[go: up one dir, main page]

CN116389122A - An attack detection method, device, medium and machine based on abnormal state - Google Patents

An attack detection method, device, medium and machine based on abnormal state Download PDF

Info

Publication number
CN116389122A
CN116389122A CN202310371707.2A CN202310371707A CN116389122A CN 116389122 A CN116389122 A CN 116389122A CN 202310371707 A CN202310371707 A CN 202310371707A CN 116389122 A CN116389122 A CN 116389122A
Authority
CN
China
Prior art keywords
attack
information
state
abnormal state
short sentence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310371707.2A
Other languages
Chinese (zh)
Other versions
CN116389122B (en
Inventor
卜磊
王立敏
马乐之
李宣东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Original Assignee
Nanjing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University filed Critical Nanjing University
Priority to CN202310371707.2A priority Critical patent/CN116389122B/en
Publication of CN116389122A publication Critical patent/CN116389122A/en
Application granted granted Critical
Publication of CN116389122B publication Critical patent/CN116389122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an attack detection method, device, medium and machine based on abnormal state. The attack detection method of the invention is as follows: firstly, capturing an attack defect description text from the internet, then analyzing the attack defect description text to obtain an attack state migration information set, monitoring the behavior of a machine executing an operating system and an application program, judging whether the machine has an abnormal state according to whether a behavior result is consistent with the attack state information in the state migration information set, and giving out an early warning of the abnormal state when the abnormal state occurs. The invention judges whether the attack exists or not by monitoring the migration among the attack states, has high judgment accuracy, and basically does not generate the false alarm problem. In addition, the invention can track and download the current attack behaviors, attack means and defects of utilized software vulnerabilities in real time, so that the machine attack model pattern book is kept up to date, and the machine can timely cope with the new attack means.

Description

一种基于异常状态的攻击检测方法、装置、介质及机器An attack detection method, device, medium and machine based on abnormal state

技术领域technical field

本发明涉及计算机安全技术。The present invention relates to computer security technology.

背景技术Background technique

随着互联网的普及,大量设备接入网络并使用云端资源,使得在线服务愈趋便捷,但是这也给用户隐私和企业运作带来了更多的网络攻击威胁。在当前网络环境下,传统的杀毒软件等被动防御技术已经无法满足网络安全需求,尤其是在近年来,攻击者针对特定目标发起APT(高级持续性威胁,Advanced Persistent Threat)攻击的情况越来越多。由于攻击者的高度参与,APT攻击具有攻击流程持续时间长、隐蔽性高、形成变种快的特点,因此应对APT攻击具有很高的挑战性。因而主动防御措施应运而生,以应对各种网络攻击。主动防御包括加强网络安全管理、提高网络安全防范能力、建立完善的安全监测和预警机制等。相比之下,被动防御则更多地是在网络威胁出现后采取应对措施。因此,主动防御已经成为应对网络威胁的必备手段,可以更有效地降低企业和个人的网络安全风险。With the popularization of the Internet, a large number of devices are connected to the network and use cloud resources, making online services more convenient, but this also brings more threats of cyber attacks to user privacy and business operations. In the current network environment, passive defense technologies such as traditional antivirus software can no longer meet the needs of network security, especially in recent years, attackers have increasingly launched APT (Advanced Persistent Threat, Advanced Persistent Threat) attacks against specific targets. many. Due to the high degree of participation of the attackers, APT attacks have the characteristics of long duration of attack process, high concealment, and quick mutation. Therefore, it is very challenging to deal with APT attacks. Therefore, active defense measures have emerged to deal with various network attacks. Active defense includes strengthening network security management, improving network security prevention capabilities, and establishing a sound security monitoring and early warning mechanism. In contrast, passive defense is more about responding to cyber threats as they arise. Therefore, active defense has become an essential means to deal with network threats, which can more effectively reduce the network security risks of enterprises and individuals.

攻击检测是主动防御中必不可少的一环。目前,攻击检测技术主要分为两类:基于规则的攻击检测和基于异常定位的攻击检测。基于规则的攻击检测通过预先定义好的规则来识别和拦截已知的攻击。这种方法的优点在于能够快速准确地检测已知攻击,但是对于未知攻击缺乏有效的防御。基于异常定位的攻击检测则是通过建立正常的网络行为模型,发现网络行为中的异常行为从而识别未知的攻击。这种方法的优点在于能够有效地识别未知攻击,但也容易产生误报。现有的工作缺乏对两种方案优点的有机结合,无法完成协同工作,最大程度实现攻击检测的准确性和效率。Attack detection is an essential part of active defense. At present, attack detection technologies are mainly divided into two categories: rule-based attack detection and anomaly location-based attack detection. Rule-based attack detection uses predefined rules to identify and block known attacks. The advantage of this method is that it can quickly and accurately detect known attacks, but it lacks effective defense against unknown attacks. Attack detection based on anomaly location is to identify unknown attacks by establishing a normal network behavior model and discovering abnormal behaviors in network behavior. The advantage of this approach is that it can effectively identify unknown attacks, but it is also prone to false positives. The existing work lacks the organic combination of the advantages of the two schemes, and cannot complete the collaborative work to maximize the accuracy and efficiency of attack detection.

发明内容Contents of the invention

本发明所要解决的问题:提高攻击检测的准确性。The problem to be solved by the invention is to improve the accuracy of attack detection.

为解决上述问题,本发明采用的方案如下:In order to solve the above problems, the scheme adopted by the present invention is as follows:

根据本发明的一种基于异常状态的攻击检测方法,包括如下步骤:A kind of attack detection method based on abnormal state according to the present invention, comprises the following steps:

步骤S1:获取攻击缺陷描述文本;Step S1: Obtain the attack defect description text;

步骤S2:对所述攻击缺陷描述文本进行解析后得到攻击状态迁移信息的集合;Step S2: After parsing the attack defect description text, a set of attack state transition information is obtained;

攻击状态迁移信息包括第一攻击状态信息集合和第二攻击状态信息集合;所述第一攻击状态信息集合和第二攻击状态信息集合均为所述攻击状态信息的集合;The attack state transition information includes a first set of attack state information and a second set of attack state information; both the first set of attack state information and the second set of attack state information are sets of the attack state information;

攻击状态信息由关联动作和动作对象组成;Attack status information consists of associated actions and action objects;

步骤S3:通过攻击状态信息之间的相同匹配的合并,将各个攻击状态迁移信息的集合中的攻击状态信息逐个并入全局攻击状态迁移信息集合中;Step S3: Merge the attack state information in each attack state transition information set into the global attack state transition information set one by one by merging the same matching between the attack state information;

步骤S4:监测机器执行操作系统和应用程序的行为,并根据行为结果是否与所述全局攻击状态迁移信息集合中的攻击状态信息一致判断机器是否出现异常状态,当出现异常状态时发出异常状态的预警;Step S4: Monitor the behavior of the machine executing the operating system and application programs, and judge whether the machine is in an abnormal state according to whether the behavior result is consistent with the attack state information in the global attack state transition information set, and send an abnormal state notification when an abnormal state occurs early warning;

所述步骤S2包括如下步骤:Described step S2 comprises the following steps:

步骤S21:根据预先设定的正则表达式和领域专用实体名词表,对所述攻击缺陷描述文本进行实体名词的标注;Step S21: According to the preset regular expression and the domain-specific entity noun table, mark the entity nouns on the attack defect description text;

步骤S22:对所述攻击缺陷描述文本进行短句分句,然后根据所标注的实体名字对短句进行主谓宾分解得到主语、谓词和宾语,得到短句节点信息,并根据依赖关系词表以及短句的前后关系,提取出短句之间的依赖关系,从而得到短句所对应的短句节点信息之间的节点迁移关系;Step S22: divide the attack defect description text into short sentences, then decompose the short sentence according to the marked entity name to obtain the subject, predicate and object, and obtain the short sentence node information, and according to the dependency relationship vocabulary As well as the context of short sentences, the dependency relationship between short sentences is extracted, so as to obtain the node migration relationship between the short sentence node information corresponding to short sentences;

步骤S23:通过短句节点信息之间的相似和包容匹配,将语义相同或具有包容关系的短句节点信息合并,并调节合并后的节点迁移关系;Step S23: through similarity and inclusive matching between short sentence node information, merge short sentence node information with the same semantics or inclusive relationship, and adjust the merged node migration relationship;

步骤S24:根据短句节点信息的主语、谓词和宾语进行攻击状态信息映射,并根据攻击状态信息所对应的短句节点信息的节点迁移关系构建相应的攻击状态迁移信息;短句节点信息映射成攻击状态信息时,若短句节点信息无法映射成攻击状态信息,则删除对应的短句节点信息,并根据节点迁移关系,修改节点迁移关系,并依据修改后的节点迁移关系构建攻击状态迁移信息。Step S24: Map the attack state information according to the subject, predicate and object of the short sentence node information, and construct the corresponding attack state transition information according to the node migration relationship of the short sentence node information corresponding to the attack state information; the short sentence node information is mapped into When attacking state information, if the short sentence node information cannot be mapped into attack state information, delete the corresponding short sentence node information, modify the node migration relationship according to the node migration relationship, and construct the attack state migration information based on the modified node migration relationship .

进一步,根据本发明的基于异常状态的攻击检测方法,所述步骤S4中所述发出异常状态预警包括通过日志记录异常状态、将异常状态通过网络上报以及将异常状态发送至防御处理模块。Further, according to the attack detection method based on the abnormal state of the present invention, the issuing of the abnormal state early warning in the step S4 includes recording the abnormal state through a log, reporting the abnormal state through the network, and sending the abnormal state to the defense processing module.

进一步,根据本发明的基于异常状态的攻击检测方法,所述步骤S1中,跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,当跟踪到新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告时,抓取攻击行为报告、攻击手段报告或软件漏洞缺陷报告的文本内容作为攻击缺陷描述文本。Further, according to the attack detection method based on abnormal state of the present invention, in the step S1, track the attack behavior report, attack means report and software vulnerability defect report of the specified website, when a new attack behavior report, attack means report or When reporting a software vulnerability defect, capture the text content of the attack behavior report, attack method report, or software vulnerability defect report as the attack defect description text.

根据本发明的一种基于异常状态的攻击检测装置,包括如下模块:A kind of attack detection device based on abnormal state according to the present invention, comprises following module:

模块M1,用于:获取攻击缺陷描述文本;The module M1 is used to: obtain the attack defect description text;

模块M2,用于:对所述攻击缺陷描述文本进行解析后得到攻击状态迁移信息的集合;Module M2, configured to: obtain a set of attack state transition information after parsing the attack defect description text;

攻击状态迁移信息包括第一攻击状态信息集合和第二攻击状态信息集合;所述第一攻击状态信息集合和第二攻击状态信息集合均为所述攻击状态信息的集合;The attack state transition information includes a first set of attack state information and a second set of attack state information; both the first set of attack state information and the second set of attack state information are sets of the attack state information;

攻击状态信息由关联动作和动作对象组成;Attack status information consists of associated actions and action objects;

模块M3,用于:通过攻击状态信息之间的相同匹配的合并,将各个攻击状态迁移信息的集合中的攻击状态信息逐个并入全局攻击状态迁移信息集合中;The module M3 is configured to: merge the attack state information in each attack state transition information set into the global attack state transition information set one by one by merging the same matching between the attack state information;

模块M4,用于:监测机器执行操作系统和应用程序的行为,并根据行为结果是否与所述全局攻击状态迁移信息集合中的攻击状态信息一致判断机器是否出现异常状态,当出现异常状态时发出异常状态的预警;Module M4, used to: monitor the behavior of the machine executing the operating system and application program, and judge whether the machine is in an abnormal state according to whether the behavior result is consistent with the attack state information in the global attack state transition information set, and send a message when an abnormal state occurs Early warning of abnormal state;

所述模块M2包括如下模块:The module M2 includes the following modules:

模块M21,用于:根据预先设定的正则表达式和领域专用实体名词表,对所述攻击缺陷描述文本进行实体名词的标注;The module M21 is configured to: mark entity nouns on the attack defect description text according to a preset regular expression and a domain-specific entity noun table;

模块M22,用于:对所述攻击缺陷描述文本进行短句分句,然后根据所标注的实体名字对短句进行主谓宾分解得到主语、谓词和宾语,得到短句节点信息,并根据依赖关系词表以及短句的前后关系,提取出短句之间的依赖关系,从而得到短句所对应的短句节点信息之间的节点迁移关系;Module M22 is used to: divide the attack defect description text into short sentences, and then decompose the short sentence according to the marked entity name to obtain the subject, predicate and object, and obtain the node information of the short sentence, and according to the dependent The relational vocabulary and the context of short sentences extract the dependency relationship between short sentences, so as to obtain the node migration relationship between the short sentence node information corresponding to short sentences;

模块M23,用于:通过短句节点信息之间的相似和包容匹配,将语义相同或具有包容关系的短句节点信息合并,并调节合并后的节点迁移关系;The module M23 is used to: combine short sentence node information with the same semantics or containment relationship through similarity and inclusive matching between short sentence node information, and adjust the merged node migration relationship;

模块M24,用于:根据短句节点信息的主语、谓词和宾语进行攻击状态信息映射,并根据攻击状态信息所对应的短句节点信息的节点迁移关系构建相应的攻击状态迁移信息;短句节点信息映射成攻击状态信息时,若短句节点信息无法映射成攻击状态信息,则删除对应的短句节点信息,并根据节点迁移关系,修改节点迁移关系,并依据修改后的节点迁移关系构建攻击状态迁移信息。Module M24, used to: perform attack state information mapping according to the subject, predicate and object of the short sentence node information, and construct corresponding attack state transition information according to the node migration relationship of the short sentence node information corresponding to the attack state information; the short sentence node When the information is mapped into attack state information, if the short sentence node information cannot be mapped into attack state information, delete the corresponding short sentence node information, modify the node migration relationship according to the node migration relationship, and build an attack based on the modified node migration relationship State transition information.

进一步,根据本发明的基于异常状态的攻击检测装置,所述模块M4中所述发出异常状态预警包括通过日志记录异常状态、将异常状态通过网络上报以及将异常状态发送至防御处理模块。Further, according to the attack detection device based on the abnormal state of the present invention, the issuing of the abnormal state early warning in the module M4 includes recording the abnormal state through a log, reporting the abnormal state through the network, and sending the abnormal state to the defense processing module.

进一步,根据本发明的基于异常状态的攻击检测装置,模块M1,用于:跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,当跟踪到新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告时,抓取攻击行为报告、攻击手段报告或软件漏洞缺陷报告的文本内容作为攻击缺陷描述文本。Further, according to the abnormal state-based attack detection device of the present invention, the module M1 is used to: track the attack behavior report, attack means report and software vulnerability defect report of the designated website, when a new attack behavior report, attack means report or When reporting a software vulnerability defect, capture the text content of the attack behavior report, attack method report, or software vulnerability defect report as the attack defect description text.

根据本发明的一种介质;该介质存储有可以被机器所读取的程序指令集;其特征在于,当该介质内所存储的程序指令集被机器读取并执行时可以实现上所述的基于异常状态的攻击检测方法。A medium according to the present invention; the medium stores a program instruction set that can be read by a machine; it is characterized in that when the program instruction set stored in the medium is read and executed by a machine, the above-mentioned An attack detection method based on abnormal state.

根据本发明的一种机器;该机器包括处理器和存储器;所述存储器内存储有程序指令集;其特征在于,当所述存储器内所存储的程序指令集被所述处理器加载并执行时可以实现上述的基于异常状态的攻击检测方法。A machine according to the present invention; the machine includes a processor and a memory; a program instruction set is stored in the memory; it is characterized in that when the program instruction set stored in the memory is loaded and executed by the processor The above-mentioned attack detection method based on abnormal state can be realized.

本发明的技术效果如下:Technical effect of the present invention is as follows:

传统方法下,监测攻击本身容易出现误报,而本发明通过监测攻击状态之间的迁移,其准确度要高很多,基本不会产生误报问题。In the traditional method, the monitoring attack itself is prone to false alarms, but the present invention monitors the migration between attack states, and its accuracy is much higher, and the problem of false alarms basically does not occur.

本发明可以实时跟踪和下载当前的攻击行为、攻击手段以及所利用的软件漏洞会缺陷,使得机器攻击模型图样本保持最新,从而能够及时应对新的攻击手段。The present invention can track and download current attacking behaviors, attacking means and exploited software loopholes and defects in real time, so that the machine attacking model diagram samples can be kept up-to-date, so that new attacking means can be dealt with in time.

附图说明Description of drawings

图1是本发明实施例攻击检测方法的流程图。FIG. 1 is a flowchart of an attack detection method according to an embodiment of the present invention.

图2是本发明机器实施例的结构示意图。Fig. 2 is a structural schematic diagram of a machine embodiment of the present invention.

实施方式Implementation

下面结合附图对本发明做进一步详细说明。The present invention will be described in further detail below in conjunction with the accompanying drawings.

图2示例了一种机器100。该机器100具体来说是一种电子设备,包括处理器101、存储器102和通信单元103。处理器101连接存储器101和通信单元103。其中处理器101通常为通用计算机处理器,能够执行计算机程序指令,存储器101通常是一种可断电后存储不丢失的介质,包括但不限于磁盘、磁带、闪存等。该介质也就是本发明前述所指的介质。存储器101通常用来存储计算机程序指令集和数据。处理器101通过加载存储器102所存储的程序指令集实现其相应的自动化功能,尤其是通过通信单元103连接网络300,并和其他连接网络300的机器进行交互。具体到本实施例中,处理器101通过加载执行存储器102所存储的程序指令集实现本发明所指的基于异常状态的攻击检测方法。该方法主要用于检测来自网络300上其他机器的攻击,检测到攻击后再做出防御处理,从而保护机器100安全。本发明仅限于攻击的检测,检测到攻击后再做出防御处理不是本发明所讨论的范畴,无需赘述。FIG. 2 illustrates a machine 100 . The machine 100 is specifically an electronic device, including a processor 101 , a memory 102 and a communication unit 103 . The processor 101 connects the memory 101 and the communication unit 103 . The processor 101 is usually a general-purpose computer processor capable of executing computer program instructions, and the memory 101 is usually a medium that cannot be lost after power off, including but not limited to disks, tapes, flash memory, etc. The medium is also the medium mentioned above in the present invention. Memory 101 is typically used to store sets of computer program instructions and data. The processor 101 realizes its corresponding automation functions by loading the program instruction set stored in the memory 102 , especially connects to the network 300 through the communication unit 103 , and interacts with other machines connected to the network 300 . Specifically in this embodiment, the processor 101 implements the attack detection method based on abnormal state referred to in the present invention by loading and executing the program instruction set stored in the memory 102 . This method is mainly used to detect attacks from other machines on the network 300 , and then perform defensive processing after detecting the attacks, so as to protect the security of the machine 100 . The present invention is limited to the detection of the attack, and the defensive processing after the attack is detected is not the scope of the present invention, so there is no need to repeat it.

参照图1,本实施例的基于异常状态的攻击检测方法,包括攻击缺陷文本抓取步骤、文本攻击状态图解步骤、攻击状态图合并步骤以及机器行为状态监测步骤。Referring to FIG. 1 , the attack detection method based on abnormal state in this embodiment includes the step of attack defect text grabbing, the step of text attack state diagramming, the step of merging attack state diagrams, and the step of machine behavior state monitoring.

攻击缺陷文本抓取步骤,具体来说,抓取描述攻击缺陷的文本。对应前述的步骤S1,获取攻击缺陷描述文本。步骤S1中的攻击缺陷描述文本即为描述攻击缺陷的文本,分为攻击行为描述文本、攻击手段描述文本和软件漏洞缺陷描述文本。步骤S1中的获取表示攻击缺陷描述文本为本发明后续步骤的输入。The attack defect text capture step, specifically, captures the text describing the attack defect. Corresponding to the aforementioned step S1, the attack defect description text is acquired. The attack defect description text in step S1 is the text describing the attack defect, which is divided into attack behavior description text, attack means description text and software vulnerability defect description text. The acquisition in step S1 indicates that the attack defect description text is the input of the subsequent steps of the present invention.

攻击缺陷描述文本来自网络300上其他机器通过网页发布的信息。根据来源不同,攻击缺陷描述文本通常分为攻击行为描述文本、攻击手段描述文本和软件漏洞缺陷描述文本。The description text of the attack defect comes from the information published by other machines on the network 300 through web pages. According to different sources, attack defect description text is usually divided into attack behavior description text, attack method description text and software vulnerability defect description text.

攻击行为描述文本为各国家安全部门或者安全相关企业与实验室通过分析自身观测到的网络安全威胁而所披露的该攻击的相关过程和部分细节,比如下述一段关于Log4Shell攻击行为的示例描述来自于网络安全和基础设施安全局(CISA)。The description text of the attack behavior is the relevant process and some details of the attack disclosed by various national security departments or security-related enterprises and laboratories through the analysis of the network security threats observed by themselves. For example, the following paragraph about the Log4Shell attack behavior example description comes from by the Cybersecurity and Infrastructure Security Agency (CISA).

“The threat actors using IP 104.223.34.98 gained initial access toVictim 2’s production environment in late January 2022, or earlier. Theseactors likely obtained access by exploiting Log4Shell in an unpatched VMwareHorizon server. On or around January 30, likely shortly after the threatactors gained access, CISA observed the actors using PowerShell scripts tocallout to 109.248.150.13 via Hypertext Transfer Protocol (HTTP) to retrieveadditional PowerShell scripts. Around the same period, CISA observed theactors attempt to download and execute a malicious file from 109.248.150.13.The activity started from IP address 104.155.149.103, which appears to bepart of the actors’ C2 infrastructure.”“The threat actors using IP 104.223.34.98 gained initial access to Victim 2's production environment in late January 2022, or earlier. These actors likely obtained access by exploiting Log4Shell in an unpatched VMware Horizon server. On or around January 30, likely shortly after the threators gained access , CISA observed the actors using PowerShell scripts to callout to 109.248.150.13 via Hypertext Transfer Protocol (HTTP) to retrieve additional PowerShell scripts. Around the same period, CISA observed the actors attempt to download and execute a malicious file from 1 09.248.150.13. The activity started from IP address 104.155.149.103, which appears to be part of the actors' C2 infrastructure."

攻击手段描述文本是一些安全组织所披露的其对攻击行为所作的攻击手段的分析总结报告,来自于这些安全组织所维护的攻击策略和攻击手段库,比如MITRE的ATT&CK框架以及CAPEC(Common Attack Pattern Enumerations and Classifications)库。攻击手段描述文本披露了比如该攻击行为所采用的策略/技术,该攻击行为需要利用到的软件缺陷和软件漏洞,该攻击行为的攻击能力和目的,该攻击行为所需满足的前置条件描述,该攻击行为相关的案例与实施过程描述。比如,下述一段攻击手段示例描述为ATT&CK框架中对“T1059.001:Command and Scripting Interpreter: PowerShell”攻击手段的描述。The attack method description text is the analysis and summary report of the attack methods disclosed by some security organizations, which comes from the attack strategies and attack method libraries maintained by these security organizations, such as MITER's ATT&CK framework and CAPEC (Common Attack Pattern Enumerations and Classifications) library. The attack method description text discloses, for example, the strategy/technique adopted by the attack behavior, the software defects and software vulnerabilities that the attack behavior needs to exploit, the attack capability and purpose of the attack behavior, and the description of the preconditions that the attack behavior needs to meet , a description of the case and implementation process related to the attack. For example, the following attack method example is described as the description of "T1059.001: Command and Scripting Interpreter: PowerShell" attack method in the ATT&CK framework.

“Adversaries may abuse PowerShell commands and scripts for execution.PowerShell is a powerful interactive command-line interface and scriptingenvironment included in the Windows operating system. Adversaries can usePowerShell to perform a number of actions, including discovery of informationand execution of code. Examples include the Start-Process cmdlet which can beused to run an executable and the Invoke-Command cmdlet which runs a commandlocally or on a remote computer (though administrator permissions arerequired to use PowerShell to connect to remote systems).“Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer (though administrator permissions are required to use PowerShell to connect to remote systems).

PowerShell may also be used to download and run executables from theInternet, which can be executed from disk or in memory without touching disk.PowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk.

A number of PowerShell-based offensive testing tools are available,including Empire, PowerSploit, PoshC2, and PSAttack.A number of PowerShell-based aggressive testing tools are available, including Empire, PowerSploit, PoshC2, and PSAttack.

PowerShell commands/scripts can also be executed without directlyinvoking the powershell.exebinary through interfaces to PowerShell'sunderlying System.Management.Automation assembly DLL exposed through the .NETframework and Windows Common Language Interface (CLI).”PowerShell commands/scripts can also be executed without directly invoking the powershell.exe binary through interfaces to PowerShell's underlying System.Management.Automation assembly DLL exposed through the .NET framework and Windows Common Language Interface (CLI)."

软件漏洞缺陷描述文本,即为描述软件漏洞和缺陷的文本,来自于为权威的安全组织构建并维护的漏洞和缺陷库,比如MITRE的CVE(Common Vulnerabilities&Exposures)漏洞库以及CWE(Common Weakness Enumeration)缺陷库。CVE漏洞库收录了全球范围内被公开披露的漏洞信息,每个漏洞都有唯一的标识符,方便跟踪和管理漏洞。通过分析各漏洞根因后识别到的软件和系统中的常见缺陷类型将被收录至CWE缺陷库。软件漏洞缺陷描述文本包含了漏洞描述,漏洞影响,所属产品名称,所属生产商等信息。下述一段示例性的软件漏洞缺陷描述文本为关于CVE-2021-44228Log4J任意代码执行漏洞的相关描述:Software vulnerability defect description text, which is the text describing software vulnerabilities and defects, comes from vulnerability and defect libraries built and maintained by authoritative security organizations, such as MITER's CVE (Common Vulnerabilities & Exposures) vulnerability library and CWE (Common Weakness Enumeration) defects library. The CVE vulnerability database contains publicly disclosed vulnerability information around the world, and each vulnerability has a unique identifier, which is convenient for tracking and managing vulnerabilities. The common types of defects in software and systems identified after analyzing the root causes of each vulnerability will be included in the CWE defect library. The software vulnerability defect description text includes the vulnerability description, vulnerability impact, product name, manufacturer and other information. The following exemplary software vulnerability description text is a description of the CVE-2021-44228 Log4J arbitrary code execution vulnerability:

“Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages,and parameters do not protect against attacker controlled LDAP and other JNDIrelated endpoints. An attacker who can control log messages or log messageparameters can execute arbitrary code loaded from LDAP servers when messagelookup substitution is enabled. From log4j 2.15.0, this behavior has beendisabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and2.3.1), this functionality has been completely removed. Note that thisvulnerability is specific to log4j-core and does not affect log4net, log4cxx,or other Apache Logging Services projects.”"Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other J NDIrelated endpoints. An attacker who can control log messages or log messageparameters can execute arbitrary code loaded from LDAP servers when messagelookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2 .12.2, 2.12. 3, and2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.”

在简单实施方式下,攻击缺陷描述文本可以直接作为本发明的输入,此时,攻击缺陷描述文本通常通过人工手工方式在相关的网站上下载整理后作为该实施方式的输入。本领域技术人员理解,一方面攻击缺陷描述文本来自于公开的网站,另一方面机器100通过通信单元103连接网络,本领域技术人员很容易想到通过网络爬虫的方式在相关的网站上自动化下载。具体到本实施例中,前述抓取即为在网站下载抽取有效文本内容之意。具体来说,也就是跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,当跟踪到新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告时,抓取攻击行为报告、攻击手段报告或软件漏洞缺陷报告的文本内容作为攻击缺陷描述文本。这里跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告本实施例采用定时的方式,即每隔一段时间通过访问指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,检测是否存在新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告。另外,这里的抓取包括两个步骤:第一个步骤从网站下载网页内容;第二个步骤是从下载的网页内容中抽取有效文本内容。第一个步骤从网站下载网页内容为本领域技术人员所熟悉。第二个步骤需要依据不同网站的其对应的HTML文本格式。通常每个网站对于其所发布的攻击行为报告、攻击手段报告或软件漏洞缺陷报告具有固定化的HTML文本格式。因此,在实际实施中,只需要依据该固定化的HTML文本格式抽取有效文本内容,此对本领域技术人员而言并不困难,不再赘述。In a simple implementation mode, the attack defect description text can be directly used as the input of the present invention. At this time, the attack defect description text is usually manually downloaded and arranged on a related website as the input of this embodiment. Those skilled in the art understand that, on the one hand, the attack defect description text comes from a public website, and on the other hand, the machine 100 is connected to the network through the communication unit 103, and those skilled in the art can easily think of automatic downloading on related websites by means of a web crawler. Specifically in this embodiment, the aforementioned crawling refers to downloading and extracting valid text content from a website. Specifically, it is to track the attack behavior report, attack method report and software vulnerability defect report of the specified website. When a new attack behavior report, attack method report or software vulnerability defect report is tracked, the attack behavior report, attack method report, and attack method report are captured. The text content of the report or software vulnerability defect report is used as the attack defect description text. Here, the attack behavior report, attack method report and software vulnerability defect report of the designated website are tracked. There are new attack behavior reports, attack method reports, or software vulnerability defect reports. In addition, the crawling here includes two steps: the first step is to download webpage content from the website; the second step is to extract valid text content from the downloaded webpage content. The first step, downloading web content from a website, is familiar to those skilled in the art. The second step needs to be based on the corresponding HTML text format of different websites. Generally, each website has a fixed HTML text format for the attack behavior report, attack means report or software vulnerability defect report it publishes. Therefore, in actual implementation, it is only necessary to extract valid text content according to the fixed HTML text format, which is not difficult for those skilled in the art, and will not be repeated here.

文本攻击状态图解步骤,简单来说,即对前述的攻击缺陷描述文本进行文本解析,构造出攻击模型图。在该步骤中,对于攻击行为描述文本、攻击手段描述文本和软件漏洞缺陷描述文本的处理过程相同。具体到本实施例中,也就是前述步骤S2,对攻击缺陷描述文本进行解析后得到攻击状态迁移信息的集合。攻击状态迁移信息包括第一攻击状态信息集合和第二攻击状态信息集合。第一攻击状态信息集合和第二攻击状态信息集合均为攻击状态信息的集合。攻击状态信息用以表示机器受攻击的状态。需要指出的是,这里的攻击状态迁移信息的集合即为攻击模型图的数据表示。攻击模型图是一个由节点和有向边所组成的有向图。在攻击模型图中,节点对应攻击状态信息,有向边则由攻击状态迁移信息的第一攻击状态信息集合和第二攻击状态信息集合所表示。也就是说,攻击模型图的有向边的起始节点可以有多个,末端节点也可以有多个,其中起始节点对应的攻击状态信息定义在第一攻击状态信息集合中,末端节点对应的攻击状态信息定义在第二攻击状态信息集合中。在更为实际的实施过程中,第一攻击状态信息集合和第二攻击状态信息集合中的攻击状态信息均以攻击状态识别码表示,而完整的攻击状态信息保存在一个对应的攻击状态信息集合中。The step of text attack state diagram, in simple terms, is to analyze the text of the aforementioned attack defect description text to construct an attack model diagram. In this step, the processing process is the same for the description text of the attack behavior, the description text of the attack means and the description text of the software vulnerability defect. Specifically, in this embodiment, that is, the aforementioned step S2, the set of attack state transition information is obtained after parsing the attack defect description text. The attack state transition information includes a first set of attack state information and a second set of attack state information. Both the first attack state information set and the second attack state information set are sets of attack state information. The attack status information is used to indicate the status of the machine under attack. It should be pointed out that the collection of attack state transition information here is the data representation of the attack model diagram. The attack model graph is a directed graph composed of nodes and directed edges. In the attack model diagram, the nodes correspond to the attack state information, and the directed edges are represented by the first attack state information set and the second attack state information set of the attack state transition information. That is to say, there can be multiple start nodes and multiple end nodes of directed edges in the attack model graph, where the attack state information corresponding to the start nodes is defined in the first attack state information set, and the end nodes correspond to The attack status information of is defined in the second attack status information set. In a more practical implementation process, the attack state information in the first attack state information set and the second attack state information set are represented by attack state identification codes, and the complete attack state information is stored in a corresponding attack state information set middle.

本实施例中,文本攻击状态图解步骤具体包括如下步骤:In this embodiment, the text attack state graphic step specifically includes the following steps:

步骤S21:根据预先设定的正则表达式和领域专用实体名词表,对所述攻击缺陷描述文本进行实体名词的标注;Step S21: According to the preset regular expression and the domain-specific entity noun table, mark the entity nouns on the attack defect description text;

步骤S22:对所述攻击缺陷描述文本进行短句分句,然后根据所标注的实体名字对短句进行主谓宾分解得到主语、谓词和宾语,得到短句节点信息,并根据依赖关系词表以及短句的前后关系,提取出短句之间的依赖关系,从而得到短句所对应的短句节点信息之间的节点迁移关系;Step S22: divide the attack defect description text into short sentences, then decompose the short sentence according to the marked entity name to obtain the subject, predicate and object, and obtain the short sentence node information, and according to the dependency relationship vocabulary As well as the context of short sentences, the dependency relationship between short sentences is extracted, so as to obtain the node migration relationship between the short sentence node information corresponding to short sentences;

步骤S23:通过短句节点信息之间的相似和包容匹配,将语义相同或具有包容关系的短句节点信息合并,并调节合并后的节点迁移关系;Step S23: through similarity and inclusive matching between short sentence node information, merge short sentence node information with the same semantics or inclusive relationship, and adjust the merged node migration relationship;

步骤S24:根据短句节点信息的主语、谓词和宾语进行攻击状态信息映射,并根据攻击状态信息所对应的短句节点信息的节点迁移关系构建相应的攻击状态迁移信息;短句节点信息映射成攻击状态信息时,若短句节点信息无法映射成攻击状态信息,则删除对应的短句节点信息,并根据节点迁移关系,修改节点迁移关系,并依据修改后的节点迁移关系构建攻击状态迁移信息。Step S24: Map the attack state information according to the subject, predicate and object of the short sentence node information, and construct the corresponding attack state transition information according to the node migration relationship of the short sentence node information corresponding to the attack state information; the short sentence node information is mapped into When attacking state information, if the short sentence node information cannot be mapped into attack state information, delete the corresponding short sentence node information, modify the node migration relationship according to the node migration relationship, and construct the attack state migration information based on the modified node migration relationship .

步骤S21中,预先设定的正则表达式包括但不限于比如:URL链接正则表达式、HOST主机正则表达式,IP地址正则表达式,Email邮箱正则表达式,Windows注册表正则表达式,文件名称正则表达式,文件或文件夹路径正则表达式。领域专用实体名词表则是由领域专用词语库抽取名词后得到的关于领域专用实体名词的集合。为了方便检索,领域专用实体名词表通常经过排序。比如前述来自CISA的关于Log4Shell攻击行为的描述示例中,可以标注的实体名词有:"actor","104.223.34.98" , "access" , "victim" , "productenvironment" , "Log4Shell" , "VMware Horizon" ,"CISA" , "PowerShell script" ,"109.248.150.13" , "104.155.149.103" , "Hypertext Transfer Protocol" , "C2infrastructure"。In step S21, the preset regular expressions include but are not limited to, for example: URL link regular expressions, HOST host regular expressions, IP address regular expressions, Email mailbox regular expressions, Windows registry regular expressions, file names Regular expression, file or folder path regular expression. The domain-specific entity noun table is a collection of domain-specific entity nouns obtained by extracting nouns from the domain-specific vocabulary database. To facilitate retrieval, domain-specific entity noun lists are usually sorted. For example, in the aforementioned description example of Log4Shell attack behavior from CISA, entity nouns that can be marked include: "actor", "104.223.34.98", "access", "victim", "productenvironment", "Log4Shell", "VMware Horizon " ,"CISA" , "PowerShell script" ,"109.248.150.13" , "104.155.149.103" , "Hypertext Transfer Protocol" , "C2infrastructure".

步骤S22可以分解为以下三个步骤:短句分句、主谓宾分解、节点迁移关系构建。以前述来自CISA的关于Log4Shell攻击行为的描述为示例,该进行短句分句和主谓宾分解得到如下的短句节点信息:Step S22 can be decomposed into the following three steps: short sentence clauses, subject-predicate-object decomposition, and node migration relationship construction. Taking the aforementioned description of Log4Shell attack behavior from CISA as an example, the short sentence clause and subject-predicate-object decomposition are performed to obtain the following short sentence node information:

sn1_1:[主语:“actor”,谓词:“gained”,宾语:“initial access”],对应短句:Thethreat actors using IP 104.223.34.98 gained initial access to Victim 2’sproduction environment in late January 2022, or earlier. ;sn1_1: [Subject: "actor", predicate: "gained", object: "initial access"], corresponding phrase: Thethreat actors using IP 104.223.34.98 gained initial access to Victim 2's production environment in late January 2022, or earlier .;

sn1_2:[主语:“actor”,谓词:“obtain”,宾语:“access”],对应短句:Theseactors likely obtained access;sn1_2: [Subject: "actor", predicate: "obtain", object: "access"], corresponding phrase: Theseactors likely obtained access;

sn1_3:[主语:“actor”,谓词:“exploit”,宾语:“Log4Shellin an unpatchedVMware Horizon server”],对应短句:by exploiting Log4Shell in an unpatchedVMware Horizon server;sn1_3: [Subject: "actor", predicate: "exploit", object: "Log4Shellin an unpatchedVMware Horizon server"], corresponding phrase: by exploiting Log4Shell in an unpatchedVMware Horizon server;

sn1_4:[主语:“actor”,谓词:“gain”,宾语:“access”],对应短句:after thethreat actors gained access;sn1_4: [Subject: "actor", predicate: "gain", object: "access"], corresponding phrase: after the threat actors gained access;

sn1_5:[主语:“actor”,谓词:“use”,宾语:“PowerShell script”],对应短句:theactors using PowerShell scripts;sn1_5: [Subject: "actor", predicate: "use", object: "PowerShell script"], corresponding phrase: theactors using PowerShell scripts;

sn1_6:[主语:“actor”,谓词:“callout to”,宾语:“109.248.150.13”],对应短句:to callout to 109.248.150.13;sn1_6: [Subject: "actor", predicate: "callout to", object: "109.248.150.13"], corresponding phrase: to callout to 109.248.150.13;

sn1_7:[主语:“”,谓词:“”,宾语:“Hypertext Transfer Protocol (HTTP) ”],对应短句:viaHypertext Transfer Protocol (HTTP) ;sn1_7: [subject: "", predicate: "", object: "Hypertext Transfer Protocol (HTTP) "], corresponding phrase: viaHypertext Transfer Protocol (HTTP);

sn1_8:[主语:“actor”,谓词:“retrieve”,宾语:“additional PowerShellscripts”],对应短句:retrieve additional PowerShell scripts;sn1_8: [Subject: "actor", predicate: "retrieve", object: "additional PowerShellscripts"], corresponding phrase: retrieve additional PowerShell scripts;

sn1_9:[主语:“actor”,谓词:“download and execute”,宾语:“malicious filefrom 109.248.150.13”],对应短句:the actors attempt to download and execute amalicious file from 109.248.150.13;sn1_9: [Subject: "actor", predicate: "download and execute", object: "malicious file from 109.248.150.13"], corresponding phrase: the actors attempt to download and execute malicious file from 109.248.150.13;

sn1_10:[主语:“activity”,谓词:“started from”,宾语:“IPaddress104.155.149.103”],对应短句:The activity started from IP address104.155.149.103;sn1_10: [Subject: "activity", predicate: "started from", object: "IPaddress104.155.149.103"], corresponding phrase: The activity started from IP address104.155.149.103;

sn1_11:[主语:“”,谓词:“”,宾语:“part of the actors’ C2infrastructure”],对应短句:appears to be part of the actors’ C2infrastructure;sn1_11: [subject: "", predicate: "", object: "part of the actors' C2infrastructure"], corresponding phrase: appears to be part of the actors' C2infrastructure;

上述sn1_1~sn1_11分别用以表示11个短句节点信息。上述短句分句以长句(句号结尾)为单位基于依赖关系词的匹配获得。比如上述示例中,短句These actors likelyobtained access by exploiting Log4Shell in an unpatched VMware Horizonserver. 中可由依赖关系词“by”划分为sn1_2以及sn1_3两个子句。本实施例中,依赖关系词表包括比如如下词语:The above sn1_1~sn1_11 are respectively used to represent information of 11 short sentence nodes. The above short sentence clauses are obtained based on the matching of dependent relational words in units of long sentences (period endings). For example, in the above example, the short sentence These actors likely obtained access by exploiting Log4Shell in an unpatched VMware Horizonserver. can be divided into two clauses, sn1_2 and sn1_3, by the dependency word "by". In this embodiment, the dependency vocabulary includes, for example, the following words:

be caused by , be arise from, be arise out , be rise of, be triggeredby , be induced by , be the cause of , be affected by , be effect on , causeof … is … , reason of … is … , by , [v]…to[v]… , by reason that … is…, the reason for … is … , be cause for , be trigger of , if … then … ,hence , therefore , thus , thereby , accordingly , consequently , in this way, that is why , cause , allow , trigger , affect , induce ,reveal ,lead to ,bring about , appear to , bring on , give rise to , increase , result in , sothat to , have effect on , in order to , for the purpose of , after , because, as a result of , due to , owning to , in view of , as a consequence of, onaccount of , derive from , as long as, for this reason that ,for the reasonthat , because of , since , through , stem from , result from , thanks to ,in consequence of , in that , on the ground that, as, via , begin , end ,....be caused by , be arise from, be arise out , be rise of, be triggeredby , be induced by , be the cause of , be affected by , be effect on , causeof … is … , reason of … is … , by , [ v]…to[v]… , by reason that … is…, the reason for … is … , be cause for , be trigger of , if … then … ,hence , therefore , thus , therefore , accordingly , consequently , in this way, that is why , cause , allow , trigger , affect , induce , reveal , lead to , bring about , appear to , bring on , give rise to , increase , result in , sothat to , have effect on , in order to , for the purpose of , after , because, as a result of , due to , owning to , in view of , as a consequence of, onaccount of , derive from , as long as, for this reason that , for the reason that , because of , since , through , stem from , result from , thanks to ,in consequence of , in that , on the ground that, as, via , begin , end ,....

在上述的短句节点信息中:In the above short sentence node information:

根据短句:These actors likely obtained access和短句:by exploitingLog4Shell in an unpatched VMware Horizon server之间的依赖关系词by,构建节点迁移关系:sn1_3->sn1_2;According to the short sentence: These actors likely obtained access and the short sentence: by exploitingLog4Shell in an unpatched VMware Horizon server, the dependency word by is used to construct the node migration relationship: sn1_3->sn1_2;

根据短句:after the threat actors gained access和短句:the actors usingPowerShell scripts之间的依赖关系词after,构建节点迁移关系:sn1_4->sn1_5According to the short sentence: after the threat actors gained access and the short sentence: the actors using PowerShell scripts, the dependency relationship word after builds the node migration relationship: sn1_4->sn1_5

根据短句:the actors using PowerShell scripts和短句:to callout to109.248.150.13中的依赖关系词to.v,构建节点迁移关系:sn1_5>sn1_6;According to the phrase: the actors using PowerShell scripts and the phrase: to callout to109.248.150.13 in the dependency word to.v, build the node migration relationship: sn1_5>sn1_6;

根据短句:to callout to 109.248.150.13和短句:viaHypertext TransferProtocol (HTTP)中的依赖关系词via,构建节点迁移关系:sn1_7>sn1_6;According to the short sentence: to callout to 109.248.150.13 and the short sentence: the dependency word via in viaHypertext TransferProtocol (HTTP), the node migration relationship is constructed: sn1_7>sn1_6;

根据短句:to callout to 109.248.150.13和短句:to retrieve additionalPowerShell scripts中的依赖关系词to,构建节点迁移关系:sn1_6>sn1_8;According to the short sentence: to callout to 109.248.150.13 and the short sentence: to retrieve additional PowerShell scripts in the dependency word to, build the node migration relationship: sn1_6>sn1_8;

根据短句:The activity started from IP address 104.155.149.103和短句appears to be part of the actors’ C2 infrastructure中依赖关系词appears to的限定,构建节点迁移关系:sn1_10->sn1_11;According to the short sentence: The activity started from IP address 104.155.149.103 and the definition of the dependency word appears to in the short sentence appears to be part of the actors’ C2 infrastructure, the node migration relationship is constructed: sn1_10->sn1_11;

结合短句在文本中的前后关系,最终得到的节点迁移关系如下:Combined with the context of short sentences in the text, the final node migration relationship is as follows:

sn1_3->sn1_2sn1_3->sn1_2

sn1_4->sn1_5sn1_4->sn1_5

sn1_5->sn1_6sn1_5->sn1_6

sn1_7>sn1_6sn1_7>sn1_6

sn1_6->sn1_8sn1_6->sn1_8

sn1_10->sn1_11sn1_10->sn1_11

sn1_1->sn1_2sn1_1->sn1_2

sn1_2->sn1_5sn1_2->sn1_5

sn1_8->sn1_9sn1_8->sn1_9

sn1_9->sn1_11sn1_9->sn1_11

需要指出的是,相比于前述根据依赖关系词表所构建的依赖关系,上述依据文本前后关系而构建的依赖关系为弱依赖关系,而根据依赖关系词表所构建的依赖关系的强依赖关系。It should be pointed out that, compared with the above-mentioned dependency relationship constructed based on the dependency relationship vocabulary, the above-mentioned dependency relationship constructed based on the contextual relationship of the text is a weak dependency relationship, while the dependency relationship constructed based on the dependency relationship vocabulary is a strong dependency relationship .

步骤S23中,比较短句节点信息是否相似时,通常可以将主语谓词和宾语的修饰和限定词删除后判断主语谓词和宾语的词义是否近似,若近似则语义相同。比如,短句节点信息sn1_1:[主语:“actor”,谓词:“gain”,宾语:“initial access”]中的宾语去掉“intial”的限定后可得到新的短句节点信息sn1_1_V2:[主语:“actor”,谓词:“gain”,宾语:“access”],其中的谓词“gain”和sn1_2中的谓词:“obtain”语义实质相同,主语宾语也相同,故此,短句节点信息sn1_1与sn1_2和sn1_4相同。另外,这里还涉及包容关系,比如,短句节点信息sn1_9中的“malicious file”包容短句节点信息sn1_8中的“PowerShellscript”,并且谓词“retrieve”和“download and execute”含义相似,故此,短句节点信息sn1_8可以被短句节点信息sn1_9所吸收。In step S23, when comparing whether the short sentence node information is similar, usually the modifiers and qualifiers of the subject predicate and the object can be deleted to determine whether the meanings of the subject predicate and the object are similar, and if they are similar, the semantics are the same. For example, short sentence node information sn1_1: [Subject: "actor", predicate: "gain", object: "initial access"] removes the restriction of "intial" from the object in the object to get new short sentence node information sn1_1_V2: [Subject : "actor", predicate: "gain", object: "access"], the predicate "gain" and the predicate: "obtain" in sn1_2 have essentially the same semantics, and the subject and object are also the same. Therefore, the phrase node information sn1_1 and sn1_2 and sn1_4 are the same. In addition, the containment relationship is also involved here. For example, "malicious file" in the phrase node information sn1_9 contains "PowerShellscript" in the phrase node information sn1_8, and the predicates "retrieve" and "download and execute" have similar meanings. Therefore, the phrase Sentence node information sn1_8 can be absorbed by short sentence node information sn1_9.

由此,经步骤S23删除限定修饰合并后的重新标记后的短句节点信息简化如下:Thus, the remarked phrase node information after deletion, limitation, modification and merging in step S23 is simplified as follows:

sn2_1:[主语:“actor”,谓词:“obtain”,宾语:“access”];sn2_1: [subject: "actor", predicate: "obtain", object: "access"];

sn2_2:[主语:“actor”,谓词:“exploit”,宾语:“Log4Shell”];sn2_2: [subject: "actor", predicate: "exploit", object: "Log4Shell"];

sn2_3:[主语:“actor”,谓词:“use”,宾语:“PowerShell script”];sn2_3: [subject: "actor", predicate: "use", object: "PowerShell script"];

sn2_4:[主语:“actor”,谓词:“callout to”,宾语:“109.248.150.13”];sn2_4: [subject: "actor", predicate: "callout to", object: "109.248.150.13"];

sn2_5:[主语:“”,谓词:“”,宾语:“Hypertext Transfer Protocol (HTTP) ”];sn2_5: [subject: "", predicate: "", object: "Hypertext Transfer Protocol (HTTP)"];

sn2_6:[主语:“actor”,谓词:“download and execute”,宾语:“PowerShellscript or other malicious file”];sn2_6: [subject: "actor", predicate: "download and execute", object: "PowerShellscript or other malicious file"];

sn2_7:[主语:“activity”,谓词:“started from”,宾语:“IP address104.155.149.103”];sn2_7: [subject: "activity", predicate: "started from", object: "IP address104.155.149.103"];

sn2_8:[主语:“”,谓词:“”,宾语:“part of the actors’ C2 infrastructure”];sn2_8: [subject: "", predicate: "", object: "part of the actors' C2 infrastructure"];

其对应的调节后的迁移关系如下:The corresponding adjusted migration relationship is as follows:

sn2_2->sn2_1sn2_2->sn2_1

sn2_1->sn2_3sn2_1->sn2_3

sn2_3->sn2_4sn2_3->sn2_4

sn2_5>sn2_4sn2_5>sn2_4

sn2_4->sn2_6sn2_4->sn2_6

sn2_7->sn2_8sn2_7->sn2_8

sn2_6->sn2_8sn2_6->sn2_8

步骤S24中,攻击状态信息是机器所受攻击的状态,故此,攻击状态信息与机器本身的行为相关。而短句节点信息动作主体一般为攻击者。故此需要将攻击者的行为映射至本机行为中。比如前述短句节点信息sn2_4中,[主语:“actor”,谓词:“callout to”,宾语:“109.248.150.13”],actor callout to109.248.150.13,对应本机机器而言,相当于本机机器与109.248.150.13网络连接。攻击者的行为对于机器而言,其动作行为比较固定,比如网络连接、创建文件、文件修改、执行文件或脚本等。另外,由于短句节点信息动作主体为攻击者,其行为未必都能映射为某一攻击状态,比如,短句节点信息sn2_1[主语:“actor”,谓词:“obtain”,宾语:“access”]中,其行为actor obtain access完全为对攻击者自身的描述,无法映射为攻击状态,故此需要将其删除。前述示例的短句节点信息sn2_1至sn2_8中,短句节点信息sn2_1以及sn2_2无法对应至某一机器受攻击的状态,需要删除,删除后重新标记的短句节点信息如下:In step S24, the attack status information is the status of the machine being attacked, so the attack status information is related to the behavior of the machine itself. The main body of short sentence node information action is generally the attacker. Therefore, it is necessary to map the attacker's behavior to the native behavior. For example, in the aforementioned short sentence node information sn2_4, [subject: "actor", predicate: "callout to", object: "109.248.150.13"], actor callout to109.248.150.13, corresponding to the local machine, is equivalent to the local The machine machine is connected to the 109.248.150.13 network. For the machine, the behavior of the attacker is relatively fixed, such as connecting to the network, creating files, modifying files, executing files or scripts, and so on. In addition, since the action subject of the short sentence node information is the attacker, its behavior may not be mapped to a certain attack state, for example, the short sentence node information sn2_1[subject: "actor", predicate: "obtain", object: "access" ], its behavior actor obtain access is completely a description of the attacker itself, and cannot be mapped to an attack state, so it needs to be deleted. Among the short sentence node information sn2_1 to sn2_8 in the preceding example, the short sentence node information sn2_1 and sn2_2 cannot correspond to the state of a certain machine under attack and need to be deleted. After deletion, the remarked short sentence node information is as follows:

sn3_1:[主语:“actor”,谓词:“use”,宾语:“PowerShell script”];sn3_1: [subject: "actor", predicate: "use", object: "PowerShell script"];

sn3_2:[主语:“actor”,谓词:“callout to”,宾语:“109.248.150.13”];sn3_2: [subject: "actor", predicate: "callout to", object: "109.248.150.13"];

sn3_3:[主语:“”,谓词:“”,宾语:“Hypertext Transfer Protocol (HTTP) ”];sn3_3: [subject: "", predicate: "", object: "Hypertext Transfer Protocol (HTTP)"];

sn3_4:[主语:“actor”,谓词:“download and execute”,宾语:“PowerShellscript or other malicious file”];sn3_4: [subject: "actor", predicate: "download and execute", object: "PowerShellscript or other malicious file"];

sn3_5:[主语:“activity”,谓词:“started from”,宾语:“IP address104.155.149.103”];sn3_5: [subject: "activity", predicate: "started from", object: "IP address104.155.149.103"];

sn3_6:[主语:“”,谓词:“”,宾语:“part of the actors’ C2 infrastructure”];sn3_6: [subject: "", predicate: "", object: "part of the actors' C2 infrastructure"];

其对应的调节后的迁移关系如下:The corresponding adjusted migration relationship is as follows:

sn3_1->sn3_2sn3_1->sn3_2

sn3_3>sn3_2sn3_3>sn3_2

sn3_2->sn3_4sn3_2->sn3_4

sn3_5->sn3_6sn3_5->sn3_6

sn3_4->sn3_6sn3_4->sn3_6

上述短句节点信息映射至攻击状态信息如下:The above short sentence node information is mapped to the attack status information as follows:

sn3_1=>mn_1:[关联动作:“Excute”,动作对象:“PowerShell script”];sn3_1=>mn_1: [associated action: "Excute", action object: "PowerShell script"];

sn3_2=>mn_2:[关联动作:"NetConnectTo",动作对象:“109.248.150.13”]sn3_2=>mn_2: [associated action: "NetConnectTo", action object: "109.248.150.13"]

sn3_3=>mn_3:[关联动作:"NetConnectBy",动作对象:“Hypertext TransferProtocol (HTTP)”]sn3_3=>mn_3: [associated action: "NetConnectBy", action object: "Hypertext TransferProtocol (HTTP)"]

sn3_4=>mn_4:[关联动作:“CreateFile”,动作对象:“unknown file”];sn3_4=>mn_4: [associated action: "CreateFile", action object: "unknown file"];

sn3_5=>mn_5:[关联动作:“NetConnectFrom”,动作对象:“104.155.149.103”];sn3_5=>mn_5: [associated action: "NetConnectFrom", action object: "104.155.149.103"];

sn3_6=>mn_6:[关联动作:“NetConnectBy”,动作对象:“C2(Connect&Control, C&C)”];sn3_6=>mn_6: [associated action: "NetConnectBy", action object: "C2(Connect&Control, C&C)"];

与之对应的攻击状态迁移信息如下:The corresponding attack state transition information is as follows:

[mn_1, mn_3]->mn_2[mn_1, mn_3]->mn_2

mn_2->mn_4mn_2->mn_4

[mn_5,mn_4]->mn _6[mn_5,mn_4]->mn_6

攻击状态图合并步骤,也就是前述步骤S3,通过攻击状态信息之间的相同匹配的合并,将各个攻击状态迁移信息的集合中的攻击状态信息逐个并入全局攻击状态迁移信息集合中。如前所述,攻击状态迁移信息集合表示了一个攻击模型图。而全局攻击状态迁移信息集合则是一个全局的攻击模型图。前述步骤S2处理时,每个攻击缺陷描述文本可以得到攻击模型图。为提高并入全局攻击状态迁移信息集合,本实施例中,通常会首先将当前所获得的各个攻击缺陷描述文本所对应的攻击状态迁移信息集合进行合并,组成一个表示整体的攻击模型图的临时攻击状态迁移信息集合,再将该攻击状态迁移信息集合与全局攻击状态迁移信息集合进行合并。攻击状态信息之间的相同匹配即为比较关联动作和动作对象是否相同即可。此外,为处理方便,攻击状态迁移信息集合通常仅仅攻击状态迁移信息所包含攻击状态信息的攻击状态识别码。完整的攻击状态信息保存在一个对应的攻击状态信息集合。故此,本步骤合并时,首先合并对应的攻击状态信息集合,然后依据攻击状态信息集合中攻击状态信息合并后所返回的攻击状态识别码合并对应的攻击状态迁移信息。The attack state map merging step, that is, the aforementioned step S3, merges the attack state information in each attack state transition information set into the global attack state transition information set one by one through the combination of the same matching between the attack state information. As mentioned earlier, the attack state transition information set represents an attack model graph. The global attack state transition information set is a global attack model diagram. During the processing of the aforementioned step S2, an attack model diagram can be obtained for each attack defect description text. In order to improve the incorporation of the global attack state transition information set, in this embodiment, the attack state transition information sets corresponding to the currently obtained attack defect description texts are usually combined first to form a temporary attack model diagram representing the whole An attack state transition information set, and then merge the attack state transition information set with the global attack state transition information set. The same matching between the attack state information is to compare whether the associated action and the action object are the same. In addition, for the convenience of processing, the attack state transition information set is usually only the attack state identification code of the attack state information included in the attack state transition information. Complete attack state information is stored in a corresponding attack state information set. Therefore, when merging in this step, the corresponding attack state information sets are first merged, and then the corresponding attack state transition information is merged according to the attack state identification code returned after the attack state information in the attack state information set is merged.

此外,进一步地为了后续监测,攻击状态信息通常还包含该攻击所对应的缺陷等信息,比如前述示例中,攻击状态信息还可以进一步包含有对应的缺陷标识Log4Shell。另外,攻击状态信息的缺陷标识通常是一个集合。In addition, for further monitoring, the attack status information usually also includes information such as defects corresponding to the attack. For example, in the foregoing example, the attack status information may further include the corresponding defect identifier Log4Shell. In addition, the defect identification of the attack state information is usually a set.

机器行为状态监测步骤,即前述步骤S4,监测机器执行操作系统和应用程序的行为,并根据行为结果是否与全局攻击状态迁移信息集合中的攻击状态信息一致判断机器是否出现异常状态,当出现异常状态时发出异常状态的预警。行为结果与攻击状态信息一致性判断即为匹配攻击状态信息中的关联动作和动作对象,比如某一时刻监测到某应用程序建立了网络连接,只要匹配该目标网络地址是否为攻击状态信息中关联动作为NetConnectTo的动作对象即可,此时表示出现异常状态。The machine behavior state monitoring step, that is, the aforementioned step S4, monitors the behavior of the machine executing the operating system and application programs, and judges whether the machine is in an abnormal state according to whether the behavior result is consistent with the attack state information in the global attack state transition information set. When the status is abnormal, an early warning is issued. The consistency judgment between the behavior result and the attack state information is to match the associated actions and action objects in the attack state information. The action can be the action object of NetConnectTo, which indicates that an abnormal state has occurred.

本发明中,发出异常状态预警是一种上位概念的说法,发出异常状态预警通常包括比如通过日志记录异常状态、将异常状态通过网络上报以及将异常状态发送至防御处理模块。本实施例中,通常上述行为结果与攻击状态信息一致的异常状态仅仅会将异常状态输出至日志中,当出现状态迁移符合的情形时,会被认为这是个攻击而发出警报。状态迁移符合的情形也就是,前后两个或者多个程序行为的行为结果分别与某个攻击状态迁移信息的第一攻击状态信息和第二攻击状态信息一致的情形。这里的发出警报本实施例具体是指将异常状态通过网络上报同时将异常状态发送至防御处理模块。此时,异常状态表示多个程序行为的行为结果与分别与多个攻击状态信息相一致的状态。In the present invention, issuing an early warning of an abnormal state is a superordinate concept, and issuing an early warning of an abnormal state usually includes, for example, recording the abnormal state through a log, reporting the abnormal state through the network, and sending the abnormal state to the defense processing module. In this embodiment, usually the abnormal state whose behavior result is consistent with the attack state information will only output the abnormal state to the log, and when the state transition matches the situation, it will be considered as an attack and an alarm will be issued. The state transition conforms to the situation that the behavior results of two or more program behaviors before and after are respectively consistent with the first attack state information and the second attack state information of a certain attack state transition information. Here, the sending of an alarm in this embodiment specifically refers to reporting the abnormal state through the network and simultaneously sending the abnormal state to the defense processing module. In this case, the abnormal state indicates a state in which behavior results of a plurality of program behaviors are consistent with a plurality of pieces of attack state information.

需要指出的是本发明中的攻击状态信息一致性判断并非针对应用程序所正在执行的行为。这是本发明相比于传统攻击监测不同之处。传统攻击监测在于监测攻击行为本身,比如某应用程序建立连接时,传统攻击监测会监测到,而本发明中的攻击状态监测不会监测到,当应用程序连接建立后才会被本发明的攻击状态监测到,这是因为基于本发明的方法需要除了监测某种行为状态之外,最为主要的是需要监测状态之间的迁移。It should be pointed out that the consistency judgment of the attack state information in the present invention is not aimed at the behavior being executed by the application program. This is the difference between the present invention and traditional attack monitoring. Traditional attack monitoring is to monitor the attack behavior itself. For example, when an application program establishes a connection, the traditional attack monitoring will detect it, but the attack status monitoring in the present invention will not detect it. When the application program connection is established, it will be attacked by the present invention. State monitoring, this is because the method based on the present invention needs to monitor not only a certain behavior state, but also the transition between states.

此外,还需要说明的是,本发明前述所指模块是与方法中的步骤相对应的虚装置,不再赘述。In addition, it should be noted that the modules referred to above in the present invention are virtual devices corresponding to the steps in the method, and will not be repeated here.

Claims (8)

1.一种基于异常状态的攻击检测方法,其特征在于,包括如下步骤:1. An attack detection method based on abnormal state, is characterized in that, comprises the steps: 步骤S1:获取攻击缺陷描述文本;Step S1: Obtain the attack defect description text; 步骤S2:对所述攻击缺陷描述文本进行解析后得到攻击状态迁移信息的集合;Step S2: After parsing the attack defect description text, a set of attack state transition information is obtained; 攻击状态迁移信息包括第一攻击状态信息集合和第二攻击状态信息集合;所述第一攻击状态信息集合和第二攻击状态信息集合均为所述攻击状态信息的集合;The attack state transition information includes a first set of attack state information and a second set of attack state information; both the first set of attack state information and the second set of attack state information are sets of the attack state information; 攻击状态信息由关联动作和动作对象组成;Attack status information consists of associated actions and action objects; 步骤S3:通过攻击状态信息之间的相同匹配的合并,将各个攻击状态迁移信息的集合中的攻击状态信息逐个并入全局攻击状态迁移信息集合中;Step S3: Merge the attack state information in each attack state transition information set into the global attack state transition information set one by one by merging the same matching between the attack state information; 步骤S4:监测机器执行操作系统和应用程序的行为,并根据行为结果是否与所述全局攻击状态迁移信息集合中的攻击状态信息一致判断机器是否出现异常状态,当出现异常状态时发出异常状态的预警;Step S4: Monitor the behavior of the machine executing the operating system and application programs, and judge whether the machine is in an abnormal state according to whether the behavior result is consistent with the attack state information in the global attack state transition information set, and send an abnormal state notification when an abnormal state occurs early warning; 所述步骤S2包括如下步骤:Described step S2 comprises the following steps: 步骤S21:根据预先设定的正则表达式和领域专用实体名词表,对所述攻击缺陷描述文本进行实体名词的标注;Step S21: According to the preset regular expression and the domain-specific entity noun table, mark the entity nouns on the attack defect description text; 步骤S22:对所述攻击缺陷描述文本进行短句分句,然后根据所标注的实体名字对短句进行主谓宾分解得到主语、谓词和宾语,得到短句节点信息,并根据依赖关系词表以及短句的前后关系,提取出短句之间的依赖关系,从而得到短句所对应的短句节点信息之间的节点迁移关系;Step S22: divide the attack defect description text into short sentences, then decompose the short sentence according to the marked entity name to obtain the subject, predicate and object, and obtain the short sentence node information, and according to the dependency relationship vocabulary As well as the context of short sentences, the dependency relationship between short sentences is extracted, so as to obtain the node migration relationship between the short sentence node information corresponding to short sentences; 步骤S23:通过短句节点信息之间的相似和包容匹配,将语义相同或具有包容关系的短句节点信息合并,并调节合并后的节点迁移关系;Step S23: through similarity and inclusive matching between short sentence node information, merge short sentence node information with the same semantics or inclusive relationship, and adjust the merged node migration relationship; 步骤S24:根据短句节点信息的主语、谓词和宾语进行攻击状态信息映射,并根据攻击状态信息所对应的短句节点信息的节点迁移关系构建相应的攻击状态迁移信息;短句节点信息映射成攻击状态信息时,若短句节点信息无法映射成攻击状态信息,则删除对应的短句节点信息,并根据节点迁移关系,修改节点迁移关系,并依据修改后的节点迁移关系构建攻击状态迁移信息。Step S24: Map the attack state information according to the subject, predicate and object of the short sentence node information, and construct the corresponding attack state transition information according to the node migration relationship of the short sentence node information corresponding to the attack state information; the short sentence node information is mapped into When attacking state information, if the short sentence node information cannot be mapped into attack state information, delete the corresponding short sentence node information, modify the node migration relationship according to the node migration relationship, and construct the attack state migration information based on the modified node migration relationship . 2.根据权利要求1所述的基于异常状态的攻击检测方法,其特征在于,所述步骤S4中所述发出异常状态预警包括通过日志记录异常状态、将异常状态通过网络上报以及将异常状态发送至防御处理模块。2. The attack detection method based on abnormal state according to claim 1, characterized in that, in the step S4, issuing an abnormal state early warning includes recording the abnormal state through a log, reporting the abnormal state through the network, and sending the abnormal state to the defense processing module. 3.根据权利要求1所述的基于异常状态的攻击检测方法,其特征在于,所述步骤S1中,跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,当跟踪到新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告时,抓取攻击行为报告、攻击手段报告或软件漏洞缺陷报告的文本内容作为攻击缺陷描述文本。3. The attack detection method based on abnormal state according to claim 1, characterized in that, in the step S1, track the attack behavior report, attack means report and software vulnerability defect report of the designated website, when a new attack is tracked In the case of behavior report, attack method report or software vulnerability defect report, grab the text content of the attack behavior report, attack method report or software vulnerability defect report as the attack defect description text. 4.一种基于异常状态的攻击检测装置,其特征在于,包括如下模块:4. An attack detection device based on an abnormal state, comprising the following modules: 模块M1,用于:获取攻击缺陷描述文本;The module M1 is used to: obtain the attack defect description text; 模块M2,用于:对所述攻击缺陷描述文本进行解析后得到攻击状态迁移信息的集合;Module M2, configured to: obtain a set of attack state transition information after parsing the attack defect description text; 攻击状态迁移信息包括第一攻击状态信息集合和第二攻击状态信息集合;所述第一攻击状态信息集合和第二攻击状态信息集合均为所述攻击状态信息的集合;The attack state transition information includes a first set of attack state information and a second set of attack state information; both the first set of attack state information and the second set of attack state information are sets of the attack state information; 攻击状态信息由关联动作和动作对象组成;Attack status information consists of associated actions and action objects; 模块M3,用于:通过攻击状态信息之间的相同匹配的合并,将各个攻击状态迁移信息的集合中的攻击状态信息逐个并入全局攻击状态迁移信息集合中;The module M3 is configured to: merge the attack state information in each attack state transition information set into the global attack state transition information set one by one by merging the same matching between the attack state information; 模块M4,用于:监测机器执行操作系统和应用程序的行为,并根据行为结果是否与所述全局攻击状态迁移信息集合中的攻击状态信息一致判断机器是否出现异常状态,当出现异常状态时发出异常状态的预警;Module M4, used to: monitor the behavior of the machine executing the operating system and application program, and judge whether the machine is in an abnormal state according to whether the behavior result is consistent with the attack state information in the global attack state transition information set, and send a message when an abnormal state occurs Early warning of abnormal state; 所述模块M2包括如下模块:The module M2 includes the following modules: 模块M21,用于:根据预先设定的正则表达式和领域专用实体名词表,对所述攻击缺陷描述文本进行实体名词的标注;The module M21 is configured to: mark entity nouns on the attack defect description text according to a preset regular expression and a domain-specific entity noun table; 模块M22,用于:对所述攻击缺陷描述文本进行短句分句,然后根据所标注的实体名字对短句进行主谓宾分解得到主语、谓词和宾语,得到短句节点信息,并根据依赖关系词表以及短句的前后关系,提取出短句之间的依赖关系,从而得到短句所对应的短句节点信息之间的节点迁移关系;Module M22 is used to: divide the attack defect description text into short sentences, and then decompose the short sentence according to the marked entity name to obtain the subject, predicate and object, and obtain the node information of the short sentence, and according to the dependent The relational vocabulary and the context of short sentences extract the dependency relationship between short sentences, so as to obtain the node migration relationship between the short sentence node information corresponding to short sentences; 模块M23,用于:通过短句节点信息之间的相似和包容匹配,将语义相同或具有包容关系的短句节点信息合并,并调节合并后的节点迁移关系;The module M23 is used to: combine short sentence node information with the same semantics or containment relationship through similarity and inclusive matching between short sentence node information, and adjust the merged node migration relationship; 模块M24,用于:根据短句节点信息的主语、谓词和宾语进行攻击状态信息映射,并根据攻击状态信息所对应的短句节点信息的节点迁移关系构建相应的攻击状态迁移信息;短句节点信息映射成攻击状态信息时,若短句节点信息无法映射成攻击状态信息,则删除对应的短句节点信息,并根据节点迁移关系,修改节点迁移关系,并依据修改后的节点迁移关系构建攻击状态迁移信息。Module M24, used to: perform attack state information mapping according to the subject, predicate and object of the short sentence node information, and construct corresponding attack state transition information according to the node migration relationship of the short sentence node information corresponding to the attack state information; the short sentence node When the information is mapped into attack state information, if the short sentence node information cannot be mapped into attack state information, delete the corresponding short sentence node information, modify the node migration relationship according to the node migration relationship, and build an attack based on the modified node migration relationship State transition information. 5.根据权利要求4所述的基于异常状态的攻击检测装置,其特征在于,所述模块M4中所述发出异常状态预警包括通过日志记录异常状态、将异常状态通过网络上报以及将异常状态发送至防御处理模块。5. The attack detection device based on abnormal state according to claim 4, characterized in that, the abnormal state warning issued in the module M4 includes logging the abnormal state, reporting the abnormal state through the network and sending the abnormal state to the defense processing module. 6.根据权利要求4所述的基于异常状态的攻击检测装置,其特征在于,模块M1,用于:跟踪指定网站的攻击行为报告、攻击手段报告和软件漏洞缺陷报告,当跟踪到新的攻击行为报告、攻击手段报告或软件漏洞缺陷报告时,抓取攻击行为报告、攻击手段报告或软件漏洞缺陷报告的文本内容作为攻击缺陷描述文本。6. The attack detection device based on abnormal state according to claim 4, characterized in that, the module M1 is used to: track the attack behavior report, attack means report and software vulnerability defect report of the designated website, when a new attack is tracked In the case of behavior report, attack method report or software vulnerability defect report, grab the text content of the attack behavior report, attack method report or software vulnerability defect report as the attack defect description text. 7.一种介质;该介质存储有可以被机器所读取的程序指令集;其特征在于,当该介质内所存储的程序指令集被机器读取并执行时可以实现根据权利要求1至3任一项所述的基于异常状态的攻击检测方法。7. A medium; the medium stores a program instruction set that can be read by a machine; it is characterized in that, when the program instruction set stored in the medium is read and executed by a machine, it can realize the process according to claims 1 to 3. Any one of the attack detection methods based on abnormal state. 8.一种机器;该机器包括处理器和存储器;所述存储器内存储有程序指令集;其特征在于,当所述存储器内所存储的程序指令集被所述处理器加载并执行时可以实现根据权利要求1至3任一项所述的基于异常状态的攻击检测方法。8. A machine; the machine includes a processor and a memory; a program instruction set is stored in the memory; it is characterized in that, when the program instruction set stored in the memory is loaded and executed by the processor, it can realize The attack detection method based on abnormal state according to any one of claims 1 to 3.
CN202310371707.2A 2023-04-10 2023-04-10 Attack detection method, device, medium and machine based on abnormal state Active CN116389122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310371707.2A CN116389122B (en) 2023-04-10 2023-04-10 Attack detection method, device, medium and machine based on abnormal state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310371707.2A CN116389122B (en) 2023-04-10 2023-04-10 Attack detection method, device, medium and machine based on abnormal state

Publications (2)

Publication Number Publication Date
CN116389122A true CN116389122A (en) 2023-07-04
CN116389122B CN116389122B (en) 2025-07-22

Family

ID=86963038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310371707.2A Active CN116389122B (en) 2023-04-10 2023-04-10 Attack detection method, device, medium and machine based on abnormal state

Country Status (1)

Country Link
CN (1) CN116389122B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119172123A (en) * 2024-08-30 2024-12-20 广州盈风网络科技有限公司 A testing method, device, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019110513A (en) * 2017-12-15 2019-07-04 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America Anomaly detection method, learning method, anomaly detection device, and learning device
CN112235283A (en) * 2020-10-10 2021-01-15 南方电网科学研究院有限责任公司 Vulnerability description attack graph-based network attack evaluation method for power engineering control system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019110513A (en) * 2017-12-15 2019-07-04 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America Anomaly detection method, learning method, anomaly detection device, and learning device
CN112235283A (en) * 2020-10-10 2021-01-15 南方电网科学研究院有限责任公司 Vulnerability description attack graph-based network attack evaluation method for power engineering control system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王硕;王建华;汤光明;裴庆祺;张玉臣;刘小虎;: "一种智能高效的最优渗透路径生成方法", 《计算机研究与发展》, no. 05, 15 May 2019 (2019-05-15) *
王立敏: "基于指标依赖模型构建与监控的攻击检测方法", 《软件学报》, 1 June 2023 (2023-06-01) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119172123A (en) * 2024-08-30 2024-12-20 广州盈风网络科技有限公司 A testing method, device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN116389122B (en) 2025-07-22

Similar Documents

Publication Publication Date Title
JP7593724B2 (en) Cyber Detection Fuzzy Pattern Matching
US10956566B2 (en) Multi-point causality tracking in cyber incident reasoning
Feng et al. Understanding and securing device vulnerabilities through automated bug report analysis
US20200120109A1 (en) Iterative constraint solving in abstract graph matching for cyber incident reasoning
KR102396237B1 (en) Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN105933268A (en) Webshell detection method and apparatus based on total access log analysis
KR102362516B1 (en) Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN110879891B (en) Vulnerability detection method and device based on web fingerprint information
Mahmoud et al. APTHunter: Detecting advanced persistent threats in early stages
US12282554B2 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
KR102420884B1 (en) Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
US20230252144A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20230306113A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Huang et al. {DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Mapping
US20240054215A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20240054210A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
CN117150488A (en) Ground-leaving attack detection method and system based on time sequence analysis and memory evidence obtaining
CN115766258B (en) Multi-stage attack trend prediction method, equipment and storage medium based on causal relationship graph
US20230048076A1 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
KR102411383B1 (en) Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN116389122B (en) Attack detection method, device, medium and machine based on abnormal state
Zammit A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
US12368731B2 (en) Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
Tudosi et al. Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls.
Burji et al. Malware analysis using reverse engineering and data mining tools

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant