[go: up one dir, main page]

CN116346409A - Network security defense method, device, equipment and storage medium - Google Patents

Network security defense method, device, equipment and storage medium Download PDF

Info

Publication number
CN116346409A
CN116346409A CN202310118391.6A CN202310118391A CN116346409A CN 116346409 A CN116346409 A CN 116346409A CN 202310118391 A CN202310118391 A CN 202310118391A CN 116346409 A CN116346409 A CN 116346409A
Authority
CN
China
Prior art keywords
questions
question
execution subject
threat
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310118391.6A
Other languages
Chinese (zh)
Other versions
CN116346409B (en
Inventor
杨磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202310118391.6A priority Critical patent/CN116346409B/en
Publication of CN116346409A publication Critical patent/CN116346409A/en
Application granted granted Critical
Publication of CN116346409B publication Critical patent/CN116346409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The disclosure provides a network security defense method, a device, equipment and a storage medium, which can be applied to the technical field of information security. The method comprises the following steps: based on monitoring a network system, identifying suspicious security events and threat types existing in the network system; and verifying the execution subject of the suspicious security event by adopting a verification process which is arranged in advance. The verification process comprises the following steps: acquiring at least one alternative question from a question set preset for the threat type; processing the at least one alternative problem based on the information of the entity in the suspicious security event to obtain a question selection set; the selected question set is sent to the execution main body, and answer information returned by the execution main body for answering the questions in the selected question set is obtained; and comparing the answer information with corresponding information in the historical record data of the network system, and evaluating whether the executing main body has threat.

Description

网络安全防御方法、装置、设备及存储介质Network security defense method, device, equipment and storage medium

技术领域technical field

本公开涉及信息安全领域,尤其涉及一种网络安全防御方法、装置、设备、存储介质和程序产品。The present disclosure relates to the field of information security, and in particular to a network security defense method, device, equipment, storage medium and program product.

背景技术Background technique

随着时代的发展,使用网络系统的地方越来越多,但是针对网络系统的攻击一直没有间断过,而且形式越来越多。目前的网络安全威胁防御通常是从网络系统的各个子系统中采集不同类型的数据,来训练机器学习算法模型,通过训练好的机器学习算法模型监控网络安全。With the development of the times, more and more places use network systems, but attacks against network systems have never stopped, and there are more and more forms. The current network security threat defense usually collects different types of data from various subsystems of the network system to train machine learning algorithm models, and monitor network security through trained machine learning algorithm models.

然而,通过机器学习训练模型防护网络系统安全的方案,需要采用多层次的分析,耗时比较长,且多步骤的处理容易累积误差,对判断的效率和准确性都会造成影响。而且可能会将部分攻击行为错误的判断,容易造成数据丢失。However, the solution to protect network system security through machine learning training models requires multi-level analysis, which takes a long time, and multi-step processing tends to accumulate errors, which will affect the efficiency and accuracy of judgment. Moreover, some attack behaviors may be wrongly judged, which may easily cause data loss.

发明内容Contents of the invention

鉴于上述问题,本公开提供了一种对于初步识别的存在网络安全威胁的对象,可以通过主动验证来确定其合法性的网络安全防御方法、装置、设备、介质和程序产品。In view of the above problems, the present disclosure provides a network security defense method, device, device, medium and program product that can determine the legitimacy of initially identified objects with network security threats through active verification.

本公开实施例的第一方面,提供了一种网络安全防御方法。所述方法包括:基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型;以及采用事先编排好的验证流程,对所述可疑安全事件的执行主体进行验证。其中,,对所述可疑安全事件的执行主体进行验证包括:从针对所述威胁类型预先设置的问题集中获取至少一个备选问题;基于所述可疑安全事件中的实体的信息,对所述至少一个备选问题进行加工处理,得到选题集,其中,所述可疑安全事件中的实体包括所述可疑安全事件中的执行主体;将所述选题集发送给所述执行主体,并获得所述执行主体对所述选题集中的问题进行答复而返回的答题信息;对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果;当所述对比结果满足预定条件时,确定所述执行主体不存在威胁;以及当所述对比结果不满足预定条件时,确定所述执行主体存在威胁。The first aspect of the embodiments of the present disclosure provides a network security defense method. The method includes: identifying suspicious security events and their threat types existing in the network system based on monitoring the network system; and verifying the execution subject of the suspicious security event by using a pre-arranged verification process. Wherein, verifying the execution subject of the suspicious security event includes: obtaining at least one candidate question from a preset question set for the threat type; A candidate question is processed to obtain a selected topic set, wherein the entities in the suspicious security incident include the execution subject in the suspicious security incident; send the selected topic set to the execution subject, and obtain all The answer information returned by the execution subject to answer the questions in the selected topic set; compare the answer information with the corresponding information in the historical record data of the network system to obtain the comparison result; when the comparison result meets the predetermined condition When , it is determined that there is no threat to the execution subject; and when the comparison result does not satisfy a predetermined condition, it is determined that there is a threat to the execution subject.

根据本公开的实施例,所述得到选题集还包括:基于所述网络系统中的历史记录数据,获取与所述执行主体具有相似行为特征的其他对象;基于所述其他对象的信息,对所述至少一个备选问题中的至少部分问题进行加工处理,生成干扰项;以及将所述干扰项扩充到所述选题集中。According to an embodiment of the present disclosure, the obtaining the selected topic set further includes: obtaining other objects having similar behavioral characteristics to the execution subject based on the historical record data in the network system; based on the information of the other objects, obtaining Processing at least part of the at least one candidate question to generate distracting items; and expanding the distracting items into the set of selected questions.

根据本公开的实施例,所述基于所述网络系统中的历史记录数据,获取与所述执行主体具有相似行为特征的其他对象包括:从所述网络系统的历史记录数据中提取出实体数据,得到多个实体,其中,所述多个实体包括所述执行主体;从所述网络系统的历史记录数据中,提取所述多个实体中每个实体的行为数据并形成时间序列,得到每个实体的行为特征;基于所述多个实体中所述执行主体与其他实体的行为特征的相似性判断,确定与所述执行主体具有相似行为特征的所述其他对象。According to an embodiment of the present disclosure, the acquiring other objects having similar behavior characteristics to the execution subject based on the historical record data in the network system includes: extracting entity data from the historical record data in the network system, A plurality of entities are obtained, wherein the plurality of entities include the execution subject; from the historical record data of the network system, the behavior data of each entity in the plurality of entities is extracted and formed into a time series, and each Behavioral characteristics of the entity: based on the similarity judgment between the execution subject and the behavior characteristics of other entities among the multiple entities, determine the other objects that have similar behavior characteristics to the execution subject.

根据本公开的实施例,所述问题集中的问题按照问题之间的相似性被划分为多个第二类别,其中,同一个第二类别中的问题相似。所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:从所述多个第二类别中的每个第二类别中至少选择一个问题,以得到所述至少一个备选问题。According to an embodiment of the present disclosure, the questions in the question set are divided into multiple second categories according to the similarity between the questions, wherein the questions in the same second category are similar. The obtaining at least one candidate question from the preset question set for the threat type includes: selecting at least one question from each of the plurality of second categories to obtain the at least one candidate question question.

根据本公开的实施例,所述问题集中的问题,按照问题所具有的特性的种类被划分为多个第一类别,每一个第一类别中的问题具有同种特性。所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:从所述多个第一类别的每个第一类别中至少选择一个问题,以得到所述至少一个备选问题。其中,所述特性的种类包括必须回答正确和容许出现错误至少两种。According to an embodiment of the present disclosure, the questions in the question set are divided into multiple first categories according to the types of characteristics of the questions, and the questions in each first category have the same characteristics. The acquiring at least one candidate question from the preset question set for the threat type includes: selecting at least one question from each of the plurality of first categories to obtain the at least one candidate question . Wherein, the types of the characteristics include at least two types that must be answered correctly and errors that are allowed to occur.

根据本公开的实施例,所述预定条件包括所述选题集中所述特性为必须回答正确的问题均回答正确。According to an embodiment of the present disclosure, the predetermined condition includes that all questions in the set of selected questions that must be answered correctly are answered correctly.

根据本公开的实施例,所述对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果包括:基于所述答题信息与所述网络系统的历史记录数据中的对应信息的对比,得到所述选题集中每个问题答复正确与否的答复结果信息;以及遍历所述选题集中所述特性为必须回答正确的问题的所述答复结果信息,确定所述选题集中所述特性为必须回答正确的问题是否均回答正确。According to an embodiment of the present disclosure, the comparing the answer information with the corresponding information in the historical record data of the network system, and obtaining the comparison result includes: based on the correspondence between the answer information and the historical record data of the network system Comparing the information to obtain the answer result information of whether the answer to each question in the selected topic set is correct or not; Collectively the characteristic is whether all questions that must be answered correctly are answered correctly.

根据本公开的实施例,所述预定条件还包括:在所述选题集中所述特性为必须回答正确的问题均回答正确的情况下,所述答题信息的评分大于或等于预设阈值。所述对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果还包括:在所述选题集中所述特性为必须回答正确的问题均回答正确的情况下,基于所述选题集中每个问题的所述答复结果信息和每个问题对应的难度等级,得到所述选题集中每个问题的得分,其中,所述问题集中的问题按照难易程度预先划分为多个难度等级,每个难度等级中的问题的计分规则相同;根据所述选题集中每个问题的重要程度等级,获取每个问题对应的权重,其中,所述问题集中的问题按照重要程度预先划分为多个重要程度等级,每个重要程度等级中的问题的权重相同;以及基于所述选题集中所有问题的得分和每个问题对应的权重,得到所述答题信息的评分。According to an embodiment of the present disclosure, the predetermined condition further includes: when all the questions in the set of selected questions that must be answered correctly are answered correctly, the score of the answer information is greater than or equal to a preset threshold. The comparing the answer information with the corresponding information in the historical record data of the network system, and obtaining the comparison result also includes: in the case that the characteristics in the selected topic set are that all questions that must be answered correctly are all answered correctly, based on The answer result information of each question in the selected topic set and the difficulty level corresponding to each question are obtained to obtain the score of each question in the selected topic set, wherein the questions in the selected topic set are pre-divided into There are multiple difficulty levels, and the scoring rules of the questions in each difficulty level are the same; according to the importance level of each question in the selected topic set, the weight corresponding to each question is obtained, wherein the questions in the question set are ranked according to the importance The degree is pre-divided into a plurality of importance levels, and the questions in each importance level have the same weight; and the score of the answer information is obtained based on the scores of all the questions in the selected question set and the corresponding weight of each question.

根据本公开的实施例,所述预定条件为根据所述执行主体对应的累计验证结果数据更新后的预定条件;其中,所述方法还包括:设置初始的所述预定条件;以及基于所述执行主体对应的累计验证结果数据,更新所述预定条件。其中,更新所述预定条件具体包括:存储每次采用所述验证流程对所述执行主体进行验证所得的验证结果数据;基于已存储的所述验证结果数据的累计,得到所述执行主体对应的累计验证结果数据;以及基于所述执行主体对应的累计验证结果数据,定期或不定期地更新所述预定条件。According to an embodiment of the present disclosure, the predetermined condition is a predetermined condition updated according to the accumulated verification result data corresponding to the execution subject; wherein, the method further includes: setting the initial predetermined condition; and based on the execution The cumulative verification result data corresponding to the main body updates the predetermined condition. Wherein, updating the predetermined condition specifically includes: storing the verification result data obtained by using the verification process to verify the execution subject each time; based on the accumulation of the stored verification result data, obtaining the corresponding accumulative verification result data; and regularly or irregularly updating the predetermined condition based on the accumulative verification result data corresponding to the execution subject.

根据本公开的实施例,所述基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型,包括:利用机器学习算法模型识别出所述可疑安全事件、所述威胁类型以及威胁程度。所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:根据所述威胁程度确定所述至少一个备选问题的问题数量和/或问题难度分布;其中,所述威胁程度与所述问题数量和所述问题难度正相关,其中,所述问题集中的问题按照难易程度预先划分为多个难度等级,所述问题难度分布以所述至少一个备选问题在所述多个难度等级中的分布数据来表征。According to an embodiment of the present disclosure, the identifying suspicious security events and their threat types in the network system based on the monitoring of the network system includes: using a machine learning algorithm model to identify the suspicious security event, the threat type and level of threat. The acquiring at least one candidate question from the set of questions preset for the threat type includes: determining the number of questions and/or problem difficulty distribution of the at least one candidate question according to the threat level; wherein, the threat level It is positively correlated with the number of questions and the difficulty of the questions, wherein the questions in the question set are pre-divided into a plurality of difficulty levels according to the degree of difficulty, and the difficulty distribution of the questions is based on the at least one candidate question among the multiple The distribution data in each difficulty level is represented.

本公开实施例的第二方面,提供了一种网络安全防御装置。所述网络安全防御装置包括初步识别模块和主动验证模块。初步识别模块用于基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型。主动验证模块用于采用事先编排好的验证流程,对所述可疑安全事件的执行主体进行验证。所述主动验证模块包括:获取子模块、选题生成子模块、答题子模块和答题评估子模块。具体地,获取子模块用于从针对所述威胁类型预先设置的问题集中获取至少一个备选问题。选题生成子模块用于基于所述可疑安全事件中的实体的信息,对所述至少一个备选问题进行加工处理,得到选题集,其中,所述可疑安全事件中的实体包括所述可疑安全事件中的执行主体。答题子模块用于将所述选题集发送给所述执行主体,并获得所述执行主体对所述选题集中的问题进行答复而返回的答题信息。答题评估子模块用于:对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果;当所述对比结果满足预定条件时,确定所述执行主体不存在威胁;以及当所述对比结果不满足预定条件时,确定所述执行主体存在威胁。The second aspect of the embodiments of the present disclosure provides a network security defense device. The network security defense device includes a preliminary identification module and an active verification module. The preliminary identification module is used to identify suspicious security events and their threat types existing in the network system based on the monitoring of the network system. The active verification module is used to verify the execution subject of the suspicious security event by adopting a pre-arranged verification process. The active verification module includes: an acquisition sub-module, a topic generation sub-module, an answer sub-module and an answer evaluation sub-module. Specifically, the acquiring submodule is configured to acquire at least one candidate question from a preset question set for the threat type. The selected topic generation submodule is used to process the at least one candidate question based on the information of the entities in the suspicious security event to obtain a selected topic set, wherein the entities in the suspicious security event include the suspicious The execution subject in the security event. The sub-module of answering questions is used to send the set of selected questions to the execution subject, and obtain the answer information returned by the execution subject in response to the questions in the set of selected questions. The answer evaluation sub-module is used to: compare the answer information with the corresponding information in the historical record data of the network system to obtain a comparison result; when the comparison result meets a predetermined condition, determine that there is no threat to the execution subject; and When the comparison result does not meet the predetermined condition, it is determined that there is a threat to the execution subject.

本公开实施例的第三方面,提供了一种电子设备,包括一个或多个处理器和一个或多个存储器。所述存储器用于存储一个或多个程序,其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得一个或多个处理器执行上述方法。A third aspect of the embodiments of the present disclosure provides an electronic device, including one or more processors and one or more memories. The memory is used to store one or more programs, wherein, when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the above method.

本公开实施例的第四方面,还提供了一种计算机可读存储介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行上述方法。According to a fourth aspect of the embodiments of the present disclosure, there is also provided a computer-readable storage medium, on which executable instructions are stored, and when executed by a processor, the processor causes the processor to execute the above method.

本公开实施例的第五方面还提供了一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现上述方法。A fifth aspect of the embodiments of the present disclosure further provides a computer program product, including a computer program, which implements the above method when the computer program is executed by a processor.

根据本公开提供的网络安全防护方法、装置、设备、介质和程序产品,通过先初步识别出所述网络系统中存在的可疑安全事件,然后采用事先编排好的验证流程,对所述可疑安全事件的执行主体按照威胁类型针对性地选择问题进行主动验证,根据验证结果最终确定可以安全事件中的执行主体用户或处理过程是否具有威胁。这样对初步识别过程中的准确率和精准度要求都可以降低,从而在初步识别过程可以使用较少的数据类型和网络层次来实现,减少了初步识别所使用的算法模型的复杂性。而且初步识别之后还会主动验证,可以降低数据丢失的风险,提高网络威胁的辨识度。According to the network security protection method, device, equipment, medium, and program product provided by the present disclosure, the suspicious security incidents existing in the network system are preliminarily identified, and then the suspicious security incidents are detected by using a pre-arranged verification process. According to the type of threat, the execution subject selects the questions for active verification, and finally determines whether the execution subject user or processing process in the security incident is a threat according to the verification result. In this way, the accuracy and precision requirements in the preliminary recognition process can be reduced, so that the preliminary recognition process can be realized with fewer data types and network layers, reducing the complexity of the algorithm model used in the preliminary recognition. And after the initial identification, it will be actively verified, which can reduce the risk of data loss and improve the identification of network threats.

附图说明Description of drawings

通过以下参照附图对本公开实施例的描述,本公开的上述内容以及其他目的、特征和优点将更为清楚,在附图中:Through the following description of the embodiments of the present disclosure with reference to the accompanying drawings, the above content and other objects, features and advantages of the present disclosure will be more clear, in the accompanying drawings:

图1示意性示出了根据本公开实施例的网络安全防御方法和装置的应用场景图;FIG. 1 schematically shows an application scenario diagram of a network security defense method and device according to an embodiment of the present disclosure;

图2示意性示出了根据本公开一实施例的网络安全防御方法的流程图;FIG. 2 schematically shows a flowchart of a network security defense method according to an embodiment of the present disclosure;

图3示意性示出了根据本公开实施例的网络安全防御方法中验证流程的数据准备流程;Fig. 3 schematically shows the data preparation process of the verification process in the network security defense method according to an embodiment of the present disclosure;

图4示意性示出了根据本公开一实施例的网络安全防御方法中对答题信息进行评估的流程图;FIG. 4 schematically shows a flow chart of evaluating answer information in a network security defense method according to an embodiment of the present disclosure;

图5示意性示出了根据本公开一实施例的网络安全防御方法中选题集的获得方法流程图;FIG. 5 schematically shows a flowchart of a method for obtaining a topic set in a network security defense method according to an embodiment of the present disclosure;

图6示意性示出了根据本公开一实施例在获得选题集的过程中选择具有相似行为特征的其他对象的流程图;Fig. 6 schematically shows a flow chart of selecting other objects with similar behavioral characteristics in the process of obtaining a selected topic set according to an embodiment of the present disclosure;

图7示意性示出了根据本公开一实施例的网络安全防御方法中预定条件的动态调整流程图;Fig. 7 schematically shows a flow chart of dynamic adjustment of predetermined conditions in a network security defense method according to an embodiment of the present disclosure;

图8示意性示出了根据本公开另一实施例的网络安全防御方法的流程图;FIG. 8 schematically shows a flowchart of a network security defense method according to another embodiment of the present disclosure;

图9示意性示出了根据本公开实施例的网络安全防御装置的结构框图;以及FIG. 9 schematically shows a structural block diagram of a network security defense device according to an embodiment of the present disclosure; and

图10示意性示出了适于实现根据本公开实施例的网络安全防御方法的电子设备的方框图。Fig. 10 schematically shows a block diagram of an electronic device suitable for implementing a network security defense method according to an embodiment of the present disclosure.

具体实施方式Detailed ways

以下,将参照附图来描述本公开的实施例。但是应该理解,这些描述只是示例性的,而并非要限制本公开的范围。在下面的详细描述中,为便于解释,阐述了许多具体的细节以提供对本公开实施例的全面理解。然而,明显地,一个或多个实施例在没有这些具体细节的情况下也可以被实施。此外,在以下说明中,省略了对公知结构和技术的描述,以避免不必要地混淆本公开的概念。Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

在此使用的术语仅仅是为了描述具体实施例,而并非意在限制本公开。在此使用的术语“包括”、“包含”等表明了所述特征、步骤、操作和/或部件的存在,但是并不排除存在或添加一个或多个其他特征、步骤、操作或部件。The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, steps, operations and/or components, but do not exclude the presence or addition of one or more other features, steps, operations or components.

在此使用的所有术语(包括技术和科学术语)具有本领域技术人员通常所理解的含义,除非另外定义。应注意,这里使用的术语应解释为具有与本说明书的上下文相一致的含义,而不应以理想化或过于刻板的方式来解释。All terms (including technical and scientific terms) used herein have the meaning commonly understood by one of ordinary skill in the art, unless otherwise defined. It should be noted that the terms used herein should be interpreted to have a meaning consistent with the context of this specification, and not be interpreted in an idealized or overly rigid manner.

在使用类似于“A、B和C等中至少一个”这样的表述的情况下,一般来说应该按照本领域技术人员通常理解该表述的含义来予以解释(例如,“具有A、B和C中至少一个的系统”应包括但不限于单独具有A、单独具有B、单独具有C、具有A和B、具有A和C、具有B和C、和/或具有A、B、C的系统等)。Where expressions such as "at least one of A, B, and C, etc." are used, they should generally be interpreted as those skilled in the art would normally understand the expression (for example, "having A, B, and C A system of at least one of "shall include, but not be limited to, systems with A alone, B alone, C alone, A and B, A and C, B and C, and/or A, B, C, etc. ).

在本公开的技术方案中,所涉及的数据(如包括但不限于用户个人信息)的收集、存储、使用、加工、传输、提供、公开和应用等处理,均符合相关法律法规的规定,采取了必要保密措施,且不违背公序良俗。In the technical solution of this disclosure, the collection, storage, use, processing, transmission, provision, disclosure, and application of the data involved (including but not limited to user personal information) are all in compliance with relevant laws and regulations. Necessary confidentiality measures have been taken, and it does not violate public order and good customs.

本公开的实施例提供了一种网络安全防御方法、装置、设备、存储介质和程序产品。该网络安全防御方法中,首先基于对网络系统的监控,初步识别出网络系统中存在的可疑安全事件及其威胁类型,然后采用事先编排好的验证流程,对可疑安全事件的执行主体进行主动验证,根据验证结果确定可以安全事件的执行主体是否具有威胁。其中,可疑安全事件的执行主体可以是网络系统的用户,或者网络系统中的处理过程、或者与网络系统进行交互的外部处理过程。Embodiments of the present disclosure provide a network security defense method, device, equipment, storage medium and program product. In this network security defense method, based on the monitoring of the network system, the suspicious security events and their threat types in the network system are initially identified, and then the pre-arranged verification process is used to actively verify the execution subject of the suspicious security event , according to the verification result, it is determined whether the execution subject of the security event is a threat. Wherein, the execution subject of the suspicious security event may be a user of the network system, or a process in the network system, or an external process that interacts with the network system.

本公开实施例中在初步识别具有安全威胁后,会通过主动验证的方式来验证可疑安全事件的执行主体的合法性,这样对初步识别过程中的准确率和精准度要求都可以降低,从而在初步识别过程可以使用较少的数据类型和网络层次来实现,减少了监控识别算法模型的复杂性。而且初步识别之后还会主动验证,可以降低数据丢失的风险,提高网络威胁的辨识度。In the embodiment of the present disclosure, after the preliminary identification of a security threat, the validity of the execution subject of the suspicious security event will be verified through active verification, so that the accuracy and precision requirements in the preliminary identification process can be reduced, so that in the The preliminary identification process can be implemented with fewer data types and network layers, which reduces the complexity of the surveillance identification algorithm model. And after the initial identification, it will be actively verified, which can reduce the risk of data loss and improve the identification of network threats.

图1示意性示出了根据本公开实施例的网络安全防御方法和装置的应用场景图。Fig. 1 schematically shows an application scenario diagram of a network security defense method and device according to an embodiment of the present disclosure.

如图1所示,根据该实施例的应用场景100可以包括第一终端设备101、第二终端设备102、第三终端设备103、网络104和服务器105。网络104用以在第一终端设备101、第二终端设备102、第三终端设备103和服务器105之间提供通信链路的介质。网络104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。As shown in FIG. 1 , an application scenario 100 according to this embodiment may include a first terminal device 101 , a second terminal device 102 , a third terminal device 103 , a network 104 and a server 105 . The network 104 is used as a medium for providing communication links among the first terminal device 101 , the second terminal device 102 , the third terminal device 103 and the server 105 . Network 104 may include various connection types, such as wires, wireless communication links, or fiber optic cables, among others.

用户可以使用第一终端设备101、第二终端设备102、第三终端设备103中的至少一个通过网络104与服务器105交互,以接收或发送消息等。第一终端设备101、第二终端设备102、第三终端设备103上可以安装有各种通讯客户端应用,例如购物类应用、网页浏览器应用、搜索类应用、即时通信工具、邮箱客户端、社交平台软件等(仅为示例)。A user can use at least one of the first terminal device 101 , the second terminal device 102 , and the third terminal device 103 to interact with the server 105 through the network 104 to receive or send messages and the like. Various communication client applications can be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103, such as shopping applications, web browser applications, search applications, instant messaging tools, email clients, Social platform software, etc. (examples only).

第一终端设备101、第二终端设备102、第三终端设备103可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、膝上型便携计算机和台式计算机等等。The first terminal device 101, the second terminal device 102, and the third terminal device 103 may be various electronic devices with display screens and supporting web browsing, including but not limited to smart phones, tablet computers, laptop computers and desktop computers etc.

服务器105可以是提供各种服务的服务器,例如对用户利用第一终端设备101、第二终端设备102、第三终端设备103所浏览的网站提供支持的后台管理服务器(仅为示例)。后台管理服务器可以对接收到的用户请求等数据进行分析等处理,并将处理结果(例如根据用户请求获取或生成的网页、信息、或数据等)反馈给终端设备。The server 105 may be a server that provides various services, such as a background management server that supports websites browsed by users using the first terminal device 101 , the second terminal device 102 , and the third terminal device 103 (just an example). The background management server can analyze and process received data such as user requests, and feed back processing results (such as webpages, information, or data obtained or generated according to user requests) to the terminal device.

需要说明的是,本公开实施例所提供的网络安全防御方法一般可以由服务器105执行。相应地,本公开实施例所提供的网络安全防御装置一般可以设置于服务器105中。本公开实施例所提供的网络安全防御方法也可以由不同于服务器105且能够与第一终端设备101、第二终端设备102、第三终端设备103和/或服务器105通信的服务器或服务器集群执行。相应地,本公开实施例所提供的网络安全防御装置也可以设置于不同于服务器105且能够与第一终端设备101、第二终端设备102、第三终端设备103和/或服务器105通信的服务器或服务器集群中。It should be noted that, generally, the network security defense method provided by the embodiment of the present disclosure may be executed by the server 105 . Correspondingly, the network security defense device provided by the embodiments of the present disclosure can generally be set in the server 105 . The network security defense method provided by the embodiments of the present disclosure may also be executed by a server or server cluster that is different from the server 105 and can communicate with the first terminal device 101, the second terminal device 102, the third terminal device 103 and/or the server 105 . Correspondingly, the network security defense device provided by the embodiments of the present disclosure may also be set on a server different from the server 105 and capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103 and/or the server 105 or in a server cluster.

应该理解,图1中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。It should be understood that the numbers of terminal devices, networks and servers in Fig. 1 are only illustrative. According to the implementation needs, there can be any number of terminal devices, networks and servers.

以下将基于图1描述的场景,通过图2~图8对公开实施例的网络安全防御方法进行详细描述。Based on the scenario described in FIG. 1 , the network security defense method of the disclosed embodiment will be described in detail through FIGS. 2 to 8 .

图2示意性示出了根据本公开一实施例的网络安全防御方法的流程图。Fig. 2 schematically shows a flowchart of a network security defense method according to an embodiment of the present disclosure.

如图2所示,该实施例的网络安全防御方法可以包括操作S210~操作S280。As shown in FIG. 2 , the network security defense method of this embodiment may include operation S210 to operation S280.

首先在操作S210,基于对网络系统的监控,识别网络系统中存在的可疑安全事件及其威胁类型。具体的,可以训练机器学习算法模型来初步识别网络系统中存在的可疑安全事件及其威胁类型。当然也可以使用非机器学习的算法模型,例如针对每一种威胁类型设置对应的监控条件的模型,进行自动监控。此处使用的模型可以进行初步的筛选识别,因此模型的结构、层次、算法复杂性,相比于以模型识别结果作为最终判别结果的情形,可以简单很多,节约数据采集量、数据分析耗时和资源消耗等。Firstly, in operation S210, based on the monitoring of the network system, suspicious security events and their threat types existing in the network system are identified. Specifically, machine learning algorithm models can be trained to initially identify suspicious security events and their threat types in the network system. Of course, non-machine learning algorithm models can also be used, such as models that set corresponding monitoring conditions for each threat type, for automatic monitoring. The model used here can be used for preliminary screening and identification. Therefore, the structure, hierarchy, and algorithm complexity of the model can be much simpler than the situation where the model identification result is used as the final judgment result, saving data collection and time-consuming data analysis. and resource consumption etc.

然后通过操作S220~操作S280对识别出的可疑安全事件的执行主体,采用事先编排好的验证流程,进行主动验证。该执行主体可以是用户或者处理过程。其中,处理过程是指可以修改接收的输入或将接收的输入重定向到相应的输出的活动,比如接收API调用请求并将其转发到API处理服务的微服务,在数据写入数据存储之前验证输入的数据。Then, through operation S220 to operation S280, active verification is performed on the identified execution subject of the suspicious security event using a pre-arranged verification process. The execution subject can be a user or a process. Among them, the processing process refers to the activities that can modify the received input or redirect the received input to the corresponding output, such as the microservice that receives the API call request and forwards it to the API processing service, and validates the data before writing it to the data store Entered data.

具体地在操作S220,从针对威胁类型预先设置的问题集中获取至少一个备选问题。Specifically, in operation S220, at least one candidate question is obtained from a preset question set for the threat type.

网络系统的威胁类型可以大致包括攻击者冒充用户或处理过程、攻击者恶意修改数据、或者攻击者恶意使用系统导致系统无法提供正常的服务几大类。The types of threats to network systems can roughly include attackers impersonating users or processes, attackers maliciously modifying data, or attackers maliciously using the system so that the system cannot provide normal services.

攻击者冒充用户或处理过程具体表现为,攻击者可以通过看似合法的用户向用户发送一封带有恶意链接的电子邮件,以捕获用户的凭据、数据和设备的访问权限。The attacker impersonates the user or process. Specifically, the attacker can send the user an email with a malicious link from a seemingly legitimate user to capture the user's credentials, data, and access to the device.

攻击者恶意修改数据具体表现为,修改临时存储在缓存中的数据,通过网络发送错误数据以破坏数据的完整性,将恶意的有效负载插入到浏览器的缓存中,导致处理过程或数据存储中的行为异常,或者通过弱的API调用处理修改的内存,导致系统崩溃或敏感信息泄露。Malicious data modification by attackers is specifically performed by modifying data temporarily stored in the cache, sending erroneous data over the network to destroy the integrity of the data, inserting malicious payloads into the browser's cache, and causing errors in processing or data storage. Behavior is abnormal, or handle modified memory through weak API calls, resulting in system crashes or sensitive information disclosure.

攻击者恶意使系统导致系统无法提供正常的服务具体表现为,比如向系统发送大量的请求,占用大量的内存或CPU资源或是存储过多的数据导致系统崩溃。The attacker maliciously causes the system to fail to provide normal services, such as sending a large number of requests to the system, occupying a large amount of memory or CPU resources, or storing too much data, causing the system to crash.

针对威胁类型预先设置的问题集,可以是在确定出要识别的威胁类型后,根据每种威胁类型针对性的搜集或生成大量问题;或者,也可以是大量搜集与网络安全相关的各种问题,然后再将搜集的问题按照威胁类型进行划分,例如,对与相应的威胁类型相关的问题贴上对应的威胁类型标签。The pre-set question set for threat types can be to collect or generate a large number of questions according to each threat type after the threat type to be identified is determined; or, it can also be to collect a large number of various questions related to network security , and then classify the collected questions according to threat types, for example, attach corresponding threat type labels to questions related to corresponding threat types.

具体地,对于攻击者冒充用户或处理过程这种威胁类型,更侧重于校验该用户或者处理过程的真实性,可以将用户个人信息,使用的应用的信息和日常交互的问题作为这个方向的问题,打上对应的标签。对于攻击者恶意修改数据这种威胁类型,更侧重于校验该用户的权限和数据问题,可以将关于权限的问题和数据安全问题作为这个方向的问题,打上对应的标签。对于攻击者恶意使用系统导致系统无法提供正常的服务这种威胁类型,更侧重于校验该用户或者处理过程的真实性,使用系统的问题,可以将用户个人信息和正确使用系统的问题,作为这个方向的问题,打上对应的标签。一个问题可以同时属于多个威胁类别,即不同威胁类型对应的问题集中的问题可以有重复,例如与用户信息或用户权限相关的问题,可以在不同类型的威胁中均涉及。Specifically, for the type of threat where an attacker impersonates a user or process, more emphasis is placed on verifying the authenticity of the user or process, and the user's personal information, information about the application used, and daily interaction issues can be used as issues in this direction. problem, label it accordingly. For the threat type of malicious modification of data by attackers, more emphasis is placed on verifying the user's permissions and data issues. Issues related to permissions and data security can be taken as issues in this direction and labeled accordingly. For the type of threat that the attacker maliciously uses the system to cause the system to fail to provide normal services, it is more focused on verifying the authenticity of the user or the processing process, and the problem of using the system. The user's personal information and the problem of using the system correctly can be used as For questions in this direction, mark the corresponding label. A question can belong to multiple threat categories at the same time, that is, questions in question sets corresponding to different threat types can be repeated. For example, questions related to user information or user rights can be involved in different types of threats.

从而操作S220中选择备选问题时,可以从具有与可疑安全事件的威胁类型对应的标签的问题中进行选择。Therefore, when selecting a candidate question in operation S220, it may be selected from questions with a label corresponding to the threat type of the suspicious security event.

接下来在操作S230,基于可疑安全事件中的实体的信息,对至少一个备选问题进行加工处理,得到选题集,其中,可疑安全事件中的实体包括可疑安全事件中的执行主体。Next, in operation S230, at least one candidate question is processed based on the information of the entities in the suspicious security event, to obtain a selected topic set, wherein the entity in the suspicious security event includes the execution subject in the suspicious security event.

实体是指账号、用户、设备、应用、微服务、数据或IP等。其中,应用、微服务属于处理过程。Entities refer to accounts, users, devices, applications, microservices, data or IPs, etc. Among them, applications and microservices belong to the processing process.

根据事件描述要素,可疑安全事件通常可以描述为:执行主体在什么时间、通过什么方式(例如利用哪个账号或哪个设备),做了什么事(例如,访问了或调用了哪个或哪些应用或数据等)等。从而,可以从可疑安全事件中提取出其中的实体的信息。According to the event description elements, a suspicious security event can usually be described as: when and by what method (for example, which account or device was used), and what the execution subject did (for example, which application or data was accessed or called) etc. Therefore, the information of the entity in the suspicious security event can be extracted.

备选问题来自于问题集,而问题集中的问题通常为可加工处理的问题样例或问题模板,例如,“[用户]的常用账号是?”,“登录[应用]的人员级别要求时?”,其中,[用户]、[应用]在生成选题时,需要根据可以安全事件中的实体的信息进行填写或替换。The candidate questions come from the question set, and the questions in the question set are usually processable question samples or question templates, for example, “What is [user]’s usual account?”, “When is the personnel level required to log in to [application]? ", where [user] and [application] need to fill in or replace the information of the entity in the security event when generating the topic.

然后在操作S240,将选题集发送给执行主体,并获得执行主体对选题集中的问题进行答复而返回的答题信息。Then in operation S240, the selected topic set is sent to the executing subject, and the answer information returned by the executing subject in response to the questions in the selected topic set is obtained.

接下来通过S250~操作S280对答题信息进行评估,来确定执行主体的合法性。Next, through S250 to operation S280, the answer information is evaluated to determine the legitimacy of the execution subject.

具体地,在操作S250,对比答题信息与网络系统的历史记录数据中的对应信息,得到对比结果。Specifically, in operation S250, the answer information is compared with the corresponding information in the historical record data of the network system to obtain a comparison result.

然后在操作S260,判断对比结果是否满足预定条件。若满足,则在操作S270,确定执行主体不存在威胁;若不满足,则在操作S280,确定执行主体存在威胁。Then in operation S260, it is judged whether the comparison result satisfies a predetermined condition. If it is satisfied, then in operation S270, it is determined that there is no threat to the execution subject; if not, then in operation S280, it is determined that there is a threat on the execution subject.

在一些实施例中,可以根据答题准确率是否满足预定阈值来确定执行主体是否存在威胁。In some embodiments, it may be determined whether there is a threat to the execution subject according to whether the accuracy rate of answering questions meets a predetermined threshold.

在另一些实施例中,在利用对比结果和预定条件的对比对答题信息进行评估时,还可以综合考虑选题集中选题的数量、不同问题的难易程度、不同问题的特性(如是否必须回答正确、重要程度)等信息,使最终的验证结果更精准。具体将在下文详细介绍。In other embodiments, when evaluating the answer information by comparing the comparison results with the predetermined conditions, it is also possible to comprehensively consider the number of selected topics in the topic selection set, the degree of difficulty of different problems, and the characteristics of different problems (such as whether it is necessary to Correct answer, importance level) and other information to make the final verification result more accurate. The specific will be introduced in detail below.

图3示意性示出了根据本公开实施例的网络安全防御方法中验证流程的数据准备流程。Fig. 3 schematically shows a data preparation process of a verification process in a network security defense method according to an embodiment of the present disclosure.

结合图2和图3,本公开实施例的网络安全防御方法在操作S220~操作S280之前,需要事先编排验证流程,其中,验证流程的数据准备流程包括操作S301~操作S303。Referring to FIG. 2 and FIG. 3 , the network security defense method according to the embodiment of the present disclosure needs to arrange the verification process in advance before operation S220 to operation S280, wherein the data preparation process of the verification process includes operation S301 to operation S303.

首先在操作S301,生成问题数据集(也可称为问题集,本文中不明确区分二者)。在一个实施例中,可以搜集或生成与网络安全相关的各种问题,然后通过预处理(诸如,格式抽象或统一等)后,汇集到一起。First, in operation S301, a question data set (also called a question set, which is not clearly distinguished herein) is generated. In one embodiment, various problems related to network security may be collected or generated, and then collected together after preprocessing (such as format abstraction or unification).

问题数据集中的问题可以包括与网络安全相关的各种问题;例如可以是针对用户个人信息的问题,比如个人的账号信息,常用的IP信息,使用的设备信息;或者,例如可以是针对用户常用的应用的信息,比如用户经常用的应用的名字,经常访问的时间段,最近一次访问的时间;又或者,例如可以是针对日常交互的问题,比如部门的名字,汇报的对象,经常交流的同事;再或者,例如可以是关于权限的问题,比如个人的角色是什么,可以访问那些资源,最近一次的修改权限的时间;再或者,例如可以是关于访问的数据安全问题,要访问的数据的是否可以公开,保密的级别,是否可以复制;再或者,例如可以是正确使用系统的问题,个人使用的网络带宽,可支持的最大吞吐量,最大访问频次。The questions in the question data set can include various questions related to network security; for example, they can be questions about users' personal information, such as personal account information, commonly used IP information, and device information used; or, for example, they can be about users' commonly used The application information, such as the name of the application frequently used by the user, the time period of the frequent visit, and the time of the last visit; Colleagues; or, for example, it can be a question about permissions, such as what is the role of the individual, what resources can be accessed, and the time when the permission was last modified; or, for example, it can be a data security issue about access, the data to be accessed Whether it can be disclosed, the level of confidentiality, whether it can be copied; or, for example, it can be a problem of correct use of the system, the network bandwidth used by individuals, the maximum throughput that can be supported, and the maximum frequency of visits.

然后在操作S302,对问题数据集中的问题从不同维度进行标签分类。可以以标签的方式标记每个问题的特征或所属的分类类别。其中,可以从不同的维度使用不同的问题类别标签,对问题数据集中的每个问题,贴上对应标签。Then in operation S302, classify labels from different dimensions to the questions in the question dataset. The characteristics of each question or the classification category to which it belongs can be marked in the form of labels. Among them, different question category labels can be used from different dimensions, and corresponding labels can be attached to each question in the question dataset.

例如在前文关于操作S220的介绍中提到,可以将搜集的问题按照威胁类型进行划分,对每个问题贴上对应的威胁类型标签,从而得到与每个威胁类型对应的问题集。这样操作S220中选择备选问题可以从与每个威胁类型对应的问题集中进行选择,提高对执行主体进行验证的针对性。For example, as mentioned in the introduction about operation S220 above, the collected questions may be divided according to threat types, and a corresponding threat type label is attached to each question, so as to obtain a question set corresponding to each threat type. In this way, the selection of candidate questions in operation S220 can be selected from the question set corresponding to each threat type, which improves the pertinence of the verification of the execution subject.

再例如,可以从问题的特性、问题之间的相似性、问题的难度、问题的重要程度等维度设置标签。通过这样的标签,可以更精确的定位问题的特征。便于在操作S220中选择备选问题时根据问题的特征针对性的进行选择,快速的去除重复的或是冗余的信息,达到更好的体验效果。For another example, labels can be set from dimensions such as the characteristics of the questions, the similarity between the questions, the difficulty of the questions, and the importance of the questions. Through such labels, the characteristics of the problem can be more precisely located. It is convenient to select alternative questions in operation S220 according to the characteristics of the questions, quickly remove duplicate or redundant information, and achieve a better experience effect.

具体地,在一些实施例中可以将操作S301中生成的问题集中的问题,按照问题之间的相似性被划分为多个第二类别,每个第二类别中的问题可以使用相同的标签进行标记,其中,同一个第二类别中的问题相似。这样,在上述操作S220中从问题集中选择备选问题时,可以从多个第二类别中的每个第二类别中至少选择一个问题。而且还可以从不同的第二类别中选择数量相当的问题。这样就可以尽量选择出互不相关的问题,避免备选问题中重复的或冗余的信息,增加所选择的备选问题的广度。Specifically, in some embodiments, the questions in the question set generated in operation S301 can be divided into a plurality of second categories according to the similarity between the questions, and the questions in each second category can use the same label for classification. mark, where the questions in the same second category are similar. In this way, when selecting candidate questions from the question set in the above operation S220, at least one question may be selected from each of the plurality of second categories. It is also possible to select an equivalent number of questions from a different second category. In this way, unrelated questions can be selected as much as possible, repeated or redundant information in the candidate questions can be avoided, and the breadth of the selected candidate questions can be increased.

按照问题之间的相似性将问题集进行划分时,在一个实施例中,可以是按照聚类算法,将问题集中的问题数据先进行向量化处理,然后对向量化的数据进行聚类,从而一个类内的问题数据构成一个第二类别;在另一个实施例中,也可以是有人工按照经验将相似的问题(例如,均涉及用户信息的、均涉及操作过程的)划分到一类中,一个类内的问题构成一个第二类别。When the problem set is divided according to the similarity between the problems, in one embodiment, the problem data in the problem set can be vectorized first according to the clustering algorithm, and then the vectorized data is clustered, so that The problem data in a class constitutes a second category; in another embodiment, it is also possible to manually classify similar problems (for example, all involving user information, all involving the operation process) into one category according to experience , questions within a class form a second class.

在一些实施例中,在按照问题之间的相似性将问题集进行划分后贴标签时,不同第二类别之间根据类与类之间的相关度来设置标签值,通过标签值来反映问题之间的互斥程度或相似程度。例如可以采用二值来标识标签之间的关联分量,取值范围是{0,1},相关度越高越接近1。对于个人信息和经常使用的应用都属于用户的个人信息或行为,相似度就比较高,对于个人信息和数据的安全问题,分别从主体和客体的角度验证对象的真实性,这样的问题相似度比较低。这样在上述操作S220中从问题集中选择备选问题时,还可以根据标签值尽量从相关度较低的第二类别中多选择些问题。In some embodiments, when the question set is divided according to the similarity between the questions and then labeled, the label values are set between different second categories according to the correlation between the classes, and the label values reflect the differences between the questions. degree of mutual exclusion or similarity between them. For example, a binary value can be used to identify the correlation component between tags, and the value range is {0, 1}, and the higher the correlation is, the closer it is to 1. For personal information and frequently used applications that belong to the user's personal information or behavior, the similarity is relatively high. For personal information and data security issues, the authenticity of the object is verified from the perspective of the subject and the object respectively. The similarity of such issues relatively low. In this way, when selecting candidate questions from the question set in the above operation S220, more questions may be selected from the second category with lower relevance according to the label value as much as possible.

在一些实施例中,可以将操作S301中生成的问题数据集中的问题,按照问题所具有的特性的种类划分为多个第一类别,每一个第一类别中的问题具有同种特性,可以被设置相同的标签来表示。其中,特性的种类例如可以包括必须回答正确和容许出现错误至少两种。在一些实施中,容许出现错误还可以根据容许出现错误的概率或程度划分为多个种类。再在一些实施中,问题所具有的特性甚至还可以包括不应当回答正确等类别。例如可以对必须回答正确的问题进行变形,形成具有干扰性的错误诱导问题。这种变形既可以是静态的,例如生成的变形问题作为问题数据集的一部分数据。当然也可以是动态变形,例如在从备选问题加工成选题的过程中进行的变形,即在从备选问题生成选题的过程中改变问题的特性,生成干扰性的问题,如下文图5中提及的干扰项。这样,在上述操作S220中从问题集中选择备选问题时,可以从多个第一类别的每个第一类别中至少选择一个问题。这样可以保证各种特性的问题都有被选择到,有助于丰富所选择的备选问题的深度层次。In some embodiments, the questions in the question data set generated in operation S301 can be divided into multiple first categories according to the types of characteristics of the questions, and the questions in each first category have the same characteristics and can be classified into Set the same label to denote. Wherein, the types of characteristics may include, for example, at least two types that must be answered correctly and errors that are allowed to occur. In some implementations, allowable errors can also be divided into multiple categories according to the probability or degree of allowable errors. In some implementations, the characteristics of the question may even include categories such as should not be answered correctly. For example, questions that must be answered correctly can be morphed into intrusive error-inducing questions. This deformation can be static, for example generated deformation problem data as part of the problem data set. Of course, it can also be dynamic deformation, such as the deformation in the process of processing from candidate questions to selected topics, that is, to change the characteristics of the questions in the process of generating selected topics from candidate questions, and generate disturbing questions, as shown in the figure below Disturbances mentioned in 5. In this way, when selecting candidate questions from the question set in the above operation S220, at least one question may be selected from each of the plurality of first categories. This can ensure that questions with various characteristics are selected, which helps to enrich the depth level of the selected candidate questions.

按照问题所具有的特性的种类对问题集进行分类时,可以根据每个问题的特性设置对应的标签。例如,有些问题必须对,有些可以错:比如账号信息、使用的设备信息、部门的名字、个人的角色,这样的经常使用或是正在使用的信息问题,是用户必须回答正确的问题,即这些问题的特性为必须回答正确。再例如,对于交互的问题:比如最后一次修改时间、上一次登录时间,这样的历史问题是允许用户有一定的出错的概率,这样的问题的特性为容许出现错误。比如可支持的最大吞吐量,最大访问频次相对专业的设置也是可以允许用户回答有一定的误差,这些问题的特性为容许出现错误,如果再按照容错概率高低进一步细分的话,这些问题的特性是相对冷僻、容错概率高,如果能准确回答,会增加该对象的真实的可能性。When classifying the problem set according to the type of characteristics of the problem, a corresponding label may be set according to the characteristics of each problem. For example, some questions must be right, and some questions can be wrong: such as account information, equipment information used, department name, personal role, such information questions that are often used or are being used, are questions that users must answer correctly, that is, these The nature of the question is that it must be answered correctly. For another example, for interactive problems: such as the last modification time and last login time, such historical problems allow users to have a certain probability of making mistakes, and the characteristics of such problems are that errors are allowed. For example, the maximum throughput that can be supported and the maximum access frequency are relatively professional settings that allow users to answer with certain errors. The characteristics of these questions are that errors are allowed. If they are further subdivided according to the probability of error tolerance, the characteristics of these questions are: It is relatively remote and has a high probability of error tolerance. If you can answer it accurately, it will increase the possibility of the object being real.

在一些实施例中,还可以将操作S301中生成的问题集中的问题,按照问题的难度等级划分为多个第三类别,每个第三类别中的问题贴有同一个难度等级对应的标签。同一个第三类别中的问题具有相同的难度等级。该难度等级的设置可以是根据人工经验设置,或者也可以根据大量统计后根据问题的出现概率以及问题答题成功的概率来设置若干等级。In some embodiments, the questions in the question set generated in operation S301 may also be divided into multiple third categories according to the difficulty level of the questions, and each question in the third category is labeled with a label corresponding to the same difficulty level. Questions in the same third category have the same difficulty level. The setting of the difficulty level may be based on manual experience, or several levels may be set according to the probability of occurrence of the question and the probability of success in answering the question after a large number of statistics.

这样,在上述操作S220中从问题集中选择备选问题时,可以有针对性地从多个第三类别的每个第三类别中至少选择一个问题。这样可以保证各种难度等级的问题都有被选择到,有助于保证所选择的备选问题的问题难度分布,其中,问题难度分布可以以操作S220中最终选择出的备选问题在多个难度等级中的分布数据来表征。In this way, when selecting candidate questions from the question set in the above operation S220, at least one question from each third category of multiple third categories may be targetedly selected. This can ensure that questions of various difficulty levels are selected, which helps to ensure the difficulty distribution of the selected candidate questions. Wherein, the problem difficulty distribution can be selected in multiple Characterized by the distribution data in the difficulty level.

另外,在一些实施例中,当上述操作S2 10中利用机器学习算法模型识别出可疑安全事件和威胁类型的时候,还同时识别出威胁程度时,则在操作S220中从问题集中选择备选问题时,还可以根据威胁程度确定至少一个备选问题的问题数量和/或问题难度分布,然后有针对性性从问题集中选择备选问题。其中,威胁程度与问题数量和问题难度正相关,其中,问题集中的问题按照难易程度预先划分为多个难度等级。例如预先设置威胁程度、与问题数量和问题难度之间的映射关系,使得初步识别威胁程度越大时,可以在操作S220中多选择一些问题,并且尽可能多得选择一些难度大的问题。In addition, in some embodiments, when the machine learning algorithm model is used to identify suspicious security events and threat types in the above operation S210, and the degree of threat is also identified at the same time, then in operation S220, an alternative question is selected from the question set When , it is also possible to determine the number of questions and/or the difficulty distribution of at least one candidate question according to the degree of threat, and then select the candidate questions from the question set in a targeted manner. Among them, the degree of threat is positively correlated with the number of questions and the difficulty of the questions, and the questions in the question set are pre-divided into multiple difficulty levels according to the degree of difficulty. For example, the mapping relationship between the threat level, the number of questions, and the difficulty of the question is set in advance, so that when the threat level is initially recognized, more questions can be selected in operation S220, and as many difficult questions as possible can be selected.

在一些实施例中,还可以将操作S301中生成的问题数据集中的问题,按照问题的重要程度等级划分为多个第四类别,每个第四类别中的问题贴有同一个重要程度等级对应的标签。同一个第四类别中的问题具有相同的重要程度等级。这样,在一些实施例中,在上述操作S220中从问题集中选择备选问题时,可以从各种重要程度等级对应的问题中选择备选问题,使得所选问题的重要程度分布均衡。或者,在一些实施例中,在上述操作S220中还可以根据识别出的威胁程度或者对执行主体进行评估的严格程度,确定各种重要程度等级中的问题数量,有针对性的进行问题选择。In some embodiments, the questions in the question data set generated in operation S301 can also be divided into multiple fourth categories according to the importance levels of the questions, and the questions in each fourth category are labeled with the same importance level. Tag of. Questions in the same fourth category have the same importance rating. In this way, in some embodiments, when selecting candidate questions from the question set in operation S220 above, candidate questions may be selected from questions corresponding to various importance levels, so that the distribution of importance of the selected questions is balanced. Alternatively, in some embodiments, in the above operation S220, the number of questions in various levels of importance may also be determined according to the identified threat level or the strictness of the evaluation of the execution subject, so as to select questions in a targeted manner.

可见,本公开实施例通过操作S302对问题集中的问题从不同维度进行标签分类,可以在主动验证过程中为选择备选问题提供更多信息依据,快速的去除重复的或是冗余的信息,增加所选择的备选问题的深度和广度,提升对安全事件的执行主体进行验证的全面性,达到更好、更精准的验证效果。It can be seen that in the embodiment of the present disclosure, labeling the questions in the question set from different dimensions through operation S302 can provide more information basis for selecting candidate questions in the active verification process, and quickly remove duplicate or redundant information. Increase the depth and breadth of the selected alternative questions, improve the comprehensiveness of the verification of the executive body of the security event, and achieve better and more accurate verification results.

接下来在操作S303,还可以生成随机码,防止机器人攻击。其中,可以抽取随机码混合到选题集中,在操作S240中随同选题集发送给可疑安全事件的执行主体。随机码可以是根据需要配置的随机验证码,可以是图片格式也可以是字符形式的,用于防止机器人的攻击。Next, in operation S303, a random code may also be generated to prevent robot attacks. Wherein, a random code may be extracted and mixed into the topic selection set, and sent to the execution subject of the suspicious security event along with the topic selection set in operation S240. The random code can be a random verification code configured according to the needs, and it can be in the form of a picture or a character, which is used to prevent attacks from robots.

在经过操作S301~操作S303之后,就基本完成了验证流程中的数据准备。接下来在按照图2所示的流程进行网络安全防御时,在操作S220可以借助于问题数据中的标签,抽取对应标签下的问题,诸如对于不同类型的安全威胁,调取相关标签的问题,然后在操作S230中结合具体的用户或处理过程等实体的信息,生成对应的选题并得到选题集。可以根据安全威胁的威胁类型和/或威胁程度,选择不同标签、不同数量、相关度比较低的题目。相对较为明显的存在安全威胁的对象,可以多选择几道题目,以便更准确的判断是否为真实的动作还是确实存在威胁。After operations S301 to S303, the data preparation in the verification process is basically completed. Next, when performing network security defense according to the flow shown in FIG. 2 , in operation S220, the questions under the corresponding labels can be extracted by means of the labels in the question data, such as for different types of security threats, the questions related to the labels are called, Then in operation S230, combine the information of entities such as specific users or processing procedures to generate corresponding selected topics and obtain a selected topic set. Topics with different labels, different numbers, and relatively low relevance can be selected according to the threat type and/or threat degree of the security threat. For relatively obvious objects that pose a security threat, you can choose a few more questions in order to more accurately judge whether it is a real action or a real threat.

在操作S240中将选题集进行发送时,可以将选题集中的问题打乱顺序配合随机码验证,确保问题的有效,问题表达准确,选项设置合理,之后发送给用户或处理过程,并记录下对应的答题信息。When sending the selected topic set in operation S240, the questions in the selected topic set can be scrambled and verified with random codes to ensure that the questions are valid, the question expression is accurate, and the option settings are reasonable, and then sent to the user or the processing process, and recorded The corresponding answer information below.

接下来通过操作S250~操作S280对答题信息进行评估的过程中,也可以根据问题集中的各种维度的标签信息,设置具体的预定条件或评估规则等。Next, in the process of evaluating the answer information through operation S250 to operation S280, specific predetermined conditions or evaluation rules can also be set according to the label information of various dimensions in the question set.

例如,在一个实施例中,预定条件被设置为选题集中特性为必须回答正确的问题均回答正确。For example, in one embodiment, the predetermined condition is set to be that all questions in the selected topic set must be answered correctly.

在另一实施例中,预定条件还可以进一步被设置为:在选题集中特性为必须回答正确的问题均回答正确的情况下,答题信息的评分大于或等于预设阈值。答题信息的评分可以是在答题信息与网络系统中的历史记录比较后所得的对错结果基础上,再结合每个问题的计分规则得到的,其中,每个问题的计分规则是预设的,且可以与每个问题在一个维度或多个维度上的标签相关联。In another embodiment, the predetermined condition may be further set as: in the case that all the questions in the selected question set that must be answered correctly are all answered correctly, the score of the answer information is greater than or equal to a preset threshold. The scoring of the answer information can be obtained on the basis of the right or wrong results obtained after comparing the answer information with the historical records in the network system, combined with the scoring rules for each question, wherein the scoring rules for each question are preset , and can be associated with each question's labels on one or more dimensions.

图4示意性示出了根据本公开一实施例的网络安全防御方法中对答题信息进行评估的流程图。Fig. 4 schematically shows a flow chart of evaluating answer information in a network security defense method according to an embodiment of the present disclosure.

如图4所示,操作S260中判断对比结果是否满足预定条件,具体可以包括操作S261、或者操作S261~操作S265。As shown in FIG. 4 , in operation S260 , it is judged whether the comparison result satisfies a predetermined condition, which may specifically include operation S261 , or operation S261 to operation S265 .

在操作S261,判断选题集中特性为必须回答正确的问题是否均回答正确。若是,则执行操作S262。若否,则可以在操作S280中确定执行主体存在威胁。In operation S261, it is judged whether all the questions in the selected topic collection are answered correctly or not. If yes, perform operation S262. If not, it may be determined in operation S280 that there is a threat to the execution subject.

具体地,首先可以基于答题信息与网络系统的历史记录数据中的对应信息的对比,得到选题集中每个问题答复正确与否的答复结果信息,然后遍历选题集中特性为必须回答正确的问题的答复结果信息,确定选题集中特性为必须回答正确的问题是否均回答正确。Specifically, based on the comparison of the answer information and the corresponding information in the historical record data of the network system, the answer result information of whether the answer to each question in the selected topic set is correct or not can be obtained, and then the selected topic set is traversed. The answer result information of the selected topic determines whether all the questions that must be answered correctly are all answered correctly.

根据该实施例,当选题集中特性为必须回答正确的问题存在回答错误的情况时,就可以直接确定当前的可疑安全事件是不安全的,该可疑安全事件的执行主体(用户或处理程序)存在威胁。例如,对于用户必须回答正确的问题,如账号信息和个人角色,如果没有回答正确就严重怀疑该用户的真实性,直接判定这样的执行主体存在安全威胁。According to this embodiment, when the feature of topic selection is that there is a wrong answer in the question that must be answered correctly, it can be directly determined that the current suspicious security event is unsafe, and the execution subject (user or processing program) of the suspicious security event There is a threat. For example, for questions that users must answer correctly, such as account information and personal roles, if they do not answer correctly, the authenticity of the user will be seriously doubted, and it is directly determined that such an executive subject has a security threat.

在选题集中特性为必须回答正确的问题均回答正确的情况下,可以在操作S262,基于选题集中每个问题的答复结果信息和每个问题对应的难度等级,得到选题集中每个问题的得分。其中,如前文介绍可以将问题集中的问题按照难易程度预先划分为多个难度等级。其中,在该实施例中,可以对于每个难度等级中的问题设置相同的计分规则。例如,同一难度等级的问题答对得几分,答错扣几分或者不扣分。例如,对于生僻的、难度高的问题,答错可以不扣分。以此方式,可以根据问题的难易程度,是否冷僻这样的属性特征涉及不同的计分规则,越困难的题目回答正确得分会越高,越冷僻的题目回答正确会得分越高,反之会相对较低。In the case that the characteristics of the selected topic set are that all the questions that must be answered correctly can be answered correctly, in operation S262, based on the answer result information of each question in the selected topic set and the difficulty level corresponding to each question, each question in the selected topic set can be obtained score. Among them, as mentioned above, the problems in the problem set can be pre-divided into multiple difficulty levels according to the degree of difficulty. Wherein, in this embodiment, the same scoring rules may be set for questions in each difficulty level. For example, how many points are awarded for correct answers to questions of the same difficulty level, and how many points are deducted for wrong answers or no points are deducted. For example, for uncommon and difficult questions, no points will be deducted for wrong answers. In this way, according to the degree of difficulty of the question, attribute characteristics such as whether it is remote or not involve different scoring rules. The more difficult the question is, the higher the score is, and the more remote question is, the higher the score is, and vice versa. lower.

在操作S263,根据选题集中每个问题的重要程度等级,获取每个问题对应的权重,其中,问题集中的问题按照重要程度预先划分为多个重要程度等级,每个重要程度等级中的问题的权重相同。例如,可以预设各个重要程度等级与权重的映射关系。在一些实施例中,重要程度等级划分可以与问题的特性种类相一致的,这样可以根据问题所具有的特性来确定问题的权重。In operation S263, according to the importance level of each question in the selected topic set, the weight corresponding to each question is obtained, wherein, the questions in the question set are pre-divided into multiple importance levels according to the importance, and the questions in each importance level have the same weight. For example, the mapping relationship between various importance levels and weights may be preset. In some embodiments, the classification of the importance level may be consistent with the characteristic types of the question, so that the weight of the question may be determined according to the characteristic of the question.

在操作S264,基于选题集中所有问题的得分和每个问题对应的权重,得到答题信息的评分。可以对各个题目的得分进行加权求和,对总体的得分进行归一化处理。In operation S264, based on the scores of all the questions in the selected question set and the weights corresponding to each question, the score of the answer information is obtained. The scores of each topic can be weighted and summed, and the overall score can be normalized.

接下来在操作S265,判断答题信息的评分是否大于或等于预设阈值。若是,则在操作S270中确定执行主体不存在威胁。若否,则在操作S280中确定执行主体存在威胁。Next, in operation S265, it is judged whether the score of the answer information is greater than or equal to a preset threshold. If yes, it is determined in operation S270 that there is no threat to the execution subject. If not, it is determined in operation S280 that there is a threat to the execution subject.

以此方式,通过问题的各种特征或各个维度的标签,对答题信息进行不同的筛选和评分,与预设的阈值进行对比,从而可以精准地判断该对象是否存在安全威胁。In this way, through the various characteristics of the question or the labels of each dimension, the answer information is screened and scored differently, and compared with the preset threshold, so as to accurately determine whether the object has a security threat.

图5示意性示出了根据本公开一实施例的网络安全防御方法中选题集的获得方法流程图。Fig. 5 schematically shows a flowchart of a method for obtaining a topic set in a network security defense method according to an embodiment of the present disclosure.

如图5所示,根据本公开实施例的网络安全防御方法中,获得选题集的方式除了上文介绍的操作S230外,还可以进一步包括操作S231~S233。As shown in FIG. 5 , in the network security defense method according to the embodiment of the present disclosure, in addition to the operation S230 described above, the manner of obtaining the selected topic set may further include operations S231-S233.

在操作S231,基于网络系统中的历史记录数据,获取与执行主体具有相似行为特征的其他对象。当经过判定,与执行主体具有相似行为特征的其他对象较多时,可以随机抽取几个对象。判定具有相似行为特征的其他对象的一个具体实现过程,可以参考下文图6的介绍。In operation S231, based on the historical record data in the network system, other objects having similar behavior characteristics to the execution subject are acquired. When it is determined that there are many other objects with similar behavior characteristics to the execution subject, several objects can be randomly selected. For a specific implementation process of determining other objects with similar behavior characteristics, please refer to the introduction in Figure 6 below.

接下来在操作S232,基于其他对象的信息,对至少一个备选问题中的至少部分问题进行加工处理,生成干扰项。Next, in operation S232, based on the information of other objects, at least part of the at least one candidate question is processed to generate interference items.

此后在操作S233,将干扰项扩充到选题集中。可以基于与执行主体具有相似行为特征的其他对象(诸如,用户或处理过程的信息),对备选问题进行加工处理,生成干扰项,然后将干扰项扩充到操作S230中获得的选题集,共同组成了本次需要调查的问题。Thereafter, in operation S233, the distractor item is expanded into the selected topic set. Based on other objects (such as information about users or processing processes) that have similar behavioral characteristics to the execution subject, the candidate questions can be processed to generate distracting items, and then the distracting items are expanded to the selected topic set obtained in operation S230, Together they constitute the questions to be investigated in this study.

图6示意性示出了根据本公开一实施例在获得选题集的过程中选择具有相似行为特征的其他对象的流程图。Fig. 6 schematically shows a flow chart of selecting other objects with similar behavior characteristics in the process of obtaining a selected topic set according to an embodiment of the present disclosure.

如图6所示,根据本公开的实施例,操作S231可以包括操作S601~操作S603。As shown in FIG. 6 , according to an embodiment of the present disclosure, operation S231 may include operation S601 to operation S603.

在操作S601,从网络系统的历史记录数据中提取出实体数据,得到多个实体,其中,多个实体包括执行主体。In operation S601, entity data is extracted from historical record data of the network system to obtain multiple entities, wherein the multiple entities include execution subjects.

网络系统的历史记录数据,包括以各种途径、以各种粒度采集的数据。采用但不局限于以下两种的采集方式:日志和流量。The historical record data of the network system includes data collected in various ways and at various granularities. Adopt but not limited to the following two collection methods: log and flow.

对采集到的数据进行处理,从数据中提取出账号、用户、设备、应用、数据、IP元素(即,实体数据)从而可以得到多个实体。The collected data is processed, and account, user, device, application, data, and IP elements (that is, entity data) are extracted from the data to obtain multiple entities.

在操作S602,从网络系统的历史记录数据中,提取多个实体中每个实体的行为数据并形成时间序列,得到每个实体的行为特征。In operation S602, extract behavior data of each of the multiple entities from the historical record data of the network system and form a time series to obtain behavior characteristics of each entity.

可以将采集的历史记录数据中,实体的行为数据基于时间序列进行持续不断的跟踪和梳理,形成该实体的基线信息。实体的基线信息,例如可以是每个实体与其他实体之间的按照时间序列的先后连接关系信息、在各个时段的连接频次信息等。例如,某个用户或者处理过程都有哪些账号、访问哪些应用、使用哪些文件、哪些敏感数据、都使用什么设备、什么时候在线、所在位置等信息。In the collected historical record data, the behavior data of the entity can be continuously tracked and sorted out based on time series to form the baseline information of the entity. The baseline information of the entities may be, for example, the connection relationship information between each entity and other entities according to the time series, the connection frequency information in each time period, and the like. For example, which accounts a certain user or process has, which applications they access, which files they use, which sensitive data, which devices they use, when they are online, and where they are located.

有了实体的基线信息,就可以基于实体的基线信息进行实体与实体的行为比较。例如可以基于实体的基线信息得到实体的行为特征。在一个实施例中,可以将实体的基线信息直接作为实体的行为特征,在另一个实施例中,也可以将实体的基线信息进行编码或数字化处理,从中抽取出实体的行为特征。With the baseline information of entities, the behavior comparison between entities can be performed based on the baseline information of entities. For example, the behavior characteristics of the entity can be obtained based on the baseline information of the entity. In one embodiment, the entity's baseline information can be directly used as the entity's behavioral characteristics. In another embodiment, the entity's baseline information can also be coded or digitized to extract the entity's behavioral characteristics.

接下来在操作S603,基于多个实体中执行主体与其他实体的行为特征的相似性判断,确定与执行主体具有相似行为特征的其他对象。Next, in operation S603, based on the similarity judgment between the execution subject and the behavior characteristics of other entities among the multiple entities, other objects having similar behavior characteristics to the execution subject are determined.

相似性判断的方法有很多,可以是比较两个实体的行为特征对应的向量的余弦相似度、或者距离,或者也可以是比较两个实体的基线信息的重合度等。There are many methods for similarity judgment, which can be comparing the cosine similarity or distance of vectors corresponding to the behavior characteristics of two entities, or comparing the coincidence degree of baseline information of two entities.

根据本公开实施例,执行主体为用户或处理过程,相应地,与执行主体具有相似行为特征的其他对象也相应地为用户或处理过程。According to the embodiment of the present disclosure, the execution subject is a user or a processing procedure, and correspondingly, other objects having similar behavior characteristics as the execution subject are also correspondingly users or processing procedures.

可见,本公开实施例可以利用与执行主体具有相似行为特征的其他对象的信息,对备选问题加工处理生成干扰项。从而可以在选题集中增加干扰项,使得可以更智能化、更精准地验证执行主体,提高对网络威胁的辨识度,避免遗漏威胁或数据丢失的风险。It can be seen that the embodiments of the present disclosure can use the information of other objects having similar behavior characteristics as the execution subject to process the candidate questions to generate interference items. In this way, interference items can be added to the topic selection set, so that the execution subject can be verified more intelligently and accurately, the identification of network threats can be improved, and the risk of missing threats or data loss can be avoided.

根据本公开的实施例,上述操作S270和操作S280中对答题信息进行评估时所使用的预定条件,可以是网络系统中统一设置通用的条件。在另一些实施例中,还可以根据所识别出的可疑安全事件的执行主体的历史表现,确定要对执行主体进行验证的严格程度,进而按照一定的原则设置或调整相应的预定条件,这样该预定条件为针对不同的执行主体的个性化条件。According to an embodiment of the present disclosure, the predetermined conditions used when evaluating the answer information in the above operation S270 and operation S280 may be common conditions set uniformly in the network system. In some other embodiments, it is also possible to determine the strictness of verification of the execution subject according to the historical performance of the execution subject of the identified suspicious security event, and then set or adjust the corresponding predetermined conditions according to certain principles, so that the The predetermined conditions are personalized conditions for different execution subjects.

而且,在一些实施例中,该预定条件甚至还可以是,根据历史上采用上述验证流程对执行主体进行验证所得的验证结果的变化趋势,进行动态调整后得到的条件。受外界环境的影响,网络系统也处在一个动态变化的过程中,有必要的网络系统的参数进行动态的调整。例如,用户量很少的情况,可以采用交宽松的判断标准,随着用户量的增加,系统也积累的一定的样本,可以更准确判断安全威胁同时减少交互的摩擦。Moreover, in some embodiments, the predetermined condition may even be a condition obtained after dynamic adjustment according to the change trend of the verification result obtained by verifying the execution subject by using the above verification process in history. Affected by the external environment, the network system is also in a process of dynamic change, and it is necessary to dynamically adjust the parameters of the network system. For example, when the number of users is small, you can adopt a loose judgment standard. As the number of users increases, the system also accumulates a certain number of samples, which can more accurately judge security threats and reduce interaction friction.

具体地,在一个实施例中,在上述操作S270和S280中所使用的预定条件,是根据执行主体对应的累计验证结果数据,最近一次更新后的预定条件。其中,该累计验证结果数据,为对已存储的采用上述验证流程对执行主体进行验证所得的验证结果数据,进行累计处理得到的。Specifically, in one embodiment, the predetermined condition used in the above operations S270 and S280 is the latest updated predetermined condition according to the cumulative verification result data corresponding to the execution subject. Wherein, the accumulative verification result data is obtained by accumulating the stored verification result data obtained by verifying the execution subject through the above verification process.

图7示意性示出了根据本公开一实施例的网络安全防御方法中预定条件的动态调整流程图。Fig. 7 schematically shows a flowchart of dynamic adjustment of predetermined conditions in a network security defense method according to an embodiment of the present disclosure.

如图7所示,根据本公开实施例的网络安全防御方法还可以包括操作S701~操作S704。As shown in FIG. 7 , the network security defense method according to the embodiment of the present disclosure may further include operation S701 to operation S704.

在操作S701,设置初始的预定条件。该初始的预定条件可以是统一设置的通用的条件。In operation S701, initial predetermined conditions are set. The initial predetermined condition may be a universal condition set uniformly.

然后可以通过操作S702和操作S703不断更新执行主体对应的累计验证结果数据。Then the accumulative verification result data corresponding to the execution subject can be continuously updated through operation S702 and operation S703.

具体地,在操作S702,存储每次通过操作S210~操作S280,采用验证流程对执行主体进行验证所得的验证结果数据。Specifically, in operation S702, the verification result data obtained by using the verification process to verify the execution subject each time through operation S210 to operation S280 is stored.

在操作S703,基于已存储的验证结果数据的累计,得到执行主体对应的累计验证结果数据。In operation S703, based on the accumulation of the stored verification result data, the accumulated verification result data corresponding to the execution subject is obtained.

接下来在操作S704,基于执行主体对应的累计验证结果数据,定期或不定期地更新预定条件。Next, in operation S704, the predetermined condition is regularly or irregularly updated based on the accumulated verification result data corresponding to the execution subject.

在每一次按照操作S210~操作S280对执行主体主动验证后,都可以获得对该执行主体的验证结果数据,也可以更精确地对该执行主体进行判断。针对该执行主体的验证结果数据进行保存,进行趋势分析,如果该执行主体的验证结果稳定,则可以在预定条件中降低该执行主体的安全威胁报警阈值,让该执行对象的访问更顺畅,反之可以提高阈值。After each active verification of the execution subject according to operation S210 to operation S280, the verification result data of the execution subject can be obtained, and the execution subject can be judged more accurately. Save the verification result data of the execution subject and conduct trend analysis. If the verification result of the execution subject is stable, the security threat alarm threshold of the execution subject can be lowered under the predetermined conditions to make the access of the execution object smoother. The threshold can be increased.

以此方式,本公开实施例可以根据验证结果数据动态的调整对执行主体进行主动验证时所适用的预定条件,会根据执行主体的累计验证结果数据,对执行主体的判断标准做动态调整,满足了网络系统的安全防御的同时,增加了网络系统的弹性。In this way, the embodiment of the present disclosure can dynamically adjust the predetermined conditions applicable to the active verification of the execution subject according to the verification result data, and dynamically adjust the judgment standard of the execution subject according to the cumulative verification result data of the execution subject to meet While improving the security defense of the network system, it also increases the flexibility of the network system.

图8示意性示出了根据本公开另一实施例的网络安全防御方法的流程图。Fig. 8 schematically shows a flowchart of a network security defense method according to another embodiment of the present disclosure.

如图8所示,根据该实施例的网络安全防御方法可以包括操作S801~操作S807。As shown in FIG. 8, the network security defense method according to this embodiment may include operation S801 to operation S807.

首先在操作S801,对网络系统从安全威胁的角度进行建模。将业务进行数据流化处理,主要关注具体的处理过程,数据存储的类型,数据流的形式,外部实体的状态。建模的目的是方便后续进行数据采集和监控时,确定采集数据或监控的位置、数据和时点,为网络安全设计人员或管理人员提供研究的基本框架。Firstly, in operation S801, the network system is modeled from the perspective of security threats. The data stream processing of the business mainly focuses on the specific processing process, the type of data storage, the form of data flow, and the status of external entities. The purpose of modeling is to facilitate subsequent data collection and monitoring, determine the location, data and time point of data collection or monitoring, and provide a basic framework for network security designers or managers to study.

可以根据要构建的网络系统和所需的上下文,绘制网络系统的流程图,可以包含表示系统工作原理和彼此交互方式的系统关系,还应该包括详细介绍每个系统部分的数据流关系。其中,主要关注的处理过程、数据存储、数据流和外部实体的具体说明如下。According to the network system to be built and the required context, a flow chart of the network system can be drawn, which can include system relationships that represent the working principles of the systems and how they interact with each other, and should also include a detailed introduction to the data flow relationship of each system part. Among them, the specific descriptions of the main concerned processing, data storage, data flow and external entities are as follows.

处理过程表示可以修改接收的输入或将接收的输入重定向到相应的输出的活动。比如接收API调用请求并将其转发到API处理服务的微服务,在数据写入数据存储之前验证输入的数据。A processing procedure represents an activity that can modify received input or redirect received input to a corresponding output. For example, a microservice that receives an API call request and forwards it to an API processing service that validates incoming data before it is written to a data store.

数据存储包括临时或是永久的存储数据,比如使用浏览器存储与会话相关的数据,向文件中添加的安全日志信息。Data storage includes storing data temporarily or permanently, such as storing session-related data using the browser, adding security log information to files.

数据流是指用于数据源和目标之间的通信,比如用户提交的用于访问服务的凭证,处理过程发出的向数据存储添加内容的请求,用于在各个系统元素之间进行交互,包括输出和响应及其传输方式。Data flow refers to the communication between data sources and targets, such as credentials submitted by users to access services, requests from processes to add content to data stores, and interactions between various system elements, including Outputs and responses and how they are transmitted.

外部实体可以是其他的处理过程,数据存储甚至可以是直接控制之外的完整系统,比如可以是与系统交互的用户或者是由其他的团队创建的服务。External entities can be other processes, data stores or even complete systems outside of direct control, such as users interacting with the system or services created by other teams.

这样的建立系统安全威胁模型,有利于整个研发过程的风险管理,对于发现的安全威胁进行跟踪管理,在系统上线之前发现威胁并设计有效的应对措施,在设计阶段对系统进行安全的审视减少安全威胁问题,降低成本。Such a system security threat model is conducive to the risk management of the entire R&D process, tracking and management of discovered security threats, discovering threats before the system goes online and designing effective countermeasures, and conducting a security review of the system during the design phase to reduce security risks. Threat problems, reduce costs.

在操作S802,汇总系统可能存在的威胁类型并进行数据采集。In operation S802, summarize possible threat types in the system and collect data.

具体地,汇总整理出系统可能出现的威胁类型并对应的采集相应的数据。其中,根据统计分析,网络系统中存在的威胁类型,大致可以包括几种:攻击者冒充用户或处理过程、攻击者恶意修改数据或攻击者恶意使用系统导致系统无法提供正常的服务。Specifically, summarize and sort out the types of threats that may occur in the system and collect corresponding data accordingly. Among them, according to statistical analysis, the types of threats existing in the network system can roughly include several types: attackers impersonate users or processing processes, attackers maliciously modify data, or attackers maliciously use the system so that the system cannot provide normal services.

针对以上各种类型的威胁可以分别采集不同的数据进行实时监控。不同的数据采集方式获得数据类型和颗粒度也不尽相同,采用但不限于以下两种的采集方式:日志和流量。其中,日志方式是根据设备和网络系统预先提供的数据格式、内容等的相关规则,产生日志数据,同理安装代理方式也产生各种日志数据,并将日志数据发送到日志收集器。日志方式随着日志数据内容由少到多、颗粒度由粗到精细的过程,占用的资源会增加需要,需要设定一样的规则,保留一定时间段内的日志信息,之前的信息会被删除,需要提前处理。流量方式是通过交换机将网络流量复制一份,发送到流量采集器。网络流量方式就是真实和实时的网络流量,包含更加全面的信息,对当前的系统没有侵入性,部署方便灵活。For the above various types of threats, different data can be collected for real-time monitoring. Different data collection methods obtain different data types and granularity, but are not limited to the following two collection methods: log and traffic. Among them, the log method is to generate log data according to the relevant rules of the data format and content provided in advance by the device and network system. Similarly, the installation agent method also generates various log data and sends the log data to the log collector. Logging method As the content of log data changes from less to more, and the granularity changes from coarse to fine, the resources occupied will increase. It is necessary to set the same rules to retain log information within a certain period of time, and the previous information will be deleted. , need to be processed in advance. The traffic mode is to copy the network traffic through the switch and send it to the traffic collector. The network traffic mode is real and real-time network traffic, which contains more comprehensive information, is not intrusive to the current system, and is easy and flexible to deploy.

接下来在操作S803,处理采集的数据做初步异常检测,识别出可疑安全事件。前述操作S210为操作S803用于安全监控的一个具体实施例。Next, in operation S803, the collected data is processed for preliminary anomaly detection, and suspicious security events are identified. The foregoing operation S210 is a specific embodiment of operation S803 for security monitoring.

具体地,可以使用各种机器学习算法如随机森林、支持向量机、K-Means聚类以及神经网络等进行异常检测,综合个体和群体的对比特征分析识别和发现安全威胁。Specifically, various machine learning algorithms such as random forests, support vector machines, K-Means clustering, and neural networks can be used for anomaly detection, and comprehensive comparative feature analysis of individuals and groups can be used to identify and discover security threats.

由于操作S803中的识别结果仅作为初步识别,后续还会通过验证流程主动验证,因此,在该过程中使用的机器学习算法模型的层次可以不必太多,这样有助于减少分析耗时,且避免多步骤的处理容易累积误差等问题。相比于直接机器学习算法模型得到最后判断结果的方案,本公开实施例可以减少机器学习模型关联子系统的数量,减少处理过程的层数,降低处理的难度,快速的做出反应。然后对于机器学习算法模型输出的异常检测结果相可以通过下面的后续的主动验证来调整。Since the identification result in operation S803 is only used as a preliminary identification, and will be actively verified through the verification process later, the level of the machine learning algorithm model used in this process does not need to be too many, which helps to reduce the time-consuming analysis, and Avoid problems such as multi-step processing that is easy to accumulate errors. Compared with the solution of directly obtaining the final judgment result by the machine learning algorithm model, the embodiments of the present disclosure can reduce the number of associated subsystems of the machine learning model, reduce the number of layers of the processing process, reduce the difficulty of processing, and respond quickly. Then, the anomaly detection results output by the machine learning algorithm model can be adjusted through the following follow-up active verification.

机器学习算法训练所依据的数据可以来自于网络系统的历史记录数据。其中,通过对历史记录数据的处理,可以输出网络系统中的各个实体的基线信息。当有了用户和实体的基线信息后,可以结合各类数据,训练机器学习算法模型对安全事件进行自动化得过程分析。其中,大部分安全事件很难在某一个或两个维度的分析下被发现,需要多维度考虑,如时间、网络层次、安全业务对象等维度。比如可以从用户、设备、应用、数据维度做实时的关联分析,不是一次性事件,而是自动化、持续化的过程。The data on which the machine learning algorithm is trained can come from the historical record data of the network system. Wherein, by processing the historical record data, the baseline information of each entity in the network system can be output. When the baseline information of users and entities is available, various types of data can be combined to train machine learning algorithm models for automated process analysis of security events. Among them, most of the security incidents are difficult to be found under the analysis of one or two dimensions, and need to be considered in multiple dimensions, such as time, network level, security business object and other dimensions. For example, real-time correlation analysis can be done from the dimensions of users, devices, applications, and data. It is not a one-time event, but an automated and continuous process.

接下来在操作S804,判断初步检测识别的结果是否为异常。如果是,则通过操作S805和操作S806,采用事先编写好的验证流程进行主动验证。如果否,则直接在操作S807,对当前事件检测结束。Next, in operation S804, it is judged whether the result of the preliminary detection and identification is abnormal. If yes, through operation S805 and operation S806, active verification is performed by using a pre-written verification process. If not, directly go to operation S807, and end the detection of the current event.

具体地,在操作S805,抽取对应标签下的问题。具体地,可以如前述操作S220中的相关介绍,可以从总的问题集中先确定出具有与所检测到的威胁类型对应标签的问题,得到可抽取的问题范围,然后再从中可以根据问题的难度等级分类标签、或特性种类标签、或相似性或互斥标签等,抽取备选问题。Specifically, in operation S805, the questions under the corresponding tags are extracted. Specifically, as described in the aforementioned operation S220, the questions with tags corresponding to the detected threat types can be determined from the total question set to obtain the range of questions that can be extracted, and then the questions can be selected according to the difficulty of the questions. Level classification labels, or feature category labels, or similarity or mutual exclusion labels, etc., to extract candidate questions.

在抽取到问题后,可以按照前述操作S230或者操作S230和S231~操作S233中所示的方式,对备选问题进行加工处理,得到可以用于进行交互的选题集。在一些实施例中,将选题集发送出去之前还可以在其中添加随机验证码。在将选题集发送给可疑安全事件的执行主体(用户或处理过程)时,可以将问题的顺序打乱发送,并获得可疑安全事件的执行主体对选题集的答复,得到答题信息,对此可以参考前述操作S240。After the questions are extracted, the candidate questions can be processed according to the manner shown in operation S230 or operations S230 and S231-operation S233, to obtain a selected topic set that can be used for interaction. In some embodiments, a random verification code may also be added to the topic selection set before sending it out. When sending the selected topic set to the execution subject (user or processing process) of the suspicious security event, the order of the questions can be sent in disorder, and the reply of the execution subject of the suspicious security event to the selected topic set can be obtained, and the answer information can be obtained. For this, reference may be made to the aforementioned operation S240.

接下来在操作S806,对问题的反馈结果进行评估。具体可以参考前文关于操作S250~操作S280中对答题信息进行评估的详细介绍。Next, in operation S806, the feedback results of the questions are evaluated. For details, please refer to the detailed introduction about evaluating the answer information in operation S250 to operation S280 above.

最后操作S806所得到的评估结果信息,可以动态地反馈给用于初步识别可疑安全事件的机器学习算法模型,用于机器学习算法模型的不断学习更新,同时根据该评估结果信息也可以动态地调整操作S806中进行评估时所使用的预定条件,提升网络系统安全防护的弹性。Finally, the evaluation result information obtained in operation S806 can be dynamically fed back to the machine learning algorithm model used for preliminary identification of suspicious security incidents, used for continuous learning and updating of the machine learning algorithm model, and can also be dynamically adjusted according to the evaluation result information The predetermined condition used in the assessment in operation S806 is used to improve the flexibility of the security protection of the network system.

可见,根据本公开的实施例,可以根据网络系统和上下文,对网络系统从安全威胁的角度进行建模,汇集系统可能存在的威胁并进行数据采集,之后可以通过实时采集数据对网络系统作初步的异常检测,对怀疑存在安全威胁的用户或处理过程,再采用事先编排好的验证流程进行验证,从而在保证安全威胁验证准确性的前提下,减少自动异常检测时所需的数据类型的多样性和算法模型的层次的复杂性,降低了所采用的机器学习算法模型的复杂性。It can be seen that according to the embodiments of the present disclosure, the network system can be modeled from the perspective of security threats according to the network system and context, and the possible threats of the system can be collected and data collected, and then the network system can be initially analyzed by collecting data in real time Anomaly detection, users or processing processes that are suspected of security threats are verified using a pre-arranged verification process, thereby reducing the variety of data types required for automatic anomaly detection on the premise of ensuring the accuracy of security threat verification The complexity of the nature and algorithm model level reduces the complexity of the machine learning algorithm model adopted.

根据本公开的实施例,可以采用主动引导用户,让可疑用户进入事先编排好的验证流程做进一步验证,避免了算法模型漏识别或误识别导致真实的数据丢失的风险。According to the embodiments of the present disclosure, users can be actively guided to allow suspicious users to enter a pre-arranged verification process for further verification, avoiding the risk of missing or misidentifying the algorithm model and causing real data loss.

根据本公开的一些实施例,可以对用户或处理过程的身份和权限做进一步验证,系统会根据用户或处理过程的验证信息,对用户或处理过程的判断标准做动态调整,满足了系统的安全性的同时增加了系统的弹性。According to some embodiments of the present disclosure, the identity and authority of the user or processing process can be further verified, and the system will dynamically adjust the judgment criteria of the user or processing process according to the verification information of the user or processing process, which meets the security of the system While increasing the flexibility of the system.

基于上述各个实施例的网络安全防御方法,本公开实施例还提供了一种网络安全防御装置。以下将结合图9对该网络安全防御装置900进行详细描述。Based on the network security defense method in each of the foregoing embodiments, an embodiment of the present disclosure further provides a network security defense device. The network security defense device 900 will be described in detail below with reference to FIG. 9 .

图9示意性示出了根据本公开实施例的网络安全防御装置900的结构框图。Fig. 9 schematically shows a structural block diagram of a network security defense device 900 according to an embodiment of the present disclosure.

如图9所示,根据本公开的实施例,该网络安全防御装置900包括初步识别模块910和主动验证模块920。As shown in FIG. 9 , according to an embodiment of the present disclosure, the network security defense device 900 includes a preliminary identification module 910 and an active verification module 920 .

初步识别模块910用于基于对网络系统的监控,识别网络系统中存在的可疑安全事件及其威胁类型。在一个实施例中,初步识别模块910可以执行前文介绍的操作S210。The preliminary identification module 910 is configured to identify suspicious security events and their threat types existing in the network system based on the monitoring of the network system. In one embodiment, the preliminary identification module 910 may perform operation S210 described above.

主动验证模块920用于采用事先编排好的验证流程,对可疑安全事件的执行主体进行验证。The active verification module 920 is used to verify the execution subject of the suspicious security event by adopting a pre-arranged verification process.

具体地,主动验证模块920可以包括获取子模块921、选题生成子模块922、答题子模块923和答题评估子模块924。Specifically, the active verification module 920 may include an acquisition submodule 921 , a topic generation submodule 922 , an answer submodule 923 and an answer evaluation submodule 924 .

获取子模块921用于从针对威胁类型预先设置的问题集中获取至少一个备选问题。在一个实施例中,获取子模块921可以执行前文介绍的操作S220。The obtaining submodule 921 is used to obtain at least one candidate question from the preset question set for the threat type. In one embodiment, the obtaining submodule 921 may perform operation S220 described above.

选题生成子模块922用于基于可疑安全事件中的实体的信息,对至少一个备选问题进行加工处理,得到选题集,其中,可疑安全事件中的实体包括可疑安全事件中的执行主体。在一个实施例中,选题生成子模块922可以执行前文介绍的操作S230。在另一些实施例中,选题生成子模块922还可以执行前文介绍的操作S231~操作S233。The topic generation sub-module 922 is used to process at least one candidate question based on the information of the entities in the suspicious security event to obtain a topic set, wherein the entity in the suspicious security event includes the execution subject in the suspicious security event. In one embodiment, the topic generation sub-module 922 may perform the operation S230 described above. In some other embodiments, the topic selection generation submodule 922 may also perform operation S231 to operation S233 described above.

答题子模块923用于将选题集发送给执行主体,并获得执行主体对选题集中的问题进行答复而返回的答题信息。在一个实施例中,答题子模块923可以执行前文介绍的操作S240。The answer sub-module 923 is used to send the selected topic set to the execution subject, and obtain the answer information returned by the execution subject to answer the questions in the selected topic set. In one embodiment, the question answering sub-module 923 may perform operation S240 described above.

答题评估子模块924用于:对比答题信息与网络系统的历史记录数据中的对应信息,得到对比结果;当对比结果满足预定条件时,确定执行主体不存在威胁;以及当对比结果不满足预定条件时,确定执行主体存在威胁。在一个实施例中个,答题评估子模块924可以执行前文介绍的操作S260~操作S280。The answer evaluation sub-module 924 is used to: compare the answer information with the corresponding information in the historical record data of the network system to obtain the comparison result; when the comparison result meets the predetermined condition, determine that there is no threat to the execution subject; and when the comparison result does not meet the predetermined condition , it is determined that there is a threat to the execution subject. In one embodiment, the answer evaluation sub-module 924 may perform the operations S260 to S280 described above.

根据本公开的另一些实施例,该网络安全防御装置900还可以进一步包括问题集生成模块930、预定条件动态设置模块940和/或实体行为分析模块950。According to other embodiments of the present disclosure, the network security defense device 900 may further include a question set generation module 930 , a predetermined condition dynamic setting module 940 and/or an entity behavior analysis module 950 .

问题集生成模块930可以收集并生成大量的问题,并且可以从不同维度对生成的问题进行分类,例如,可以以标签的方式标识每个问题所属的类别。例如,问题集生成模块930可以将生成的问题按照威胁类型分类,给属于对应威胁类型的问题添加相应的标签。又例如,问题集生成模块930可以将生成的问题,按照特性的种类和/或问题的难度等级设置标签,进行问题分类。再例如,问题集生成模块930可以将生成的问题进行聚类,或者凭借经验按照问题之间的相似度进行分类,其中同一个类内的问题可以设置相同的标签,视为相似问题,不同类之间的问题,可以视为是互斥问题。The question set generation module 930 can collect and generate a large number of questions, and can classify the generated questions from different dimensions, for example, the category to which each question belongs can be identified in the form of labels. For example, the question set generating module 930 may classify the generated questions according to threat types, and add corresponding tags to questions belonging to corresponding threat types. For another example, the question set generating module 930 may set labels for the generated questions according to the types of characteristics and/or difficulty levels of the questions, and classify the questions. For another example, the question set generation module 930 can cluster the generated questions, or classify the questions according to the similarity between questions based on experience, wherein questions in the same class can be set with the same label, which can be regarded as similar questions. The problem between them can be regarded as a mutually exclusive problem.

预定条件动态设置模块940可以用于:设置初始的预定条件;以及基于执行主体对应的累计验证结果数据,更新预定条件。其中,更新预定条件具体包括:存储每次采用验证流程对执行主体进行验证所得的验证结果数据;基于已存储的验证结果数据的累计,得到执行主体对应的累计验证结果数据;以及基于执行主体对应的累计验证结果数据,定期或不定期地更新预定条件。在一个实施例中,预定条件动态设置模块940可以执行前述操作S701~操作S704。The predetermined condition dynamic setting module 940 can be used to: set an initial predetermined condition; and update the predetermined condition based on the accumulated verification result data corresponding to the execution subject. Among them, updating the predetermined conditions specifically includes: storing the verification result data obtained by verifying the execution subject each time through the verification process; obtaining the cumulative verification result data corresponding to the execution subject based on the accumulation of the stored verification result data; The accumulated verification result data of , regularly or irregularly update the predetermined conditions. In one embodiment, the predetermined condition dynamic setting module 940 may perform the aforementioned operations S701 to S704.

实体行为分析模块950可以用于从网络系统的历史记录数据中提取出实体数据,得到多个实体,其中,多个实体包括执行主体;从网络系统的历史记录数据中,提取多个实体中每个实体的行为数据并形成时间序列,得到每个实体的行为特征;基于多个实体中执行主体与其他实体的行为特征的相似性判断,确定与执行主体具有相似行为特征的其他对象。得到与执行主体相似的其他对象后,选题生成子模块922可以利用其他对象的信息,对备选问题进行加工改造,生成干扰项,然后将干扰项扩充到选题中。在一个实施例中。实体行为分析模块950可以执行前文介绍的操作S601~操作S603。The entity behavior analysis module 950 can be used to extract entity data from the historical record data of the network system to obtain multiple entities, wherein the multiple entities include execution subjects; from the historical record data of the network system, extract each Based on the similarity judgment of the behavioral characteristics of the execution subject and other entities in multiple entities, determine other objects with similar behavior characteristics to the execution subject. After obtaining other objects similar to the execution subject, the topic generation sub-module 922 can use the information of other objects to process and transform the candidate questions, generate interference items, and then expand the interference items into the topic selection. In one embodiment. The entity behavior analysis module 950 may perform operation S601 to operation S603 described above.

该网络安全防御装置900可以执行参考图2~图8所描述的网络安全防御方法,具体参考前文介绍,此处不再赘述。The network security defense device 900 can execute the network security defense method described with reference to FIG. 2 to FIG.

根据本公开的实施例,初步识别模块910、主动验证模块920、获取子模块921、选题生成子模块922、答题子模块923、答题评估子模块924、问题集生成模块930、预定条件动态设置模块940和实体行为分析模块950中的任意多个模块可以合并在一个模块中实现,或者其中的任意一个模块可以被拆分成多个模块。或者,这些模块中的一个或多个模块的至少部分功能可以与其他模块的至少部分功能相结合,并在一个模块中实现。根据本公开的实施例,初步识别模块910、主动验证模块920、获取子模块921、选题生成子模块922、答题子模块923、答题评估子模块924、问题集生成模块930、预定条件动态设置模块940和实体行为分析模块950中的至少一个可以至少被部分地实现为硬件电路,例如现场可编程门阵列(FPGA)、可编程逻辑阵列(PLA)、片上系统、基板上的系统、封装上的系统、专用集成电路(ASIC),或可以通过对电路进行集成或封装的任何其他的合理方式等硬件或固件来实现,或以软件、硬件以及固件三种实现方式中任意一种或以其中任意几种的适当组合来实现。或者,初步识别模块910、主动验证模块920、获取子模块921、选题生成子模块922、答题子模块923、答题评估子模块924、问题集生成模块930、预定条件动态设置模块940和实体行为分析模块950中的至少一个可以至少被部分地实现为计算机程序模块,当该计算机程序模块被运行时,可以执行相应的功能。According to the embodiment of the present disclosure, the preliminary identification module 910, the active verification module 920, the acquisition sub-module 921, the topic generation sub-module 922, the answer sub-module 923, the answer evaluation sub-module 924, the question set generation module 930, and the dynamic setting of predetermined conditions Any number of modules in the module 940 and the entity behavior analysis module 950 can be implemented in one module, or any one module can be divided into multiple modules. Alternatively, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module. According to the embodiment of the present disclosure, the preliminary identification module 910, the active verification module 920, the acquisition sub-module 921, the topic generation sub-module 922, the answer sub-module 923, the answer evaluation sub-module 924, the question set generation module 930, and the dynamic setting of predetermined conditions At least one of the module 940 and the entity behavior analysis module 950 may be at least partially implemented as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package system, application-specific integrated circuit (ASIC), or can be implemented by hardware or firmware in any other reasonable way of integrating or packaging the circuit, or by any of the three implementation methods of software, hardware and firmware, or in any of them Any suitable combination of several can be realized. Or, preliminary identification module 910, active verification module 920, acquisition submodule 921, topic generation submodule 922, answer submodule 923, answer evaluation submodule 924, question set generation module 930, predetermined condition dynamic setting module 940 and entity behavior At least one of the analysis modules 950 may be at least partially implemented as a computer program module, and when the computer program module is executed, corresponding functions may be performed.

图10示意性示出了适于实现根据本公开实施例的网络安全防御方法的电子设备1000的方框图。Fig. 10 schematically shows a block diagram of an electronic device 1000 suitable for implementing a network security defense method according to an embodiment of the present disclosure.

如图10所示,根据本公开实施例的电子设备1000包括处理器1001,其可以根据存储在只读存储器(ROM)1002中的程序或者从存储部分1008加载到随机访问存储器(RAM)1003中的程序而执行各种适当的动作和处理。处理器1001例如可以包括通用微处理器(例如CPU)、指令集处理器和/或相关芯片组和/或专用微处理器(例如,专用集成电路(ASIC))等等。处理器1001还可以包括用于缓存用途的板载存储器。处理器1001可以包括用于执行根据本公开实施例的方法流程的不同动作的单一处理单元或者是多个处理单元。As shown in FIG. 10 , an electronic device 1000 according to an embodiment of the present disclosure includes a processor 1001 that can be loaded into a random access memory (RAM) 1003 according to a program stored in a read-only memory (ROM) 1002 or from a storage section 1008. Various appropriate actions and processing are performed by the program. The processor 1001 may include, for example, a general-purpose microprocessor (eg, a CPU), an instruction set processor and/or related chipsets, and/or a special-purpose microprocessor (eg, an application-specific integrated circuit (ASIC)), and the like. Processor 1001 may also include on-board memory for caching purposes. The processor 1001 may include a single processing unit or multiple processing units for executing different actions of the method flow according to the embodiments of the present disclosure.

在RAM 1003中,存储有电子设备1000操作所需的各种程序和数据。处理器1001、ROM 1002以及RAM 1003通过总线1004彼此相连。处理器1001通过执行ROM 1002和/或RAM1003中的程序来执行根据本公开实施例的方法流程的各种操作。需要注意,所述程序也可以存储在除ROM 1002和RAM 1003以外的一个或多个存储器中。处理器1001也可以通过执行存储在所述一个或多个存储器中的程序来执行根据本公开实施例的方法流程的各种操作。In the RAM 1003, various programs and data necessary for the operation of the electronic device 1000 are stored. The processor 1001 , ROM 1002 , and RAM 1003 are connected to each other via a bus 1004 . The processor 1001 executes the programs in the ROM 1002 and/or RAM 1003 to perform various operations according to the method flow of the embodiment of the present disclosure. It should be noted that the program may also be stored in one or more memories other than ROM 1002 and RAM 1003 . The processor 1001 may also perform various operations according to the method flow of the embodiments of the present disclosure by executing programs stored in the one or more memories.

根据本公开的实施例,电子设备1000还可以包括输入/输出(I/O)接口1005,输入/输出(I/O)接口1005也连接至总线1004。电子设备1000还可以包括连接至I/O接口1005的以下部件中的一项或多项:包括键盘、鼠标等的输入部分1006;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1007;包括硬盘等的存储部分1008;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1009。通信部分1009经由诸如因特网的网络执行通信处理。驱动器1010也根据需要连接至I/O接口1005。可拆卸介质1011,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1010上,以便于从其上读出的计算机程序根据需要被安装入存储部分1008。According to an embodiment of the present disclosure, the electronic device 1000 may further include an input/output (I/O) interface 1005 which is also connected to the bus 1004 . The electronic device 1000 may also include one or more of the following components connected to the I/O interface 1005: an input section 1006 including a keyboard, a mouse, etc.; including a cathode ray tube (CRT), a liquid crystal display (LCD), etc. An output section 1007 of a speaker or the like; a storage section 1008 including a hard disk or the like; and a communication section 1009 including a network interface card such as a LAN card, a modem, or the like. The communication section 1009 performs communication processing via a network such as the Internet. A drive 1010 is also connected to the I/O interface 1005 as needed. A removable medium 1011, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is mounted on the drive 1010 as necessary so that a computer program read therefrom is installed into the storage section 1008 as necessary.

本公开实施例还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例中描述的设备/装置/系统中所包含的;也可以是单独存在,而未装配入该设备/装置/系统中。上述计算机可读存储介质承载有一个或者多个程序,当上述一个或者多个程序被执行时,实现根据本公开实施例的方法。Embodiments of the present disclosure also provide a computer-readable storage medium, which may be included in the device/apparatus/system described in the above-mentioned embodiments; or may exist independently without being assembled into the equipment/device/system. The above-mentioned computer-readable storage medium carries one or more programs, and when the above-mentioned one or more programs are executed, the method according to the embodiment of the present disclosure is realized.

根据本公开的实施例,计算机可读存储介质可以是非易失性的计算机可读存储介质,例如可以包括但不限于:便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。例如,根据本公开的实施例,计算机可读存储介质可以包括上文描述的ROM 1002和/或RAM 1003和/或ROM 1002和RAM 1003以外的一个或多个存储器。According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, such as may include but not limited to: portable computer disk, hard disk, random access memory (RAM), read-only memory (ROM) , erasable programmable read-only memory (EPROM or flash memory), portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above. In the present disclosure, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device. For example, according to an embodiment of the present disclosure, a computer-readable storage medium may include one or more memories other than the ROM 1002 and/or RAM 1003 and/or ROM 1002 and RAM 1003 described above.

本公开的实施例还包括一种计算机程序产品,其包括计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。当计算机程序产品在计算机系统中运行时,该程序代码用于使计算机系统实现本公开实施例所提供的方法。Embodiments of the present disclosure also include a computer program product, which includes a computer program including program codes for executing the methods shown in the flowcharts. When the computer program product runs in the computer system, the program code is used to make the computer system realize the method provided by the embodiments of the present disclosure.

在该计算机程序被处理器1001执行时执行本公开实施例的系统/装置中限定的上述功能。根据本公开的实施例,上文描述的系统、装置、模块、单元等可以通过计算机程序模块来实现。When the computer program is executed by the processor 1001, the above-mentioned functions defined in the system/apparatus of the embodiment of the present disclosure are performed. According to the embodiments of the present disclosure, the above-described systems, devices, modules, units, etc. may be implemented by computer program modules.

在一种实施例中,该计算机程序可以依托于光存储器件、磁存储器件等有形存储介质。在另一种实施例中,该计算机程序也可以在网络介质上以信号的形式进行传输、分发,并通过通信部分1009被下载和安装,和/或从可拆卸介质1011被安装。该计算机程序包含的程序代码可以用任何适当的网络介质传输,包括但不限于:无线、有线等等,或者上述的任意合适的组合。In one embodiment, the computer program may rely on tangible storage media such as optical storage devices and magnetic storage devices. In another embodiment, the computer program can also be transmitted and distributed in the form of a signal on a network medium, downloaded and installed through the communication part 1009, and/or installed from the removable medium 1011. The program code contained in the computer program can be transmitted by any appropriate network medium, including but not limited to: wireless, wired, etc., or any appropriate combination of the above.

在这样的实施例中,该计算机程序可以通过通信部分1009从网络上被下载和安装,和/或从可拆卸介质1011被安装。在该计算机程序被处理器1001执行时,执行本公开实施例的系统中限定的上述功能。根据本公开的实施例,上文描述的系统、设备、装置、模块、单元等可以通过计算机程序模块来实现。In such an embodiment, the computer program may be downloaded and installed from a network via communication portion 1009 and/or installed from removable media 1011 . When the computer program is executed by the processor 1001, the above-mentioned functions defined in the system of the embodiment of the present disclosure are performed. According to the embodiments of the present disclosure, the above-described systems, devices, devices, modules, units, etc. may be implemented by computer program modules.

根据本公开的实施例,可以以一种或多种程序设计语言的任意组合来编写用于执行本公开实施例提供的计算机程序的程序代码,具体地,可以利用高级过程和/或面向对象的编程语言、和/或汇编/机器语言来实施这些计算程序。程序设计语言包括但不限于诸如Java,C++,python,“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。According to the embodiments of the present disclosure, the program codes for executing the computer programs provided by the embodiments of the present disclosure can be written in any combination of one or more programming languages, specifically, high-level procedural and/or object-oriented programming language, and/or assembly/machine language to implement these computing programs. Programming languages include, but are not limited to, programming languages such as Java, C++, python, "C" or similar programming languages. The program code can execute entirely on the user computing device, partly on the user device, partly on the remote computing device, or entirely on the remote computing device or server. In cases involving a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (for example, using an Internet service provider). business to connect via the Internet).

附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in a flowchart or block diagram may represent a module, program segment, or portion of code that includes one or more logical functions for implementing specified executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block in the block diagrams or flowchart illustrations, and combinations of blocks in the block diagrams or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or operation, or can be implemented by a A combination of dedicated hardware and computer instructions.

本领域技术人员可以理解,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合或/或结合,即使这样的组合或结合没有明确记载于本公开中。特别地,在不脱离本公开精神和教导的情况下,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合和/或结合。所有这些组合和/或结合均落入本公开的范围。Those skilled in the art can understand that various combinations and/or combinations of the features described in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not explicitly recorded in the present disclosure. In particular, without departing from the spirit and teaching of the present disclosure, the various embodiments of the present disclosure and/or the features described in the claims can be combined and/or combined in various ways. All such combinations and/or combinations fall within the scope of the present disclosure.

以上对本公开的实施例进行了描述。但是,这些实施例仅仅是为了说明的目的,而并非为了限制本公开的范围。尽管在以上分别描述了各实施例,但是这并不意味着各个实施例中的措施不能有利地结合使用。本公开的范围由所附权利要求及其等同物限定。不脱离本公开的范围,本领域技术人员可以做出多种替代和修改,这些替代和修改都应落在本公开的范围之内。The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the various embodiments have been described separately above, this does not mean that the measures in the various embodiments cannot be advantageously used in combination. The scope of the present disclosure is defined by the appended claims and their equivalents. Various substitutions and modifications can be made by those skilled in the art without departing from the scope of the present disclosure, and these substitutions and modifications should all fall within the scope of the present disclosure.

Claims (14)

1.一种网络安全防御方法,包括:1. A network security defense method, comprising: 基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型;以及Based on the monitoring of the network system, identifying suspicious security events and their threat types in the network system; and 采用事先编排好的验证流程,对所述可疑安全事件的执行主体进行验证,包括:Use a pre-arranged verification process to verify the execution subject of the suspicious security event, including: 从针对所述威胁类型预先设置的问题集中获取至少一个备选问题;obtaining at least one candidate question from a set of questions preset for the threat type; 基于所述可疑安全事件中的实体的信息,对所述至少一个备选问题进行加工处理,得到选题集;其中,所述可疑安全事件中的实体包括所述可疑安全事件中的执行主体;Based on the information of the entity in the suspicious security event, process the at least one candidate question to obtain a selected topic set; wherein, the entity in the suspicious security event includes an execution subject in the suspicious security event; 将所述选题集发送给所述执行主体,并获得所述执行主体对所述选题集中的问题进行答复而返回的答题信息;Send the selected topic set to the executive body, and obtain the answer information returned by the executive body in response to the questions in the selected topic set; 对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果;Comparing the answer information with the corresponding information in the historical record data of the network system to obtain a comparison result; 当所述对比结果满足预定条件时,确定所述执行主体不存在威肋、;以及When the comparison result satisfies a predetermined condition, it is determined that there is no threat to the execution subject; and 当所述对比结果不满足预定条件时,确定所述执行主体存在威肋、。When the comparison result does not meet the predetermined condition, it is determined that there is a threat to the execution subject. 2.根据权利要求1所述的方法,其中,所述得到选题集还包括:2. The method according to claim 1, wherein said obtaining the selected topic set further comprises: 基于所述网络系统中的历史记录数据,获取与所述执行主体具有相似行为特征的其他对象;Based on historical record data in the network system, obtain other objects with similar behavioral characteristics to the execution subject; 基于所述其他对象的信息,对所述至少一个备选问题中的至少部分问题进行加工处理,生成干扰项;以及Based on the information of the other objects, process at least part of the at least one candidate question to generate a distraction item; and 将所述干扰项扩充到所述选题集中。The distracting item is expanded into the topic set. 3.根据权利要求2所述的方法,其中,所述基于所述网络系统中的历史记录数据,获取与所述执行主体具有相似行为特征的其他对象包括:3. The method according to claim 2, wherein said acquiring other objects having similar behavioral characteristics with said execution subject based on historical record data in said network system comprises: 从所述网络系统的历史记录数据中提取出实体数据,得到多个实体,其中,所述多个实体包括所述执行主体;Extracting entity data from the historical record data of the network system to obtain multiple entities, wherein the multiple entities include the execution subject; 从所述网络系统的历史记录数据中,提取所述多个实体中每个实体的行为数据并形成时间序列,得到每个实体的行为特征;From the historical record data of the network system, extract the behavior data of each entity in the plurality of entities and form a time series to obtain the behavior characteristics of each entity; 基于所述多个实体中所述执行主体与其他实体的行为特征的相似性判断,确定与所述执行主体具有相似行为特征的所述其他对象。Based on the judgment of the similarity of behavior characteristics between the execution subject and other entities among the plurality of entities, determine the other objects having similar behavior characteristics to the execution subject. 4.根据权利要求1所述的方法,其中,所述问题集中的问题,按照问题之间的相似性被划分为多个第二类别,其中,同一个第二类别中的问题相似;4. The method according to claim 1, wherein the questions in the set of questions are divided into a plurality of second categories according to the similarity between the questions, wherein the questions in the same second category are similar; 所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:The obtaining at least one candidate question from the preset question set for the threat type includes: 从所述多个第二类别中的每个第二类别中至少选择一个问题,以得到所述至少一个备选问题。At least one question is selected from each of the plurality of second categories to obtain the at least one candidate question. 5.根据权利要求1~4任意一项所述的方法,其中,所述问题集中的问题,按照问题所具有的特性的种类被划分为多个第一类别,每一个第一类别中的问题具有同种特性;所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:5. The method according to any one of claims 1 to 4, wherein the problems in the problem set are divided into a plurality of first categories according to the types of characteristics of the problems, and the problems in each first category Having the same feature; the acquisition of at least one candidate question from the set of questions preset for the threat type includes: 从所述多个第一类别的每个第一类别中至少选择一个问题,以得到所述至少一个备选问题;selecting at least one question from each of the plurality of first categories to obtain the at least one candidate question; 其中,所述特性的种类包括必须回答正确和容许出现错误至少两种。Wherein, the types of the characteristics include at least two types that must be answered correctly and errors that are allowed to occur. 6.根据权利要求5所述的方法,其中,所述预定条件包括所述选题集中所述特性为必须回答正确的问题均回答正确。6. The method according to claim 5, wherein the predetermined condition includes that all questions in the set of selected questions that must be answered correctly are answered correctly. 7.根据权利要求6所述的方法,其中,所述对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果包括:7. The method according to claim 6, wherein said comparing said answer information with corresponding information in the historical record data of said network system, and obtaining a comparison result comprises: 基于所述答题信息与所述网络系统的历史记录数据中的对应信息的对比,得到所述选题集中每个问题答复正确与否的答复结果信息;以及Based on the comparison of the answer information with the corresponding information in the historical record data of the network system, obtain the answer result information of whether the answer to each question in the selected topic set is correct or not; and 遍历所述选题集中所述特性为必须回答正确的问题的所述答复结果信息,确定所述选题集中所述特性为必须回答正确的问题是否均回答正确。Traverse the answer result information of the questions in the selected topic set that must be answered correctly, and determine whether all the questions in the selected topic set that must be answered correctly are answered correctly. 8.根据权利要求6所述的方法,其中,所述预定条件还包括:在所述选题集中所述特性为必须回答正确的问题均回答正确的情况下,所述答题信息的评分大于或等于预设阈值;8. The method according to claim 6, wherein the predetermined condition further comprises: in the case that the characteristics in the selected topic set are that the questions that must be answered correctly are all answered correctly, the score of the answer information is greater than or equal to the preset threshold; 其中,所述对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果还包括:Wherein, the comparison of the answer information and the corresponding information in the historical record data of the network system to obtain the comparison result also includes: 在所述选题集中所述特性为必须回答正确的问题均回答正确的情况下,基于所述选题集中每个问题的所述答复结果信息和每个问题对应的难度等级,得到所述选题集中每个问题的得分;其中,所述问题集中的问题按照难易程度预先划分为多个难度等级,每个难度等级中的问题的计分规则相同;In the case where the characteristic in the selected topic set is that all questions that must be answered correctly are answered correctly, based on the answer result information of each question in the selected topic set and the difficulty level corresponding to each question, the selected topic set is obtained. The score of each problem in the problem set; wherein, the problems in the problem set are pre-divided into multiple difficulty levels according to the degree of difficulty, and the scoring rules for the problems in each difficulty level are the same; 根据所述选题集中每个问题的重要程度等级,获取每个问题对应的权重,其中,所述问题集中的问题按照重要程度预先划分为多个重要程度等级,每个重要程度等级中的问题的权重相同;以及According to the importance level of each question in the selected topic set, the weight corresponding to each question is obtained, wherein the questions in the question set are pre-divided into a plurality of importance levels according to the importance, and the questions in each importance level have the same weight; and 基于所述选题集中所有问题的得分和每个问题对应的权重,得到所述答题信息的评分。Based on the scores of all the questions in the selected question set and the weights corresponding to each question, the score of the answer information is obtained. 9.根据权利要求1所述的方法,其中,所述预定条件为根据所述执行主体对应的累计验证结果数据更新后的预定条件;其中,所述方法还包括:9. The method according to claim 1, wherein the predetermined condition is a predetermined condition updated according to the cumulative verification result data corresponding to the execution subject; wherein the method further comprises: 设置初始的所述预定条件;以及setting an initial said predetermined condition; and 基于所述执行主体对应的累计验证结果数据,更新所述预定条件,包括:Updating the predetermined condition based on the cumulative verification result data corresponding to the execution subject, including: 存储每次采用所述验证流程对所述执行主体进行验证所得的验证结果数据;storing the verification result data obtained by using the verification process to verify the execution subject each time; 基于已存储的所述验证结果数据的累计,得到所述执行主体对应的累计验证结果数据;Based on the accumulation of the stored verification result data, the cumulative verification result data corresponding to the execution subject is obtained; 基于所述执行主体对应的累计验证结果数据,定期或不定期地更新所述预定条件。The predetermined condition is updated periodically or irregularly based on the accumulated verification result data corresponding to the execution subject. 10.根据权利要求1所述的方法,其中,10. The method of claim 1, wherein, 所述基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型,包括:利用机器学习算法模型识别出所述可疑安全事件、所述威胁类型以及威胁程度;The identifying suspicious security events and their threat types in the network system based on the monitoring of the network system includes: using a machine learning algorithm model to identify the suspicious security events, the threat types and threat levels; 所述从针对所述威胁类型预先设置的问题集中获取至少一个备选问题包括:根据所述威胁程度确定所述至少一个备选问题的问题数量和/或问题难度分布;其中,所述威胁程度与所述问题数量和所述问题难度正相关,其中,所述问题集中的问题按照难易程度预先划分为多个难度等级,所述问题难度分布以所述至少一个备选问题在所述多个难度等级中的分布数据来表征。The acquiring at least one candidate question from the set of questions preset for the threat type includes: determining the number of questions and/or problem difficulty distribution of the at least one candidate question according to the threat level; wherein, the threat level It is positively correlated with the number of questions and the difficulty of the questions, wherein the questions in the question set are pre-divided into a plurality of difficulty levels according to the degree of difficulty, and the difficulty distribution of the questions is based on the at least one candidate question among the multiple The distribution data in each difficulty level is represented. 11.一种网络安全防御装置,包括:11. A network security defense device, comprising: 初步识别模块,用于基于对网络系统的监控,识别所述网络系统中存在的可疑安全事件及其威胁类型;以及A preliminary identification module, configured to identify suspicious security events and their threat types existing in the network system based on the monitoring of the network system; and 主动验证模块,用于采用事先编排好的验证流程,对所述可疑安全事件的执行主体进行验证,包括:The active verification module is used to verify the execution subject of the suspicious security event by adopting a pre-arranged verification process, including: 获取子模块,用于从针对所述威胁类型预先设置的问题集中获取至少一个备选问题;An acquisition submodule, configured to acquire at least one candidate question from a question set preset for the threat type; 选题生成子模块,用于基于所述可疑安全事件中的实体的信息,对所述至少一个备选问题进行加工处理,得到选题集;其中,所述可疑安全事件中的实体包括所述可疑安全事件中的执行主体;The selected topic generation submodule is configured to process the at least one candidate question based on the information of the entity in the suspicious security event to obtain a selected topic set; wherein, the entity in the suspicious security event includes the Execution subjects in suspicious security incidents; 答题子模块,用于将所述选题集发送给所述执行主体,并获得所述执行主体对所述选题集中的问题进行答复而返回的答题信息;An answering sub-module, configured to send the selected topic set to the execution subject, and obtain the answer information returned by the execution subject in response to the questions in the selected topic set; 答题评估子模块,用于:Response assessment sub-module for: 对比所述答题信息与所述网络系统的历史记录数据中的对应信息,得到对比结果;Comparing the answer information with the corresponding information in the historical record data of the network system to obtain a comparison result; 当所述对比结果满足预定条件时,确定所述执行主体不存在威肋;以及When the comparison result satisfies a predetermined condition, it is determined that there is no threat to the execution subject; and 当所述对比结果不满足预定条件时,确定所述执行主体存在威肋。When the comparison result does not meet the predetermined condition, it is determined that the execution subject is threatened. 12.一种电子设备,包括:12. An electronic device comprising: 一个或多个处理器;one or more processors; 存储装置,用于存储一个或多个程序,storage means for storing one or more programs, 其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行根据权利要求1~10中任一项所述的方法。Wherein, when the one or more programs are executed by the one or more processors, the one or more processors are made to execute the method according to any one of claims 1-10. 13.一种计算机可读存储介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行根据权利要求1~10中任一项所述的方法。13. A computer-readable storage medium, on which executable instructions are stored, and the instructions, when executed by a processor, cause the processor to perform the method according to any one of claims 1-10. 14.一种计算机程序产品,包括计算机程序,所述计算机程序被处理器执行时实现根据权利要求1~10中任一项所述的方法。14. A computer program product comprising a computer program, the computer program implementing the method according to any one of claims 1-10 when executed by a processor.
CN202310118391.6A 2023-01-30 2023-01-30 Network security defense method, device, equipment and storage medium Active CN116346409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310118391.6A CN116346409B (en) 2023-01-30 2023-01-30 Network security defense method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310118391.6A CN116346409B (en) 2023-01-30 2023-01-30 Network security defense method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116346409A true CN116346409A (en) 2023-06-27
CN116346409B CN116346409B (en) 2025-12-19

Family

ID=86892088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310118391.6A Active CN116346409B (en) 2023-01-30 2023-01-30 Network security defense method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116346409B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118041709A (en) * 2024-04-15 2024-05-14 南京汇荣信息技术有限公司 Multi-source data-based security threat studying and judging method, system and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673880B1 (en) * 2016-09-26 2020-06-02 Splunk Inc. Anomaly detection to identify security threats
CN112182401A (en) * 2017-11-24 2021-01-05 创新先进技术有限公司 Problem push method and device
CN115087977A (en) * 2020-02-12 2022-09-20 瓦瑞缇·普拉斯有限责任公司 Method and system for preventing malicious automation attacks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673880B1 (en) * 2016-09-26 2020-06-02 Splunk Inc. Anomaly detection to identify security threats
CN112182401A (en) * 2017-11-24 2021-01-05 创新先进技术有限公司 Problem push method and device
CN115087977A (en) * 2020-02-12 2022-09-20 瓦瑞缇·普拉斯有限责任公司 Method and system for preventing malicious automation attacks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118041709A (en) * 2024-04-15 2024-05-14 南京汇荣信息技术有限公司 Multi-source data-based security threat studying and judging method, system and device
CN118041709B (en) * 2024-04-15 2024-06-07 南京汇荣信息技术有限公司 Multi-source data-based security threat studying and judging method, system and device

Also Published As

Publication number Publication date
CN116346409B (en) 2025-12-19

Similar Documents

Publication Publication Date Title
US20240134946A1 (en) Online identity reputation
US11157629B2 (en) Identity risk and cyber access risk engine
US11522873B2 (en) Detecting network attacks
US10771493B2 (en) Cognitive security exposure analysis and resolution based on security trends
US11956272B2 (en) Identifying legitimate websites to remove false positives from domain discovery analysis
US10715570B1 (en) Generic event stream processing for machine learning
CN110462606B (en) Intelligent security management
US11477231B2 (en) System and method for vulnerability remediation prioritization
EP3971798A1 (en) Data processing method and apparatus, and computer readable storage medium
US12536235B2 (en) Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index
US20170244741A1 (en) Malware Identification Using Qualitative Data
CN111586695B (en) Short message identification method and related equipment
US20210397669A1 (en) Clustering web page addresses for website analysis
US20230089920A1 (en) Methods and systems for identifying unauthorized logins
US8892896B2 (en) Capability and behavior signatures
US10291483B2 (en) Entity embedding-based anomaly detection for heterogeneous categorical events
US12418546B2 (en) System and method for predicting investigation queries based on prior investigations
US20230316124A1 (en) Identifying bot activity using topology-aware techniques
CN116346409B (en) Network security defense method, device, equipment and storage medium
CN110955890B (en) Method and device for detecting malicious batch access behaviors and computer storage medium
Canelón et al. Unstructured data for cybersecurity and internal control
US20220237482A1 (en) Feature randomization for securing machine learning models
CN113783920A (en) Method and apparatus for identifying web access portal
US11563762B2 (en) User flow graph analytics for cyber security
CN116502202B (en) Method and device for judging consistency of user permission model based on NLP technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant