[go: up one dir, main page]

CN111800439B - Application method and system of threat intelligence in bank - Google Patents

Application method and system of threat intelligence in bank Download PDF

Info

Publication number
CN111800439B
CN111800439B CN202010933025.2A CN202010933025A CN111800439B CN 111800439 B CN111800439 B CN 111800439B CN 202010933025 A CN202010933025 A CN 202010933025A CN 111800439 B CN111800439 B CN 111800439B
Authority
CN
China
Prior art keywords
threat intelligence
attack
threat
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010933025.2A
Other languages
Chinese (zh)
Other versions
CN111800439A (en
Inventor
吴昊
王巍
陈菲琪
施志晖
金叶翠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Sushang Bank Co ltd
Original Assignee
Jiangsu Suning Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Suning Bank Co Ltd filed Critical Jiangsu Suning Bank Co Ltd
Priority to CN202010933025.2A priority Critical patent/CN111800439B/en
Publication of CN111800439A publication Critical patent/CN111800439A/en
Application granted granted Critical
Publication of CN111800439B publication Critical patent/CN111800439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an application method and a system of threat information in a bank, wherein the method comprises the following steps: acquiring threat information data; when the time period begins, comparing the alarm logs collected from multiple links of the access data stream with threat information data one by one to obtain a comparison result; establishing an assignment calculation intermediate table for each link, and weighting threat information data in the assignment calculation intermediate table according to a comparison result to obtain a weighted value of each link; establishing a threat intelligence evaluation table, and establishing an index between the threat intelligence evaluation table and an assignment calculation intermediate table of each link; when the time period is over, calculating the weighted value of each link in a threat information evaluation table to obtain a credit value; and judging the reliability of the threat intelligence data according to the credit value. The invention compares the threat information with the alarm information by using the current security product of the bank, verifies the reliability of the threat information and improves the use value of the threat information on the ground.

Description

一种威胁情报在银行中的应用方法及其系统Application method and system of threat intelligence in bank

技术领域technical field

本发明涉及信息安全领域,具体而言,涉及一种威胁情报在银行中的应用方法及其系统。The invention relates to the field of information security, in particular, to a method and system for applying threat intelligence in a bank.

背景技术Background technique

随着信息安全技术的持续发展,威胁情报作为一个新兴概念,被越来越多的信息安全从业者所关注。根据Gartner公司对威胁情报的定义,威胁情报是某种基于证据的知识,包括上下文、机制、标示、含义和能够执行的建议,这些知识与资产所面临已有的或酝酿中的威胁或危害相关,可用于资产相关主体对威胁或危害的响应或处理决策提供信息支持,旨在为面临威胁的资产主体提供全面的、准确的、与其相关的、并且能够执行和决策的知识和信息。With the continuous development of information security technology, threat intelligence, as an emerging concept, has attracted more and more attention from information security practitioners. According to Gartner's definition of threat intelligence, threat intelligence is some evidence-based knowledge, including context, mechanisms, signs, meanings, and actionable recommendations, related to existing or brewing threats or compromises to assets. , which can be used to provide information support for asset-related subjects to respond to threats or hazards or provide information support for decision-making, aiming to provide comprehensive, accurate, and relevant knowledge and information for asset subjects facing threats that can be implemented and made decisions.

在这个过程中,威胁情报作为一种数据型知识,其实是不能单独存在带来价值的,只有跟传统的一些安全防护方式一起,才能对整个企业的安全做到全方位的保障。目前市面上威胁情报的落地使用方式多种多样,如与企业已有安全架构、产品相结合,如应用到企业内部的事件应急响应中等等。然而,在威胁情报的落地使用过程中,往往是被动的接受威胁情报,缺乏对安全厂商提供的威胁情报的可靠性评价机制,或者说缺乏针对性场景的威胁情报应用方法。In this process, threat intelligence, as a kind of data-based knowledge, cannot actually exist alone to bring value. Only together with some traditional security protection methods, can the security of the entire enterprise be fully guaranteed. At present, there are various ways to use threat intelligence on the market, such as combining with the existing security architecture and products of the enterprise, such as applying it to the internal incident response of the enterprise, etc. However, in the process of using threat intelligence, it is often passively accepting threat intelligence, lacking a reliability evaluation mechanism for threat intelligence provided by security vendors, or lacking threat intelligence application methods for targeted scenarios.

发明内容SUMMARY OF THE INVENTION

鉴于上述问题,本发明提供了一种威胁情报在银行中的应用方法及其系统,对于高信誉值的可靠性较高威胁情报进行防火墙防护设备策略补充,提升威胁情报落地使用价值。In view of the above problems, the present invention provides a method and system for the application of threat intelligence in a bank, which supplements firewall protection equipment strategies for threat intelligence with high credibility and high reliability, and improves the value of threat intelligence's landing and use.

为解决上述技术问题,本发明采用的技术方案是:一种威胁情报在银行中的应用方法,包括如下步骤:步骤1,获取威胁情报数据;步骤2,时间周期开始时,将从访问数据流多环节收集到的告警日志逐一与所述威胁情报数据进行比对,获取比对结果;步骤3,为每个环节建立赋值计算中间表,并根据比对结果在所述赋值计算中间表中对所述威胁情报数据进行加权,以获取各环节的加权值;步骤4,建立威胁情报评价表,且在所述威胁情报评价表与各环节的赋值计算中间表之间建立索引;步骤5,时间周期结束时,在所述威胁情报评价表中将各环节的加权值进行运算,以获取信誉值;步骤6,根据所述信誉值的高低,判断所述威胁情报数据的可靠性。In order to solve the above-mentioned technical problems, the technical solution adopted in the present invention is: a method for applying threat intelligence in a bank, comprising the following steps: step 1, obtaining threat intelligence data; step 2, when the time period starts, from the access data stream The alarm logs collected in multiple links are compared with the threat intelligence data one by one to obtain a comparison result; Step 3, an intermediate table of assignment calculation is established for each link, and a comparison is made in the intermediate table of assignment calculation according to the comparison result. The threat intelligence data is weighted to obtain the weighted value of each link; Step 4, a threat intelligence evaluation table is established, and an index is established between the threat intelligence evaluation table and the assignment calculation intermediate table of each link; Step 5, time At the end of the period, the weighted value of each link is calculated in the threat intelligence evaluation table to obtain a reputation value; step 6, according to the level of the reputation value, the reliability of the threat intelligence data is judged.

作为优选方案,所述访问数据流多环节包括:互联网DMZ、核心生产区和应用服务器侧,则所述步骤2具体包括:As a preferred solution, the multiple links of the access data flow include: the Internet DMZ, the core production area and the application server side, then the step 2 specifically includes:

在互联网DMZ进行初次对比,如果互联网DMZ的告警日志中源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行FirstA加权,反之不进行操作;For the first comparison in the Internet DMZ, if the source IP information in the alarm log of the Internet DMZ matches the attack source IP information in the threat intelligence data, the hit threat intelligence data will be weighted by FirstA, otherwise, no operation will be performed;

在核心生产区进行二次比对,如果核心生产区的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据进行SecondA加权;如果核心生产区的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行SecondB加权;如果核心生产区的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行SecondC加权;如果核心生产区的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作;Perform a secondary comparison in the core production area. If both the source IP and attack feature information in the alarm log of the core production area can match the attack source IP and attack feature information in the threat intelligence data, the hit threat intelligence data will be weighted by SecondA ;If only the source IP information in the alarm log of the core production area hits the attack source IP information in the threat intelligence data, SeconddB weighting is performed on the hit threat intelligence data; if only the attack feature information in the alarm log of the core production area hits the threat intelligence If the attack feature information in the data, the hit threat intelligence data will be weighted by SecondC; if neither the source IP nor the attack feature information in the alarm log of the core production area can match the attack source IP and attack feature information in the threat intelligence data, the attack source IP and attack feature information in the threat intelligence data will not be matched. operate;

在应用服务器侧进行三次比对,如果应用服务器侧的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据进行ThirdA加权;如果应用服务器侧的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行ThirdB加权;如果应用服务器侧的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行ThirdC加权;如果应用服务器侧的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作。Perform three comparisons on the application server side. If the source IP and attack feature information in the alarm log on the application server side can match the attack source IP and attack feature information in the threat intelligence data, the third A weighting is performed on the hit threat intelligence data; If only the source IP information in the alarm log on the application server side hits the attack source IP information in the threat intelligence data, the hit threat intelligence data is subjected to ThirdB weighting; if only the attack feature information in the alarm log on the application server side hits the threat intelligence data If the attack feature information in the threat intelligence data is not matched, the thirdC weighting is performed on the hit threat intelligence data; if neither the source IP nor the attack feature information in the alarm log on the application server side can match the attack source IP and attack feature information in the threat intelligence data, it will not be performed. operate.

作为优选方案,所述步骤2还包括特殊攻击类型比对,如果应用服务器侧的告警日志中包含特殊攻击类型,所述特殊攻击类型中的源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则比对防火墙阻断日志;如果所述特殊攻击类型中的告警日志与所述防火墙阻断日志相匹配,则对命中的威胁情报数据进行FourthA加权,反之,不进行任何操作。As a preferred solution, the step 2 also includes a comparison of special attack types. If the alarm log on the application server side contains a special attack type, the source IP and attack feature information in the special attack type can all hit the threat intelligence data. The attack source IP and attack feature information are compared with the firewall blocking log; if the alarm log in the special attack type matches the firewall blocking log, FourthA weighting is performed on the hit threat intelligence data, otherwise, no take any action.

作为优选方案,在一轮时间周期内,如果所述威胁情报数据在同一环节被多次命中,则在所述赋值计算中间表中的加权值选用最大值。As a preferred solution, within a time period of one round, if the threat intelligence data is hit multiple times in the same link, the weighted value in the intermediate table of assignment calculation selects the maximum value.

作为优选方案,所述步骤3中信誉值的计算公式为:As a preferred solution, the calculation formula of the reputation value in the step 3 is:

信誉值=初始化赋值*(1+(K*(加权项维度指标1^加权项权重1+权项维度指标2^加权项权重2+…+加权项维度指标N^加权项权重N)/100));Reputation value=initial assignment*(1+(K*(weighted item dimension index 1^weighted item weight1+weighted item dimension index2^weighted item weight2+...+weighted item dimension indexN^weighted item weightN)/100 ));

加权值=加权项维度指标^加权项权重;Weighted value = weighted item dimension index^ weighted item weight;

其中初始化赋值为60,K值为资产权重,按照标准化评级L1—L5级别系统的K值分别为[10、20、30、40、50]。The initial assignment is 60, and the K value is the asset weight. According to the standardized rating L1-L5 level system, the K value is [10, 20, 30, 40, 50] respectively.

作为优选方案,针对不同级别的被防护资产,所述信誉值的区间等级也相应的根据资产权重K值的不同进行动态调整以匹配不同的信誉值,信誉值区间等级的划分方式如下:As a preferred solution, for different levels of protected assets, the interval level of the reputation value is also dynamically adjusted according to the difference in the asset weight K value to match different reputation values. The division method of the reputation value interval level is as follows:

信誉值∈[60*(logK)^2,80*(logK)^2),判断结果为所述威胁情报数据可靠性较低;Reputation value∈[60*(logK)^2,80*(logK)^2), the judgment result is that the reliability of the threat intelligence data is low;

信誉值∈(80*(logK)^2,100*(logK)^2),判断结果为所述威胁情报数据可靠性一般;Reputation value∈(80*(logK)^2,100*(logK)^2), the judgment result is that the reliability of the threat intelligence data is general;

信誉值∈(100*(logK)^2,120*(logK)^2),判断结果为所述威胁情报数据可靠性较高。The reputation value ∈(100*(logK)^2, 120*(logK)^2), the judgment result is that the reliability of the threat intelligence data is relatively high.

作为优选方案,将所述信誉值为可靠性较高的威胁情报数据放入规则优化目录,并同步至互联网DMZ域出口防火墙对源IP进行封禁。As a preferred solution, the threat intelligence data with a relatively high reputation value is put into the rule optimization directory, and is synchronized to the Internet DMZ domain egress firewall to block the source IP.

本发明还提供了一种威胁情报在银行中的应用系统,包括:获取模块,用于获取威胁情报数据;比对模块,用于在时间周期开始时,将从访问数据流多环节收集到的告警日志逐一与所述威胁情报数据进行比对,获取比对结果;加权模块,用于为每个环节建立赋值计算中间表,并根据比对结果在所述赋值计算中间表中对所述威胁情报数据进行加权,以获取各环节的加权值;索引模块,用于建立威胁情报评价表,且在所述威胁情报评价表与各环节的赋值计算中间表之间建立索引;运算模块,用于在时间周期结束时,在所述威胁情报评价表中将各环节的加权值进行运算,以获取信誉值;判断模块,用于根据所述信誉值的高低,判断所述威胁情报数据的可靠性。The invention also provides an application system of threat intelligence in a bank, comprising: an acquisition module, used for acquiring threat intelligence data; The alarm logs are compared with the threat intelligence data one by one to obtain a comparison result; a weighting module is used to establish an intermediate table of assignment calculation for each link, and according to the comparison result, the threat is calculated in the intermediate table of assignment calculation. The intelligence data is weighted to obtain the weighted value of each link; the index module is used to establish a threat intelligence evaluation table, and an index is established between the threat intelligence evaluation table and the assignment calculation intermediate table of each link; the operation module is used for At the end of the time period, the weighted values of each link are calculated in the threat intelligence evaluation table to obtain a reputation value; a judgment module is used to judge the reliability of the threat intelligence data according to the level of the reputation value .

作为优选方案,所述访问数据流多环节包括:互联网DMZ、核心生产区和应用服务器侧,所述比对模块包括初次比对模块、二次比对模块和三次比对模块;As a preferred solution, the multiple links of the access data stream include: the Internet DMZ, the core production area and the application server side, and the comparison module includes a primary comparison module, a secondary comparison module and a tertiary comparison module;

所述初次比对模块用于在互联网DMZ进行初次对比,如果互联网DMZ的告警日志中源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行FirstA加权,反之不进行操作;The first comparison module is used to perform the first comparison in the Internet DMZ. If the source IP information in the alarm log of the Internet DMZ hits the attack source IP information in the threat intelligence data, FirstA weighting is performed on the hit threat intelligence data, and vice versa. operate;

所述二次比对模块用于在核心生产区进行二次比对,如果核心生产区的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据进行SecondA加权;如果核心生产区的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行SecondB加权;如果核心生产区的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行SecondC加权;如果核心生产区的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作;The secondary comparison module is used to perform secondary comparison in the core production area. If both the source IP and the attack feature information in the alarm log of the core production area can hit the attack source IP and the attack feature information in the threat intelligence data, then SecondA weighting is performed on the hit threat intelligence data; if only the source IP information in the alarm log of the core production area hits the attack source IP information in the threat intelligence data, SeconddB weighting is performed on the hit threat intelligence data; If only the attack feature information in the log hits the attack feature information in the threat intelligence data, the hit threat intelligence data will be weighted by SecondC; if neither the source IP nor the attack feature information in the alarm log of the core production area can hit the attack in the threat intelligence data source IP and attack feature information, no operation is performed;

所述三次比对模块用于在应用服务器侧进行三次比对,如果应用服务器侧的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据进行ThirdA加权;The three comparison module is used to perform three comparisons on the application server side. If both the source IP and the attack feature information in the alarm log on the application server side can match the attack source IP and the attack feature information in the threat intelligence data, then the match will be matched. ThirdA-weighted threat intelligence data;

如果应用服务器侧的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行ThirdB加权;如果应用服务器侧的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行ThirdC加权;如果应用服务器侧的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作。If only the source IP information in the alarm log on the application server side hits the attack source IP information in the threat intelligence data, the hit threat intelligence data is subjected to ThirdB weighting; if only the attack feature information in the alarm log on the application server side hits the threat intelligence data If the attack feature information in the threat intelligence data is not matched, the thirdC weighting is performed on the hit threat intelligence data; if neither the source IP nor the attack feature information in the alarm log on the application server side can match the attack source IP and attack feature information in the threat intelligence data, it will not be performed. operate.

作为优选方案,还包括特殊比对模块,所述特殊比对模块用于特殊攻击类型比对,如果应用服务器侧的告警日志中包含特殊攻击类型,所述特殊攻击类型中的源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则比对防火墙阻断日志;如果所述特殊攻击类型中的告警日志与所述防火墙阻断日志相匹配,则对命中的威胁情报数据进行FourthA加权,反之,不进行任何操作。As a preferred solution, a special comparison module is also included, and the special comparison module is used for the comparison of special attack types. If the alarm log on the application server side includes the special attack type, the source IP and attack characteristics of the special attack type If the information can hit the attack source IP and attack feature information in the threat intelligence data, then compare the firewall blocking log; if the alarm log in the special attack type matches the firewall blocking log, then the attacked threat Intelligence data is FourthA weighted, otherwise, no action is taken.

与现有技术相比,本发明的有益效果包括:利用银行目前安全架构与安全产品,将威胁情报信息与互联网DMZ区WAF、IPS等安全防护设备告警信息进行比对,验证威胁情报信息的可靠性;结合不同维度、权重、有效性等方式,赋予威胁情报信誉值,并给予信誉值动态调整区间,以信誉值反馈的方式优化同业共享威胁情报数据,对于高信誉值的威胁情报进行防火墙、WAF等防护设备策略补充,提升威胁情报落地使用价值。Compared with the prior art, the beneficial effects of the present invention include: using the current security architecture and security products of the bank to compare the threat intelligence information with the warning information of security protection equipment such as WAF and IPS in the Internet DMZ area, and verifying the reliability of the threat intelligence information. Combined with different dimensions, weights, effectiveness, etc., the threat intelligence reputation value is given, and the reputation value is dynamically adjusted to the interval, and the threat intelligence data shared by the industry is optimized by the reputation value feedback, and the threat intelligence with high reputation value is firewalled, WAF and other protective equipment strategies are supplemented to enhance the value of threat intelligence.

附图说明Description of drawings

参照附图来说明本发明的公开内容。应当了解,附图仅仅用于说明目的,而并非意在对本发明的保护范围构成限制。在附图中,相同的附图标记用于指代相同的部件。其中:The disclosure of the present invention is explained with reference to the accompanying drawings. It should be understood that the accompanying drawings are for illustrative purposes only, and are not intended to limit the protection scope of the present invention. In the drawings, the same reference numerals are used to refer to the same parts. in:

图1为本发明实施例的一种威胁情报在银行中的应用方法的流程示意图;1 is a schematic flowchart of a method for applying threat intelligence in a bank according to an embodiment of the present invention;

图2为本发明实施例的一种威胁情报在银行中的应用方法的另一形式的流程示意图;2 is a schematic flowchart of another form of a method for applying threat intelligence in a bank according to an embodiment of the present invention;

图3为本发明实施例的一种威胁情报在银行中的应用系统的模块示意图。FIG. 3 is a schematic block diagram of an application system of threat intelligence in a bank according to an embodiment of the present invention.

图4为本发明实施例的比对模块的结构示意图。FIG. 4 is a schematic structural diagram of a comparison module according to an embodiment of the present invention.

具体实施方式Detailed ways

容易理解,根据本发明的技术方案,在不变更本发明实质精神下,本领域的一般技术人员可以提出可相互替换的多种结构方式以及实现方式。因此,以下具体实施方式以及附图仅是对本发明的技术方案的示例性说明,而不应当视为本发明的全部或者视为对本发明技术方案的限定或限制。It is easy to understand that, according to the technical solutions of the present invention, without changing the essential spirit of the present invention, those of ordinary skill in the art can propose various alternative structures and implementations. Therefore, the following specific embodiments and accompanying drawings are only exemplary descriptions of the technical solutions of the present invention, and should not be regarded as all of the present invention or as limitations or restrictions on the technical solutions of the present invention.

首先,对本发明中出现的专业术语进行解释:First of all, the technical terms appearing in the present invention are explained:

DMZ:是英文“demilitarized zone”的缩写,中文名称为“隔离区”,它是为了解决安装防火墙后外部网络的访问用户不能访问内部网络服务器的问题,而设立的一个非安全系统与安全系统之间的缓冲区。DMZ: is the abbreviation of "demilitarized zone" in English, and the Chinese name is "isolation zone". It is a non-secure system and a security system established to solve the problem that users who access the external network cannot access the internal network server after installing a firewall. buffer between.

WAF:是英文“Web Application Firewall”的缩写,中文名称为Web应用防护系统,是通过执行一系列针对HTTP/HTTPS的安全策略来专门为Web应用提供保护的一款产品。WAF: is the abbreviation of "Web Application Firewall" in English, and the Chinese name is Web Application Protection System. It is a product that provides protection for Web applications by implementing a series of HTTP/HTTPS security policies.

IPS:是英文“Intrusion Prevention System”的缩写,中文名称为入侵防御系统,是电脑网络安全设施,是对防病毒软件和防火墙的补充。IPS: is the abbreviation of "Intrusion Prevention System" in English, and the Chinese name is Intrusion Prevention System. It is a computer network security facility and a supplement to anti-virus software and firewalls.

IDS:是英文“intrusion detection system”的缩写,中文名称为入侵检测系统,是一种对网络传输进行即时监视,在发现可疑传输时发出警报或者采取主动反应措施的网络安全设备。IDS: is the abbreviation of "intrusion detection system" in English, and the Chinese name is intrusion detection system. It is a network security device that performs real-time monitoring of network transmissions, and sends out alarms or takes active response measures when suspicious transmissions are found.

RASP:是英文“Runtime application self-protection”的缩写,它是一种新型应用安全保护技术,它将保护程序像疫苗一样注入到应用程序中,应用程序融为一体,它拦截从应用程序到系统的所有调用,能实时检测和阻断安全攻击,使应用程序具备自我保护能力,当应用程序遭受到实际攻击伤害,就可以自动对其进行防御。RASP: is the abbreviation of "Runtime application self-protection" in English. It is a new type of application security protection technology. It injects protection programs into applications like vaccines, and integrates applications. It intercepts applications from applications to systems. It can detect and block security attacks in real time, so that the application has the ability to protect itself. When the application suffers actual attack damage, it can automatically defend against it.

SFTP:是英文“SSH File Transfer Protocol”的缩写,中文名称为安全文件传送协议,是一数据流连接,提供文件访问、传输和管理功能的网络传输协议。SFTP: is the abbreviation of "SSH File Transfer Protocol" in English. The Chinese name is Secure File Transfer Protocol. It is a data stream connection and a network transfer protocol that provides file access, transmission and management functions.

csv格式:是一种逗号分隔值文件格式。csv format: is a comma-separated value file format.

APT:是英语“Advanced Persistent Threat”的缩写,中文名称为高级持续性威胁,是指隐匿而持久的电脑入侵过程,通常由某些人员精心策划,针对特定的目标。APT: is the abbreviation of "Advanced Persistent Threat" in English. The Chinese name is Advanced Persistent Threat. It refers to a hidden and persistent computer intrusion process, usually carefully planned by some personnel, targeting specific targets.

Webshell:是以asp、php、jsp或者cgi等网页文件形式存在的一种代码执行环境,也可以将其称做为一种网页后门。Webshell: It is a code execution environment in the form of web page files such as asp, php, jsp or cgi. It can also be called a web page backdoor.

根据本发明的一实施方式结合图1示出。一种威胁情报在银行中的应用方法,包括如下步骤:An embodiment according to the present invention is shown in conjunction with FIG. 1 . A method for applying threat intelligence in a bank, comprising the following steps:

S110:获取威胁情报数据。S110: Obtain threat intelligence data.

S120:时间周期开始时,将从访问数据流多环节收集到的告警日志逐一与威胁情报数据进行比对,获取比对结果。S120: At the beginning of the time period, the alarm logs collected from the multiple links of the access data flow are compared with the threat intelligence data one by one to obtain a comparison result.

S130:为每个环节建立赋值计算中间表,并根据比对结果在赋值计算中间表中对威胁情报数据进行加权,以获取各环节的加权值。S130: Establish an assignment calculation intermediate table for each link, and weight the threat intelligence data in the assignment calculation intermediate table according to the comparison result, so as to obtain the weighted value of each link.

S140:建立威胁情报评价表,且在威胁情报评价表与各环节的赋值计算中间表之间建立索引。S140: Establish a threat intelligence evaluation table, and establish an index between the threat intelligence evaluation table and the assignment calculation intermediate table of each link.

S150:时间周期结束时,在威胁情报评价表中将各环节的加权值进行运算,以获取信誉值。S150: At the end of the time period, calculate the weighted value of each link in the threat intelligence evaluation table to obtain a reputation value.

S160:根据信誉值的高低,判断威胁情报数据的可靠性。S160: Judge the reliability of the threat intelligence data according to the level of the reputation value.

如图2所示,下面以银行业生产环境作为参考对象,对本发明提供的一种威胁情报在银行中的应用方法作出详细说明。As shown in FIG. 2 , a method for applying threat intelligence in a bank provided by the present invention is described in detail below, taking the production environment of the banking industry as a reference object.

目前银行业或多或少都引进了第三方安全厂商的威胁情报数据,首先对于威胁情报数据的接收方式,本发明中要求第三方安全厂商以SFTP每天定点推送的方式向行内威胁情报数据中心进行文件传输,文件应为csv格式以便于后续调用。At present, the banking industry has more or less introduced threat intelligence data from third-party security vendors. First of all, for the receiving method of threat intelligence data, the present invention requires third-party security vendors to send data to the threat intelligence data center in the bank by means of SFTP daily fixed-point push. File transfer, the file should be in csv format for subsequent calls.

行内威胁情报数据中心作为行内安全运营平台的威胁情报数据源,将威胁情报数据发送至行内安全运营平台,行内安全运营平台用于收集访问数据流多环节的安全防护类设备告警日志,并将访问数据流多环节的告警日志逐一与威胁情报数据进行比对。本发明实施例中,访问数据流多环节包括:互联网DMZ、核心生产区和应用服务器侧。具体的:As the threat intelligence data source of the intra-industry security operation platform, the intra-industry threat intelligence data center sends the threat intelligence data to the intra-industry security operation platform. The multi-link alarm logs of the data flow are compared with the threat intelligence data one by one. In the embodiment of the present invention, the multiple links of accessing the data flow include: an Internet DMZ, a core production area, and an application server side. specific:

(1)威胁情报初次比对(互联网DMZ):(1) Initial comparison of threat intelligence (Internet DMZ):

在威胁情报初次比对的过程中将联合行内安全运营平台收集到的IPS入侵防御设备、WAF web应用防火墙等部署于互联网DMZ区域的安全防护类设备告警日志,与威胁情报数据进行攻击源IP比对。During the initial comparison of threat intelligence, the alarm logs of security protection devices such as IPS intrusion prevention devices and WAF web application firewalls that are collected by the joint security operation platform and deployed in the Internet DMZ area are compared with the threat intelligence data to compare the attack source IP. right.

I.如果安全防护类设备告警日志中的源IP信息恰好能够命中威胁情报数据中的攻击源IP信息,那么证明该威胁情报数据初步有效或者不排除基于规则库方式的安全防护类设备误报的可能性,故在此时对于该条命中的威胁情报数据进行信誉值初始化赋值,并进行FirstA加权。I. If the source IP information in the alarm log of the security protection device can just hit the attack source IP information in the threat intelligence data, it proves that the threat intelligence data is initially valid or does not rule out the false alarm of the security protection device based on the rule base method. Therefore, at this time, the reputation value is initialized and assigned to the hit threat intelligence data, and FirstA weighting is performed.

II.如果安全防护类设备告警日志中的源IP信息没有命中威胁情报数据中的攻击源IP信息,这也不能说明任何问题,因为作为实时防护告警的安全防护类设备,可能此时没有检测到相关攻击日志,也可能是威胁情报数据的不准确,此时对于威胁情报数据不进行任何操作。II. If the source IP information in the alarm log of the security protection device does not match the attack source IP information in the threat intelligence data, this does not indicate any problem, because the security protection device as a real-time protection alarm may not be detected at this time. The relevant attack logs may also be inaccurate threat intelligence data. At this time, no operation is performed on the threat intelligence data.

(2)威胁情报数据二次比对(核心生产区):(2) Secondary comparison of threat intelligence data (core production area):

按照互联网应用的访问数据流,在访问流量到达核心生产区域的应用服务器、数据库服务器时,应有相应的内网安全监测手段,如IDS入侵检测设备、全流量分析检测设备等,在威胁情报的二次比对过程中将联合行内安全运营平台收集到的旁路流量镜像型内网安全监测设备告警日志,进行攻击源IP与攻击特征比对。According to the access data flow of Internet applications, when the access traffic reaches the application server and database server in the core production area, there should be corresponding intranet security monitoring means, such as IDS intrusion detection equipment, full traffic analysis and detection equipment, etc. During the second comparison process, the alarm logs of the bypass traffic mirrored intranet security monitoring equipment collected by the in-house security operation platform are combined to compare the attack source IP and attack characteristics.

I.如果内网安全监测类设备告警日志中的源IP、攻击特征信息恰好都能够命中威胁情报数据中的攻击源IP、攻击特征信息,那么证明该威胁情报数据有效性提升,同时存在安全防护类设备规则库不完善、被攻击者绕过的可能性,也不排除内网安全监测类设备误报的可能性,故在此时对于该条命中的威胁情报数据进行SecondA加权。I. If the source IP and attack feature information in the alarm log of the intranet security monitoring device can just hit the attack source IP and attack feature information in the threat intelligence data, it proves that the effectiveness of the threat intelligence data is improved, and there is security protection at the same time. The rule base of such equipment is imperfect and may be bypassed by attackers, and the possibility of false positives of intranet security monitoring equipment is not excluded. Therefore, SecondA weighting is performed on the hit threat intelligence data at this time.

II.如果内网安全监测类设备告警日志中的源IP都能够命中威胁情报数据中的攻击源IP信息,攻击特征信息没有命中,那么证明该威胁情报中所提供的IP信息很有可能针对性的攻击银行,可能在转变攻击方式,绕过了安全防护类设备的同时引发了内网安全监测设备的告警,但也不排除内网安全监测类设备误报的可能性,此时对于该条命中的威胁情报数据进行SecondB加权。II. If the source IP in the alarm log of the intranet security monitoring equipment can all hit the attack source IP information in the threat intelligence data, but the attack feature information does not hit, then it proves that the IP information provided in the threat intelligence is likely to be targeted The attack on the bank may change the attack method, bypass the security protection equipment and trigger the alarm of the intranet security monitoring equipment, but it does not rule out the possibility of false alarms from the intranet security monitoring equipment. The hit threat intelligence data is SeconddB weighted.

III.如果内网安全监测类设备告警日志中的攻击特征信息都能够命中威胁情报数据中的攻击特征信息,而攻击源IP信息没有命中,那么证明攻击者可能在改变IP地址进行攻击,也可能是威胁情报中没有涉及的攻击IP或APT攻击者,此时对于该条命中的威胁情报数据进行SecondC加权。III. If the attack feature information in the alarm log of the intranet security monitoring device can match the attack feature information in the threat intelligence data, but the attack source IP information does not hit, it proves that the attacker may be changing the IP address to attack, or it may be It is the attacking IP or APT attacker that is not involved in the threat intelligence. In this case, SecondC weighting is performed on the hit threat intelligence data.

IV.如果内网安全监测类设备告警日志信息没有命中威胁情报数据中的攻击源IP、攻击特征信息,此时也不能说明威胁情报数据不准确或者安全监测规则的不完善,因为实时数据的随机性和固定规则的有效性,目前还无法给出相对准确的判断,此时对于威胁情报数据不进行任何操作。IV. If the alarm log information of the intranet security monitoring equipment does not match the attack source IP and attack feature information in the threat intelligence data, it does not mean that the threat intelligence data is inaccurate or the security monitoring rules are imperfect, because the randomness of real-time data At present, it is not possible to give a relatively accurate judgment on the validity of the security and fixed rules. At this time, no operation is performed on the threat intelligence data.

(3)威胁情报数据三次比对(应用服务器侧)(3) Three comparisons of threat intelligence data (application server side)

以行内应用服务器上部署的HIDS主机IDS、RASP应用程序自保护等应用侧检测手段来说,数据流的最终归宿也是威胁情报最后比对的过程,在此过程中,可以相对准确的确认攻击方式的准确性。In terms of application-side detection methods such as HIDS host IDS and RASP application self-protection deployed on the in-line application server, the final destination of the data stream is also the process of the final comparison of threat intelligence. During this process, the attack method can be relatively accurately confirmed. accuracy.

I.如果应用服务器侧监测告警日志中的源IP、攻击特征信息恰好都能够命中威胁情报数据中的攻击源IP、攻击特征信息,此时相对准确认为该攻击渗透进入应用服务器,威胁情报信息相对准确,此时对于该条命中的威胁情报数据进行ThirdA加权。I. If the source IP and attack feature information in the monitoring alarm log on the application server side can just hit the attack source IP and attack feature information in the threat intelligence data, it is relatively accurate to think that the attack penetrated into the application server, and the threat intelligence information is relatively accurate. Accurate. At this time, ThirdA weighting is performed on the hit threat intelligence data.

II.如果应用服务器侧监测告警日志中的源IP都能够命中威胁情报数据中的攻击源IP信息,攻击特征信息没有命中,那么证明该源IP信息可能为APT长期攻击IP,在威胁情报数据的IP信息中可能徘徊命中多个,对该条命中的威胁情报数据进行ThirdB加权。II. If the source IP in the monitoring alarm log on the application server side can all hit the attack source IP information in the threat intelligence data, but the attack feature information does not hit, then it proves that the source IP information may be the long-term attack IP of APT. There may be multiple hits in the IP information, and the threat intelligence data of the hit is ThirdB weighted.

III.如果应用服务器侧监测告警日志中的攻击特征信息都能够命中威胁情报数据中的攻击特征信息,而攻击源IP信息没有命中,那么证明攻击者存在多种攻击手段,部分攻击手段绕过了安全防护类设备,对该条命中的威胁情报数据进行ThirdC加权。III. If the attack feature information in the monitoring alarm log on the application server side can all hit the attack feature information in the threat intelligence data, but the attack source IP information does not hit, it proves that the attacker has multiple attack methods, some of which bypass the attack. For security protection equipment, ThirdC weighting is performed on the hit threat intelligence data.

IV.如果应用服务器侧监测告警日志信息没有命中威胁情报数据中的攻击源IP、攻击特征信息,此时对于威胁情报数据不进行任何操作。IV. If the monitoring alarm log information on the application server side does not match the attack source IP and attack feature information in the threat intelligence data, no operation is performed on the threat intelligence data at this time.

(4)特殊攻击类型比对(4) Comparison of special attack types

特殊的,攻击类型的特殊判断(如木马植入型攻击),如果应用服务器侧监测告警日志中存在webshell上传、木马文件、后门访问等攻击类型,则在威胁情报数据三次比对后,增加与互联网DMZ区网络出口防火墙日志比对,确认此类高风险攻击的可靠性。Special, special judgment of attack type (such as Trojan horse implantation attack), if there are attack types such as webshell upload, Trojan horse file, and backdoor access in the monitoring alarm log on the application server side, after three comparisons of threat intelligence data, add The log comparison of the network egress firewall in the Internet DMZ area confirms the reliability of such high-risk attacks.

I.如果应用服务器侧监测告警日志中包含特殊攻击类型,该特殊攻击类型日志中的源IP、攻击特征信息恰好都能够命中威胁情报数据中的攻击源IP、攻击特征信息,此时需要比对防火墙阻断日志,由于目前银行业具备较为完备的互联网出口防火墙端口管控措施,所以我们比对的是非80/443类的业务端口以外的内网出向阻断日志,这也侧面证明了木马文件、后门访问等特殊攻击类型利用特殊端口的访问行为被防火墙所阻断。如果应用服务器侧监测特殊攻击类型告警日志、威胁情报数据、互联网DMZ区出口防火墙阻断日志相匹配,此时对于该条命中的威胁情报数据进行FourthA加权。I. If the monitoring alarm log on the application server side contains a special attack type, the source IP and attack characteristic information in the special attack type log can exactly match the attack source IP and attack characteristic information in the threat intelligence data, and a comparison is required at this time. Firewall blocking logs. Since the banking industry currently has relatively complete Internet egress firewall port control measures, we compare the intranet outbound blocking logs other than non-80/443 business ports, which also proves that Trojan files, The access behavior of special attack types such as backdoor access using special ports is blocked by the firewall. If the alarm logs of special attack types monitored by the application server, threat intelligence data, and Internet DMZ egress firewall blocking logs match, FourthA weighting is performed on the hit threat intelligence data.

II.如果应用服务器侧监测特殊攻击类型告警日志、威胁情报数据、互联网DMZ区出口防火墙阻断日志没有相互匹配命中,则此时对于威胁情报数据不进行任何操作。II. If the application server side monitors the special attack type alarm log, threat intelligence data, and the Internet DMZ zone egress firewall blocking log and does not match each other, then do nothing to the threat intelligence data at this time.

对于实时类日志比对威胁情报数据进行的信誉值赋值加权调整,我们只关注信誉值在某一区间内的有效数据,这个值也是不断动态调整的,对于调整后携带信誉值的威胁情报数据来说,也是准实时性的,后续将体现在安全防护规则优化的动态调整之中。For the weighted adjustment of reputation value assignment by real-time log comparison and threat intelligence data, we only pay attention to the valid data with reputation value within a certain range, and this value is also dynamically adjusted. It is also quasi-real-time, and the follow-up will be reflected in the dynamic adjustment of the optimization of security protection rules.

此时,我们对威胁情报数据的信誉值所有赋值项做一个梳理,如下表:At this point, we sort out all the assignments of the reputation value of the threat intelligence data, as shown in the following table:

Figure GDA0002744998890000101
Figure GDA0002744998890000101

在初次比对时,对威胁情报数据进行信誉值初始化赋值为60,即默认信任第三方安全厂商提供的安全威胁情报数据为初始化级别,在访问流量到达核心生产区域的应用服务器、数据库服务器进行的一系列多重判断比对过程,加权指标如下:In the initial comparison, the reputation value of the threat intelligence data is initialized and assigned to 60, that is, the security threat intelligence data provided by the third-party security vendor is trusted as the initialization level by default. When the access traffic reaches the application server and database server in the core production area, the A series of multiple judgment comparison processes, the weighted indicators are as follows:

Figure GDA0002744998890000102
Figure GDA0002744998890000102

信誉值的计算公式为:The formula for calculating the reputation value is:

信誉值=初始化赋值*(1+(K*(加权项维度指标1^加权项权重1+权项维度指标2^加权项权重2+…+加权项维度指标N^加权项权重N)/100));Reputation value=initial assignment*(1+(K*(weighted item dimension index 1^weighted item weight1+weighted item dimension index2^weighted item weight2+...+weighted item dimension indexN^weighted item weightN)/100 ));

其中,初始化赋值一般为60,K值为资产权重,按照标准化评级L1—L5级别系统的K值分别为[10、20…50]。Among them, the initial assignment is generally 60, and the K value is the asset weight. According to the standardized rating L1-L5 level system, the K value is [10, 20...50] respectively.

以K=10(L1级别系统)举例,信誉值的计算结果如下:Taking K=10 (L1 level system) as an example, the calculation result of the reputation value is as follows:

Figure GDA0002744998890000111
Figure GDA0002744998890000111

Figure GDA0002744998890000121
Figure GDA0002744998890000121

其中,由于FourthA特殊攻击类型比对为ThirdA应用服务器侧监测告警日志比对的子分类,ThirdA+FourthA判断过程需要绑定使用。Among them, because the FourthA special attack type comparison is a sub-category of the ThirdA application server side monitoring alarm log comparison, the ThirdA+FourthA judgment process needs to be used in combination.

以K=10(L1级别系统)举例,信誉值的区间等级划分如下:Taking K=10 (L1 level system) as an example, the interval level of the reputation value is divided as follows:

信誉值∈[60,80),判断结果为该威胁情报数据在银行环境里针对L1级别系统检测防护可靠性较低;Reputation value ∈ [60, 80), the judgment result is that the threat intelligence data has low reliability for L1-level system detection and protection in the banking environment;

信誉值∈(80,100),判断结果为该威胁情报数据在银行环境里针对L1级别系统检测防护可靠性一般;Reputation value ∈ (80,100), the judgment result is that the threat intelligence data is generally reliable for L1-level system detection and protection in the banking environment;

信誉值∈(100,120),判断结果为该威胁情报数据在银行环境里针对L1级别系统检测防护可靠性较高。The reputation value ∈ (100, 120), the judgment result is that the threat intelligence data has high reliability for L1 level system detection and protection in the banking environment.

针对L*级别(L*为L1-L5)的被防护资产,信誉值的区间等级也相应的根据资产权重K值的不同进行动态调整以匹配不同的信誉值,信誉值区间等级的划分方式如下:For the protected assets of L* level (L* is L1-L5), the interval level of the reputation value is also dynamically adjusted according to the different asset weight K value to match different reputation values. The division method of the interval level of the reputation value is as follows :

信誉值∈[60*(logK)^2,80*(logK)^2),判断结果为该威胁情报数据在银行环境里针对L*级别系统检测防护可靠性较低;Reputation value ∈[60*(logK)^2,80*(logK)^2), the judgment result is that the threat intelligence data has low reliability for L* level system detection and protection in the banking environment;

信誉值∈(80*(logK)^2,100*(logK)^2),判断结果为该威胁情报数据在银行环境里针对L*级别系统检测防护可靠性一般;Reputation value∈(80*(logK)^2,100*(logK)^2), the judgment result is that the threat intelligence data is generally reliable for L* level system detection and protection in the banking environment;

信誉值∈(100*(logK)^2,120*(logK)^2),判断结果为该威胁情报数据在银行环境里针对L*级别系统检测防护可靠性较高。The reputation value ∈(100*(logK)^2, 120*(logK)^2), the judgment result is that the threat intelligence data is highly reliable for L* level system detection and protection in the banking environment.

对于威胁情报数据携带的信誉值来说,伴随着链路上不同层次的比对过程,始终处于不断动态调整的过程中。For the reputation value carried by threat intelligence data, it is always in the process of continuous dynamic adjustment along with the comparison process of different levels on the link.

在一轮的时间周期中,流程发起周期起点为自然周期起点,即开启威胁情报数据评价的时间节点,在周期中每个子环节为不同的比对过程,每一次的比对过程相对独立进行,在比对完成后即对威胁情报数据进行信誉值赋值调整,每个环节的信誉值赋值将建立赋值计算中间表,计算赋值过程在赋值计算中间表中完成,原威胁情报入库数据不进行相关操作。In a round of time period, the starting point of the process initiation period is the starting point of the natural period, that is, the time node when the evaluation of threat intelligence data is started. In the period, each sub-link is a different comparison process, and each comparison process is relatively independent. After the comparison is completed, the reputation value assignment adjustment is performed on the threat intelligence data. The credit value assignment of each link will establish an assignment calculation intermediate table. The calculation and assignment process is completed in the assignment calculation intermediate table, and the original threat intelligence storage data will not be correlated. operate.

进一步的,考虑到威胁情报数据在各个环节阶段都没有命中的情况,故由时间周期作为每一轮时间周期的结束标志,每一轮的时间周期为1分钟,在每一轮的时间周期结束时将由威胁情报评价表索引各个环节赋值计算中间表,进行信誉值计算。将信誉值判断结果为可靠性较高的威胁情报数据放入规则优化目录,并同步至互联网DMZ区域出口防火墙进行源IP封禁。Further, considering that the threat intelligence data is not hit in each link stage, the time period is used as the end mark of each round of time period. The time period of each round is 1 minute, and the time period of each round ends. At the time, the intermediate table will be assigned and calculated by each link of the threat intelligence evaluation table index, and the reputation value will be calculated. Put the threat intelligence data with high reliability as a result of the reputation value judgment into the rule optimization directory, and synchronize it to the egress firewall in the Internet DMZ area to block the source IP.

威胁情报数据入库设计如下:Threat intelligence data storage is designed as follows:

序号serial number HASH值HASH value IPIP 域名domain name 攻击方式Attack method 地址位置address location ……... 唯一性索引unique index 11 XX XX XX XX XX XXXXXXXX 22 XX XX XX XX XX XXXXXXXX

阶段赋值中间表设计如下:The stage assignment intermediate table is designed as follows:

序号serial number HASH值HASH value IPIP 域名domain name 攻击方式Attack method 地址位置address location 唯一性索引unique index 时间戳timestamp 加权项weighted term 11 XX XX XX XX XX XXXXXXXX XX SecondBSecondB 22 XX XX XX XX XX XXXXXXXX XX SecondASecondA

威胁情报评价表设计如下:The threat intelligence evaluation table is designed as follows:

Figure GDA0002744998890000131
Figure GDA0002744998890000131

Figure GDA0002744998890000141
Figure GDA0002744998890000141

在每一轮时间周期内,每个子环节告警日志比对过程命中处理只处理一次,即子环节告警日志的相同条目的命中在一个时间周期内仅赋值计算1次。In each round of time period, the hit processing of each sub-link alarm log comparison process is processed only once, that is, the hit of the same entry in the sub-link alarm log is only assigned and calculated once in a time period.

在每一轮时间周期内,如遇到一条威胁情报数据同一环节被多次命中,例如第2阶段赋值计算第10秒和第30秒命中相同的威胁情报数据,而命中方式不同,第10秒为SecondA,第30秒为SecondB,那么存在周期内的重复赋值调整,信誉值的重复赋值仅向更大值进行单向赋值,在阶段赋值计算中间表中仅存在威胁情报数据的唯一赋值结果。In each round of time period, if you encounter a threat intelligence data and the same link is hit multiple times, for example, the second stage assignment calculation hits the same threat intelligence data in the 10th and 30th seconds, but the hit method is different, the 10th second It is SecondA, and the 30th second is SeconddB, then there are repeated assignment adjustments in the cycle, and the repeated assignment of reputation value is only unidirectionally assigned to a larger value, and only the unique assignment result of threat intelligence data exists in the intermediate table of stage assignment calculation.

由于资产等级不同导致的K值不同,带来计算维度不同,在威胁情报评价表中将记录不同的K值供后续信誉值计算使用,不同K值的调用计算带入不同评价区间中进行评价。Due to the different K values caused by different asset levels, the calculation dimensions are different. In the threat intelligence evaluation table, different K values will be recorded for subsequent reputation value calculations, and the call calculation of different K values will be brought into different evaluation intervals for evaluation.

在每一轮时间周期结束后,威胁情报评价表中的数据为满足计算需求,不进行表清空操作,在新一轮时间周期结束后,将对原表进行覆盖。这样避免了相同一条威胁情报数据在跨越不同环节反复操作过程中出现的赋值操作抢占行为,也为了避免同一环节中命中多条威胁情报数据的差错写入问题,同时对于持续扫描类攻击带来的一条数据多次命中问题带来缓释措施。At the end of each time period, the data in the threat intelligence evaluation table will not be cleared to meet the calculation requirements, and the original table will be overwritten after a new round of time period. This avoids the assignment operation preemption behavior that occurs when the same piece of threat intelligence data is repeatedly operated across different links, and also avoids the problem of erroneous writing of multiple pieces of threat intelligence data in the same link. The problem of multiple hits of a piece of data brings mitigation measures.

安全防护规则优化也是一个周期性动作,在威胁情报数据信誉值的动态调整过程中,威胁情报评价表中的数据也是周期性刷新,势必会带来信誉值所处的区间位移,这时安全防护规则需要依据“可靠性较高”评价得分区间进行动态调整,如上一轮周期内的“可靠性较高”级别的威胁情报数据在新一轮调整周期结束后位移至“可靠性一般”级别,那么在防火墙阻断规则地址池中将移除相应规则。The optimization of security protection rules is also a periodic action. During the dynamic adjustment of the reputation value of threat intelligence data, the data in the threat intelligence evaluation table is also periodically refreshed, which will inevitably bring about a shift in the interval where the reputation value is located. At this time, the security protection The rules need to be dynamically adjusted according to the "high reliability" evaluation score range. For example, the threat intelligence data of the "high reliability" level in the previous cycle will be shifted to the "average reliability" level after the new round of adjustment cycle. Then the corresponding rules will be removed from the address pool of firewall blocking rules.

如图3所示,本发明还公开了一种威胁情报在银行中的应用系统,包括:As shown in FIG. 3 , the present invention also discloses an application system of threat intelligence in a bank, including:

获取模块110,用于获取威胁情报数据;an acquisition module 110, configured to acquire threat intelligence data;

比对模块120,用于在时间周期开始时,将从访问数据流多环节收集到的告警日志逐一与威胁情报数据进行比对,获取比对结果;The comparison module 120 is configured to compare the alarm logs collected from the multiple links of the access data flow with the threat intelligence data one by one at the beginning of the time period to obtain the comparison result;

加权模块130,用于为每个环节建立赋值计算中间表,并根据比对结果在赋值计算中间表中对威胁情报数据进行加权,以获取各环节的加权值;The weighting module 130 is used to establish an assignment calculation intermediate table for each link, and weight the threat intelligence data in the assignment calculation intermediate table according to the comparison result, so as to obtain the weighted value of each link;

索引模块140,用于建立威胁情报评价表,且在威胁情报评价表与各环节的赋值计算中间表之间建立索引;The indexing module 140 is used to establish a threat intelligence evaluation table, and establish an index between the threat intelligence evaluation table and the assignment calculation intermediate table of each link;

运算模块150,用于在时间周期结束时,在威胁情报评价表中将各环节的加权值进行运算,以获取信誉值;The calculation module 150 is used to calculate the weighted value of each link in the threat intelligence evaluation table at the end of the time period to obtain the reputation value;

判断模块160,用于根据信誉值的高低,判断威胁情报数据的可靠性。The judging module 160 is used for judging the reliability of the threat intelligence data according to the level of the reputation value.

进一步的,访问数据流多环节包括:互联网DMZ、核心生产区和应用服务器侧。如图4所示,比对模块120包括初次比对模块1201、二次比对模块1202和三次比对模块1203。Further, the multi-link access data flow includes: Internet DMZ, core production area and application server side. As shown in FIG. 4 , the comparison module 120 includes a primary comparison module 1201 , a secondary comparison module 1202 and a third comparison module 1203 .

初次比对模块1201用于在互联网DMZ进行初次对比,如果互联网DMZ的告警日志中源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行FirstA加权,反之不进行操作。The initial comparison module 1201 is used to perform the initial comparison in the Internet DMZ. If the source IP information in the alarm log of the Internet DMZ hits the attack source IP information in the threat intelligence data, the hit threat intelligence data will be weighted by FirstA, otherwise, no operation will be performed. .

二次比对模块1202用于在核心生产区进行二次比对,如果核心生产区的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据进行SecondA加权。如果核心生产区的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行SecondB加权。如果核心生产区的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行SecondC加权。如果核心生产区的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作。The secondary comparison module 1202 is used to perform secondary comparison in the core production area. If both the source IP and the attack feature information in the alarm log of the core production area can match the attack source IP and the attack feature information in the threat intelligence data, then check the source IP and the attack feature information in the threat intelligence data. The hit threat intelligence data is SecondA weighted. If only the source IP information in the alarm log of the core production area matches the attack source IP information in the threat intelligence data, SeconddB weighting is performed on the hit threat intelligence data. If only the attack feature information in the alarm log of the core production area hits the attack feature information in the threat intelligence data, SecondC weighting is performed on the hit threat intelligence data. If the source IP and attack feature information in the alarm log of the core production area cannot match the attack source IP and attack feature information in the threat intelligence data, no operation is performed.

三次比对模块1203用于在应用服务器侧进行三次比对,如果应用服务器侧的告警日志中源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则对命中的威胁情报数据对命中的威胁情报数据进行ThirdA加权。如果应用服务器侧的告警日志中仅源IP信息命中威胁情报数据中的攻击源IP信息,则对命中的威胁情报数据进行ThirdB加权。如果应用服务器侧的告警日志中仅攻击特征信息命中威胁情报数据中的攻击特征信息,则对命中的威胁情报数据进行ThirdC加权。如果应用服务器侧的告警日志中源IP和攻击特征信息都不能命中威胁情报数据中的攻击源IP和攻击特征信息,则不进行操作。The three comparison module 1203 is used to perform three comparisons on the application server side. If both the source IP and the attack feature information in the alarm log on the application server side can match the attack source IP and attack feature information in the threat intelligence data, then the hit Threat Intelligence Data ThirdA-weights hit threat intelligence data. If only the source IP information in the alarm log on the application server side matches the attack source IP information in the threat intelligence data, ThirdB weighting is performed on the hit threat intelligence data. If only the attack feature information in the alarm log on the application server side matches the attack feature information in the threat intelligence data, ThirdC weighting is performed on the hit threat intelligence data. If neither the source IP address nor the attack signature information in the alarm log on the application server side can match the attack source IP address and attack signature information in the threat intelligence data, no operation is performed.

本发明实施例中,比对模块120还包括特殊比对模块1204,特殊比对模块1204用于特殊攻击类型比对,如果应用服务器侧的告警日志中包含特殊攻击类型,特殊攻击类型中的源IP和攻击特征信息都能够命中威胁情报数据中的攻击源IP和攻击特征信息,则比对防火墙阻断日志。如果特殊攻击类型告警日志与防火墙阻断日志相匹配,则对命中的威胁情报数据进行FourthA加权,反之,不进行任何操作。In the embodiment of the present invention, the comparison module 120 further includes a special comparison module 1204. The special comparison module 1204 is used for comparison of special attack types. If the alarm log on the application server side includes the special attack type, the source of the special attack type Both the IP and attack feature information can match the attack source IP and attack feature information in the threat intelligence data, and then compare the firewall blocking logs. If the special attack type alarm log matches the firewall blocking log, FourthA weighting is performed on the hit threat intelligence data; otherwise, no operation is performed.

所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working process of the system, device and unit described above may refer to the corresponding process in the foregoing method embodiments, which will not be repeated here.

应理解,所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分,或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。It should be understood that, if the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or a part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present invention. The aforementioned storage medium includes: U disk, removable hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes.

本发明的技术范围不仅仅局限于上述说明中的内容,本领域技术人员可以在不脱离本发明技术思想的前提下,对上述实施例进行多种变形和修改,而这些变形和修改均应当属于本发明的保护范围内。The technical scope of the present invention is not limited to the content in the above description, and those skilled in the art can make various deformations and modifications to the above-mentioned embodiments without departing from the technical idea of the present invention, and these deformations and modifications should belong to within the protection scope of the present invention.

Claims (10)

1. A method for applying threat intelligence in a bank is characterized by comprising the following steps:
step 1, threat information data is obtained;
step 2, when the time period starts, comparing the alarm logs collected from multiple links of the access data stream with the threat information data one by one to obtain a comparison result;
step 3, establishing an assignment calculation intermediate table for each link, and weighting the threat intelligence data in the assignment calculation intermediate table according to a comparison result to obtain a weighted value of each link;
step 4, establishing a threat intelligence evaluation table, and establishing indexes between the threat intelligence evaluation table and an assignment calculation intermediate table of each link;
step 5, when the time period is over, calculating the weighted value of each link in the threat information evaluation table to obtain a credit value;
and 6, judging the reliability of the threat intelligence data according to the reputation value.
2. The method of applying threat intelligence in a bank of claim 1, wherein the accessing data flow multiple links comprise: the step 2 specifically includes, at the side of the internet DMZ, the core production area, and the application server:
performing primary comparison on the Internet DMZ, and if source IP information in an alarm log of the Internet DMZ hits attack source IP information in threat intelligence data, performing first tA weighting on the hit threat intelligence data, otherwise, not performing operation;
performing secondary comparison in the core production area, and performing SecondA weighting on hit threat information data if both the source IP and the attack characteristic information in the alarm log of the core production area can hit the attack source IP and the attack characteristic information in the threat information data;
if only the source IP information in the alarm log of the core production area hits the attack source IP information in the threat information data, SecondB weighting is carried out on the hit threat information data;
if only attack characteristic information in the threat information data is hit in the alarm log of the core production area, performing SecondC weighting on the hit threat information data;
if the source IP and the attack characteristic information in the alarm log of the core production area can not hit the attack source IP and the attack characteristic information in the threat intelligence data, the operation is not carried out;
comparing for three times on the side of the application server, and if the source IP and the attack characteristic information in the alarm log on the side of the application server can hit the attack source IP and the attack characteristic information in the threat intelligence data, carrying out Thirda weighting on the hit threat intelligence data;
if only the source IP information in the alarm log of the application server side hits attack source IP information in the threat intelligence data, carrying out ThirdB weighting on the hit threat intelligence data;
if only attack characteristic information in the threat intelligence data is hit in the alarm log of the application server side, ThircC weighting is carried out on the hit threat intelligence data;
and if the source IP and the attack characteristic information in the alarm log of the application server side can not hit the attack source IP and the attack characteristic information in the threat intelligence data, the operation is not carried out.
3. The method for applying threat intelligence in a bank according to claim 2, wherein the step 2 further comprises a special attack type comparison, if the alarm log at the application server side contains a special attack type, and both the source IP and the attack characteristic information in the special attack type can hit the attack source IP and the attack characteristic information in the threat intelligence data, the firewall is compared to block the log;
and if the alarm log in the special attack type is matched with the firewall blocking log, performing Fourtha weighting on hit threat intelligence data, and otherwise, not performing any operation.
4. The method of applying threat intelligence of claim 2, wherein the weighting values in the assignment calculation intermediate table are selected to be the maximum values if the threat intelligence data is hit multiple times in the same link during a round of time period.
5. The method for applying threat intelligence in banks according to claim 1, wherein the calculation formula of the reputation value in step 3 is:
a reputation value ═ an initialization valuation · (K ^ weight term index 1^ weight term weight 1+ weight term dimension index 2^ weight term weight 2+ … + weight term dimension index N ^ weight term N)/100));
weighting value ═ weighting item dimension index ^ weighting item weight;
where the initialization assignment is 60, the value of K is the asset weight, and the K values are [10, 20, 30, 40, 50], respectively, for a system rated in a standardized rating of L1-L5.
6. The method of claim 5, wherein for protected assets of different levels, the interval level of reputation value is dynamically adjusted according to the difference of asset weight K value to match different reputation values, and the division of reputation value interval level is as follows:
the credit value belongs to [60 x (logK) ^2,80 x (logK) ^2 ], and the judgment result shows that the reliability of the threat intelligence data is lower;
the credit value is belonged to (80 ^ log K) ^2,100 ^ log K ^2), and the judgment result is that the reliability of the threat intelligence data is general;
and the credit value is belonged to (100 ^ log K) 2,120 ^ log K ^2), and the judgment result shows that the reliability of the threat intelligence data is higher.
7. The method of claim 6, wherein the threat intelligence data with the reputation value of high reliability is put into a rule optimization directory and synchronized to an internet DMZ domain exit firewall to block the source IP.
8. A system for applying threat intelligence to a bank, comprising:
the acquisition module is used for acquiring threat information data;
the comparison module is used for comparing the alarm logs collected from multiple links of the access data stream with the threat information data one by one at the beginning of a time period to obtain a comparison result;
the weighting module is used for establishing an assignment calculation intermediate table for each link and weighting the threat intelligence data in the assignment calculation intermediate table according to a comparison result so as to obtain a weighted value of each link;
the index module is used for establishing a threat intelligence evaluation table and establishing an index between the threat intelligence evaluation table and the assignment calculation intermediate table of each link;
the operation module is used for operating the weighted value of each link in the threat information evaluation table to obtain a credit value when the time period is over;
and the judging module is used for judging the reliability of the threat intelligence data according to the credit value.
9. The system for applying threat intelligence to a bank according to claim 8, wherein the multiple access data flow links comprise: the system comprises an Internet DMZ, a core production area and an application server side, wherein the comparison module comprises a primary comparison module, a secondary comparison module and a tertiary comparison module;
the primary comparison module is used for carrying out primary comparison on the Internet DMZ, if source IP information in an alarm log of the Internet DMZ hits attack source IP information in threat information data, the hit threat information data is subjected to first tA weighting, otherwise, operation is not carried out;
the secondary comparison module is used for carrying out secondary comparison in the core production area, and if the source IP and the attack characteristic information in the alarm log of the core production area can both hit the attack source IP and the attack characteristic information in the threat information data, SecondA weighting is carried out on the hit threat information data;
if only the source IP information in the alarm log of the core production area hits the attack source IP information in the threat information data, SecondB weighting is carried out on the hit threat information data;
if only attack characteristic information in the threat information data is hit in the alarm log of the core production area, performing SecondC weighting on the hit threat information data;
if the source IP and the attack characteristic information in the alarm log of the core production area can not hit the attack source IP and the attack characteristic information in the threat intelligence data, the operation is not carried out;
the third comparison module is used for carrying out third comparison on the side of the application server, and if the source IP and the attack characteristic information in the alarm log of the side of the application server can hit the attack source IP and the attack characteristic information in the threat information data, ThirdA weighting is carried out on the hit threat information data;
if only the source IP information in the alarm log of the application server side hits attack source IP information in the threat intelligence data, carrying out ThirdB weighting on the hit threat intelligence data;
if only attack characteristic information in the threat intelligence data is hit in the alarm log of the application server side, ThircC weighting is carried out on the hit threat intelligence data;
and if the source IP and the attack characteristic information in the alarm log of the application server side can not hit the attack source IP and the attack characteristic information in the threat intelligence data, the operation is not carried out.
10. The system for applying threat intelligence in a bank according to claim 8, further comprising a special comparison module, wherein the special comparison module is used for comparing special attack types, if the alarm log at the application server side contains a special attack type, the source IP and the attack characteristic information in the special attack type can hit the attack source IP and the attack characteristic information in the threat intelligence data, and the firewall is compared to block the log;
and if the alarm log in the special attack type is matched with the firewall blocking log, performing Fourtha weighting on hit threat intelligence data, and otherwise, not performing any operation.
CN202010933025.2A 2020-09-08 2020-09-08 Application method and system of threat intelligence in bank Active CN111800439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010933025.2A CN111800439B (en) 2020-09-08 2020-09-08 Application method and system of threat intelligence in bank

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010933025.2A CN111800439B (en) 2020-09-08 2020-09-08 Application method and system of threat intelligence in bank

Publications (2)

Publication Number Publication Date
CN111800439A CN111800439A (en) 2020-10-20
CN111800439B true CN111800439B (en) 2020-12-22

Family

ID=72834283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010933025.2A Active CN111800439B (en) 2020-09-08 2020-09-08 Application method and system of threat intelligence in bank

Country Status (1)

Country Link
CN (1) CN111800439B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120833181B (en) * 2025-09-18 2025-11-21 广州大学 Trust evaluation model of threat information sharing platform and excitation mechanism integration method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462717A (en) * 2018-03-21 2018-08-28 北京理工大学 The firewall rule sets under discrimination optimization method of rule-based match hit rate and distribution variance
CN108600212A (en) * 2018-04-19 2018-09-28 北京邮电大学 Threat information credibility method of discrimination and device based on the credible feature of various dimensions
CN109672674A (en) * 2018-12-19 2019-04-23 中国科学院信息工程研究所 A kind of Cyberthreat information confidence level recognition methods
CN109688091A (en) * 2018-04-25 2019-04-26 北京微步在线科技有限公司 The method for evaluating quality and device of the threat information of multi-source
US10333898B1 (en) * 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
CN111160749A (en) * 2019-12-23 2020-05-15 北京神州绿盟信息安全科技股份有限公司 Method and device for evaluating information quality and fusing information

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777222B (en) * 2016-12-26 2020-05-08 中国电子科技集团公司第三十研究所 Security equipment threat information sharing method based on lightweight domain ontology
US10855702B2 (en) * 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
CN111212049B (en) * 2019-12-27 2022-04-12 杭州安恒信息技术股份有限公司 A Threat Intelligence IOC Reputation Analysis Method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462717A (en) * 2018-03-21 2018-08-28 北京理工大学 The firewall rule sets under discrimination optimization method of rule-based match hit rate and distribution variance
CN108600212A (en) * 2018-04-19 2018-09-28 北京邮电大学 Threat information credibility method of discrimination and device based on the credible feature of various dimensions
CN109688091A (en) * 2018-04-25 2019-04-26 北京微步在线科技有限公司 The method for evaluating quality and device of the threat information of multi-source
US10333898B1 (en) * 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
CN109672674A (en) * 2018-12-19 2019-04-23 中国科学院信息工程研究所 A kind of Cyberthreat information confidence level recognition methods
CN111160749A (en) * 2019-12-23 2020-05-15 北京神州绿盟信息安全科技股份有限公司 Method and device for evaluating information quality and fusing information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Quantitative Evaluation of Trust in the Quality of Cyber;Thomas Schaberreiter等;《ARES 19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityAugust 2019 Article》;20191231;全文 *
基于层次分析法的威胁情报质量评估方法;周劭文 等;《2018第七届全国安全等级保护技术大会论文集》;20181231;第54卷(第S2期);第42-46页 *

Also Published As

Publication number Publication date
CN111800439A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
Allodi et al. Security events and vulnerability data for cybersecurity risk estimation
Jahankhani et al. Cybercrime classification and characteristics
Mbelli et al. Cyber security, a threat to cyber banking in South Africa: an approach to network and application security
Marchetti et al. Countering advanced persistent threats through security intelligence and big data analytics
Veprytska et al. AI powered attacks against AI powered protection: classification, scenarios and risk analysis
Kaur et al. Cybersecurity threats in FinTech
Ganne Iot threats & implementation of ai/ml to address emerging cyber security issues in iot with cloud computing
Shukla et al. Security analysis of the cyber crime
Wei et al. Demystifying data poisoning attacks in distributed learning as a service
Nuiaa et al. Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model.
Lawall et al. A threat-led approach to mitigating ransomware attacks: Insights from a comprehensive analysis of the ransomware ecosystem
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
CN111800439B (en) Application method and system of threat intelligence in bank
Wang et al. Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures
Malone Offense-defense balance in cyberspace: a proposed model
Uyyala Multilevel authentication system using hierarchical intrusion detection architecture for online banking
Negulescu et al. Actual and future digital threats and their impact on civil and military cybersecurity management
Subburaj et al. Digitalwatering hole attack detection using sequential pattern
CN102314569A (en) Method for dynamic intrusion response
Akash et al. Privacy-Preserving Technique in Cybersecurity: Balancing Data Protection and User Rights
Kumari et al. Defending the Treasury: Deep Learning Strategies for Banking Security Against Trojan Threats
Kaczmarczyk Cyberattacks/incidents and responding to them
Franjić Cybercrime and modern information technology
KR102671718B1 (en) Weblog new threat detection security system that predicts new intrusions through machine learning
Qin et al. Cyber-attacks on SWIFT Systems of financial institutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No.4 building, Hexi Financial City, Jianye District, Nanjing City, Jiangsu Province, 210000

Patentee after: Jiangsu Sushang Bank Co.,Ltd.

Country or region after: China

Address before: No.4 building, Hexi Financial City, Jianye District, Nanjing City, Jiangsu Province, 210000

Patentee before: JIANGSU SUNING BANK Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address