CN115643082A - Method and device for determining lost host and computer equipment - Google Patents
Method and device for determining lost host and computer equipment Download PDFInfo
- Publication number
- CN115643082A CN115643082A CN202211287900.XA CN202211287900A CN115643082A CN 115643082 A CN115643082 A CN 115643082A CN 202211287900 A CN202211287900 A CN 202211287900A CN 115643082 A CN115643082 A CN 115643082A
- Authority
- CN
- China
- Prior art keywords
- data
- host
- risk
- target
- suspected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 92
- 238000001514 detection method Methods 0.000 claims abstract description 68
- 230000008439 repair process Effects 0.000 claims description 117
- 230000015654 memory Effects 0.000 claims description 22
- 238000007500 overflow downdraw method Methods 0.000 claims description 22
- 231100000279 safety data Toxicity 0.000 claims description 20
- 238000012549 training Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 12
- 238000013528 artificial neural network Methods 0.000 claims description 7
- 238000012216 screening Methods 0.000 claims description 7
- 230000004927 fusion Effects 0.000 claims description 5
- 238000003062 neural network model Methods 0.000 claims description 3
- 230000006403 short-term memory Effects 0.000 claims description 2
- 230000007787 long-term memory Effects 0.000 claims 1
- 238000012163 sequencing technique Methods 0.000 claims 1
- 230000001010 compromised effect Effects 0.000 abstract description 140
- 238000004590 computer program Methods 0.000 description 41
- 238000011084 recovery Methods 0.000 description 27
- 238000012806 monitoring device Methods 0.000 description 11
- 230000006378 damage Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 230000000903 blocking effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000002790 cross-validation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000002068 genetic effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
本申请实施例提供了一种失陷主机的确定方法、装置及计算机设备,该基于待检测主机不同类型的初始安全数据对各待检测主机进行恶意域名检测,从待检测主机中筛选出疑似主机,进一步的根据疑似主机中的初始安全数据从疑似主机中确定失陷主机。本申请提供的失陷主机的确定方法在基于恶意域名检测的基础上,继续基于疑似主机中的初始安全数据从疑似主机中确定失陷主机,改善了仅通过恶意域名检测的方法确定失陷主机导致确定失陷主机准确性较差的问题。
The embodiment of the present application provides a method, device and computer equipment for determining a compromised host, which detects malicious domain names on each host to be detected based on different types of initial security data of the hosts to be detected, and screens out suspected hosts from the hosts to be detected, Further determine the lost host from the suspected hosts according to the initial security data in the suspected hosts. The method for determining the compromised host provided by this application is based on the detection of malicious domain names, continues to determine the compromised host from the suspected hosts based on the initial security data in the suspected host, and improves the method of determining the compromised host only through the detection of malicious domain names. Issue with poor host accuracy.
Description
技术领域technical field
本申请涉及通信技术领域,尤其涉及一种失陷主机的确定方法、装置及计算机设备。The present application relates to the technical field of communications, and in particular to a method, device and computer equipment for determining a lost host.
背景技术Background technique
失陷主机指网络入侵攻击者以某种方式获得控制权的主机。在获得控制权后,攻击者可能以该主机为跳板继续攻击企业内网的其它主机,且还会主动与网络入侵攻击者指定的IP或者域名进行通信,并传输其上存储的安全数据。另外,失陷主机往往具有无规律性、高隐蔽性的特点,很多入侵动作本身难以识别或无法确认攻击对否成功。所以,需要对各主机进行失陷检测,以及时的对失陷主机进行修复,从而保障企业的用网安全。A compromised host is a host that a network intrusion attacker has somehow gained control of. After gaining control, the attacker may use the host as a springboard to continue attacking other hosts in the enterprise intranet, and will actively communicate with the IP or domain name specified by the network intrusion attacker, and transmit the security data stored on it. In addition, compromised hosts are often characterized by irregularity and high concealment, and many intrusion actions are difficult to identify or confirm the success of the attack. Therefore, it is necessary to detect the failure of each host, and repair the lost host in time, so as to ensure the network security of the enterprise.
相关技术中,失陷主机的确定方法包括获取待检测域名,并判断待检测域名是否为恶意域名,若该待检测域名为恶意域名,则存储有该待检测域名的待检测主机直接确定为失陷主机。In related technologies, the method for determining the compromised host includes obtaining the domain name to be detected, and judging whether the domain name to be detected is a malicious domain name. If the domain name to be detected is a malicious domain name, the host to be detected that stores the domain name to be detected is directly determined as the compromised host .
然而,上述确定失陷主机的方法准确性较低。However, the accuracy of the above method for determining the compromised host is low.
发明内容Contents of the invention
本申请实施例提供了一种失陷主机的确定方法、装置及计算机设备,能够根据对待检测主机进行恶意域名检测后从待检测主机中确定疑似主机,进一步的通过疑似主机中的初始安全数据确定该疑似主机是都为失陷主机,改善了仅通过恶意域名检测确定主机是否失陷导致的准确性低的问题。The embodiment of the present application provides a method, device, and computer equipment for determining a compromised host, which can determine the suspected host from the hosts to be detected after detecting malicious domain names on the host to be detected, and further determine the suspected host through the initial security data in the suspected host. Suspected hosts are all compromised hosts, which improves the problem of low accuracy caused by only detecting whether a host is compromised through malicious domain name detection.
本申请实施例第一方面提供一种失陷主机的确定方法,该确定方法包括:The first aspect of the embodiment of the present application provides a method for determining a crashed host, the method for determining includes:
获取各待检测主机的初始安全数据,所述初始安全数据是所述待检测主机在运行过程中产生的数据;Acquiring initial security data of each host to be detected, where the initial security data is data generated during operation of the host to be detected;
基于异构数据融合法对各所述初始安全数据进行融合,得到目标安全数据;merging each of the initial safety data based on a heterogeneous data fusion method to obtain target safety data;
将所述目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各所述待检测主机中筛选出疑似主机,所述疑似主机的各待检测域名中包括所述恶意域名,所述检测模型由正常域名与恶意域名训练所得;Input the domain names to be detected in the target security data into the detection model to detect malicious domain names, and screen out suspected hosts from the hosts to be detected based on the detection results, and the domain names to be detected of the suspected hosts include The malicious domain name, the detection model is obtained by training normal domain names and malicious domain names;
基于所述疑似主机的初始安全数据,从所述疑似主机中确定失陷主机。Based on the initial security data of the suspected hosts, the compromised host is determined from the suspected hosts.
本申请实施例第二方面提供一种失陷主机的确定装置,该装置包括:The second aspect of the embodiment of the present application provides a device for determining a lost host, the device includes:
获取模块,用于获取各待检测主机的初始安全数据,所述初始安全数据是所述待检测主机在运行过程中产生的数据;An acquisition module, configured to acquire initial security data of each host to be detected, where the initial security data is data generated during operation of the host to be detected;
融合模块,用于基于异构数据融合法对各所述初始安全数据进行融合,得到目标安全数据;A fusion module, configured to fuse each of the initial security data based on a heterogeneous data fusion method to obtain target security data;
检测筛选模块,用于将所述目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各所述待检测主机中筛选出疑似主机,所述疑似主机的各待检测域名中包括所述恶意域名,所述检测模型由正常域名与恶意域名训练所得;A detection and screening module, configured to input the domain names to be detected in the target security data into the detection model to detect malicious domain names, and screen out suspected hosts from each of the hosts to be detected based on the detection results, and the suspected hosts Each domain name to be detected includes the malicious domain name, and the detection model is obtained by training a normal domain name and a malicious domain name;
确定模块,用于基于所述疑似主机的初始安全数据,从所述疑似主机中确定失陷主机。A determining module, configured to determine a compromised host from among the suspected hosts based on the initial security data of the suspected hosts.
本申请实施例第三方面提供了一种计算机设备,包括处理器和用于存储处理器可执行指令的存储器,处理器用于从存储器中读取可执行指令,并执行指令以实现本申请实施例第一方面提供的失陷主机的确定方法。The third aspect of the embodiments of the present application provides a computer device, including a processor and a memory for storing processor-executable instructions, and the processor is used for reading executable instructions from the memory and executing the instructions to implement the embodiments of the present application The method for determining a compromised host provided in the first aspect.
本申请实施例第四方面提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时以实现本申请实施例第一方面提供的失陷主机的确定方法。The fourth aspect of the embodiment of the present application provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the method for determining a compromised host provided in the first aspect of the embodiment of the present application is implemented.
本申请实施例第五方面提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时以实现本申请实施例第一方面提供的失陷主机的检测方法。The fifth aspect of the embodiment of the present application provides a computer program product, including a computer program. When the computer program is executed by a processor, the method for detecting a compromised host provided in the first aspect of the embodiment of the present application is implemented.
本申请实施例提供的技术方案至少可以达到以下有益效果:The technical solutions provided by the embodiments of the present application can at least achieve the following beneficial effects:
本申请实施例提供的失陷主机的确定方法,该确定方法基于待检测主机不同类型的初始安全数据对各待检测主机进行恶意域名检测,从待检测主机中筛选出疑似主机,进一步的根据疑似主机中的初始安全数据从疑似主机中确定失陷主机。本申请提供的失陷主机的确定方法在基于恶意域名检测的基础上,继续基于疑似主机中的初始安全数据从疑似主机中确定失陷主机,改善了仅通过恶意域名检测的方法确定失陷主机导致确定失陷主机准确性较差的问题。The method for determining a compromised host provided in the embodiment of the present application, the determination method is based on different types of initial security data of the host to be detected to detect the malicious domain name of each host to be detected, screen out the suspected host from the hosts to be detected, and further base on the suspected host Identify compromised hosts from suspected hosts using the initial security data in . The method for determining the compromised host provided by this application is based on the detection of malicious domain names, and continues to determine the compromised host from the suspected hosts based on the initial security data in the suspected hosts, which improves the method of determining the compromised host only through the detection of malicious domain names. Issue with poor host accuracy.
附图说明Description of drawings
图1是本申请一示例性实施例示出的一种失陷主机的确定方法的应用场景图;FIG. 1 is an application scenario diagram of a method for determining a compromised host shown in an exemplary embodiment of the present application;
图2是本申请一示例性实施例示出的一种失陷主机的确定方法的流程示意图;Fig. 2 is a schematic flowchart of a method for determining a crashed host shown in an exemplary embodiment of the present application;
图3是本申请一示例性实施例示出的一种失陷主机的确定方法的流程示意图;Fig. 3 is a schematic flowchart of a method for determining a crashed host shown in an exemplary embodiment of the present application;
图4是本申请一示例性实施例示出的再一种失陷主机的确定方法的流程示意图;Fig. 4 is a schematic flowchart of another method for determining a failed host shown in an exemplary embodiment of the present application;
图5是本申请一示例性实施例示出的又一种失陷主机的确定方法的流程示意图;Fig. 5 is a schematic flowchart of another method for determining a crashed host shown in an exemplary embodiment of the present application;
图6是本申请一示例性实施例示出的另一种失陷主机的确定方法的流程示意图;Fig. 6 is a schematic flowchart of another method for determining a crashed host shown in an exemplary embodiment of the present application;
图7是本申请一示例性实施例示出的再一种失陷主机的确定方法的流程示意图;Fig. 7 is a schematic flowchart of another method for determining a crashed host shown in an exemplary embodiment of the present application;
图8是本申请一示例性实施例示出的又一种失陷主机的确定方法的流程示意图;Fig. 8 is a schematic flowchart of another method for determining a crashed host shown in an exemplary embodiment of the present application;
图9是本申请一示例性实施例示出的另一种失陷主机的确定的流程示意图;Fig. 9 is a schematic flow chart of determining another crashed host shown in an exemplary embodiment of the present application;
图10是本申请一示例性实施例示出的一种失陷主机的确定装置的结构框图;Fig. 10 is a structural block diagram of an apparatus for determining a compromised host shown in an exemplary embodiment of the present application;
图11是本申请一示例性实施例示出的一种计算机设备的内部结构图。Fig. 11 is an internal structure diagram of a computer device shown in an exemplary embodiment of the present application.
具体实施方式Detailed ways
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.
在本申请使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and/or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.
应当理解,尽管在本申请可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本申请范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be called first information. Depending on the context, the word "if" as used herein may be interpreted as "at" or "when" or "in response to a determination."
本公开实施例可以应用于终端设备、计算机系统、服务器等电子设备,其可与众多其它通用或专用计算系统环境或配置一起操作。适于与终端设备、计算机系统、服务器等电子设备一起使用的众所周知的终端设备、计算系统、环境和/或配置的例子包括但不限于:个人计算机系统、服务器计算机系统、瘦客户机、厚客户机、手持或膝上设备、基于微处理器的系统、机顶盒、可编程消费电子产品、网络个人电脑、小型计算机系统、大型计算机系统和包括上述任何系统的分布式云计算技术环境等。Embodiments of the present disclosure may be applied to electronic devices such as terminal devices, computer systems, servers, etc., which may operate with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known terminal devices, computing systems, environments and/or configurations suitable for use with electronic devices such as terminal devices, computer systems, servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick client Computers, handheld or laptop devices, microprocessor-based systems, set-top boxes, programmable consumer electronics, networked personal computers, minicomputer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the foregoing.
终端设备、计算机系统、服务器等电子设备可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。Electronic devices such as terminal devices, computer systems, servers, etc. may be described in the general context of computer system-executable instructions, such as program modules, being executed by the computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc., that perform particular tasks or implement particular abstract data types. The computer system/server can be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computing system storage media including storage devices.
首先,对本申请中出现的技术术语作以介绍:First of all, the technical terms that appear in this application are introduced:
主机:是指计算机网络或者是通讯网络中使用的各种设备,这些设备包括但不局限于是计算机、交换机、路由器和安全设备等。Host: Refers to various devices used in computer networks or communication networks, including but not limited to computers, switches, routers, and security devices.
失陷主机:是指网络入侵攻击者以某种方式获得控制权的主机。在获得控制权后,攻击者可能以该失陷主机为跳板继续攻击企业内网的其他主机;另外,失陷主机往往具有无规律性、高隐蔽性的特点,很多入侵动作本身难以识别或无法确认攻击是否成功,但通过攻陷后的各种动作可以判断该主机已经被攻陷。办公设备或者服务器受攻击后被非法组织控制,就会主动向非法组织服务器指定IP或者域名进行通信,并传输其上存储的安全数据(例如人员、资产、事件、日志、配置、策略、流量等数据)。所以,需要对主机进行失陷检测,以及时的对失陷主机进行修复,从而保障企业的用网安全。Compromised host: refers to a host that a network intrusion attacker gains control in some way. After gaining control, the attacker may use the compromised host as a springboard to continue attacking other hosts in the enterprise intranet; in addition, the compromised host is often characterized by irregularity and high concealment, and many intrusion actions are difficult to identify or cannot confirm the attack. Whether it is successful or not, but through various actions after the compromise, it can be judged that the host has been compromised. After the office equipment or server is attacked and controlled by an illegal organization, it will actively communicate with the server of the illegal organization by specifying an IP or domain name, and transmit the security data stored on it (such as personnel, assets, events, logs, configuration, policies, traffic, etc. data). Therefore, it is necessary to detect the loss of the host, and repair the lost host in time, so as to ensure the security of the enterprise network.
域名系统:(Domain Name System,简称DNS)互联网中重要的基础核心服务之一,负责提供统一的域名地址空间映射服务,主要将易于人记忆的域名解析为易于机器识别的IP地址。Domain Name System: (Domain Name System, referred to as DNS) is one of the important basic core services in the Internet. It is responsible for providing a unified domain name address space mapping service, mainly resolving domain names that are easy for people to remember into IP addresses that are easy for machines to recognize.
恶意域名:是一种通过域名生成算法(Domain Generation Algorithm,简称DGA生成的域名。其常被攻击者使用在恶意程序的域名之中,用于木马软件与控制服务器之间的通讯。Malicious domain name: It is a domain name generated by Domain Generation Algorithm (DGA for short). It is often used by attackers in the domain name of malicious programs for communication between Trojan software and the control server.
由于主机一旦成为失陷主机,其上的安全数据会出现泄露的风险,同时还会对与其存在访问关系的其它主机造成威胁,为企业带来不可估量的损失。所以各企业在进行网络操作的过程中需要实时确定各主机中是否存在失陷主机。目前,常见的确定主机是否为失陷主机的方法是对所有的主机进行恶意域名检测,若检测到主机中包括恶意域名,则确定该主机为失陷主机。Once a host becomes a compromised host, there will be a risk of leaking security data on it, and at the same time, it will pose a threat to other hosts that have an access relationship with it, bringing immeasurable losses to the enterprise. Therefore, each enterprise needs to determine in real time whether there is a compromised host among the hosts in the process of network operation. At present, a common method for determining whether a host is a compromised host is to perform malicious domain name detection on all hosts, and if a malicious domain name is detected in a host, then it is determined that the host is a compromised host.
上述确定主机是否为失陷主机的方法,其仅通过恶意域名检测来确定,其准确性较低。The above-mentioned method for determining whether the host is a compromised host is determined only through malicious domain name detection, and its accuracy is relatively low.
有鉴于此,本申请实施例提出一种失陷主机的确定方法,在基于恶意域名检测的基础上,继续基于疑似主机中的安全数据从疑似主机中确定失陷主机,改善了仅通过恶意域名检测的方法确定失陷主机导致确定失陷主机准确性较差的问题。In view of this, the embodiment of the present application proposes a method for determining a compromised host. On the basis of malicious domain name detection, continue to determine the compromised host from suspected hosts based on the security data in the suspected host, which improves the detection method only through malicious domain names. Methods Determining the compromised host leads to the problem that the accuracy of determining the compromised host is poor.
本申请实施例提供的失陷主机的确定方法,可以应用于如图1所示的应用环境中。其中,多个待检测主机102通过网络与目标主机104进行通信。数据存储系统可以集成在目标主机104上,也可以放在云上或其他网络主机上。目标主机104获取多个待检测主机102的初始安全数据,对多个待检测主机102的初始安全数据进行处理得到目标安全数据,并基于目标安全数据对多个待检测主机102进行恶意域名检测,以根据检测结果从多个待检测主机102中筛选出疑似主机,筛选出疑似主机后继续获取根据疑似主机的安全数据,从而根据疑似主机的安全数据从疑似主机中确定失陷主机。其中,待检测主机102以及目标主机104可以用独立的服务器或者是多个服务器组成的服务器集群来实现。The method for determining a crashed host provided in the embodiment of the present application may be applied to the application environment shown in FIG. 1 . Wherein,
以下结合附图对本申请实施例的具体技术方案进行示例性的说明。The specific technical solutions of the embodiments of the present application will be exemplarily described below in conjunction with the accompanying drawings.
图2是本申请一示例性实施例示出的一种失陷主机的确定方法的流程示意图。参照图2所示,具体包括以下步骤:Fig. 2 is a schematic flowchart of a method for determining a crashed host shown in an exemplary embodiment of the present application. As shown in Figure 2, specifically include the following steps:
步骤S100,获取各待检测主机的初始安全数据,初始安全数据是待检测主机在运行过程中产生的数据;Step S100, acquiring initial security data of each host to be detected, where the initial security data is data generated during operation of the host to be detected;
其中,待检测主机可以是目标企业服务器设备,待检测主机的数量至少为一个,也可以是多个,在此不做限定。初始安全数据是待检测主机运行过程中产生的数据,用于支持后续进行失陷主机的确定。初始安全数据可以是从待检测主机的存储器中获取,可以是从其它监测设备中获取,还可以是从待检测主机的存储器以及其它监测设备中获取,在此不做限定。在这里需要说明的是,其它监测设备是用于监测待检测主机运行数据的设备,例如包括流量监测设备、威胁情报信息监测设备等。示例性的,初始安全数据例如为实时接入的待检测主机的基础信息(例如待检测主机的内存、待检测主机的内核版本等)、资产数据(如系统账号、开放端口、数据库等)、资产运行数据(如进程行为数据、文件访问数据、系统操作数据、网络流量数据等)、威胁情报信息、行为日志数据(如DNS服务器请求响应日志、http超文本传输协议、服务器访问日志、登录日志、进程行为日志、文件日志、网络日志等)、网络流量数据(网络协议、对应协议的基础字段、流量数据)等。Wherein, the host to be detected may be a target enterprise server device, and the number of hosts to be detected is at least one, or may be multiple, which is not limited here. The initial security data is the data generated during the operation of the host to be detected, which is used to support the subsequent determination of the compromised host. The initial security data may be obtained from the memory of the host to be detected, may be obtained from other monitoring devices, and may also be obtained from the memory of the host to be detected and other monitoring devices, which is not limited here. It should be noted here that other monitoring devices are devices for monitoring the running data of the host to be detected, such as flow monitoring devices, threat intelligence information monitoring devices, and the like. Exemplarily, the initial security data is, for example, the basic information of the host to be detected that is accessed in real time (such as the memory of the host to be detected, the kernel version of the host to be detected, etc.), asset data (such as system accounts, open ports, databases, etc.), Asset operation data (such as process behavior data, file access data, system operation data, network traffic data, etc.), threat intelligence information, behavior log data (such as DNS server request response logs, http hypertext transfer protocol, server access logs, login logs , process behavior log, file log, network log, etc.), network traffic data (network protocol, basic fields corresponding to the protocol, traffic data), etc.
本申请可以是通过上述目标主机向待检测主机和/或其它监测设备发送获取指令,待检测主机和/或其它监测设备在接收到目标主机发送的获取指令后,将存储器中存储的初始安全数据打包发送至目标主机。待检测主机和/或其它监测设备在发送数据包时携带每一个待检测主机对应的标识,以便目标主机基于标识确定数据包中的数据对应的待检测主机,并进行分类存储。当然,目标主机也可以是将多个待检测主机和/或其它监测设备发送的数据包存储在同一存储器地址中,本申请对此不加以限定。In this application, the target host may send acquisition instructions to the host to be detected and/or other monitoring devices. After receiving the acquisition instruction sent by the target host, the host to be detected and/or other monitoring devices will store the initial security data Pack and send to the target host. The host to be detected and/or other monitoring devices carry the corresponding identification of each host to be detected when sending the data packet, so that the target host can determine the host to be detected corresponding to the data in the data packet based on the identification, and perform classified storage. Of course, the target host may also store data packets sent by multiple hosts to be detected and/or other monitoring devices in the same memory address, which is not limited in this application.
不同类型的初始安全数据相对于单一类型的初始安全数据具有下述优点:Different types of initial security data have the following advantages over a single type of initial security data:
单一类型的初始安全数据会因为外界干扰等因素,存在感知误差,而不同类型的初始安全数据可以在单一类型的初始安全数据发生确实或严重偏差时,基于不同类型初始安全数据的冗余性依然能够为失陷主机的确定提供准确的依据。A single type of initial safety data will have perception errors due to factors such as external interference, while different types of initial safety data can be accurate or seriously deviated from a single type of initial safety data, and the redundancy based on different types of initial safety data still remains It can provide accurate basis for determining the lost host.
单一类型的初始安全数据只能提供某单一方面的特征信息,无法做到整体描述,而不同类型的初始安全数据之间能够互补叠加,互相补充确实信息,最终得到更加清晰以及准确的描述。A single type of initial security data can only provide characteristic information of a single aspect, and cannot be described as a whole. However, different types of initial security data can complement each other, supplement each other's definite information, and finally obtain a clearer and more accurate description.
单一类型的初始安全数据得到及发送信息的时间和速度不变,而不同类型的初始安全数据能够弥补单一类型的初始安全数据这一劣势,得到实时数据信息,能够提高确定失陷主机的效率。The time and speed of obtaining and sending information of a single type of initial security data remain unchanged, while different types of initial security data can make up for the disadvantage of a single type of initial security data, and obtaining real-time data information can improve the efficiency of determining the compromised host.
示例性的,目标主机分别向A主机、B主机以及C主机发送初始安全数据获取指令,A主机、B主机以及C主机在接收到获取指令后,A主机将存储的企业资产数据打包发送至目标主机,B主机将存储的企业日志数据打包发送至目标主机,C主机将存储的企业用户数据发送至目标主机。Exemplarily, the target host sends initial security data acquisition instructions to host A, host B, and host C respectively. After host A, host B, and host C receive the acquisition instructions, host A packages the stored enterprise asset data and sends it to the target host, host B packages and sends the stored enterprise log data to the target host, and host C sends the stored enterprise user data to the target host.
步骤S200,基于异构数据融合法对各初始安全数据进行融合,得到目标安全数据;Step S200, based on the heterogeneous data fusion method, the initial security data is fused to obtain the target security data;
其中,异构数据融合法是针对不同来源数据的一种处理手段,其利用上述来自不同待检测主机和/或其它监测设备的初始安全数据,可以是进行过滤筛选、补全、转换、聚合归并、解析抽取等处理得到目标安全数据。异构数据融合法中运用的技术和算法例如包括:最小二乘法、加权平均数法、卡尔曼滤波法、贝叶斯估计技术、最小描述长度法、遗传算法、证据函数等。Among them, the heterogeneous data fusion method is a processing method for data from different sources. It uses the above-mentioned initial security data from different hosts to be detected and/or other monitoring devices to perform filtering, completion, conversion, aggregation and merging. , analysis and extraction to obtain the target security data. The technologies and algorithms used in heterogeneous data fusion methods include, for example, least squares method, weighted average method, Kalman filter method, Bayesian estimation technology, minimum description length method, genetic algorithm, evidence function, etc.
通过异构数据融合法对各初始安全数据进行融合,输出的目标安全数据能够减少确定失陷主机中的不确定性,改善确定失陷主机的质量。更重要的是,异构数据融合法能够有效的利用不同来源数据之间的冗余和补充性,从而在全局视角出发对失陷主机进行更加准确的确定,且经过异构数据融合法能够降低数据量并根据后续业务产生IP总表、IP会话日志等中间表信息,综合构建基础的安全数据中心,解决了不同类型的初始安全数据之间的冲突、属性分散,单来源数据不完整、片面等问题,支撑后续失陷主机的分析需求。通过异构融合法得到的目标安全数据,不仅在一定程度上对数据进行了降噪处理,改善了因为数据孤岛出现的实现主机确定不准确的情况发生,还能够支撑后续进行失陷主机的风险研判分析。The initial security data is fused by the heterogeneous data fusion method, and the output target security data can reduce the uncertainty in determining the compromised host and improve the quality of determining the compromised host. More importantly, the heterogeneous data fusion method can effectively utilize the redundancy and complementarity between different sources of data, so as to determine the compromised host more accurately from a global perspective, and the heterogeneous data fusion method can reduce the data According to the follow-up business, the IP summary table, IP session log and other intermediate table information will be generated, and the basic security data center will be comprehensively built to solve the conflicts between different types of initial security data, scattered attributes, incomplete and one-sided single-source data, etc. problems, and support the analysis needs of subsequent compromised hosts. The target security data obtained through the heterogeneous fusion method not only reduces the noise of the data to a certain extent, but also improves the occurrence of inaccurate host determination due to data islands, and can also support subsequent risk research and judgment of lost hosts analyze.
在一个实施例中,如图3所示,图3为本申请一示例性实施例示出的一种对各初始安全数据进行融合的一种可选的方法实施例,该方法实施例包括如下步骤:In one embodiment, as shown in FIG. 3, FIG. 3 is an optional method embodiment for fusing each initial security data shown in an exemplary embodiment of the present application. The method embodiment includes the following steps :
步骤S201,基于异构数据融合法对各初始安全数据进行融合,得到中间安全数据;Step S201, based on the heterogeneous data fusion method, the initial security data is fused to obtain the intermediate security data;
示例性的,本申请实施例可以是对各初始安全数据进行如下操作:Exemplarily, this embodiment of the application may perform the following operations on each initial security data:
对各初始安全数据通过配置数据解析算法,提取各初始安全数据的关键信息;对各初始安全数据的关键信息进行关联补全;为补全后的各初始安全数据打标签;最后获得中间安全数据。Configure the data analysis algorithm for each initial security data to extract the key information of each initial security data; complete the key information of each initial security data; label the completed initial security data; finally obtain the intermediate security data .
具体地:可以是从各初始安全数据的IP地址、当前主机IP地址、域名、URL、协议类型、事件内容等中提取关键信息,如下表所示:Specifically: key information can be extracted from the IP address of each initial security data, the current host IP address, domain name, URL, protocol type, event content, etc., as shown in the following table:
关联补全例如是对日志数据、固定资产信息(包括设备所归属用户的用户标识、归属用户所在的组织标识、归属用户的定位信息以及归属用户的通信信息等)等相关数据的内容进行丰富。Correlation completion is, for example, enriching the content of relevant data such as log data and fixed asset information (including the user ID of the user to which the device belongs, the organization ID of the user to which the device belongs, the location information of the user, and the communication information of the user, etc.).
本申请实施例可以是通过ATT&CK的技战术ID为初始安全数据打标签以对各初始安全数据进行分类标注,便于对海量的初始安全数据进行快速的分类,进一步的提高对数据进行分析的效率以及准确性。示例性的,一个图像可以包括成人、女、黄种人、长发等标签。对于文字,可以包括主语、谓语、宾语,名词动词等标签。In this embodiment of the present application, the technical and tactical ID of ATT&CK can be used to label the initial security data to classify and mark each initial security data, so as to facilitate the rapid classification of massive initial security data, and further improve the efficiency of data analysis and accuracy. Exemplarily, an image may include tags such as adult, female, yellow race, and long hair. For text, you can include tags such as subject, predicate, object, noun verb, etc.
具体地,对初始安全数据打标签时,需要进行数据特征提取,以获得初始安全数据的特征,根据初始安全数据的特征对初始安全数据打标签。例如主机应用程序日志中,发现已知恶意站点的链接,并且用户访问了该链接,给该主机打上“存在网络钓鱼风险”的标签。Specifically, when labeling the initial security data, it is necessary to perform data feature extraction to obtain the features of the initial security data, and label the initial security data according to the features of the initial security data. For example, if a link to a known malicious site is found in the host application log, and the user visits the link, the host is marked with a "phishing risk".
本申请实施例提供的技术方案首先对初始安全数据的预处理方法,然后基于处理后的初始安全数据提取出的多个关键信息,结合后续的确定方法,使得对失陷主机的确定更加的准确,降低了仅通过单一关键信息进行失陷主机确定的错误率。The technical solution provided by the embodiment of the present application first pre-processes the initial security data, and then combines the subsequent determination methods with multiple key information extracted from the processed initial security data to make the determination of the compromised host more accurate. The error rate of determining the compromised host by only a single key information is reduced.
步骤S202,对中间安全数据进行标准化处理,得到目标安全数据,标准化处理用于限定安全数据的数据格式以及数据内容的表现形式。Step S202, performing standardization processing on the intermediate security data to obtain target security data, and the standardization processing is used to limit the data format of the security data and the expression form of the data content.
其中,由于各待检测主机和其它监测设备存储初始安全数据时的存储规则不同,可能会存在数据格式、数据内容的表现形式等无法统一的情况,所以为了后续能够快速基于初始安全数据确定失陷主机,需要对各中间数据进行标准化处理,以将所有中间数据的数据格式以及数据内容的表现形式进行统一,提高失陷主机确定的效率。Among them, due to the different storage rules of each host to be detected and other monitoring devices when storing initial security data, there may be situations where the data format and data content expression cannot be unified, so in order to quickly determine the compromised host based on the initial security data , it is necessary to standardize the intermediate data, so as to unify the data format and the expression form of the data content of all intermediate data, and improve the efficiency of determining the compromised host.
步骤S300,将目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各待检测主机中筛选出疑似主机,疑似主机的各待检测域名中包括恶意域名,检测模型由正常域名与恶意域名训练所得;Step S300, input the domain names to be detected in the target security data into the detection model to detect malicious domain names, and screen out suspected hosts from each host to be detected based on the detection results, and the domain names to be detected of the suspected hosts include malicious domain names, The detection model is trained from normal domain names and malicious domain names;
其中,待检测域名来自于目标安全数据,例如可以是从目标安全数据中的DNS日志数据中获取待检测域名。通过检测待检测域名能够检测待检测主机是否与攻击者具有通信关系,若攻击者利用待检测域名与待检测主机进行通信,则可以确定该待检测域名为恶意域名,进一步的能够基于恶意域名从各待检测主机中确定出疑似主机。本申请实施例是根据检测模型对待检测域名进行恶意域名检测,通过检测模型对待检测域名进行恶意域名检测,能够更快的获得恶意域名的检测结果。Wherein, the domain name to be detected comes from the target security data, for example, the domain name to be detected may be obtained from DNS log data in the target security data. By detecting the domain name to be detected, it can be detected whether the host to be detected has a communication relationship with the attacker. If the attacker uses the domain name to be detected to communicate with the host to be detected, it can be determined that the domain name to be detected is a malicious domain name. Suspected hosts are determined from each host to be detected. In the embodiment of the present application, the malicious domain name detection is performed on the domain name to be detected according to the detection model, and the detection result of the malicious domain name can be obtained more quickly through the detection model.
基于上述方法获得恶意域名后,可以是将包含恶意域名的待检测主机筛选为疑似主机,疑似主机可以是一台,也可以是多台,在此不做限定。After the malicious domain name is obtained based on the above method, the host to be detected containing the malicious domain name may be screened as a suspected host. The suspected host may be one or multiple, which is not limited here.
另外,本申请实施例还可以是在从各待检测主机中筛选出疑似主机后,触发告警机制,例如可以是将疑似主机的告警级别调整为中级。In addition, in the embodiment of the present application, after the suspected host is screened out from the hosts to be detected, an alarm mechanism may be triggered, for example, the alarm level of the suspected host may be adjusted to a medium level.
在另一个实施例中,如图4所示,图4为本申请一示例性实施例示出的一种获得检测模型的一种可选的方法实施例,该方法实施例包括如下步骤:In another embodiment, as shown in FIG. 4, FIG. 4 is an optional method embodiment for obtaining a detection model shown in an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S301,获取多个正常域名和多个恶意域名;Step S301, obtaining multiple normal domain names and multiple malicious domain names;
示例性的,例如可以是选取Alexa(http://www.secrepo.com)和Cisco数据集中前1000000个数据作为正常域名的样本:选取的正常域名例如为google.com、facebook.com、youtube.com、baidu.com、yahoo.com、amazon.com、wikipedia.org、qq.com、twitter.com等。Exemplarily, for example, the first 1,000,000 data in Alexa (http://www.secrepo.com) and Cisco data sets can be selected as samples of normal domain names: the selected normal domain names are, for example, google.com, facebook.com, youtube. com, baidu.com, yahoo.com, amazon.com, wikipedia.org, qq.com, twitter.com, etc.
可以是从http://data.netlab.360.com/dga/等开源网站中获取恶意域名数据集,选取如abcbot、ccleaner、dmsniff、fobber、madmax、necro、proslikefan、rovnix、tempedreve、vidro等恶意域名数据集,并从恶意域名数据集中选取前1000000个数据作为恶意域名样本。选取的恶意域名例如为kyyjpvvbi.com、bkiypvvjy.pages.dev、kyyjpvvbi.tk、vyvpykbij.com、kyyjpvvbi.pages.dev、yivvjbypk.com、ykjbpvviy.pages.dev、ykjbpvviy.com、kvyjiyvpb.pages.dev、pikbyjyvv.pages.dev、kyjivpvyb.pages.dev等。It can be to obtain malicious domain name datasets from open source websites such as http://data.netlab.360.com/dga/, and select malicious domain names such as abcbot, ccleaner, dmsniff, fobber, madmax, necro, proslikefan, rovnix, tempedreve, vidro, etc. Domain name data set, and select the first 1,000,000 data from the malicious domain name data set as malicious domain name samples. The selected malicious domain names are, for example, kyyjpvvbi.com, bkiypvvjy.pages.dev, kyyjpvvbi.tk, vyvpykbij.com, kyyjpvvbi.pages.dev, yivvjbypk.com, ykjbpvviy.pages.dev, ykjbpvviy.com, kvyjiyvpb.pages.dev, pikbyjyvv.pages.dev, kyjivpvyb.pages.dev, etc.
在获取了正常域名样本和恶意域名样本后,本申请实施例还可以是对样本进行清洗、主域名提取等提取操作。After obtaining normal domain name samples and malicious domain name samples, the embodiment of the present application may also perform extraction operations such as cleaning the samples and extracting the main domain name.
步骤S302,提取各正常域名的特征信息以及各恶意域名的特征信息,特征信息包括域名的字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个;Step S302, extracting feature information of each normal domain name and feature information of each malicious domain name, the feature information includes the character randomness of the domain name, the length of the character, the proportion of vowels in the character, the proportion of unique characters in the character and the top-level domain name at least one;
其中,特征信息例如包括字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个。Wherein, the characteristic information includes, for example, at least one of character randomness, character length, proportion of vowels in characters, proportion of unique characters in characters, and top-level domain name.
正常域名和恶意域名的字符随机性表现的特点为:恶意域名的字符随机性大于正常域名的字符随机性;The characteristics of the character randomness of normal domain names and malicious domain names are as follows: the character randomness of malicious domain names is greater than that of normal domain names;
正常域名和恶意域名的字符的长度表现的特点为:正常域名的字符长度都在19以内,集中在8到12之间,只有少数正常域名的字符的长度到达19以上;而恶意域名长度范围在8到32之间,并出现了2个高峰点,分别是12和30,其中字符的长度为30的恶意域名数量更多。The character lengths of normal domain names and malicious domain names are characterized by: the character length of normal domain names is within 19, concentrated between 8 and 12, and only a few normal domain names have a character length of more than 19; while the length of malicious domain names ranges from between 8 and 32, and there are two peaks, namely 12 and 30, in which the number of malicious domain names with a character length of 30 is more.
正常域名和恶意域名的字符中元音字母的比例表现的特点为:为了方便使用者记忆,同时为了具有较好的可读性,正常域名的拼音中通常采用单词或名字,且往往会在单词或者名字中插入一定的元音字母,让域名读起来更顺口。而由于恶意域名是随机生成的,不会考虑可读性,所以正常域名中元音字母的比例比恶意域名中元音字母的比例高。The characteristics of the proportion of vowel letters in the characters of normal domain names and malicious domain names are as follows: in order to facilitate the user's memory and to have better readability, the pinyin of normal domain names usually uses words or names, and often appears in words Or insert certain vowels into the name to make the domain name easier to read. And because malicious domain names are randomly generated without considering readability, the proportion of vowels in normal domain names is higher than that in malicious domain names.
正常域名和恶意域名的字符中唯一字符的比例表现的特点为:唯一字符是域名中不同字符的个数,如域名baidu的唯一字符[b.a.i.d.u],字符数为5;域名urlzt.com唯一字符数有[u.r.l.z.t],字符为4。由于恶意域名有很大的随机性,所以其中的唯一字符较高,那么表现的特点为正常域名中唯一字符的比例比恶意域名中唯一字符的比例低。The characteristics of the proportion of unique characters in normal domain names and malicious domain names are: unique characters are the number of different characters in the domain name, such as the unique character [b.a.i.d.u] of the domain name baidu, the number of characters is 5; the number of unique characters in the domain name urlzt.com There is [u.r.l.z.t] with character 4. Due to the great randomness of malicious domain names, the number of unique characters in them is relatively high, so the characteristic is that the proportion of unique characters in normal domain names is lower than that in malicious domain names.
正常域名和恶意域名顶级域名表现的特点为:正常域名的顶级域名一般会使用常见的顶级域名,如.cn和.com等。恶意域名的顶级域名比较随意,攻击者会选择一些审核不严格的顶级域名,如.biz和.ru等。例如,正常域名中包括1933个常用顶级域名数和67个其它顶级域名;那么恶意域名中可能就会包括1342个常用顶级域名数和658个其它顶级域名,可见恶意域名中有近2/3的顶级域名是不常用的顶级域名。所以表现的特点为正常域名中顶级域名中常用顶级域名的占比高于恶意域名中常用顶级域名的占比。The top-level domains of normal domain names and malicious domain names have the following characteristics: the top-level domain names of normal domain names generally use common top-level domain names, such as .cn and .com. The top-level domain names of malicious domain names are relatively random, and attackers will choose some top-level domain names that are not strictly reviewed, such as .biz and .ru. For example, normal domain names include 1933 commonly used top-level domain names and 67 other top-level domain names; then malicious domain names may include 1342 commonly used top-level domain names and 658 other top-level domain names. It can be seen that nearly two-thirds of malicious domain names are Top-level domains are top-level domains that are not commonly used. Therefore, the characteristic of the performance is that the proportion of common top-level domain names in the top-level domain names of normal domain names is higher than that of common top-level domain names in malicious domain names.
在机器学习中,因为模型的输入项基本都需要是数值型变量,而类别变量本身不带数值属性,通常需要对类别变量单独做处理。所以基于上述方法,提取了正常域名和恶意域名的特征信息后,还需要对正常域名和恶意域名做字符级标签编码,通常采用labelencoding树模型中常用的变量转换方法将类别变量转换成数值型。例如:把[g,o,o,g,l,e,c,o,m]转换为[1,2,2,1,3,4,5,6,2,7],于是正常域名和恶意域名就完成了数值型转换。以便于根据正常域名和恶意域名进行机器学习,得到鲁棒性更好的检测模型。In machine learning, because the input items of the model basically need to be numerical variables, and the categorical variables themselves do not have numerical attributes, it is usually necessary to treat the categorical variables separately. Therefore, based on the above method, after extracting the feature information of normal domain names and malicious domain names, it is necessary to perform character-level label encoding on normal domain names and malicious domain names. Usually, variable conversion methods commonly used in the labelencoding tree model are used to convert category variables into numeric types. For example: convert [g, o, o, g, l, e, c, o, m] to [1, 2, 2, 1, 3, 4, 5, 6, 2, 7], so the normal domain name and The malicious domain name has completed the numerical conversion. In order to facilitate machine learning based on normal domain names and malicious domain names, a more robust detection model can be obtained.
步骤S303,基于各正常域名的特征信息以及各恶意域名的特征信息,对长短期记忆神经网络进行训练,得到检测模型。Step S303, based on the characteristic information of each normal domain name and the characteristic information of each malicious domain name, train the long short-term memory neural network to obtain a detection model.
示例性的,本申请实施例可以将各正常域名的特征信息以及各恶意域名的特征信息分为训练数据和测试数据,先基于K-邻近、逻辑回归、SVN、迭代算法等分类算法,通过训练数据对长短期记忆神经网络进行训练,得到初始检测模型,接着可通过初始检测模型对测试数据进行预测,根据预测结果中DGA域名发现的正确率、误报率、召回率,用交叉验证获得效果最好的算法,从而得到准确率更佳的检测模型。Exemplarily, in the embodiment of the present application, the characteristic information of each normal domain name and the characteristic information of each malicious domain name can be divided into training data and test data. The data is used to train the long-short-term memory neural network to obtain the initial detection model, and then the test data can be predicted through the initial detection model, and the results can be obtained by cross-validation according to the correct rate, false positive rate, and recall rate found in the DGA domain name in the predicted results The best algorithm to get a detection model with better accuracy.
本申请实施例在经过上述训练和预测获得检测模型后,可以是重新选取正常域名样本和恶意域名样本对检测模型进行二次验证,进一步的根据验证结果从正常域名和恶意域名的比例,算法选择、参数调优等方面进行调整,以最终获得更加优化的检测模型。In the embodiment of the present application, after obtaining the detection model through the above training and prediction, the normal domain name samples and malicious domain name samples can be re-selected to perform secondary verification on the detection model, and further according to the verification results from the ratio of normal domain name and malicious domain name, algorithm selection , parameter tuning and other aspects to adjust to finally obtain a more optimized detection model.
步骤S400,基于疑似主机的初始安全数据,从疑似主机中确定失陷主机。Step S400, based on the initial security data of the suspected hosts, determine the compromised host from the suspected hosts.
其中,基于上述方法从各待检测主机中筛选出疑似主机后,可以是进一步的获取疑似主机的初始安全数据,基于疑似主机的安全数据进行IOC安全威胁情报的匹配,根据相关匹配的结果,确定该疑似主机是否为失陷主机,改善了仅通过恶意域名检测的方法确定失陷主机导致失陷主机确定的准确性较差的问题。Among them, after screening out the suspected hosts from the hosts to be detected based on the above method, the initial security data of the suspected hosts can be further obtained, and the IOC security threat intelligence can be matched based on the security data of the suspected hosts. According to the matching results, determine Whether the suspected host is a compromised host solves the problem that the accuracy of determining the compromised host is poor due to the determination of the compromised host only through malicious domain name detection.
在一个实施例中,如图5所示,图5是本申请一示例性实施例示出的一种确定为失陷主机的可选的方法实施例,该方法实施例包括如下步骤:In one embodiment, as shown in FIG. 5, FIG. 5 is an optional method embodiment for determining a crashed host shown in an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S401,通过风险数据识别风险模型对疑似主机的初始安全数据进行风险数据识别,得到识别结果,风险数据识别风险模型是根据不同类型的风险数据以及不同类型的正常数据基于神经网络模型训练获得。In step S401, risk data identification is performed on the initial security data of the suspected host through the risk data identification risk model to obtain identification results. The risk data identification risk model is obtained based on different types of risk data and different types of normal data based on neural network model training.
其中,风险数据是根据不同类型的风险数据以及不同类型的正常数据基于神经网络模型训练通过模型训练获得。正常数据可以是从非失陷主机中获取的安全数据,风险数据可以是从失陷主机中获取的目标资产数据、漏洞数据、目标用户数据以及威胁情报数据等;正常数据以及风险数据还可以是在历史确定失陷主机的过程中收集的数据,本申请对此不加以限定。训练好的风险数据识别模型可以是存储在目标主机中。The risk data is obtained through model training based on neural network model training based on different types of risk data and different types of normal data. Normal data can be security data obtained from non-corrupted hosts, and risk data can be target asset data, vulnerability data, target user data, and threat intelligence data obtained from compromised hosts; normal data and risk data can also be historical The data collected during the process of determining the compromised host is not limited in this application. The trained risk data identification model may be stored in the target host.
本申请在通过上述的方法从多个待检测主机中筛选出疑似主机之后,可以是获取疑似主机中不同类型的初始安全数据,将不同类型的初始安全数据输入至训练好的风险数据识别模型中,得到风险数据识别模型的输出结果,输出结果可能为空(也即从初始安全数据中未识别出风险数据),输出结果还可能为对应的风险数据,该风险数据可以是只包括一种类型的风险数据,还可以是包括多种不同类型的风险数据;且风险数据还可以是携带有风险类型标签,以便后续能够基于风险识别模型的识别结果,快速的获得疑似主机存在的风险类型,提高失陷主机的确定效率。After the application screens out suspected hosts from multiple hosts to be detected by the above-mentioned method, it can obtain different types of initial security data in the suspected hosts, and input different types of initial security data into the trained risk data identification model , to get the output result of the risk data identification model, the output result may be empty (that is, no risk data is identified from the initial security data), and the output result may also be the corresponding risk data, which may only include one type The risk data can also include a variety of different types of risk data; and the risk data can also carry risk type tags, so that based on the identification results of the risk identification model, the risk type of the suspected host can be quickly obtained and improved. Determination efficiency of compromised hosts.
步骤S402,若识别结果为从疑似主机的初始安全数据中识别出风险数据,则将疑似主机确定为失陷主机;风险数据包括目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,目标资产数据为保密等级大于预定等级的资产数据,目标用户数据为具有预定操作权限的用户数据。Step S402, if the identification result is that risk data is identified from the initial security data of the suspected host, then determine the suspected host as a compromised host; the risk data includes at least one of target asset data, vulnerability data, target user data, and threat intelligence data The target asset data is asset data whose confidentiality level is higher than a predetermined level, and the target user data is user data with predetermined operation authority.
其中,基于上述风险数据识别模型输出的结果,则可以很快的从疑似主机中确定失陷主机。具体地,若识别结果为该疑似主机的初始安全数据中不存在风险数据,则该疑似主机不为失陷主机,反之,若识别结果为该疑似主机的初始安全数据中存在目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,则确定该疑似主机为失陷主机。Wherein, based on the output result of the above-mentioned risk data identification model, the compromised host can be quickly determined from the suspected hosts. Specifically, if the identification result is that there is no risk data in the initial security data of the suspected host, then the suspected host is not a compromised host; on the contrary, if the identification result is that there are target asset data, vulnerability data , target user data and threat intelligence data, then it is determined that the suspected host is a compromised host.
进一步的,目标主机在获取了疑似主机的资产数据、漏洞数据、用户数据以及威胁情报数据后,可以是继续进行从疑似主机的资产数据中查找是否存在保密等级大于预定等级的资产数据、从初始安全数据中查找是否存在漏洞数据、从用户数据中查找是否存在具有预定操作权限的用户数据以及从初始安全数据中查找是否存在威胁情报数据的操作,并根据查找结果确定该疑似主机是否为失陷主机。其中,若目标主机查找到保密等级大于预定等级的资产数据(也即目标资产数据)、漏洞数据、具有预定操作权限的用户数据(也即目标用户数据)以及威胁情报数据中的至少一种数据的情况下确定该疑似主机为失陷主机。在这里需要说明的是,预定等级以及预定操作权限是企业根据自身的业务确定的。Further, after the target host obtains the asset data, vulnerability data, user data, and threat intelligence data of the suspected host, it can continue to search for asset data with a confidentiality level greater than a predetermined level from the asset data of the suspected host. Find out whether there is vulnerability data from security data, find out whether there is user data with predetermined operation authority from user data, and find out whether there is threat intelligence data from initial security data, and determine whether the suspected host is a compromised host based on the search results . Among them, if the target host finds at least one of asset data (that is, target asset data) with a confidentiality level greater than a predetermined level, vulnerability data, user data with predetermined operation authority (that is, target user data) and threat intelligence data The suspected host is determined to be a compromised host. It should be noted here that the predetermined level and predetermined operation authority are determined by the enterprise according to its own business.
同时,本申请实施例还可以是在确定疑似主机中存在风险数据后,再一次触发告警机制,例如可以是将疑似主机的告警级别调整为高级。At the same time, in the embodiment of the present application, after it is determined that there is risk data in the suspected host, the alarm mechanism is triggered again, for example, the alarm level of the suspected host can be adjusted to a high level.
通过确定疑似主机的安全数据中是否存在风险数据,从疑似主机中确定失陷主机,风险数据的获取容易,能够快速的确定该疑似主机是都为失陷主机,提高了确定失陷主机的效率。By determining whether there is risk data in the security data of the suspected hosts, the compromised host is determined from the suspected hosts, the risk data is easy to obtain, and it is possible to quickly determine whether the suspected hosts are all compromised hosts, and the efficiency of determining the compromised host is improved.
经过上述方式从多个待检测主机中确定出失陷主机后,需要对失陷主机进行修复,以避免对企业造成更大的损失,从而保障企业的用网安全。具体地,如图6所示,图6是本申请一示例性实施例示出的一种修复失陷主机的可选的方法实施例,该方法实施例包括如下步骤:After the lost host is determined from multiple hosts to be detected through the above method, it is necessary to repair the lost host to avoid greater losses to the enterprise, thereby ensuring the network security of the enterprise. Specifically, as shown in FIG. 6, FIG. 6 is an optional method embodiment for repairing a failed host shown in an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S600,获取失陷主机的风险数据;Step S600, obtaining the risk data of the compromised host;
其中,本申请实施例基于上述根据疑似主机的安全数据中是否存在风险数据的方法,确定该疑似主机是否为失陷主机。所以,失陷主机中一定包括风险数据,目标主机可以是向失陷主机发送获取指令,以获得失陷主机发送的风险数据,该风险数据可以是目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种。Wherein, the embodiment of the present application determines whether the suspected host is a compromised host based on the above-mentioned method according to whether there is risk data in the security data of the suspected host. Therefore, the compromised host must contain risk data. The target host can send an acquisition command to the compromised host to obtain the risk data sent by the compromised host. The risk data can be the target asset data, vulnerability data, target user data, and threat intelligence data. at least one of .
步骤S700,基于失陷主机的风险数据确定失陷主机的风险类型;Step S700, determining the risk type of the compromised host based on the risk data of the compromised host;
其中,本申请实施例可以是基于上述获得的失陷主机的风险数据确定该失陷主机存在的风险类型,风险类型包括资产风险、漏洞风险、用户风险以及威胁情报风险。Wherein, the embodiment of the present application may determine the risk type of the compromised host based on the obtained risk data of the compromised host, and the risk types include asset risk, vulnerability risk, user risk, and threat intelligence risk.
那么,若失陷主机的风险数据为目标资产数据,则确定该失陷主机的风险类型为资产风险;Then, if the risk data of the lost host is the target asset data, it is determined that the risk type of the lost host is asset risk;
若失陷主机的风险数据为漏洞数据,则确定该失陷主机的风险类型为漏洞风险;If the risk data of the compromised host is vulnerability data, then determine that the risk type of the compromised host is vulnerability risk;
若失陷主机的风险数据为目标用户数据,则确定该失陷主机的风险类型为用户风险;If the risk data of the compromised host is target user data, then determine that the risk type of the compromised host is user risk;
若失陷主机的风险数据为威胁情报数据,则确定该失陷主机的风险类型为威胁情报风险。If the risk data of the compromised host is threat intelligence data, it is determined that the risk type of the compromised host is threat intelligence risk.
再者,本申请实施例还可以是在确定疑似主机中存在资产风险、漏洞风险、用户风险以及威胁情报风险中的任一种风险后,触发告警机制,例如可以是将该疑似主机的告警级别调整为高级;Furthermore, the embodiment of the present application may also trigger an alarm mechanism after determining that there is any risk of asset risk, vulnerability risk, user risk, and threat intelligence risk in the suspected host, for example, the alarm level of the suspected host may be Adjust to advanced;
本申请实施例还可以是在确定疑似主机中存在资产风险、漏洞风险、用户风险以及威胁情报风险中的任两种风险后,触发告警机制,例如可以是将该疑似主机的告警级别调整为初高级;In this embodiment of the present application, after it is determined that any two risks of asset risk, vulnerability risk, user risk, and threat intelligence risk exist in the suspected host, the alarm mechanism may be triggered, for example, the alarm level of the suspected host may be adjusted to the initial advanced;
本申请实施例还可以是在确定疑似主机中存在资产风险、漏洞风险、用户风险以及威胁情报风险中的任三种风险后,触发告警机制,例如可以是将该疑似主机的告警级别调整为中高级;In this embodiment of the present application, after it is determined that there are any three risks among asset risk, vulnerability risk, user risk, and threat intelligence risk in the suspected host, the alarm mechanism can be triggered, for example, the alarm level of the suspected host can be adjusted to medium advanced;
本申请实施例还可以是在确定疑似主机中存在资产风险、漏洞风险、用户风险以及威胁情报风险四种风险后,触发告警机制,例如可以是将该疑似主机的告警级别调整为特高级。In this embodiment of the present application, after it is determined that there are four risks in the suspected host: asset risk, vulnerability risk, user risk, and threat intelligence risk, an alarm mechanism is triggered. For example, the alarm level of the suspected host can be adjusted to a very high level.
步骤S800,基于风险类型,从安全知识库中获取风险类型对应的至少一个分类修复策略,安全知识库中包括多个风险类型和与多个风险类型对应的分类修复策略;Step S800, based on the risk type, at least one classified repair strategy corresponding to the risk type is obtained from the security knowledge base, and the security knowledge base includes multiple risk types and classified repair strategies corresponding to the multiple risk types;
其中,安全知识库是存储在目标主机中的ATT&CK技术知识库(AdversarialTactics Techniques and Common Knowledge),ATT&CK是由MITRE提出的一套反应各个攻击生命周期攻击行为的模型和知识库,对更具观测性的攻击者行为,构建了一套更细粒度、更易共享的知识模型和框架,并通过不断积累,形成一套由政府、公共服务企业、私营企业和学术机构共同参与和维护的网络攻击者行为知识库,以指导用户采取针对性的检测、防御和响应工作。Among them, the security knowledge base is the ATT&CK technical knowledge base (Adversarial Tactics Techniques and Common Knowledge) stored in the target host. ATT&CK is a set of models and knowledge bases proposed by MITER to reflect the attack behavior of each attack life cycle, which is more observable A set of finer-grained and easier-to-share knowledge models and frameworks have been constructed, and through continuous accumulation, a set of cyber attacker behaviors jointly participated and maintained by the government, public service enterprises, private enterprises and academic institutions has been formed. Knowledge base to guide users in targeted detection, prevention and response efforts.
安全知识库中包括技术、通用知识、多个风险类型和与多个风险类型对应的分类修复策略。所以,若确定了失陷主机的风险类型,就可以从安全知识库中查找与该风险类型对应的分类修复策略。分类修复策略是用于对修复对象进行修复需要执行的对应操作,其可以包括多个执行步骤,不同的执行步骤可以是针对同一操作对象的执行步骤,也可以是针对不同操作对象的执行步骤,对此不做限定。在这里需要说明的是,修复对象例如可以是处理器、存储器、输出模块、输入模块、显示模块、音频模块等,在对修复对象进行修复时可以是对修复对象中的器件、驱动、程序、代码、与修复对象具有交互关系的其它外部设备等操作对象执行对应的操作,以实现对修复对象的修复操作。The security knowledge base includes technology, general knowledge, multiple risk types and classified repair strategies corresponding to multiple risk types. Therefore, if the risk type of the compromised host is determined, the classification repair strategy corresponding to the risk type can be searched from the security knowledge base. The classification repair strategy is the corresponding operation that needs to be performed for repairing the repair object, which may include multiple execution steps, and different execution steps may be the execution steps for the same operation object, or the execution steps for different operation objects. There is no limit to this. It should be noted here that the repair object can be, for example, a processor, a memory, an output module, an input module, a display module, an audio module, etc. When repairing the repair object, it can be a device, a driver, a program, Operation objects such as codes and other external devices that have an interactive relationship with the repair object perform corresponding operations to implement repair operations on the repair object.
示例性的,分类修复策略例如为:wifi阻断子、防火墙联动、agent联动、邮件通知、短信通知、自动化执行响应阻断进程、阻断网络连接、阻断IP、阻断域名等。Exemplarily, the classified repair strategies are, for example: wifi blocker, firewall linkage, agent linkage, email notification, SMS notification, automatic response blocking process, blocking network connection, blocking IP, blocking domain name, etc.
在一个实施例中,如图7所示,图7是本申请一示例性实施例示出的一种获取风险类型对应的分类修复策略的可选的方法实施例,该方法实施例包括如下步骤:In one embodiment, as shown in FIG. 7, FIG. 7 is an optional method embodiment of obtaining a classified repair strategy corresponding to a risk type according to an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S801,获取至少一个风险类型的风险类型标签;Step S801, obtaining a risk type label of at least one risk type;
其中,可以是根据上述风险数据识别模型识别出的风险数据至少为一个,还有可能是多个,多个风险数据可以是相同类型的风险数据,还可以是不同类型的风险数据,那么当识别出的风险数据是相同类型的风险数据的情况下,该失陷主机就只存在一种风险;同理,若识别出的风险数据是不同类型的风险数据,该失陷主机就会存在多种不同的风险。又因为风险数据识别模型识别出的风险数据携带风险类型标签,所以可以直接根据风险数据识别模型的输出结果获取到风险类型的风险类型标签,从而能够提高确定失陷主机的效率。该风险类型标签例如可以是通过字母、数字、符号等表示,对此本申请不加以限定。Among them, there may be at least one risk data identified according to the above risk data identification model, and there may be multiple risk data. The multiple risk data may be the same type of risk data or different types of risk data. Then when identifying If the identified risk data are of the same type, the compromised host will have only one risk; similarly, if the identified risk data are of different types, the compromised host will have multiple risk. And because the risk data identified by the risk data identification model carries risk type labels, the risk type label of the risk type can be obtained directly according to the output result of the risk data identification model, thereby improving the efficiency of determining the compromised host. The risk type label may be represented by, for example, letters, numbers, symbols, etc., which is not limited in this application.
步骤S802,根据风险类型的风险类型标签从安全知识库中获取与风险类型标签对应的至少一个分类修复策略,安全知识库中包括多个风险类型标签和与各风险类型标签对应的多个分类修复策略。Step S802, according to the risk type label of the risk type, at least one classified repair policy corresponding to the risk type label is obtained from the security knowledge base, and the security knowledge base includes multiple risk type labels and multiple classified repair policies corresponding to each risk type label Strategy.
其中,由于安全知识库中包括各风险类型对应的风险类型标签和与各风险类型标签对应的分类修复策略,所以基于上述获得的实现主机的风险类型的标签后,可以是基于该标签从安全知识库中查找到与该标签对应的分类修复策略。这样能够更快的确定出分类修复策略,进一步的提高对失陷主机的修复效率,避免企业出现更严重的损失,保障企业的安全用网。Wherein, since the security knowledge base includes the risk type tags corresponding to each risk type and the classification and repair strategies corresponding to each risk type tag, so based on the tags obtained above to implement the risk type of the host, it can be based on the tags from the security knowledge The classification repair strategy corresponding to the label is found in the library. In this way, the classification repair strategy can be determined faster, the efficiency of repairing the lost host can be further improved, more serious losses can be avoided, and the safe use of the network can be guaranteed.
步骤S900,将风险类型对应的分类修复策略按照预定逻辑关系进行组合,得到目标修复策略,预定逻辑关系用于表征各分类修复策略之间的关联性;Step S900, combining the classified repair strategies corresponding to the risk types according to the predetermined logical relationship to obtain the target repair strategy, and the predetermined logical relationship is used to represent the correlation between the classified repair strategies;
其中,预定逻辑关系例如可以是基于各分类修复策略针对的修复对象的操作步骤之间的关联性确定的,还可以是基于各分类修复策略的步骤之间的关联性确定的,对此本申请不加以限定。Among them, the predetermined logical relationship can be determined based on the correlation between the operation steps of the repair object targeted by each classification repair strategy, or can be determined based on the correlation between the steps of each classification repair strategy, for which this application Not limited.
在一个实施例中,如图8所示,图8是本申请一示例性实施例示出的一种得到目标修复策略的可选的方法实施例,该方法实施例包括如下步骤:In one embodiment, as shown in FIG. 8, FIG. 8 is an optional method embodiment for obtaining a target repair strategy shown in an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S9011,从所述分类修复策略中确定多个操作对象以及与各操作对象相关联的多条目标执行步骤;Step S9011, determining a plurality of operation objects and a plurality of target execution steps associated with each operation object from the classified restoration strategy;
其中,分类修复策略中包括多条执行步骤,每一条执行步骤可以是针对一个操作对象的操作步骤,也可以是针对多个操作对象的操作步骤。那么,可以很容易从分类修复策略中确定出多个操作对象以及与每一个操作对象相关联的多条目标执行步骤。Wherein, the classified restoration strategy includes multiple execution steps, and each execution step may be an operation step for one operation object, or may be an operation step for multiple operation objects. Then, multiple operation objects and multiple target execution steps associated with each operation object can be easily determined from the classified restoration strategy.
步骤S9012,将与各操作对象相关联的多条目标执行步骤按照目标顺序进行排序,得到多个组合修复策略,目标顺序为满足连续性操作的顺序。Step S9012, sort the multiple target execution steps associated with each operation object according to the target order to obtain multiple combined repair strategies, and the target order is the order that satisfies the continuous operation.
其中,本申请实施例还可以根据针对每一操作对象的多条目标执行步骤之间是否满足连续性操作的条件对多条目标执行步骤进行排序,得到组合修复策略。Wherein, in the embodiment of the present application, multiple target execution steps may be sorted according to whether the multiple target execution steps for each operation object meet the condition of continuous operation, so as to obtain a combined restoration strategy.
例如,若分类修复策略包括多个,其中第一分类修复策略中的第一步与第二分类修复策略中的第二步以及第三分类策略中的第三步均是针对路由器的执行步骤,且具有连贯操作的关系,则可以是将第一分类修复策略中的第一步、第二分类修复策略中的第二步以及第三分类策略中的第三步作为一个组合修复策略。For example, if there are multiple classification repair strategies, the first step in the first classification repair strategy, the second step in the second classification repair strategy, and the third step in the third classification strategy are execution steps for routers, And there is a relationship of coherent operation, then the first step in the first classification restoration strategy, the second step in the second classification restoration strategy, and the third step in the third classification strategy can be used as a combined restoration strategy.
步骤S9013,将各组合修复策略作为目标修复策略。Step S9013, taking each combined restoration strategy as a target restoration strategy.
其中,基于上述确定过程得到了三个组合修复策略,则可以是将这三个组合修复策略确定为目标修复策略即可。Wherein, based on the above determination process, three combined repair strategies are obtained, and these three combined repair strategies may be determined as the target repair strategy.
通过这种方式确定的目标修复策略,其可操作性强,也能够达到提高修复效率的目的,从而避免企业出现更严重的损失,保障企业的安全用网。The target repair strategy determined in this way is highly operable and can also achieve the purpose of improving repair efficiency, thereby avoiding more serious losses of the enterprise and ensuring the safe use of the network of the enterprise.
在这里还需要说明的是,目标修复策略的流程可编辑,通过自动化手段协助进行风险应急响应处置,可应对除了失陷主机自动修复外的更多实际应用场景。目标修复策略的流程一旦配置后将自动执行,无需人员干预,能够提高对于风险的响应速度,一旦确认主机为失陷主机便快速自动进行修复,全程日志记录,便于事后管理人员进行追踪溯源。It also needs to be explained here that the process of the target recovery strategy can be edited, and the emergency response to risks can be assisted by automatic means, which can deal with more practical application scenarios besides the automatic recovery of the lost host. Once the process of the target recovery strategy is configured, it will be automatically executed without human intervention, which can improve the response speed to risks. Once the host is confirmed to be a compromised host, it will be quickly and automatically repaired. The entire log record is convenient for management personnel to trace the source afterwards.
通过上述方式获得的目标修复策略,能够同时对在修复过程中涉及到的所有对象进行同时修复,达到提高修复效率的目的,从而避免企业出现更严重的损失,保障企业的安全用网。The target repair strategy obtained through the above method can repair all objects involved in the repair process at the same time, so as to improve the repair efficiency, thereby avoiding more serious losses of the enterprise and ensuring the safe use of the network of the enterprise.
步骤S1000,基于目标修复策略对失陷主机进行修复。Step S1000, recovering the crashed host based on the target recovery policy.
其中,可以是通过目标主机根据生成的目标修复策略自动化的对失陷主机进行修复操作。Wherein, the recovery operation for the failed host may be performed automatically by the target host according to the generated target recovery strategy.
进一步的,由于攻击者在获得失陷主机的控制权后,不仅会窃取失陷主机上存储的数据等,还会以失陷主机为跳板,继续攻击与失陷主机具有访问关系的其它主机,致使其它主机也陷入危机,所以在确定了失陷主机后,还需要确定与失陷主机具有访问关系的其它主机,以同时对其它主机进行修复,从而全面的保证企业的安全用网。Furthermore, after gaining control of the compromised host, the attacker will not only steal the data stored on the compromised host, but also use the compromised host as a springboard to continue attacking other hosts that have access relationships with the compromised host, causing other hosts to also Therefore, after determining the lost host, it is also necessary to determine other hosts that have access relationships with the lost host, so as to repair other hosts at the same time, so as to fully ensure the safe use of the enterprise network.
在一个实施例中,如图9所示,图9是本申请一示例性实施例示出的确定其它主机(目标对象)的可选的方法实施例,该方法实施例包括如下步骤:In one embodiment, as shown in FIG. 9, FIG. 9 is an optional method embodiment for determining other hosts (target objects) shown in an exemplary embodiment of the present application. The method embodiment includes the following steps:
步骤S1001,获取失陷主机的网络安全事件,网络安全事件是指由失陷主机引发的网络、信息系统以及数据发生危害的事件;Step S1001, obtaining the network security events of the compromised host, where the network security incident refers to the event of harming the network, information system and data caused by the compromised host;
其中,网络安全事件是指由于人为原因、主机软硬件缺陷或故障、自然灾害等,对网络和信息系统或者其中的数据造成危害,对社会造成负面影响的事件,可分为有害程序事件、网络攻击事件、信息破坏事件、信息内容安全事件、设备设施故障、灾害性事件和其他事件。在本申请中是针对失陷主机的网络安全事件,也即可能是因为失陷主机软硬件缺陷或发生故障而引发的网络、信息系统以及数据发生危害的事件。失陷主机的网络安全事件来自于初始安全数据,进一步的可以使来自于初始安全数据中的日志数据。Among them, network security incidents refer to incidents that cause harm to the network and information systems or the data in them due to human reasons, host software and hardware defects or failures, natural disasters, etc., and have a negative impact on society, which can be divided into harmful program incidents, network Attack incidents, information destruction incidents, information content security incidents, equipment and facility failures, catastrophic incidents and other incidents. In this application, it is aimed at the network security incident of the compromised host, that is, an incident that may cause damage to the network, information system, and data due to software and hardware defects or failures of the compromised host. The network security event of the compromised host comes from the initial security data, and further can be from the log data in the initial security data.
步骤S1002,基于网络安全事件,确定失陷主机的攻击路径;Step S1002, based on network security events, determine the attack path of the compromised host;
其中,基于上述从失陷主机的初始安全数据中获得的网络安全事件,失陷主机可以是基于时间顺序还原出失陷主机与其它主机之间的交互过程,从而得到失陷主机的攻击路径。Wherein, based on the above-mentioned network security events obtained from the initial security data of the compromised host, the compromised host can restore the interaction process between the compromised host and other hosts based on time sequence, so as to obtain the attack path of the compromised host.
步骤S1003,从攻击路径中确定与失陷主机具有访问关系的目标对象。Step S1003, determine the target object that has an access relationship with the compromised host from the attack path.
其中,攻击路径中包括失陷主机与其它主机或者对象之间的交互情况,所以可以通过还原后的攻击路径确定与失陷主机具有访问关系的目标对象(也即其它主机),这个访问关系包括失陷主机主动访问目标对象的关系和/或目标对象访问失陷主机的关系。Among them, the attack path includes the interaction between the compromised host and other hosts or objects, so the target object (that is, other hosts) that has an access relationship with the compromised host can be determined through the restored attack path. This access relationship includes the compromised host Actively accessing the relationship of the target object and/or the relationship of the target object accessing the compromised host.
那么,在通过上述方法确定出目标对象后,可以是通过下述方法对失陷主机以及目标对象同时进行修复:Then, after the target object is determined by the above method, the compromised host and the target object can be repaired at the same time by the following method:
将目标修复策略发送至失陷主机和目标对象,以使失陷主机以及目标对象基于目标修复策略执行对应的修复操作。The target recovery policy is sent to the compromised host and the target object, so that the compromised host and the target object perform corresponding recovery operations based on the target recovery policy.
最后,本申请实施例基于上述过程获得的目标修复策略以及确定的目标对象,可以是将目标修复策略中与失陷主机相关的修复策略发送至失陷主机,以及将目标修复策略中与目标对象相关的修复策略发送至目标对象,以同时指示失陷主机和目标对象根据修复策略的步骤执行对应的修复操作,达到对失陷主机以及目标对象快速修复的目的,从而避免企业出现更严重的损失,保障企业的安全用网。Finally, based on the target recovery strategy and the determined target object obtained in the embodiment of the present application, the recovery strategy related to the failed host in the target recovery strategy may be sent to the failed host, and the recovery strategy related to the target object in the target recovery strategy The repair policy is sent to the target object to instruct the compromised host and the target object to perform corresponding repair operations according to the steps of the repair strategy, so as to achieve the purpose of quickly repairing the compromised host and the target object, thereby avoiding more serious losses of the enterprise and ensuring the enterprise's security Use the net safely.
本申请实施例结合失陷主机回溯分析结果以及目标资产信息等,基于SOAR技术灵活制定针对失陷主机的目标修复策略,执行相应的失陷主机风险应急响应操作,将风险识别和安全防护设备深度融合在一起,实现失陷主机确认、失陷主机自动修复的功能,在高效的同时保证处置的准确性与精准性。The embodiment of this application combines the backtracking analysis results of the lost host and the target asset information, etc., based on SOAR technology to flexibly formulate the target repair strategy for the lost host, execute the corresponding emergency response operation for the risk of the lost host, and deeply integrate risk identification and security protection equipment. , to realize the function of confirming the lost host and automatically repairing the lost host, ensuring the accuracy and precision of disposal while being efficient.
应该理解的是,虽然如上的各实施例所涉及的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,如上的各实施例所涉及的流程图中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the steps in the flow charts involved in the above embodiments are shown sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in the flow charts involved in the above embodiments may include multiple steps or stages, and these steps or stages are not necessarily executed at the same time, but may be executed at different times, The execution order of these steps or stages is not necessarily performed sequentially, but may be performed in turn or alternately with other steps or at least a part of steps or stages in other steps.
基于同样的发明构思,本申请实施例还提供了一种用于实现上述所涉及的失陷主机的确定方法的失陷主机的确定装置。该装置所提供的解决问题的实现方案与上述方法中所记载的实现方案相似,故下面所提供的一个或多个失陷主机的确定装置实施例中的具体限定可以参见上文中对于失陷主机的确定方法的限定,在此不再赘述。Based on the same inventive concept, an embodiment of the present application further provides a device for determining a failed host for implementing the method for determining a failed host mentioned above. The solution to the problem provided by this device is similar to the implementation described in the above method, so the specific limitations in the embodiment of the device for determining one or more crashed hosts provided below can refer to the determination of the crashed host above The limitation of the method will not be repeated here.
在一个实施例中,如图10所示,提供了一种失陷主机的确定装置2000,该处理装置包括:获得处理模块2001、融合模块2002、检测筛选模块2003以及确定模块2004,In one embodiment, as shown in FIG. 10 , an apparatus 2000 for determining a compromised host is provided, the processing apparatus includes: an acquisition processing module 2001, a fusion module 2002, a detection and screening module 2003, and a determination module 2004,
获得处理模块2001,用于获取各待检测主机的初始安全数据,初始安全数据是待检测主机在运行过程中产生的数据;Obtaining a processing module 2001, configured to acquire initial security data of each host to be detected, where the initial security data is data generated during operation of the host to be detected;
融合模块2002,用于基于异构数据融合法对各初始安全数据进行融合,得到目标安全数据;A fusion module 2002, configured to fuse each initial security data based on a heterogeneous data fusion method to obtain target security data;
检测筛选模块2003,用于将目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各待检测主机中筛选出疑似主机,疑似主机的各待检测域名中包括恶意域名,检测模型由正常域名与恶意域名训练所得;The detection and screening module 2003 is configured to input the domain names to be detected in the target security data into the detection model to detect malicious domain names, and screen out suspected hosts from each host to be detected based on the detection results, and among the domain names to be detected of the suspected hosts Including malicious domain names, the detection model is trained by normal domain names and malicious domain names;
确定模块2004,用于基于疑似主机的初始安全数据,从疑似主机中确定失陷主机。The determination module 2004 is configured to determine the compromised host from the suspected hosts based on the initial security data of the suspected hosts.
在一个实施例中,确定模块2005,具体用于若疑似主机的初始安全数据中存在风险数据,则确定疑似主机为失陷主机,风险数据包括目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,目标资产数据为保密等级大于预定等级的资产数据,目标用户数据为具有预定操作权限的用户数据。In one embodiment, the determining module 2005 is specifically configured to determine that the suspected host is a compromised host if risk data exists in the initial security data of the suspected host, and the risk data includes target asset data, vulnerability data, target user data, and threat intelligence data In at least one of them, the target asset data is asset data whose confidentiality level is higher than a predetermined level, and the target user data is user data with a predetermined operation authority.
在一个实施例中,上述装置还包括修复模块(图中未示出),In one embodiment, the above-mentioned device further includes a repair module (not shown in the figure),
修复模块,用于获取失陷主机的风险数据;基于失陷主机的风险数据确定失陷主机的风险类型;基于风险类型,从安全知识库中获取风险类型对应的至少一个分类修复策略,安全知识库中包括多个风险类型和与多个风险类型对应的多个分类修复策略;将风险类型对应的各分类修复策略按照预定逻辑关系进行组合,得到目标修复策略,预定逻辑关系用于表征各分类修复策略之间的关联性;基于目标修复策略对失陷主机进行修复。The repair module is used to obtain the risk data of the compromised host; determine the risk type of the compromised host based on the risk data of the compromised host; based on the risk type, obtain at least one classified repair strategy corresponding to the risk type from the security knowledge base, the security knowledge base includes Multiple risk types and multiple classified repair strategies corresponding to the multiple risk types; combine the classified repair strategies corresponding to the risk types according to a predetermined logical relationship to obtain a target repair strategy, and the predetermined logical relationship is used to represent the relationship between the classified repair strategies Correlation between; based on the target repair strategy to repair the crashed host.
在一个实施例中,修复模块,具体用于获取风险类型的标签,标签用于对不同的风险类型进行标记;从安全知识库中获取与风险类型的标签对应的至少一个分类修复策略,安全知识库中包括各风险类型对应的标签和与各标签对应的多个分类修复策略。In one embodiment, the repairing module is specifically configured to obtain a risk type label, and the label is used to mark different risk types; obtain at least one classified repair strategy corresponding to the risk type label from the security knowledge base, and the security knowledge The library includes labels corresponding to each risk type and multiple classified repair strategies corresponding to each label.
在一个实施例中,修复模块,具体还用于从各分类修复策略中确定多个操作对象以及与各操作对象相关联的多条目标执行步骤;将与各操作对象相关联的多条目标执行步骤进行组合,得到多个组合修复策略;将各组合修复策略作为目标修复策略。In one embodiment, the repair module is specifically further configured to determine a plurality of operation objects and a plurality of target execution steps associated with each operation object from each classified repair strategy; execute a plurality of targets associated with each operation object Steps are combined to obtain multiple combined repair strategies; each combined repair strategy is used as the target repair strategy.
在一个实施例中,修复模块,具体还用于将与各操作对象相关联的多条目标执行步骤按照目标顺序进行排序,得到多个组合修复策略,目标顺序为满足连续性操作的顺序。In one embodiment, the repair module is further configured to sort the multiple target execution steps associated with each operation object according to the target order to obtain multiple combined repair strategies, and the target order is the order that satisfies the continuous operation.
在一个实施例中,上述融合模块2002,具体还用于基于异构数据融合法对各初始安全数据进行融合,得到中间安全数据;对中间安全数据进行标准化处理,得到目标安全数据,标准化处理用于限定安全数据的数据格式以及数据内容的表现形式。In one embodiment, the above-mentioned fusion module 2002 is also specifically used to fuse each initial security data based on the heterogeneous data fusion method to obtain intermediate security data; perform standardized processing on the intermediate security data to obtain target security data, and use It is used to limit the data format of security data and the expression form of data content.
在一个实施例中,上述确定模块2005,还用于获取失陷主机的网络安全事件,网络安全事件是指由失陷主机引发的网络、信息系统以及数据发生危害的事件;基于网络安全事件,确定失陷主机的攻击路径;从攻击路径中确定与失陷主机具有访问关系的目标对象。In one embodiment, the above-mentioned determining module 2005 is also used to obtain network security events of the compromised host, and the network security incident refers to an event caused by the compromised host to cause harm to the network, information system, and data; based on the network security incident, determine the The attack path of the host; determine the target object that has access relationship with the compromised host from the attack path.
在一个实施例中,修复模块,具体还用于将目标修复策略发送至失陷主机和目标对象,以使失陷主机以及目标对象基于目标修复策略执行对应的修复操作。In one embodiment, the recovery module is further configured to send the target recovery policy to the compromised host and the target object, so that the compromised host and the target object perform corresponding recovery operations based on the target recovery policy.
在一个实施例中,上述装置还包括训练模块(图中未示出)。In one embodiment, the above device further includes a training module (not shown in the figure).
训练模块,用于获取多个正常域名和多个恶意域名;提取各正常域名的特征信息以及各恶意域名的特征信息,特征信息包括域名的字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个;基于各正常域名的特征信息以及各恶意域名的特征信息,对长短期记忆神经网络进行训练,得到检测模型。The training module is used to obtain multiple normal domain names and multiple malicious domain names; extract feature information of each normal domain name and feature information of each malicious domain name, the feature information includes the character randomness of the domain name, the length of the character, and the number of vowels in the character ratio, the ratio of unique characters in the characters, and at least one of the top-level domain names; based on the feature information of each normal domain name and the feature information of each malicious domain name, the long-short-term memory neural network is trained to obtain a detection model.
上述失陷主机的确定装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Each module in the above-mentioned device for determining a compromised host can be realized in whole or in part by software, hardware or a combination thereof. The above-mentioned modules can be embedded in or independent of the processor in the computer device in the form of hardware, and can also be stored in the memory of the computer device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.
在一个实施例中,提供了一种计算机设备,该计算机设备的内部结构图可以如图11所示。该计算机设备包括通过系统总线连接的处理器、存储器和网络接口。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质和内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储各待检测主机的安全数据等。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种失陷主机的确定方法。In one embodiment, a computer device is provided, and the internal structure diagram of the computer device may be as shown in FIG. 11 . The computer device includes a processor, memory and a network interface connected by a system bus. Wherein, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs and databases. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium. The database of the computer device is used to store security data and the like of each host to be detected. The network interface of the computer device is used to communicate with an external terminal via a network connection. When the computer program is executed by a processor, a method for determining a crashed host is realized.
本领域技术人员可以理解,图11中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art can understand that the structure shown in Figure 11 is only a block diagram of a part of the structure related to the solution of this application, and does not constitute a limitation on the computer equipment on which the solution of this application is applied. The specific computer equipment can be More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.
在一个实施例中,提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现以下步骤:In one embodiment, a computer device is provided, including a memory and a processor, a computer program is stored in the memory, and the processor implements the following steps when executing the computer program:
获取各待检测主机的初始安全数据,初始安全数据是待检测主机在运行过程中产生的数据;Obtain the initial security data of each host to be detected, the initial security data is the data generated during the operation of the host to be detected;
基于异构数据融合法对各初始安全数据进行融合,得到目标安全数据;Based on the heterogeneous data fusion method, the initial safety data is fused to obtain the target safety data;
将目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各待检测主机中筛选出疑似主机,疑似主机的各待检测域名中包括恶意域名,检测模型由正常域名与恶意域名训练所得;Input the domain names to be detected in the target security data into the detection model for malicious domain name detection, and screen out suspected hosts from each host to be detected based on the detection results. The domain names to be detected of the suspected hosts include malicious domain names. The detection model consists of Normal domain name and malicious domain name training;
基于疑似主机的初始安全数据,从疑似主机中确定失陷主机。Based on the initial security data of the suspected hosts, the compromised hosts are determined from the suspected hosts.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
若疑似主机的初始安全数据中存在风险数据,则确定疑似主机为失陷主机,风险数据包括目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,目标资产数据为保密等级大于预定等级的资产数据,目标用户数据为具有预定操作权限的用户数据。If there is risk data in the initial security data of the suspected host, it is determined that the suspected host is a compromised host, and the risk data includes at least one of target asset data, vulnerability data, target user data, and threat intelligence data, and the target asset data has a confidentiality level greater than Predetermined level of asset data, target user data is user data with predetermined operation authority.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
获取失陷主机的风险数据;基于失陷主机的风险数据确定失陷主机的风险类型;基于风险类型,从安全知识库中获取风险类型对应的至少一个分类修复策略,安全知识库中包括多个风险类型和与多个风险类型对应的多个分类修复策略;将风险类型对应的各分类修复策略按照预定逻辑关系进行组合,得到目标修复策略,预定逻辑关系用于表征各分类修复策略之间的关联性;基于目标修复策略对失陷主机进行修复。Obtain the risk data of the compromised host; determine the risk type of the compromised host based on the risk data of the compromised host; based on the risk type, obtain at least one classified repair strategy corresponding to the risk type from the security knowledge base, which includes multiple risk types and multiple classification repair strategies corresponding to multiple risk types; combining the classification repair strategies corresponding to the risk types according to a predetermined logical relationship to obtain a target repair strategy, and the predetermined logical relationship is used to represent the correlation between the classification repair strategies; Restoring the crashed host based on the target restoration strategy.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
获取风险类型的标签,标签用于对不同的风险类型进行标记;从安全知识库中获取与风险类型的标签对应的至少一个分类修复策略,安全知识库中包括各风险类型对应的标签和与各标签对应的多个分类修复策略。Obtain the label of the risk type, and the label is used to mark different risk types; obtain at least one classified repair strategy corresponding to the label of the risk type from the security knowledge base, and the security knowledge base includes the label corresponding to each risk type and each Multiple classification repair strategies corresponding to labels.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
从各分类修复策略中确定多个操作对象以及与各操作对象相关联的多条目标执行步骤;将与各操作对象相关联的多条目标执行步骤进行组合,得到多个组合修复策略;将各组合修复策略作为目标修复策略。Determining multiple operation objects and multiple target execution steps associated with each operation object from each classification repair strategy; combining multiple target execution steps associated with each operation object to obtain multiple combined repair strategies; Combining repair strategies as target repair strategies.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
将与各操作对象相关联的多条目标执行步骤按照目标顺序进行排序,得到多个组合修复策略,目标顺序为满足连续性操作的顺序。Multiple target execution steps associated with each operation object are sorted according to the target sequence to obtain multiple combined repair strategies, and the target sequence is the sequence that satisfies the continuous operation.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
基于异构数据融合法对各初始安全数据进行融合,得到中间安全数据;对中间安全数据进行标准化处理,得到目标安全数据,标准化处理用于限定安全数据的数据格式以及数据内容的表现形式。Based on the heterogeneous data fusion method, the initial security data is fused to obtain the intermediate security data; the intermediate security data is standardized to obtain the target security data, and the standardized processing is used to limit the data format of the security data and the expression form of the data content.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
获取失陷主机的网络安全事件,网络安全事件是指由失陷主机引发的网络、信息系统以及数据发生危害的事件;基于网络安全事件,确定失陷主机的攻击路径;从攻击路径中确定与失陷主机具有访问关系的目标对象。Obtain the network security events of the lost host. Network security events refer to the events caused by the lost host that cause harm to the network, information system, and data; based on the network security events, determine the attack path of the lost host; The target object of the access relationship.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
将目标修复策略发送至失陷主机和目标对象,以使失陷主机以及目标对象基于目标修复策略执行对应的修复操作。The target recovery policy is sent to the compromised host and the target object, so that the compromised host and the target object perform corresponding recovery operations based on the target recovery policy.
在一个实施例中,处理器执行计算机程序时还实现以下步骤:In one embodiment, the following steps are also implemented when the processor executes the computer program:
获取多个正常域名和多个恶意域名;提取各正常域名的特征信息以及各恶意域名的特征信息,特征信息包括域名的字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个;基于各正常域名的特征信息以及各恶意域名的特征信息,对长短期记忆神经网络进行训练,得到检测模型。Obtain multiple normal domain names and multiple malicious domain names; extract feature information of each normal domain name and feature information of each malicious domain name, feature information includes character randomness of the domain name, character length, proportion of vowels in characters, and uniqueness among characters The proportion of characters and at least one of the top-level domain names; based on the feature information of each normal domain name and the feature information of each malicious domain name, the long-short-term memory neural network is trained to obtain a detection model.
在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
获取各待检测主机的初始安全数据,初始安全数据是待检测主机在运行过程中产生的数据;Obtain the initial security data of each host to be detected, the initial security data is the data generated during the operation of the host to be detected;
基于异构数据融合法对各初始安全数据进行融合,得到目标安全数据;Based on the heterogeneous data fusion method, the initial safety data is fused to obtain the target safety data;
将目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各待检测主机中筛选出疑似主机,疑似主机的各待检测域名中包括恶意域名,检测模型由正常域名与恶意域名训练所得;Input the domain names to be detected in the target security data into the detection model for malicious domain name detection, and screen out suspected hosts from each host to be detected based on the detection results. The domain names to be detected of the suspected hosts include malicious domain names. The detection model consists of Normal domain name and malicious domain name training;
基于疑似主机的初始安全数据,从疑似主机中确定失陷主机。Based on the initial security data of the suspected hosts, the compromised hosts are determined from the suspected hosts.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
若疑似主机的初始安全数据中存在风险数据,则确定疑似主机为失陷主机,风险数据包括目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,目标资产数据为保密等级大于预定等级的资产数据,目标用户数据为具有预定操作权限的用户数据。If there is risk data in the initial security data of the suspected host, it is determined that the suspected host is a compromised host, and the risk data includes at least one of target asset data, vulnerability data, target user data, and threat intelligence data, and the target asset data has a confidentiality level greater than Predetermined level of asset data, target user data is user data with predetermined operation authority.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取失陷主机的风险数据;基于失陷主机的风险数据确定失陷主机的风险类型;基于风险类型,从安全知识库中获取风险类型对应的至少一个分类修复策略,安全知识库中包括多个风险类型和与多个风险类型对应的多个分类修复策略;将风险类型对应的各分类修复策略按照预定逻辑关系进行组合,得到目标修复策略,预定逻辑关系用于表征各分类修复策略之间的关联性;基于目标修复策略对失陷主机进行修复。Obtain the risk data of the compromised host; determine the risk type of the compromised host based on the risk data of the compromised host; based on the risk type, obtain at least one classified repair strategy corresponding to the risk type from the security knowledge base, which includes multiple risk types and multiple classification repair strategies corresponding to multiple risk types; combining the classification repair strategies corresponding to the risk types according to a predetermined logical relationship to obtain a target repair strategy, and the predetermined logical relationship is used to represent the correlation between the classification repair strategies; Restoring the crashed host based on the target restoration strategy.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取风险类型的标签,标签用于对不同的风险类型进行标记;从安全知识库中获取与风险类型的标签对应的至少一个分类修复策略,安全知识库中包括各风险类型对应的标签和与各标签对应的多个分类修复策略。Obtain the label of the risk type, and the label is used to mark different risk types; obtain at least one classified repair strategy corresponding to the label of the risk type from the security knowledge base, and the security knowledge base includes the label corresponding to each risk type and each Multiple classification repair strategies corresponding to labels.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
从各分类修复策略中确定多个操作对象以及与各操作对象相关联的多条目标执行步骤;将与各操作对象相关联的多条目标执行步骤进行组合,得到多个组合修复策略;将各组合修复策略作为目标修复策略。Determining multiple operation objects and multiple target execution steps associated with each operation object from each classification repair strategy; combining multiple target execution steps associated with each operation object to obtain multiple combined repair strategies; Combining repair strategies as target repair strategies.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
将与各操作对象相关联的多条目标执行步骤按照目标顺序进行排序,得到多个组合修复策略,目标顺序为满足连续性操作的顺序。Multiple target execution steps associated with each operation object are sorted according to the target sequence to obtain multiple combined repair strategies, and the target sequence is the sequence that satisfies the continuous operation.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
基于异构数据融合法对各初始安全数据进行融合,得到中间安全数据;对中间安全数据进行标准化处理,得到目标安全数据,标准化处理用于限定安全数据的数据格式以及数据内容的表现形式。Based on the heterogeneous data fusion method, the initial security data is fused to obtain the intermediate security data; the intermediate security data is standardized to obtain the target security data, and the standardized processing is used to limit the data format of the security data and the expression form of the data content.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取失陷主机的网络安全事件,网络安全事件是指由失陷主机引发的网络、信息系统以及数据发生危害的事件;基于网络安全事件,确定失陷主机的攻击路径;从攻击路径中确定与失陷主机具有访问关系的目标对象。Obtain the network security events of the lost host. Network security events refer to the events caused by the lost host that cause harm to the network, information system, and data; based on the network security events, determine the attack path of the lost host; The target object of the access relationship.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
将目标修复策略发送至失陷主机和目标对象,以使失陷主机以及目标对象基于目标修复策略执行对应的修复操作。The target recovery policy is sent to the compromised host and the target object, so that the compromised host and the target object perform corresponding recovery operations based on the target recovery policy.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取多个正常域名和多个恶意域名;提取各正常域名的特征信息以及各恶意域名的特征信息,特征信息包括域名的字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个;基于各正常域名的特征信息以及各恶意域名的特征信息,对长短期记忆神经网络进行训练,得到检测模型。Obtain multiple normal domain names and multiple malicious domain names; extract feature information of each normal domain name and feature information of each malicious domain name, feature information includes character randomness of the domain name, character length, proportion of vowels in characters, and uniqueness among characters The proportion of characters and at least one of the top-level domain names; based on the feature information of each normal domain name and the feature information of each malicious domain name, the long-short-term memory neural network is trained to obtain a detection model.
在一个实施例中,提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现以下步骤:In one embodiment, a computer program product is provided, comprising a computer program, which, when executed by a processor, implements the following steps:
获取各待检测主机的初始安全数据,初始安全数据是待检测主机在运行过程中产生的数据;Obtain the initial security data of each host to be detected, the initial security data is the data generated during the operation of the host to be detected;
基于异构数据融合法对各初始安全数据进行融合,得到目标安全数据;Based on the heterogeneous data fusion method, the initial safety data is fused to obtain the target safety data;
将目标安全数据中的各待检测域名输入至检测模型中进行恶意域名检测,并基于检测结果从各待检测主机中筛选出疑似主机,疑似主机的各待检测域名中包括恶意域名,检测模型由正常域名与恶意域名训练所得;Input the domain names to be detected in the target security data into the detection model for malicious domain name detection, and screen out suspected hosts from each host to be detected based on the detection results. The domain names to be detected of the suspected hosts include malicious domain names. The detection model consists of Normal domain name and malicious domain name training;
基于疑似主机的初始安全数据,从疑似主机中确定失陷主机。Based on the initial security data of the suspected hosts, the compromised hosts are determined from the suspected hosts.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
若疑似主机的初始安全数据中存在风险数据,则确定疑似主机为失陷主机,风险数据包括目标资产数据、漏洞数据、目标用户数据以及威胁情报数据中的至少一种,目标资产数据为保密等级大于预定等级的资产数据,目标用户数据为具有预定操作权限的用户数据。If there is risk data in the initial security data of the suspected host, it is determined that the suspected host is a compromised host, and the risk data includes at least one of target asset data, vulnerability data, target user data, and threat intelligence data, and the target asset data has a confidentiality level greater than Predetermined level of asset data, target user data is user data with predetermined operation authority.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取失陷主机的风险数据;基于失陷主机的风险数据确定失陷主机的风险类型;基于风险类型,从安全知识库中获取风险类型对应的至少一个分类修复策略,安全知识库中包括多个风险类型和与多个风险类型对应的多个分类修复策略;将风险类型对应的各分类修复策略按照预定逻辑关系进行组合,得到目标修复策略,预定逻辑关系用于表征各分类修复策略之间的关联性;基于目标修复策略对失陷主机进行修复。Obtain the risk data of the compromised host; determine the risk type of the compromised host based on the risk data of the compromised host; based on the risk type, obtain at least one classified repair strategy corresponding to the risk type from the security knowledge base, which includes multiple risk types and multiple classification repair strategies corresponding to multiple risk types; combining the classification repair strategies corresponding to the risk types according to a predetermined logical relationship to obtain a target repair strategy, and the predetermined logical relationship is used to represent the correlation between the classification repair strategies; Restoring the crashed host based on the target restoration strategy.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取风险类型的标签,标签用于对不同的风险类型进行标记;从安全知识库中获取与风险类型的标签对应的分类修复策略,安全知识库中包括各风险类型对应的标签和与各标签对应的分类修复策略。Obtain the labels of risk types, which are used to mark different risk types; obtain the classification and repair strategies corresponding to the labels of risk types from the security knowledge base, which includes the labels corresponding to each risk type and the corresponding classification repair strategy.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取风险类型的标签,标签用于对不同的风险类型进行标记;从安全知识库中获取与风险类型的标签对应的至少一个分类修复策略,安全知识库中包括各风险类型对应的标签和与各标签对应的多个分类修复策略。Obtain the label of the risk type, and the label is used to mark different risk types; obtain at least one classified repair strategy corresponding to the label of the risk type from the security knowledge base, and the security knowledge base includes the label corresponding to each risk type and each Multiple classification repair strategies corresponding to labels.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
将与各操作对象相关联的多条目标执行步骤按照目标顺序进行排序,得到多个组合修复策略,目标顺序为满足连续性操作的顺序。Multiple target execution steps associated with each operation object are sorted according to the target sequence to obtain multiple combined repair strategies, and the target sequence is the sequence that satisfies the continuous operation.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
基于异构数据融合法对各初始安全数据进行融合,得到中间安全数据;对中间安全数据进行标准化处理,得到目标安全数据,标准化处理用于限定安全数据的数据格式以及数据内容的表现形式。Based on the heterogeneous data fusion method, the initial security data is fused to obtain the intermediate security data; the intermediate security data is standardized to obtain the target security data, and the standardized processing is used to limit the data format of the security data and the expression form of the data content.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取失陷主机的网络安全事件,网络安全事件是指由失陷主机引发的网络、信息系统以及数据发生危害的事件;基于网络安全事件,确定失陷主机的攻击路径;从攻击路径中确定与失陷主机具有访问关系的目标对象。Obtain the network security events of the lost host. Network security events refer to the events caused by the lost host that cause harm to the network, information system, and data; based on the network security events, determine the attack path of the lost host; The target object of the access relationship.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
将目标修复策略发送至失陷主机和目标对象,以使失陷主机以及目标对象基于目标修复策略执行对应的修复操作。The target recovery policy is sent to the compromised host and the target object, so that the compromised host and the target object perform corresponding recovery operations based on the target recovery policy.
在一个实施例中,计算机程序被处理器执行时还实现以下步骤:In one embodiment, when the computer program is executed by the processor, the following steps are also implemented:
获取多个正常域名和多个恶意域名;提取各正常域名的特征信息以及各恶意域名的特征信息,特征信息包括域名的字符随机性、字符的长度、字符中元音字母的比例、字符中唯一字符的比例以及顶级域名中的至少一个;基于各正常域名的特征信息以及各恶意域名的特征信息,对长短期记忆神经网络进行训练,得到检测模型。Obtain multiple normal domain names and multiple malicious domain names; extract feature information of each normal domain name and feature information of each malicious domain name, feature information includes character randomness of the domain name, character length, proportion of vowels in characters, and uniqueness among characters The proportion of characters and at least one of the top-level domain names; based on the feature information of each normal domain name and the feature information of each malicious domain name, the long-short-term memory neural network is trained to obtain a detection model.
容易理解的是,本领域技术人员在本申请提供的几个实施例的基础上,可以对本申请的实施例进行结合、拆分、重组等得到其他实施例,这些实施例均没有超出本申请的保护范围。It is easy to understand that, on the basis of several embodiments provided by this application, those skilled in the art can combine, split, reorganize, etc. the embodiments of this application to obtain other embodiments, and these embodiments do not exceed the scope of this application. protected range.
以上的具体实施方式,对本申请实施例的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上仅为本申请实施例的具体实施方式而已,并不用于限定本申请实施例的保护范围,凡在本申请实施例的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请实施例的保护范围之内。The above specific implementation manners have further described the purpose, technical solutions and beneficial effects of the embodiments of the present application in detail. It should be understood that the above is only the specific implementation manners of the embodiments of the present application, and is not intended to limit the implementation of the present application. For the scope of protection of the examples, any modifications, equivalent replacements, improvements, etc. made on the basis of the technical solutions of the embodiments of the present application shall be included in the scope of protection of the embodiments of the present application.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211287900.XA CN115643082A (en) | 2022-10-20 | 2022-10-20 | Method and device for determining lost host and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211287900.XA CN115643082A (en) | 2022-10-20 | 2022-10-20 | Method and device for determining lost host and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115643082A true CN115643082A (en) | 2023-01-24 |
Family
ID=84944995
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211287900.XA Pending CN115643082A (en) | 2022-10-20 | 2022-10-20 | Method and device for determining lost host and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115643082A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116415237A (en) * | 2023-03-03 | 2023-07-11 | 港珠澳大桥管理局 | Risk device identification method, apparatus, computer device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660539A (en) * | 2018-12-20 | 2019-04-19 | 北京神州绿盟信息安全科技股份有限公司 | It falls device identification method, device, electronic equipment and storage medium |
CN111431884A (en) * | 2020-03-18 | 2020-07-17 | 上海观安信息技术股份有限公司 | Host computer defect detection method and device based on DNS analysis |
CN114297632A (en) * | 2021-12-02 | 2022-04-08 | 安天科技集团股份有限公司 | Host failure detection method, device, electronic device and storage medium |
CN115001789A (en) * | 2022-05-27 | 2022-09-02 | 绿盟科技集团股份有限公司 | Method, device, equipment and medium for detecting defect-losing equipment |
-
2022
- 2022-10-20 CN CN202211287900.XA patent/CN115643082A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660539A (en) * | 2018-12-20 | 2019-04-19 | 北京神州绿盟信息安全科技股份有限公司 | It falls device identification method, device, electronic equipment and storage medium |
CN111431884A (en) * | 2020-03-18 | 2020-07-17 | 上海观安信息技术股份有限公司 | Host computer defect detection method and device based on DNS analysis |
CN114297632A (en) * | 2021-12-02 | 2022-04-08 | 安天科技集团股份有限公司 | Host failure detection method, device, electronic device and storage medium |
CN115001789A (en) * | 2022-05-27 | 2022-09-02 | 绿盟科技集团股份有限公司 | Method, device, equipment and medium for detecting defect-losing equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116415237A (en) * | 2023-03-03 | 2023-07-11 | 港珠澳大桥管理局 | Risk device identification method, apparatus, computer device and storage medium |
CN116415237B (en) * | 2023-03-03 | 2024-03-19 | 港珠澳大桥管理局 | Risk device identification method, apparatus, computer device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12058177B2 (en) | Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance | |
US12301628B2 (en) | Correlating network event anomalies using active and passive external reconnaissance to identify attack information | |
US11750659B2 (en) | Cybersecurity profiling and rating using active and passive external reconnaissance | |
US20230208869A1 (en) | Generative artificial intelligence method and system configured to provide outputs for company compliance | |
US12041091B2 (en) | System and methods for automated internet- scale web application vulnerability scanning and enhanced security profiling | |
US20240241752A1 (en) | Risk profiling and rating of extended relationships using ontological databases | |
US20200389495A1 (en) | Secure policy-controlled processing and auditing on regulated data sets | |
Sun et al. | Data-driven cybersecurity incident prediction: A survey | |
US11601475B2 (en) | Rating organization cybersecurity using active and passive external reconnaissance | |
US20230362200A1 (en) | Dynamic cybersecurity scoring and operational risk reduction assessment | |
US20200412767A1 (en) | Hybrid system for the protection and secure data transportation of convergent operational technology and informational technology networks | |
US20220210202A1 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
US20210019674A1 (en) | Risk profiling and rating of extended relationships using ontological databases | |
US12206707B2 (en) | Rating organization cybersecurity using probe-based network reconnaissance techniques | |
US12021894B2 (en) | Phishing detection based on modeling of web page content | |
JP2012527691A (en) | System and method for application level security | |
US20230283641A1 (en) | Dynamic cybersecurity scoring using traffic fingerprinting and risk score improvement | |
Sommestad et al. | Variables influencing the effectiveness of signature-based network intrusion detection systems | |
US20170155683A1 (en) | Remedial action for release of threat data | |
CN116451215A (en) | Correlation analysis method and related equipment | |
Ryu et al. | Study on Trends and predictions of convergence in Cybersecurity Technology using machine learning | |
US20250039242A1 (en) | Kill-chain reconstruction | |
CN115643082A (en) | Method and device for determining lost host and computer equipment | |
US20240195841A1 (en) | System and method for manipulation of secure data | |
Nakano et al. | Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |