Detailed Description
The application solves the technical problem of untimely protection caused by inaccurate network risk identification under the traditional static IP address management by providing the network security processing method and system based on the dynamic network.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that the terms "comprises" and "comprising" are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
In a first embodiment, as shown in fig. 1, the present application provides a network security processing method based on a dynamic network, where the method includes:
And executing configuration management of the network terminal in the intranet, wherein the configuration management comprises real IP address, external network access IP address and virtual address management of the dynamic conversion unit.
The stable operation and the safety of the network are ensured by carrying out configuration management on the network terminal in the intranet, wherein the configuration management comprises real IP address, external network access IP address and virtual address management of the dynamic transformation unit. Specifically, a unique real IP address is allocated to each network terminal, and the real IP address information of each terminal is recorded, wherein the information comprises a terminal name, a MAC address, a sub-network to which the terminal belongs and the like; if a network terminal needs to access an external network, one or more external network access IP addresses are allocated to the network terminal, the IP addresses are usually obtained from a public IP address pool through NAT (network address translation) or VPN (virtual private network) and other technologies, according to service requirements and security policies, which terminals can access the external network, and access modes and authorities are formulated, external network access behaviors are recorded and monitored, and the access behaviors are ensured to meet the policy requirements.
And carrying out terminal monitoring on the network terminal based on the configuration management result, and establishing a monitoring data set, wherein the monitoring data set comprises a device data set and a user data set.
The configuration management result comprises a real IP address, an external network access IP address and a virtual address of a dynamic conversion unit, and the network terminal is monitored according to the configuration result so as to acquire the state and user activity of the network terminal in real time, and then a monitoring data set is established, wherein the monitoring data set comprises a device data set and a user data set, the device data set comprises fields of a device identifier (such as a MAC address and an IP address), a device type, a device state, configuration information, performance data and the like, and the user data set comprises fields of a user identifier (such as a user name and an account number), user behaviors (such as login time, login position and access record), user permission and the like. Specifically, the required device data set and user data set are collected by deploying a terminal monitoring tool or system, such as an SNMP (simple network management protocol) monitor, netFlow analysis tool, terminal security management software, and the like. By implementing terminal monitoring and establishing a monitoring data set comprising a device data set and a user data set, the state and performance of the network terminal can be known in time.
And establishing a driving network, wherein the driving network comprises a time driving sub-network, an event driving sub-network and a load driving sub-network, inputting the monitoring data set and the time information into the driving network to execute driving evaluation, calling the virtual address based on a driving evaluation result, and executing dynamic IP updating of a network terminal.
Dynamic IP updating of network terminals is supported by constructing a driving network, wherein the driving network comprises a time-driven sub-network, an event-driven sub-network and a load-driven sub-network. The time driving sub-network is used for receiving time information (such as current time, time interval and the like) and triggering a state check or update task of the network terminal according to the time information, the event driving sub-network is used for receiving events (such as login events, access abnormal events and the like) from the system and triggering corresponding processing logic according to event types, and the load driving sub-network is used for monitoring network loads (such as CPU utilization rate, bandwidth occupation and the like) and adjusting configuration or resource allocation of the network terminal according to load conditions. And inputting the monitoring data set and the time information into a driving network to execute driving evaluation, in the driving network, analyzing and evaluating the input monitoring data set and the time information according to the conditions and rules of time driving, event driving and load driving, evaluating the state, performance, safety condition and network load condition of the network terminal, determining whether dynamic IP updating of the network terminal is required or not based on a driving evaluation result, calling an available virtual address from a virtual address pool if updating is required, executing dynamic IP updating operation, and changing the IP address of the network terminal from an old address to a newly called virtual address. By establishing the driving network, the dynamic IP updating of the network terminal can be managed more flexibly and intelligently, the safety and stability of the network are improved, and the network performance and resource utilization are optimized.
And calculating the node security influence score of each monitoring point through the monitoring data set, and generating a node security influence score calculation result.
And carrying out node security influence score calculation on each monitoring point according to the monitoring data set, and generating a node security influence score calculation result.
Further, the calculating the node security impact score of each monitoring point by the monitoring data set, generating a node security impact score calculation result, further includes:
The node security impact score calculation formula is configured as follows:
The method comprises the steps of representing node safety influence scoring calculation results of an ith monitoring point by K i, wherein M i is the total number of events in the ith monitoring point, S ip is the severity score of a p-th event in the ith monitoring point, F ip is the occurrence frequency of the p-th event in the ith monitoring point, R ip is the response speed of the p-th event in the ith monitoring point, and the adaptability of the p-th event in the ith monitoring point of A ip.
Preferably, the calculation formula is calculated according to the node security impact score: The method comprises the steps of calculating a node security impact score, wherein K i represents a node security impact score calculation result of an ith monitoring point, K i is higher and represents the worse security condition of the monitoring point, M i represents the total number of events in the ith monitoring point, the number of events of each monitoring point can be counted from a monitoring data set, S ip is a severity score of the p-th event in the ith monitoring point, the severity score can be determined according to an organization security policy and historical experience, the severity score can be 1 (low), 2 (medium), 3 (high) and the like, F ip is the occurrence frequency of the p-th event in the ith monitoring point, the occurrence frequency can be quantified by counting the occurrence frequency of the event in a period of time, a proper period of time (such as day, week and month) can be selected, R ip is the response speed of the p-th event in the ith monitoring point, the response speed can be defined as the time length from the fact that the event is detected to the start of taking effective response measures, A ip is the p-th event, the p-th event is suitable for the security policy is matched with a security vulnerability of a certain security policy, the security policy is matched with a certain security policy, or a certain security vulnerability is matched with a certain security policy, and the security policy is matched with a certain security policy is low, for example.
And carrying out abnormal event association evaluation on all monitoring points, carrying out influence calculation on the node security influence score calculation result based on the association evaluation result, and generating a comprehensive security influence score.
The method comprises the steps of obtaining abnormal event data of all monitoring points, including time stamps, event types, source IP, target IP and the like, analyzing association relations of abnormal events among different monitoring points by using association rule learning, graph theory, time sequence analysis and other methods, including commonly occurring events, time correlation, spatial proximity and the like, constructing an abnormal event association network among the monitoring points based on association analysis results, wherein nodes in the abnormal event association network represent the monitoring points while representing the association relations among the monitoring points, distributing an association strength value for each association relation based on a plurality of factors such as common occurrence frequency, time interval and transmission path of the events, and quantifying the association degree of the abnormal events among the different monitoring points. And performing influence calculation on the node security influence score calculation result based on the association evaluation result to generate a comprehensive security influence score.
Further, the generating the comprehensive security impact score further includes:
Calculating a comprehensive safety impact score by the formula:
Wherein K is the comprehensive security impact score, N is the total number of monitoring points, W i represents the importance of the ith monitoring point, K i is the node security impact score calculation result of the ith monitoring point, K j is the node security impact score calculation result of the jth monitoring point, C ij represents the mutual impact coefficient of the ith monitoring point and the jth monitoring point, And normalizing the safety influence score calculation results of all the monitoring points as normalization factors.
Preferably, a comprehensive security impact score is calculated according to a formula, wherein K is the comprehensive security impact score and reflects the security condition of the whole network, N is the total number of monitoring points, W i represents the importance of the ith monitoring point and reflects the key degree of the monitoring point in the network, K i is the node security impact score calculation result of the ith monitoring point, K j is the node security impact score calculation result of the jth monitoring point, C ij represents the mutual impact coefficient of the ith monitoring point and the jth monitoring point and reflects the association degree between the two monitoring points; And (3) normalizing the safety influence score calculation results of all the monitoring points by using the normalization factors, wherein m and l represent any monitoring point.
And carrying out network security processing according to the comprehensive security influence score and the dynamic IP updating result.
According to the comprehensive security influence score, the security condition of the current network is evaluated, a security influence score threshold value can be set, when the score exceeds the set threshold value, a corresponding security response mechanism is triggered, according to a dynamic IP updating result, the access mode, the flow characteristics and the like of an IP address are analyzed, abnormal behaviors are identified, the potential network security risk is evaluated based on the behavior analysis of the IP address, and network security treatment is carried out on the IP address with higher comprehensive security influence score or abnormal behaviors, for example, isolation measures including blocking the IP, limiting the access and the like are adopted.
Further, the network security processing according to the comprehensive security impact score and the dynamic IP updating result further includes:
The scoring early warning grade of the comprehensive security influence score is obtained, the adaptation evaluation is updated according to the scoring early warning grade and the dynamic IP updating result, and the network security abnormality is reported based on the adaptation evaluation result.
Preferably, different pre-warning levels are defined according to the range of the comprehensive security impact score, such as security (low score), general risk (medium score), high risk (high score), emergency risk (extremely high score) and the like, corresponding scoring thresholds are set for each pre-warning level, the calculated comprehensive security impact score is compared with the thresholds to determine the current scoring pre-warning level, the update record of the dynamic IP is checked, whether abnormal update (such as unauthorized IP change, frequent IP change and the like) exists or not is analyzed, the dynamic IP update result is combined with the scoring pre-warning level to evaluate the current network state, for example, if the scoring pre-warning level is high risk or emergency risk and the dynamic IP update result also shows abnormality, more urgent response is possibly needed, specific network security abnormality types such as IP address conflict, unauthorized access, potential data leakage and the like are determined according to the updated adaptation evaluation result, and corresponding alarms including detailed information of abnormality, possible influence range, suggested countermeasures and the like are generated according to the abnormality types.
Further, the method further comprises:
The method comprises the steps of judging whether the scoring early warning level meets a preset level threshold, generating a dynamic topology conversion instruction if the scoring early warning level meets the preset level threshold, controlling a network terminal to perform physical structure conversion according to the dynamic topology conversion instruction, and performing network security processing based on a physical structure conversion result.
Preferably, the scoring early warning level of the comprehensive security impact score is obtained, the scoring early warning level is compared with a preset level threshold, if the scoring early warning level meets or exceeds the preset level threshold, one or more dynamic topology transformation instructions are generated, the dynamic topology transformation instructions describe how to adjust the network structure so as to reduce security risks, the dynamic topology transformation instructions can comprise operations of disconnecting certain connections, rerouting traffic, enabling or disabling certain devices and the like, the generated dynamic topology transformation instructions are sent to a network terminal, and after the network terminal (such as a router, a switch, a firewall and the like) receives the instructions, corresponding physical structure transformation is executed, including connection changing, routing table configuration, security policy updating and the like.
Further, the method further comprises:
Establishing a historical connection database of the network terminal, performing connection analysis of the historical connection database, establishing connection association coefficients, matching connection random numbers according to the connection association coefficients, performing physical structure transformation selection of the network terminal based on the connection random numbers, and establishing a physical structure transformation result.
Preferably, the method comprises the steps of obtaining historical connection data of network terminals (such as routers, switches, servers and the like), including the starting time, the ending time, the source address, the target address, the used protocols and the like of connection, storing the historical connection data in a database to form a historical connection database of the network terminals, analyzing the historical connection data, identifying frequent connection, abnormal connection, critical connection and the like, analyzing connection modes such as devices which are frequently communicated with each other and time periods in which connection is more frequent, defining an association coefficient for connection between each network terminal based on connection analysis results, wherein the association coefficient represents the connection frequency, importance, risk level and the like between two devices, calculating the association coefficient by using a proper algorithm (such as machine learning, graph theory and the like), for example, calculating the association coefficient according to the connection times, connection time lengths, the transmitted data quantity and the like between the two devices, generating a random connection number for each network terminal, ensuring that each device has a unique random number, obtaining the random connection number by mapping the random number to a relationship table, obtaining the random connection number and the connection association coefficient, selecting a physical conversion structure based on the connection table, and if the connection between the two devices are matched with each other, configuring the physical conversion structure, or deleting the physical conversion between the two devices, or the devices can be changed according to the physical conversion structure, and the physical conversion between the two devices is changed, or the physical conversion is performed, and the physical conversion is performed, if the connection is changed, or the physical conversion is changed, or is based on the a proper, or is or has a proper.
Further, the method further comprises:
the method comprises the steps of obtaining a historical data set of a user, extracting user behavior characteristics under multiple scales according to the historical data set, establishing a multi-scale characteristic extraction result, carrying out behavior authentication on the user data set through the multi-scale characteristic extraction result, establishing an additional abnormal value based on the behavior authentication result, and updating a comprehensive security influence score through the additional abnormal value.
Preferably, a historical data set of a user is obtained from a database, the historical data set comprises a login record, an operation record, an access record and the like of the user, a plurality of different time or space scales are determined, such as minutes, hours, days, weeks and the like, the historical data set of the user is used for analyzing different levels of behavior of the user, characteristics related to the behavior, including login frequency, access mode, operation type, abnormal behavior and the like of the user, are extracted from the historical data set of the user under each scale, the characteristic extraction results under each scale are integrated, scale trust identification is added to the characteristic extraction results under each scale according to the reliability and importance of each scale, a multi-scale characteristic set is formed, namely a multi-scale characteristic extraction result, a normal behavior model of the user is constructed by utilizing the multi-scale characteristic extraction results, the model can reflect typical behavior modes of the user under different scales, the real-time behavior of the user is compared with the normal behavior model, the degree of the user is evaluated, if the real-time behavior is larger than the model, abnormal behavior possibly exists is possibly represented, an additional abnormal behavior value is calculated for each user or the characteristic extraction result under the condition, the condition is based on the behavior authentication result, the condition is integrated, the additional abnormal behavior value is calculated, the additional weight value is different from the abnormal behavior value is calculated and the abnormal value is calculated, and the abnormal value is different from the normal behavior model is normally, and the abnormal value is calculated according to the normal value, and the abnormal value is calculated, and the abnormal value is normally.
In summary, the embodiment of the application has at least the following technical effects:
Firstly, executing configuration management of network terminals in an intranet, wherein the configuration management comprises real IP addresses, external network access IP addresses and virtual address management of a dynamic conversion unit, and carrying out terminal monitoring of the network terminals based on configuration management results to establish a monitoring data set which comprises a device data set and a user data set. Then, a driving network is established, the driving network comprises a time driving sub-network, an event driving sub-network and a load driving sub-network, the monitoring data set and the time information are input into the driving network to execute driving evaluation, a virtual address is called based on a driving evaluation result, and dynamic IP updating of a network terminal is executed. And carrying out node security influence score calculation of each monitoring point through the monitoring data set, and generating a node security influence score calculation result. And then, carrying out abnormal event association evaluation on all monitoring points, carrying out influence calculation on the node security influence score calculation result based on the association evaluation result, and generating a comprehensive security influence score. And finally, carrying out network security processing according to the comprehensive security influence score and the dynamic IP updating result. The technical problem of inaccurate network risk identification under traditional static IP address management and untimely protection is solved, and the technical effect of improving the network safety protection capability is achieved through dynamic real-time network safety processing.
In the second embodiment, based on the same inventive concept as the network security processing method based on the dynamic network in the foregoing embodiment, as shown in fig. 2, the present application provides a network security processing system based on the dynamic network, and the system and method embodiments in the embodiments of the present application are based on the same inventive concept. Wherein, the system includes:
The system comprises a configuration management module 11, a monitoring module 12, an updating module 13, a first calculation module 14, a second calculation module 15 and a comprehensive security impact score processing module 16, wherein the configuration management module 11 is used for executing configuration management of network terminals in an intranet, the configuration management comprises a real IP address, an external network access IP address and virtual address management of a dynamic conversion unit, the monitoring module 12 is used for monitoring terminals of the network terminals based on configuration management results, the monitoring data set comprises an equipment data set and a user data set, the updating module 13 is used for establishing a driving network, the driving network comprises a time driving sub-network, an event driving sub-network and a load driving sub-network, the monitoring data set and time information are input into the driving network to execute driving evaluation, the virtual address is called based on driving evaluation results to execute dynamic IP updating of the network terminals, the first calculation module 14 is used for calculating node security impact scores of all monitoring points through the monitoring data set to generate node security impact score calculation results, the second calculation module 15 is used for carrying out abnormal event association evaluation on the monitoring points, the node security impact calculation results based on the association evaluation results are used for carrying out comprehensive security impact score calculation results, and the comprehensive security impact processing module 16 is used for carrying out comprehensive security impact score processing and comprehensive security score processing module 16.
Further, the first computing module 14 is configured to perform the following method:
The node security impact score calculation formula is configured as follows: The method comprises the steps of representing node safety influence scoring calculation results of an ith monitoring point by K i, wherein M i is the total number of events in the ith monitoring point, S ip is the severity score of a p-th event in the ith monitoring point, F ip is the occurrence frequency of the p-th event in the ith monitoring point, R ip is the response speed of the p-th event in the ith monitoring point, and the adaptability of the p-th event in the ith monitoring point of A ip.
Further, the second computing module 15 is configured to perform the following method:
Calculating a comprehensive safety impact score by the formula:
Wherein K is the comprehensive security impact score, N is the total number of monitoring points, W i represents the importance of the ith monitoring point, K i is the node security impact score calculation result of the ith monitoring point, K j is the node security impact score calculation result of the jth monitoring point, C ij represents the mutual impact coefficient of the ith monitoring point and the jth monitoring point, And normalizing the safety influence score calculation results of all the monitoring points as normalization factors.
Further, the processing module 16 is configured to perform the following method:
The scoring early warning grade of the comprehensive security influence score is obtained, the adaptation evaluation is updated according to the scoring early warning grade and the dynamic IP updating result, and the network security abnormality is reported based on the adaptation evaluation result.
Further, the processing module 16 is configured to perform the following method:
The method comprises the steps of judging whether the scoring early warning level meets a preset level threshold, generating a dynamic topology conversion instruction if the scoring early warning level meets the preset level threshold, controlling a network terminal to perform physical structure conversion according to the dynamic topology conversion instruction, and performing network security processing based on a physical structure conversion result.
Further, the processing module 16 is configured to perform the following method:
Establishing a historical connection database of the network terminal, performing connection analysis of the historical connection database, establishing connection association coefficients, matching connection random numbers according to the connection association coefficients, performing physical structure transformation selection of the network terminal based on the connection random numbers, and establishing a physical structure transformation result.
Further, the processing module 16 is configured to perform the following method:
the method comprises the steps of obtaining a historical data set of a user, extracting user behavior characteristics under multiple scales according to the historical data set, establishing a multi-scale characteristic extraction result, carrying out behavior authentication on the user data set through the multi-scale characteristic extraction result, establishing an additional abnormal value based on the behavior authentication result, and updating a comprehensive security influence score through the additional abnormal value.
It should be noted that the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this specification. The processes depicted in the accompanying drawings do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.
The specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, the present application is intended to include such modifications and alterations insofar as they come within the scope of the application or the equivalents thereof.