CN117439813A - Anomaly determination method, device, electronic equipment and storage medium - Google Patents
Anomaly determination method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN117439813A CN117439813A CN202311618906.5A CN202311618906A CN117439813A CN 117439813 A CN117439813 A CN 117439813A CN 202311618906 A CN202311618906 A CN 202311618906A CN 117439813 A CN117439813 A CN 117439813A
- Authority
- CN
- China
- Prior art keywords
- terminal
- target
- information
- service
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 230000002159 abnormal effect Effects 0.000 claims abstract description 77
- 230000006399 behavior Effects 0.000 claims description 114
- 230000005856 abnormality Effects 0.000 claims description 75
- 230000004044 response Effects 0.000 claims description 41
- 238000012545 processing Methods 0.000 claims description 23
- 238000004891 communication Methods 0.000 abstract description 15
- 238000005516 engineering process Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 8
- 238000001514 detection method Methods 0.000 description 5
- 238000002347 injection Methods 0.000 description 5
- 239000007924 injection Substances 0.000 description 5
- 230000009193 crawling Effects 0.000 description 4
- 239000000243 solution Substances 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 2
- 238000013499 data model Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000004083 survival effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 230000005574 cross-species transmission Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008521 reorganization Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1087—Peer-to-peer [P2P] networks using cross-functional networking aspects
- H04L67/1091—Interfacing with client-server systems or between P2P systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种异常确定方法、装置、电子设备及存储介质。The present application relates to the field of communication technology, and in particular to an abnormality determination method, device, electronic equipment and storage medium.
背景技术Background technique
目前,可以通过人工操作将漏洞扫描应用部署到终端设备上,对终端设备进行安全扫描,确定终端设备是否存在异常。Currently, vulnerability scanning applications can be deployed to terminal devices through manual operations to perform security scans on the terminal devices to determine whether there are abnormalities in the terminal devices.
但是,上述方法中,在对多个终端设备进行漏洞扫描时,需要为终端设备人工部署漏洞扫描应用,存在操作繁琐、效率低的问题,不能保证漏洞扫描的及时性和有效性。However, in the above method, when performing vulnerability scanning on multiple terminal devices, a vulnerability scanning application needs to be manually deployed for the terminal devices, which has the problems of cumbersome operation and low efficiency, and cannot guarantee the timeliness and effectiveness of vulnerability scanning.
发明内容Contents of the invention
本申请提供一种异常确定方法、装置、电子设备及存储介质,解决了在对多个终端设备进行漏洞扫描时,存在操作繁琐、效率低的技术问题。This application provides an anomaly determination method, device, electronic equipment and storage medium, which solves the technical problems of cumbersome operations and low efficiency when performing vulnerability scanning on multiple terminal devices.
第一方面,本申请提供一种异常确定方法,应用于服务器,包括:向终端发送远程连接请求,该远程连接请求用于请求与终端建立远程连接;接收该终端发送的终端信息,该终端信息包括终端的端口号;基于该端口号,确定该终端对应的服务;基于该终端对应的服务确定目标插件,该目标插件用于指示对该终端进行安全扫描;向该终端发送该目标插件;接收该终端发送的至少一条安全扫描信息;在异常信息库存在第一安全扫描信息的情况下,确定该终端存在异常,该第一安全扫描信息为该至少一条安全扫描信息中的一条。In the first aspect, this application provides an anomaly determination method, applied to a server, including: sending a remote connection request to a terminal, the remote connection request being used to request the establishment of a remote connection with the terminal; receiving terminal information sent by the terminal, and the terminal information Including the port number of the terminal; based on the port number, determine the service corresponding to the terminal; determine the target plug-in based on the service corresponding to the terminal, the target plug-in is used to instruct security scanning of the terminal; send the target plug-in to the terminal; receive At least one piece of security scan information sent by the terminal; when the abnormality information library contains the first security scan information, it is determined that the terminal has an abnormality, and the first security scan information is one of the at least one piece of security scan information.
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url,上述方法还包括:基于该网页服务对应的多个url,确定多个参数,其中,一个参数为一个url中的字段;基于第一参数和预设字符串,确定目标字符串,该第一参数为该多个参数中的一个,该目标字符串为异常服务对应的服务请求,该异常服务对应于该预设字符串;向该终端发送该目标字符串;接收该终端发送的服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务;在该终端存在与该目标字符串对应的服务的情况下,确定该终端存在异常。Optionally, the service corresponding to the above-mentioned terminal is a webpage service, and the above-mentioned terminal information includes multiple URLs corresponding to the webpage service. The above-mentioned method further includes: determining multiple parameters based on the multiple URLs corresponding to the webpage service, wherein one The parameter is a field in a URL; based on the first parameter and the preset string, the target string is determined. The first parameter is one of the multiple parameters. The target string is the service request corresponding to the abnormal service. The exception The service corresponds to the preset string; sends the target string to the terminal; receives a service response sent by the terminal, the service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string; if the terminal exists In the case of a service corresponding to the target string, it is determined that there is an exception in the terminal.
本申请中,服务器基于网页服务对应的多个URL,确定多个参数,服务器基于第一参数和预设字符串,确定目标字符串,服务器向终端发送目标字符串,服务器接收终端发送的服务响应,由于该目标字符串为异常服务对应的服务请求,在终端存在与目标字符串对应的服务的情况下,说明该网页服务存在该异常服务,此时,服务器确定该终端存在异常,如此,可以准确可靠地确定出该对应网页服务的终端是否异常,保证了异常确定的有效性和可靠性。In this application, the server determines multiple parameters based on multiple URLs corresponding to the web service. The server determines the target string based on the first parameter and the preset string. The server sends the target string to the terminal, and the server receives the service response sent by the terminal. , since the target string is a service request corresponding to the abnormal service, if the terminal has a service corresponding to the target string, it means that the web service has the abnormal service. At this time, the server determines that the terminal has an exception. In this way, it can Accurately and reliably determine whether the terminal corresponding to the web page service is abnormal, ensuring the validity and reliability of abnormality determination.
可选地,上述终端信息还包括目标应用的行为信息,上述目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为,上述方法还包括:向该终端发送目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为;接收该终端发送的该目标应用的权限信息;在该目标应用的行为信息中存在目标行为的情况下,确定该终端存在异常,该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中。Optionally, the above terminal information also includes behavior information of a target application. The above target application is an application installed on the terminal. The behavior information of the target application includes at least one behavior of the target application. The above method further includes: The terminal sends a target permission query request. The target permission query request is used to request permission information of the target application. The permission information includes executable behaviors of the target application; receives the permission information of the target application sent by the terminal; in the When there is a target behavior in the behavior information of the target application, it is determined that there is an abnormality in the terminal. The target behavior is one of at least one behavior of the target application, and the target behavior does not exist among the executable behaviors of the target application.
本申请中,服务器向终端发送目标权限查询请求,服务器接收终端发送的目标应用的权限信息,由于该权限信息中包括该目标应用可执行的行为,而该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中,因此,在目标应用的行为信息中存在目标行为的情况下,说明该目标应用存在超出其权限的行为,此时,服务器确定终端存在异常。In this application, the server sends a target permission query request to the terminal, and the server receives the permission information of the target application sent by the terminal, because the permission information includes executable behaviors of the target application, and the target behavior is at least one behavior of the target application. One of them, the target behavior does not exist among the executable behaviors of the target application. Therefore, if the target behavior exists in the behavior information of the target application, it means that the target application has behavior that exceeds its permissions. At this time, the server determines There is an exception in the terminal.
第二方面,本申请提供一种异常确定方法,应用于终端,包括:接收服务器发送的远程连接请求,该远程连接请求用于请求与该终端建立远程连接;向该服务器发送终端信息,该终端信息包括终端的端口号;接收该服务器发送的目标插件;基于该目标插件对该终端进行安全扫描,得到至少一条安全扫描信息;向该服务器发送该至少一条安全扫描信息。In the second aspect, this application provides an anomaly determination method, applied to a terminal, including: receiving a remote connection request sent by a server, the remote connection request being used to request the establishment of a remote connection with the terminal; sending terminal information to the server, and the terminal The information includes a port number of the terminal; receiving a target plug-in sent by the server; performing a security scan on the terminal based on the target plug-in to obtain at least one piece of security scanning information; and sending the at least one piece of security scanning information to the server.
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url,上述方法还包括:接受该服务器发送的目标字符串,该目标字符串为异常服务对应的服务请求,该异常服务对应于预设字符串;向该服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务。Optionally, the service corresponding to the above-mentioned terminal is a web page service, and the above-mentioned terminal information includes multiple URLs corresponding to the web page service. The above-mentioned method further includes: accepting a target string sent by the server, where the target string is a URL corresponding to the abnormal service. Service request, the abnormal service corresponds to the preset string; send a service response to the server, the service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string.
本申请中,终端接收服务器发送的目标字符串,终端向服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务,如此,基于该服务响应能够有效地确定出该终端对应的网页服务是否包括该异常服务,进而保证了异常确定的可靠性。In this application, the terminal receives the target string sent by the server, and the terminal sends a service response to the server. The service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string. In this way, based on the service response, it can be effectively determined Check whether the web page service corresponding to the terminal includes the abnormal service, thereby ensuring the reliability of abnormal determination.
可选地,上述终端信息还包括目标应用的行为信息,该目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为,上述方法还包括:接收该服务器发送的目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为;向该服务器发送该目标应用的权限信息。Optionally, the above terminal information also includes behavior information of the target application. The target application is an application installed on the terminal. The behavior information of the target application includes at least one behavior of the target application. The above method further includes: receiving the A target permission query request sent by the server. The target permission query request is used to request permission information of the target application. The permission information includes executable behaviors of the target application; the permission information of the target application is sent to the server.
本申请中,终端接收服务器发送的目标权限查询请求,终端向服务器发送目标应用的权限信息,而该权限信息中包括该目标应用可执行的行为,如此,能够帮助服务器准确快速地确定出该终端对应的目标应用是否存在超出其权限的行为,保证了异常确定的可靠性。In this application, the terminal receives the target permission query request sent by the server, and the terminal sends the permission information of the target application to the server, and the permission information includes the executable behaviors of the target application. In this way, it can help the server accurately and quickly determine the terminal Whether the corresponding target application has behavior beyond its permissions ensures the reliability of exception determination.
第三方面,本申请提供一种异常确定装置,应用于服务器包括:发送模块、接收模块以及确定模块;该发送模块,用于向终端发送远程连接请求,该远程连接请求用于请求与终端建立远程连接;该接收模块,用于接收该终端发送的终端信息,该终端信息包括终端的端口号;该确定模块,用于基于该端口号,确定该终端对应的服务;该确定模块,还用于基于该终端对应的服务确定目标插件,该目标插件用于指示对该终端进行安全扫描;该发送模块,还用于向该终端发送该目标插件;该接收模块,还用于接收该终端发送的至少一条安全扫描信息;该确定模块,还用于在异常信息库存在第一安全扫描信息的情况下,确定该终端存在异常,该第一安全扫描信息为该至少一条安全扫描信息中的一条。In the third aspect, this application provides an abnormality determination device, which is applied to a server and includes: a sending module, a receiving module and a determining module; the sending module is used to send a remote connection request to the terminal, and the remote connection request is used to request the establishment of a connection with the terminal. Remote connection; the receiving module is used to receive terminal information sent by the terminal, and the terminal information includes the port number of the terminal; the determining module is used to determine the service corresponding to the terminal based on the port number; the determining module is also used The target plug-in is determined based on the service corresponding to the terminal, and the target plug-in is used to instruct security scanning of the terminal; the sending module is also used to send the target plug-in to the terminal; the receiving module is also used to receive the information sent by the terminal. At least one piece of security scan information; the determination module is also used to determine that there is an abnormality in the terminal when the abnormal information library contains first security scan information, and the first security scan information is one of the at least one piece of security scan information. .
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url;该确定模块,还用于基于该网页服务对应的多个url,确定多个参数,其中,一个参数为一个url中的字段;该确定模块,还用于基于第一参数和预设字符串,确定目标字符串,该第一参数为该多个参数中的一个,该目标字符串为异常服务对应的服务请求,该异常服务对应于该预设字符串;该发送模块,还用于向该终端发送该目标字符串;该接收模块,还用于接收该终端发送的服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务;该确定模块,还用于在该终端存在与该目标字符串对应的服务的情况下,确定该终端存在异常。Optionally, the service corresponding to the terminal is a web page service, and the terminal information includes multiple URLs corresponding to the web page service; the determination module is also used to determine multiple parameters based on the multiple URLs corresponding to the web page service, wherein , one parameter is a field in a URL; the determination module is also used to determine the target string based on the first parameter and the preset string, the first parameter is one of the multiple parameters, and the target string is The service request corresponding to the abnormal service, which corresponds to the preset string; the sending module is also used to send the target string to the terminal; the receiving module is also used to receive the service response sent by the terminal, the The service response is used to indicate whether the terminal has an abnormal service corresponding to the target string; the determination module is also used to determine that the terminal has an exception when there is a service corresponding to the target string.
本申请中,终端接收服务器发送的目标字符串,终端向服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务,如此,基于该服务响应能够有效地确定出该终端对应的网页服务是否包括该异常服务,进而保证了异常确定的可靠性。In this application, the terminal receives the target string sent by the server, and the terminal sends a service response to the server. The service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string. In this way, based on the service response, it can be effectively determined Check whether the web page service corresponding to the terminal includes the abnormal service, thereby ensuring the reliability of abnormal determination.
可选地,上述终端信息还包括目标应用的行为信息,该目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为;该发送模块,还用于向该终端发送目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为;该接收模块,还用于接收该终端发送的该目标应用的权限信息;该确定模块,还用于在该目标应用的行为信息中存在目标行为的情况下,确定该终端存在异常,该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中。Optionally, the above terminal information also includes behavior information of the target application, the target application is an application installed on the terminal, and the behavior information of the target application includes at least one behavior of the target application; the sending module is also configured to Send a target permission query request to the terminal. The target permission query request is used to request permission information of the target application. The permission information includes executable behaviors of the target application; the receiving module is also used to receive the permission information sent by the terminal. The permission information of the target application; the determination module is also used to determine that there is an abnormality in the terminal when there is a target behavior in the behavior information of the target application, and the target behavior is one of at least one behavior of the target application. The target behavior does not exist among the behaviors that the target app can perform.
第四方面,本申请提供一种异常确定装置,应用于终端,包括:接收模块、发送模块以及处理模块;该接收模块,用于接收服务器发送的远程连接请求,该远程连接请求用于请求与该终端建立远程连接;该发送模块,用于向该服务器发送终端信息,该终端信息包括终端的端口号;该接收模块,还用于接收该服务器发送的目标插件;该处理模块,用于基于该目标插件对该终端进行安全扫描,得到至少一条安全扫描信息;该发送模块,还用于向该服务器发送该至少一条安全扫描信息。In the fourth aspect, this application provides an abnormality determination device, which is applied to a terminal and includes: a receiving module, a sending module and a processing module; the receiving module is used to receive a remote connection request sent by the server, and the remote connection request is used to request and The terminal establishes a remote connection; the sending module is used to send terminal information to the server, and the terminal information includes the port number of the terminal; the receiving module is also used to receive the target plug-in sent by the server; the processing module is used based on The target plug-in performs a security scan on the terminal and obtains at least one piece of security scan information; the sending module is also used to send the at least one piece of security scan information to the server.
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url;该接收模块,还用于接收该服务器发送的目标字符串,该目标字符串为异常服务对应的服务请求,该异常服务对应于预设字符串;该发送模块,还用于向该服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务。Optionally, the service corresponding to the above-mentioned terminal is a web page service, and the above-mentioned terminal information includes multiple URLs corresponding to the web page service; the receiving module is also used to receive a target string sent by the server, and the target string is an abnormal service The corresponding service request, the abnormal service corresponds to the preset string; the sending module is also used to send a service response to the server, the service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string.
可选地,上述终端信息还包括目标应用的行为信息,该目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为;该接收模块,还用于接收该服务器发送的目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为;该发送模块,还用于向该服务器发送该目标应用的权限信息。Optionally, the above terminal information also includes behavior information of the target application, the target application is an application installed on the terminal, and the behavior information of the target application includes at least one behavior of the target application; the receiving module is also configured to Receive a target permission query request sent by the server. The target permission query request is used to request permission information of the target application. The permission information includes executable behaviors of the target application; the sending module is also used to send a request to the server. Permission information of the target application.
第五方面,本申请提供一种电子设备,包括:处理器和被配置为存储处理器可执行指令的存储器;其中,处理器被配置为执行所述指令,以实现上述第一方面中任一种可选地异常确定方法或者实现上述第二方面中任一种可选地异常确定方法。In a fifth aspect, the present application provides an electronic device, including: a processor and a memory configured to store instructions executable by the processor; wherein the processor is configured to execute the instructions to implement any one of the above first aspects. An optional abnormality determination method or implement any optional abnormality determination method in the above second aspect.
第六方面,本申请提供一种计算机可读存储介质,计算机可读存储介质上存储有指令,当该计算机可读存储介质中的指令由电子设备执行时,使得该电子设备能够执行上述第一方面中任一种可选地异常确定方法或者执行上述第二方面中任一种可选地异常确定方法。In a sixth aspect, the present application provides a computer-readable storage medium. Instructions are stored on the computer-readable storage medium. When the instructions in the computer-readable storage medium are executed by an electronic device, the electronic device can execute the above-mentioned first step. Any one of the optional abnormality determination methods in the aspect or any one of the optional abnormality determination methods in the above second aspect.
本申请提供的异常确定方法、装置、电子设备及存储介质,服务器向终端发送远程连接请求,服务器基于端口号,确述终端对应的服务,服务器基于终端对应的服务确定目标插件,服务器向终端发送目标插件,该异常信息库存在第一安全扫描信息,说明该第一安全扫描信息为一种异常信息,此时,服务器可以确定该终端存在与该第一安全扫描信息对应的异常,因此,服务器接收终端发送的至少一条安全扫描信息,在异常信息库存在第一安全扫描信息的情况下,服务器确定终端存在异常,如此,服务器能够远程确定该终端是否存在异常,保证了异常确定的及时性和可靠性,进而能够确定出分散部署的多个终端各自是否异常,保证了分布式终端的异常确定的可靠性和稳定性。In the anomaly determination method, device, electronic equipment and storage medium provided by this application, the server sends a remote connection request to the terminal. The server confirms the service corresponding to the terminal based on the port number. The server determines the target plug-in based on the service corresponding to the terminal. The server sends the request to the terminal. Target plug-in, the abnormal information library contains the first security scan information, indicating that the first security scan information is a kind of abnormal information. At this time, the server can determine that the terminal has an exception corresponding to the first security scan information. Therefore, the server After receiving at least one piece of security scan information sent by the terminal, when the abnormal information database contains the first security scan information, the server determines that there is an abnormality in the terminal. In this way, the server can remotely determine whether there is an abnormality in the terminal, ensuring the timeliness and accuracy of abnormality determination. Reliability, and then be able to determine whether each of multiple distributed terminals is abnormal, ensuring the reliability and stability of abnormal determination of distributed terminals.
附图说明Description of the drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍。In order to more clearly explain the embodiments of the present application or the technical solutions in the prior art, the drawings required to be used in the description of the embodiments or the prior art will be briefly introduced below.
图1为本申请实施例提供的一种异常确定系统的网络架构示意图;Figure 1 is a schematic diagram of the network architecture of an anomaly determination system provided by an embodiment of the present application;
图2为本申请实施例提供的另一种异常确定系统的网络架构示意图;Figure 2 is a schematic diagram of the network architecture of another anomaly determination system provided by an embodiment of the present application;
图3为本申请实施例提供的一种异常确定方法的流程示意图;Figure 3 is a schematic flowchart of an abnormality determination method provided by an embodiment of the present application;
图4为本申请实施例提供的另一种异常确定方法的流程示意图;Figure 4 is a schematic flowchart of another anomaly determination method provided by an embodiment of the present application;
图5为本申请实施例提供的另一种异常确定方法的流程示意图;Figure 5 is a schematic flowchart of another abnormality determination method provided by an embodiment of the present application;
图6为本申请实施例提供的一种异常确定装置的结构示意图;Figure 6 is a schematic structural diagram of an abnormality determination device provided by an embodiment of the present application;
图7为本申请实施例提供的另一种异常确定装置的结构示意图;Figure 7 is a schematic structural diagram of another abnormality determination device provided by an embodiment of the present application;
图8为本申请实施例提供的另一种异常确定装置的结构示意图;Figure 8 is a schematic structural diagram of another abnormality determination device provided by an embodiment of the present application;
图9为本申请实施例提供的另一种异常确定装置的结构示意图。Figure 9 is a schematic structural diagram of another abnormality determination device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合附图对本申请实施例提供的异常确定方法、装置、电子设备及存储介质进行详细的描述。The abnormality determination method, device, electronic device and storage medium provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
此外,本申请的描述中所提到的术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括其他没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其他步骤或单元。Furthermore, references to the terms "including" and "having" and any variations thereof in the description of this application are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes other unlisted steps or units, or optionally also Includes other steps or units inherent to those processes, methods, products or devices.
需要说明的是,本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。It should be noted that in the embodiments of this application, words such as "exemplary" or "for example" are used to represent examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "such as" in the embodiments of the present application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the words "exemplary" or "such as" is intended to present the concept in a concrete manner.
在本申请的描述中,除非另有说明,“多个”的含义是指两个或两个以上。In the description of this application, unless otherwise stated, the meaning of "plurality" means two or more.
基于背景技术中所描述,由于相关技术中,在对多个终端设备进行漏洞扫描时,需要为终端设备人工部署漏洞扫描应用,存在操作繁琐、效率低的问题,不能保证漏洞扫描的及时性和有效性。基于此,本申请实施例提供一种异常确定方法、装置、电子设备及存储介质,异常信息库存在第一安全扫描信息,说明该第一安全扫描信息为一种异常信息,此时,服务器可以确定该终端存在与该第一安全扫描信息对应的异常,因此,服务器接收终端发送的至少一条安全扫描信息,在异常信息库存在第一安全扫描信息的情况下,服务器确定终端存在异常,如此,服务器能够远程确定该终端是否存在异常,保证了异常确定的及时性和可靠性,进而能够确定出分散部署的多个终端各自是否异常,保证了分布式终端的异常确定的可靠性和稳定性。Based on what is described in the background art, in related technologies, when vulnerability scanning is performed on multiple terminal devices, a vulnerability scanning application needs to be manually deployed for the terminal devices. This has problems of cumbersome operation and low efficiency, and the timeliness and effectiveness of vulnerability scanning cannot be guaranteed. effectiveness. Based on this, embodiments of the present application provide an abnormality determination method, device, electronic device and storage medium. The abnormal information database contains first security scan information, indicating that the first security scan information is a kind of abnormal information. At this time, the server can It is determined that the terminal has an abnormality corresponding to the first security scan information. Therefore, the server receives at least one piece of security scan information sent by the terminal. When the abnormal information library contains the first security scan information, the server determines that the terminal has an abnormality. In this way, The server can remotely determine whether there is an abnormality in the terminal, ensuring the timeliness and reliability of abnormality determination, and then can determine whether multiple terminals deployed in a distributed manner are abnormal, ensuring the reliability and stability of abnormality determination of distributed terminals.
本申请实施例提供的一种异常确定方法、装置、电子设备及存储介质可以应用于异常确定系统,如图1所示,该异常确定系统包括服务器101、终端102。通常,在实际应用中上述各个设备之间的连接可以为无线连接,为了方便直观地表示各个设备之间的连接关系,图1中采用实线示意。The anomaly determination method, device, electronic device and storage medium provided by the embodiment of the present application can be applied to an anomaly determination system. As shown in Figure 1 , the anomaly determination system includes a server 101 and a terminal 102. Generally, in practical applications, the connection between the above-mentioned devices can be a wireless connection. In order to conveniently and intuitively represent the connection relationship between the devices, solid lines are used in Figure 1 .
其中服务器101,用于向终端102发送插件,该插件用于指示对终端102进行安全扫描。The server 101 is used to send a plug-in to the terminal 102, and the plug-in is used to instruct the terminal 102 to perform a security scan.
终端102,用于接收服务器101发送的插件,并向服务器101发送该插件对终端102安全扫描后的至少一个条安全扫描信息。The terminal 102 is configured to receive the plug-in sent by the server 101, and send at least one piece of security scanning information to the server 101 after the plug-in has security scanned the terminal 102.
示例性的,执行本申请实施例提供的异常确定方法的终端可以是手机、平板电脑、桌面型、膝上型、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personalcomputer,UMPC)、上网本,以及蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)\虚拟现实(virtual reality,VR)设备,本申请实施例对终端设备的具体形态不作特殊限制。其可以与用户通过键盘、触摸板、触摸屏、遥控器、语音交互或手写设备等一种或多种方式进行人机交互。Illustratively, the terminal that executes the abnormality determination method provided by the embodiment of the present application can be a mobile phone, a tablet computer, a desktop, a laptop, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), or a netbook. , as well as cellular phones, personal digital assistants (PDAs), augmented reality (AR) and virtual reality (VR) devices. The embodiments of the present application do not place special restrictions on the specific form of the terminal device. It can interact with users through one or more methods such as keyboard, touch pad, touch screen, remote control, voice interaction or handwriting device.
示例性的,上述服务器可以是独立的物理服务器,也可以是多个物理服务器构成的服务器集群或者分布式系统,还可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、网络加速服务(content deliverynetwork,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器。For example, the above-mentioned server can be an independent physical server, or a server cluster or distributed system composed of multiple physical servers, or it can provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, and network services. , cloud communications, middleware services, domain name services, security services, network acceleration services (content delivery network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms.
如图2所示,本申请实施例提供的异常确定系统的另一种网络架构示意图,包括服务器201、路由器202、防火墙203、5G核心网204、基站205、用户端设备206、内网设备207、内网设备208以及内网设备209。As shown in Figure 2, another schematic diagram of the network architecture of the anomaly determination system provided by the embodiment of the present application includes a server 201, a router 202, a firewall 203, a 5G core network 204, a base station 205, a client device 206, and an intranet device 207 , intranet device 208 and intranet device 209.
其中,服务器201用于存储多个插件,该每个插件用于对不同类型的内网设备进行安全扫描,以得到内网设备的安全扫描信息。The server 201 is used to store multiple plug-ins, and each plug-in is used to perform security scanning on different types of intranet devices to obtain security scanning information of the intranet devices.
路由器202,用于将该多个插件的数据包,发送至防火墙203。The router 202 is used to send the data packets of the plurality of plug-ins to the firewall 203.
防火墙203,用于接收路由器202发送的数据包,并确定在该数据包存在访问权限的情况下,将该数据包发送至5G核心网204。The firewall 203 is used to receive the data packet sent by the router 202, and determine that the data packet has access rights, and then send the data packet to the 5G core network 204.
5G核心网204,用于接收该数据包,并将该数据包发送至基站205。The 5G core network 204 is used to receive the data packet and send the data packet to the base station 205.
基站205,用于向用户端设备206发送该数据包。The base station 205 is used to send the data packet to the user equipment 206.
用户端设备206,用于接收该数据包,并且用于连接内网设备207、内网设备208以及内网设备209,即用户端设备206可以向内网设备207、内网设备208或者内网设备209发送该数据包。The client device 206 is used to receive the data packet, and to connect to the intranet device 207, the intranet device 208, and the intranet device 209. That is, the client device 206 can send data to the intranet device 207, the intranet device 208, or the intranet. Device 209 sends the packet.
内网设备207、内网设备208或者内网设备209,用于接收用户端设备206发送的数据包,并基于该数据包对应的插件,进行安全扫描,生成安全扫描信息,并返回该安全扫描信息。The intranet device 207, the intranet device 208, or the intranet device 209 is used to receive the data packet sent by the client device 206, and perform a security scan based on the plug-in corresponding to the data packet, generate security scan information, and return the security scan information.
可以理解的是,该服务器201、路由器202、防火墙203、5G核心网204、基站205、用户端设备206的集合为GRE(Generic Route Encapsulation--通用路由封装)隧道,该GRE隧道用于连接该服务器201和该用户端设备206,以实现服务器201和用户端设备206以及该用户端设备206下接入的内网设备207、内网设备208、内网设备209之间的数据交换。It can be understood that the set of server 201, router 202, firewall 203, 5G core network 204, base station 205, and user equipment 206 is a GRE (Generic Route Encapsulation) tunnel, and the GRE tunnel is used to connect the The server 201 and the client device 206 implement data exchange between the server 201 and the client device 206, as well as the intranet device 207, the intranet device 208, and the intranet device 209 connected under the client device 206.
可选地,该用户端设备206为CPE(Customer Premise Equipment--用户驻地设备/用户端设备),该CPE用于连接用户端的多个设备(即内网设备207、内网设备208、内网设备209),已组成用户内网,保障用户的内网需求和资产链接(资产链接即将用户端的多个设备连接在一起)。Optionally, the client equipment 206 is a CPE (Customer Premise Equipment). The CPE is used to connect multiple devices on the client side (ie, intranet equipment 207, intranet equipment 208, intranet equipment Device 209) has formed the user's intranet to ensure the user's intranet needs and asset link (the asset link is to connect multiple devices on the user side together).
可选地,该CPE和内网设备207、内网设备208、内网设备209之间,通过wifi或者有线连接。Optionally, the CPE is connected to the intranet device 207, the intranet device 208, and the intranet device 209 through wifi or wired connections.
本申请实施例提供的异常确定方法、装置、电子设备及存储介质,应用于对多个终端设备的漏洞扫描场景。具体的,服务器先和多个终端设备建立远程连接,并确定该多个终端设备各自对应的服务,并基于该多个终端设备各自对应的服务确定该多个终端设备各自对应的插件,并向该多个终端设备分别发送该多个终端设备各自对应的插件,进而能够确定该多个终端设备是否存在异常,并且,能够接收该多个终端设备各自的异常信息,并对该多个终端设备各自的异常信息,进行集中处理,能够对分布式部署的多个终端设备进行集中的漏洞扫描,相比于人工部署插件并进行漏洞扫描更快速、更准确。The anomaly determination method, device, electronic device, and storage medium provided by the embodiments of this application are applied to vulnerability scanning scenarios for multiple terminal devices. Specifically, the server first establishes remote connections with multiple terminal devices, determines the services corresponding to the multiple terminal devices, determines the plug-ins corresponding to the multiple terminal devices based on the services corresponding to the multiple terminal devices, and provides the corresponding plug-ins to the multiple terminal devices. The plurality of terminal devices respectively send plug-ins corresponding to the plurality of terminal devices, thereby being able to determine whether there is an abnormality in the plurality of terminal devices, and being able to receive respective abnormal information of the plurality of terminal devices, and monitor the plurality of terminal devices. The respective abnormal information is processed centrally, and centralized vulnerability scanning can be performed on multiple terminal devices deployed in a distributed manner. Compared with manually deploying plug-ins and performing vulnerability scanning, it is faster and more accurate.
如图3所示,本申请实施例提供的异常确定方法可以包括S101-S112。As shown in Figure 3, the anomaly determination method provided by the embodiment of the present application may include S101-S112.
S101、服务器向终端发送远程连接请求。S101. The server sends a remote connection request to the terminal.
其中,该远程连接请求用于请求与终端建立远程连接。Wherein, the remote connection request is used to request to establish a remote connection with the terminal.
在本申请实施例的一种实现方式中,服务器接收终端发送的安全扫描任务后,向终端发送远程连接请求。In an implementation manner of the embodiment of this application, after receiving the security scanning task sent by the terminal, the server sends a remote connection request to the terminal.
在本申请实施例的一种实现方式中,服务器先对终端进行存活测试,并在终端存活的情况下,向终端发送远程连接请求。In an implementation manner of the embodiment of this application, the server first performs a survival test on the terminal, and if the terminal survives, sends a remote connection request to the terminal.
可选地,服务器基于ICMP PING(internet control message protocol,internet控制消息协议,packet internet grope,因特网包探索器)、UDP PING(user datagramprotocol)用户数据报协议)或者TCP PING(transmission control protocol,传输控制协议)等方式对终端进行存活测试。Optionally, the server is based on ICMP PING (internet control message protocol, internet control message protocol, packet internet grope, Internet packet explorer), UDP PING (user datagram protocol) or TCP PING (transmission control protocol, transmission control Protocol) and other methods to conduct survival tests on the terminal.
其中,基于TCP PING进行存活性测试时,需要输入TCP PING的端口。Among them, when performing a survivability test based on TCP PING, you need to enter the TCP PING port.
S102、终端接收服务器发送的远程连接请求。S102. The terminal receives the remote connection request sent by the server.
可选地,该远程连接请求对应的远程连接方式可以为SMB(server messageblock,服务器消息块)连接、RDP(remote data processing,远地数据处理)连接、SSH(secure shell,安全外壳协议)连接、TELNET(Internet远程登陆服务的标准协议)连接以及HTTP/HTTPS(hypertext transfer protocol,超文本传输协议)连接。Optionally, the remote connection method corresponding to the remote connection request can be an SMB (server message block, server message block) connection, an RDP (remote data processing, remote data processing) connection, an SSH (secure shell, secure shell protocol) connection, TELNET (standard protocol for Internet remote login service) connection and HTTP/HTTPS (hypertext transfer protocol, hypertext transfer protocol) connection.
其中,SSH连接或者TELNET连接中还可以包括主机跳转连接,具体的,该终端由防火墙或者堡垒机保护时,服务器基于SSH连接或者TELNET连接,连接到堡垒机上,在通过堡垒机和该终端建立连接。Among them, the SSH connection or TELNET connection can also include a host jump connection. Specifically, when the terminal is protected by a firewall or a bastion host, the server connects to the bastion host based on the SSH connection or TELNET connection, and then establishes a connection between the bastion host and the terminal. connect.
S103、终端向服务器发送终端信息。S103. The terminal sends terminal information to the server.
其中,该终端信息包括终端的端口号。The terminal information includes the port number of the terminal.
S104、服务器接收终端发送的终端信息。S104. The server receives the terminal information sent by the terminal.
在本申请实施例的一种实现方式中,服务器基于TCP连接的方式,获取终端内的端口号。In an implementation manner of the embodiment of the present application, the server obtains the port number in the terminal based on the TCP connection.
可选地,该TCP连接为完整的TCP连接或者TCP半连接。Optionally, the TCP connection is a complete TCP connection or a TCP half connection.
S105、服务器基于端口号,确定终端对应的服务。S105. The server determines the service corresponding to the terminal based on the port number.
S106、服务器基于终端对应的服务确定目标插件。S106. The server determines the target plug-in based on the service corresponding to the terminal.
应理解,由于终端对应不同的服务时,终端可能存在的异常情况不同,此时,对该终端进行安全扫描的插件应当能够对应该终端的服务确定该终端是否存在异常,因此,服务器基于终端对应的服务确定目标插件。It should be understood that when the terminal corresponds to different services, the abnormal conditions that may exist in the terminal are different. At this time, the plug-in that performs security scanning on the terminal should be able to determine whether there is an abnormality in the terminal according to the service of the terminal. Therefore, the server based on the terminal corresponding The service determines the target plug-in.
在本申请实施例的一种实现方式中,服务器基于端口号,确定终端对应的系统,并基于该终端对应的系统,确定该目标插件。In an implementation manner of the embodiment of the present application, the server determines the system corresponding to the terminal based on the port number, and determines the target plug-in based on the system corresponding to the terminal.
可选地,服务器获取该终端你发送的数据包,基于数据包中的特征参数,确定该终端对应的系统,该特征参数可以为TCP Window-size、IP TTL(internet protocol time tolive,IP协议包中的生存时间值)、IP TOS(IP Type of Service,IP服务类型)、DF位(Don';';t Fragment,IP协议的首部)等。Optionally, the server obtains the data packet sent by the terminal, and determines the system corresponding to the terminal based on the characteristic parameters in the data packet. The characteristic parameters can be TCP Window-size, IP TTL (internet protocol time to live, IP protocol packet Time-to-live value), IP TOS (IP Type of Service, IP service type), DF bit (Don't Fragment, the header of the IP protocol), etc.
可选地,服务器向终端发送FIN/PSH/URG查询一个关闭的TCP端口,并获取终端发送的查询响应,基于响应中存在的ACK(AC Knowledge Character,确认字符,TCP数据包首部中的确认标志),确定该终端对应的系统的类型。Optionally, the server sends a FIN/PSH/URG to the terminal to query a closed TCP port, and obtains the query response sent by the terminal, based on the ACK (AC Knowledge Character, confirmation character, confirmation mark in the TCP packet header) present in the response. ) to determine the type of system corresponding to the terminal.
在本申请实施例的一种实现方式中,服务器基于非标准服务识别技术对端口进行识别,该非标准服务识别技术用于识别端口号为非常规端口号的服务。In an implementation manner of the embodiment of this application, the server identifies the port based on a non-standard service identification technology. The non-standard service identification technology is used to identify services whose port numbers are non-conventional port numbers.
可以理解的是,端口号和标准服务之间存在对应关系,示例性的,邮件服务器对应25端口,Web服务器对应80端口,域名服务器对应53端口,因此服务器可以基于端口号,确定该终端对应的服务,同时存在部分服务对应的端口号不在该端口号和该标准服务之间的对应关系中,即该端口号为非常规端口号,此时,服务器基于非标准服务识别技术对端口进行识别,确定该非常规端口号对应的服务。It can be understood that there is a correspondence between port numbers and standard services. For example, the mail server corresponds to port 25, the Web server corresponds to port 80, and the domain name server corresponds to port 53. Therefore, the server can determine the terminal corresponding to the port number based on the port number. service, and there are port numbers corresponding to some services that are not in the corresponding relationship between the port number and the standard service, that is, the port number is an unconventional port number. At this time, the server identifies the port based on non-standard service identification technology. Determine the service corresponding to the non-regular port number.
S107、服务器向终端发送目标插件。S107. The server sends the target plug-in to the terminal.
S108、终端接收服务器发送的目标插件。S108. The terminal receives the target plug-in sent by the server.
S109、终端基于目标插件对所述终端进行安全扫描,得到至少一条安全扫描信息。S109. The terminal performs a security scan on the terminal based on the target plug-in and obtains at least one piece of security scan information.
S110、终端向该服务器发送至少一条安全扫描信息。S110. The terminal sends at least one piece of security scanning information to the server.
S111、服务器接收终端发送的至少一条安全扫描信息。S111. The server receives at least one piece of security scanning information sent by the terminal.
S112、在异常信息库存在第一安全扫描信息的情况下,服务器确定终端存在异常。S112. If the first security scan information exists in the abnormal information database, the server determines that there is an abnormality in the terminal.
其中,该第一安全扫描信息为该至少一条安全扫描信息中的一条。Wherein, the first security scan information is one of the at least one piece of security scan information.
应理解,该异常信息库存在第一安全扫描信息,说明该第一安全扫描信息为一种异常信息,此时,服务器可以确定该终端存在与该第一安全扫描信息对应的异常,此时,服务器确定该终端存在异常。It should be understood that the first security scan information exists in the abnormal information database, indicating that the first security scan information is a kind of abnormal information. At this time, the server can determine that the terminal has an exception corresponding to the first security scan information. At this time, The server determines that there is an exception on the terminal.
在本申请实施例的一种实现方式中,上述目标插件对应得到的是该终端的系统或者服务的版本信息,并将该终端的系统或者服务的版本信息确定为该安全扫描信息;该服务器基于该终端的系统或者服务的版本信息以及漏洞库信息对比分析,确定该终端的系统或者服务的版本信息是否存在于该漏洞库信息中,以确定该终端是否异常。In an implementation manner of the embodiment of the present application, the corresponding target plug-in obtains the version information of the system or service of the terminal, and determines the version information of the system or service of the terminal as the security scanning information; the server is based on Comparative analysis of the system or service version information of the terminal and the vulnerability library information determines whether the system or service version information of the terminal exists in the vulnerability library information to determine whether the terminal is abnormal.
在本申请实施例的一种实现方式中,服务器和终端建立远程连接后,终端将该终端的密码文件(shadow)发送至服务器中,并将该密码文件中的密码和预设密码库进行比对,确定该密码文件中是否存在弱密码或者弱口令(即安全系数不高的密码或者口令),在该密码文件中存在弱密码或者弱口令的情况下,服务器确定该终端存在异常。In an implementation manner of the embodiment of the present application, after the server and the terminal establish a remote connection, the terminal sends the password file (shadow) of the terminal to the server, and compares the password in the password file with the default password library. Yes, determine whether there is a weak password or weak password in the password file (that is, a password or password with a low security factor). If there is a weak password or weak password in the password file, the server determines that there is an abnormality in the terminal.
上述实施例提供的技术方案至少能够带来以下有益效果:由S101-S112可知:服务器向终端发送远程连接请求,服务器基于端口号,确述终端对应的服务,服务器基于终端对应的服务确定目标插件,服务器向终端发送目标插件,该异常信息库存在第一安全扫描信息,说明该第一安全扫描信息为一种异常信息,此时,服务器可以确定该终端存在与该第一安全扫描信息对应的异常,因此,服务器接收终端发送的至少一条安全扫描信息,在异常信息库存在第一安全扫描信息的情况下,服务器确定终端存在异常,如此,服务器能够远程确定该终端是否存在异常,保证了异常确定的及时性和可靠性,进而能够确定出分散部署的多个终端各自是否异常,保证了分布式终端的异常确定的可靠性和稳定性。The technical solutions provided by the above embodiments can at least bring the following beneficial effects: It can be seen from S101-S112 that: the server sends a remote connection request to the terminal, the server determines the service corresponding to the terminal based on the port number, and the server determines the target plug-in based on the service corresponding to the terminal. , the server sends the target plug-in to the terminal. The first security scan information exists in the abnormal information library, indicating that the first security scan information is a kind of abnormal information. At this time, the server can determine that the terminal contains the first security scan information corresponding to the first security scan information. Abnormal, therefore, the server receives at least one piece of security scan information sent by the terminal. When the abnormal information library contains the first security scan information, the server determines that there is an abnormality in the terminal. In this way, the server can remotely determine whether there is an abnormality in the terminal, ensuring that the abnormality The timeliness and reliability of the determination can then determine whether multiple terminals deployed in a distributed manner are abnormal, ensuring the reliability and stability of abnormal determination of distributed terminals.
进一步地,终端接收服务器发送的远程连接请求,终端向服务器发送终端信息,终端接收服务器发送的目标插件,终端基于目标插件对所述终端进行安全扫描,得到至少一条安全扫描信息,终端向该服务器发送至少一条安全扫描信息,如此,终端可以能够基于该目标插件准确地确定出自身存在的异常情况,并且将该至少一条安全扫描信息发送给该服务器,以使得该服务器能够确定出该终端是否存在异常,进而,保证了异常确定的及时性和可靠性。Further, the terminal receives the remote connection request sent by the server, the terminal sends terminal information to the server, the terminal receives the target plug-in sent by the server, the terminal performs a security scan on the terminal based on the target plug-in, and obtains at least one piece of security scan information, and the terminal sends the security scan information to the server. Send at least one piece of security scan information, so that the terminal can accurately determine the abnormality of its own existence based on the target plug-in, and send the at least one piece of security scan information to the server, so that the server can determine whether the terminal exists Exceptions, in turn, ensure the timeliness and reliability of exception determination.
在本申请实施例的一种实现方式中,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个URL(uniform resource locator,统一资源定位符)。结合图3,如图4所示。在一种实现方式中,上述异常确定方法还包括:S113-S119。In an implementation manner of the embodiment of this application, the service corresponding to the terminal is a web page service, and the terminal information includes multiple URLs (uniform resource locator, uniform resource locator) corresponding to the web page service. Combined with Figure 3, it is shown in Figure 4. In an implementation manner, the above-mentioned abnormality determination method also includes: S113-S119.
S113、服务器基于网页服务对应的多个URL,确定多个参数。S113. The server determines multiple parameters based on multiple URLs corresponding to the web service.
其中,一个参数为一个URL中的字段。Among them, one parameter is a field in the URL.
在本申请实施例的一种实现方式中,服务器基于智能页面爬取技术,获取该网页服务对应的多个URL。In an implementation manner of the embodiment of this application, the server obtains multiple URLs corresponding to the web service based on intelligent page crawling technology.
具体的,服务器基于cookie、自定义请求头、预设代理、预设认证方式以及客户端证书中的一种或者多种,获取多个预设URL各自对应的响应,在接收到该多个预设URL各自对应的响应后,服务器基于该多个预设URL各自对应的响应,确定该多个URL。Specifically, the server obtains responses corresponding to multiple preset URLs based on one or more of cookies, custom request headers, preset proxies, preset authentication methods, and client certificates. After receiving the multiple preset URLs, After setting the respective corresponding responses of the URLs, the server determines the plurality of URLs based on the respective corresponding responses of the plurality of preset URLs.
其中,该智能页面爬取技术是基于模拟点击操作抓取网页的,包括控制部件和处理部件,该控制部件用于爬虫策略的控制、登陆验证数据的控制、及自定义可爬取页面、不可爬取页面的控制等,该处理部件用于提取页面内链接,通过模拟点击技术来操纵DOM(digital orthophoto map,数字正射影像图)数据模型,并通过截获脚本执行数据达到提取链接和阻止对服务器数据的破坏。Among them, the intelligent page crawling technology is based on simulating click operations to crawl web pages, including a control component and a processing component. The control component is used to control crawler strategies, control login verification data, and customize crawlable pages and unavailable pages. Control of crawling pages, etc. This processing component is used to extract links within the page, manipulate the DOM (digital orthophoto map, digital orthophoto map) data model through simulated click technology, and intercept script execution data to extract links and prevent attacks. Destruction of server data.
具体的,控制部件将站点url传递给处理部件,处理部件从该终端获取web页面,并通过内置浏览器内核(部署在服务器上)将获取的html文档解析成DOM数据模型。然后通过对htlm文档中的不同标记做处理,来提取web页面中的url。在处理script标记的时候,会对其中的用户点击单元进行模拟点击处理,就是模拟人的点击行为来触发点击事件。并在引发DOM数据的变更前截获url,同时拦截对DOM模型的修改避免对网页服务数据的修改。Specifically, the control component passes the site URL to the processing component, which obtains the web page from the terminal and parses the obtained HTML document into a DOM data model through the built-in browser kernel (deployed on the server). Then extract the URL in the web page by processing different tags in the html document. When processing the script tag, simulated click processing will be performed on the user click unit, which is to simulate human click behavior to trigger click events. And intercept the URL before triggering the change of DOM data, and at the same time intercept the modification of the DOM model to avoid the modification of the web service data.
可选地,服务器采用多线程的方式,获取该多个URL,并且基于终端对应的网页服务的能力,控制该多线程的数量,保证网页抓取的正常进行。Optionally, the server uses a multi-thread method to obtain the multiple URLs, and based on the terminal's corresponding web service capabilities, controls the number of multi-threads to ensure normal web page crawling.
可选地,该预设代理可以为http、https、sock4或者sock5,该预设认证方式为basic、ntml或者digest。Optionally, the default proxy can be http, https, sock4 or sock5, and the default authentication method can be basic, ntml or digest.
可选地,该服务器可以从HTML、HTML注释、flash、WSDL等静态内容中获取该多个URL,该服务器还可以从DOM树、JS以及Ajax静态或者动态地获取该多个URL。Optionally, the server can obtain the multiple URLs from static content such as HTML, HTML comments, flash, WSDL, etc. The server can also obtain the multiple URLs statically or dynamically from DOM trees, JS, and Ajax.
在本申请实施例的一种实现方式中,服务器通过目标插件从该多个URL中确定多个参数,其中,一个参数可以为URL路径、GET方法URL中的参数、POST方法请求体中的参数、请求头中的字段、cookie中的键值以及响应体等。In an implementation manner of the embodiment of this application, the server determines multiple parameters from the multiple URLs through the target plug-in, wherein one parameter can be a URL path, a parameter in the GET method URL, or a parameter in the POST method request body. , fields in request headers, key values in cookies, response bodies, etc.
S114、服务器基于第一参数和预设字符串,确定目标字符串。S114. The server determines the target string based on the first parameter and the preset string.
其中,该第一参数为该多个参数中的一个,该目标字符串为异常服务对应的服务请求,该异常服务对应于该预设字符串。The first parameter is one of the plurality of parameters, the target string is a service request corresponding to the abnormal service, and the abnormal service corresponds to the preset string.
S115、服务器向终端发送目标字符串。S115. The server sends the target string to the terminal.
S116、终端接收服务器发送的目标字符串。S116. The terminal receives the target string sent by the server.
S117、终端向服务器发送服务响应。S117. The terminal sends a service response to the server.
其中,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务。The service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string.
S118、服务器接收终端发送的服务响应。S118. The server receives the service response sent by the terminal.
S119、在终端存在与目标字符串对应的服务的情况下,服务器确定终端存在异常。S119. When the terminal has a service corresponding to the target string, the server determines that there is an abnormality in the terminal.
应理解,由于该目标字符串为异常服务对应的服务请求,在终端存在与目标字符串对应的服务的情况下,说明该网页服务存在该异常服务,此时,服务器确定该终端存在异常。It should be understood that since the target string is a service request corresponding to an abnormal service, if a service corresponding to the target string exists in the terminal, it means that the abnormal service exists in the web page service. At this time, the server determines that the terminal has an abnormality.
在本申请实施例的一种实现方式中,上述网页服务为开源CMS(Cloud ManagedService,云管理服务),服务器基于目标插件对该开源CMS进行检测,确定该CMS中是否存在异常(或者漏洞)。In an implementation manner of the embodiment of this application, the above-mentioned web page service is an open source CMS (Cloud Managed Service, cloud management service), and the server detects the open source CMS based on the target plug-in to determine whether there are abnormalities (or vulnerabilities) in the CMS.
示例性的,该开源CMS可以为Wordpress。As an example, the open source CMS can be WordPress.
本申请实施例中,服务器基于网页服务对应的多个URL,确定多个参数,服务器基于第一参数和预设字符串,确定目标字符串,服务器向终端发送目标字符串,服务器接收终端发送的服务响应,由于该目标字符串为异常服务对应的服务请求,在终端存在与目标字符串对应的服务的情况下,说明该网页服务存在该异常服务,此时,服务器确定该终端存在异常,如此,可以准确可靠地确定出该对应网页服务的终端是否异常,保证了异常确定的有效性和可靠性。In the embodiment of this application, the server determines multiple parameters based on multiple URLs corresponding to the web service. The server determines the target string based on the first parameter and the preset string. The server sends the target string to the terminal, and the server receives the string sent by the terminal. Service response. Since the target string is a service request corresponding to the abnormal service, if the terminal has a service corresponding to the target string, it means that the abnormal service exists in the web service. At this time, the server determines that the terminal has an abnormality, so , it can be accurately and reliably determined whether the terminal corresponding to the web page service is abnormal, ensuring the validity and reliability of abnormality determination.
进一步地,终端接收服务器发送的目标字符串,终端向服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务,如此,基于该服务响应能够有效地确定出该终端对应的网页服务是否包括该异常服务,进而保证了异常确定的可靠性。Further, the terminal receives the target string sent by the server, and the terminal sends a service response to the server. The service response is used to indicate whether the terminal exists in the abnormal service corresponding to the target string. In this way, based on the service response, it can be effectively determined Whether the web page service corresponding to the terminal includes the abnormal service, thereby ensuring the reliability of abnormal determination.
在本申请实施例的一种实现方式中,上述终端信息还包括目标应用的行为信息,该目标应用为安装在终端上的应用,该目标应用的行为信息中包括目标应用的至少一个行为。结合图3,如图5所示。在一种实现方式中,上述异常确定方法,还包括S120-S124。In an implementation manner of the embodiment of the present application, the above terminal information also includes behavior information of the target application. The target application is an application installed on the terminal. The behavior information of the target application includes at least one behavior of the target application. Combined with Figure 3, it is shown in Figure 5. In an implementation manner, the above-mentioned abnormality determination method also includes S120-S124.
S120、服务器向终端发送目标权限查询请求。S120. The server sends a target permission query request to the terminal.
其中,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为。Wherein, the target permission query request is used to request permission information of the target application, and the permission information includes executable behaviors of the target application.
S121、终端接收服务器发送的目标权限查询请求。S121. The terminal receives the target permission query request sent by the server.
S122、终端向服务器发送目标应用的权限信息。S122. The terminal sends the permission information of the target application to the server.
S123、服务器接收终端发送的目标应用的权限信息。S123. The server receives the permission information of the target application sent by the terminal.
S124、在目标应用的行为信息中存在目标行为的情况下,服务器确定终端存在异常。S124. When the target behavior exists in the behavior information of the target application, the server determines that there is an abnormality in the terminal.
其中,该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中。The target behavior is one of at least one behavior of the target application, and the target behavior does not exist among the executable behaviors of the target application.
应理解,由于该权限信息中包括该目标应用可执行的行为,而该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中,因此,在目标应用的行为信息中存在目标行为的情况下,说明该目标应用存在超出其权限的行为,此时,服务器确定终端存在异常。It should be understood that since the permission information includes behaviors executable by the target application, and the target behavior is one of at least one behavior of the target application, the target behavior does not exist among the behaviors executable by the target application. Therefore, in If the target behavior exists in the behavior information of the target application, it means that the target application has behavior beyond its permissions. At this time, the server determines that there is an abnormality in the terminal.
本申请实施例中,服务器向终端发送目标权限查询请求,服务器接收终端发送的目标应用的权限信息,由于该权限信息中包括该目标应用可执行的行为,而该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中,因此,在目标应用的行为信息中存在目标行为的情况下,说明该目标应用存在超出其权限的行为,此时,服务器确定终端存在异常。In the embodiment of this application, the server sends a target permission query request to the terminal, and the server receives the permission information of the target application sent by the terminal, because the permission information includes the executable behavior of the target application, and the target behavior is at least the target application's executable behavior. One of the behaviors. The target behavior does not exist among the behaviors that can be executed by the target application. Therefore, if the target behavior exists in the behavior information of the target application, it means that the target application has behaviors that exceed its permissions. At this time, The server determines that there is an abnormality in the terminal.
进一步地,终端接收服务器发送的目标权限查询请求,终端向服务器发送目标应用的权限信息,而该权限信息中包括该目标应用可执行的行为,如此,能够帮助服务器准确快速地确定出该终端对应的目标应用是否存在超出其权限的行为,保证了异常确定的可靠性。Further, the terminal receives the target permission query request sent by the server, and the terminal sends the permission information of the target application to the server, and the permission information includes the executable behaviors of the target application. In this way, it can help the server accurately and quickly determine the corresponding permissions of the terminal. Whether the target application has behavior beyond its permissions ensures the reliability of exception determination.
在本申请实施例的一种实现方式中,服务器基于静态分析和动态解析相结合的主动挂马检测技术对所述目标应用或者终端对应的网页服务进行监测。In one implementation manner of the embodiment of the present application, the server monitors the web service corresponding to the target application or terminal based on active malware detection technology that combines static analysis and dynamic analysis.
具体的,服务器监测DOM对象和ActiveX控件,获取DOM对象和ActiveX控件各自的内存分配行为,并且通过ActiveX的ID判断、对象的接口调用来或者HeapSpray检测,确定DOM对象和ActiveX控件各自的内存分配行为中是否存在超出其权限的行为。Specifically, the server monitors DOM objects and ActiveX controls, obtains the respective memory allocation behaviors of DOM objects and ActiveX controls, and determines the respective memory allocation behaviors of DOM objects and ActiveX controls through ActiveX ID judgment, object interface calls, or HeapSpray detection. Whether there is any behavior beyond its authority.
在本申请实施例的一种实现方式中,上述至少一条安全扫描信息中还包括上述目标插件的日志信息,该日志信息用于记录该目标插件的安全扫描行为等信息。In an implementation manner of the embodiment of the present application, the at least one piece of security scanning information also includes log information of the target plug-in, and the log information is used to record information such as the security scanning behavior of the target plug-in.
在本申请实施例的一种实现方式中,上述服务器确定终端存在异常时,还会确定该终端的异常类型。In an implementation manner of the embodiment of the present application, when the above server determines that there is an abnormality in the terminal, it also determines the abnormality type of the terminal.
示例性的,上述异常类型包括远程信息泄露、远程数据修改、远程拒绝服务、远程执行命令、本地权限提升、客户端攻击类型:跨站脚本攻击、客户端攻击类型:内容欺骗、逻辑攻击类型:功能滥用、逻辑攻击类型:拒绝服务、逻辑攻击类型:过程验证不充分、命令执行类型:缓冲区溢出、命令执行类型:LDAP注入、命令执行类型:系统命令执行、命令执行类型:SQL注入、命令执行类型:XPath注入、信息泄露类型:目录索引信息泄露、信息泄露类型:信息泄露、信息泄露类型:目录遍历、信息泄露类型:资源位置可预测、认证类型:暴力猜测、认证类型:认证不充分、授权类型:授权不充分、授权类型:会话期限不足。For example, the above exception types include remote information leakage, remote data modification, remote denial of service, remote command execution, local privilege escalation, client attack type: cross-site scripting attack, client attack type: content spoofing, logical attack type: Function abuse, logical attack type: denial of service, logical attack type: insufficient process verification, command execution type: buffer overflow, command execution type: LDAP injection, command execution type: system command execution, command execution type: SQL injection, command Execution type: XPath injection, Information leakage type: Directory index information leakage, Information leakage type: Information leakage, Information leakage type: Directory traversal, Information leakage type: Predictable resource location, Authentication type: Brutal guessing, Authentication type: Insufficient authentication , Authorization type: Insufficient authorization, Authorization type: Insufficient session period.
在本申请实施例的一种实现方式中,服务器对终端对应的网页服务进行自动化漏洞扫描。In an implementation manner of the embodiment of the present application, the server performs automated vulnerability scanning on the web service corresponding to the terminal.
具体的,该自动化漏洞扫描技术包括站点信息重整化(NSFOCUS IntelligentProfile,NSIP)技术,增量扫描技术、针对已知Web应用的智能远程扫描技术以及基于DOM结构分析的页面对比分析技术。Specifically, the automated vulnerability scanning technology includes site information renormalization (NSFOCUS IntelligentProfile, NSIP) technology, incremental scanning technology, intelligent remote scanning technology for known web applications, and page comparison analysis technology based on DOM structure analysis.
其中,服务器基于站点信息重整化技术,获得该终端对应的网页服务的信息后,调用与该信息对应的插件,并建立漏洞知识库机制,并对该终端对应的网页服务进行扫描。Among them, the server is based on the site information reorganization technology. After obtaining the information of the web service corresponding to the terminal, it calls the plug-in corresponding to the information, establishes a vulnerability knowledge base mechanism, and scans the web service corresponding to the terminal.
示例性的,终端对应的网页服务为Apache服务,则在服务器扫描的过程中仅用Apache服务对应的特征串进行扫描。For example, if the web page service corresponding to the terminal is the Apache service, then only the characteristic string corresponding to the Apache service is used for scanning during the server scanning process.
服务器基于增量扫描技术,获取该终端对应的网页服务的HTTP响应字段、页面MD5值等信息,并将其存入与该终端对应的profile文件中,在对该终端内进行下一次扫描时,基于该终端的新生成的profile文件,确定该网页服务是否变更,在该网页服务未发生变更的情况下,确定该网页服务正常。Based on incremental scanning technology, the server obtains the HTTP response field, page MD5 value and other information of the web service corresponding to the terminal, and stores it in the profile file corresponding to the terminal. When the next scan is performed on the terminal, Based on the newly generated profile file of the terminal, it is determined whether the web page service has changed. If the web page service has not changed, it is determined that the web page service is normal.
服务器基于已知Web应用的智能远程扫描技术,确定该终端对应网页服务是否为已知的网页服务,在该终端对应的网页服务为已知网页服务的情况下,服务器基于该异常网页服务的公开漏洞,确定该终端对应的网页服务是否异常。The server determines whether the web page service corresponding to the terminal is a known web page service based on the intelligent remote scanning technology of known web applications. If the web page service corresponding to the terminal is a known web page service, the server determines whether the web page service corresponding to the terminal is a known web page service. Vulnerability, determine whether the web service corresponding to the terminal is abnormal.
示例性的,服务器基于CGI(common gateway interface,公共网关接口)扫描模块,确定该终端对应的网页服务的CGI漏洞。For example, the server determines the CGI vulnerability of the web page service corresponding to the terminal based on the CGI (common gateway interface, public gateway interface) scanning module.
在增量扫描、SQL(structured query language,结构化查询语言)注入检测、XPath(XML(标准通用标记语言的子集)路径语言)注入检测、篡改检测时都需要对前后请求的页面进行页面变化分析,以判断页面是否有实质性的变化。服务器基于DOM结构分析的页面对比分析技术以及该终端对应的网页服务,生成DOM树,基于该DOM树中各节点的特征,确定该终端对应的网页服务的页面变化分析结果,能够更准确地确定出该终端对应的网页服务是否存在异常。During incremental scanning, SQL (structured query language, structured query language) injection detection, XPath (XML (subset of standard universal markup language) path language) injection detection, and tampering detection, it is necessary to perform page changes on the pages requested before and after. Analysis to determine whether there are substantial changes to the page. The server generates a DOM tree based on the page comparison analysis technology of DOM structure analysis and the web page service corresponding to the terminal. Based on the characteristics of each node in the DOM tree, it determines the page change analysis results of the web page service corresponding to the terminal, which can more accurately determine Check whether there is any abnormality in the web service corresponding to the terminal.
本申请实施例可以根据上述方法示例对电子设备等进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。Embodiments of the present application can divide electronic equipment into functional modules according to the above method examples. For example, functional modules can be divided into corresponding functional modules, or two or more functions can be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods.
在采用对应各个功能划分各个功能模块的情况下,图6示出了上述实施例中所涉及的异常确定装置的一种可能的结构示意图,如图6所示,异常确定装置30可以包括:发送模块301、接收模块302以及确定模块303。In the case of dividing each functional module corresponding to each function, Figure 6 shows a possible structural diagram of the anomaly determining device involved in the above embodiment. As shown in Figure 6, the anomaly determining device 30 may include: sending Module 301, receiving module 302 and determining module 303.
发送模块301,用于向终端发送远程连接请求,该远程连接请求用于请求与终端建立远程连接。The sending module 301 is used to send a remote connection request to the terminal, where the remote connection request is used to request to establish a remote connection with the terminal.
接收模块302,用于接收该终端发送的终端信息,该终端信息包括终端的端口号。The receiving module 302 is configured to receive terminal information sent by the terminal, where the terminal information includes the port number of the terminal.
确定模块303,用于基于该端口号,确定该终端对应的服务。The determination module 303 is used to determine the service corresponding to the terminal based on the port number.
确定模块303,还用于基于该终端对应的服务确定目标插件,该目标插件用于指示对该终端进行安全扫描。The determination module 303 is also configured to determine a target plug-in based on the service corresponding to the terminal. The target plug-in is used to instruct security scanning of the terminal.
发送模块301,还用于向该终端发送该目标插件。The sending module 301 is also used to send the target plug-in to the terminal.
接收模块302,还用于接收该终端发送的至少一条安全扫描信息。The receiving module 302 is also configured to receive at least one piece of security scanning information sent by the terminal.
确定模块303,还用于在异常信息库存在第一安全扫描信息的情况下,确定该终端存在异常,该第一安全扫描信息为该至少一条安全扫描信息中的一条。The determination module 303 is also configured to determine that there is an abnormality in the terminal when the abnormality information library contains first security scan information, and the first security scan information is one of the at least one piece of security scan information.
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url。Optionally, the service corresponding to the terminal is a web page service, and the terminal information includes multiple URLs corresponding to the web page service.
确定模块303,还用于基于该网页服务对应的多个url,确定多个参数,其中,一个参数为一个url中的字段。The determination module 303 is also used to determine multiple parameters based on multiple URLs corresponding to the web service, where one parameter is a field in a URL.
确定模块303,还用于基于第一参数和预设字符串,确定目标字符串,该第一参数为该多个参数中的一个,该目标字符串为异常服务对应的服务请求,该异常服务对应于该预设字符串。The determination module 303 is also configured to determine a target string based on a first parameter and a preset string. The first parameter is one of the plurality of parameters. The target string is a service request corresponding to the abnormal service. The abnormal service Corresponds to this preset string.
发送模块301,还用于向该终端发送该目标字符串。The sending module 301 is also used to send the target string to the terminal.
接收模块302,还用于接收该终端发送的服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务。The receiving module 302 is also configured to receive a service response sent by the terminal, where the service response is used to indicate whether the terminal exists in an abnormal service corresponding to the target string.
确定模块303,还用于在该终端存在与该目标字符串对应的服务的情况下,确定该终端存在异常。The determination module 303 is also configured to determine that there is an abnormality in the terminal if there is a service corresponding to the target string in the terminal.
可选地,上述终端信息还包括目标应用的行为信息,该目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为。Optionally, the above terminal information also includes behavior information of a target application, the target application is an application installed on the terminal, and the behavior information of the target application includes at least one behavior of the target application.
发送模块301,还用于向该终端发送目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为。The sending module 301 is also configured to send a target permission query request to the terminal. The target permission query request is used to request permission information of the target application, and the permission information includes executable behaviors of the target application.
接收模块302,还用于接收该终端发送的该目标应用的权限信息。The receiving module 302 is also configured to receive the permission information of the target application sent by the terminal.
确定模块303,还用于在该目标应用的行为信息中存在目标行为的情况下,确定该终端存在异常,该目标行为为该目标应用的至少一个行为中一个,该目标行为不存在于该目标应用可执行的行为中。The determination module 303 is also configured to determine that there is an abnormality in the terminal when there is a target behavior in the behavior information of the target application. The target behavior is one of at least one behavior of the target application and the target behavior does not exist in the target. Application executable behavior.
在采用集成的单元的情况下,图7示出了上述实施例中所涉及的异常确定装置的一种可能的结构示意图。如图7所示,异常确定装置40可以包括:处理模块401和通信模块402。处理模块401可以用于对异常确定装置40的动作进行控制管理。通信模块402可以用于支持异常确定装置40与其他实体的通信。可选地,如图7所示,该异常确定装置40还可以包括存储模块403,用于存储异常确定装置40的程序代码和数据。In the case of using an integrated unit, FIG. 7 shows a possible structural diagram of the anomaly determining device involved in the above embodiment. As shown in FIG. 7 , the abnormality determination device 40 may include: a processing module 401 and a communication module 402 . The processing module 401 may be used to control and manage the actions of the abnormality determination device 40 . The communication module 402 may be used to support communication between the anomaly determining device 40 and other entities. Optionally, as shown in FIG. 7 , the anomaly determining device 40 may also include a storage module 403 for storing program codes and data of the anomaly determining device 40 .
其中,处理模块401可以是处理器或控制器。通信模块402可以是收发器、收发电路或通信接口等。存储模块403可以是存储器。Among them, the processing module 401 may be a processor or a controller. The communication module 402 may be a transceiver, a transceiver circuit, a communication interface, etc. The storage module 403 may be a memory.
其中,当处理模块401为处理器,通信模块402为收发器,存储模块403为存储器时,处理器、收发器和存储器可以通过总线连接。总线可以是外设部件互连标准(peripheralcomponent interconnect,PCI)总线或扩展工业标准结构(extended industry standardarchitecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。Wherein, when the processing module 401 is a processor, the communication module 402 is a transceiver, and the storage module 403 is a memory, the processor, transceiver and memory can be connected through a bus. The bus may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus. The bus can be divided into address bus, data bus, control bus, etc.
在采用对应各个功能划分各个功能模块的情况下,图8示出了上述实施例中所涉及的异常确定装置的一种可能的结构示意图,如图8所示,异常确定装置50可以包括:接收模块501、发送模块502以及处理模块503。In the case of dividing each functional module corresponding to each function, Figure 8 shows a possible structural diagram of the anomaly determining device involved in the above embodiment. As shown in Figure 8, the anomaly determining device 50 may include: receiving Module 501, sending module 502 and processing module 503.
接收模块501,用于接收服务器发送的远程连接请求,该远程连接请求用于请求与该终端建立远程连接。The receiving module 501 is configured to receive a remote connection request sent by the server, where the remote connection request is used to request the establishment of a remote connection with the terminal.
发送模块502,用于向该服务器发送终端信息,该终端信息包括终端的端口号。The sending module 502 is used to send terminal information to the server, where the terminal information includes the port number of the terminal.
接收模块502,还用于接收该服务器发送的目标插件。The receiving module 502 is also used to receive the target plug-in sent by the server.
处理模块503,用于基于该目标插件对该终端进行安全扫描,得到至少一条安全扫描信息。The processing module 503 is configured to perform a security scan on the terminal based on the target plug-in and obtain at least one piece of security scan information.
该发送模块,还用于向该服务器发送该至少一条安全扫描信息。The sending module is also used to send the at least one piece of security scanning information to the server.
可选地,上述终端对应的服务为网页服务,上述终端信息中包括该网页服务对应的多个url。Optionally, the service corresponding to the terminal is a web page service, and the terminal information includes multiple URLs corresponding to the web page service.
接收模块501,还用于接收该服务器发送的目标字符串,该目标字符串为异常服务对应的服务请求,该异常服务对应于预设字符串。The receiving module 501 is also used to receive a target string sent by the server, where the target string is a service request corresponding to an abnormal service, and the abnormal service corresponds to a preset string.
发送模块502,还用于向该服务器发送服务响应,该服务响应用于指示该终端是否存在于该目标字符串对应的异常服务。The sending module 502 is also configured to send a service response to the server, where the service response is used to indicate whether the terminal exists in an abnormal service corresponding to the target string.
可选地,上述终端信息还包括目标应用的行为信息,该目标应用为安装在该终端上的应用,该目标应用的行为信息中包括该目标应用的至少一个行为。Optionally, the above terminal information also includes behavior information of a target application, the target application is an application installed on the terminal, and the behavior information of the target application includes at least one behavior of the target application.
接收模块501,还用于接收该服务器发送的目标权限查询请求,该目标权限查询请求用于请求查询该目标应用的权限信息,该权限信息中包括该目标应用可执行的行为。The receiving module 501 is also configured to receive a target permission query request sent by the server. The target permission query request is used to request permission information of the target application. The permission information includes executable behaviors of the target application.
发送模块502,还用于向该服务器发送该目标应用的权限信息。The sending module 502 is also used to send the permission information of the target application to the server.
在采用集成的单元的情况下,图9示出了上述实施例中所涉及的异常确定装置的一种可能的结构示意图。如图9所示,异常确定装置60可以包括:处理模块601和通信模块602。处理模块601可以用于对异常确定装置60的动作进行控制管理。通信模块602可以用于支持异常确定装置60与其他实体的通信。可选地,如图9所示,该异常确定装置60还可以包括存储模块603,用于存储异常确定装置60的程序代码和数据。In the case of using an integrated unit, FIG. 9 shows a possible structural diagram of the anomaly determining device involved in the above embodiment. As shown in FIG. 9 , the abnormality determination device 60 may include: a processing module 601 and a communication module 602 . The processing module 601 may be used to control and manage the actions of the abnormality determination device 60 . The communication module 602 may be used to support communication between the anomaly determining device 60 and other entities. Optionally, as shown in FIG. 9 , the anomaly determining device 60 may also include a storage module 603 for storing program codes and data of the anomaly determining device 60 .
其中,处理模块601可以是处理器或控制器。通信模块602可以是收发器、收发电路或通信接口等。存储模块603可以是存储器。Among them, the processing module 601 may be a processor or a controller. The communication module 602 may be a transceiver, a transceiver circuit, a communication interface, etc. The storage module 603 may be a memory.
其中,当处理模块601为处理器,通信模块602为收发器,存储模块603为存储器时,处理器、收发器和存储器可以通过总线连接。总线可以是PCI总线或EISA总线等。总线可以分为地址总线、数据总线、控制总线等。Wherein, when the processing module 601 is a processor, the communication module 602 is a transceiver, and the storage module 603 is a memory, the processor, transceiver and memory can be connected through a bus. The bus can be PCI bus or EISA bus, etc. The bus can be divided into address bus, data bus, control bus, etc.
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that in the various embodiments of the present application, the size of the sequence numbers of the above-mentioned processes does not mean the order of execution. The execution order of each process should be determined by its functions and internal logic, and should not be used in the embodiments of the present application. The implementation process constitutes any limitation.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented with electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, the specific working processes of the systems, devices and units described above can be referred to the corresponding processes in the foregoing method embodiments, and will not be described again here.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户终端线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When computer program instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or include one or more data storage devices such as servers and data centers that can be integrated with the medium. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited thereto. Any person familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application. should be covered by the protection scope of this application. Therefore, the protection scope of this application should be determined by the protection scope of the claims.
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311618906.5A CN117439813A (en) | 2023-11-29 | 2023-11-29 | Anomaly determination method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311618906.5A CN117439813A (en) | 2023-11-29 | 2023-11-29 | Anomaly determination method, device, electronic equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN117439813A true CN117439813A (en) | 2024-01-23 |
Family
ID=89555357
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311618906.5A Pending CN117439813A (en) | 2023-11-29 | 2023-11-29 | Anomaly determination method, device, electronic equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117439813A (en) |
-
2023
- 2023-11-29 CN CN202311618906.5A patent/CN117439813A/en active Pending
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110209583B (en) | Security testing methods, devices, systems, equipment and storage media | |
| US11330016B2 (en) | Generating collection rules based on security rules | |
| EP3424178B1 (en) | Deterministic reproduction of client/server computer state or output sent to one or more client computers | |
| US10771500B2 (en) | System and method of determining DDOS attacks | |
| US9430646B1 (en) | Distributed systems and methods for automatically detecting unknown bots and botnets | |
| CN112468518B (en) | Access data processing method and device, storage medium and computer equipment | |
| JP7388613B2 (en) | Packet processing method and apparatus, device, and computer readable storage medium | |
| US20120255022A1 (en) | Systems and methods for determining vulnerability to session stealing | |
| US10129289B1 (en) | Mitigating attacks on server computers by enforcing platform policies on client computers | |
| CN113645234B (en) | Honeypot-based network defense method, system, medium and device | |
| CN110557358A (en) | Honeypot server communication method, SSLStrip man-in-the-middle attack perception method and related device | |
| WO2023116045A1 (en) | Method for identifying successful attack, and protection system | |
| US20230164119A1 (en) | Network device protection | |
| CN108234516B (en) | Method and device for detecting network flooding attack | |
| WO2022156197A1 (en) | Attack success identification method and protection device | |
| CN110730189B (en) | Communication authentication method, device, equipment and storage medium | |
| CN115174243A (en) | Malicious IP address blocking processing method, device, equipment and storage medium | |
| Jeyanthi | Internet of things (IoT) as interconnection of threats (IoT) | |
| US10360379B2 (en) | Method and apparatus for detecting exploits | |
| CN117439813A (en) | Anomaly determination method, device, electronic equipment and storage medium | |
| EP3971748B1 (en) | Network connection request method and apparatus | |
| Sharma et al. | Detection of ARP Spoofing: A command line execution method | |
| Arafat et al. | Study on security issue in open source SIP server | |
| EP3432544B1 (en) | System and method of determining ddos attacks | |
| US20250071557A1 (en) | Systems and methods for end user authentication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |