[go: up one dir, main page]

CN103634306B - The safety detection method and safety detection server of network data - Google Patents

The safety detection method and safety detection server of network data Download PDF

Info

Publication number
CN103634306B
CN103634306B CN201310576843.1A CN201310576843A CN103634306B CN 103634306 B CN103634306 B CN 103634306B CN 201310576843 A CN201310576843 A CN 201310576843A CN 103634306 B CN103634306 B CN 103634306B
Authority
CN
China
Prior art keywords
security
file
data
network
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310576843.1A
Other languages
Chinese (zh)
Other versions
CN103634306A (en
Inventor
张聪
唐海
邱鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qizhi Business Consulting Co ltd
Beijing Qihoo Technology Co Ltd
360 Digital Security Technology Group Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310576843.1A priority Critical patent/CN103634306B/en
Publication of CN103634306A publication Critical patent/CN103634306A/en
Application granted granted Critical
Publication of CN103634306B publication Critical patent/CN103634306B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供了一种网络数据的安全检测方法和安全检测服务器。其中,网络数据的安全检测方法包括:抓取网络中传输的数据包;对数据包进行组包以还原传输控制协议TCP连接数据,识别TCP连接数据使用的应用层协议;使用与应用层协议对应的安全扫描模块对TCP连接数据进行安全扫描。利用本发明的技术方案,抓取数据包并进行组包后,根据数据包对应的应用层协议进行数据的安全监测,在重组的应用层协议的数据基础上进行协议分析,针对性强,可以快速有效地识别网络攻击,提高了网络安全性。

The invention provides a network data safety detection method and a safety detection server. Among them, the security detection method of network data includes: grabbing the data packets transmitted in the network; grouping the data packets to restore the transmission control protocol TCP connection data, identifying the application layer protocol used by the TCP connection data; using the protocol corresponding to the application layer protocol The security scanning module performs security scanning on TCP connection data. Utilize the technical solution of the present invention, after grabbing the data packet and carrying out grouping, carry out the security monitoring of data according to the application layer protocol corresponding to the data packet, carry out protocol analysis on the basis of the data of the recombined application layer protocol, the pertinence is strong, can Identify network attacks quickly and efficiently, improving network security.

Description

网络数据的安全检测方法和安全检测服务器Network data security detection method and security detection server

技术领域technical field

本发明涉及互联网安全领域,特别是涉及一种网络数据的安全检测方法和安全检测服务器。The invention relates to the field of Internet security, in particular to a network data security detection method and a security detection server.

背景技术Background technique

恶意程序是一个概括性的术语,指任何故意创建用来执行未经授权并通常是有害行为的软件程序。计算机病毒、后门程序、键盘记录器、密码盗取者、Word和Excel宏病毒、引导区病毒、脚本病毒(batch,windows shell,java等)、木马、犯罪软件、间谍软件和广告软件等等,都是一些可以称之为恶意程序的例子。Malicious program is an umbrella term for any software program intentionally created to perform unauthorized and often harmful acts. Computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.), Trojan horses, crimeware, spyware and adware, etc., These are examples of what could be called malicious programs.

传统的恶意程序防杀主要依赖于特征库匹配或者行为分析。特征库匹配的识别方式为:病毒查杀引擎读取本地文件并与特征库中的所有特征码“关键词”进行匹配,如果发现文件程序代码被命中,就可以判定该文件程序为恶意程序。行为分析的识别方式为:程序的行为作为判断恶意程序的依据,其中衍生出在本地使用特征库、在本地设置行为阈值以及在本地启发式杀毒的方式来判别、拦截恶意程序的行为。Traditional anti-malware programs mainly rely on signature database matching or behavior analysis. The identification method of signature database matching is as follows: the antivirus engine reads the local file and matches all the signature code "keywords" in the signature database. If the file program code is found to be hit, it can be determined that the file program is a malicious program. The identification method of behavior analysis is: the behavior of the program is used as the basis for judging malicious programs, and the behavior of identifying and blocking malicious programs is derived by using the signature library locally, setting behavior thresholds locally, and heuristically killing viruses locally.

本地主动防御很容易对恶意程序造成免杀,例如,通过对恶意程序加壳或修改该恶意程序的特征码即可以避开本地主动防御的特征库防杀模式;通过针对恶意程序的行为,减少或替换恶意程序执行的相关行为从而避免触发行为阈值防杀模式的启动上限。另外,本地主动防御还是要依赖于本地数据库的及时更新。Local active defense can easily prevent malicious programs from being killed. For example, by packing a malicious program or modifying the signature code of the malicious program, the signature library anti-kill mode of local active defense can be avoided; by targeting malicious programs, reducing Or replace the relevant behaviors performed by malicious programs so as to avoid triggering the upper limit of the behavior threshold anti-killing mode. In addition, local active defense still depends on the timely update of the local database.

基于以上问题,一些公司提出了“云查杀技术”,即将为数众多的客户端电脑当成一个病毒采集器,由他们将日常遭遇到的可疑文件上传至服务器端,这样服务器便能通过对上传样本进行分析,实现新病毒的快速响应。Based on the above problems, some companies have proposed "cloud scanning and killing technology", which means that a large number of client computers will be used as a virus collector, and they will upload the suspicious files they encounter daily to the server, so that the server can pass the uploaded samples. Perform analysis to enable rapid response to new viruses.

然而,目前的“云查杀技术”也仅仅能够将下载下来的文件进行扫描处理,而对于那些需要耗费大量网络资源下载的病毒或者木马文件则需要下载命令执行完毕后才有可能发现并删除。而对于正在网络中正在传输的内容来说却是无能为力。However, the current "cloud scanning and killing technology" can only scan and process downloaded files, and for those virus or Trojan files that need to consume a lot of network resources to download, it is possible to find and delete them only after the download command is executed. But it is powerless for the content that is being transmitted in the network.

发明内容Contents of the invention

鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的网络数据的安全检测服务器和相应的网络数据的安全检测方法。In view of the above problems, the present invention is proposed to provide a network data security detection server and a corresponding network data security detection method that overcome the above problems or at least partially solve the above problems.

基于本发明的一个目的,提供了一种网络数据的安全检测方法。该网络数据的安全检测方法包括:抓取网络中传输的数据包;对数据包进行组包以还原传输控制协议TCP连接数据,识别TCP连接数据使用的应用层协议;使用与应用层协议对应的安全扫描模块对TCP连接数据进行安全扫描。Based on an object of the present invention, a security detection method for network data is provided. The security detection method of the network data comprises: grabbing the data packets transmitted in the network; grouping the data packets to restore the transmission control protocol TCP connection data, identifying the application layer protocol used by the TCP connection data; using the corresponding application layer protocol The security scanning module performs security scanning on TCP connection data.

可选地,抓取网络中传输的数据包包括:利用交换机的网络旁路复制网络中传输的数据包并送入安全检测服务器的网卡。Optionally, capturing the data packets transmitted in the network includes: using the network bypass of the switch to copy the data packets transmitted in the network and sending them to the network card of the security detection server.

可选地,对数据包进行组包以还原传输控制协议TCP连接数据包括:将数据包写入缓存文件;对写入缓存文件的数据包进行重组,还原为TCP连接数据。Optionally, grouping the data packets to restore the transmission control protocol TCP connection data includes: writing the data packets into a cache file; reassembling the data packets written into the cache file to restore them to the TCP connection data.

可选地,对写入缓存文件的数据包进行重组包括:解析数据包中TCP报头中的序号和确认序号;按照序号和确认序号对数据包按照TCP的传输顺序进行排序。Optionally, reassembling the data packets written into the cache file includes: parsing the sequence number and the confirmation sequence number in the TCP header in the data packet; and sorting the data packets according to the TCP transmission order according to the sequence number and the confirmation sequence number.

可选地,识别TCP连接数据使用的应用层协议包括:按照重组后的数据包的数据特征和端口特征判断数据包使用的应用层协议。Optionally, identifying the application layer protocol used by the TCP connection data includes: judging the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet.

可选地,数据包使用的应用层协议包括:文件传输协议FTP、简单邮件传输协议SMTP、邮局协议的第3个版本POP3、超文本传输协议HTTP、简单网络管理协议SNMP、网络新闻传输协议NNTP、域名系统DNS解析请求。Optionally, the application layer protocol used by the data packet includes: File Transfer Protocol FTP, Simple Mail Transfer Protocol SMTP, the third version of Post Office Protocol POP3, Hypertext Transfer Protocol HTTP, Simple Network Management Protocol SNMP, Network News Transfer Protocol NNTP , Domain Name System DNS resolution request.

可选地,使用与应用层协议对应的安全扫描模块对TCP连接数据进行安全扫描之后还包括:从TCP连接数据中提取出文件,并对文件进行云安全分析和动态行为安全分析。Optionally, after using the security scanning module corresponding to the application layer protocol to perform security scanning on the TCP connection data, the method further includes: extracting files from the TCP connection data, and performing cloud security analysis and dynamic behavior security analysis on the files.

可选地,对文件进行云安全分析包括:计算文件的散列值,并将散列值与云安全服务器中的散列值危险列表比对;和/或提取文件的统一资源定位符URL,并将URL与云安全服务器中的URL危险列表比对。Optionally, performing cloud security analysis on the file includes: calculating the hash value of the file, and comparing the hash value with the hash value risk list in the cloud security server; and/or extracting the Uniform Resource Locator URL of the file, And compare the URL with the URL danger list in the cloud security server.

可选地,将URL与云安全服务器中的URL危险列表比对包括:提取URL对应的网址密文;将网址密文与云安全服务器数据库中存储的密文进行匹配,数据库中存储的密文包括被标记为恶意网址的密文;若网址密文与云安全服务器数据库中存储的密文存在匹配,确定URL存在恶意内容。Optionally, comparing the URL with the URL risk list in the cloud security server includes: extracting the URL ciphertext corresponding to the URL; matching the URL ciphertext with the ciphertext stored in the cloud security server database, and the ciphertext stored in the database Including the ciphertext marked as a malicious URL; if the ciphertext of the URL matches the ciphertext stored in the cloud security server database, it is determined that the URL contains malicious content.

可选地,对文件进行动态行为安全分析包括:根据文件的类型确定对应的虚拟检测环境;在虚拟检测环境下运行或打开文件,并监控虚拟检测环境的运行状态,生成运行状态日志;对运行状态日志进行分析,得到文件的动态行为安全分析结果。Optionally, performing dynamic behavioral security analysis on files includes: determining the corresponding virtual detection environment according to the type of the file; running or opening the file in the virtual detection environment, monitoring the running status of the virtual testing environment, and generating a running status log; The status log is analyzed to obtain the dynamic behavior security analysis results of the file.

可选地,对运行状态日志进行分析包括:对运行状态日志中文件触发的各项操作操作行为按照预先设置的权重进行加权累加;判断加权累加值是否大于预设值,若是,确定文件为恶意文件。Optionally, analyzing the running status log includes: performing weighted accumulation of various operations triggered by files in the running status log according to preset weights; judging whether the weighted cumulative value is greater than the preset value, and if so, determining that the file is malicious document.

可选地,监控虚拟检测环境的运行状态包括:监控虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。Optionally, monitoring the running state of the virtual testing environment includes: monitoring memory changes, registry modifications, process changes, and network connections of the virtual testing environment.

基于本发明的另一个方面,还提供了一种网络数据的安全检测服务器。该网络数据的安全检测服务器包括:数据包抓取接口,用于抓取网络中传输的数据包;组包装置,用于对数据包进行组包以还原传输控制协议TCP连接数据,协议识别装置,识别TCP连接数据使用的应用层协议;数据包安全扫描装置,用于使用与应用层协议对应的安全扫描模块对TCP连接数据进行安全扫描。Based on another aspect of the present invention, a security detection server for network data is also provided. The security detection server of the network data includes: a data packet grabbing interface, which is used to grab data packets transmitted in the network; a grouping device, which is used to group the data packets to restore the transmission control protocol TCP connection data, and a protocol identification device Identifying the application layer protocol used by the TCP connection data; the data packet security scanning device is used to perform security scanning on the TCP connection data by using a security scanning module corresponding to the application layer protocol.

可选地,数据包抓取接口被配置为:利用交换机的网络旁路复制网络中传输的数据包并送入安全检测服务器的网卡。Optionally, the data packet capture interface is configured to: use the network bypass of the switch to copy the data packets transmitted in the network and send them to the network card of the security detection server.

可选地,组包装置被配置为:将数据包写入缓存文件;对写入缓存文件的数据包进行重组,还原为TCP连接数据。Optionally, the packet grouping device is configured to: write the data packets into the cache file; reassemble the data packets written into the cache file, and restore them to TCP connection data.

可选地,协议识别装置被配置为:按照重组后的数据包的数据特征和端口特征判断数据包使用的应用层协议。Optionally, the protocol identification device is configured to: judge the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet.

可选地,数据包安全扫描装置包括:文件传输协议FTP扫描模块,用于对FTP协议的数据包进行安全扫描;简单邮件传输协议SMTP扫描模块,用于SMTP协议的数据包进行安全扫描;邮局协议的第3个版本POP3扫描模块,用于POP3协议的数据包进行安全扫描;超文本传输协议HTTP扫描模块,用于HTTP协议的数据包进行安全扫描;简单网络管理协议SNMP扫描模块,用于SNMP协议的数据包进行安全扫描;网络新闻传输协议NNTP扫描模块,用于NNTP协议的数据包进行安全扫描;域名系统DNS解析请求扫描模块,用于DNS解析请求协议的数据包进行安全扫描。Optionally, the data packet security scanning device includes: a file transfer protocol FTP scanning module, which is used to perform security scanning on the data packets of the FTP protocol; a simple mail transfer protocol SMTP scanning module, which is used to perform security scanning on the data packets of the SMTP protocol; The third version of the protocol, the POP3 scanning module, is used for security scanning of data packets of the POP3 protocol; the hypertext transfer protocol HTTP scanning module is used for security scanning of data packets of the HTTP protocol; the simple network management protocol SNMP scanning module is used for SNMP protocol data packets for security scanning; Network News Transfer Protocol NNTP scanning module for security scanning of NNTP protocol data packets; Domain Name System DNS resolution request scanning module for DNS resolution request protocol data packets for security scanning.

可选地,本发明提供的网络数据的安全检测服务器还包括:文件分析装置,用于从TCP连接数据中提取出文件,并对文件进行云安全分析和动态行为安全分析。Optionally, the network data security detection server provided by the present invention further includes: a file analysis device, which is used to extract files from the TCP connection data, and perform cloud security analysis and dynamic behavior security analysis on the files.

可选地,文件分析装置包括:散列值云分析模块,用于计算文件的散列值,并将散列值与云安全服务器中的散列值危险列表比对;URL云分析模块,用于提取文件的统一资源定位符URL,并将URL与云安全服务器中的URL危险列表比对。Optionally, the file analysis device includes: a hash value cloud analysis module, which is used to calculate the hash value of the file, and compares the hash value with the hash value danger list in the cloud security server; the URL cloud analysis module uses It is used to extract the Uniform Resource Locator URL of the file, and compare the URL with the URL danger list in the cloud security server.

可选地,动态行为安全分析模块,用于根据文件的类型确定对应的虚拟检测环境;在虚拟检测环境下运行或打开文件,并监控虚拟检测环境的运行状态,生成运行状态日志;对运行状态日志进行分析,得到文件的动态行为安全分析结果。Optionally, the dynamic behavior security analysis module is used to determine the corresponding virtual detection environment according to the type of the file; run or open the file in the virtual detection environment, and monitor the running status of the virtual testing environment to generate a running status log; check the running status The log is analyzed to obtain the dynamic behavior security analysis results of the file.

可选地,动态行为安全分析模块监控虚拟检测环境的运行状态包括:监控虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。Optionally, the monitoring of the running status of the virtual testing environment by the dynamic behavior security analysis module includes: monitoring the memory changes, registry modification, process changes, and network connections of the virtual testing environment.

本发明提供的网络数据的安全检测方法和安全检测服务器,抓取数据包并进行组包后,根据数据包对应的应用层协议进行数据的安全监测,在重组的应用层协议的数据基础上进行协议分析,针对性强,可以快速有效地识别网络攻击,提高了网络安全性。The security detection method and the security detection server of the network data provided by the present invention, after capturing the data packets and grouping them, perform data security monitoring according to the application layer protocol corresponding to the data packets, and perform data security monitoring on the basis of the reorganized application layer protocol data. Protocol analysis is highly targeted and can quickly and effectively identify network attacks, improving network security.

进一步地,本发明的网络数据的安全检测方法,实现了高速网络流量的数据包重组,能够支持高速流量多IP连接高并发的网络环境,提高了网络安全监测的效率。Furthermore, the network data security detection method of the present invention realizes data packet reassembly of high-speed network traffic, can support a network environment with high-speed traffic, multiple IP connections and high concurrency, and improves the efficiency of network security monitoring.

又进一步地,对网络中传输的文件实现动态分析和云分析,提高了文件安全分析的全面性,安全可靠地保障了网络安全。Furthermore, the dynamic analysis and cloud analysis of files transmitted in the network are realized, which improves the comprehensiveness of file security analysis and guarantees network security safely and reliably.

上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.

根据下文结合附图对本发明具体实施例的详细描述,本领域技术人员将会更加明了本发明的上述以及其他目的、优点和特征。Those skilled in the art will be more aware of the above and other objects, advantages and features of the present invention according to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings.

附图说明Description of drawings

通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:

图1是根据本发明一个实施例的网络数据的安全检测服务器100的示意图;FIG. 1 is a schematic diagram of a security detection server 100 for network data according to an embodiment of the present invention;

图2是根据本发明一个实施例的网络数据的安全检测服务器100中数据包安全扫描装置140的示意图;2 is a schematic diagram of a data packet security scanning device 140 in the security detection server 100 of network data according to an embodiment of the present invention;

图3是根据本发明一个实施例的网络数据的安全检测服务器100中文件分析装置150的示意图;以及FIG. 3 is a schematic diagram of a file analysis device 150 in the security detection server 100 of network data according to an embodiment of the present invention; and

图4是根据本发明一个实施例的网络数据的安全检测方法的示意图。Fig. 4 is a schematic diagram of a security detection method for network data according to an embodiment of the present invention.

具体实施方式detailed description

在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.

图1是根据本发明一个实施例的网络数据的安全检测服务器100的示意图,如图所示,该网络数据的安全检测服务器100一般性包括:数据包抓取接口110、组包装置120、协议识别装置130、数据包安全扫描装置140;此外根据需要还可以增加设置文件分析装置150。服务器100可以基于Linux或其他基于Linux的平台实现。1 is a schematic diagram of a security detection server 100 for network data according to an embodiment of the present invention. As shown in the figure, the security detection server 100 for network data generally includes: An identification device 130, a data packet security scanning device 140; in addition, a configuration file analysis device 150 can also be added as required. The server 100 can be implemented based on Linux or other Linux-based platforms.

在以上安全检测服务器100中,数据包抓取接口110用于抓取网络中传输的数据包。抓取数据包可以采用通过网络数据旁路抓取数据包并导入安全检测服务器100的方式进行。例如,在网络通道中设置一个旁路,将网络流量中的数据包由数据包抓取接口110导入到服务器100。一种具体的实现方式为:打开交换机的旁路开关,通过硬件方式复制数据包并传输到服务器100的网卡,利用抓包工具对网卡的驱动进行修改,将数据包直接发送给组包装置120。In the above security detection server 100, the data packet capture interface 110 is used to capture the data packets transmitted in the network. Capturing the data packets can be carried out by capturing the data packets through the network data bypass and importing them into the security detection server 100 . For example, a bypass is set in the network channel, and the data packets in the network traffic are imported to the server 100 through the data packet capture interface 110 . A specific implementation method is: open the bypass switch of the switch, copy the data packet by hardware and transmit it to the network card of the server 100, use the packet capture tool to modify the driver of the network card, and directly send the data packet to the packet assembly device 120 .

相比于以上数据包抓取接口110的抓包方式,传统应用程序连接网络的过程为:通过操作系统提供的应用程序接口(Application Program Interface,简称API)发送连接网络的请求,操作系统接收到这种网络请求后,接收应用程序发送的数据,并对接收到的数据进行封装,之后将封装的数据发送给物理设备(如网卡等),最后由硬件设备将数据传出。在需要抓取网络数据包时,操作系统在处理相关数据的时候,会使用一些协议驱动和过滤驱动来获取网络行为的数据,所以可以注册协议驱动或创建与操作系统使用的过滤驱动相似的过滤驱动,进而获取到网络行为的数据。具体监控的实施方式包括以下几种方式:通过在客户端注册协议驱动、创建与操作系统相似的过滤驱动、利用操作系统提供的应用程序编程接口函数(hook函数)截获当前网络行为的信息、接管程序调用网络编程接口函数(Winsock)的请求或者是利用注册防火墙回调等方式,截获程序的当前网络行为的信息。可以看出以上获取网络行为数据的过程均是在客户端的操作系统上实现的。Compared with the packet capture method of the above packet capture interface 110, the process of connecting a traditional application program to the network is as follows: a request to connect to the network is sent through the application program interface (Application Program Interface, API for short) provided by the operating system, and the operating system receives After this kind of network request, the data sent by the application program is received, and the received data is encapsulated, and then the encapsulated data is sent to the physical device (such as a network card, etc.), and finally the hardware device transmits the data. When it is necessary to capture network packets, the operating system will use some protocol drivers and filter drivers to obtain network behavior data when processing related data, so you can register protocol drivers or create filters similar to the filter drivers used by the operating system Drive, and then obtain the data of network behavior. The implementation of specific monitoring includes the following methods: by registering the protocol driver on the client, creating a filter driver similar to the operating system, using the application programming interface function (hook function) provided by the operating system to intercept current network behavior information, taking over The program calls the network programming interface function (Winsock) request or registers the firewall callback to intercept the current network behavior information of the program. It can be seen that the above processes of obtaining network behavior data are all implemented on the operating system of the client.

现有的方式需要经过服务器的操作系统进行调用,存在内存和操作系统之间的交互,在带宽较高的情况下,受限于缓冲区的限制会出现的严重的丢包。但是使用本实施例的安全检测服务器100的数据包抓取接口110,不经过操作系统的调用,实现了高速网络的抓包功能。The existing method needs to be called through the operating system of the server, and there is an interaction between the memory and the operating system. In the case of high bandwidth, serious packet loss will occur due to the limitation of the buffer. However, using the packet capture interface 110 of the security detection server 100 of this embodiment, the packet capture function of the high-speed network is realized without calling the operating system.

组包装置120用于对数据包进行组包以还原传输控制协议TCP连接数据。由于数据包在网路中传输的次序与数据包的原有顺序有可能不一致,因此识别数据包的应用层协议,需要按照数据包的预定义顺序对数据包进行重组。组包装置120可以被配置为:将数据包写入缓存文件;对写入缓存文件的数据包进行重组,还原为TCP连接数据,为协议识别提供了手段。写入缓存文件的数据包的内容可以包括:TCP连接的源IP、目标IP、源端口、目标端口、序列号(Sequence Number)、确认序号(Acknowledge Number)以及数据包的数据内容。The grouping device 120 is used for grouping the data packets to restore the transmission control protocol TCP connection data. Since the order in which data packets are transmitted in the network may be inconsistent with the original order of data packets, the application layer protocol for identifying data packets needs to reassemble data packets according to the predefined order of data packets. The packet grouping device 120 may be configured to: write the data packets into the cache file; reassemble the data packets written into the cache file, and restore them to TCP connection data, which provides means for protocol identification. The content of the data packet written into the cache file may include: source IP, destination IP, source port, destination port, sequence number (Sequence Number), confirmation sequence number (Acknowledge Number) of the TCP connection, and data content of the data packet.

以上按照预定义的顺序对缓存后的数据包进行重组的过程可以利用TCP报头中的序号和确认序号进行。首先,解析数据包中TCP报头中的序号和确认序号;按照序号和确认序号对缓存后的数据包进行排序。The above process of reassembling the buffered data packets according to a predefined sequence can be performed by using the sequence number and the confirmation sequence number in the TCP header. First, analyze the sequence number and confirmation sequence number in the TCP header in the data packet; sort the cached data packets according to the sequence number and confirmation sequence number.

网络中的数据包经过路由器等网络设备后,其传输顺序与组包的顺序发生改变,因此需要按照每个TCP端口的连接状态对传输顺序进行数据包的重组。例如在网路中传输一段文本,包括:0,1,2,3共4字节,同时在网络传输过程中改变了顺序,顺序变为2,1,3,4,0,对数据包进行重组的过程中需要首先恢复数据包的原有顺序。After the data packets in the network pass through routers and other network devices, the order of transmission and grouping changes. Therefore, it is necessary to reorganize the transmission order of data packets according to the connection status of each TCP port. For example, a piece of text is transmitted in the network, including: 0, 1, 2, 3, a total of 4 bytes. At the same time, the order is changed during network transmission, and the order becomes 2, 1, 3, 4, 0, and the data packet is processed. During the reassembly process, the original order of the data packets needs to be restored first.

组包装置120重组数据包的顺序可以利用TCP的序列号(Sequence Number)和确认序号(Acknowledge Number)。其中,TCP的序列号标志了到某个数据包其在数据流中的位置,TCP的确认序号记录了目的端口到源端口中已收到的连续性数据编号。这两个序列号的标识都包含在TCP数据包的头数据中,确认序号的变化标明一个文件传输完毕,例如,确认序号由1000000变为1000049,说明数据源发了一段数据过来,然后根据TCP的序列号对该文件的数据包进行顺序重组。The order in which the packet assembly device 120 reassembles the data packets may use a TCP sequence number (Sequence Number) and an acknowledgment sequence number (Acknowledge Number). Among them, the sequence number of TCP marks the position of a certain data packet in the data stream, and the sequence number of TCP confirmation records the number of consecutive data received from the destination port to the source port. The identifiers of these two serial numbers are included in the header data of the TCP data packet. The change of the confirmation serial number indicates that a file has been transferred. The sequence number of the file is sequentially reassembled for the data packets of the file.

通过TCP的序列号和确认序号将缓存的数据包按照重组后,按照重组后的数据包的数据特征和端口特征判断数据包使用的应用层协议。After the buffered data packets are reassembled through the TCP sequence number and the confirmation sequence number, the application layer protocol used by the data packets is judged according to the data characteristics and port characteristics of the reassembled data packets.

协议识别装置130用于识别TCP连接数据使用的应用层协议。该协议识别装置130可以被配置为:按照重组后的数据包的数据特征和端口特征判断数据包使用的应用层协议。数据特征和端口特征可以包括TCP连接的源IP、目标IP、源端口、目标端口、以及数据包的数据内容data。The protocol identifying means 130 is used to identify the application layer protocol used by the TCP connection data. The protocol identification device 130 may be configured to: judge the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet. The data feature and port feature may include source IP, destination IP, source port, destination port of the TCP connection, and data content data of the data packet.

识别的协议类型可以包括:邮局协议的第3个版本协议(Post Office Protocol3,简称POP3协议),文件传输协议(File Transfer Protocol,简称FTP),超文本传输协议(Hypertext Transport Protocol,简称HTTP),简单邮件传输协议(Simple Mail TransferProtocol,简称SMTP),域名系统(Domain Name System,简称DNS)请求等,简单网络管理协议(Simple Network Management Protocol,简称SNMP),网络新闻传输协议(Network NewsTransport Protocol,简称NNTP)。The identified protocol types may include: the third version of the Post Office Protocol (Post Office Protocol 3, referred to as POP3 protocol), File Transfer Protocol (File Transfer Protocol, referred to as FTP), Hypertext Transport Protocol (Hypertext Transport Protocol, referred to as HTTP), Simple Mail Transfer Protocol (SMTP for short), Domain Name System (Domain Name System, DNS for short) requests, etc., Simple Network Management Protocol (Simple Network Management Protocol, SNMP for short), Network News Transport Protocol (Network NewsTransport Protocol, short for NNTP).

数据包安全扫描装置140包括多个安全扫描块,并使用与应用层协议对应的安全扫描模块对数据包进行安全扫描。图2是根据本发明一个实施例的网络数据的安全检测服务器100中数据包安全扫描装置140的示意图,该数据包安全扫描装置140可以包括:文件传输协议FTP扫描模块141,用于对FTP协议的数据包进行安全扫描;简单邮件传输协议SMTP扫描模块142,用于SMTP协议的数据包进行安全扫描;邮局协议的第3个版本POP3扫描模块143,用于POP3协议的数据包进行安全扫描;超文本传输协议HTTP扫描模块144,用于HTTP协议的数据包进行安全扫描;简单网络管理协议SNMP扫描模块145,用于SNMP协议的数据包进行安全扫描;网络新闻传输协议NNTP扫描模块146,用于NNTP协议的数据包进行安全扫描;域名系统DNS解析请求扫描模块147,用于DNS解析请求协议的数据包进行安全扫描。以上扫描模块可以根据实际应用需求灵活进行配置,选择以上扫描模块中的部分或全部。The data packet security scanning device 140 includes a plurality of security scanning blocks, and uses a security scanning module corresponding to an application layer protocol to perform security scanning on the data packet. Fig. 2 is the schematic diagram of the data packet security scanning device 140 in the security detection server 100 of network data according to an embodiment of the present invention, and this data packet security scanning device 140 can comprise: File Transfer Protocol FTP scanning module 141, for FTP protocol The data packet of the simple mail transfer protocol SMTP scanning module 142 is used for the data packet of the SMTP protocol to carry out the security scanning; the third version POP3 scanning module 143 of the Post Office Protocol is used for the data packet of the POP3 protocol to carry out the security scanning; The hypertext transfer protocol HTTP scanning module 144 is used for the data packet of the HTTP protocol to carry out security scanning; the simple network management protocol SNMP scanning module 145 is used for the data packet of the SNMP protocol to carry out security scanning; the network news transmission protocol NNTP scanning module 146 is used for The data packets of the NNTP protocol are used for security scanning; the domain name system DNS resolution request scanning module 147 is used for the data packets of the DNS resolution request protocol to perform security scanning. The above scanning modules can be flexibly configured according to actual application requirements, and some or all of the above scanning modules can be selected.

安全检测服务器100利用预先建立的多种扫描模块和文件协议的对应关系,调用对应的扫描模块对相应的协议类型文件进行扫描。The security detection server 100 uses the pre-established correspondence between various scanning modules and file protocols, and invokes corresponding scanning modules to scan files of corresponding protocol types.

经过数据包安全扫描装置140的安全扫描后,网络数据的安全检测服务器100还可以利用文件分析装置150,对提取出的数据包中的文件进行安全分析。After the security scanning by the data packet security scanning device 140 , the network data security detection server 100 can also use the file analysis device 150 to perform security analysis on the files in the extracted data packets.

图3是根据本发明一个实施例的网络数据的安全检测服务器100中文件分析装置150的示意图,该文件分析装置150可以包括:散列值云分析模块151、URL云分析模块153、动态行为安全分析模块153。该文件分析装置150用于从TCP连接数据中提取出文件,并对文件进行云安全分析和动态行为安全分析。Fig. 3 is a schematic diagram of a file analysis device 150 in the security detection server 100 of network data according to an embodiment of the present invention, and the file analysis device 150 may include: a hash value cloud analysis module 151, a URL cloud analysis module 153, a dynamic behavior security Analysis module 153 . The file analysis device 150 is used to extract files from the TCP connection data, and perform cloud security analysis and dynamic behavior security analysis on the files.

以上散列值云分析模块151、URL云分析模块153、动态行为安全分析模块153三种模块分别对提取出的文件进行各类安全分析。其中散列值云分析模块151用于计算文件的散列值,并将散列值与云安全服务器中的散列值危险列表比对,以上散列值可以使用MD5算法得出,云安全服务器中的散列值危险列表中包含的数据是已检测出恶意文件的散列值,通过匹配可以得出当前文件是否是云安全服务器中的散列值危险列表中已知的恶意文件。The above three modules, the hash value cloud analysis module 151, the URL cloud analysis module 153, and the dynamic behavior security analysis module 153, respectively perform various security analyzes on the extracted files. Wherein the hash value cloud analysis module 151 is used to calculate the hash value of the file, and the hash value is compared with the hash value danger list in the cloud security server, and the above hash value can be obtained using the MD5 algorithm, and the cloud security server The data contained in the hash value danger list in is the hash value of the detected malicious file, and through matching, it can be obtained whether the current file is a known malicious file in the hash value danger list in the cloud security server.

URL云分析模块153对文件的统一资源定位符URL,并将URL与云安全服务器中的URL危险列表比对。类似地云安全服务器中的URL危险列表包含的数据也是已检测出恶意文件的来源URL,通过匹配可以得出当前文件是否是云安全服务器中的URL危险列表已知的恶意文件。The URL cloud analysis module 153 checks the Uniform Resource Locator URL of the file, and compares the URL with the URL risk list in the cloud security server. Similarly, the data contained in the URL danger list in the cloud security server is also the source URL of the detected malicious file, and whether the current file is a known malicious file in the URL danger list in the cloud security server can be obtained through matching.

如果数据包中解析出的文件通过了以上散列值云分析模块151、URL云分析模块153的云查杀,还可以由动态行为安全分析模块153对文件进行蜜罐行为分析,以确认评估文件触发系统行为的风险。If the file parsed out in the data packet has passed the cloud inspection and killing of the above hash value cloud analysis module 151 and URL cloud analysis module 153, the dynamic behavior security analysis module 153 can also carry out honeypot behavior analysis to the file to confirm the evaluation file Risk of triggering system behavior.

此外,对于可移植执行体文件(Portable Execute,简称PE文件)的查杀还可以使用查杀PE(Portable Execute,可移植执行体)类型文件的云查杀引擎和人工智能引擎(Qihoo Virtual Machine,简称QVM引擎),以及Bit Defender杀毒引擎和小红伞杀毒引擎等。常见的PE类型文件包括EXE、DLL、OCX、SYS、COM等类型文件。In addition, for the detection and killing of portable executable files (Portable Execute, referred to as PE files), you can also use the cloud detection and killing engine and artificial intelligence engine (Qihoo Virtual Machine, QVM engine for short), as well as Bit Defender antivirus engine and Little Red Umbrella antivirus engine, etc. Common PE type files include EXE, DLL, OCX, SYS, COM and other types of files.

对于脚本文件,可以首先使用脚本杀毒引擎检测脚本病毒,如果没有检测出脚本病毒,则由客户端调用云查杀引擎、QVM引擎、宏病毒专杀引擎(QEX引擎)等其他杀毒引擎进行病毒查杀。此外,也可以先通过调用云查杀引擎、QVM引擎、QEX引擎等其他杀毒引擎进行病毒查杀,当未检测出病毒时,再调用脚本杀毒引擎对脚本进行查杀。For script files, you can first use the script antivirus engine to detect the script virus. If no script virus is detected, the client will call other antivirus engines such as the cloud antivirus engine, QVM engine, and macro virus antivirus engine (QEX engine) to perform virus inspection. kill. In addition, other anti-virus engines such as the cloud anti-virus engine, QVM engine, and QEX engine can also be called to perform virus detection and killing. When no virus is detected, the script anti-virus engine is called to scan and kill the script.

动态行为安全分析模块153的分析流程包括:根据文件的类型确定对应的虚拟检测环境;在虚拟检测环境下运行或打开文件,并监控虚拟检测环境的运行状态,生成运行状态日志;对运行状态日志进行分析,得到文件的动态行为安全分析结果。其中,动态行为安全分析模块153监控虚拟检测环境的运行状态一般可以包括:监控虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况,更进一步地,可以对以下动作进行选择地监控:文件操作、网络操作、创建进程、创建线程、注册表操作、窗口、托盘操作、堆栈溢出、注入线程、拦截系统API调用以及访问、修改和创建用户帐号。以上动作均有可能为恶意程序的行为。The analysis flow of dynamic behavior security analysis module 153 comprises: according to the type of file, determine corresponding virtual detection environment; Run or open file under virtual detection environment, and monitor the operation state of virtual detection environment, generate operation status log; Perform analysis to obtain the dynamic behavior security analysis results of the file. Wherein, the dynamic behavior security analysis module 153 monitors the operation state of the virtual detection environment generally may include: monitoring the memory changes of the virtual detection environment, the registry modification, the process change, the network connection situation, and further, the following actions can be performed Selectively monitor: file operations, network operations, create processes, create threads, registry operations, windows, tray operations, stack overflows, inject threads, intercept system API calls, and access, modify, and create user accounts. All of the above actions may be behaviors of malicious programs.

动态行为安全分析模块153可以调用主动防御进行安全检测,也就是在服务器侧预先存储大量的恶意程序的行为,用于比对本次检测文件的行为,具体流程为:通过大量客户端计算机对各种程序的程序行为(可以是单一行为,也可以是一组行为的组合)和/或发起该程序行为的程序的程序特征进行收集,发送到服务器端;服务器端根据所收集到的每一台客户端计算机上的一程序的程序特征和/或程序行为在服务器的数据库进行分析比对,根据比对结果对该程序进行判定,并反馈给对应的客户端计算机;对应客户端计算机根据反馈的判定结果决定是否对该程序行为进行拦截、终止执行该程序和/或清理该程序,恢复系统环境。The dynamic behavior security analysis module 153 can call active defense to carry out security detection, that is, the behavior of a large number of malicious programs is stored in advance on the server side, and is used to compare the behavior of this detection file. The specific process is: through a large number of client computers. Collect the program behavior of a program (it can be a single behavior or a combination of a group of behaviors) and/or the program characteristics of the program that initiates the program behavior, and send it to the server; The program features and/or program behavior of a program on the client computer are analyzed and compared in the database of the server, and the program is judged according to the comparison results, and fed back to the corresponding client computer; the corresponding client computer The judgment result determines whether to intercept the program behavior, terminate the execution of the program and/or clean up the program, and restore the system environment.

以上程序行为可以一程序是直接作出的行为,也可以是该程序并不直接做出行为,而是控制另一目标程序间接做出行为,因此程序行为包括:程序行为本体及该行为目标的属性;行为目标的属性包括:行为目标本身所属的黑白等级(即恶意或非恶意)、所处于系统中的位置(如处于引导区等等)、类型(如可执行文件、备份文件等类型),也可以扩展包括行为目标所作出行为所属的黑白等级、行为本身等等。The above program behaviors can be directly performed by a program, or the program does not directly perform the behavior, but controls another target program to indirectly perform the behavior, so the program behavior includes: the program behavior body and the attributes of the behavior target ;The attributes of the behavior target include: the black and white level of the behavior target itself (ie, malicious or non-malicious), the location in the system (such as in the boot sector, etc.), the type (such as executable files, backup files, etc.), It can also be expanded to include the black and white level of the behavior of the behavior target, the behavior itself, and so on.

在数据库中保存的各恶意行为,假设包括:删除注册表启动项或服务、终止电脑安全程序工具的进程、弱口令破解局域网其他电脑的管理员帐号并复制传播、修改注册表键值导致不能查看隐藏文件和系统文件、尝试破坏硬盘分区下的文件、删除用户的系统备份文件等等,对这些恶意行为可以根据技术人员经验判断其破坏程度或严重性,从而对破坏程度或严重性高的恶意行为赋予更大的权重值;另外在实作中也可以通过收集的大量客户端数据,根据恶意程序行为的上报频率、破坏范围等一系列参数建立数学模型,通过统计学算法获得各恶意行为的权重并分配权重值。在权重累加值大于预设值时,认定恶意程序。The malicious behaviors stored in the database are assumed to include: deleting registry startup items or services, terminating the process of computer security program tools, cracking administrator accounts of other computers in the LAN with weak passwords and copying and disseminating them, and modifying registry keys so that they cannot be viewed Hiding files and system files, trying to destroy files under hard disk partitions, deleting user system backup files, etc., for these malicious behaviors, the degree or severity of damage can be judged based on the experience of technicians, so that malicious behaviors with a high degree of damage or seriousness Behaviors are assigned greater weights; in addition, in practice, a large amount of client data collected can also be used to establish a mathematical model based on a series of parameters such as the reporting frequency of malicious program behaviors and the scope of damage, and obtain the weight of each malicious behavior through statistical algorithms. weight and assign weight values. When the accumulated weight value is greater than the preset value, the malicious program is determined.

具体的操作中,木马行为规则经过多年的搜集,已有木马的操作行为包括:对文件自动压缩或解压,木马捆绑在一些文件上,造成文件增大,将文件改名,删除文件,更改文件内容,上传下载文件,扫描次数,扫描天数和扫描对象,利用系统自动运行程序启动,修改注册表,伪装文件,修改组策略等行为。In the specific operation, after years of collection of Trojan horse behavior rules, the existing Trojan horse operation behaviors include: automatic compression or decompression of files, Trojan horse binding on some files, resulting in file enlargement, renaming files, deleting files, and changing file content , Upload and download files, scan times, scan days and scan objects, use the system to automatically run programs to start, modify the registry, disguise files, modify group policies, etc.

进一步地,木马的操作行为还可能包括:文件操作、网络操作、创建进程、创建线程、注册表操作、窗口、托盘操作、堆栈溢出、注入线程、拦截系统API调用以及访问、修改和创建用户帐号、调用SHELL程序、修改程序文件或写程序文件、调用FTP或TFTP、创建FTP或TFTP服务、发送邮件、浏览器或邮件系统自动运行其他程序、创建大量相同线程、修改和创建用户帐号、危险网络操作、向系统注册表添加启动项、修改系统启动文件、向其他进程注入线程、堆找溢出、应用级进程自动提升为系统级进程操作、拦截系统API调用。Further, the operation behavior of the Trojan horse may also include: file operations, network operations, creating processes, creating threads, registry operations, windows, tray operations, stack overflow, injecting threads, intercepting system API calls, and accessing, modifying, and creating user accounts , calling SHELL programs, modifying program files or writing program files, calling FTP or TFTP, creating FTP or TFTP services, sending emails, browsers or email systems automatically running other programs, creating a large number of identical threads, modifying and creating user accounts, dangerous networks Operation, adding startup items to the system registry, modifying system startup files, injecting threads into other processes, stack overflow, automatic promotion of application-level processes to system-level process operations, and intercepting system API calls.

对行为日志进行分析时,以上动作均可以设置权重,最终进行加权累加,进行综合判断。When analyzing behavior logs, weights can be set for the above actions, and finally the weighted accumulation is performed for comprehensive judgment.

例如以上文件为office文档,可以使用office虚拟检测环境进行检测;对于图片文件,可以使用图片查看器进行检测;脚本文件可以由虚拟系统直接运行、网址文件可以虚拟浏览器打开。For example, the above file is an office document, which can be detected by the office virtual detection environment; for image files, it can be detected by the image viewer; the script file can be directly run by the virtual system, and the URL file can be opened by the virtual browser.

脚本文件也可以在脚本检测引擎中进行检测,通过预设多个脚本杀毒引擎;脚本杀毒引擎所针对的脚本类型一般性地包括:JS(JavaScript)脚本类型、HTML(HypertextMarkup Language)脚本类型、PHP(Hypertext Preprocessor)脚本类型和VBS(MicrosoftVisual Basic Script Editon)脚本类型;对应地,脚本杀毒引擎包括:JS脚本杀毒引擎、HTML脚本杀毒引擎、PHP脚本杀毒引擎和VBS脚本杀毒引擎;其中,每个脚本杀毒引擎都根据脚本类型进行设置,根据确定类型的脚本规范对该类型脚本进行解析,例如,JS脚本杀毒引擎根据JS脚本的脚本规范进行设置,对JS脚本根据JS脚本规范进行词法分析、表达式分析和语法分析。当确定实际脚本的类型后,调用与实际脚本的类型相对应的脚本杀毒引擎进行处理,例如,当实际脚本是JS脚本时,则调用JS脚本杀毒引擎进行处理。Script files can also be detected in the script detection engine by presetting multiple script antivirus engines; script types targeted by script antivirus engines generally include: JS (JavaScript) script type, HTML (HypertextMarkup Language) script type, PHP (Hypertext Preprocessor) script type and VBS (Microsoft Visual Basic Script Editon) script type; correspondingly, script antivirus engines include: JS script antivirus engine, HTML script antivirus engine, PHP script antivirus engine and VBS script antivirus engine; wherein, each script The antivirus engine is set according to the script type, and parses the type of script according to the script specification of the certain type. For example, the JS script antivirus engine is set according to the script specification of the JS script, and performs lexical analysis and expression analysis on the JS script according to the JS script specification. Analysis and parsing. After the type of the actual script is determined, a script antivirus engine corresponding to the type of the actual script is invoked for processing. For example, when the actual script is a JS script, the JS script antivirus engine is invoked for processing.

检测过程中通过对记录有内存变化情况、注册表修改情况、进程变化情况、网络连接情况的日志文件分析,得到文件是否触发了以上介绍恶意行为或者经过计算恶意加权值是否大于预设值,都可以判断文件是否恶意。从而进一步提高了文件的安全分析水平,可以判断出以上网络中传输的文件是否为木马文件或者其他恶意文件。During the detection process, through the analysis of log files that record memory changes, registry modifications, process changes, and network connections, whether the files trigger the above-mentioned malicious behavior or whether the calculated malicious weighted value is greater than the preset value is all important. Can determine whether the file is malicious or not. Thereby, the security analysis level of the files is further improved, and it can be judged whether the files transmitted in the above network are Trojan horse files or other malicious files.

对于高级持续性威胁(Advanced Persistent Threat,简称APT),由于其潜伏性和持续性,现有技术缺乏对于APT攻击的防御手段,即使阻止依次攻击也无法彻底解决问题,本实施例提供的网络数据的安全检测服务器100能够提取高速网络中的传输的文件,对文件进行深度快速分析,从而快速有效识别出APT攻击。为进一步防范APT攻击提供了识别手段。For advanced persistent threats (Advanced Persistent Threat, referred to as APT), due to its latency and persistence, the existing technology lacks defense means for APT attacks. Even if the sequential attacks are prevented, the problem cannot be completely solved. The security detection server 100 of the company can extract files transmitted in the high-speed network, and perform in-depth and fast analysis on the files, so as to quickly and effectively identify APT attacks. It provides an identification method to further prevent APT attacks.

本实施例提供的浏览器100可以部署在企业内网当中,通过对企业真实流量的分析,获取其中可能有危险的文件,借助云查杀、奇虎支持向量机(Qihoo Support VectorMachine,简称QVM)和宏病毒专杀引擎(QEX)进行快速判定;对于无法判定的文件,借助内建在产品中的360样本分析引擎,快速重现样本行为,并对高危样本进行报警。The browser 100 provided in this embodiment can be deployed in the intranet of the enterprise, and by analyzing the real traffic of the enterprise, obtain files that may be dangerous, and use cloud scanning and Qihoo Support Vector Machine (QVM for short) Quickly judge with the macro virus killing engine (QEX); for files that cannot be judged, use the built-in 360 sample analysis engine in the product to quickly reproduce the sample behavior and issue an alarm for high-risk samples.

本发明实施例还提供了一种网络数据的安全检测方法,该网络数据的安全检测方法可以由以上实施例中介绍的任一种网络数据的安全检测服务器100执行,抓取网络中传输数据包并进行组包后,根据数据包对应的应用层协议进行数据的安全监测,针对性强,可以快速有效地识别网络攻击。图4是根据本发明一个实施例的网络数据的安全检测方法的示意图,该网络数据的安全检测方法包括:The embodiment of the present invention also provides a network data security detection method, the network data security detection method can be executed by any network data security detection server 100 introduced in the above embodiments, and captures the transmission data packets in the network After grouping and packetizing, data security monitoring is carried out according to the application layer protocol corresponding to the data packet, which is highly targeted and can quickly and effectively identify network attacks. Fig. 4 is a schematic diagram of a security detection method for network data according to an embodiment of the present invention, the security detection method for network data includes:

步骤S402,抓取网络中传输的数据包;Step S402, capturing data packets transmitted in the network;

步骤S404,对数据包进行组包以还原传输控制协议TCP连接数据;Step S404, grouping the data packets to restore the transmission control protocol TCP connection data;

步骤S406,识别TCP连接数据使用的应用层协议;Step S406, identifying the application layer protocol used by the TCP connection data;

步骤S408,使用与应用层协议对应的安全扫描模块对TCP连接数据进行安全扫描Step S408, using the security scanning module corresponding to the application layer protocol to perform security scanning on the TCP connection data

其中步骤S402流程可以包括:利用交换机的网络旁路复制网络中传输的数据包并送入安全检测服务器的网卡。抓取数据包可以采用通过网络数据旁路抓取数据包的方式进行。例如,在网络通道中设置一个旁路,将网络流量中的数据包导入到执行本方法的服务器中。一种具体的实现方式为:打开交换机的旁路开关,通过硬件方式复制数据包传输到安全检测服务器的网卡,利用抓包工具对网卡的驱动进行修改,将数据包直接发送给执行本实施例的网络数据的安全检测方法的进程。The process of step S402 may include: using the network bypass of the switch to copy the data packets transmitted in the network and sending them to the network card of the security detection server. Capturing data packets can be performed by capturing data packets through a network data bypass. For example, a bypass is set in the network channel to direct the data packets in the network traffic to the server executing the method. A specific implementation method is as follows: open the bypass switch of the switch, copy the data packet through hardware and transmit it to the network card of the security detection server, use the packet capture tool to modify the driver of the network card, and directly send the data packet to the network card that executes this embodiment. The process of the security detection method of network data.

由于数据包在网路中传输的次序与数据包的原有顺序有可能不一致,因此步骤S404的流程可以包括:对写入缓存文件的数据包进行重组包括:解析数据包中TCP报头中的序号和确认序号;按照序号和确认序号对数据包按照TCP的传输顺序进行排序。其中按照预定义的顺序对缓存后的数据包进行重组可以包括:解析数据包中TCP报头中的序号和确认序号;按照序号和确认序号对缓存后的数据包进行排序。TCP的序列号标志了到某个数据包其在数据流中的位置,TCP的确认序号记录了目的端口到源端口中已收到的连续性数据编号。这两个序列号的标识都包含在TCP数据包的头数据中,确认序号的变化标明一个文件传输完毕,确认序号发生变化说明数据源发了一段数据过来,然后根据TCP的序列号对该文件的数据包进行顺序重组。Since the order of data packets transmitted in the network may be inconsistent with the original order of the data packets, the process of step S404 may include: recombining the data packets written into the cache file includes: parsing the serial number in the TCP header in the data packet and confirmation sequence number; according to the sequence number and confirmation sequence number, the data packets are sorted according to the transmission order of TCP. Reassembling the cached data packets according to a predefined sequence may include: parsing the sequence number and the confirmation sequence number in the TCP header in the data packet; and sorting the cached data packets according to the sequence number and the confirmation sequence number. The serial number of TCP marks the position of a certain data packet in the data stream, and the serial number of TCP confirmation records the number of continuous data received from the destination port to the source port. The identifiers of these two serial numbers are included in the header data of the TCP data packet. Confirming the change of the serial number indicates that a file has been transmitted, and confirming that the serial number changes indicates that the data source has sent a piece of data, and then the file is sent according to the TCP serial number. The data packets are sequentially reassembled.

步骤S406可以按照重组后的数据包的数据特征和端口特征判断数据包使用的应用层协议。数据特征和端口特征可以包括TCP连接的源IP、目标IP、源端口、目标端口、以及数据包的数据内容data。Step S406 can determine the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet. The data feature and port feature may include source IP, destination IP, source port, destination port of the TCP connection, and data content data of the data packet.

一般地,数据包使用的应用层协议包括:文件传输协议FTP、简单邮件传输协议SMTP、邮局协议的第3个版本POP3、超文本传输协议HTTP、简单网络管理协议SNMP、网络新闻传输协议NNTP、域名系统DNS解析请求。因此,对于以上协议,步骤S408可以分别使用文件传输协议FTP扫描模块141、简单邮件传输协议SMTP扫描模块142、邮局协议的第3个版本POP3扫描模块143、超文本传输协议HTTP扫描模块144、简单网络管理协议SNMP扫描模块145、网络新闻传输协议NNTP扫描模块146、域名系统DNS解析请求扫描模块147对各自对应的数据包进行安全扫描。Generally, the application layer protocols used by data packets include: File Transfer Protocol FTP, Simple Mail Transfer Protocol SMTP, the third version of Post Office Protocol POP3, Hypertext Transfer Protocol HTTP, Simple Network Management Protocol SNMP, Network News Transfer Protocol NNTP, Domain Name System DNS resolution request. Therefore, for the above protocols, step S408 can use the File Transfer Protocol FTP scanning module 141, the Simple Mail Transfer Protocol SMTP scanning module 142, the third version of the Post Office Protocol POP3 scanning module 143, the Hypertext Transfer Protocol HTTP scanning module 144, and the simple S408 respectively. The network management protocol SNMP scanning module 145 , the network news transfer protocol NNTP scanning module 146 , and the domain name system DNS resolution request scanning module 147 perform security scanning on respective corresponding data packets.

为了对数据包中包含的文件进一步分析,在步骤S408之后还可以执行提取数据包中文件,对文件进行安全分析的步骤。其中对文件进行安全分析可以包括:从TCP连接数据中提取出文件,并对文件进行云安全分析和动态行为安全分析。In order to further analyze the files included in the data package, the step of extracting the files in the data package and performing security analysis on the files may also be performed after step S408. The security analysis on the file may include: extracting the file from the TCP connection data, and performing cloud security analysis and dynamic behavior security analysis on the file.

其中对文件进行云安全分析可以包括:散列值云查杀和URL云查杀等。散列值云查杀包括:计算文件的散列值,并将散列值与云安全服务器中的散列值危险列表比对。散列值的计算优选可以使用信息摘要算法MD5。Wherein, the cloud security analysis on the file may include: cloud checking and killing of hash value and URL cloud checking and killing, and the like. The hash value cloud scanning and killing includes: calculating the hash value of the file, and comparing the hash value with the hash value danger list in the cloud security server. The calculation of the hash value can preferably use the message digest algorithm MD5.

URL云查杀包括:对文件的统一资源定位符URL,并将URL与云安全服务器中的URL危险列表比对。URL cloud scanning and killing includes: Uniform resource locator URL of the file, and comparing the URL with the URL danger list in the cloud security server.

URL云查杀的过程可以如下:The process of URL cloud scanning and killing can be as follows:

URL云查杀的对象包括各种类型的浏览器的网页访问行为,所请求访问的网址信息称为第一URL。该第一URL可以包括如下几种:第一种、请求访问的网址对应的网页的URL,例如,请求访问“新浪”主页,该网页的URL即为:http://www.sina.com.cn/。第二种、请求访问的网址对应的网页内容中链接的URL;请求访问的网页的内容中有可能存在一些链接网址,这些链接网址的URL也属于监控的范围。第二种、下载文件的URL,请求下载文件,该下载文件的URL也属于监控的范围。Objects of URL cloud scanning and killing include web page access behaviors of various types of browsers, and the requested URL information is called the first URL. The first URL may include the following types: the first type, the URL of the web page corresponding to the web site that requests access, for example, if a request is made to visit the "Sina" homepage, the URL of the web page is: http://www.sina.com. cn/. The second type is the URL linked in the content of the webpage corresponding to the URL requested for access; there may be some linked URLs in the content of the webpage requested for access, and the URLs of these linked URLs also belong to the scope of monitoring. The second type, the URL of the downloaded file, requests to download the file, and the URL of the downloaded file also belongs to the scope of monitoring.

URL云查杀的对象可能涉及到以上三种URL中的一种或多种,即第一URL包括以上三种URL中的任一种或任意几种的组合。其查杀流程包括:The object of URL cloud scanning and killing may involve one or more of the above three URLs, that is, the first URL includes any one or any combination of the above three URLs. Its killing process includes:

步骤S502,根据网址信息,提取网址密文,例如根据第一URL所包含的信息,提取第一URL对应的网址密文;Step S502, extracting the URL ciphertext according to the URL information, for example, extracting the URL ciphertext corresponding to the first URL according to the information contained in the first URL;

步骤S504,将网址密文与数据库中存储的密文进行匹配,数据库中存储的密文包括被标记为恶意网址的密文;若网址密文与数据库中标记为恶意网址的密文匹配,执行步骤506;否则,执行步骤508。本实施例预先构建了数据库,该数据库中至少存储了被标记为恶意网址的密文。这些密文都是根据大量已知为恶意网址的URL而获得的。Step S504, matching the URL ciphertext with the ciphertext stored in the database, the ciphertext stored in the database includes the ciphertext marked as malicious URL; if the URL ciphertext matches the ciphertext marked as malicious URL in the database, execute Step 506; otherwise, go to step 508. In this embodiment, a database is pre-built, and at least ciphertexts marked as malicious URLs are stored in the database. These ciphertexts are all obtained from a large number of URLs known to be malicious.

步骤506、返回恶意网址查询结果,执行步骤508。如果网址密文与数据库中标记为恶意网址的密文匹配,标明URL包含恶意内容,返回恶意网址查询结果,否则执行步骤510。Step 506, return the malicious website query result, and execute step 508. If the URL ciphertext matches the ciphertext marked as a malicious URL in the database, it is indicated that the URL contains malicious content, and a malicious URL query result is returned; otherwise, step 510 is performed.

步骤508、根据恶意网址查询结果,阻断对网址的访问行为,结束。Step 508, according to the query result of the malicious website, block the behavior of accessing the website, and end.

步骤510、返回正常网址查询结果,查杀对象的网址密文与数据库中标记为恶意网址的密文不匹配,标明URL不包含恶意内容,返回正常网址查询结果,不阻断对网址的访问行为,结束。Step 510, return normal URL query results, the URL ciphertext of the killing target does not match the ciphertext marked as malicious URLs in the database, indicating that the URL does not contain malicious content, return normal URL query results, and do not block access to the URL ,End.

根据本实施例提供的URL云查杀,查杀对象包括URL数据时,从网址信息中提取网址密文,将网址密文与数据库中存储的密文匹配,完成网址的安全查询和验证。该方法不依赖客户端本地的数据库,将网址的安全查询和验证放在服务器侧完成。由于查杀的数据库可以及时的更新互联网上的各类恶意网址,数据库中恶意网址的信息存储量很大,覆盖面很广,从而能够快速有效地拦截恶意网站。According to the URL cloud scanning and killing provided in this embodiment, when the killing object includes URL data, the URL ciphertext is extracted from the URL information, and the URL ciphertext is matched with the ciphertext stored in the database to complete the security query and verification of the URL. This method does not rely on the client's local database, and completes the security query and verification of the URL on the server side. Because the killing database can update all kinds of malicious websites on the Internet in time, the information storage capacity of malicious websites in the database is very large, and the coverage is very wide, so that malicious websites can be blocked quickly and effectively.

提取出文件如果为网页数据的情况下,可以根据网页信息进行云安全分析。具体流程为:采集和汇总网页本身的信息:快照、CSS、JavaScript、html代码、文本、图片、链接、资源(如视频、可执行文件、文档);网页的服务器信息:URL、HOST、IP、变动时间、变动频率;网页所在域名的相关信息:ICP备案信息(如主办单位名称、主办单位性质、经营范围、审核时间等)、WHOIS信息(如注册商、域名服务器、相关网站、DNS服务器、域名状态、更新时间、创建时间、过期时间、REGISTRANT CONTACT INFO、ADMINISTRATIVE CONTACT INFO、TECHNICALCONTACT INFO、BILLING CONTACT INFO)、域名在其他搜索引擎下的权重和网页收录量。根据网页信息进行云安全分析可以从以下方面进行:If the extracted file is web page data, cloud security analysis can be performed based on the web page information. The specific process is: collecting and summarizing the information of the webpage itself: snapshots, CSS, JavaScript, html code, text, pictures, links, resources (such as videos, executable files, documents); webpage server information: URL, HOST, IP, Change time, change frequency; relevant information of the domain name where the web page is located: ICP record information (such as sponsor name, sponsor nature, business scope, review time, etc.), WHOIS information (such as registrar, domain name server, related websites, DNS server, Domain name status, update time, creation time, expiration time, REGISTRANT CONTACT INFO, ADMINISTRATIVE CONTACT INFO, TECHNICALCONTACT INFO, BILLING CONTACT INFO), domain name weight and page indexing volume under other search engines. Cloud security analysis based on web page information can be performed from the following aspects:

金融欺诈网页会在文字、图片等方面仿冒官网。Financial fraud webpages will imitate the official website in terms of text and pictures.

查家庭背景(服务器信息):如,HOST和IP下有恶意网页,那么当前网页是恶意的可能性极高。Check family background (server information): For example, if there are malicious web pages under HOST and IP, then the current web page is highly likely to be malicious.

查祖上三代(ICP备案信息、WHOIS信息):如:一个网页能售卖机票,但备案信息无票务经营,那么欺诈的可能性很大;再如:注册商名下网站经常出恶意网页,信任记录很差,那么新出的网页是恶意的概率比较高。Three generations of Zha ancestors (ICP filing information, WHOIS information): For example: a webpage can sell air tickets, but the filing information does not have ticketing operations, so the possibility of fraud is very high; another example: websites under the name of the registrar often publish malicious webpages, trust records If it is very bad, then the probability that the new web page is malicious is relatively high.

参考了邻里评价(在其他搜索引擎中的权重和网页收录量):如:大家给的权重都不高、也不收录相应的网页,在识别中,也可以对这样的网页降分。Refer to the neighborhood evaluation (the weight and page index in other search engines): For example, the weight given by everyone is not high, and the corresponding web pages are not included. In the identification, the score of such web pages can also be reduced.

如果数据包中解析出的文件通过了以上云查杀,可以由对文件进行蜜罐行为分析即动态行为安全分析,以确认评估文件触发系统行为的风险。If the files parsed from the data package pass the above-mentioned cloud detection and killing, the honeypot behavior analysis (dynamic behavior security analysis) can be performed on the files to confirm and evaluate the risk of file triggering system behavior.

例如,正在传输的数据包中包含的文件为下载的文档,可以通过HTTP组包,由超文本传输协议HTTP扫描模块144对数据包进行扫描,经过扫描后提取该数据包中的文件,并将该文件导入到动态行为分析系统。For example, the file contained in the data packet being transmitted is a downloaded document, which can be packaged by HTTP, and the data packet is scanned by the hypertext transfer protocol HTTP scanning module 144, and the file in the data packet is extracted after scanning, and This file is imported into the dynamic behavior analysis system.

动态行为安全分析的分析过程为:根据文件的类型确定对应的虚拟检测环境;在虚拟检测环境下运行或打开文件,并监控虚拟检测环境的运行状态,生成运行状态日志;对运行状态日志进行分析,得到文件的动态行为安全分析结果。其中,监控虚拟检测环境的运行状态包括:监控虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。The analysis process of dynamic behavior security analysis is: determine the corresponding virtual detection environment according to the type of the file; run or open the file in the virtual detection environment, monitor the running status of the virtual testing environment, and generate running status logs; analyze the running status logs , to obtain the dynamic behavior security analysis result of the file. Wherein, monitoring the running status of the virtual testing environment includes: monitoring the memory changes, registry modification, process changes, and network connections of the virtual testing environment.

例如以上文件为office文档,可以使用office虚拟检测环境进行检测;对于图片文件,可以使用图片查看器进行检测;脚本文件可以由虚拟系统直接运行、网址文件可以虚拟浏览器打开。检测过程中通过对记录有内存变化情况、注册表修改情况、进程变化情况、网络连接情况的日志文件分析,得到文件是否触发了恶意行为,以判断文件是否恶意。从而进一步提高了文件的安全分析水平,可以判断出以上网络中传输的文件是否为木马文件或者其他恶意文件。以上文件可以包括可移植的执行文件(Portable Execute,简称PE文件)、脚本文件、文本文件、影音文件等多种类型的文件。For example, the above file is an office document, which can be detected by the office virtual detection environment; for image files, it can be detected by the image viewer; the script file can be directly run by the virtual system, and the URL file can be opened by the virtual browser. During the detection process, by analyzing the log files that record memory changes, registry modifications, process changes, and network connections, it is possible to determine whether the file has triggered malicious behavior to determine whether the file is malicious. Thereby, the security analysis level of the files is further improved, and it can be judged whether the files transmitted in the above network are Trojan horse files or other malicious files. The above files may include various types of files such as portable executable files (Portable Execute, PE files for short), script files, text files, and video and audio files.

动态行为安全分析可以调用主动防御进行安全检测,也就是在服务器侧预先存储大量的恶意程序的行为,用于比对本次检测文件的行为,具体流程为:通过大量客户端计算机对各种程序的程序行为(可以是单一行为,也可以是一组行为的组合)和/或发起该程序行为的程序的程序特征进行收集,发送到服务器端;服务器端根据所收集到的每一台客户端计算机上的一程序的程序特征和/或程序行为在服务器的数据库进行分析比对,根据比对结果对该程序进行判定,并反馈给对应的客户端计算机;对应客户端计算机根据反馈的判定结果决定是否对该程序行为进行拦截、终止执行该程序和/或清理该程序,恢复系统环境。Dynamic behavior security analysis can call active defense for security detection, that is, the behavior of a large number of malicious programs is pre-stored on the server side to compare the behavior of the detected files. The specific process is: through a large number of client computers, various programs The program behavior (it can be a single behavior or a combination of a group of behaviors) and/or the program characteristics of the program that initiates the program behavior is collected and sent to the server; the server is based on the collected The program features and/or program behavior of a program on the computer are analyzed and compared in the database of the server, the program is judged according to the comparison results, and fed back to the corresponding client computer; the corresponding client computer judges the results according to the feedback Decide whether to intercept the program behavior, terminate the execution of the program and/or clean up the program, and restore the system environment.

以上程序行为可以一程序是直接作出的行为,也可以是该程序并不直接做出行为,而是控制另一目标程序间接做出行为,因此程序行为包括:程序行为本体及该行为目标的属性;行为目标的属性包括:行为目标本身所属的黑白等级(即恶意或非恶意)、所处于系统中的位置(如处于引导区等等)、类型(如可执行文件、备份文件等类型),也可以扩展包括行为目标所作出行为所属的黑白等级、行为本身等等。The above program behaviors can be directly performed by a program, or the program does not directly perform the behavior, but controls another target program to indirectly perform the behavior, so the program behavior includes: the program behavior body and the attributes of the behavior target ;The attributes of the behavior target include: the black and white level of the behavior target itself (ie, malicious or non-malicious), the location in the system (such as in the boot sector, etc.), the type (such as executable files, backup files, etc.), It can also be expanded to include the black and white level of the behavior of the behavior target, the behavior itself, and so on.

在数据库中保存的各恶意行为,假设包括:删除注册表启动项或服务、终止电脑安全程序工具的进程、弱口令破解局域网其他电脑的管理员帐号并复制传播、修改注册表键值导致不能查看隐藏文件和系统文件、尝试破坏硬盘分区下的文件、删除用户的系统备份文件等等,对这些恶意行为可以根据技术人员经验判断其破坏程度或严重性,从而对破坏程度或严重性高的恶意行为赋予更大的权重值;另外在实作中也可以通过收集的大量客户端数据,根据恶意程序行为的上报频率、破坏范围等一系列参数建立数学模型,通过统计学算法获得各恶意行为的权重并分配权重值。在权重累加值大于预设值时,认定恶意程序。The malicious behaviors stored in the database are assumed to include: deleting registry startup items or services, terminating the process of computer security program tools, cracking administrator accounts of other computers in the LAN with weak passwords and copying and disseminating them, and modifying registry keys so that they cannot be viewed Hiding files and system files, trying to destroy files under hard disk partitions, deleting user system backup files, etc., for these malicious behaviors, the degree or severity of damage can be judged based on the experience of technicians, so that malicious behaviors with a high degree of damage or seriousness Behaviors are assigned greater weights; in addition, in practice, a large amount of client data collected can also be used to establish a mathematical model based on a series of parameters such as the reporting frequency of malicious program behaviors and the scope of damage, and obtain the weight of each malicious behavior through statistical algorithms. weight and assign weight values. When the accumulated weight value is greater than the preset value, the malicious program is identified.

具体的操作中,木马行为规则经过多年的搜集,已有木马的操作行为包括:对文件自动压缩或解压,木马捆绑在一些文件上,造成文件增大,将文件改名,删除文件,更改文件内容,上传下载文件,扫描次数,扫描天数和扫描对象,利用系统自动运行程序启动,修改注册表,伪装文件,修改组策略等行为。In the specific operation, after years of collection of Trojan horse behavior rules, the existing Trojan horse operation behaviors include: automatic compression or decompression of files, Trojan horse binding on some files, resulting in file enlargement, renaming files, deleting files, and changing file content , Upload and download files, scan times, scan days and scan objects, use the system to automatically run programs to start, modify the registry, disguise files, modify group policies, etc.

进一步地,木马的操作行为还可能包括:文件操作、网络操作、创建进程、创建线程、注册表操作、窗口、托盘操作、堆栈溢出、注入线程、拦截系统API调用以及访问、修改和创建用户帐号、调用SHELL程序、修改程序文件或写程序文件、调用FTP或TFTP、创建FTP或TFTP服务、发送邮件、浏览器或邮件系统自动运行其他程序、创建大量相同线程、修改和创建用户帐号、危险网络操作、向系统注册表添加启动项、修改系统启动文件、向其他进程注入线程、堆找溢出、应用级进程自动提升为系统级进程操作、拦截系统API调用。Further, the operation behavior of the Trojan horse may also include: file operations, network operations, creating processes, creating threads, registry operations, windows, tray operations, stack overflow, injecting threads, intercepting system API calls, and accessing, modifying, and creating user accounts , calling SHELL programs, modifying program files or writing program files, calling FTP or TFTP, creating FTP or TFTP services, sending emails, browsers or email systems automatically running other programs, creating a large number of identical threads, modifying and creating user accounts, dangerous networks Operation, adding startup items to the system registry, modifying system startup files, injecting threads into other processes, stack overflow, automatic promotion of application-level processes to system-level process operations, and intercepting system API calls.

对行为日志进行分析时,以上动作均可以设置权重,最终进行加权累加,进行综合判断。When analyzing behavior logs, weights can be set for the above actions, and finally the weighted accumulation is performed for comprehensive judgment.

通过上述一系列的安全分析:可以实现以下功能:Through the above series of security analysis: the following functions can be realized:

1、对传统安全产品(如IDS、IPS、UTM)无能为力的未知漏洞利用攻击具有出色的精确检测效果;1. It has excellent and accurate detection effect on unknown vulnerability exploit attacks that are powerless to traditional security products (such as IDS, IPS, UTM);

2、对传统终端杀毒软件、防毒墙无能为力的未知木马、未知病毒、未知恶意代码、特种木马具有出色的精确检测效果;2. It has excellent and accurate detection results for unknown Trojans, unknown viruses, unknown malicious codes, and special Trojans that traditional terminal antivirus software and antivirus walls are powerless to do;

3、全面检测利用已知系统漏洞、应用漏洞进行攻击的行为;3. Comprehensively detect the behavior of using known system vulnerabilities and application vulnerabilities to attack;

4、全面、快速检测已知木马、蠕虫、病毒等恶意代码;4. Comprehensive and rapid detection of known Trojan horses, worms, viruses and other malicious codes;

5、对钓鱼网站、挂马网站、漏洞利用网站(如XSS)的访问行为具有全面、快速的检测能力;5. It has comprehensive and rapid detection capabilities for access behaviors of phishing websites, Trojan websites, and exploit websites (such as XSS);

6、对通过邮件附件传播恶意代码的攻击方式(此种方式为APT攻击的主要方式)具有精确检测的能力;6. It has the ability to accurately detect the attack method of spreading malicious code through email attachments (this method is the main method of APT attack);

7、对邮件正文中嵌入的恶意URL具有精确检测能力;7. It has the ability to accurately detect malicious URLs embedded in the email body;

8、对通过IM工具(如QQ、阿里旺旺等)传输含恶意代码的文件具有精确检测能力;8. It has the ability to accurately detect files containing malicious codes transmitted through IM tools (such as QQ, Aliwangwang, etc.);

9、对在IM聊天内容中出现的恶意URL具有精确检测的能力;9. Ability to accurately detect malicious URLs appearing in IM chat content;

10、对通过Web下载含恶意代码的文件具有精确检测能力;10. It has the ability to accurately detect files containing malicious code downloaded through the Web;

11、对通过Web访问含有网马的页面具有精确检测能力。11. It has the ability to accurately detect the pages containing Internet horses accessed through the Web.

通过抓取网络运行数据包,并进行全面检测,全面准确地识别出各类恶意文件,大大提高安全可靠性。与现有技术中在个人计算机的客户端上实现不同,本发明的技术方案的实施环境可以为是在linux或者其他基于linux的平台上的服务器。例如高速网络流量上单核CPU能支持带宽上限达10Gbps。多核为cpu核数*10Gbps。By capturing network operation data packets and conducting comprehensive detection, it can comprehensively and accurately identify various malicious files, greatly improving security and reliability. Different from the implementation on the client side of the personal computer in the prior art, the implementation environment of the technical solution of the present invention can be a server on linux or other linux-based platforms. For example, a single-core CPU can support a bandwidth limit of up to 10Gbps on high-speed network traffic. Multi-core is the number of CPU cores * 10Gbps.

另外与本发明的技术方案不同,现有技术中的二进制特征匹配的网络扫描方式,没有进行组包处理,而简单地进行数据包二进制数据匹配,线性搜索匹配到要求的特征,认为是恶意的数据包。本实施例的网络数据的检测方法进行了快速的数据包重组,支持高速流量多IP连接高并发,能够将散碎的数据包重组成有意义的数据,在此基础上进行协议分析。In addition, different from the technical solution of the present invention, the network scanning method of binary feature matching in the prior art does not perform group packet processing, but simply performs binary data matching of data packets, and linear search matches the required features, which is considered malicious data pack. The network data detection method of this embodiment implements fast data packet reassembly, supports high-speed traffic and multiple IP connections with high concurrency, and can reorganize fragmented data packets into meaningful data, and then perform protocol analysis on this basis.

本发明提供的网络数据的安全检测方法和安全检测服务器100,抓取数据包并进行组包后,根据数据包对应的应用层协议进行数据的安全监测,在重组的应用层协议的数据基础上进行协议分析,针对性强,可以快速有效地识别网络攻击,提高了网络安全性。The security detection method for network data and the security detection server 100 provided by the present invention, after capturing data packets and grouping them, perform data security monitoring according to the application layer protocol corresponding to the data packets, based on the data of the reorganized application layer protocol Protocol analysis is highly targeted and can quickly and effectively identify network attacks, improving network security.

进一步地,本发明的网络数据的安全检测方法,实现了高速网络流量的数据包重组,能够支持高速流量多IP连接高并发的网络环境,提高了网络安全监测的效率。Furthermore, the network data security detection method of the present invention realizes data packet reassembly of high-speed network traffic, can support a network environment with high-speed traffic, multiple IP connections and high concurrency, and improves the efficiency of network security monitoring.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings), as well as any method or method so disclosed, may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. and form different embodiments. For example, in the claims, any one of the claimed embodiments can be used in any combination.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的安全检测服务器中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in the security detection server according to the embodiment of the present invention. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or provided in any other form.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.

至此,本领域技术人员应认识到,虽然本文已详尽示出和描述了本发明的多个示例性实施例,但是,在不脱离本发明精神和范围的情况下,仍可根据本发明公开的内容直接确定或推导出符合本发明原理的许多其他变型或修改。因此,本发明的范围应被理解和认定为覆盖了所有这些其他变型或修改。So far, those skilled in the art should appreciate that, although a number of exemplary embodiments of the present invention have been shown and described in detail herein, without departing from the spirit and scope of the present invention, the disclosed embodiments of the present invention can still be used. Many other variations or modifications consistent with the principles of the invention are directly identified or derived from the content. Accordingly, the scope of the present invention should be understood and deemed to cover all such other variations or modifications.

本发明实施例还提供了A1.一种网络数据的安全检测方法,包括:The embodiment of the present invention also provides A1. A security detection method for network data, comprising:

抓取网络中传输的数据包;Grab the data packets transmitted in the network;

对所述数据包进行组包以还原传输控制协议TCP连接数据,Packing the data packets to restore the transmission control protocol TCP connection data,

识别所述TCP连接数据使用的应用层协议;identifying the application layer protocol used by the TCP connection data;

使用与所述应用层协议对应的安全扫描模块对所述TCP连接数据进行安全扫描。Using a security scanning module corresponding to the application layer protocol to perform security scanning on the TCP connection data.

A2.根据A1所述的方法,其中,抓取网络中传输的数据包包括:利用交换机的网络旁路复制网络中传输的数据包并送入安全检测服务器的网卡。A2. The method according to A1, wherein capturing the data packets transmitted in the network includes: using the network bypass of the switch to copy the data packets transmitted in the network and sending them to the network card of the security detection server.

A3.根据A1所述的方法,其中,对所述数据包进行组包以还原传输控制协议TCP连接数据包括:A3. The method according to A1, wherein grouping the data packets to restore the transmission control protocol TCP connection data includes:

将所述数据包写入缓存文件;Writing the data packet into a cache file;

对写入缓存文件的数据包进行重组,还原为TCP连接数据。Reassemble the data packets written to the cache file and restore them to TCP connection data.

A4.根据A3所述的方法,其中,对写入缓存文件的数据包进行重组包括:A4. according to the method described in A3, wherein, recombining the data packets written into the cache file includes:

解析所述数据包中TCP报头中的序号和确认序号;Analyzing the sequence number and confirmation sequence number in the TCP header in the data packet;

按照所述序号和确认序号对所述数据包按照TCP的传输顺序进行排序。The data packets are sorted according to the sequence of TCP transmission according to the sequence number and the confirmation sequence number.

A5.根据A1至A4中任一项所述的方法,其中,识别所述TCP连接数据使用的应用层协议包括:按照重组后的数据包的数据特征和端口特征判断所述数据包使用的应用层协议。A5. The method according to any one of A1 to A4, wherein identifying the application layer protocol used by the TCP connection data includes: judging the application used by the data packet according to the data characteristics and port characteristics of the reassembled data packet layer protocol.

A6.根据A1至A5中任一项所述的方法,其中,所述数据包使用的应用层协议包括:文件传输协议FTP、简单邮件传输协议SMTP、邮局协议的第3个版本POP3、超文本传输协议HTTP、简单网络管理协议SNMP、网络新闻传输协议NNTP、域名系统DNS解析请求。A6. according to the method described in any one of A1 to A5, wherein, the application layer protocol used by the data packet includes: the third version POP3 of the file transfer protocol FTP, the simple mail transfer protocol SMTP, the post office protocol, hypertext Transmission protocol HTTP, Simple Network Management Protocol SNMP, Network News Transmission Protocol NNTP, Domain Name System DNS resolution request.

A7.根据A1至A6中任一项所述的方法,其中,使用与所述应用层协议对应的安全扫描模块对所述TCP连接数据进行安全扫描之后还包括:A7. The method according to any one of A1 to A6, wherein, after performing a security scan on the TCP connection data using a security scan module corresponding to the application layer protocol, it also includes:

从所述TCP连接数据中提取出文件,并对所述文件进行云安全分析和动态行为安全分析。Files are extracted from the TCP connection data, and cloud security analysis and dynamic behavior security analysis are performed on the files.

A8.根据A7所述的方法,其中,对所述文件进行云安全分析包括:A8. The method according to A7, wherein, performing cloud security analysis on the file includes:

计算所述文件的散列值,并将所述散列值与云安全服务器中的散列值危险列表比对;和/或calculating a hash value of the file, and comparing the hash value with the hash value hazard list in the cloud security server; and/or

提取所述文件的统一资源定位符URL,并将所述URL与云安全服务器中的URL危险列表比对。Extract the Uniform Resource Locator URL of the file, and compare the URL with the URL danger list in the cloud security server.

A9.根据A8所述的方法,其中,将所述URL与云安全服务器中的URL危险列表比对包括:A9. The method according to A8, wherein comparing the URL with the URL danger list in the cloud security server includes:

提取所述URL对应的网址密文;Extracting the URL ciphertext corresponding to the URL;

将所述网址密文与所述云安全服务器数据库中存储的密文进行匹配,所述数据库中存储的密文包括被标记为恶意网址的密文;Matching the URL ciphertext with the ciphertext stored in the cloud security server database, the ciphertext stored in the database includes the ciphertext marked as malicious URL;

若所述网址密文与所述云安全服务器数据库中存储的密文存在匹配,确定所述URL存在恶意内容。If the URL ciphertext matches the ciphertext stored in the cloud security server database, it is determined that the URL contains malicious content.

A10.根据A7至A9中任一项所述的方法,其中,对所述文件进行动态行为安全分析包括:A10. The method according to any one of A7 to A9, wherein performing dynamic behavior security analysis on the file includes:

根据所述文件的类型确定对应的虚拟检测环境;Determine the corresponding virtual testing environment according to the type of the file;

在所述虚拟检测环境下运行或打开所述文件,并监控所述虚拟检测环境的运行状态,生成运行状态日志;Run or open the file in the virtual testing environment, monitor the running status of the virtual testing environment, and generate a running status log;

对所述运行状态日志进行分析,得到所述文件的动态行为安全分析结果。The running state log is analyzed to obtain the dynamic behavior security analysis result of the file.

A11.根据A10所述的方法,其中,对所述运行状态日志进行分析包括:A11. The method according to A10, wherein analyzing the running status log includes:

对所述运行状态日志中所述文件触发的各项操作操作行为按照预先设置的权重进行加权累加;Carry out weighted accumulation according to preset weights for each operation operation behavior triggered by the file in the operation status log;

判断加权累加值是否大于预设值,若是,确定所述文件为恶意文件。Judging whether the weighted cumulative value is greater than a preset value, and if so, determining that the file is a malicious file.

A12.根据A10或A11所述的方法,其中,监控所述虚拟检测环境的运行状态包括:监控所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。A12. The method according to A10 or A11, wherein monitoring the running state of the virtual testing environment includes: monitoring memory changes, registry modifications, process changes, and network connections of the virtual testing environment.

B13.一种网络数据的安全检测服务器,包括:B13. A security detection server for network data, comprising:

数据包抓取接口,用于抓取网络中传输的数据包;Data packet capture interface, used to capture data packets transmitted in the network;

组包装置,用于对所述数据包进行组包以还原传输控制协议TCP连接数据,Packing device, used to pack the data packets to restore the transmission control protocol TCP connection data,

协议识别装置,识别所述TCP连接数据使用的应用层协议;A protocol identifying device, identifying the application layer protocol used by the TCP connection data;

数据包安全扫描装置,用于使用与所述应用层协议对应的安全扫描模块对所述TCP连接数据进行安全扫描。The data packet security scanning device is used to perform security scanning on the TCP connection data by using a security scanning module corresponding to the application layer protocol.

B14.根据B13所述的安全检测服务器,其中,所述数据包抓取接口被配置为:利用交换机的网络旁路复制网络中传输的数据包并送入所述安全检测服务器的网卡。B14. The security detection server according to B13, wherein the data packet capture interface is configured to: use the network bypass of the switch to copy the data packets transmitted in the network and send them to the network card of the security detection server.

B15.根据B13所述的安全检测服务器,其中,所述组包装置被配置为:将所述数据包写入缓存文件;对写入缓存文件的数据包进行重组,还原为TCP连接数据。B15. The security detection server according to B13, wherein the grouping device is configured to: write the data packets into a cache file; reassemble the data packets written into the cache file, and restore them to TCP connection data.

B16.根据B15所述的安全检测服务器,其中,所述协议识别装置被配置为:按照重组后的数据包的数据特征和端口特征判断所述数据包使用的应用层协议。B16. The security detection server according to B15, wherein the protocol identification device is configured to: judge the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet.

B17.根据B13至B16中任一项所述的安全检测服务器,其中,所述数据包安全扫描装置包括:B17. The security detection server according to any one of B13 to B16, wherein the data packet security scanning device comprises:

文件传输协议FTP扫描模块,用于对FTP协议的所述数据包进行安全扫描;A file transfer protocol FTP scanning module is used to perform security scanning on the data packets of the FTP protocol;

简单邮件传输协议SMTP扫描模块,用于SMTP协议的所述数据包进行安全扫描;Simple Mail Transfer Protocol SMTP scanning module, used for the described data packet of SMTP agreement to carry out safety scanning;

邮局协议的第3个版本POP3扫描模块,用于POP3协议的所述数据包进行安全扫描;The third version POP3 scanning module of the post office protocol, which is used for the security scanning of the data packets of the POP3 protocol;

超文本传输协议HTTP扫描模块,用于HTTP协议的所述数据包进行安全扫描;The hypertext transfer protocol HTTP scanning module is used for the described data packet of HTTP agreement to carry out safety scanning;

简单网络管理协议SNMP扫描模块,用于SNMP协议的所述数据包进行安全扫描;Simple Network Management Protocol SNMP scanning module, for the described data packet of SNMP agreement to carry out safety scanning;

网络新闻传输协议NNTP扫描模块,用于NNTP协议的所述数据包进行安全扫描;Network news transfer protocol NNTP scanning module, used for the described data packet of NNTP agreement to carry out safe scanning;

域名系统DNS解析请求扫描模块,用于DNS解析请求协议的所述数据包进行安全扫描。The domain name system DNS resolution request scanning module is used for security scanning of the data packets of the DNS resolution request protocol.

B18.根据B13至B17中任一项所述的安全检测服务器,其中,还包括:B18. The security detection server according to any one of B13 to B17, further comprising:

文件分析装置,用于从所述TCP连接数据中提取出文件,并对所述文件进行云安全分析和动态行为安全分析。The file analysis device is used to extract files from the TCP connection data, and perform cloud security analysis and dynamic behavior security analysis on the files.

B19.根据B18所述的安全检测服务器,其中,所述文件分析装置包括:B19. The security detection server according to B18, wherein the file analysis device includes:

散列值云分析模块,用于计算所述文件的散列值,并将所述散列值与云安全服务器中的散列值危险列表比对;The hash value cloud analysis module is used to calculate the hash value of the file, and compares the hash value with the hash value danger list in the cloud security server;

URL云分析模块,用于提取所述文件的统一资源定位符URL,并将所述URL与云安全服务器中的URL危险列表比对。The URL cloud analysis module is used to extract the Uniform Resource Locator URL of the file, and compare the URL with the URL risk list in the cloud security server.

B20.根据B18或B19所述的安全检测服务器,其中,所述文件分析装置还包括:B20. The security detection server according to B18 or B19, wherein the file analysis device also includes:

动态行为安全分析模块,用于根据所述文件的类型确定对应的虚拟检测环境;在所述虚拟检测环境下运行或打开所述文件,并监控所述虚拟检测环境的运行状态,生成运行状态日志;对所述运行状态日志进行分析,得到所述文件的动态行为安全分析结果。The dynamic behavior security analysis module is used to determine the corresponding virtual detection environment according to the type of the file; run or open the file under the virtual detection environment, monitor the running state of the virtual detection environment, and generate a running state log ; Analyzing the running status log to obtain the dynamic behavior security analysis result of the file.

B21.根据B20所述的安全检测服务器,其中,所述动态行为安全分析模块监控虚拟检测环境的运行状态包括:监控所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。B21. According to the security detection server described in B20, wherein the dynamic behavior security analysis module monitors the running status of the virtual detection environment including: monitoring the memory changes of the virtual detection environment, registry modification, process changes, network Connection status.

Claims (17)

1.一种网络数据的安全检测方法,包括:1. A security detection method for network data, comprising: 抓取网络中传输的数据包;Grab the data packets transmitted in the network; 对所述数据包进行组包以还原传输控制协议TCP连接数据,Packing the data packets to restore the transmission control protocol TCP connection data, 识别所述TCP连接数据使用的应用层协议;identifying the application layer protocol used by the TCP connection data; 使用与所述应用层协议对应的安全扫描模块对所述TCP连接数据进行安全扫描,其包括使用文件传输协议FTP扫描模块、简单邮件传输协议SMTP扫描模块、邮局协议的第3个版本POP3扫描模块、超文本传输协议HTTP扫描模块、简单网络管理协议SNMP扫描模块、网络新闻传输协议NNTP扫描模块、域名系统DNS解析请求扫描模块对各自对应的数据包进行安全扫描;Use the security scanning module corresponding to the application layer protocol to carry out security scanning on the TCP connection data, which includes the third version POP3 scanning module using the File Transfer Protocol FTP scanning module, the Simple Mail Transfer Protocol SMTP scanning module, and the Post Office Protocol. , Hypertext Transfer Protocol HTTP scanning module, Simple Network Management Protocol SNMP scanning module, Network News Transfer Protocol NNTP scanning module, Domain Name System DNS resolution request scanning module to perform security scanning on their corresponding data packets; 从所述TCP连接数据中提取出文件,根据所述文件的类型确定对应的虚拟检测环境;Extract files from the TCP connection data, and determine the corresponding virtual detection environment according to the type of the file; 在所述虚拟检测环境下运行或打开所述文件,并监控所述虚拟检测环境的运行状态,生成运行状态日志,所述运行状态日志中记录有所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况;Run or open the file under the virtual testing environment, and monitor the running status of the virtual testing environment, generate a running status log, record the memory changes of the virtual testing environment, the registry in the running status log Modifications, process changes, and network connections; 对所述运行状态日志进行分析,得到所述文件的动态行为安全分析结果;对所述运行状态日志进行分析包括:对所述运行状态日志中所述文件触发的各项操作行为按照预先设置的权重进行加权累加;判断加权累加值是否大于预设值,若是,确定所述文件为恶意文件。Analyzing the running state log to obtain the dynamic behavior security analysis result of the file; analyzing the running state log includes: performing various operation behaviors triggered by the file in the running state log according to preset The weights are weighted and accumulated; it is judged whether the weighted accumulated value is greater than a preset value, and if so, it is determined that the file is a malicious file. 2.根据权利要求1所述的方法,其中,抓取网络中传输的数据包包括:利用交换机的网络旁路复制网络中传输的数据包并送入安全检测服务器的网卡。2. The method according to claim 1, wherein capturing the data packets transmitted in the network comprises: using the network bypass of the switch to copy the data packets transmitted in the network and sending them to the network card of the security detection server. 3.根据权利要求1所述的方法,其中,对所述数据包进行组包以还原传输控制协议TCP连接数据包括:3. The method according to claim 1, wherein grouping the data packets to restore Transmission Control Protocol (TCP) connection data comprises: 将所述数据包写入缓存文件;Writing the data packet into a cache file; 对写入缓存文件的数据包进行重组,还原为TCP连接数据。Reassemble the data packets written to the cache file and restore them to TCP connection data. 4.根据权利要求3所述的方法,其中,对写入缓存文件的数据包进行重组包括:4. The method according to claim 3, wherein recombining the packets written into the cache file comprises: 解析所述数据包中TCP报头中的序号和确认序号;Analyzing the sequence number and confirmation sequence number in the TCP header in the data packet; 按照所述序号和确认序号对所述数据包按照TCP的传输顺序进行排序。The data packets are sorted according to the sequence of TCP transmission according to the sequence number and the confirmation sequence number. 5.根据权利要求1至4中任一项所述的方法,其中,识别所述TCP连接数据使用的应用层协议包括:按照重组后的数据包的数据特征和端口特征判断所述数据包使用的应用层协议。5. The method according to any one of claims 1 to 4, wherein identifying the application layer protocol used by the TCP connection data comprises: judging the use of the data packet according to the data characteristics and port characteristics of the reassembled data packet application layer protocol. 6.根据权利要求1至4中任一项所述的方法,其中,所述数据包使用的应用层协议包括:文件传输协议FTP、简单邮件传输协议SMTP、邮局协议的第3个版本POP3、超文本传输协议HTTP、简单网络管理协议SNMP、网络新闻传输协议NNTP、域名系统DNS解析请求。6. The method according to any one of claims 1 to 4, wherein the application layer protocols used by the data packets include: File Transfer Protocol FTP, Simple Mail Transfer Protocol SMTP, the 3rd version POP3 of the Post Office Protocol, Hypertext Transfer Protocol HTTP, Simple Network Management Protocol SNMP, Network News Transfer Protocol NNTP, Domain Name System DNS resolution request. 7.根据权利要求1至4中任一项所述的方法,其中,从所述TCP连接数据中提取出文件之后还包括:7. The method according to any one of claims 1 to 4, wherein, after extracting the file from the TCP connection data, further comprising: 对所述文件进行云安全分析。Perform cloud security analysis on the file. 8.根据权利要求7所述的方法,其中,对所述文件进行云安全分析包括:8. The method according to claim 7, wherein performing cloud security analysis on the file comprises: 计算所述文件的散列值,并将所述散列值与云安全服务器中的散列值危险列表比对;和/或calculating a hash value of the file, and comparing the hash value with the hash value hazard list in the cloud security server; and/or 提取所述文件的统一资源定位符URL,并将所述URL与云安全服务器中的URL危险列表比对。Extract the Uniform Resource Locator URL of the file, and compare the URL with the URL danger list in the cloud security server. 9.根据权利要求8所述的方法,其中,将所述URL与云安全服务器中的URL危险列表比对包括:9. The method according to claim 8, wherein comparing the URL with the URL danger list in the cloud security server comprises: 提取所述URL对应的网址密文;Extracting the URL ciphertext corresponding to the URL; 将所述网址密文与所述云安全服务器数据库中存储的密文进行匹配,所述数据库中存储的密文包括被标记为恶意网址的密文;Matching the URL ciphertext with the ciphertext stored in the cloud security server database, the ciphertext stored in the database includes the ciphertext marked as malicious URL; 若所述网址密文与所述云安全服务器数据库中存储的密文存在匹配,确定所述URL存在恶意内容。If the URL ciphertext matches the ciphertext stored in the cloud security server database, it is determined that the URL contains malicious content. 10.根据权利要求1所述的方法,其中,监控所述虚拟检测环境的运行状态包括:监控所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。10. The method according to claim 1, wherein monitoring the running status of the virtual testing environment comprises: monitoring memory changes, registry modifications, process changes, and network connections of the virtual testing environment. 11.一种网络数据的安全检测服务器,包括:11. A security detection server for network data, comprising: 数据包抓取接口,用于抓取网络中传输的数据包;Data packet capture interface, used to capture data packets transmitted in the network; 组包装置,用于对所述数据包进行组包以还原传输控制协议TCP连接数据,Packing device, used to pack the data packets to restore the transmission control protocol TCP connection data, 协议识别装置,识别所述TCP连接数据使用的应用层协议;A protocol identifying device, identifying the application layer protocol used by the TCP connection data; 数据包安全扫描装置,用于使用与所述应用层协议对应的安全扫描模块对所述TCP连接数据进行安全扫描;A data packet security scanning device, configured to perform security scanning on the TCP connection data using a security scanning module corresponding to the application layer protocol; 文件分析装置,用于从所述TCP连接数据中提取出文件,并且包括:动态行为安全分析模块,用于根据所述文件的类型确定对应的虚拟检测环境;在所述虚拟检测环境下运行或打开所述文件,并监控所述虚拟检测环境的运行状态,生成运行状态日志;对所述运行状态日志进行分析,得到所述文件的动态行为安全分析结果,所述运行状态日志中记录有所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况,对所述运行状态日志进行分析包括:对所述运行状态日志中所述文件触发的各项操作行为按照预先设置的权重进行加权累加;判断加权累加值是否大于预设值,若是,确定所述文件为恶意文件,并且The file analysis device is used to extract files from the TCP connection data, and includes: a dynamic behavior security analysis module used to determine a corresponding virtual detection environment according to the type of the file; run or Open the file, and monitor the running state of the virtual detection environment, generate a running state log; analyze the running state log, obtain the dynamic behavior security analysis result of the file, and record some in the running state log The memory changes, registry modifications, process changes, and network connections of the virtual detection environment, the analysis of the operation status log includes: the various operation behaviors triggered by the files in the operation status log according to the pre-set The set weight is weighted and accumulated; judging whether the weighted cumulative value is greater than the preset value, if so, determining that the file is a malicious file, and 所述数据包安全扫描装置包括:The data packet security scanning device includes: 文件传输协议FTP扫描模块,用于对FTP协议的所述数据包进行安全扫描;A file transfer protocol FTP scanning module is used to perform security scanning on the data packets of the FTP protocol; 简单邮件传输协议SMTP扫描模块,用于SMTP协议的所述数据包进行安全扫描;Simple Mail Transfer Protocol SMTP scanning module, used for the described data packet of SMTP agreement to carry out safety scanning; 邮局协议的第3个版本POP3扫描模块,用于POP3协议的所述数据包进行安全扫描;The third version POP3 scanning module of the post office protocol, which is used for the security scanning of the data packets of the POP3 protocol; 超文本传输协议HTTP扫描模块,用于HTTP协议的所述数据包进行安全扫描;The hypertext transfer protocol HTTP scanning module is used for the described data packet of HTTP agreement to carry out safety scanning; 简单网络管理协议SNMP扫描模块,用于SNMP协议的所述数据包进行安全扫描;Simple Network Management Protocol SNMP scanning module, for the described data packet of SNMP agreement to carry out safety scanning; 网络新闻传输协议NNTP扫描模块,用于NNTP协议的所述数据包进行安全扫描;Network news transfer protocol NNTP scanning module, used for the described data packet of NNTP agreement to carry out safe scanning; 域名系统DNS解析请求扫描模块,用于DNS解析请求协议的所述数据包进行安全扫描。The domain name system DNS resolution request scanning module is used for security scanning of the data packets of the DNS resolution request protocol. 12.根据权利要求11所述的安全检测服务器,其中,所述数据包抓取接口被配置为:利用交换机的网络旁路复制网络中传输的数据包并送入所述安全检测服务器的网卡。12 . The security detection server according to claim 11 , wherein the data packet capture interface is configured to use a network bypass of a switch to copy data packets transmitted in the network and send them to the network card of the security detection server. 13 . 13.根据权利要求11所述的安全检测服务器,其中,所述组包装置被配置为:将所述数据包写入缓存文件;对写入缓存文件的数据包进行重组,还原为TCP连接数据。13. The security detection server according to claim 11, wherein the grouping device is configured to: write the data packets into a cache file; reassemble the data packets written into the cache file, and restore them to TCP connection data . 14.根据权利要求13所述的安全检测服务器,其中,所述协议识别装置被配置为:按照重组后的数据包的数据特征和端口特征判断所述数据包使用的应用层协议。14. The security detection server according to claim 13, wherein the protocol identification device is configured to: judge the application layer protocol used by the data packet according to the data characteristics and port characteristics of the reassembled data packet. 15.根据权利要求11所述的安全检测服务器,其中,还包括:15. The security detection server according to claim 11, further comprising: 所述文件分析装置,还用于对所述文件进行云安全分析。The file analysis device is also used to perform cloud security analysis on the file. 16.根据权利要求15所述的安全检测服务器,其中,所述文件分析装置包括:16. The security detection server according to claim 15, wherein the file analysis device comprises: 散列值云分析模块,用于计算所述文件的散列值,并将所述散列值与云安全服务器中的散列值危险列表比对;The hash value cloud analysis module is used to calculate the hash value of the file, and compares the hash value with the hash value danger list in the cloud security server; URL云分析模块,用于提取所述文件的统一资源定位符URL,并将所述URL与云安全服务器中的URL危险列表比对。The URL cloud analysis module is used to extract the Uniform Resource Locator URL of the file, and compare the URL with the URL risk list in the cloud security server. 17.根据权利要求11所述的安全检测服务器,其中,所述动态行为安全分析模块监控虚拟检测环境的运行状态包括:监控所述虚拟检测环境的内存变化情况、注册表修改情况、进程变化情况、网络连接情况。17. The security detection server according to claim 11, wherein the monitoring of the running status of the virtual detection environment by the dynamic behavior security analysis module comprises: monitoring the memory changes, registry modification, and process changes of the virtual detection environment , Network connection status.
CN201310576843.1A 2013-11-18 2013-11-18 The safety detection method and safety detection server of network data Active CN103634306B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310576843.1A CN103634306B (en) 2013-11-18 2013-11-18 The safety detection method and safety detection server of network data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310576843.1A CN103634306B (en) 2013-11-18 2013-11-18 The safety detection method and safety detection server of network data

Publications (2)

Publication Number Publication Date
CN103634306A CN103634306A (en) 2014-03-12
CN103634306B true CN103634306B (en) 2017-09-15

Family

ID=50214934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310576843.1A Active CN103634306B (en) 2013-11-18 2013-11-18 The safety detection method and safety detection server of network data

Country Status (1)

Country Link
CN (1) CN103634306B (en)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099821B (en) * 2015-07-30 2020-05-12 奇安信科技集团股份有限公司 Method and device for traffic monitoring in cloud-based virtual environment
CN105046154A (en) * 2015-08-13 2015-11-11 浪潮电子信息产业股份有限公司 Webshell detection method and device
CN105553767B (en) * 2015-12-15 2018-12-25 北京奇虎科技有限公司 Website backdoor file detection method and device
US10257223B2 (en) * 2015-12-21 2019-04-09 Nagravision S.A. Secured home network
CN105631331B (en) * 2015-12-24 2018-12-07 北京奇虎科技有限公司 Safety protecting method and device
CN106561024B (en) * 2015-12-28 2020-05-19 哈尔滨安天科技集团股份有限公司 Enterprise-level-based remote APT detection method and high-performance server
CN105844154B (en) * 2016-03-19 2018-09-07 浙江大学 A kind of rogue program detection method based on internal honey jar
CN107786524B (en) * 2016-08-31 2020-11-10 中国电信股份有限公司 Method and device for detecting advanced persistent threat
CN106355095B (en) * 2016-11-23 2018-10-19 吉林大学 Method for distinguishing is known to fraud webpage using fuzzy theory
CN106790230A (en) * 2017-01-16 2017-05-31 北京匡恩网络科技有限责任公司 Data processing method, device, system and data server
CN106888221A (en) * 2017-04-15 2017-06-23 北京科罗菲特科技有限公司 A kind of Secure Information Tanslation Through Netware method
CN108881129A (en) * 2017-05-16 2018-11-23 中兴通讯股份有限公司 A kind of advanced duration threatens attack detection method and device
CN107360170A (en) * 2017-07-18 2017-11-17 百色闻远网络科技有限公司 A kind of computer network security detection method
CN107835149B (en) * 2017-09-13 2020-06-05 杭州安恒信息技术股份有限公司 Network privacy stealing behavior detection method and device based on DNS (Domain name System) traffic analysis
CN107454109B (en) * 2017-09-22 2020-06-23 杭州安恒信息技术股份有限公司 Network privacy stealing behavior detection method based on HTTP traffic analysis
CN107623693B (en) * 2017-09-30 2021-03-19 北京奇虎科技有限公司 Domain name resolution protection method and device, system, computing device, and storage medium
CN108038374A (en) * 2017-12-26 2018-05-15 郑州云海信息技术有限公司 It is a kind of to detect the method threatened in real time
CN110020251A (en) * 2017-12-30 2019-07-16 惠州学院 The method and system of the harmful video of identification based on User IP and trailer content
CN110020254A (en) * 2017-12-30 2019-07-16 惠州学院 The method and system of the harmful video of identification based on User IP and video copy
CN108200076B (en) * 2018-01-17 2021-04-27 杭州迪普科技股份有限公司 Method and device for protecting Host header field counterfeiting attack
CN109688092A (en) * 2018-04-25 2019-04-26 北京微步在线科技有限公司 It falls equipment detection method and device
CN108924106B (en) * 2018-06-21 2020-11-03 上海鹏越惊虹信息技术发展有限公司 Terminal internet auditing method based on network card packet capturing
CN109753796B (en) * 2018-12-07 2021-06-08 广东技术师范学院天河学院 A kind of big data computer network security protection device and using method
CN110363002A (en) * 2019-07-16 2019-10-22 杭州安恒信息技术股份有限公司 A kind of intrusion detection method, device, equipment and readable storage medium storing program for executing
CN111092902B (en) * 2019-12-26 2020-12-25 中国科学院信息工程研究所 Attachment camouflage-oriented fishfork attack mail discovery method and device
CN111200652A (en) * 2019-12-31 2020-05-26 奇安信科技集团股份有限公司 Application identification method, application identification device and computing device
CN111163103B (en) * 2019-12-31 2022-07-29 奇安信科技集团股份有限公司 Risk control method and apparatus executed by computing device, and medium
CN113536305B (en) * 2020-04-17 2022-09-09 武汉瓯越网视有限公司 Method and device for detecting acquisition behavior
CN111625827B (en) * 2020-05-29 2024-04-09 深信服科技股份有限公司 File processing method, device, terminal equipment and computer readable storage medium
CN112560020B (en) * 2021-02-19 2022-08-02 鹏城实验室 Threat attack detection method, device, terminal equipment and storage medium
CN114844669B (en) * 2022-03-17 2024-01-30 中国工商银行股份有限公司 Data processing method and device
CN115549980B (en) * 2022-09-13 2023-04-18 应急管理部大数据中心 Network flow auditing device and method for protocol re-editing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102799804A (en) * 2012-04-30 2012-11-28 珠海市君天电子科技有限公司 Comprehensive identification method and system for security of unknown file
CN103248606A (en) * 2012-02-02 2013-08-14 哈尔滨安天科技股份有限公司 Network virus detection method and system for IPv4 (Internet Protocol Version 4) and IPv6 (Internet Protocol Version 6)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647408A (en) * 2012-02-27 2012-08-22 珠海市君天电子科技有限公司 Method for judging phishing website based on content analysis

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248606A (en) * 2012-02-02 2013-08-14 哈尔滨安天科技股份有限公司 Network virus detection method and system for IPv4 (Internet Protocol Version 4) and IPv6 (Internet Protocol Version 6)
CN102799804A (en) * 2012-04-30 2012-11-28 珠海市君天电子科技有限公司 Comprehensive identification method and system for security of unknown file

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
墙中的应用.《计算机工程》.2007,(第03(2007)期),正文第2-3节,图2,表1. *
郭锡泉.应用层协议分析在状态检测防&#12117 *

Also Published As

Publication number Publication date
CN103634306A (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN103634306B (en) The safety detection method and safety detection server of network data
US11636208B2 (en) Generating models for performing inline malware detection
US10354072B2 (en) System and method for detection of malicious hypertext transfer protocol chains
US20210200859A1 (en) Malware detection by a sandbox service by utilizing contextual information
US8850584B2 (en) Systems and methods for malware detection
US10216931B2 (en) Detecting an attempt to exploit a memory allocation vulnerability
US20250047694A1 (en) Inline malware detection
CN108369541B (en) System and method for threat risk scoring of security threats
EP3111330A1 (en) System and method for verifying and detecting malware
CN103401863B (en) A kind of network data analysis method and apparatus based on cloud security
CN103701816B (en) Perform the scan method and scanning means of the server of Denial of Service attack
CN103279707A (en) Method, device and system for actively defending against malicious programs
US12261876B2 (en) Combination rule mining for malware signature generation
KR102676386B1 (en) Inline malware detection
US20240333759A1 (en) Inline ransomware detection via server message block (smb) traffic
Hsu et al. Scalable network-based buffer overflow attack detection
US12432225B2 (en) Inline malware detection
US12430437B2 (en) Specific file detection baked into machine learning pipelines
Ahmed Behaviour anomaly on linux systems to detect zero-day malware attacks
US20220245249A1 (en) Specific file detection baked into machine learning pipelines
US20250227116A1 (en) Systems and methods for structural similarity based hashing
Waraich Automated attack signature generation: A survey
Forest HoneySift: a fast approach for low interaction client based Honeypot
ZHAO et al. Drive-by Download Attacks Detection in Real-time
Comparetti D21 (D4. 7) Consolidated report with evaluation results

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220408

Address after: 100016 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.