Disclosure of Invention
In order to overcome the above-mentioned drawbacks of the prior art, embodiments of the present invention provide an efficient key management system for an integrated security gateway system to solve the above-mentioned problems set forth in the background art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
The effective load monitoring module is used for monitoring and analyzing the effective load in real time by a deep packet inspection technology;
The key generation module is used for generating a key pair by adopting a high-strength encryption algorithm, selecting the key length and signing the key pair, and transmitting the key after signing to the key backup and recovery module;
the key backup and recovery module is used for periodically carrying out incremental backup on the key to the safe offline storage equipment, providing a key recovery mechanism and transmitting the backed-up key to the key exchange module;
the key signature verification module is used for carrying out signature verification on the exchanged keys and operating according to the instruction after signature verification.
Preferably, in the payload monitoring module, a network traffic analyzer (Wireshark) is used to capture and analyze the data packet transmitted through the network interface, and then the DPI system is deployed to check the content and the payload of the data packet, wherein the method for capturing the data packet and checking the data packet specifically comprises the following steps:
The method comprises the steps of starting data packet capturing, monitoring a designated network interface in real time, collecting data packets transmitted through a network, performing flow screening by using a filter in the capturing process, wherein the flow screening comprises the steps of filtering specific IP addresses, protocols and ports to reduce the size of the captured data packets, storing the data packets into a pcap file after the capturing is completed for subsequent analysis, opening the captured data packet file by using a data packet analysis tool Wireshark, checking a captured data packet list in the tool interface, checking specific data packets, wherein each data packet generally comprises information such as a time stamp, a source address, a destination address, a protocol type, a length and the like, clicking specific data packets, checking detailed information of the specific data packets, including the data packet header comprising an Ethernet header, an IP header and a transmission layer header, carrying out protocol analysis on the data packets to understand the structure and the content of the data packets, checking specific meanings and data of each protocol field during analysis, and recombining a plurality of data packets into a complete flow for TCP protocol to help understand the interaction process and content;
the Wireshark provides a TCP stream reorganization function, utilizes a color highlighting and filtering function to identify abnormal traffic and abnormal load, checks transmitted contents to identify suspicious data and malicious traffic aiming at a specific protocol, and collates inspection results into reports including found problems, suspicious traffic and analysis conclusion.
Preferably, in the key generation module, the key generation method specifically includes:
Parameters are determined, wherein the parameters need to be determined before the key generation, and the parameters comprise big prime numbers f and h, a generation element g and a key length; the calculation method of the generator g specifically comprises the following steps:
where g is denoted as generator, f is denoted as first large prime, h is denoted as second large prime, mod is denoted as modulo operation, j is denoted as any one less than E is expressed as a natural constant;
Generating a private key and a public key after the parameters are determined; an integer x is selected as a private key in a pseudo-random manner to meet 0< x < h, and the calculation method of the public key parameters specifically comprises the following steps:
Wherein y is denoted as a public key parameter, g is denoted as a generator, x is denoted as a private key, f is denoted as a first large prime number, mod is denoted as a modulo operation;
the public key is expressed as The private key is x, and the key length selects 2048 bits of key.
The secret key is signed, and the signing method specifically comprises the following steps:
The method for calculating the first signature element by selecting a random integer n specifically comprises the following steps:
, wherein, Expressed as a first signature element, g expressed as a generator element, n expressed as an integer, e expressed as a natural constant, f expressed as a first large prime number, h expressed as a second large prime number, mod expressed as a modulo operation;
the calculation method of the second signature element specifically comprises the following steps:
, wherein, Represented as a second signature element, n is represented as an integer,Represented as hashed the generated element after the processing is processed,Represented as a private key and is provided with a key,Represented as a first signature element and is provided,Denoted as the second largest prime number, mod is denoted as modulo operation;
the first signature element and the second signature element form a signature, and the signature is expressed as 。
Preferably, in the key backup and recovery module, the key backup method specifically includes:
Before incremental backup, a full-volume backup is performed once, wherein the full-volume backup contains all data of the system and provides a reference for the incremental backup. During each incremental backup, the system needs to detect all changes, including newly added, modified and deleted data, since the last backup, and uses the time stamp, checksum version number of the file to determine which data has changed.
The method comprises the steps of carrying out backup on detected change data and storing the change data in a backup medium, recording changed metadata so that the change can be correctly identified and applied in a recovery process, maintaining and updating a backup index, and recording the time stamp of each backup, the change condition of data and the dependency relationship of the backup.
Preferably, in the key signature verification module, the signature verification method specifically includes:
after the receiver receives the signed key, it verifies AndOf the numerical range of (1)The numerical range of (2) is withinA kind of electronic deviceThe numerical range of (2) is withinThe first pass of verification is passed;
the verification value calculation method specifically includes:
wherein Z is represented as a verification value, g is represented as a generator, Denoted as first authentication parameter, y denoted as public key parameter,Denoted as second verification parameter, mod is denoted as modulo operation, f is denoted as first large prime number, and h is denoted as second large prime number;
and if the calculated verification value is not equal to the first signature element, the verification signature fails, the key is attacked, the data is leaked, and early warning is started.
The invention has the technical effects and advantages that:
The invention provides a high-efficiency key management system for a comprehensive security gateway system, which is used for analyzing network traffic in real time through a payload monitoring module and a deep packet detection technology, identifying abnormal load and potential attack, capturing a data packet by using Wireshark and storing the data packet as a.pcap file, and carrying out subsequent analysis. The effective load calculation method comprises the steps of comparing parameters such as a weight coefficient of a historical measured value and a load judgment factor with a preset threshold value, sending a corresponding instruction, generating a key pair by a key generation module through a high-strength encryption algorithm, carrying out signature processing, transmitting the key pair to a key backup and recovery module for incremental backup, verifying the key signature after exchange by a key signature verification module, ensuring that the key is not attacked, and ensuring the security of the key in the process of generating, storing, transmitting and using through the modules and steps through a high-strength encryption algorithm and a strict key management strategy, and preventing unauthorized access and tampering.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present invention provides a high-efficiency key management system for an integrated security gateway system, which includes a payload monitoring module, a key generating module, a key backup and recovery module, and a key signature verification module.
The payload monitoring module is connected with the key generation module, the key generation module is connected with the key backup and recovery module, and the key backup and recovery module is connected with the key signature verification module.
The effective load monitoring module is used for monitoring and analyzing effective load in real time by a deep packet inspection technology;
In the payload monitoring module, a network traffic analyzer (Wireshark) is used for capturing and analyzing the data packet transmitted through a network interface, a DPI system is deployed again for checking the content and the payload of the data packet, and the method for capturing the data packet and checking the data packet comprises the following steps:
The method comprises the steps of starting data packet capturing, monitoring a designated network interface in real time, collecting data packets transmitted through a network, performing flow screening by using a filter in the capturing process, wherein the flow screening comprises the steps of filtering specific IP addresses, protocols and ports to reduce the size of the captured data packets, storing the data packets into a pcap file after the capturing is completed for subsequent analysis, opening the captured data packet file by using a data packet analysis tool Wireshark, checking a captured data packet list in the tool interface, checking specific data packets, wherein each data packet generally comprises information such as a time stamp, a source address, a destination address, a protocol type, a length and the like, clicking specific data packets, checking detailed information of the specific data packets, including the data packet header comprising an Ethernet header, an IP header and a transmission layer header, carrying out protocol analysis on the data packets to understand the structure and the content of the data packets, checking specific meanings and data of each protocol field during analysis, and recombining a plurality of data packets into a complete flow for TCP protocol to help understand the interaction process and content;
the Wireshark provides a TCP stream reorganization function, utilizes a color highlighting and filtering function to identify abnormal traffic and abnormal load, checks transmitted content to identify suspicious data and malicious traffic aiming at a specific protocol, and collates the checking result into a report including found problems, suspicious traffic and analysis conclusion;
The method for calculating the effective load comprises the following steps:
, wherein, Represented as a payload of a material,The weight coefficient expressed as a historical measurement value,The gateway performance measurement, denoted as t, L is denoted as CPU acquisition length,Expressed as a load judgment factor;
The calculation method of the load judgment factor specifically comprises the following steps:
, wherein, Denoted as load judgment factor, L denoted as CPU acquisition length,Represented as a load value for gateway number b,The number of CPUs denoted gateway number b;
the calculation method of the weight coefficient of the history measured value specifically comprises the following steps:
, wherein, The weight coefficient expressed as a history measured value, and L expressed as a CPU acquisition length;
comparing the calculated effective load with a preset effective load threshold, if the calculated effective load is larger than the preset effective load threshold, issuing a dangerous instruction, transferring to a key generation module, encrypting the transmitted data, and if the calculated effective load is smaller than the preset effective load threshold, issuing a safe instruction, and continuing to operate.
The key generation module is used for generating a key pair by adopting a high-strength encryption algorithm, selecting the key length and signing the key pair, and transmitting the key after signing to the key backup and recovery module;
In the key generation module, the key generation method specifically comprises the following steps:
Parameters are determined, wherein the parameters need to be determined before the key generation, and the parameters comprise big prime numbers f and h, a generation element g and a key length; the calculation method of the generator g specifically comprises the following steps:
where g is denoted as generator, f is denoted as first large prime, h is denoted as second large prime, mod is denoted as modulo operation, j is denoted as any one less than E is expressed as a natural constant;
Generating a private key and a public key after the parameters are determined; an integer x is selected as a private key in a pseudo-random manner to meet 0< x < h, and the calculation method of the public key parameters specifically comprises the following steps:
Wherein y is denoted as a public key parameter, g is denoted as a generator, x is denoted as a private key, f is denoted as a first large prime number, mod is denoted as a modulo operation;
the public key is expressed as The private key is x, and the key length selects 2048 bits of key.
The secret key is signed, and the signing method specifically comprises the following steps:
The method for calculating the first signature element by selecting a random integer n specifically comprises the following steps:
, wherein, Expressed as a first signature element, g expressed as a generator element, n expressed as an integer, e expressed as a natural constant, f expressed as a first large prime number, h expressed as a second large prime number, mod expressed as a modulo operation;
the calculation method of the second signature element specifically comprises the following steps:
, wherein, Represented as a second signature element, n is represented as an integer,Represented as hashed the generated element after the processing is processed,Represented as a private key and is provided with a key,Represented as a first signature element and is provided,Denoted as the second largest prime number, mod is denoted as modulo operation;
the first signature element and the second signature element form a signature, and the signature is expressed as 。
The key backup and recovery module is used for periodically carrying out incremental backup on the key to the safe offline storage equipment, providing a key recovery mechanism and transmitting the backed-up key to the key exchange module;
In the key backup and recovery module, the key backup method specifically comprises the following steps:
Before incremental backup, a full-volume backup is performed once, wherein the full-volume backup contains all data of the system and provides a reference for the incremental backup. During each incremental backup, the system needs to detect all changes, including newly added, modified and deleted data, since the last backup, and uses the time stamp, checksum version number of the file to determine which data has changed.
The method comprises the steps of detecting change data, carrying out backup on the detected change data and storing the change data in a backup medium, recording changed metadata so as to correctly identify and apply the changes in a recovery process, maintaining and updating a backup index, and recording the time stamp of each backup, the change condition of the data and the dependency relationship of the backup;
the method of the recovery process specifically comprises the following steps:
And importing the data of the full backup into a target system to ensure the data integrity, and applying all the incremental backups one by one according to the time sequence. Each incremental backup should be applied based on the previous incremental backup, ensuring that the sequence of the incremental backups is consistent with the time stamp at the time of the backup. The restore should start from the earliest incremental backup and gradually apply back until the latest incremental backup.
The method comprises the steps of recording the time stamp of each incremental backup so as to check in the recovery process, merging data after each incremental backup is applied to ensure that new data and existing data are integrated correctly, and checking data consistency to ensure that the recovered data is consistent with the data in the backup process and avoid data loss or inconsistency.
The key signature verification module is used for carrying out signature verification on the exchanged keys and operating according to the instruction after signature verification;
In the key signature verification module, the signature verification method specifically comprises the following steps:
after the receiver receives the signed key, it verifies AndOf the numerical range of (1)The numerical range of (2) is withinA kind of electronic deviceThe numerical range of (2) is withinThe first verification is passed, and a first verification parameter is calculated, wherein the calculation method of the first verification parameter specifically comprises the following steps:
, wherein, Represented as a first verification parameter, is provided,Denoted as hashed generator, u denoted as a first validation parameter influencing factor,Expressed as the second largest prime number;
the calculation method of the first verification parameter influence factor specifically comprises the following steps:
Where u is denoted as the verification parameter influencing factor, Denoted as second signature element, h as second largest prime number and mod as modulo operation;
the calculation method of the second verification parameter specifically comprises the following steps:
, wherein, Represented as a second verification parameter, which is a second verification parameter,Denoted as first signature element, u as verification parameter influencing factor, h as second large prime number, mod as modulo operation;
the verification value calculation method specifically comprises the following steps:
wherein Z is represented as a verification value, g is represented as a generator, Denoted as first authentication parameter, y denoted as public key parameter,Denoted as second verification parameter, mod is denoted as modulo operation, f is denoted as first large prime number, and h is denoted as second large prime number;
and if the calculated verification value is not equal to the first signature element, the verification signature fails, the key is attacked, the data is leaked, and early warning is started.
Finally, the foregoing description of the preferred embodiment of the invention is provided for the purpose of illustration only, and is not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.