings two security vulnerabilities:
  • Vulnerability 1 The data detection performed by the firewall on the data entering and leaving the firewall must be completed within a certain limited time, so the implementation of the security policy of exhaustive detection requires the support of strong computing power and storage power.
  • the acquisition of large computing power and large storage power requires the support of network security owners with a strong construction budget for their network security projects. In fact, no strong budget can support the endless computing and storage needs.
  • the limited budget determines that only limited computing power and storage power can be used as the basis for the construction of the entire network security project. This makes any network security project with the current firewall as the core component, at the beginning of its construction, a gold swallower with security loopholes. With the passage of time, security loopholes will continue to be discovered, and it is inevitable to swallow a large amount of network security construction budget.
  • the demand for powerful computing power and storage power makes the miniaturization and miniaturization of firewalls lack a technical basis. Therefore, the security defense concept of "micro-network", which has been popularized in the past two years, only stays in the field of technical discussion
  • the new firewall adopts a unique data inspection strategy. Only data that meets the unique data inspection characteristics can pass through the new firewall.
  • This technical feature makes: 1) The demand for computing power and storage power of the new firewall is greatly reduced, which can be reduced by one ten thousandth or one hundred thousandth of the current firewall. This allows network security owners to completely free themselves from the constraints of network security project budgets and install new firewalls wherever they want. As a result, the security and defense concept of "micro-network", which began to be hotly hyped two years ago, has become a reality with technical and financial support. 2) The construction of the new firewall naturally gets rid of the "trust" dependence of network security owners on the firewall construction team. This technically guarantees the establishment of a "zero trust” network security mechanism.
  • FIG. 8 is a schematic structural diagram of an Internet of Things terminal based on mobile Internet things. This structure is suitable for expressing all IoT terminals.
  • the Internet of Things is an application pool recognized by the industry as the next generation of various popular network applications. But what is frustrating is that the existing network security technology is completely unable to support the expectations of future Internet of Things applications for network security. Because with the existing network security attack technology, any IoT application system built with the existing network security technology can be broken in minutes. Such an attack is not a question of whether the attacker is technically "feasible” or “infeasible”, but the issue of the attacker's "profit” and “loss” in the financial statement. However, looking forward to the security technology of future solutions based on the technical basis of the existing network security technology, the result is still depressing. The Energy Infrastructure Security Act, considered and passed by the U.S. Senate on June 28, 2019, fully illustrates this point.
  • FIG 9 is a schematic structural diagram of a new firewall that provides security protection for unattended IoT terminals.
  • the CPU 1 and its connected RAM and the mobile network communication module 2 constitute the new firewall of the present invention.
  • the number one problem they face is not the problem of whether the attack technology is up or not, but how to ensure that the Aggressive behavior is a "profit" problem on the financial statement.
  • FIG 10 is a schematic structural diagram of a new firewall that provides security protection for manned IoT terminals.
  • the CPU1, the RAM and the keyboard connected to it constitute the new firewall described in the present invention.
  • the working parameters required by the new firewall are input to CPU1 by the on-duty personnel through the keyboard.
  • Firewalls between servers or firewalls between subnets in the intranet are Firewalls between servers or firewalls between subnets in the intranet.
  • the new firewall with the structure of Figure 7 can constitute a firewall between servers, no matter whether the connection between these servers is through the internal network or the external network.
  • the five data channels between the two new firewalls are sufficient to meet the security needs of most high-strength data transmissions against interception.
  • the extremely low engineering cost (the firewall with the structure in Figure 7, the minimum is the money of a computer of 3-4 thousand yuan), makes it possible to perform arbitrary sub-intranet segmentation on the intranet.
  • the firewall with the structure in Figure 7 the minimum is the money of a computer of 3-4 thousand yuan
  • Take a company's intranet with a scale of 1,000 employees as an example 20 new firewalls with the structure of Figure 7, and the total budget is only 100,000 yuan. And these 20 new firewalls are enough to form at least three security lines, and the core IT equipment, such as the server of core data, and the office computers of important departments and employees, are protected from air tightness.
  • the budget of 100,000 yuan it is difficult to build a secure network system that can satisfy the head office with thousands of people.
  • the network security owner can use the method described in the patent "A Data Packaging Method" (Patent Application No.: 2019102326268) to package the data that penetrates the firewall with the structure of Figure 7. .
  • the data packaged according to the method passes through CPU2, CPU3, and CPU4 in FIG. 7, any malicious code injected into the communication data by piercing the communication protocol through any technical means at present and in the future can be found.
  • This security feature complies with the security requirements specification in Dengbao 2.0 that the communication port of the IoT terminal should be able to resist malicious code injection attacks.
  • the IoT terminal shown in FIG. 9 and the firewall shown in FIG. 7 constitute the unattended IoT application system under the protection of the firewall according to the present invention.
  • the firewall on the terminal side of the Internet of Things can be constructed using the "xxx8x8k64x" single-chip microcomputer of "xx technology” and the cheapest GSM module (as long as it can send and receive short messages).
  • the BOM cost of the entire firewall is 3.x yuan for the single-chip microcomputer, and no more than 25 yuan for the GSM module.
  • the BOM cost of a new firewall is less than 30,000 yuan, and there is no budget pressure at all.
  • the xxx8x8k64x microcontroller has 51 cores, and other technical parameters are: 64K Flash program memory, 8K on-chip extended SRAM, and 4 standard serial ports. These parameters can meet the needs of most IoT terminals to build firewalls.
  • the IoT terminal shown in FIG. 10 and the firewall shown in FIG. 7 constitute a manned IoT application system under the protection of the security mechanism of the present invention.
  • the firewall on the terminal side of the Internet of Things can use the "xxx8x8k64x" single-chip microcomputer of "xx technology".
  • the cost of the BOM table of the entire firewall is 3.x yuan for the single-chip computer, and no more than 25 yuan for the keyboard and monitor.
  • the BOM cost of the firewall is less than 30,000 yuan, and there is no budget pressure at all.
  • the attended IoT terminal in this embodiment fully complies with the technical requirements for security defense required by the Energy Infrastructure Security Act, which was deliberated and passed by the U.S. Senate on June 28, 2019.
  • any network security owner is faced with two difficult choices: 1): How much network security project budget should be arranged in a network application system? Too few, the application system is equivalent to "streaking"? Too many, and not enough budget to support. 2)
  • the firewall design method of the present invention can effectively solve the network security owners, especially the network security owners in the early stage of entrepreneurship, who face the tight budget and the "trust" dependence on the network security construction team in the early stage of entrepreneurship.
  • the firewall with the structure shown in Figure 5 (with a budget of less than 500 yuan) or Figure 6 (with a budget of less than 2-3,000 yuan) can be used.
  • the firewall of its initial verification system As the firewall of its initial verification system.
  • the system is stable and the number of terminals increases, consider adopting the firewall with the structure shown in Figure 7 (budget 4, 5,000 to tens of thousands) as an upgrade to the verification structure shown in Figure 5 or 6.
  • the upgrades include but are not limited to: expanding the CPU1 into CPU1-1, CPU1-2, ... CPU1-n in the structure of FIG.

Abstract

The present application discloses a novel method for designing a firewall. Said method comprises: designing a data transceiver module 1 which is connected to an external network and completes a data receiving/sending function, and a data processing module 2 which is connected to an internal network and completes a data processing function; designing, according to a transmission direction of a data stream, a data input service flow in which the data stream is transmitted from the external network to the internal network and a data output service flow in which the data stream is transmitted from the internal network to the external network; and designing, according to the needs of security protection and the needs of data stream input/output service flow, the number of data channels between the module 1 and the module 2, between the module 1 and the external network, and between the module 2 and the internal network, and a technical solution of data communication to be used. The firewall designed by using the method can provide security protection of the whole network, effectively partition the internal network, and provide security protection of different security levels for sub-internal networks after partition.

Description

一种设计防火墙的方法A Method of Designing Firewall 技术领域technical field
本发明涉及一种设计防火墙的方法。The present invention relates to a method for designing a firewall.
背景技术Background technique
防火墙是当今构成一个网络应用系统的标准部件。任何一个网络应用的系统中,防火墙同服务器一样,都是必备的标准件。一个防火墙将一个网络应用系统的网络系统分为内网和外网。Firewalls are standard components that constitute a network application system today. In any network application system, the firewall, like the server, is a necessary standard component. A firewall divides the network system of a network application system into an internal network and an external network.
防火墙从出现至今,功能越来越强大,能抵抗的病毒也越来越多,但其基本架构-硬件、操作系统、防病毒的应用系统-并未发生任何改变。在网络安全的攻防战中,这种结构尽显疲态。虽然防火墙能防御的病毒越来越多,但其本应起到的安全防护作用却越来越弱、越来越小。Firewalls have become more and more powerful since their appearance, and more and more viruses can be resisted, but their basic architecture—hardware, operating system, and antivirus application system—has not changed. In the offensive and defensive battle of network security, this structure is exhausted. Although the firewall can defend against more and more viruses, the security protection function it should play is getting weaker and smaller.
以两三年前出现的勒索病毒为例。一方面人们看到的是国内、国外众多的提供网络安全专业服务的网安公司,不断声称其网安产品能如何、如何的查杀各种已知的、未来的勒索病毒,另一方面人们看到的是不断爆出的勒索病毒中标案,中标标的从最初的攻击个人的电脑,勒索个人,逐步转向攻击企业、组织的网络系统,勒索法人,勒索金额从最初的不到1比特币(也就是几百到几千美金)到现在动辄上百万甚至上千万欧元,而不少的中标企业最终不得不以缴纳不菲的勒索金了事。Take the ransomware that appeared two or three years ago as an example. On the one hand, what people see is a large number of domestic and foreign network security companies that provide professional network security services, constantly claiming how and how their network security products can detect and kill various known and future ransomware viruses. What I see is the continuous explosion of ransomware winning bids. The winning bidders have gradually shifted from attacking personal computers to extorting individuals, and gradually turning to attacking the network systems of enterprises and organizations, and extorting legal persons. The amount of extortion has increased from less than 1 Bitcoin ( That is, hundreds to thousands of dollars) up to now, it is often tens of millions or even tens of millions of euros, and many winning bidders eventually have to pay a lot of extortion money.
无数的网络安全事件无不说明一个残酷现实,防火墙这个古老的安全部件,在今天以及未来其能起到的安全作用,将会越来弱。现阶段业内热炒的“零信任网络”技术概念,其实就是对防火墙的最直白的间接否定。Countless network security incidents all illustrate a cruel reality. Firewall, an ancient security component, will become weaker and weaker in its security role today and in the future. At this stage, the technical concept of "Zero Trust Network" that is hot in the industry is actually the most straightforward and indirect denial of firewalls.
2019年6月开始,中国陆续颁布、实施《计算机等级保护2.0版》(业内简称“等宝2.0”)。等宝2.0同之前的实施的等宝1.0相比,其最大的改变就是,网络应用的安全防护范围,从等宝1.0规则下的防火墙后的内网,扩大到等宝2.0规则下的内网、外网。Since June 2019, China has successively promulgated and implemented the "Computer Grade Protection Version 2.0" (referred to in the industry as "Wangbao 2.0"). Compared with the previous implementation of Equalbao 2.0, the biggest change is that the security protection scope of network applications has expanded from the intranet behind the firewall under the rules of Equalbao 1.0 to the intranet under the rules of Equalbao 2.0 ,Extranet.
美国国防创新委员会在其于2019年4月发布的《5G生态系统:对美国国防部的风险与机遇》报告中的“建议二”中,则明确的指出“外围防御模型已经被证明是无效的”。In its "5G Ecosystem: Risks and Opportunities for the U.S. Department of Defense" report released in April 2019, the U.S. Defense Innovation Council clearly pointed out that "the perimeter defense model has been proven to be ineffective. ".
2019年中美两国关于网络安全的两个国家行为,为持续多年的以防火墙为最重要的安全防御部件,将整个网络系统人为的分割为内网、外网,将攻击阻挡在防火墙之外的外围防御模型,敲响了丧钟,画上了句号。In 2019, the two national behaviors of China and the United States on network security, in order to take the firewall as the most important security defense component for many years, the entire network system is artificially divided into the internal network and the external network, and the attack is blocked outside the firewall. The perimeter defense model of , sounded the death knell and drew an end.
究其原因,主要就是防火墙所能起到的安全防护功能越来越弱。这一点从无数的网络安全事件上,得以充分的证明。特别是最近几年大火且被业内公认为下一个网络应用风口的物联网应用上,发生的越来越多的安全事件,更是说明外围防御模型的天然局限型。造成这一局面,无外乎以下几个主要原因:The reason is that the security protection function that the firewall can play is getting weaker and weaker. This has been fully proved from countless network security incidents. Especially in the Internet of Things applications, which have become popular in recent years and are recognized by the industry as the next network application outlet, more and more security incidents have occurred, which shows the natural limitation of the perimeter defense model. There are several main reasons for this situation:
原因1:现在的防火墙产品,全都是采用“硬件、操作系统、防病毒的应用系统”的标准架构。在操作系统、防病毒的应用系统天然具有的安全漏洞的情况下,这种架构的防火墙,天然就有安全漏洞,且根本就无法保证其自身的安全性。而令人担忧的是,随着时间的推移、操作系统功能的越来越强大和繁复、防火墙的安全功能的越来越多,这些天然具备的安全漏洞数量,不是在减少,而是在增加。而随时间线的延长,必然出现越来越多的安全漏洞,这就使得防火墙的安全作用越来越弱。而且从理论上讲,运行于操作系统之上的防病毒的应用系统对于操作系统上的安全漏洞的防护效果基本上可 以认为是可以忽略不计的微乎其微。Reason 1: The current firewall products all adopt the standard architecture of "hardware, operating system, and anti-virus application system". In the case of natural security loopholes in operating systems and antivirus application systems, firewalls with this architecture naturally have security loopholes, and cannot guarantee their own security at all. What is worrying is that with the passage of time, the functions of the operating system are becoming more and more powerful and complex, and the security functions of the firewall are increasing. The number of these natural security vulnerabilities is not decreasing, but increasing. . With the extension of the time line, more and more security loopholes are bound to appear, which makes the security function of the firewall weaker and weaker. And theoretically speaking, the protection effect of the antivirus application system running on the operating system for the security loopholes on the operating system can basically be considered negligible and negligible.
原因2:无论是哪家的防火墙,对输入、输出防火墙的数据所采用的数据检查的安全策略,本质上并无显著区别。穷尽排除法是所有防火墙产品,标准的基本安全策略。所述策略的基础技术特征就是,用检测已知病毒特征码的方式,来判断进入防火墙的数据,是否带有病毒。在病毒越来越多的今天和未来,要想使得进出防火墙的数据流,不因穷尽检测而产出太多的时延,则必须1)放弃一些必要的检测。2)必须依靠具备大算力和大储存量的设备来实施的这种极耗费资源的穷尽式检测。这就必然导致两个严重后果:1)安全策略天然有安全漏洞。因为随着病毒越来越多,必然要放弃某些必要的病毒检测。2)防火墙无法小型化和微型化,无法为一个网络应用系统中的所有网络终端,提供安全防护。而这两点,在最近几年日渐火爆的物联网应用上频发的安全事件和勒索病毒攻击案件勒索赎金越叫越高,得到充分的验证。Reason 2: No matter which firewall is used, there is no significant difference in the security policy of data inspection for data entering and exiting the firewall. Exhaustive exclusion is the standard basic security policy for all firewall products. The basic technical feature of the strategy is to use the method of detecting known virus signatures to determine whether the data entering the firewall contains viruses. In today and in the future with more and more viruses, in order to prevent the data flow in and out of the firewall from generating too much delay due to exhaustive detection, it is necessary to 1) give up some necessary detections. 2) This extremely resource-intensive exhaustive detection must be implemented by devices with large computing power and large storage capacity. This will inevitably lead to two serious consequences: 1) There are natural security loopholes in security policies. Because with more and more viruses, it is inevitable to give up some necessary virus detection. 2) The firewall cannot be miniaturized and miniaturized, and cannot provide security protection for all network terminals in a network application system. These two points have been fully verified by the frequent security incidents and ransomware attacks on the increasingly popular Internet of Things applications in recent years.
原因3:安全漏洞看不见摸不着,而防火墙以及以此为基础的网络安全系统,又必然会或多或少的接触到应用系统的核心敏感数据,这就使得网安系统的建设,必然带有网络安全业主对网安系统建设实施人的天然信任。换而言之,对于专业的网安公司而言,技术好坏在其次,网安业主对网安项目建设团队的人,特别是关键人的信任,才是关键中的关键。一个大型的网络安全建设项目,网络安全业主,首先考虑的项目建设团队人员的安全性原因就在于此。很难想象一个网络安全项目业主会聘请一个完全没有信任感的网安团队参与其网络安全项目的建设。比如任何一家俄罗斯最顶级的网络安全公司绝对不会进入一个美国或其盟友的最高安全等级的网络安全项目业主的考虑范围,反之亦然。Reason 3: Security loopholes are invisible and intangible, and firewalls and network security systems based on them will inevitably come into contact with the core sensitive data of application systems more or less, which makes the construction of network security systems inevitably bring There is natural trust of network security owners in the implementation of network security system construction. In other words, for a professional network security company, the quality of the technology is second, and the trust of the network security owners in the network security project construction team, especially the key people, is the key. In a large-scale network security construction project, the network security owner first considers the security of the project construction team personnel for this reason. It is hard to imagine that a network security project owner would hire a network security team that has no sense of trust to participate in the construction of its network security project. For example, any of Russia's top cybersecurity companies would never be considered by an owner of a cybersecurity project with the highest security rating of the United States or its allies, and vice versa.
发明内容SUMMARY OF THE INVENTION
为了有效克服现有防火墙技术方案上的缺陷和弊端,本发明提供了一种全新设计防火墙的方法。所述的方法分为如下的几个设计板块:In order to effectively overcome the defects and drawbacks of the existing firewall technical solutions, the present invention provides a new method for designing a firewall. The described method is divided into the following design blocks:
设计板块1:设计两个功能模块,他们分别是同外网相连的完成数据收/发功能的收发模块(模块1)和同内网相连的完成数据处理功能的处理模块(模块2)。两个模块之间由数据通道相连。Design block 1: Design two functional modules, they are the transceiver module (module 1) connected to the external network to complete the data receiving/transmitting function and the processing module (module 2) connected to the internal network to complete the data processing function. The two modules are connected by a data channel.
设计板块2:按数据流的传输方向,设计两个数据处理业务流程,所述的两个数据处理业务流程分别是:数据流从外网传入内网的数据输入业务流程(流程1);数据流从内网传输到外网的数据输出业务流程(流程2);Design block 2: Design two data processing business processes according to the transmission direction of the data flow. The two data processing business processes are: the data input business process (process 1) of data flow from the external network to the internal network; The data output business process (process 2) of data flow transmission from the internal network to the external network;
设计板块3:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块1同模块2之间的数据通道的个数和所采用的数据通讯的技术方案;Design block 3: Design the number of data channels between module 1 and module 2 and the technical solution for data communication according to the needs of security protection and data flow input/output business processes;
设计板块4:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块1同外网连接的数据通道的个数和所采用的数据通讯的技术方案;Design block 4: According to the needs of security protection and the needs of data flow input/output business processes, design the number of data channels connecting module 1 to the external network and the technical solution for data communication;
设计板块5:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块2同内网连接的数据通道的个数和所采用的数据通讯的技术方案。Design block 5: According to the needs of security protection and the needs of data flow input/output business process, design the number of data channels connecting module 2 to the intranet and the technical scheme of data communication used.
其中:in:
所述的模块2有两个基础类型:简单型模块2-1和简单型模块2-2。The described module 2 has two basic types: simple module 2-1 and simple module 2-2.
所述简单型模块2-1的技术特征是,它由一个CPU和由此CPU独立管理的RAM构成,所述的CPU运行在非操作系统环境之下,且有两个的数据通道。The technical feature of the simple module 2-1 is that it consists of a CPU and a RAM independently managed by the CPU, the CPU runs in a non-operating system environment, and has two data channels.
所述简单型模块2-2的技术特征是,它由一个CPU和此CPU独立管理的RAM构成,所述的CPU运行在非操作系统环境之下,且最少有三个的数据通道。The technical feature of the simple module 2-2 is that it consists of a CPU and a RAM independently managed by the CPU, the CPU runs in a non-operating system environment, and has at least three data channels.
对于有更高技术/性能要求的复杂型模块2,可采用如下但不限于如下2种方式进行设计:For complex modules 2 with higher technical/performance requirements, the following but not limited to the following two methods can be used for design:
方式1:由两个或两个以上的简单型模块2通过串联和/或并联方式构成的简单型模块2矩阵。如果模块2矩阵中有简单型模块2-2,则所有的简单型模块2-2的数据通道中,最少有一个数据通道,既不同外网相连也不同内网相连。Mode 1: A matrix of simple modules 2 composed of two or more simple modules 2 in series and/or parallel. If there is a simple type module 2-2 in the module 2 matrix, all the data channels of the simple type module 2-2 have at least one data channel, which is not connected to the external network or the internal network.
方式2:由两个或两个以上的简单型模块2和一台或多台含操作系统的信息终端组成的数据处理终端矩阵。在这个矩阵中,简单型模块2处于含操作系统的信息终端同外网或内网之间,使得所述矩阵中的所有含操作系统的信息终端中的任何一台,都同内网或外网无直接相连的数据通道。Mode 2: A data processing terminal matrix consisting of two or more simple modules 2 and one or more information terminals with operating systems. In this matrix, the simple module 2 is located between the information terminal containing the operating system and the external network or the internal network, so that any one of all the information terminals containing the operating system in the matrix is connected to the internal network or external network. The network has no directly connected data channel.
所述的数据输入业务流程(流程1)由分别分布在模块1和模块2上的两个子业务流程组成:The described data input business process (process 1) is composed of two sub-business processes distributed on module 1 and module 2 respectively:
流程1-1:模块1接收外网输入的数据,通过模块1和模块2之间的数据通道将接收的数据传输到模块2。Process 1-1: Module 1 receives data input from the external network, and transmits the received data to Module 2 through the data channel between Module 1 and Module 2.
流程1-2:模块2对收到的数据进行处理,处理后的数据,或丢弃或送入内网。Process 1-2: Module 2 processes the received data, and the processed data is either discarded or sent to the intranet.
所述的数据输出业务流程(流程2)由分别分布在模块1和模块2上的两个子业务流程组成:The described data output business process (process 2) is composed of two sub-business processes distributed on module 1 and module 2 respectively:
流程2-1:模块2接收从内网传来的数据,并对收到的数据进行处理,处理后的数据,或丢弃或通过模块1和模块2之间的数据通道传输到模块1。Process 2-1: Module 2 receives the data from the intranet and processes the received data. The processed data is either discarded or transmitted to module 1 through the data channel between module 1 and module 2.
流程2-2:模块1将所收到的数据送入外网。Process 2-2: Module 1 sends the received data to the external network.
流程1和流程2中所述的数据处理,包括但不限于,为安全目的进行的数据的插入、删除、分拆、重组、校验、验证、加密、解密。The data processing described in Process 1 and Process 2 includes, but is not limited to, data insertion, deletion, splitting, reorganization, verification, verification, encryption, and decryption for security purposes.
模块1于模块2间的数据通道包括但不限于并行数据总线和串行数据总线。The data channel between module 1 and module 2 includes but is not limited to a parallel data bus and a serial data bus.
为达成最佳的在所述方法设计的防火墙之间,进行安全数据传输的安全目的,模块1的几个优选设计原则是:In order to achieve the best security purpose of safe data transmission between the firewalls designed by the method, several preferred design principles of module 1 are:
1)模块1同外网最少有两个连接数据通道。原则上讲,模块1同外网之间,有越多的数据通道,攻击方获得/拦截传输数据的工程成本就越高,数据传输的保密性也强。防火墙的对传输数据的安全防护效果就越好。1) Module 1 has at least two connection data channels with the external network. In principle, the more data channels there are between module 1 and the external network, the higher the engineering cost for the attacker to obtain/intercept the transmitted data, and the stronger the confidentiality of data transmission. The better the firewall's effect on the security protection of transmitted data is.
2)模块1同外网有两个以上的连接数据通道时,最少采用2两种不同的通讯方式。比如一个数据通道采用移动互联网的数据通道,一个通道采用短信通道或语音通道。对任何于一个商用的网络应用系统而言,北斗短信通道是其可以获得的最优的一个安全数据通道。2) When module 1 has more than two connection data channels with the external network, at least two different communication methods are used. For example, a data channel adopts a data channel of the mobile Internet, and a channel adopts a short message channel or a voice channel. For any commercial network application system, the Beidou SMS channel is the best secure data channel that can be obtained.
3)模块1同外网有两个以上的连接数据通道时,优先采用租用不同的通讯运营商的通讯线路。比如对于有两个固网数据通道的防火墙而言,分别租用移动、联通的固网线路。这样对于网络安全攻击方而言,无论是要拦截通讯数据还是要进行中间人攻击,都必须同时入侵移动、联通的网络线路,并要准确找到这两条通讯线路,这无疑增加了攻击方的攻击难度。3) When module 1 has more than two connection data channels with the external network, it is preferred to lease the communication lines of different communication operators. For example, for a firewall with two fixed network data channels, the fixed network lines of China Mobile and China Unicom are leased respectively. In this way, for network security attackers, whether they want to intercept communication data or conduct man-in-the-middle attacks, they must simultaneously invade the network lines of mobile and China Unicom, and accurately find these two communication lines, which undoubtedly increases the attack of the attacker. difficulty.
本发明是一种全新的防火墙设计方法。通过此方法设计出来的防火墙,同传统的防火墙相比,具有如下优点:The present invention is a brand-new firewall design method. Compared with the traditional firewall, the firewall designed by this method has the following advantages:
1)传统的防火墙只能为网络应用系统的服务器端提供有限的安全防护。对于网络安全业主而言,因受网络安全项目建设的预算限制,则无法提供同样安全强度的全网安全防护。用所述方法设计的防火墙可以为任何的网络应用系统,为服务器端和用户端提供覆盖全网的、相同安全等级的全网安全防护。1) The traditional firewall can only provide limited security protection for the server side of the network application system. For network security owners, due to the budget constraints of network security project construction, it is impossible to provide the entire network security protection with the same security strength. The firewall designed by the method can provide the whole network security protection covering the whole network and the same security level for any network application system, for the server end and the user end.
2)传统的防火墙,无法对内网进行有效的切割。这就使得处于内网的任意一台数据终端,都会成为攻击病毒的注入点。用所述方法设计的防火墙,可以对内网进行有效的切割并对切割后的各个子内网,提供不同安全等级的安全防护。这就使得传统防火墙下,病毒单点注入,全网皆墨的安全攻击事件,成为历史。这就使得前两年流行的 “微网络”的安全概念,有了一个真正可行的技术方案。2) The traditional firewall cannot effectively cut the intranet. This makes any data terminal on the intranet an injection point for attacking viruses. The firewall designed by the method can effectively cut the intranet and provide security protection of different security levels for each sub-net after the cut. This makes the single-point injection of viruses under the traditional firewall, and the security attacks on the entire network become a thing of the past. This makes the popular "micro-network" security concept in the past two years a real feasible technical solution.
3)在传统防火墙上永远必然存在于操作系统、防病毒应用系统的安全漏洞,在所述方法设计出的防火墙上永不存在。3) Security loopholes in operating systems and anti-virus application systems will always exist on traditional firewalls, and will never exist on firewalls designed by the method.
4)传统防火墙因必然存在的操作系统上、防病毒应用系统的安全漏洞,使得内网、外网之间,并无一个清晰而明确的安全边界。用所述方法设计的防火墙,使得内网和外网之间,从此有了一个清晰而明确的安全边界。任何入侵到模块1和内网的病毒,所能看到的就是一个一个的既无法入侵,又无法探测的数据黑洞。入侵到内网的病毒,如果没有内部人助力,无法向外网传出哪怕是一个比特的数据。4) The traditional firewall does not have a clear and definite security boundary between the internal network and the external network due to the inevitable security loopholes in the operating system and anti-virus application system. The firewall designed by the method makes a clear and definite security boundary between the internal network and the external network. Any virus that invades module 1 and the intranet can see data black holes that cannot be invaded or detected one by one. A virus that invades the intranet cannot transmit even one bit of data to the extranet without the help of insiders.
5)用所述方法设计的防火墙,对进出防火墙的数据,可以采用唯一性验证的数据安全检测策略。这就彻底摆脱了传统防火墙采用的穷尽性检测法,对大存储力和大算力的天然依赖。从而使得所述防火墙的成本大幅降低,同时按所述方法设计的防火墙的微型化、小型化在技术上成为可能。5) The firewall designed by the method can adopt the data security detection strategy of unique verification for the data entering and leaving the firewall. This completely gets rid of the exhaustive detection method used by traditional firewalls and the natural dependence on large storage power and large computing power. Therefore, the cost of the firewall is greatly reduced, and the miniaturization and miniaturization of the firewall designed according to the method are technically possible.
6)过往和当下,有不少网络安全企业,宣称自己的网络安全产品所采用的安全策略、机制不但可以有效对抗现在的病毒,更可以对抗未来的病毒。但这种宣称,更多只是商家的宣称用语。这种宣称用语,既无法在技术上得到证实,也无法被实际效果所证实。而用本发明所述方法设计的防火墙,在设计分布在模块2上的数据处理的业务流程(流程1-2、流程2-1)时,对从内网传输到外网的数据,如采用专利《一种数据包装方法》(专利申请号:2019102326268)所述的方法进行包装,再用所述专利的方法对从外网输入内网的数据进行检测,则用本专利方法设计防火墙,就可以发现任何现在以及未来,采用任何技术手段,刺破通讯协议,向通讯数据中注入的恶意代码。这一当前业内独有的安全特性,使得网络安全业主在所述防火墙的设计、实施、维护、运行等业务环节,彻底摆脱了:1)对网络安全项目建设团队的人员信任的依赖。2)内网中所有含操作系统终端上必然存在的安全漏洞的永久威胁。6) In the past and present, there are many network security companies claiming that the security policies and mechanisms adopted by their network security products can not only effectively fight against current viruses, but also against future viruses. But this kind of claim is more of a business claim. Such claims can neither be verified technically nor by actual effects. In the firewall designed by the method of the present invention, when designing the business process (process 1-2, process 2-1) of data processing distributed on the module 2, for the data transmitted from the internal network to the external network, such as using The method described in the patent "A Data Packaging Method" (patent application number: 2019102326268) is used for packaging, and then the method of the patent is used to detect the data input from the external network to the internal network. Any malicious code injected into the communication data by piercing the communication protocol and using any technical means can be found now and in the future. This unique security feature in the current industry enables network security owners to completely get rid of: 1) Dependence on the trust of the network security project construction team in the design, implementation, maintenance, operation and other business links of the firewall. 2) All permanent threats that contain security loopholes that must exist on the terminal of the operating system in the intranet.
附图说明Description of drawings
图1:传统的防火墙防护的网络系统结构示意图。Figure 1: Schematic diagram of the network system structure of traditional firewall protection.
图2:所述方法下,新防火墙保护的网络应用系统结构示意图。Figure 2: A schematic diagram of the structure of the network application system protected by the new firewall under the method.
图3:简单型模块2-1结构示意图。Figure 3: Schematic diagram of the structure of the simple module 2-1.
图4:简单型模块2-2结构示意图。Figure 4: Schematic diagram of the structure of the simple module 2-2.
图5:一种有一个内网连接通道和两个外网连接通道的新防火墙结构示意图Figure 5: A schematic diagram of a new firewall structure with one internal network connection channel and two external network connection channels
图6:一种有一个内网连接通道和一个外网连接通道的新防火墙结构示意图Figure 6: Schematic diagram of a new firewall structure with one internal network connection channel and one external network connection channel
图7:一种为服务器提供安全防护的新防火墙结构示意图。Figure 7: A schematic diagram of a new firewall structure that provides security protection for servers.
图8:一种基于移动互联网物的物联网终端的结构示意图Figure 8: A schematic diagram of the structure of an IoT terminal based on mobile Internet things
图9:一种为无人值守的物联网终端提供安全防护的新防火墙结构示意图。Figure 9: A schematic diagram of a new firewall structure that provides security protection for unattended IoT terminals.
图10:一种为有人值守的物联网终端提供安全防护的新防火墙结构示意图Figure 10: Schematic diagram of a new firewall architecture that provides security for manned IoT terminals
具体实施方式Detailed ways
下面结合具体实施例对本发明内容进行详细说明。The content of the present invention will be described in detail below with reference to specific embodiments.
图1是传统的防火墙防护的网络系统结构示意图。在这个结构中,防火墙将整个网络系统,分割为内网、外网两个部分。但在防火墙操作系统上的安全漏洞的作用下,外网、内网实际上并无明确而清晰的边界。FIG. 1 is a schematic diagram of a network system structure for traditional firewall protection. In this structure, the firewall divides the entire network system into two parts: the internal network and the external network. However, due to the security loopholes in the firewall operating system, there is no clear and clear boundary between the external network and the internal network.
在中国的等宝1.0时代,网络应用系统的防护范围为防火墙后的内网。2019年6月开始的“等宝2.0”则将网络应用系统的防护范围,扩大到内网和外网终端。In China's Era Treasure 1.0 era, the protection scope of the network application system is the intranet behind the firewall. "Waibao 2.0", which started in June 2019, expanded the protection scope of the network application system to the internal network and external network terminals.
美国国防创新委员会在其于2019年4月发布的《5G生态系统:对美国国防部的风险与机遇》报告中的“建议二”中,则明确的指出“外围防御模型已经被证明是无效的”,在其报告中进一步指出,在“外围防御模型”下,防火墙既无法抵御来对外网设备的攻击,如入侵到外网路由器上的拦截数据的盗取攻击,或中间人攻击,又无法抵御对外网终端的攻击或劫持外网终端后对服务器发起的攻击。In its "5G Ecosystem: Risks and Opportunities for the U.S. Department of Defense" report released in April 2019, the U.S. Defense Innovation Council clearly pointed out that "the perimeter defense model has been proven to be ineffective. ”, further pointed out in its report that under the “perimeter defense model”, the firewall can neither resist attacks from external network devices, such as intrusion into external network routers to intercept data stealing attacks, or man-in-the-middle attacks, nor can it defend against attacks from external network devices. Attacks on external network terminals or attacks on servers after hijacking external network terminals.
2019年6月28日美国参议院审议、通过的《能源基础设施安全法》,彻底终止了在美国国内能源基础设施上(如电网控制系统),采用任何高级的自动化系统方案进行安全防御的可能性。法案要求相关企业转而探讨用低技术含量方法替代自动化系统的方案,比如用人工过程而非联网方式,直接由人类操作员来完成重要节点的安全控制的可能性。因为,他们认为,低技术含量的方法,可以有效的大大增加网络攻击难度,挫败最高端的网络黑客。显而易见的是,对于人工完成的控制过程而言,无论技术多么高强的黑客想要访问电网,必须实际接触到相关设备。这样,那些能源企业,只要管好接触相关设备的人,就可以有效屏或抵抗蔽任何顶级黑客利用操作系统或应用系统上的安全漏洞所发起的远程无接触攻击。On June 28, 2019, the "Energy Infrastructure Security Act", which was considered and passed by the U.S. Senate, completely terminated the possibility of using any advanced automated system solution for security defense on the U.S. domestic energy infrastructure (such as power grid control systems). . The bill requires relevant companies to instead explore alternatives to automated systems with low-tech methods, such as the possibility of using manual processes instead of networking, and the possibility of direct human operators to complete the security control of important nodes. Because, they believe, low-tech methods can effectively increase the difficulty of network attacks and frustrate the most advanced network hackers. Clearly, for a human-made control process, a hacker, no matter how sophisticated, would have to actually gain access to the equipment in order to gain access to the grid. In this way, those energy companies, as long as they manage those who have access to the relevant equipment, can effectively block or resist the remote contactless attacks launched by any top hackers by exploiting the security holes in the operating system or application system.
由此可见,图1这样的安全模型已经无法适应当下日益严重的网络安全形势。It can be seen that the security model in Figure 1 has been unable to adapt to the current increasingly serious network security situation.
图2是所述方法下,新防火墙保护的网络应用系统结构示意图。FIG. 2 is a schematic structural diagram of a network application system protected by a new firewall under the method.
图中显示:1)新防火墙1将内网、外网进行了有效的分割。2)新防火墙2又在内网将服务器同内网进行了有效的分割。3)新防火墙3、新防火墙n分别对外网终端1、外网终端n提供了安全防护。The figure shows: 1) The new firewall 1 effectively divides the internal network and the external network. 2) The new firewall 2 effectively separates the server from the intranet. 3) The new firewall 3 and the new firewall n respectively provide security protection for the external network terminal 1 and the external network terminal n.
在此网络结构下,任何入侵到内网终端、服务器、外网终端、内网、外网的病毒,看到的都是一个个数据黑洞,无法利用操作系统、应用系统上的安全漏洞,入侵到其他地方。Under this network structure, any virus that invades the internal network terminal, server, external network terminal, internal network, and external network will see data black holes one by one, and cannot exploit the security holes in the operating system and application system to invade to other places.
所述的设计方法,为实现“微网络”安全,提供了一种可行的技术方案。The described design method provides a feasible technical solution for realizing the security of "micro-network".
对网络安全的业主而言,他可以请张三团队建构其防火墙系统1.0版,而后在完全不改变防火墙2的内网同服务器之间通信数据格式的情况下,请李四团队对新防火墙2进行改造。这样就可以完全规避掉张三团队的信任风险。同时,因李四团队,无法完整了解整个防火墙的数据结构,对李四团队的信任风险,一样可以有效屏蔽。完成升级后,网络安全业主只要保证防火墙2的安装地,没有外人入侵,就可以保证新防火墙2不会被人入侵。For the owner of network security, he can ask Zhang San's team to build his firewall system version 1.0, and then ask Li Si's team to review the new firewall 2 without changing the communication data format between the firewall 2's intranet and the server. Make a makeover. In this way, the trust risk of Zhang San's team can be completely avoided. At the same time, because the Li Si team cannot fully understand the data structure of the entire firewall, the trust risk to the Li Si team can also be effectively shielded. After the upgrade is completed, the network security owner can ensure that the new firewall 2 will not be invaded as long as the installation site of the firewall 2 is free from outsiders.
图3、图4:分别为简单型模块2-1和简单型模块2-2结构示意图。其中图3为三数据通道的简单型模块2-2的结构示意图。Figure 3 and Figure 4 are schematic diagrams of the structures of the simple module 2-1 and the simple module 2-2, respectively. 3 is a schematic structural diagram of a simple module 2-2 with three data channels.
图5是一种有一个内网连接通道和两个外网连接通道的新防火墙结构示意图。其中模块2是一个由一个简单型模块2-1和一个有四个的数据通道的简单型模块2-2按照方式1构成的简单型模块2矩阵。其中CPU1连接一个键盘。此键盘用于将工作参数输入到CPU1和CPU2上。FIG. 5 is a schematic structural diagram of a new firewall with one internal network connection channel and two external network connection channels. The module 2 is a simple module 2 matrix composed of a simple module 2-1 and a simple module 2-2 with four data channels according to the mode 1. Among them, CPU1 is connected to a keyboard. This keyboard is used to input working parameters to CPU1 and CPU2.
图5所示的模块2矩阵,是一种最简单的、用方式1连接而成的模块2矩阵。网络安全业主用所述的方式1构成更为复杂、高效的模块2矩阵。The module 2 matrix shown in FIG. 5 is the simplest module 2 matrix connected by way 1. The network security owner uses the described method 1 to form a more complex and efficient module 2 matrix.
图6是一种有一个内网连接通道和一个外网连接通道的新防火墙结构示意图。其中模块1是由两个简单型模块2-1包夹一台电脑(既按方式2连接)构成。这个结构就保证了电脑同外网、内网之间,没有直接的数据通道。从而保证了此电脑上必然存在的操作系统、应用系统上的安全漏洞,同外网、内网之间的有效隔离。FIG. 6 is a schematic structural diagram of a new firewall with one intranet connection channel and one extranet connection channel. Among them, module 1 is composed of two simple modules 2-1 sandwiching a computer (that is, connected according to mode 2). This structure ensures that there is no direct data channel between the computer and the external network and the internal network. Thus, the security loopholes in the operating system and application system that must exist on the computer are guaranteed to be effectively isolated from the external network and the internal network.
图6所示的模块2矩阵,是一种最简单的、用方式2连接而成的模块2矩阵。网络 安全业主用所述的方式2构成更为复杂、高效的模块2矩阵。The module 2 matrix shown in FIG. 6 is the simplest module 2 matrix connected by way 2. Network security owners use the described method 2 to form a more complex and efficient module 2 matrix.
无论是图5结构还是图6结构,亦或是更为复杂的模块2结构,对网络安全业主而言,他只要:Whether it is the structure in Figure 5 or Figure 6, or the more complex module 2 structure, for network security owners, he only needs to:
1)严格看管住键盘,防止任何未经授权的人接触到模块2中的键盘,则任何入侵到内网、外网、1号模块1、2号模块1病毒、甚至是模块2矩阵的开发人员,都无法将任何工作参数,输入到模块2上。1) Strictly guard the keyboard to prevent any unauthorized person from touching the keyboard in module 2, then any intrusion into the internal network, external network, module 1, module 1, module 1 virus, or even module 2 matrix Developers cannot input any working parameters into module 2.
2)严格看管住摆放模块2的物理空间,防止任何未经授权的人对模块2中的任何部件进行任何未经授权的改动,则可以彻底切断内网、外网之间未经授权的数据交换。2) Strictly monitor the physical space in which the module 2 is placed, and prevent any unauthorized person from making any unauthorized changes to any components in the module 2, then the unauthorized connection between the internal network and the external network can be completely cut off. data exchange.
图5、图6所示的结构,就使得网络安全业主;1)有效屏蔽了所有内网、外网网络设备上必然存在于操作系统、应用系统上安全漏洞之间的联系,进而可有效抵抗利用这些安全漏洞所发起的网络攻击。2)有效屏蔽防火墙开发团队的信任漏洞。换而言之,网络安全业主在选择防火墙的开发团队时,只要考虑这个团队的开发能力,是否能匹配这个防火墙的开发需求就可,而完全不要考虑这个防火墙开发团队的信任问题。而考虑防火墙开发团队的信任问题,是当下选择以旧式防火墙为核心安全部件构建安全防护系统时的第一优先考虑事项。The structure shown in Figure 5 and Figure 6 enables network security owners; 1) It effectively shields all the connections between the security loopholes in the operating system and application system on all intranet and extranet network devices, which can effectively resist the Cyber attacks that exploit these security holes. 2) Effectively shield the trust loopholes of the firewall development team. In other words, when network security owners choose a firewall development team, they only need to consider the development capabilities of the team and whether they can match the development needs of the firewall, but not the trust of the firewall development team at all. Considering the trust of the firewall development team is the first priority when choosing to build a security protection system with the old firewall as the core security component.
图7是一种为服务器提供安全防护的新防火墙结构示意图。图中所示的防火墙具有一个内网数据通道和四个外网数据通道,一个防火墙控制通道。其中以移动网通讯模块为通讯部件的3号模块2提供两个数据通道:移动数据通道(也就是所谓的流量通道)和短信通道。键盘则是一个防火墙控制通道,授权人员通过键盘向新防火墙输入工作参数、内外传输到外网的数据、外网传输到内网的数据。FIG. 7 is a schematic structural diagram of a new firewall that provides security protection for servers. The firewall shown in the figure has one internal network data channel, four external network data channels, and one firewall control channel. The No. 3 module 2 with the mobile network communication module as the communication component provides two data channels: a mobile data channel (that is, a so-called traffic channel) and a short message channel. The keyboard is a firewall control channel. Authorized personnel input working parameters to the new firewall through the keyboard, the data transmitted from inside and outside to the external network, and the data transmitted from the external network to the internal network.
图7所示的新防火墙,同现在的防火墙相比:The new firewall shown in Figure 7, compared to the current firewall:
1)可以有效屏蔽掉所有现在行之有效的数据拦截攻击。1) It can effectively block out all effective data interception attacks.
所有的网络攻击,都是以利用网络系统上的安全漏洞,从拦截网络间的通讯数据,作为攻击的起点。换而言之,有效防止对通信数据的拦截,就可以有效的防止利用操作系统和应用系统上的安全漏洞发起的网络攻击。All network attacks are based on the use of security loopholes in the network system to intercept the communication data between networks as the starting point of the attack. In other words, effectively preventing the interception of communication data can effectively prevent network attacks initiated by exploiting security holes in the operating system and application system.
现在的防火墙在两个服务器之间(如A公司的总公司服务器防火墙同分公司服务器之间防火墙)的安全措施多半采用VPN的方式进行防护。但这种安全防护并不安全。这一点去看一下美国国防创新委员会在其于2019年4月发布的《5G生态系统:对美国国防部的风险与机遇》报告中的风险来源(报告中的网络安全风险的来源是:网络空间和移动终端)和我国的等宝2.0的相关安全要求,就可以清楚的知道,这绝非空穴来风。同时已经有相关案例证实,VPN是完全可以攻破的。The security measures of the current firewall between two servers (such as the firewall of company A's head office server and the firewall of the branch server) are mostly protected by VPN. But this security protection is not safe. For this, take a look at the sources of risk in the Defense Innovation Council's April 2019 report "5G Ecosystems: Risks and Opportunities for the U.S. Department of Defense" (the sources of cybersecurity risks in the report are: Cyberspace and mobile terminals) and the relevant security requirements of my country's Equal Treasure 2.0, you can clearly know that this is not groundless. At the same time, there have been relevant cases to prove that VPN is completely breakable.
新防火墙的多所数据通道,就可以轻松击溃现在所有的拦截数据的网络攻击。以最简单的两个数据通道(采用1号模块1和2号模块1的数据通道)为例。网络安全业主只要将1号模块1接入A网络运营商运营的网络,2号模块1接入B网络运营商运营的网络,就可以废了当下所有拦截数据的攻击方案。对以商业目的为基础数据拦截攻击,人工数据通道和中国的北斗短信数据通道,基本上可以认为是绝对安全的数据通道。特别是北斗短信数据通道,相信没有哪个商业机构敢对它发起攻击,哪怕是拦截攻击。The multiple data channels of the new firewall can easily defeat all current network attacks that intercept data. Take the simplest two data channels (using the data channels of No. 1 module 1 and No. 2 module 1) as an example. As long as the network security owner connects the No. 1 module 1 to the network operated by the A network operator, and the No. 2 module 1 to the network operated by the B network operator, all current attack schemes for intercepting data can be abolished. For data interception attacks based on commercial purposes, artificial data channels and China's Beidou SMS data channel can basically be considered as absolutely safe data channels. Especially the Beidou SMS data channel, I believe that no commercial organization dares to attack it, even if it is to intercept the attack.
2)防火墙的建设成本大幅降低,使得真正技术含义上的“微网络”的构建和“零信任”网络安全机制的建立成为可能。2) The construction cost of the firewall is greatly reduced, making it possible to construct a "micro-network" in the true technical sense and to establish a "zero trust" network security mechanism.
现在的防火墙所采用的检测策略是穷尽法,既进行数据检查时,防火墙是需要排除所有可能的病毒特征后,才能放行被检测数据。但这种策略在工程实施过程中,天然带来了2个安全漏洞:The detection strategy adopted by the current firewall is the exhaustive method. When performing data inspection, the firewall needs to exclude all possible virus characteristics before releasing the detected data. However, in the process of engineering implementation, this strategy naturally brings two security vulnerabilities:
漏洞1:防火墙对进出防火墙数据进行的数据检测是必须在某一个限定的时间内完成,所以穷尽检测的安全策略的实施需要强大的算力和存储力做支撑。而大算力、大存 储力的获得,又需要网络安全业主对其网络安全项目的强力的建设预算的支撑。任何强大的预算其实都无法支撑无尽的算力和存储力的需求。有限的预算就决定了只能以有限的的算力和存储力作为整个网络安全项目建设的基础。这使得任何一个以现在防火墙为核心部件的网络安全项目,在建设之初就是一个有安全漏洞的吞金兽。而随着时间的推移,安全漏洞又会不断发现,再吞大笔的网络安全建设预算,就是必然。对强大算力和存储力的需求,使得防火墙的小型化、微型化缺乏技术基础。所以,前两年开始热炒的“微网络”的安全防御概念,也仅仅停留在业内的技术探讨范畴。Vulnerability 1: The data detection performed by the firewall on the data entering and leaving the firewall must be completed within a certain limited time, so the implementation of the security policy of exhaustive detection requires the support of strong computing power and storage power. The acquisition of large computing power and large storage power requires the support of network security owners with a strong construction budget for their network security projects. In fact, no strong budget can support the endless computing and storage needs. The limited budget determines that only limited computing power and storage power can be used as the basis for the construction of the entire network security project. This makes any network security project with the current firewall as the core component, at the beginning of its construction, a gold swallower with security loopholes. With the passage of time, security loopholes will continue to be discovered, and it is inevitable to swallow a large amount of network security construction budget. The demand for powerful computing power and storage power makes the miniaturization and miniaturization of firewalls lack a technical basis. Therefore, the security defense concept of "micro-network", which has been popularized in the past two years, only stays in the field of technical discussion in the industry.
漏洞2:现在的防火墙必然会触碰到网络安全业主的核心敏感数据。这在网络安全项目建设已经成为一个独立产品形态时,对网络安全业主而言,选择可信任的网络安全项目建设团队,成了选择团队技术能力的绝对前置条件。这就使得任何一个网络安全项目的建设,天然就带有“信任”基础。在美国国防创新委员会在其于2019年4月发布的《5G生态系统:对美国国防部的风险与机遇》报告中提出的“零信任”的网络安全概念,天然就排除了“防火墙”(准确的讲是现在的防火墙)这一安全部件的存在。Vulnerability 2: Today's firewalls will inevitably touch the core sensitive data of network security owners. When network security project construction has become an independent product form, for network security owners, choosing a trusted network security project construction team has become an absolute prerequisite for selecting the technical capabilities of the team. This makes the construction of any network security project inherently based on "trust". In the "Zero Trust" cybersecurity concept proposed by the Defense Innovation Council in its report "5G Ecosystem: Risks and Opportunities for the U.S. Department of Defense" released in April 2019, the "firewall" (accurately) is naturally excluded. It is the existence of the security component of the current firewall).
新防火墙采用的是唯一性数据检查策略。既只有符合唯一的数据检查特征的数据才能够通过新防火墙。这一技术特点使得:1)新防火墙对算力和存储力的需求大幅降低,它可以降低到现在防火墙的万分之一或十万分之一以上。这就使得网络安全业主完全摆脱网络安全项目预算的限制,想在什么地方安装新防火墙就在什么地方安装新防火墙。从而使得两年前开始热炒的“微网络”的安全防御概念,在技术和资金上获得支撑而变为现实。2)新防火墙的建设,天然摆脱了网络安全业主对防火墙建设团队的的“信任”依赖。这在技术上保证了“零信任”网络安全机制的建立。The new firewall adopts a unique data inspection strategy. Only data that meets the unique data inspection characteristics can pass through the new firewall. This technical feature makes: 1) The demand for computing power and storage power of the new firewall is greatly reduced, which can be reduced by one ten thousandth or one hundred thousandth of the current firewall. This allows network security owners to completely free themselves from the constraints of network security project budgets and install new firewalls wherever they want. As a result, the security and defense concept of "micro-network", which began to be hotly hyped two years ago, has become a reality with technical and financial support. 2) The construction of the new firewall naturally gets rid of the "trust" dependence of network security owners on the firewall construction team. This technically guarantees the establishment of a "zero trust" network security mechanism.
图8是一种基于移动互联网物的物联网终端的结构示意图。这种结构,适用于表达所有的物联网终端。FIG. 8 is a schematic structural diagram of an Internet of Things terminal based on mobile Internet things. This structure is suitable for expressing all IoT terminals.
物联网是被业内公认的下一代各种热门网络应用的应用池。但令人沮丧的是现有的网络安全技术,完全无法支撑起未来物联网应用对网络安全的预期。因为以现有的网络安全攻击技术,分分钟就可以攻破以现有的网络安全技术构建的任何物联网应用系统。而这样的攻击,不是攻击方在是技术上的“可行”还是“不可行”的问题,而是攻击方在财物报表上的“盈”和“亏”问题。而以现有的网络安全技术的技术基础对未来方案安全技术进行展望,结果依然是令人沮丧。2019年6月28日美国参议院审议、通过的《能源基础设施安全法》,就充分说明了这一点。The Internet of Things is an application pool recognized by the industry as the next generation of various popular network applications. But what is frustrating is that the existing network security technology is completely unable to support the expectations of future Internet of Things applications for network security. Because with the existing network security attack technology, any IoT application system built with the existing network security technology can be broken in minutes. Such an attack is not a question of whether the attacker is technically "feasible" or "infeasible", but the issue of the attacker's "profit" and "loss" in the financial statement. However, looking forward to the security technology of future solutions based on the technical basis of the existing network security technology, the result is still depressing. The Energy Infrastructure Security Act, considered and passed by the U.S. Senate on June 28, 2019, fully illustrates this point.
图9是一种为无人值守的物联网终端提供安全防护的新防火墙结构示意图。其中CPU1及其连接的RAM、移动网通讯模块2就构成了本发明所述的新防火墙。Figure 9 is a schematic structural diagram of a new firewall that provides security protection for unattended IoT terminals. The CPU 1 and its connected RAM and the mobile network communication module 2 constitute the new firewall of the present invention.
对网络安全业主而言,有大量的符合本发明所述的技术要求的CPU供他选择。在CPU1上完成的“流程1-2”和“流程2-1”,因没有太高的技术难度和不需要“信任投资”,故这部分的开发人员的支出也大为节省。这就使得图9中的防火墙,BOM表成本极为低廉。稍微有点网络完全需求的物联网应用系统,都可负担。系统投入运行后,业主只要选用不同的移动网络运营商,如SIM1选择A移动运营商,通讯时走数据通道,SIM卡2选用B移动运营商,通讯时走短信通道。这样就可以使得当下所有有效的网络安全攻击手段,统统失效。For the network security owner, there are a large number of CPUs that meet the technical requirements described in the present invention for him to choose. The "Process 1-2" and "Process 2-1" completed on CPU1 do not have too high technical difficulty and do not require "trust investment", so the expenditure of this part of the developers is also greatly saved. This makes the cost of the firewall and BOM table in Figure 9 extremely low. IoT application systems with a little full network requirements are affordable. After the system is put into operation, the owner only needs to choose different mobile network operators. For example, SIM1 chooses mobile operator A, and uses the data channel for communication; SIM card 2 chooses mobile operator B, and uses the short message channel for communication. In this way, all effective network security attack methods can be rendered ineffective.
对于网络安全的攻击方而言,面对这样的物联网终端以及由本发明所述防火墙构成的物联网应用系统,他们所面临的头号问题,不是攻击技术上行或不行的问题,而是如何确保请攻击行为,在财物报表上是“盈”的问题。For the attackers of network security, facing such IoT terminals and the IoT application system constituted by the firewall of the present invention, the number one problem they face is not the problem of whether the attack technology is up or not, but how to ensure that the Aggressive behavior is a "profit" problem on the financial statement.
图10是一种为有人值守的物联网终端提供安全防护的新防火墙结构示意图。其中CPU1以及同其连接的RAM、键盘构成了本发明所述的新防火墙。所述新防火墙所需要工作参数,由值班人员通过键盘输入CPU1。Figure 10 is a schematic structural diagram of a new firewall that provides security protection for manned IoT terminals. The CPU1, the RAM and the keyboard connected to it constitute the new firewall described in the present invention. The working parameters required by the new firewall are input to CPU1 by the on-duty personnel through the keyboard.
实施例1:Example 1:
服务器间的防火墙或内网中各个子内网之间的防火墙。Firewalls between servers or firewalls between subnets in the intranet.
图7结构的新防火墙,就可以构成了服务器之间的防火墙,不论这些服务器之间的连接是通过内网还是通过外网。两个新防火墙之间的五个数据通道,足以满足绝大部分高强度防数据传输被拦截的安全需要。The new firewall with the structure of Figure 7 can constitute a firewall between servers, no matter whether the connection between these servers is through the internal network or the external network. The five data channels between the two new firewalls are sufficient to meet the security needs of most high-strength data transmissions against interception.
极低的工程成本(图7结构的防火墙,最低也就是一台3-4千元的电脑的钱),使得在内网进行任意的子内网的分割,成为了可能。以一个千人规模的总公司内网为例,20台图7结构的新防火墙,总预算也不过10万元。而这20台新防火墙足以构成最少三道安全防线,将其核心IT设备,如核心数据的服务器,重要部门、员工的办公电脑,防护的密不透风。而这10万元的预算,很难构建一个满足上千人规模的总公司的安全的网络系统。The extremely low engineering cost (the firewall with the structure in Figure 7, the minimum is the money of a computer of 3-4 thousand yuan), makes it possible to perform arbitrary sub-intranet segmentation on the intranet. Take a company's intranet with a scale of 1,000 employees as an example, 20 new firewalls with the structure of Figure 7, and the total budget is only 100,000 yuan. And these 20 new firewalls are enough to form at least three security lines, and the core IT equipment, such as the server of core data, and the office computers of important departments and employees, are protected from air tightness. And with the budget of 100,000 yuan, it is difficult to build a secure network system that can satisfy the head office with thousands of people.
网络安全业主在定义穿透图7结构的防火墙的通讯协议时,可采用专利《一种数据包装方法》(专利申请号:2019102326268)所述的方法,对穿透图7结构防火墙的数据进行包装。按所述方法包装的数据,在通过图7中的CPU2、CPU3、CPU4时,可以发现任何现在以及未来通过任何技术手段,刺破通讯协议,向通讯数据中注入的恶意代码。When defining the communication protocol that penetrates the firewall with the structure of Figure 7, the network security owner can use the method described in the patent "A Data Packaging Method" (Patent Application No.: 2019102326268) to package the data that penetrates the firewall with the structure of Figure 7. . When the data packaged according to the method passes through CPU2, CPU3, and CPU4 in FIG. 7, any malicious code injected into the communication data by piercing the communication protocol through any technical means at present and in the future can be found.
这一安全特性,符合等宝2.0中关于物联网终端的通讯端口应能够抵御恶意代码的注入攻击的安全要求规范。This security feature complies with the security requirements specification in Dengbao 2.0 that the communication port of the IoT terminal should be able to resist malicious code injection attacks.
对于任何一个商用的网络应用系统,将图7结构中的由CPU4构成的移动网通讯信道,更换为北斗短信信道,则可以抵御所有的以商业目的为最终攻击目的网络安全攻击。For any commercial network application system, if the mobile network communication channel composed of CPU4 in the structure of Figure 7 is replaced with the Beidou SMS channel, all network security attacks with commercial purposes as the ultimate attack purpose can be resisted.
实施例2:Example 2:
无人值守的物联网应用系统。Unattended IoT application system.
由图9所示的物联网终端和图7所示的防火墙,就构成了本发明所述的防火墙保护下的无人值守的物联网应用系统。The IoT terminal shown in FIG. 9 and the firewall shown in FIG. 7 constitute the unattended IoT application system under the protection of the firewall according to the present invention.
在这个系统中,物联网终端侧的防火墙可以采用“xx科技”的“xxx8x8k64x”单片机和最便宜的GSM模块(只要能收发短信即可)构建。整个防火墙的BOM表成本为,单片机3.x元,GSM模块不超过25元。对于一千个物联网终端,且对网络安全有点需求的物联网应用系统而言,不到3万元的新防火墙BOM表成本,完全没有任何预算压力。In this system, the firewall on the terminal side of the Internet of Things can be constructed using the "xxx8x8k64x" single-chip microcomputer of "xx technology" and the cheapest GSM module (as long as it can send and receive short messages). The BOM cost of the entire firewall is 3.x yuan for the single-chip microcomputer, and no more than 25 yuan for the GSM module. For an IoT application system with a thousand IoT terminals and some requirements for network security, the BOM cost of a new firewall is less than 30,000 yuan, and there is no budget pressure at all.
注:Note:
1)为避为人做广告之嫌,以上单片机的部分信息用“x”替代。1) In order to avoid being suspected of advertising, part of the information of the above microcontroller is replaced by "x".
2)xxx8x8k64x单片机为51核,其他的技术参数是:64K的Flash程序存储器,8K的片内扩展SRAM,4个标准串口。这些参数,可满足绝大多数物联网终端构建防火墙的需要。2) The xxx8x8k64x microcontroller has 51 cores, and other technical parameters are: 64K Flash program memory, 8K on-chip extended SRAM, and 4 standard serial ports. These parameters can meet the needs of most IoT terminals to build firewalls.
3)其他品牌的、非51核的具有类似技术参数单片机,多如牛毛。对网络安全的业主而言,具有极大的选择空间。3) Other brands of non-51-core microcontrollers with similar technical parameters are numerous. For owners of network security, there is a great choice of space.
实施例3:Example 3:
有人值守的物联网应用系统。Attended IoT application system.
由图10所示的物联网终端和图7所示的防火墙,就构成了本发明所述的安全机制保护下的有人值守的物联网应用系统。The IoT terminal shown in FIG. 10 and the firewall shown in FIG. 7 constitute a manned IoT application system under the protection of the security mechanism of the present invention.
在这个系统中,物联网终端侧的防火墙可以采用“xx科技”的“xxx8x8k64x”单片机。整个防火墙的BOM表成本为,单片机3.x元,键盘和显示器不超过25元。对于一千个物联网终端,且对网络安全有相当需求的物联网系统而言,不到3万元的防火墙BOM表成本,完全没有任何预算压力。In this system, the firewall on the terminal side of the Internet of Things can use the "xxx8x8k64x" single-chip microcomputer of "xx technology". The cost of the BOM table of the entire firewall is 3.x yuan for the single-chip computer, and no more than 25 yuan for the keyboard and monitor. For an IoT system with 1,000 IoT terminals and considerable demands on network security, the BOM cost of the firewall is less than 30,000 yuan, and there is no budget pressure at all.
本实施例的有人值守的物联网终端,完全符合2019年6月28日美国参议院审议通过的《能源基础设施安全法》中所要求的安全防御的技术要求。The attended IoT terminal in this embodiment fully complies with the technical requirements for security defense required by the Energy Infrastructure Security Act, which was deliberated and passed by the U.S. Senate on June 28, 2019.
实施例4:Example 4:
网络安全业主在网络安全建设过程中,如何有效规避对防火墙建设人员的“信任”依赖。In the process of network security construction, how can network security owners effectively avoid the "trust" dependence on firewall construction personnel.
在网络安全问题日益严重的今天,任何一个网络安全业主,都面临着两个选择难题,1):在一个网络应用系统中,安排多少网络安全项目的预算?太少,应用系统等于“裸奔”?太多,又没有足够的预算额度支撑。2)在数据为王的今天,网络安全项目的建设过程中,开发团队必然会接触到应用系统的核心敏感数据。这就使得应用系统在建设初期就包含了网络安全建设团队人员信任的依赖。In today's increasingly serious network security problem, any network security owner is faced with two difficult choices: 1): How much network security project budget should be arranged in a network application system? Too few, the application system is equivalent to "streaking"? Too many, and not enough budget to support. 2) Today, when data is king, during the construction of network security projects, the development team will inevitably come into contact with the core sensitive data of the application system. This makes the application system include the trust of the network security construction team in the early stage of construction.
本发明的防火墙设计方法,可以有效的解决网络安全业主,特别是创业初期的网络安全业主,在创业初期面临的预算紧张和对网络安全建设团队的“信任”依赖。The firewall design method of the present invention can effectively solve the network security owners, especially the network security owners in the early stage of entrepreneurship, who face the tight budget and the "trust" dependence on the network security construction team in the early stage of entrepreneurship.
比如,对于一个物联网应用项目的创业团队而言,初期搭建其物联网应用系统时,可以采用图5(预算不到500元)或图6(预算不到2-3千元)结构的防火墙,作为其初期验证系统的防火墙。系统稳定了,且终端数量上去了,可以考虑采用图7(预算4、5千到上万元)结构的防火墙作为图5或图6验证结构的升级替代。企业再发展了,就可以以图7为发展原点,继续升级。所述的升级包括但不限于:用图7结构中CPU1扩展为CPU1-1、CPU1-2、……CPU1-n,对内网进行横向分割;用多个图7结构对内网进行纵向分割。而这种防火墙的升级、迭代,可以使得每一期的防火墙建设团队,永远都只接触到的是,碎片化的防火墙运行机制,从而使得网络安全业主,彻底摆脱了网络安全业主对防火墙建设团队的人员“信任”的依赖。For example, for an entrepreneurial team of an IoT application project, when building its IoT application system at the initial stage, the firewall with the structure shown in Figure 5 (with a budget of less than 500 yuan) or Figure 6 (with a budget of less than 2-3,000 yuan) can be used. , as the firewall of its initial verification system. When the system is stable and the number of terminals increases, consider adopting the firewall with the structure shown in Figure 7 (budget 4, 5,000 to tens of thousands) as an upgrade to the verification structure shown in Figure 5 or 6. As the enterprise develops, it can continue to upgrade with Figure 7 as the starting point of development. The upgrades include but are not limited to: expanding the CPU1 into CPU1-1, CPU1-2, ... CPU1-n in the structure of FIG. 7, and splitting the intranet horizontally; using multiple structures in FIG. 7 to split the intranet vertically . The upgrade and iteration of this kind of firewall can make the firewall construction team in each phase only come into contact with the fragmented firewall operation mechanism, so that the network security owner can completely get rid of the network security owner's concern for the firewall construction team. of people "trusted".
通过以上4个实施例的演示,相信业内的技术人员,都可以用本专利所述的方法,构建出符合其需求的高安全强度等级、低成本的具有极具性价比优势的防火墙。Through the demonstration of the above four embodiments, it is believed that those skilled in the art can use the method described in this patent to construct a firewall with high security strength level and low cost that meets their requirements and has a very cost-effective advantage.

Claims (8)

  1. 一种设计防火墙的方法,其特征在于:所述的设计防火墙的方法分为以下几个设计模块:A method for designing a firewall, characterized in that: the method for designing a firewall is divided into the following design modules:
    设计模块1:设计两个功能模块,所述的两个功能模块分别是:同外网连接的完成数据收/发功能的数据收发模块(模块1),同内网连接的完成数据处理功能的数据处理模块(模块2);Design module 1: Design two functional modules. The two functional modules are: a data transceiver module (module 1) that is connected to the external network and that completes the data receiving/transmitting function, and that is connected to the internal network to complete the data processing function. Data processing module (module 2);
    设计模块2:按数据流的传输方向,设计两个数据处理业务流程,所述的两个数据处理业务流程分别是:数据流从外网传入内网的数据输入业务流程(流程1);数据流从内网传输到外网的数据输出业务流程(流程2);Design module 2: Design two data processing business processes according to the transmission direction of the data flow. The two data processing business processes are: the data input business process (process 1) of the data flow from the external network to the internal network; The data output business process (process 2) of data flow transmission from the internal network to the external network;
    设计模块3:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块1同模块2之间的数据通道的个数和所采用的数据通讯的技术方案;Design module 3: Design the number of data channels between module 1 and module 2 and the technical scheme of data communication adopted according to the needs of security protection and data flow input/output business processes;
    设计模块4:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块1同外网连接的数据通道的个数和所采用的数据通讯的技术方案;Design module 4: According to the needs of security protection and the needs of data flow input/output business process, design the number of data channels connecting module 1 to the external network and the technical scheme of data communication used;
    设计模块5:根据安全防护的需要和数据流输入/输出业务流程的需要,设计模块2同内网连接的数据通道的个数和所采用的数据通讯的技术方案。Design module 5: According to the needs of security protection and the needs of data flow input/output business process, design the number of data channels connected to the intranet and the technical scheme of data communication adopted by module 2.
  2. 根据权利要求1所述的方法,其特征在于:所述的模块2按其结构的简单/复杂程度分为简单型模块2和复杂型模块2;简单型模块2又分为简单型模块2-1和简单型模块2-2两种简单型模块;所述简单型模块2-1由一个CPU和其独立管理的RAM构成,所述CPU运行在非操作系统环境之下,且有两个的数据通道;所述简单型模块2-2由一个CPU和其独立管理的RAM构成,所述CPU运行在非操作系统环境之下,且最少有三个的数据通道。The method according to claim 1, wherein: the module 2 is divided into a simple type module 2 and a complex type module 2 according to the simplicity/complexity of its structure; the simple type module 2 is further divided into a simple type module 2- 1 and the simple module 2-2 are two simple modules; the simple module 2-1 consists of a CPU and its independently managed RAM, the CPU runs in a non-operating system environment, and has two Data channel; the simple module 2-2 consists of a CPU and its independently managed RAM, the CPU runs in a non-operating system environment, and has at least three data channels.
  3. 根据权利要求1-2所述的方法,其特征在于:所述的复杂型模块2以简单型模块2为基础部件,通过如下但不限于如下2种连接方式构成:The method according to claims 1-2 is characterized in that: the complex module 2 takes the simple module 2 as the basic component, and is constituted by the following but not limited to the following two connection modes:
    方式1:由两个或两个以上的简单型模块2通过串联和/或并联方式构成的简单型模块2矩阵,且矩阵中简单型模块2-2的数据通道,最少有一个数据通道,既不同外网相连也不同内网相连;Mode 1: A simple module 2 matrix composed of two or more simple modules 2 in series and/or parallel, and the data channels of the simple modules 2-2 in the matrix must have at least one data channel, both Different external networks are connected to different internal networks;
    方式2:由两个或两个以上的简单型模块2和一台或多台含操作系统的信息终端组成的数据处理终端矩阵;在所述的矩阵中,简单型模块2处于含操作系统的信息终端同外网或内网之间,使得所述矩阵中的所有含操作系统的信息终端,同内网或外网无直接相连的数据通道。Mode 2: A data processing terminal matrix consisting of two or more simple modules 2 and one or more information terminals with an operating system; in the matrix, the simple module 2 is in a Between the information terminal and the external network or the internal network, all the information terminals including the operating system in the matrix have no data channel directly connected with the internal network or the external network.
  4. 根据权利要求1所述的方法,其特征在于:所述的模块1由两个或两个以上分别同外网相连的子模块1构成时,任意两个子模块1之间,在所述方法设计的防火墙范围内,没有任何的直接相连的数据通道。The method according to claim 1, characterized in that: when the module 1 is composed of two or more sub-modules 1 respectively connected to the external network, between any two sub-modules 1, in the method design Within the scope of the firewall, there are no directly connected data channels.
  5. 根据权利要求1所述的方法,其特征在于:所述的数据输入业务流程(流程1)由分别分布在模块1和模块2上的两个子业务流程组成:流程1-1:模块1接收外网输入的数据,通过模块1和模块2之间的数据通道将接收的数据传输到模块2;流程1-2:模块2对收到的数据进行处理,处理后的数据,或丢弃或送入内网。The method according to claim 1, wherein: the data input business process (process 1) is composed of two sub-business processes respectively distributed on module 1 and module 2: process 1-1: module 1 receives external Network input data, the received data is transmitted to module 2 through the data channel between module 1 and module 2; process 1-2: module 2 processes the received data, and the processed data is discarded or sent to intranet.
  6. 根据权利要求1所述的方法,其特征在于:所述的数据输出业务流程(流程2)由分别分布在模块1和模块2上的两个子业务流程组成:流程2-1:模块2接收从内网传来的数据,并对收到的数据进行处理,处理后的数据,或丢弃或通过模块1和模块2之间的数据通道传输到模块1;流程2-2:模块1将所收到的数据送入外网。The method according to claim 1, characterized in that: the data output business process (process 2) is composed of two sub-business processes distributed on module 1 and module 2 respectively: process 2-1: module 2 receives data from The data transmitted from the intranet is processed, and the processed data is either discarded or transmitted to module 1 through the data channel between module 1 and module 2; process 2-2: module 1 will receive The received data is sent to the external network.
  7. 根据权利要求5-6所述的方法,其特征在于:所述的对收到的数据进行处理,包括但不限于,为安全目的进行的数据的插入、删除、分拆、重组、校验、验证、 加密、解密。The method according to claims 5-6, wherein the processing of the received data includes, but is not limited to, data insertion, deletion, splitting, reorganization, verification, Authenticate, encrypt, decrypt.
  8. 根据权利要求1-4所述的方法,其特征在于:所述的数据通道包括但不限于并行数据总线和串行数据总线。The method according to claims 1-4, wherein the data channel includes but is not limited to a parallel data bus and a serial data bus.
PCT/CN2021/086347 2021-02-17 2021-04-12 Method for designing firewall WO2022174509A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110186294.1 2021-02-17
CN202110186294.1A CN112839058A (en) 2021-02-17 2021-02-17 Method for designing firewall

Publications (1)

Publication Number Publication Date
WO2022174509A1 true WO2022174509A1 (en) 2022-08-25

Family

ID=75933639

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/086347 WO2022174509A1 (en) 2021-02-17 2021-04-12 Method for designing firewall

Country Status (2)

Country Link
CN (1) CN112839058A (en)
WO (1) WO2022174509A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140258448A1 (en) * 2013-03-11 2014-09-11 Xerox Corporation Customer Vetted Device Status Communication System And Method
CN104363221A (en) * 2014-11-10 2015-02-18 青岛微智慧信息有限公司 Network safety isolation file transmission control method
CN107070907A (en) * 2017-03-31 2017-08-18 杭州通悟科技有限公司 Intranet and extranet data unidirectional transmission method and system
CN109032281A (en) * 2018-08-28 2018-12-18 西安工业大学 A kind of plug and play wireless network firewall device
CN109729105A (en) * 2019-03-26 2019-05-07 黄策 A kind of data packing method
CN111510436A (en) * 2020-03-27 2020-08-07 黑龙江省网络空间研究中心 Network security system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140258448A1 (en) * 2013-03-11 2014-09-11 Xerox Corporation Customer Vetted Device Status Communication System And Method
CN104363221A (en) * 2014-11-10 2015-02-18 青岛微智慧信息有限公司 Network safety isolation file transmission control method
CN107070907A (en) * 2017-03-31 2017-08-18 杭州通悟科技有限公司 Intranet and extranet data unidirectional transmission method and system
CN109032281A (en) * 2018-08-28 2018-12-18 西安工业大学 A kind of plug and play wireless network firewall device
CN109729105A (en) * 2019-03-26 2019-05-07 黄策 A kind of data packing method
CN111510436A (en) * 2020-03-27 2020-08-07 黑龙江省网络空间研究中心 Network security system

Also Published As

Publication number Publication date
CN112839058A (en) 2021-05-25

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Adeyinka Internet attack methods and internet security technology
Mairh et al. Honeypot in network security: a survey
Sabillon et al. Cybercriminals, cyberattacks and cybercrime
Gupta et al. Taxonomy of cloud security
Abdalrahman et al. Defending against cyber-attacks on the internet of things
Oberoi et al. SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS.
Ibrahim A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies
Gamundani et al. A review of new trends in cyber attacks: A zoom into distributed database systems
Biswal et al. Cyber‐crime prevention methodology
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Shah et al. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing
WO2022174509A1 (en) Method for designing firewall
Basholli et al. Security in telecommunication networks and systems
Birleanu et al. Malicious and deliberate attacks and power system resiliency
Mahalaxmi et al. Blockchain Solutions for IoT Devices Against DDoS Attacks: A Review
Singh et al. A hybrid model for cyberspace security
Lekssays et al. MalCon: A blockchain-based malware containment framework for Internet of Things
Duffany Computer Security
Luvanda Proposed Framework for Securing Mobile Banking Applications from Man in the Middle Attacks
Lokuge Security Concerns in Cloud Computing: A Review
Park A study about dynamic intelligent network security systems to decrease by malicious traffic
Vaezi et al. A Hundred Attacks in Distributed Systems
Badih et al. A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection
Veríssimo et al. Fundamental security concepts

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21926226

Country of ref document: EP

Kind code of ref document: A1