CN117439814A - A network security event linkage processing system and method based on ATT&CK - Google Patents
A network security event linkage processing system and method based on ATT&CK Download PDFInfo
- Publication number
- CN117439814A CN117439814A CN202311627758.3A CN202311627758A CN117439814A CN 117439814 A CN117439814 A CN 117439814A CN 202311627758 A CN202311627758 A CN 202311627758A CN 117439814 A CN117439814 A CN 117439814A
- Authority
- CN
- China
- Prior art keywords
- network security
- malicious code
- module
- threat information
- att
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域Technical field
本发明涉及网络安全技术领域,特别是一种基于ATT&CK的网络安全事件联动处置系统及方法。The present invention relates to the field of network security technology, in particular to a network security event linkage processing system and method based on ATT&CK.
背景技术Background technique
随着网络技术的快速发展,网络应用已经渗透到了我们生活的各个部分。与此同时,网络安全事件层出不穷,为我们的生产生活的安全稳定运行造成了影响。因此,及时发现并处置安全事件是保证网络安全的关键。With the rapid development of network technology, network applications have penetrated into every part of our lives. At the same time, network security incidents emerge one after another, affecting the safe and stable operation of our production and life. Therefore, timely detection and handling of security incidents is the key to ensuring network security.
传统的安全事件处置方式,主要是利用不同种类的安全产品,使得它们各自独立发挥作用。这种处置方式忽略了各类安全产品之间的联系以及相互作用关系,没有充分发挥各类安全产品的优势。The traditional way of handling security incidents mainly uses different types of security products so that they can function independently. This disposal method ignores the connections and interactions between various safety products and does not give full play to the advantages of various safety products.
发明内容Contents of the invention
鉴于现有的传统安全事件处置方式中安全产品之间缺乏联动性的问题,提出了本发明。In view of the problem of lack of linkage between security products in the existing traditional security incident handling methods, the present invention is proposed.
因此,本发明所要解决的问题在于如何提供一种安全事件联动处置方法以实现安全产品之间的有效协同,有效识别和处置威胁,提高网络安全防护的可靠性和效率。Therefore, the problem to be solved by the present invention is how to provide a security event linkage processing method to achieve effective collaboration between security products, effectively identify and deal with threats, and improve the reliability and efficiency of network security protection.
为解决上述技术问题,本发明提供如下技术方案:In order to solve the above technical problems, the present invention provides the following technical solutions:
第一方面,本发明实施例提供了一种基于ATT&CK的网络安全事件联动处置系统,其包括威胁情报模块,用于收集威胁情报信息,并将所述威胁情报信息上传至网络安全管理平台,同时将网络安全管理平台分析形成的新的威胁情报信息更新至自身的威胁情报库;威胁情报分析模块,用于根据ATT&CK矩阵对所述威胁情报信息进行分类以确定威胁情报所属的数据源,并将数据源组成上报至数据源处理模块;数据源处理模块,用于接收和分析所述威胁情报分析模块上传的数据源组成以生成监测策略和管控手段,并将所述监测策略和所述管控手段上传至网络安全管理平台;可信验证模块,用于根据所述数据源处理模块生成的监测策略、管控手段和安全管理规范要求设定的标准要求对资产进行验证和评估以生成度量结果,并将度量失败日志上传至网络管理平台;恶意代码监测模块,用于监测系统中的恶意代码,并对所监测到的恶意代码进行检测和分析以生成告警日志,并将告警日志上传至网络安全管理平台,同时接收网络安全管理平台下达的策略和命令,及时阻断、中止恶意代码对系统的危害和破坏;管控模块,用于执行网络安全管理平台下发的管控命令,对存在安全风险的资产采取管控措施。In the first aspect, embodiments of the present invention provide a network security event linkage processing system based on ATT&CK, which includes a threat intelligence module for collecting threat intelligence information and uploading the threat intelligence information to a network security management platform. Update the new threat intelligence information formed by the analysis of the network security management platform to its own threat intelligence library; the threat intelligence analysis module is used to classify the threat intelligence information according to the ATT&CK matrix to determine the data source to which the threat intelligence belongs, and The data source composition is reported to the data source processing module; the data source processing module is used to receive and analyze the data source composition uploaded by the threat intelligence analysis module to generate a monitoring strategy and control means, and combine the monitoring strategy and the control means Uploaded to the network security management platform; the trusted verification module is used to verify and evaluate assets according to the monitoring strategies, management and control methods generated by the data source processing module and the standard requirements set by security management specifications to generate measurement results, and Upload measurement failure logs to the network management platform; the malicious code monitoring module is used to monitor malicious codes in the system, detect and analyze the detected malicious codes to generate alarm logs, and upload the alarm logs to network security management The platform simultaneously receives the policies and commands issued by the network security management platform, and promptly blocks and stops the harm and damage caused by malicious code to the system; the management and control module is used to execute the control orders issued by the network security management platform, and monitor assets with security risks. Take control measures.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:恶意代码监测模块包括防恶意代码客户端管理模块、防恶意代码客户端、恶意代码流量监测采集模块以及恶意代码分析模块,所述防恶意代码客户端管理模块,用于集中管理、配置和升级所述防恶意代码客户端,同时接收恶意代码客户端的监测结果;所述防恶意代码客户端,用于对终端设备上程序和文件数据资源进行恶意代码监测,主动阻止恶意代码访问、传输和运行软件;所述恶意代码流量监测采集模块,用于从网络中采集恶意代码流量数据,并将恶意代码流量数据传送至所述恶意代码分析模块进行分析;所述恶意代码分析模块,用于对采集到的恶意代码流量数据进行深入分析,提取出相关的特征信息以识别恶意代码的类型和行为,并生成相应的检测和防御规则。As a preferred solution of the ATT&CK-based network security event linkage processing system of the present invention, the malicious code monitoring module includes an anti-malicious code client management module, an anti-malicious code client, a malicious code traffic monitoring and collection module, and a malicious code Analysis module, the anti-malicious code client management module, is used to centrally manage, configure and upgrade the anti-malicious code client, and at the same time receive the monitoring results of the malicious code client; the anti-malicious code client is used to monitor the terminal Programs and file data resources on the device perform malicious code monitoring to actively prevent malicious codes from accessing, transmitting and running software; the malicious code traffic monitoring and collection module is used to collect malicious code traffic data from the network and transmit the malicious code traffic data to the malicious code analysis module for analysis; the malicious code analysis module is used to conduct in-depth analysis of the collected malicious code traffic data, extract relevant feature information to identify the type and behavior of the malicious code, and generate the corresponding Detection and defense rules.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:威胁情报模块的工作流程如下:网络安全管理平台根据接收到威胁情报的信息,对威胁情报信息进行分类;通过分析威胁的特点和危害性,将威胁情报信息归入相应的ATT&CK战术阶段;将威胁信息与ATT&CK矩阵战术阶段中的技术特点进行比对,若威胁信息符合某个ATT&CK战术阶段的技术特点,则将此威胁信息归并入该战术阶段的技术矩阵;若威胁信息符合多个ATT&CK战术阶段的技术特点,则将该威胁信息归并入多个相应的技术矩阵;逐步累积威胁信息的归并,以形成网络安全管理平台特有的威胁情报矩阵;根据威胁情报所属的技术特点确定监测数据源,以形成威胁情报数据源。As a preferred solution of the ATT&CK-based network security event linkage processing system of the present invention, the workflow of the threat intelligence module is as follows: the network security management platform classifies the threat intelligence information according to the received threat intelligence information; Analyze the characteristics and harmfulness of the threat, and classify the threat intelligence information into the corresponding ATT&CK tactical stage; compare the threat information with the technical characteristics in the ATT&CK matrix tactical stage. If the threat information meets the technical characteristics of a certain ATT&CK tactical stage, then Merge this threat information into the technical matrix of the tactical stage; if the threat information meets the technical characteristics of multiple ATT&CK tactical stages, merge the threat information into multiple corresponding technical matrices; gradually accumulate the merge of threat information to form a network Threat intelligence matrix unique to the security management platform; monitoring data sources are determined based on the technical characteristics of the threat intelligence to form threat intelligence data sources.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:ATT&CK战术阶段包括侦察、资源开发、初始访问、执行、持久化、权限提升、防御规避、凭证获取、发现、横向移动、收集、命令与控制、数据泄露以及影响;威胁情报数据源包括动态目录、应用日志、证书、云服务、云存储、命令、容器、域名、驱动、驱动程序、文件、防火墙、固件、用户组、镜像、实例、网络扫描、内核、会话登录、恶意知识库、模块、命名管道、网络共享、网络流量、伪装、集群共享单元、进程、计划任务、脚本、设备健康状态、服务、快照、用户账户、存储单元、网络凭证、Windows注册表以及WMI。As a preferred solution of the ATT&CK-based network security incident linkage processing system of the present invention, the ATT&CK tactical phase includes reconnaissance, resource development, initial access, execution, persistence, authority promotion, defense avoidance, credential acquisition, discovery, Lateral movement, collection, command and control, data leakage and impact; threat intelligence data sources include dynamic directory, application logs, certificates, cloud services, cloud storage, commands, containers, domain names, drivers, drivers, files, firewalls, firmware, User group, image, instance, network scan, kernel, session login, malicious knowledge base, module, named pipe, network share, network traffic, masquerade, cluster shared unit, process, scheduled task, script, device health status, service, snapshot , user accounts, storage units, network credentials, Windows registry, and WMI.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:可信验证模块的工作流程如下:网络安全管理平台采用可信验证模块对于重要资产进行防御;可信根根据平台要求对BIOS固件数据源进行监控度量,以确保BIOS固件数据在传输过程中的完整性和安全性;在通过可信根验证之后,可信验证模块将加载操作系统引导程序;在通过基本信任基的验证后,可信验证模块加载操作系统和应用程序,同时监控和度量动态目录和应用日志;在通过可信软件基的验证之后,可信验证模块将加载业务网络,并对网络连接的安全性和完整性进行检查。As a preferred solution of the ATT&CK-based network security event linkage processing system of the present invention, the workflow of the trusted verification module is as follows: the network security management platform uses the trusted verification module to defend important assets; the root of trust is based on The platform requires monitoring and measurement of the BIOS firmware data source to ensure the integrity and security of the BIOS firmware data during transmission; after passing the trusted root verification, the trusted verification module will load the operating system boot program; after passing the basic trust After the verification of the trusted software base, the trusted verification module loads the operating system and applications, while monitoring and measuring the dynamic directory and application logs; after passing the verification of the trusted software base, the trusted verification module loads the business network and checks the network connection. Security and integrity are checked.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:恶意代码监测模块的工作流程如下:根据系统安全情况和实际需求,网络安全管理平台判断是否需要下达管控指令;若满足下达管控指令的条件,网络安全管理平台则向防恶意代码客户端下达管控指令包括定时任务策略和库升级;防恶意代码客户端管理模块判断是否接收到了管控指令;若接收到管控指令,防恶意代码客户端管理模块则向防恶意代码客户端下达定时任务策略和库升级,并接收来自防恶意代码的查杀日志运行信息;恶意代码监测采集装置判断是否满足采集条件;若满足采集条件,恶意代码监测采集装置则从网络中采集恶意代码流量数据,并将这些数据传送给恶意代码分析模块;恶意代码分析模块判断是否满足分析处理条件;若满足分析处理条件,恶意代码分析模块则接收采集的流量数据和资产告警信息,并进行进一步的分析和处理以生成相应的告警日志;根据可信验证模块和恶意代码监测系统上送的告警信息,网络安全平台向管控模块下达管控命令,以实现对于资产的管控;根据情况和威胁等级,安全平台采用合适的管控手段来提高网络安全性。As a preferred solution of the ATT&CK-based network security event linkage processing system of the present invention, the workflow of the malicious code monitoring module is as follows: According to the system security situation and actual needs, the network security management platform determines whether it is necessary to issue control instructions; If the conditions for issuing control instructions are met, the network security management platform issues control instructions to the anti-malicious code client, including scheduled task strategies and library upgrades; the anti-malicious code client management module determines whether the control instructions are received; if the control instructions are received, The anti-malicious code client management module issues scheduled task strategies and library upgrades to the anti-malicious code client, and receives anti-malicious code killing log running information; the malicious code monitoring and collection device determines whether the collection conditions are met; if the collection conditions are met , the malicious code monitoring and collection device collects malicious code traffic data from the network and transmits these data to the malicious code analysis module; the malicious code analysis module determines whether the analysis and processing conditions are met; if the analysis and processing conditions are met, the malicious code analysis module receives The collected traffic data and asset alarm information are further analyzed and processed to generate corresponding alarm logs; based on the alarm information sent by the trusted verification module and malicious code monitoring system, the network security platform issues control commands to the management and control module to Realize the management and control of assets; according to the situation and threat level, the security platform adopts appropriate management and control methods to improve network security.
作为本发明所述基于ATT&CK的网络安全事件联动处置系统的一种优选方案,其中:满足下达管控指令的条件包括以下内容:网络安全管理平台根据实时监测的安全威胁情况判断是否需要下达管控指令,若存在高风险的恶意代码活动或其他安全威胁,网络安全管理平台将相应地下达管控指令;网络安全管理平台根据不同资产的安全等级和重要性判断是否需要下达管控指令,若某个资产被划定为高风险或具有重要性,网络安全管理平台将相应地下达管控指令;网络安全管理平台根据制定的安全策略和规则判断是否需要下达管控指令,若安全策略和规则指示需要对某个资产进行管控,网络安全管理平台将相应地下达管控指令;管理员根据自己的判断和经验,人工干预来决定是否下达管控指令,若管理员判断需要进行管控,网络安全管理平台会根据管理员的决策下达相应的管控指令。As a preferred solution of the ATT&CK-based network security event linkage processing system of the present invention, the conditions for satisfying the issuance of control instructions include the following: the network security management platform determines whether it is necessary to issue control instructions based on the real-time monitoring of security threats, If there are high-risk malicious code activities or other security threats, the network security management platform will issue control instructions accordingly; the network security management platform will judge whether it is necessary to issue control instructions based on the security levels and importance of different assets. If an asset is classified If it is determined to be high risk or important, the network security management platform will issue control instructions accordingly; the network security management platform will judge whether it is necessary to issue control instructions based on the established security policies and rules. If the security policies and rules indicate that an asset needs to be Control, the network security management platform will issue control instructions accordingly; the administrator decides whether to issue control instructions based on his or her own judgment and experience and manual intervention. If the administrator determines that control is needed, the network security management platform will issue control instructions based on the administrator's decision. Corresponding control instructions.
第二方面,本发明实施例提供了一种基于ATT&CK的网络安全事件联动处置方法,其包括威胁情报模块从商业数据库、恶意代码库、自有威胁情报数据以及国家级情报共享来源获取威胁情报信息,并将其上传至网络安全管理平台;网络安全平台根据威胁情报的特征和参考ATT&CK矩阵的战术和技术说明,对威胁情报进行分类和归并,形成威胁情报矩阵;根据威胁情报所涉及的战术和技术,参考ATT&CK矩阵数据源的特征,创建相应的威胁情报数据源;将数据源组成上传至数据源处理模块,对数据源进行分析和处理,以生成监测策略和管控手段,并将其上传至网络安全平台;网络安全平台根据上传的监测策略和管控手段向可信验证模块和恶意代码监测系统下达相应的策略和管控命令;可信验证模块和恶意代码监测系统将度量失败的日志和告警日志上传至网络安全管理平台;网络安全管理平台综合分析度量日志和告警日志,发现新的威胁情报,并将其传入威胁情报系统,以完善威胁情报信息;网络安全管理平台综合分析告警和日志信息,向管控模块下达相应的管控命令,及时采取相应的措施对存在安全问题的资产进行处置。In the second aspect, embodiments of the present invention provide a method for jointly processing network security events based on ATT&CK, which includes a threat intelligence module acquiring threat intelligence information from commercial databases, malicious code libraries, self-owned threat intelligence data, and national intelligence sharing sources. , and upload it to the network security management platform; the network security platform classifies and merges the threat intelligence based on the characteristics of the threat intelligence and the tactical and technical descriptions of the ATT&CK matrix to form a threat intelligence matrix; based on the tactics and technical descriptions involved in the threat intelligence technology, refer to the characteristics of ATT&CK matrix data sources to create corresponding threat intelligence data sources; upload the data source composition to the data source processing module, analyze and process the data sources to generate monitoring strategies and control methods, and upload them to Network security platform; the network security platform issues corresponding strategies and control orders to the trusted verification module and malicious code monitoring system based on the uploaded monitoring strategies and control methods; the trusted verification module and malicious code monitoring system will measure failed logs and alarm logs Upload to the network security management platform; the network security management platform comprehensively analyzes measurement logs and alarm logs, discovers new threat intelligence, and transmits it to the threat intelligence system to improve the threat intelligence information; the network security management platform comprehensively analyzes alarm and log information , issue corresponding control orders to the management and control module, and take corresponding measures in a timely manner to dispose of assets with safety problems.
第三方面,本发明实施例提供了一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其中:所述计算机程序指令被处理器执行时实现如本发明第一方面所述的基于ATT&CK的网络安全事件联动处置系统的步骤。In a third aspect, an embodiment of the present invention provides a computer device, including a memory and a processor. The memory stores a computer program, wherein: when the computer program instructions are executed by the processor, the computer program implements the method described in the first aspect of the present invention. The steps of the network security incident linkage handling system based on ATT&CK.
第四方面,本发明实施例提供了一种计算机可读存储介质,其上存储有计算机程序,其中:所述计算机程序指令被处理器执行时实现如本发明第一方面所述的基于ATT&CK的网络安全事件联动处置系统的步骤。In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium on which a computer program is stored, wherein: when the computer program instructions are executed by a processor, the ATT&CK-based method as described in the first aspect of the present invention is implemented. Steps of the network security incident linkage handling system.
本发明有益效果为:本发明通过利用ATT&CK矩阵实现威胁情报系统、可信验证模块和恶意代码监测系统的联动,将威胁情报信息以ATT&CK技术角度进行分类,并根据技术特点针对数据源进行监测,提出了新的网络安全事件处置流程,可以有效提高威胁情报处理效率、识别威胁源头,并改进网络安全事件的处置方式,从而提升网络安全防护的整体能力。The beneficial effects of the present invention are: the present invention realizes the linkage of the threat intelligence system, the trusted verification module and the malicious code monitoring system by utilizing the ATT&CK matrix, classifies the threat intelligence information from the perspective of ATT&CK technology, and monitors the data source according to the technical characteristics. A new network security incident handling process is proposed, which can effectively improve the efficiency of threat intelligence processing, identify threat sources, and improve the handling of network security incidents, thereby improving the overall ability of network security protection.
附图说明Description of the drawings
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to explain the technical solutions of the embodiments of the present invention more clearly, the drawings needed to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. Those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts.
图1为基于ATT&CK的网络安全事件联动处置系统的系统流程图。Figure 1 is the system flow chart of the network security event linkage processing system based on ATT&CK.
图2为基于ATT&CK的网络安全事件联动处置系统的威胁情报系统信息来源示意图。Figure 2 is a schematic diagram of the information sources of the threat intelligence system of the network security event linkage processing system based on ATT&CK.
图3为基于ATT&CK的网络安全事件联动处置系统的可信验证模块组成及工作原理示意图。Figure 3 is a schematic diagram of the composition and working principle of the trusted verification module of the network security event linkage processing system based on ATT&CK.
图4为基于ATT&CK的网络安全事件联动处置系统的恶意代码监测模块组成及工作原理示意图。Figure 4 is a schematic diagram of the composition and working principle of the malicious code monitoring module of the network security event linkage processing system based on ATT&CK.
图5为基于ATT&CK的网络安全事件联动处置系统的网络安全管理平台数据源监测效果图。Figure 5 shows the data source monitoring renderings of the network security management platform based on the ATT&CK network security event linkage processing system.
图6为基于ATT&CK的网络安全事件联动处置系统的网络安全管理平台联动分析效果图。Figure 6 shows the linkage analysis renderings of the network security management platform based on the ATT&CK network security event linkage processing system.
具体实施方式Detailed ways
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合说明书附图对本发明的具体实施方式做详细的说明。In order to make the above objects, features and advantages of the present invention more obvious and understandable, the specific implementation modes of the present invention will be described in detail below with reference to the accompanying drawings.
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是本发明还可以采用其他不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本发明内涵的情况下做类似推广,因此本发明不受下面公开的具体实施例的限制。Many specific details are set forth in the following description to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Those skilled in the art can do so without departing from the connotation of the present invention. Similar generalizations are made, and therefore the present invention is not limited to the specific embodiments disclosed below.
其次,此处所称的“一个实施例”或“实施例”是指可包含于本发明至少一个实现方式中的特定特征、结构或特性。在本说明书中不同地方出现的“在一个实施例中”并非均指同一个实施例,也不是单独的或选择性的与其他实施例互相排斥的实施例。Second, reference herein to "one embodiment" or "an embodiment" refers to a specific feature, structure, or characteristic that may be included in at least one implementation of the present invention. "In one embodiment" appearing in different places in this specification does not all refer to the same embodiment, nor is it a separate or selective embodiment that is mutually exclusive with other embodiments.
实施例1Example 1
参照图1~图6,为本发明第一个实施例,该实施例提供了一种基于ATT&CK的网络安全事件联动处置系统,包括,Referring to Figures 1 to 6, a first embodiment of the present invention is provided. This embodiment provides a network security event linkage processing system based on ATT&CK, including:
威胁情报模块,用于收集威胁情报信息,并将所述威胁情报信息上传至数据源处理模块。The threat intelligence module is used to collect threat intelligence information and upload the threat intelligence information to the data source processing module.
具体的,网络安全管理平台根据接收到威胁情报的信息,对威胁情报信息进行分类;通过分析威胁的特点和危害性,将威胁情报信息归入相应的ATT&CK战术阶段;将威胁信息与ATT&CK矩阵战术阶段中的技术特点进行比对,若威胁信息符合某个ATT&CK战术阶段的技术特点,则将此威胁信息归并入该战术阶段的技术矩阵,若威胁信息符合多个ATT&CK战术阶段的技术特点,则将该威胁信息归并入多个相应的技术矩阵;逐步累积威胁信息的归并,以形成网络安全管理平台特有的威胁情报矩阵;根据威胁情报所属的技术特点确定监测数据源,以形成威胁情报数据源。Specifically, the network security management platform classifies the threat intelligence information based on the received threat intelligence information; by analyzing the characteristics and harmfulness of the threats, the threat intelligence information is classified into the corresponding ATT&CK tactical stage; the threat information is combined with the ATT&CK matrix tactics Compare the technical characteristics in each stage. If the threat information matches the technical characteristics of a certain ATT&CK tactical stage, then the threat information is merged into the technical matrix of that tactical stage. If the threat information matches the technical characteristics of multiple ATT&CK tactical stages, then Merge the threat information into multiple corresponding technical matrices; gradually accumulate threat information to form a threat intelligence matrix unique to the network security management platform; determine the monitoring data source according to the technical characteristics of the threat intelligence to form a threat intelligence data source .
需要说明的是,ATT&CK战术阶段包括侦察、资源开发、初始访问、执行、持久化、权限提升、防御规避、凭证获取、发现、横向移动、收集、命令与控制、数据泄露以及影响,共14个战术阶段。It should be noted that the ATT&CK tactical phases include reconnaissance, resource development, initial access, execution, persistence, privilege escalation, defense evasion, credential acquisition, discovery, lateral movement, collection, command and control, data leakage and impact, a total of 14 Tactical stage.
优选的,威胁情报数据源包括动态目录、应用日志、证书、云服务、云存储、命令、容器、域名、驱动、驱动程序、文件、防火墙、固件、用户组、镜像、实例、网络扫描、内核、会话登录、恶意知识库、模块、命名管道、网络共享、网络流量、伪装、集群共享单元、进程、计划任务、脚本、设备健康状态、服务、快照、用户账户、存储单元、网络凭证、Windows注册表以及WMI共37项。Preferably, threat intelligence data sources include dynamic directories, application logs, certificates, cloud services, cloud storage, commands, containers, domain names, drivers, drivers, files, firewalls, firmware, user groups, images, instances, network scans, and kernels. , session login, malicious knowledge base, module, named pipe, network share, network traffic, masquerading, cluster shared unit, process, scheduled task, script, device health, service, snapshot, user account, storage unit, network credentials, Windows There are 37 entries in the registry and WMI.
具体的,动态目录指的是允许管理员管理权限、访问网络资源和存储数据对象(用户、用户组、应用或者设备)的数据库和服务集,包括动态目录凭证请求、动态目录对象访问、动态目录对象创建、动态目录对象删除以及动态目录对象修改。动态目录凭证请求是指用户请求的动态目录凭证(例如工单或令牌),用于验证和授权身份,管理员通过处理这些凭证请求,使用户能够进行相应的权限操作,以满足其访问网络资源和执行特定任务的需求;动态目录对象创建是指初始化构建一个新的动态目录对象;动态目录对象删除是指移除不再需要的动态目录对象;动态目录对象修改指的是对现有的动态目录对象进行更改。Specifically, dynamic directory refers to the set of databases and services that allow administrators to manage permissions, access network resources, and store data objects (users, user groups, applications, or devices), including dynamic directory credential requests, dynamic directory object access, and dynamic directory Object creation, dynamic directory object deletion, and dynamic directory object modification. Dynamic directory credential requests refer to dynamic directory credentials requested by users (such as work orders or tokens), which are used to verify and authorize identities. Administrators process these credential requests to enable users to perform corresponding permission operations to satisfy their access to the network. Resources and requirements for performing specific tasks; dynamic directory object creation refers to the initial construction of a new dynamic directory object; dynamic directory object deletion refers to the removal of dynamic directory objects that are no longer needed; dynamic directory object modification refers to the modification of existing Dynamic directory objects are changed.
进一步的,应用日志指的是被第三方服务收集的事件,该数据源主要包含应用日志内容项,应用日志内容指的是第三方服务提供的日志记录、消息和其它构件;证书指的是突出显示诸如所有者信息的数字文件,用于逐级信任在网络通信过程中使用的公钥,该数据源主要包含证书注册项,证书注册指的是查询或记录信息突出显示当前和过期的数字证书。Further, application logs refer to events collected by third-party services. This data source mainly includes application log content items. Application log content refers to log records, messages and other components provided by third-party services; certificates refer to outstanding Displays digital files such as owner information, used for hierarchical trust of public keys used in network communications. This data source mainly contains certificate registration items. Certificate registration refers to querying or recording information. Highlights current and expired digital certificates. .
进一步的,云服务是指通过网络连接和/或API使用户能够使用的基础设施、平台或由第三方供应商提供的软件,主要包括云服务停止、云服务列举和云服务修改;云服务停止指的是将云服务停用或停止,云服务列举指的是提取云服务的列表,云服务修改指的是对云服务进行更改包括其设置和/或数据。Further, cloud services refer to infrastructure, platforms or software provided by third-party suppliers that enable users to use through network connections and/or APIs, mainly including cloud service cessation, cloud service enumeration and cloud service modification; cloud service cessation It refers to deactivating or stopping the cloud service, cloud service enumeration refers to extracting the list of cloud services, and cloud service modification refers to making changes to the cloud service including its settings and/or data.
优选的,云存储是通过网络连接和/或API使用户可以使用的由第三方供应商提供或托管的数据对象存储基础设施,云存储的主要操作包括云存储访问、云存储创建、云存储删除、云存储列举、云存储元数据和云存储修改;命令是给计算机程序的指令,用于执行特定的任务,主要包含命令执行项,指定执行命令所需的参数和选项。Preferably, cloud storage is a data object storage infrastructure provided or hosted by a third-party provider that users can use through network connections and/or APIs. The main operations of cloud storage include cloud storage access, cloud storage creation, and cloud storage deletion. , cloud storage enumeration, cloud storage metadata and cloud storage modification; commands are instructions given to computer programs to perform specific tasks. They mainly include command execution items and specify the parameters and options required to execute the command.
进一步的,容器是一种标准化的可移植单元,其中包含了应用程序及其所有依赖项和配置信息,以便在不同的计算环境中快速、可靠地运行,容器主要包含容器创建、容器列举以及容器启用;域名是一个可读的名称,用于获取一个或多个与之对应的IP地址信息,域名主要包括主动DNS、域名注册和被动DNS。Furthermore, a container is a standardized portable unit that contains an application and all its dependencies and configuration information to run quickly and reliably in different computing environments. The container mainly includes container creation, container enumeration and container Enable; the domain name is a readable name used to obtain one or more corresponding IP address information. The domain name mainly includes active DNS, domain name registration and passive DNS.
进一步的,驱动是一种非易失性数据存储设备,如硬盘驱动、软盘驱动、USB闪存驱动等,它至少具有一个格式化分区,驱动的主要操作包括驱动访问、驱动创建和驱动修改。驱动访问指的是打开一个被分配驱动号或挂载点的数据存储设备;驱动创建指的是为一个数据存储设备初始化分配一个驱动号或挂载点;驱动修改指的是对于一个数据存储设备的驱动号或挂载点做出的改变。Further, a driver is a non-volatile data storage device, such as a hard disk drive, floppy disk drive, USB flash drive, etc. It has at least one formatted partition. The main operations of the driver include driver access, driver creation and driver modification. Driver access refers to opening a data storage device that is assigned a drive letter or mount point; driver creation refers to initializing a data storage device and assigning a drive letter or mount point; driver modification refers to assigning a drive letter or mount point to a data storage device. Changes made to the drive letter or mount point.
进一步的,驱动程序指的是操作或控制连接于计算机的特定类型设备的计算机程序,该数据源主要包含驱动程序加载和驱动程序元数据两项。驱动程序加载指的是将驱动程序附加到系统的用户或内核模式;驱动程序元数据指的是驱动程序及其相关的活动相关的上下文数据,比如驱动程序问题报告或完整性校验。Further, a driver refers to a computer program that operates or controls a specific type of device connected to the computer. The data source mainly includes driver loading and driver metadata. Driver loading refers to attaching a driver to the system in user or kernel mode; driver metadata refers to contextual data about the driver and its associated activities, such as driver problem reporting or integrity checks.
进一步的,文件指的是由I/O系统管理的一种计算机资源对象,用于存储数据(例如图像、文本、视频、计算机程序或其他各种各样的媒体),该数据源主要包含文件访问、文件创建、文件删除、文件元数据以及文件修改。防火墙是一种网络安全系统,作为本地终端或远程服务运行,基于预设规则来监视和控制进出网络的流量,防火墙的主要操作包括防火墙关闭、防火墙列举、防火墙元数据以及防火墙规则修改。Further, a file refers to a computer resource object managed by the I/O system and used to store data (such as images, text, videos, computer programs or other various media). The data source mainly contains files. Access, file creation, file deletion, file metadata, and file modification. A firewall is a network security system that runs as a local terminal or a remote service to monitor and control traffic in and out of the network based on preset rules. The main operations of the firewall include firewall shutdown, firewall enumeration, firewall metadata, and firewall rule modification.
具体的,固件指的是提供对于主机设备和硬件的底层控制的计算机软件,比如BIOS或UEFI/EFI,该数据源主要包含固件修改项,固件修改指的是对于固件的改变,包括它的设置和/或数据,比如MBR和VBR;用户组指的是共享对计算机和/或网络资源的相同访问权限并具有相同安全权限的多个用户账户的集合,该数据源主要包含用户组列举、用户组元数据以及用户组修改;镜像指的是用于将虚拟机/可引导磁盘部署到本地或第三方云环境中的单个文件,该数据源主要包含镜像创建、镜像删除、镜像元数据以及镜像修改。Specifically, firmware refers to computer software that provides low-level control of host devices and hardware, such as BIOS or UEFI/EFI. This data source mainly contains firmware modification items. Firmware modification refers to changes to the firmware, including its settings. and/or data, such as MBR and VBR; a user group refers to a collection of multiple user accounts that share the same access rights to computer and/or network resources and have the same security rights. This data source mainly includes user group enumeration, user Group metadata and user group modification; an image refers to a single file used to deploy a virtual machine/bootable disk to a local or third-party cloud environment. This data source mainly includes image creation, image deletion, image metadata, and images Revise.
优选的,实例指的是运行工作负载的虚拟服务器环境,托管于本地或由第三方云供应商提供,该数据源包含实例创建、实例删除、实例列举、实例元数据、实例修改、实例开启以及实例停止;网络扫描指的是获取有关连接到公共互联网的各种资源和服务器的信息,该数据源包括应答内容和应答元数据,应答内容指的是记录的网络流量对于扫描的响应,并显示协议头和协议体内容;应答元数据指的是从扫描中收集到的关于面向网络资源的上下文数据,比如运行的服务或端口。Preferably, the instance refers to the virtual server environment running the workload, hosted locally or provided by a third-party cloud provider. The data source includes instance creation, instance deletion, instance enumeration, instance metadata, instance modification, instance startup and The instance is stopped; network scanning refers to obtaining information about various resources and servers connected to the public Internet. This data source includes response content and response metadata. The response content refers to the recorded network traffic response to the scan and displays Protocol header and protocol body content; response metadata refers to contextual data about network resources collected from the scan, such as running services or ports.
进一步的,内核指的是位于计算机操作系统核心的一种计算机程序,驻留于内存之中,用于促进硬件和软件组件之间的交互。该数据源主要包括内核模块加载项。内核模块加载指的是,包含扩展操作系统正在运行的内核的代码的对象文件,通常用于添加对新硬件(作为设备驱动程序)和/或文件系统的支持,或添加系统调用。Further, the kernel refers to a computer program located at the core of a computer operating system, resident in memory, and used to facilitate the interaction between hardware and software components. This data source mainly includes kernel module add-ons. Kernel module loads are object files that contain code that extends the operating system's running kernel, typically to add support for new hardware (as device drivers) and/or file systems, or to add system calls.
具体的,内核指的是位于计算机操作系统核心的一种计算机程序,驻留于内存之中,用于促进硬件和软件组件之间的交互,该数据源主要包括内核模块加载项。内核模块加载指的是包含扩展操作系统正在运行的内核的代码的对象文件,通常用于添加对新硬件(作为设备驱动程序)和/或文件系统的支持,或添加系统调用。Specifically, the kernel refers to a computer program located at the core of a computer operating system, which resides in memory and is used to facilitate the interaction between hardware and software components. This data source mainly includes kernel module add-ons. Kernel module loads refer to object files that contain code that extends the operating system's running kernel, typically to add support for new hardware (as device drivers) and/or file systems, or to add system calls.
进一步的,会话登录指的是发生在系统或资源上的登录,用户/设备在成功的身份验证和授权后获得访问权限,该数据源包含会话登录创建和会话登录元数据。会话登录创建指的是在身份验证尝试之后,成功的新用户登录的初始化构建。会话登录元数据指的是登录会话的上下文数据(如用户名、登录方式、令牌获取)以及会话登录下的相关活动。Further, a session login refers to a login that occurs on a system or resource and a user/device gains access after successful authentication and authorization. This data source contains session login creation and session login metadata. Session login creation refers to the initial build of a successful new user login after an authentication attempt. Session login metadata refers to the context data of the login session (such as user name, login method, token acquisition) and related activities under session login.
优选的,恶意知识库指的是攻击者使用的恶意软件相关的信息获取,该数据源包含恶意内容和恶意元数据。恶意内容指的是恶意载荷中的代码、字符串以及其他具有破坏性的标志。恶意元数据指的是关于恶意载荷的上下文数据(如编译时间、文件hash、水印)或其他可识别的配置信息。Preferably, the malicious knowledge base refers to the acquisition of information related to malware used by attackers, and the data source contains malicious content and malicious metadata. Malicious content refers to codes, strings, and other destructive signs in malicious payloads. Malicious metadata refers to contextual data about the malicious payload (such as compilation time, file hash, watermark) or other identifiable configuration information.
进一步的,模块指的是由一个或更多共享类和接口组成的可执行文件,如可移植PE格式的二进制文件/动态链接库(DLL)、可执行与可链接格式(ELF)二进制文件/共享库以及MACH-O格式二进制文件/共享库,该数据源包含模块加载项。模块加载指的是将模块附加到进程/程序的内存中,通常是为了访问模块提供的共享资源/特性。Further, a module refers to an executable file composed of one or more shared classes and interfaces, such as a portable PE format binary file/dynamic link library (DLL), an executable and linkable format (ELF) binary file/ Shared libraries as well as MACH-O format binaries/shared libraries, this data source contains module add-ons. Module loading refers to attaching a module into the memory of a process/program, usually to access shared resources/features provided by the module.
进一步的,命名管道通常指的是,以文件的形式存在,并附加进程到机制中,该机制允许进程间在本地或通过网络通信,该数据源包含命名管道元数据。命名管道元数据指的是在系统上关于命名管道的上下文数据,包括管道名称和创建进程。Further, a named pipe usually refers to a data source that exists in the form of a file and is attached to a mechanism that allows inter-process communication locally or over a network. The data source contains named pipe metadata. Named pipe metadata refers to the contextual data about the named pipe on the system, including the pipe name and the creation process.
进一步的,网络共享指的是使用网络协议从一台主机提供给其他主机的存储资源(通常是文件夹或驱动),该数据源包含网络共享访问。网络共享访问指的是,打开一个网络共享,使得请求者可以访问内容。Further, a network share refers to a storage resource (usually a folder or drive) provided from one host to other hosts using network protocols. The data source includes network share access. Network share access refers to opening a network share so that the requester can access the content.
进一步的,网络流量指的是通过网络传输的数据,这些数据要么是被总结的,要么被捕获为可分析格式的原始数据,该数据源包含网络连接创建、网络流量内容以及网络流量数据流。网络连接创建指的是网络连接的初始化构建,比如使用源/目标IP地址和端口捕获套接字信息;网络流量内容指的是记录网络流量数据,并显示协议头和协议体内容;网络流量数据流指的是汇总的网络包数据,包括协议头和容量等指标。Further, network traffic refers to data transmitted over the network that is either summarized or captured as raw data in an analyzable format. This data source includes network connection creation, network traffic content, and network traffic data streams. Network connection creation refers to the initial construction of a network connection, such as capturing socket information using source/destination IP addresses and ports; network traffic content refers to recording network traffic data and displaying protocol header and protocol body content; network traffic data Flow refers to summarized network packet data, including indicators such as protocol headers and capacity.
进一步的,伪装指的是被攻击者使用的代表用户的一个恶意的在线配置文件,用于社工该用户或其他目标受害者,该数据源包含社交媒体;社交媒体指的是以建立、破坏或其他方式获得的集群共享单元指的是集群中的资源共享单元,由一个或多个容器组成,该数据源包含集群共享单元创建、集群共享单元列举以及集群共享单元修改;集群共享单元创建指的是初始化一个新的集群共享单元;集群共享单元列举指的是集群内的集群共享单元的提取列表;集群共享单元修改指的是对于集群共享单元的改变,包括它的设置和/或控制数据。Further, disguise refers to a malicious online profile used by an attacker on behalf of a user to social engineer the user or other target victims. The data source includes social media; social media refers to a malicious online profile that is used to create, destroy, or The cluster shared unit obtained in other ways refers to the resource sharing unit in the cluster, which is composed of one or more containers. The data source includes cluster shared unit creation, cluster shared unit enumeration, and cluster shared unit modification; cluster shared unit creation refers to It is to initialize a new cluster shared unit; cluster shared unit enumeration refers to the extracted list of cluster shared units in the cluster; cluster shared unit modification refers to changes to the cluster shared unit, including its settings and/or control data.
进一步的,进程指的是被至少一个线程执行的电脑程序的实例,进程具有用于进程可执行文件、加载模块(DLL或共享库)的内存空间,以及分配的内存区域,这些区域包含从用户输入到特定于应用程序的数据结构的所有内容;进程包含操作系统API执行、进程访问、进程创建、进程元数据、进程修改以及进程终结;操作系统API执行指的是由进程执行的操作系统功能/方法调用;进程访问指的是由另一个进程打开一个进程,通常是为了读取目标进程的内存;进程创建指的是操作系统管理的可执行初始化构建,可能涉及一个或多个任务或线程;进程元数据指的是一个运行进程相关的上下文数据,可能包含信息如环境变量、镜像名称、用户/所有者等等;进程修改指的是对于进程或它的内容的改变,通常在目标进程内存中写入和/或执行代码;进程终结指的是退出一个运行的进程。Further, a process refers to an instance of a computer program executed by at least one thread. A process has memory space for the process executable file, loaded modules (DLL or shared libraries), and allocated memory areas that contain data from the user. Everything input to application-specific data structures; process includes operating system API execution, process access, process creation, process metadata, process modification, and process termination; operating system API execution refers to the operating system functions performed by the process /Method call; process access refers to the opening of a process by another process, usually to read the target process's memory; process creation refers to the operating system managed executable initialization build, which may involve one or more tasks or threads ; Process metadata refers to contextual data related to a running process, which may include information such as environment variables, image names, users/owners, etc.; Process modification refers to changes to the process or its contents, usually in the target process Writing and/or executing code in memory; process termination refers to exiting a running process.
进一步的,计划任务指的是在特定时间自动执行的任务或在后台重复执行日常表的任务,该数据源包含计划任务创建、计划任务元数据以及计划任务修改;脚本指的是允许按顺序执行的包含一系列命令的文件或指令流,该数据源包含脚本执行;设备健康状态指的是来自主机自动测量的信息,提供关于系统状态、错误或其他重要功能活动的情况,该数据源包含主机状态,主机状态指的是记录、通信和其他显示主机传感器健康状态的工件。Furthermore, scheduled tasks refer to tasks that are automatically executed at a specific time or tasks that repeatedly execute daily tables in the background. The data source includes scheduled task creation, scheduled task metadata, and scheduled task modifications; scripts refer to tasks that allow sequential execution. A file or instruction stream that contains a series of commands. The data source contains script execution. Device health refers to information automatically measured from the host, providing information about system status, errors, or other important functional activities. The data source contains the host. Status. Host status refers to logging, communications, and other artifacts that display the health of the host's sensors.
进一步的,服务指的是一种计算机进程,配置为在后台连续执行并执行系统任务,在某些情况下在任何用户登录之前执行,该数据源包含服务创建、服务元数据以及服务修改;快照指的是可以在云环境中创建和/或部署的某一时间点的云存储单元情况(文件、设置等等),快照包含快照创建、快照删除、快照列举、快照元数据以及快照修改。Further, a service refers to a computer process configured to continuously execute and perform system tasks in the background, in some cases before any user logs in. This data source contains service creation, service metadata, and service modifications; snapshot Refers to the cloud storage unit situation (files, settings, etc.) at a certain point in time that can be created and/or deployed in the cloud environment. Snapshots include snapshot creation, snapshot deletion, snapshot enumeration, snapshot metadata, and snapshot modifications.
优选的,用户账户表示用于验证和访问资源的用户、设备、服务或应用程序的配置文件,该数据源包含用户账户认证、用户账户创建、用户账户删除、用户账户元数据以及用户账户修改。存储单元指的是由本地或第三方供应商承载的块对象存储,通常作为虚拟化硬件驱动提供给资源,该数据源包含存储单元创建、存储单元删除、存储单元列举、存储单元元数据以及存储单元修改。Preferably, the user account represents a profile of a user, device, service or application used to authenticate and access resources, and the data source includes user account authentication, user account creation, user account deletion, user account metadata and user account modification. Storage units refer to block object storage hosted by local or third-party providers. They are usually provided to resources as virtualization hardware drivers. This data source includes storage unit creation, storage unit deletion, storage unit enumeration, storage unit metadata, and storage Unit modifications.
进一步的,网络凭证指的是用于网络应用和服务认证的凭证材料(比如会话cookie或令牌),该数据源包含网络凭证创建和网络凭证利用;Windows注册指的是WindowsOS分层数据库,用于存储软件程序、硬件设备、用户首选项和操作系统配置的大部分信息和设置,该数据源包含windows注册项访问、windows注册项创建、windows注册项删除以及windows注册项修改;WMI指的是用于管理数据和操作的基础设施,它使得本地和远程管理Windows个人计算机和服务器成为可能,该数据源包含WMI创建。Further, network credentials refer to credential materials (such as session cookies or tokens) used for network application and service authentication. This data source includes network credential creation and network credential utilization; Windows registration refers to the WindowsOS hierarchical database, used Used to store most information and settings for software programs, hardware devices, user preferences, and operating system configurations. This data source includes Windows registry access, Windows registry creation, Windows registry deletion, and Windows registry modification; WMI refers to Infrastructure for managing data and operations, which makes it possible to manage Windows PCs and servers locally and remotely, this data source contains WMI creation.
数据源处理模块,用于接收并分析威胁情报模块上传的威胁情报信息,以生成监测策略和管控手段。The data source processing module is used to receive and analyze the threat intelligence information uploaded by the threat intelligence module to generate monitoring strategies and control methods.
进一步的,威胁情报数据源将数据源的组成上传至数据源处理模块,数据源处理模块根据数据源的情况,分析形成监测策略和管控手段上传至网络安全管理平台。Further, the threat intelligence data source uploads the composition of the data source to the data source processing module. The data source processing module analyzes and forms monitoring strategies and control methods based on the situation of the data source and uploads them to the network security management platform.
可信验证模块,用于根据所述数据源处理模块生成的监测策略和管控手段对资产进行验证和评估,并生成度量结果。The trusted verification module is used to verify and evaluate assets based on the monitoring strategies and control methods generated by the data source processing module, and generate measurement results.
进一步的,网络安全管理平台采用可信验证模块对于重要资产进行防御;可信根根据平台要求对BIOS固件数据源进行监控度量,以确保BIOS固件数据在传输过程中的完整性和安全性;在通过可信根验证之后,可信验证模块将加载操作系统引导程序;在通过基本信任基的验证后,可信验证模块加载操作系统和应用程序,同时监控和度量动态目录和应用日志;在通过可信软件基的验证之后,可信验证模块将加载业务网络,并对网络连接的安全性和完整性进行检查。Furthermore, the network security management platform uses a trusted verification module to defend important assets; the trusted root monitors and measures the BIOS firmware data source according to platform requirements to ensure the integrity and security of the BIOS firmware data during transmission; in After passing the trusted root verification, the trusted verification module will load the operating system boot program; after passing the basic trust base verification, the trusted verification module loads the operating system and applications, while monitoring and measuring the dynamic directory and application logs; after passing the basic trust base verification, After the verification of the trusted software base, the trusted verification module will load the business network and check the security and integrity of the network connection.
需要说明的是,可信根主要是为可信验证模块提供密码计算、可信基准值存储、策略存储等基础服务。对于可信根的验证,主要是针对可信根所具备的功能及使用的密码算法是否满足国家、行业的要求。在系统引导阶段,对系统启动程序目录下的关键文件(如内核文件、初始盘文件、程序文件、配置文件等)进行静态度量并校验,如果校验通过,系统引导程序可正常加载启动;如果校验失败,主动阻断系统的启动,形成审计记录。It should be noted that the trusted root mainly provides basic services such as password calculation, trusted reference value storage, and policy storage for the trusted verification module. The verification of the trusted root mainly focuses on whether the functions of the trusted root and the cryptographic algorithms used meet national and industry requirements. During the system boot phase, the key files in the system boot program directory (such as kernel files, initial disk files, program files, configuration files, etc.) are statically measured and verified. If the verification passes, the system boot program can be loaded and started normally; If the verification fails, the system will be actively blocked from starting and an audit record will be formed.
优选的,在受保护系统程序(系统内核层程序、系统文件等)加载时,可信验证模块应检查其绝对路径、文件名、文件内容的正确性,对其进行静态度量并校验。如果校验通过,系统程序可正常加载启动;如果校验失败,主动阻断系统程序的启动,形成审计记录并告警。Preferably, when a protected system program (system kernel layer program, system file, etc.) is loaded, the trusted verification module should check the correctness of its absolute path, file name, and file content, and perform static measurement and verification on it. If the verification passes, the system program can be loaded and started normally; if the verification fails, the system program will be actively blocked from starting, and an audit record will be formed and an alarm will be generated.
进一步的,可信验证模块能识别并主动阻断对受保护系统程序的删除、篡改等行为,形成审计记录。在受保护应用程序(动态库、可执行程序等)加载时,可信验证模块应检查应用程序的绝对路径、文件名、文件内容的正确性,对其进行静态度量并校验。如果校验通过,应用程序可正常加载启动;如果校验失败,主动阻断应用程序的启动,形成审计记录并告警;Furthermore, the trusted verification module can identify and proactively block deletion and tampering of protected system programs to form audit records. When a protected application (dynamic library, executable program, etc.) is loaded, the trusted verification module should check the correctness of the application's absolute path, file name, and file content, perform static measurements and verify it. If the verification passes, the application can be loaded and started normally; if the verification fails, the startup of the application is actively blocked, an audit record is formed, and an alarm is generated;
进一步的,可信验证模块能识别并主动阻断对受保护应用程序的删除、篡改等行为,形成审计记录并告警;等保三级以上系统对应用程序的所有执行环节进行动态度量。度量对象包括程序进程代码段、内存代码段和只读数据段等,度量元素包括代码段、数据段长度、内容等。如果度量通过,应用程序可继续运行;如果度量失败,形成审计记录并告警。Furthermore, the trusted verification module can identify and proactively block deletion and tampering of protected applications, and form audit records and alerts; systems with Level 3 or above dynamic measurement of all execution links of applications. Measurement objects include program process code segments, memory code segments, read-only data segments, etc. Measurement elements include code segments, data segment length, content, etc. If the measurement passes, the application can continue to run; if the measurement fails, an audit record is formed and an alarm is generated.
优选的,可信验证模块提供身份可信验证,实现对用户组、用户账户等数据源的验证;提供程序执行可信验证,实现对可执行文件、内核模块、脚本等数据源的验证;提供存储可信验证,实现对证书、存储单元等数据源的验证;提供行为可信验证,实现对文件、进程等数据源的操作行为的验证;对于未通过验证的数据源及其操作实现阻断,并记录告警上报平台。Preferably, the trusted verification module provides identity trusted verification to implement verification of data sources such as user groups and user accounts; provides a program to perform trusted verification to implement verification of data sources such as executable files, kernel modules, and scripts; provides Storage trusted verification enables verification of data sources such as certificates and storage units; provides behavioral trusted verification to verify the operational behavior of data sources such as files and processes; and blocks data sources and operations that have not passed verification. , and record alarms and report them to the platform.
管控模块,用于根据所述数据源处理模块生成的管控手段和所述恶意代码监测模块的检测结果,对存在安全问题的资产采取管控措施。A management and control module, configured to take management and control measures for assets with security problems based on the management and control means generated by the data source processing module and the detection results of the malicious code monitoring module.
进一步的,对于网络安全管理平台管控其他资产采用恶意代码监测系统进行防御;恶意代码监测系统主要由防恶意代码客户端管理模块、防恶意代码客户端、恶意代码流量监测采集装置以及恶意代码分析模块四个部分组成,通过与网络安全管理平台交互实现相应功能。Furthermore, the malicious code monitoring system is used for defense against other assets controlled by the network security management platform; the malicious code monitoring system mainly consists of an anti-malicious code client management module, an anti-malicious code client, a malicious code traffic monitoring and collection device, and a malicious code analysis module. It consists of four parts and realizes corresponding functions by interacting with the network security management platform.
进一步的,恶意代码监测模块的工作流程如下:根据系统安全情况和实际需求,网络安全管理平台判断是否需要下达管控指令;若满足下达管控指令的条件,网络安全管理平台则向防恶意代码客户端下达管控指令包括定时任务策略和库升级;防恶意代码客户端管理模块判断是否接收到了管控指令;若接收到管控指令,防恶意代码客户端管理模块则向防恶意代码客户端下达定时任务策略和库升级,并接收来自防恶意代码客户端的查杀日志运行信息;恶意代码监测采集装置判断是否满足采集条件;若满足采集条件,恶意代码监测采集装置则从网络中采集恶意代码流量数据,并将这些数据传送给恶意代码分析模块;恶意代码分析模块判断是否满足分析处理条件;若满足分析处理条件,恶意代码分析模块则接收采集的流量数据和资产告警信息,并进行进一步的分析和处理以生成相应的告警日志;根据可信验证模块和恶意代码监测系统上送的告警信息,网络安全平台向管控模块下达管控命令,以实现对于资产的管控;根据实际情况和威胁等级,安全平台采用合适的管控手段来提高网络安全性。Furthermore, the workflow of the malicious code monitoring module is as follows: Based on the system security situation and actual needs, the network security management platform determines whether it is necessary to issue control instructions; if the conditions for issuing control instructions are met, the network security management platform will issue a request to the anti-malicious code client Issuing control instructions includes scheduled task strategies and library upgrades; the anti-malicious code client management module determines whether the control instructions are received; if the control instructions are received, the anti-malicious code client management module issues scheduled task strategies and The library is upgraded and receives the killing log running information from the anti-malicious code client; the malicious code monitoring and collection device determines whether the collection conditions are met; if the collection conditions are met, the malicious code monitoring and collection device collects the malicious code traffic data from the network and sends it These data are sent to the malicious code analysis module; the malicious code analysis module determines whether the analysis and processing conditions are met; if the analysis and processing conditions are met, the malicious code analysis module receives the collected traffic data and asset alarm information, and conducts further analysis and processing to generate Corresponding alarm logs; based on the alarm information sent by the trusted verification module and malicious code monitoring system, the network security platform issues management and control commands to the management and control module to achieve asset management and control; based on the actual situation and threat level, the security platform adopts appropriate Control measures to improve network security.
需要说明的是,满足下达管控指令的条件包括以下内容:网络安全管理平台根据实时监测的安全威胁情况判断是否需要下达管控指令,若存在高风险的恶意代码活动或其他安全威胁,网络安全管理平台将相应地下达管控指令;网络安全管理平台根据不同资产的安全等级和重要性判断是否需要下达管控指令,若某个资产被划定为高风险或具有重要性,网络安全管理平台将相应地下达管控指令;网络安全管理平台根据制定的安全策略和规则判断是否需要下达管控指令,若安全策略和规则指示需要对某个资产进行管控,网络安全管理平台将相应地下达管控指令;管理员根据自己的判断和经验,人工干预来决定是否下达管控指令,若管理员判断需要进行管控,网络安全管理平台会根据管理员的决策下达相应的管控指令。It should be noted that the conditions for issuing control instructions include the following: The network security management platform determines whether to issue control instructions based on real-time monitoring of security threats. If there are high-risk malicious code activities or other security threats, the network security management platform Control instructions will be issued accordingly; the network security management platform will determine whether it is necessary to issue control instructions based on the security levels and importance of different assets. If an asset is classified as high risk or important, the network security management platform will issue it accordingly. Management and control instructions; the network security management platform determines whether it is necessary to issue control instructions based on the established security policies and rules. If the security policies and rules indicate that an asset needs to be controlled, the network security management platform will issue control instructions accordingly; the administrator will issue control instructions according to his or her own Judgment and experience, manual intervention is used to decide whether to issue control instructions. If the administrator determines that control is needed, the network security management platform will issue corresponding control instructions based on the administrator's decision.
需要注意的是,具体的采集条件会根据恶意代码监测采集装置的设置、策略和需求而有所差异。It should be noted that the specific collection conditions will vary according to the settings, strategies and needs of the malicious code monitoring and collection device.
需要说明的是,分析处理条件判断包括但不限于以下情况:分析模块根据预定义的样本分类规则,判断是否满足分析处理条件;分析模块根据预设的恶意行为特征,如文件修改、系统入侵、网络通信等,来判断是否满足分析处理条件;分析模块根据样本的网络传播能力来判断是否满足分析处理条件;分析模块根据样本的重要性和优先级来判断是否满足分析处理条件。It should be noted that the judgment of analysis and processing conditions includes but is not limited to the following situations: the analysis module determines whether the analysis and processing conditions are met based on predefined sample classification rules; the analysis module determines whether the analysis and processing conditions are met based on preset malicious behavior characteristics, such as file modification, system intrusion, Network communication, etc., to determine whether the analysis and processing conditions are met; the analysis module determines whether the analysis and processing conditions are met based on the network communication ability of the sample; the analysis module determines whether the analysis and processing conditions are met based on the importance and priority of the sample.
其中,恶意代码流量监测采集装置主要针对网络流量、会话登录等数据源信息进行采集和分析,防恶意代码主要通过恶意知识库等数据源比对发现资产的异常情况。Among them, the malicious code traffic monitoring and collection device mainly collects and analyzes data source information such as network traffic and session logins. The anti-malicious code mainly discovers asset anomalies through comparison of data sources such as malicious knowledge bases.
进一步的,根据可信验证模块和恶意代码监测系统上送的告警信息,网络安全平台向管控模块下达管控命令,以实现对于资产的管控;根据情况和威胁等级,安全平台采用合适的管控手段来提高网络安全性,例如进行链路阻断、网络连接阻断、网卡阻断、进程阻断、文件隔离以及可移动磁盘弹出等操作,以阻止威胁的扩散和影响。Further, based on the alarm information sent by the trusted verification module and the malicious code monitoring system, the network security platform issues management and control commands to the management and control module to realize the management and control of assets; according to the situation and threat level, the security platform adopts appropriate management and control methods. Improve network security, such as link blocking, network connection blocking, network card blocking, process blocking, file isolation, and removable disk ejection, to prevent the spread and impact of threats.
进一步的,本实施例还提供基于ATT&CK的网络安全事件联动处置方法,包括威胁情报模块从商业数据库、恶意代码库、自有威胁情报数据以及国家级情报共享来源获取威胁情报信息,并将其上传至网络安全管理平台;网络安全平台根据威胁情报的特征和参考ATT&CK矩阵的战术和技术说明,对威胁情报进行分类和归并,形成威胁情报矩阵;根据威胁情报所涉及的战术和技术,参考ATT&CK矩阵数据源的特征,创建相应的威胁情报数据源;将数据源组成上传至数据源处理模块,对数据源进行分析和处理,以生成监测策略和管控手段,并将其上传至网络安全平台;网络安全平台根据上传的监测策略和管控手段向可信验证模块和恶意代码监测系统下达相应的策略和管控命令;可信验证模块和恶意代码监测系统将度量失败的日志和告警日志上传至网络安全管理平台;网络安全管理平台综合分析度量日志和告警日志,发现新的威胁情报,并将其传入威胁情报系统,以完善威胁情报信息;网络安全管理平台综合分析告警、日志等信息,向管控模块下达相应的管控命令,及时采取相应的措施对存在安全问题的资产进行处置。Furthermore, this embodiment also provides a joint processing method for network security events based on ATT&CK, including the threat intelligence module obtaining threat intelligence information from commercial databases, malicious code libraries, self-owned threat intelligence data and national intelligence sharing sources, and uploading it to the network security management platform; the network security platform classifies and merges threat intelligence to form a threat intelligence matrix based on the characteristics of the threat intelligence and the tactics and technical descriptions referring to the ATT&CK matrix; according to the tactics and technologies involved in the threat intelligence, refer to the ATT&CK matrix Characteristics of data sources, create corresponding threat intelligence data sources; upload the data source composition to the data source processing module, analyze and process the data sources to generate monitoring strategies and control methods, and upload them to the network security platform; Network The security platform issues corresponding strategies and control orders to the trusted verification module and malicious code monitoring system based on the uploaded monitoring strategies and control methods; the trusted verification module and malicious code monitoring system upload measurement failure logs and alarm logs to network security management platform; the network security management platform comprehensively analyzes measurement logs and alarm logs, discovers new threat intelligence, and transmits it to the threat intelligence system to improve the threat intelligence information; the network security management platform comprehensively analyzes alarms, logs and other information, and reports it to the management and control module Issue corresponding control orders and take timely measures to dispose of assets with safety issues.
本实施例还提供一种计算机设备,适用于基于ATT&CK的网络安全事件联动处置系统的情况,包括存储器和处理器;存储器用于存储计算机可执行指令,处理器用于执行计算机可执行指令,实现如上述实施例提出的基于ATT&CK的网络安全事件联动处置系统。This embodiment also provides a computer device, which is suitable for a network security incident linkage processing system based on ATT&CK, including a memory and a processor; the memory is used to store computer executable instructions, and the processor is used to execute computer executable instructions, to implement the following: The ATT&CK-based network security event linkage processing system proposed in the above embodiments.
该计算机设备可以是终端,该计算机设备包括通过系统总线连接的处理器、存储器、通信接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的通信接口用于与外部的终端进行有线或无线方式的通信,无线方式可通过WIFI、运营商网络、NFC(近场通信)或其他技术实现。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。The computer device may be a terminal, and the computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected through a system bus. Wherein, the processor of the computer device is used to provide computing and control capabilities. The memory of the computer device includes non-volatile storage media and internal memory. The non-volatile storage medium stores operating systems and computer programs. This internal memory provides an environment for the execution of operating systems and computer programs in non-volatile storage media. The communication interface of the computer device is used for wired or wireless communication with external terminals. The wireless mode can be implemented through WIFI, operator network, NFC (Near Field Communication) or other technologies. The display screen of the computer device may be a liquid crystal display or an electronic ink display. The input device of the computer device may be a touch layer covered on the display screen, or may be a button, trackball or touch pad provided on the computer device shell. , it can also be an external keyboard, trackpad or mouse, etc.
本实施例还提供一种存储介质,其上存储有计算机程序,该程序被处理器执行时实现如上述实施例提出的实现基于ATT&CK的网络安全事件联动处置系统。This embodiment also provides a storage medium on which a computer program is stored. When the program is executed by the processor, the ATT&CK-based network security event linkage processing system is implemented as proposed in the above embodiment.
综上,本发明通过利用ATT&CK矩阵实现威胁情报系统、可信验证模块和恶意代码监测系统的联动,将威胁情报信息以ATT&CK技术角度进行分类,并根据技术特点针对数据源进行监测,提出了新的网络安全事件处置流程,可以有效提高威胁情报处理效率、识别威胁源头,并改进网络安全事件的处置方式,从而提升网络安全防护的整体能力。In summary, the present invention realizes the linkage of the threat intelligence system, trusted verification module and malicious code monitoring system by using the ATT&CK matrix, classifies the threat intelligence information from the perspective of ATT&CK technology, and monitors the data source according to the technical characteristics, and proposes a new A network security incident handling process can effectively improve the efficiency of threat intelligence processing, identify threat sources, and improve the handling of network security incidents, thereby improving the overall capabilities of network security protection.
实施例2Example 2
参照图1~图6,为本发明第二个实施例,该实施例提供了一种基于ATT&CK的网络安全事件联动处置系统,为了验证本发明的有益效果,通过经济效益计算和仿真实验进行科学论证。Referring to Figures 1 to 6, a second embodiment of the present invention is provided. This embodiment provides a network security event linkage processing system based on ATT&CK. In order to verify the beneficial effects of the present invention, scientific calculations and simulation experiments are conducted through economic benefit calculations. Argument.
具体的,以某公司使用本系统试点应用为例,系统采集信息等数据量达千万级,在不增添额外设备的前提下,告警的准确度及速度有明显提升,有助于网络安全管理员及时发现并处理存在的网络安全风险。Specifically, taking a company's pilot application of this system as an example, the amount of information and other data collected by the system reaches tens of millions. Without adding additional equipment, the accuracy and speed of alarms have been significantly improved, which is helpful for network security management. personnel to discover and deal with existing network security risks in a timely manner.
进一步的,该公司的核心业务系统同样接入了本方案中的网络安全管理平台,用于防范业务系统遭受攻击。平台首先收集了大量业务系统运维过程中的日志、事件等数据,这些庞大的数据量提高了平台进行威胁情报分析的准确性。Furthermore, the company's core business system is also connected to the network security management platform in this solution to prevent business systems from being attacked. The platform first collects a large amount of logs, events and other data during the operation and maintenance of business systems. This huge amount of data improves the accuracy of the platform's threat intelligence analysis.
优选的,平台通过对数据源的关联分析,比如账号异常登录地点与数据泄露事件的存在一定的关联性,能够产生更为准确的安全风险预警。同时,在大数据量的支持下,平台采用机器学习算法,训练出特定于该业务系统的威胁检测模型,进一步提高了威胁告警的准确度。Preferably, the platform can generate more accurate security risk warnings through correlation analysis of data sources, such as a certain correlation between abnormal account login locations and data leakage events. At the same time, with the support of large amounts of data, the platform uses machine learning algorithms to train a threat detection model specific to the business system, further improving the accuracy of threat alerts.
进一步的,这些告警通过平台集中展示给网络安全管理员。平台根据事件关联关系进行聚类和关联分析,辅助网络安全管理员识别事件中蕴含的威胁,如发现一个某台工作站短时间内对多个业务系统及其它工作站产生大量的连接请求,可以合理怀疑该工作站存在安全风险,并正在进行ip端口扫描的安全事件,这减轻了网络安全管理员的工作量,使其能更快速地做出响应。Further, these alarms are centrally displayed to network security administrators through the platform. The platform performs clustering and correlation analysis based on event correlations to assist network security administrators in identifying threats contained in events. If a certain workstation is found to have generated a large number of connection requests to multiple business systems and other workstations in a short period of time, it can be reasonably suspected. The workstation has a security risk and is undergoing a security incident with IP port scanning, which reduces the workload of the network security administrator and allows him to respond more quickly.
进一步的,通过应用该方案,公司实现了业务系统安全防护的自动化,在较大数据量下依然有效保证了告警质量,提高了公司整体的网络安全防御能力。Furthermore, by applying this solution, the company has realized the automation of business system security protection, effectively guaranteed the quality of alarms despite a large amount of data, and improved the company's overall network security defense capabilities.
应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换,而不脱离本发明技术方案的精神和范围,其均应涵盖在本发明的权利要求范围当中。It should be noted that the above embodiments are only used to illustrate the technical solution of the present invention rather than to limit it. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solution of the present invention can be carried out. Modifications or equivalent substitutions without departing from the spirit and scope of the technical solution of the present invention shall be included in the scope of the claims of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311627758.3A CN117439814A (en) | 2023-11-30 | 2023-11-30 | A network security event linkage processing system and method based on ATT&CK |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311627758.3A CN117439814A (en) | 2023-11-30 | 2023-11-30 | A network security event linkage processing system and method based on ATT&CK |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN117439814A true CN117439814A (en) | 2024-01-23 |
Family
ID=89555364
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311627758.3A Pending CN117439814A (en) | 2023-11-30 | 2023-11-30 | A network security event linkage processing system and method based on ATT&CK |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117439814A (en) |
-
2023
- 2023-11-30 CN CN202311627758.3A patent/CN117439814A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240054234A1 (en) | Methods and systems for hardware and firmware security monitoring | |
| US11627154B2 (en) | Forward and rearward facing attack vector visualization | |
| US11283822B2 (en) | System and method for cloud-based operating system event and data access monitoring | |
| AU2018204262B2 (en) | Automated code lockdown to reduce attack surface for software | |
| CN109076063B (en) | Protecting dynamic and short-term virtual machine instances in a cloud environment | |
| US9401922B1 (en) | Systems and methods for analysis of abnormal conditions in computing machines | |
| US20180191779A1 (en) | Flexible Deception Architecture | |
| US20150256554A1 (en) | Attack analysis system, cooperation apparatus, attack analysis cooperation method, and program | |
| US12470586B2 (en) | System and method for risk monitoring of cloud based computing environments | |
| US12182265B2 (en) | System and method for cloud-based operating system event and data access monitoring | |
| WO2025106207A1 (en) | Attack path discovery engine in a security management system | |
| Sun et al. | Blockchain-based automated container cloud security enhancement system | |
| KR101994664B1 (en) | Vulnerability checking system based on cloud service | |
| US20250202973A1 (en) | Use of ephemeral workloads to monitor compute environments | |
| US20250039211A1 (en) | Information processing apparatus, information processing method, and computer-readable recording medium | |
| Sun et al. | Cloud armor: Protecting cloud commands from compromised cloud services | |
| CN117439814A (en) | A network security event linkage processing system and method based on ATT&CK | |
| US20260046304A1 (en) | System and method for risk monitoring of cloud based computing environments | |
| US12255833B1 (en) | Visibility pods for network traffic | |
| KR20250069369A (en) | Security information and event management system using ebpf for detecting malicious actions in containerized environments | |
| HK40109444A (en) | System and method for cloud-based operating system event and data access monitoring | |
| Olurin | Intrusions Detection in a Cloud Environment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |