A kind of system and method for blocking worm attack
Technical field
The present invention relates to a kind of system and method for blocking worm attack, exactly, relate to a kind ofly, belong to the network security technology field of data communication based on the conduct interviews system and method for blocking worm attack of control of port.
Background technology
Since worm-type virus in 1988 came out, computer-based worms constantly brought disaster to network world with its quick, diversified circulation way.Particularly since 1999, the continuous appearance of high-risk network worm (Worm) virus, make World Economics suffered light then tens, the massive losses of hundred million dollars of heavy then hundreds ofs.
Network worm is a kind of malignant virus that spreads through the internet, it had both had many general character of virus, as propagated, disguised, destructive or the like, the while has some features of oneself again, as not utilizing file parasitism (what have only is present in the internal memory), network is caused denial of service, and combines or the like with hacking technique! Therefore, network worm virus is actually " malicious code " of hacking technique and virus technology fusion back formation.This virus has thoroughly changed traditional virus in the haunting impression of people.Everybody thought that the propagation and the destruction of virus were passive types in the past, only otherwise use pirated CDs, do not open of unknown origin mail, do not download some dangerous programs, generally can infective virus, just usually said " do not eat unclean food just not can fall ill " is the same.But this fusion virus with two kinds of technology of hacker in the characteristics that one forms " active malicious code of new generation " is: have the automatic fertility of self-replacation, utilize the automatic invasion of various leaks of system or network service to propagate; Can utilize and optimize method for scanning at the utmost point in the short time, infect ten hundreds of leaky computer systems.
The main harm of worm-type virus is to produce huge network attack flow, and the significant wastage network bandwidth causes the normal unobstructed operation of network to have a strong impact on.Its mechanism of action is: the computer system that infects worm-type virus can find at first that there is the computer system of leak in other on the network by search in large area, and this will produce a large amount of network traffic datas; After worm is successfully invaded other computer system, can on infected computer, produce a plurality of copies of self, each copy starts search utility again and seeks the new attack target, thereby forms the network traffics of flood tide, causes whole network congestion even paralysis.
At present, mainly utilize and in network, dispose intruding detection system (IDS, Intrusion DetectionSystem) network traffics analysis is found that network worm attacks, and carry out certain processing.Because intruding detection system is connected in parallel in the network, can only detect network passively and suffer which kind of attack, ability that its blocking-up is attacked is very limited, generally can only be by sending TCP reset (TCP replacement) bag or stoping attack with firewall linkage.If intruding detection system adopts the mode that sends TCP reset bag to stop worm propagation, will further increase network traffics again, the emphasis network burden.If it is the mode of employing and firewall linkage only can stop the worm attack flow from the outside, then powerless to the worm attack flow that stops network internal.
Summary of the invention
In view of this, the purpose of this invention is to provide a kind of based on the conduct interviews system and method for blocking worm attack of control of port, the present invention is after the worm checkout gear is found to infect the main frame of network worm virus, stop this main frame access network at access interface, infect worm-type virus with other main frame that prevents network internal, the main frame that also can stop network internal to infect worm-type virus starts worm attack to outer net, thereby ensure rapidly, spreading unchecked of blocking worm virus targetedly, the safety of network system.
In order to achieve the above object, the invention provides a kind of system of blocking worm attack, it is characterized in that: this system comprises at least:
Client, its inside are equipped with the client software of gathering place network worm information, carry out matching treatment so that worm information is sent to access control apparatus via the worm occluding device;
The worm occluding device is provided with anti-control port that module, a plurality of user insert and the network element that respective service is provided looked into of port for the user provides the network equipment of access, its inside; Each control port is made up of a control unit and a controlled cell, and the different network elements that controlled cell connected can provide different services; After receiving the access control instruction that access control apparatus returns, corresponding control port is carried out associative operation;
Access control apparatus comprises access control server at least, and this access control server inside is provided with two databases, distinguishes the worm type known in the storage networking and the port access control strategy of worm occluding device; Wherein the port access control strategy be at different control ports and with each port access control policy file one to one, each access control policy file comprises many access control policies; This device reads worm information, and in worm types of database and port access control strategy database, search coupling with worm type in the worm information and relevant information, beam back corresponding access control instruction according to matching result to the worm occluding device again.
The described worm information content comprises: the source MAC, source IP address and the worm type that infect the main frame of worm.
Described client is the intrusion detection device that the client software of gathering worm information is installed.
The function of respectively forming member in the described worm occluding device is:
The anti-module of looking into of port is responsible for the interface with client, receives worm information and carries out at wherein source MAC and/or source IP address that port is counter to be looked into from client, again according to the control unit of the anti-result who looks into of port with worm direct information control corresponding port;
Control unit sends to the access control apparatus of coupling worm with worm information, and is responsible for receiving the access control instruction that access control apparatus is beamed back, and the while is according to the operation of access control commands for controlling controlled cell;
Controlled cell is an authorisation device, and enter three kinds of operating states respectively according to the access control instruction: licensing status, coupled main frame can be visited all network elements that this port connects, and then obtain the various services that these network elements provide; The part licensing status allows to insert part or the special network element that this port of host access connects; Unauthorized state stops and inserts this port of host access;
Provide the network element of service, the Internet resources that can visit for the main frame that is connected with the worm occluding device.
Described worm occluding device is a switch, and this moment, described network was an internal lan.
Described access control apparatus further comprises certificate server, so that adopt the user identity that usemame/password is docked into main frame to authenticate.
In order to achieve the above object, the present invention also provides a kind of method that network worm is attacked of blocking, and it is characterized in that: comprise the steps: at least
(1) whether its place intrusion detection device of client software poll detects the discovery worm attack, in case discovery worm attack, client software extracts the relevant information of this worm attack, after the encapsulation of " type, length, content " form, use network communication protocol that this worm packets of information is sent to the worm occluding device;
(2) the worm occluding device is earlier delivered to the anti-anti-reason of investigating and prosecuting of module of looking into of port with worm information, find out the user access port corresponding with source MAC and/or source IP address in the worm information after, transfer worm information to this access interface corresponding control unit;
(3) described control unit sends to access control apparatus by the interface with access control apparatus with worm information;
(4) access control apparatus mates worm type information in the worm information and worm types of database, if find occurrence, then from corresponding port access control policy file, select the corresponding ports access control policy, and after being encapsulated as the access control instruction with the form of the procotol of communicating by letter between access control apparatus and the worm occluding device, send to the control unit of worm occluding device; If do not find occurrence, the then direct access control that sends acquiescence is instructed to the control unit of worm occluding device;
(5) control unit read access control command is provided with the licensing status of corresponding controlled cell according to this instruction: if the access control of acquiescence instruction, then corresponding controlled cell is set to unauthorized state; If comprise concrete access control policy in the access control instruction, then with the controlled cell of this policy configurations to correspondence.
The network communication protocol that client software transmission worm packets of information is used in the described step (1) comprises transmission control protocol TCP (Transport Control Protocol), User Datagram Protoco (UDP) UDP (User DatagramProtocol), Internet Control Message Protocol ICMP (Internet Control Message Protocol), local area network (LAN) Extensible Authentication Protocol EAPOL (Extensible Authentication Protocol Over LAN).
Type field in described step (1) encapsulation format is the sign of 3bit, wherein bright this packet of first bit bit table is the worm packets of information, latter two bit position is used to determine the anti-anti-mode of looking into of the employed port of module of looking into of worm occluding device middle port, and the acquiescence mode is for to look into according to source MAC is counter.
Described step (2) middle port is counter looks into the anti-investigation reason that module carries out three kinds of selective anti-modes of looking into, and is respectively:
Look into according to source MAC is counter: the MAC Address database of storing in source MAC in the worm information and the worm occluding device is compared, this MAC Address database is indicated the corresponding relation of MAC Address and each control port of worm occluding device, if in the MAC Address database, find this source MAC, then with the worm message transport to the control port corresponding with this source MAC; Otherwise, abandon this worm packets of information;
Look into according to source IP address is counter: the request of the source IP address broadcast address analysis protocol ARP (Address Resolution Protocol) in worm information earlier, if do not receive the response of ARP request, promptly do not receive the MAC Address response corresponding, abandon this worm packets of information with this source IP address; If receive the MAC Address corresponding response with this source IP address, then this MAC Address and MAC Address database are compared, if in the MAC Address database, find this source MAC, then with the worm message transport to the control corresponding port; Otherwise, abandon this worm packets of information;
According to MAC Address with the IP address is counter looks into: look into according to the source MAC of worm information is counter earlier, if do not find this source MAC in the MAC Address database, then further the source IP address by this worm information carries out counter the looking into of the port second time.
The present invention is a kind of based on the conduct interviews system and method for blocking worm attack of control of port, has the following advantages:
Validity: after finding worm-type virus, the present invention can in time stop or limit the main frame or the device access network of infective virus, has blocked it and has infected the approach of other network equipments, thereby effectively prevented spreading unchecked of worm attack in the network.Simultaneously can be in controlled cell the configuration access control strategy, the main frame of feasible infection worm-type virus or equipment only are allowed to the patch server in the accesses network, make this main frame or equipment in time stamp patch and repair leak, thereby reduce the possibility that infects worm-type virus once more.
Targetedly: the present invention is based on the port control that conducts interviews, directly will insert the main frame or the equipment of this port and isolate, and the access device of other ports is unaffected to the visit of network.Dispose the access control policy of a plurality of different ports in the access control server, can send corresponding access control instruction at different access devices.
Invest less: structure of the present invention is quite simple, client only need be collected worm information and be sent to the worm occluding device with certain form, function is comparatively simple, only needs to add in existing worm checkout gear (as intrusion detection device) client software during actual enforcement.The worm occluding device can utilize the existing network equipment of supporting the IEEE802.1x agreement and having the port inverse check function, and only need are developed accordingly the function of control unit and expanded.
In sum, the method of blocking worm attack of the present invention is that worm information is come main frame is carried out access control based on port as a kind of safety and Health fingerprint that inserts main frame, issue access control policy by access control server at the concrete access interface of this network equipment, can be under the situation of other main frames or the normal accesses network of equipment, effectively stop worm-type virus spreading in network, spread unchecked, simultaneously by reasonably being provided with, can also make the user in time stamp patch, reduce the possibility that infects worm-type virus again for the main frame or the equipment that infect worm-type virus.Therefore, the present invention can be widely used in the Prevention-Security of corporate intranet, and effectively the isolation network worm greatly reduces the influence of network worm attack to main frame and network.
Description of drawings
Fig. 1 is that the conduct interviews system configuration of blocking worm attack of control of the present invention is formed schematic diagram.
Fig. 2 is the conduct interviews method flow block diagram of blocking worm attack of control of the present invention.
Fig. 3 is that the example structure of the system of blocking worm attack of the present invention is formed schematic diagram.
Fig. 4 is the deployment architecture schematic diagram of embodiment in network shown in Figure 3.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with drawings and Examples.
Working mechanism of the present invention is: the main frame in the network connects other network segments or Internet via switch usually, isolates if directly will infect the main frame of worm-type virus on switch, just effective blocking worm attack.Because IEEE802.1x can stop the not customer access network by verifying based on the access-control protocol of port, the present invention is improved on the basis of this protocol function and principle and is expanded realized the preventing infections main frame of worm-type virus or the expectation function of device access network.
Referring to Fig. 1, introduce the composition structure of system of the present invention, it is to realize goal of the invention by the worm occluding device and with two interfaces of client and access control apparatus.Its main member includes:
Client 1, its inner client software of installing is collected worm information, and worm information is sent to access control apparatus via the worm occluding device carries out matching treatment; Worm information includes but are not limited to: the source host MAC Address of infection worm, source IP address, worm type etc.
Worm occluding device 2 is provided with anti-module, a plurality of network element that the control port of access is provided and respective service is provided for the user looked into of port for the user provides the network equipment of access, its inside; Each control port is made up of a control unit and a controlled cell, and the different network elements that controlled cell connected can provide different services; After receiving the access control instruction that access control apparatus returns, corresponding control port is carried out associative operation.
Its middle port is counter to be looked into module and is responsible for interface with client, receive worm information and carry out at wherein source MAC and/or source IP address that port is counter to be looked into from client, then according to the anti-result who looks into of port with worm direct information control corresponding unit k, undertaken alternately by control unit and access control apparatus.
Control unit sends to access control apparatus with worm information, and is responsible for receiving the access control instruction that access control apparatus is beamed back, and the while is according to the operation behavior of access control commands for controlling controlled cell.
Controlled cell is an authoring system, and under normal circumstances controlled cell is in licensing status, and main frame that is attached thereto or equipment can be visited all services that this port provides; But controlled cell also Be Controlled unit is set to other two states: unauthorized state-prevention inserts the service that this port of host access provides; Part licensing status-permission inserts the part service that this port of host access provides, as visiting patch server etc.
Access control apparatus 3 is generally an access control server, and its inside is provided with two databases, distinguishes the worm type known in the storage networking and the port access control strategy of worm occluding device; Wherein the port access control strategy be at different control ports and with each port access control policy file one to one, each access control policy file comprises many access control policies; After this device reads worm information, in worm types of database and port access control strategy database, search coupling with worm type in the worm information and relevant information, beam back corresponding access control instruction according to matching result to the worm occluding device again.
Referring to Fig. 2, in case when the worm attack incident took place, the present invention can in time block spreading of attack and spread unchecked, concrete grammar and step are:
(1) whether its place intrusion detection device of client software poll detects the discovery worm attack, in case discovery worm attack, client software extracts the relevant information of this worm attack, after the encapsulation of " type, length, content " form, use TCP, UDP, network communication protocols such as ICMP, EAPOL that this worm packets of information is sent to the worm occluding device;
(2) the worm occluding device is delivered to the anti-anti-reason of investigating and prosecuting of module of looking into of port with worm information earlier, after finding out the user access port corresponding, again worm information is transferred to this access interface corresponding control unit with source MAC and/or source IP address in the worm information;
(3) described control unit sends to access control apparatus by the interface with access control apparatus with worm information;
(4) access control apparatus mates worm type information in the worm information and worm types of database, if find occurrence, then from corresponding port access control policy file, select the corresponding ports access control policy, and after the form encapsulation with the procotol of communicating by letter between access control apparatus and the worm occluding device, send to the control unit of worm occluding device; If do not find occurrence, the then direct access control that sends acquiescence is instructed to the control unit of worm occluding device;
(5) control unit read access control command is provided with the licensing status of corresponding controlled cell according to this instruction: if the access control of acquiescence instruction, then corresponding controlled cell is set to unauthorized state; If comprise concrete access control policy in the access control instruction, then with the controlled cell of this policy configurations to correspondence.
1., 2., 3. represent operating process separately in client, worm occluding device and the access control apparatus respectively among Fig. 2.
The present invention can implement test on the basis of IEEE802.1x based on the access control technology of port, following mask body is introduced the situation of this embodiment.
Referring to Fig. 3, the embodiment of system of the present invention forms structure and mainly comprises four parts: client 1 (intrusion detection device), worm occluding device 2, certificate server 31 and access control server 32.
In IEEE 802.1x access authentication system generally with user terminal as client 1, this terminal is installed a client software usually, the user initiates authenticating user identification by starting this client software, and Verification System allows according to authentication result or the prevention customer access network.
In the present embodiment, intrusion detection device is equivalent to client 1, client software of the present invention wherein has been installed, when intrusion detection device is found worm attack, this software obtains worm information automatically, and becomes the verify data packet format of IEEE 802.1x agreement to send to worm occluding device 2 with the EAPOL protocol encapsulation this information.Authentication data packet encapsulates with " type, length, content " form, wherein type field is the special identifier of 3bit, wherein bright this authentication data packet of first bit bit table is the worm packets of information of being sent by intrusion detection device, and latter two bit position is used to determine the anti-anti-mode of looking into of the employed port of module of looking into of worm occluding device middle port.
Usually support the network equipment of IEEE 802.1x authentication mode two logic ports to be arranged: controlled ports and unconfined end mouth corresponding to the port of different user (physical port, or the MAC Address of subscriber equipment, VLAN, IP etc.).The unconfined end mouth is in the diconnected state all the time, is mainly used to transmit the EAPOL protocol frame, can guarantee that client 1 can send or accept authentication all the time.Controlled ports is only just opened under the state that authentication is passed through, and is used for delivery network resource and service.If by authentication, then controlled ports is not in unauthorized state to the user, the service that the user can't access authentication system provides.User's controlled ports is in unauthorized state during beginning, can't visit any Internet resources, and through behind the authenticating user identification, controlled ports is set as licensing status.Worm occluding device 2 is exactly the network equipment-switch-realization of employing support IEEE 802.1x agreement in the present embodiment, controlled ports wherein is the controlled cell among the present invention, uncontrolled port still need improve uncontrolled port and could satisfy the requirement of the present invention to control unit as the control unit among the present invention.
Because intrusion detection device passes through the flow of multiple host in the mirror port monitor network usually, only include the information that infects the worm-type virus main frame in the worm information that monitors, the information that does not have the network access equipment port, and the present invention requires to control based on access port, therefore, present embodiment need increase also in the network access equipment of supporting IEEE 802.1x agreement that port is counter looks into the designing requirement that module could satisfy worm occluding device 2 among the present invention.The anti-module of looking into of port unpacks analysis to the EAPOL protocol frame that comprises worm information that client software sends, find out and wherein MAC Address or IP address information corresponding port, and worm information is encapsulated as the EAPOL protocol frame again at the control unit of this port, send to certificate server 31 with radius protocol then.
Because the EAPOL agreement is that IEEE 802.1x agreement is defined, usually support the equipment of IEEE 802.1x agreement can both support the EAPOL agreement, therefore, present embodiment introducing certificate server 31 is used for exchange message between worm occluding device 2 and the access control server 32.Certificate server 31 is except the user identity that adopts usemame/password and dock main frame authenticates, also to be responsible for and to extract with the worm information in the EAPOL protocol frame of radius protocol encapsulation, send to access control server 32 with the encapsulation of RADIUS packet format again then.Certificate server 31 uses the radius protocol of standard to communicate by letter with access control server 32, and in this process, certificate server 31 is as the client of RADIUS, and access control server 32 is as the server end of RADIUS.The content of worm finger print information is encapsulated in the RADIUS bag with " type, length, content " form, wherein the value of type field must make four can understand the implication of this specific fields by client 1, worm occluding device 2, certificate server 31 and access control server 32 4 unified Definition.
Access control server 32 provides correct port arrangement strategy for worm occluding device 2.This server 32 is after receiving the authentication request packet that certificate server 31 sends, therefrom extract worm information, and the worm type of the worm type information in the worm information and its database storage mated, if there is not occurrence, then send authentication failed message to certificate server 31, behind the certificate server 31 transforming message forms, this instruction is sent to the control unit of worm occluding device 2, thereby block corresponding controlled cell, stop the host access network that inserts this port.If worm type occurrence is arranged, then access control server 32 is searched the corresponding ports access control policy, serve as the control unit that the courier sends to this control strategy instruction worm occluding device 2 by certificate server 31 equally, thereby corresponding controlled cell is set, inserts the Internet resources of the host access of this port with restriction.
Wherein certificate server 31 and access control server 32 have been formed the access control apparatus 3 among the present invention program jointly.
The deployment architecture of present embodiment in network as shown in Figure 4, each main frame of internal lan is connected into external network by switch, the switching equipment at this place is the worm occluding device described in the present invention.
At this moment, if certain host A has infected worm-type virus in the Intranet, when intrusion detection device is found the constantly outside transmitted traffic of host A, thereby after identifying this worm attack, worm information is sent to the worm occluding device, and this worm information comprises MAC Address, the IP address of host A, type of worm attack etc.After by certificate server and access control server this information being handled then, the result is fed back to the worm occluding device.At last by the worm occluding device according to this flow of outwards sending of main control system A as a result, thereby avoided worm-type virus further to infect other main frames in the network.