WO2025180269A1 - Endogenous-security network method and architecture, medium, and device - Google Patents
Endogenous-security network method and architecture, medium, and deviceInfo
- Publication number
- WO2025180269A1 WO2025180269A1 PCT/CN2025/077983 CN2025077983W WO2025180269A1 WO 2025180269 A1 WO2025180269 A1 WO 2025180269A1 CN 2025077983 W CN2025077983 W CN 2025077983W WO 2025180269 A1 WO2025180269 A1 WO 2025180269A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- forwarding
- security
- unit
- transmission network
- network element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- the present application relates to the field of communication network technology, and specifically to endogenous security network methods, architectures, media and equipment.
- IP/TCP-based network communication systems are usually composed of switches, routers, gateways, terminals, and servers, which have open accessibility to each other. This leads to risks of data leakage, integrity, availability, and network availability.
- the usual security defense concept is the idea of zoning and isolation.
- security areas are divided based on location, business, etc., and then a large number of devices such as FW (firewall), IDS (intrusion detection system), IPS (intrusion protection system), WAF, sandbox, DLP, EDR, NDR, etc. are added for isolation and protection.
- a network security domain is a group of computers, servers, databases, business systems, and other systems with the same security level and similar service types and functions. Specifically, in a network, this might be an IP segment (a C segment, a B segment) or several segments, a VLAN or several VLANs, an entire network area connected to a firewall interface, or a cabinet or cabinets in a computer room.
- IP segment a C segment, a B segment
- VLAN virtual local area network
- Network security domain isolation essentially divides the entire network into smaller, secure trust domains. Otherwise, an attacker who compromises a single address could scan and detect the entire network.
- Border defense is a single, relatively static security protection technology.
- the Single Security Architecture (SSA) has been implemented.
- the SSA's security capabilities encompass all JIE security capabilities: perimeter protection, endpoint security, mobile endpoint security, data center security, network security situational awareness and analysis, and identity and access management.
- the number of processing nodes has been reduced from over 1,000 to 50.
- the SCCA (Secure Cloud Computing Architecture) product components include:
- Cloud Access Point Provides access to the cloud (provides connectivity to approved cloud providers) and protects the DISN from cloud-initiated attacks. Simplifies protection and focuses on protecting the network perimeter.
- VDSS Virtual Data Center Security Stack
- VDMS Virtual Data Center Management Services
- TCM Trusted Cloud Credential Manager
- the ZTA (Zero Trust Security Architecture) concept proposed in 2010 assumes that the network is untrustworthy. Every access and every link must be authenticated and authorized before access, and security assessment and re-authentication must be performed continuously. See Figure 5.
- the core component of zero trust in the ZTA architecture diagram is a device with a policy engine, policy manager, and policy execution point, usually called a cloud security agent. Before accessing cloud resources, you must first access the security agent. The security agent will combine many external components to perform access authentication and assessment. Only after passing the authentication and assessment can you access cloud resources/enterprise resources.
- zero trust The core concept of zero trust is that devices and systems inside and outside the network are never trusted by default.
- the trust foundation of access control needs to be rebuilt based on authentication and authorization, and continuous verification is required.
- the implementation of zero trust faces the following difficulties:
- Zero Trust has significant complexity in terms of network configuration, software-defined networking (SDN), data labeling, analytics, access control, policy orchestration, encryption, automation, and end-to-end ICAM (identity, credential, and access management). Enterprise-level considerations also include determining the data, applications, assets, and services that need to be protected, as well as mapping transaction flows, policy decisions, and policy enforcement locations.
- SDN software-defined networking
- data labeling analytics
- access control policy orchestration
- encryption encryption
- automation automation
- end-to-end ICAM end-to-end ICAM
- ZTA requires a lot of manpower and resources, and is difficult to implement.
- Zero Trust essentially means that all users and devices attempting to connect to a military network will be identified and authenticated before being granted access, with the goal of "never trust” and “always verify” before allowing network connection.
- This comprehensive security technology deployment architecture diagram comprehensively depicts the network landscape of government and enterprise organizations, the integration of information technology and cybersecurity, and the overall security landscape, showcasing the target state of cybersecurity technology deployment.
- the information technology systems of government and enterprise organizations are divided into various types, including headquarters, regional centers, branches, and network nodes.
- the information technology of government and enterprise organizations is further divided into layers and components, including the global network, backbone network, regional boundaries, communication networks, information systems, cloud platforms, big data platforms, and digital terminals, with their locations and forms marked.
- the Dynamic Heterogeneous Redundancy (DHR) architecture is based on the logical expression of "relative correctness axioms" and closed-loop robust control. It is a closed-loop, iterative, multi-dimensional, dynamically reconfigurable robust control structure based on policy adjudication. It consists of functionally equivalent heterogeneous executors, input and output agents, and iterative policy adjudication, feedback control, and a scheduler.
- the input agent distributes external input signal sequences (optional), while the output agent and iterative adjudication (composed of multiple voting algorithms) form a normalized decision interface.
- the core of the feedback control and scheduler consists of a set of pre-set scheduling policies and intelligent learning algorithms.
- the feedback scheduler Upon receiving information from the adjudicator that an anomaly has been detected, the feedback scheduler is activated and instructs relevant components to replace, migrate, clean, reorganize, and reconfigure the current operating environment. This process is iteratively executed until the adjudicator's anomaly disappears or its occurrence frequency falls below a set threshold.
- the DHR structure has a unique "uncertainty" operating mechanism that can suppress or control the impact of generalized uncertain disturbances in the heterogeneous executor set K, forming a "security defense fog". Whether it is reliability risks caused by natural factors or security threats caused by intentional human behavior, as long as they are expressed in differential mode, they can be 100% suppressed.
- the expression of common mode that is sensitive to the judgment link can also be controlled within the threshold range given by the design.
- the biggest problem with mimetic defense is its high cost.
- the same function requires multiple heterogeneous executors, and the more heterogeneous executors, the stronger the security protection. This is similar to the one-time pad system favored by the cryptography community, but due to its high cost, it has not yet been implemented. While increasing the cost of attack through multiple internal heterogeneous modes, the cost itself also increases significantly. For example, requiring at least three executors means that the work originally completed by one executor now requires three or more. While improving attack defense capabilities, the cost itself increases even faster. Fifteen years after the theory was proposed, it has yet to be widely adopted, primarily due to its high cost. Furthermore, it is unlikely to be accepted by mainstream security vendors in the near future.
- NAC Network Admission Control
- 802.1X authentication MAC authentication
- Portal authentication MAC authentication
- the NAC security solution starts with the security control of terminals accessing the network, combining terminal security status with network access control. Through inspection, isolation, reinforcement and auditing, it strengthens the active defense capabilities of network user terminals, ensuring the security of every terminal in the enterprise and thus protecting the security of the entire enterprise network.
- the NAC security architecture includes three key components: NAC terminal, network access device, and access server.
- NAC includes three authentication methods: 802.1X authentication, MAC authentication, and Portal authentication. Because the three authentication methods have different authentication principles, they are suitable for different scenarios. In actual applications, you can deploy a suitable authentication method according to the scenario, or you can deploy a hybrid authentication method composed of several authentication methods. The combination of hybrid authentication methods is based on the actual support of the device. The following table compares the three authentication methods:
- NAC is an access control technology. Whether or not a terminal is allowed access is based on terminal identity verification and the deployment of traditional security measures, such as antivirus software and operating system vulnerability patches. Only after a user passes authentication is the NAC device's data port opened or a MAC address entry created, allowing network access. Once connected, there are no corresponding access restrictions within the same VLAN or even across VLANs. Therefore, in practice, authenticated host terminals typically have significant access freedom. However, since it's impossible to completely prevent host infection, such as through the exploitation of zero-day vulnerabilities, an infected host terminal can still spread viruses, botnet malware, and other malware to numerous other terminals and servers, potentially compromising business systems, data, and networks. Therefore, while NAC technology can reduce the risk of attack, it doesn't reduce reliance on traditional security deployment and maintenance methods, and security deployment and maintenance costs remain high.
- the existing invention patent application document "Method and Apparatus for Isolation Support in Network Slicing" with publication number CN115843429A includes the following steps: receiving a slice isolation policy of a network slice subnet (NSS) in a transport network (TN) domain, mapping the slice isolation policy to a network resource isolation policy and a service isolation policy, and mapping the network resource isolation policy and the service isolation policy to a network resource allocation policy and a data service forwarding policy, respectively.
- the network resource allocation policy and the data service forwarding policy can be applied to the creation of a TN NSS.
- the aforementioned existing technology is used for a method for isolation support in network slicing.
- 5G network slicing itself divides different bearer resources (forwarding resources, management resources, and monitoring resources) based on the different service characteristics it carries. It is somewhat similar to virtual private network technology. In essence, it is a technology that virtualizes resources into multiple copies for different uses. However, the aforementioned existing technology cannot achieve fine-grained security control and three-sided isolation based on security considerations, and network security still has loopholes.
- the existing invention patent application document "A Zero-Trust Based Immune Security Defense Method," with publication number CN116707980A, implements continuous security testing of access entities, fine-grained control of access behavior, and controls the spread of risks to ensure the normal operation of uninfected applications. It also uses big data analysis and AI technology to self-improve security policies based on historical data. Based on network security technology and combined with systems such as entity behavior analysis, it implements an adaptive immune security mechanism for network security systems.
- Zero trust itself is a concept that adheres to the principles of never trusting, starting from scratch, and dynamic verification. It is typically implemented in data centers. It assumes compromise and distrusts network infrastructure and perimeter security. Every user's access is authenticated and authorized to determine whether access is permitted. This requires extensive detection and analysis capabilities, and therefore, a significant amount of computing power. Its drawbacks are the same as those of the zero-trust architecture discussed earlier.
- the technical problem to be solved by this application is: how to solve the technical problem in the existing technology that due to the openness of the IP network, its own security protection capability is low, a large number of external security protection facilities are required, the effect is poor, the cost is high, it is difficult to form a low-cost security protection capability, and it is easy to attack but difficult to defend.
- the endogenous security network method includes:
- the endogenous security network method includes: authentication and authorization method and automatic learning method;
- the transmission network element forwards the message based on the forwarding characteristic information of the normal service data flow
- the method for binding the service data flow forwarding characteristics to the transmission network element forwarding table entry further includes:
- the processor in the control plane generates and sends forwarding entries, flow tables, and forwarding whitelists to the forwarding plane;
- the method for binding service data flow forwarding characteristics to transmission network element forwarding table entries further includes:
- a forwarding table entry is generated.
- the forwarding table entry includes but is not limited to:
- step S23 ′′ when the preset learning time threshold is not reached, continue to execute step S2 ′′ to record the forwarding entries generated by normal business access in the temporary table;
- the storage method of the forwarding baseline database includes: distributed storage and centralized storage; specifically, the learning processing method includes but is not limited to: distributed and centralized;
- S27′′ perform abnormal message judgment to determine and discard abnormal business messages, and when the data message is determined to be a normal business data message, obtain and update the forwarding baseline database according to the current message forwarding information.
- step S22 the temporary table is stored in each transmission network element, wherein the temporary table storage method includes: distributed storage and centralized storage; in the centralized storage method, the temporary table is stored in the server of the control plane.
- the endogenous security network method also includes an endogenous security elastic network.
- the logical components of the endogenous security elastic network include: host terminal, transmission network element, application server and resources, security network controller, policy server, identity authentication and authorization audit server, network management switch, server, log sampling and threat analysis server; specifically, the transmission network element includes but is not limited to: Ethernet transmission network element, IP transmission network element.
- the logical architecture of the intrinsically secure elastic network includes: management plane, control plane, and forwarding plane;
- the management ports of all service switches are connected to the management switch using a management switch, isolating the interfaces of the management switch and the service switches.
- the management plane includes but is not limited to: a management switch, a management plane server, and an end-to-end component management unit.
- the management server is used to configure devices with end-to-end layout management units in an inherently secure elastic network. To ensure security, each transmission network element and the management server perform bidirectional authentication to communicate on the management plane.
- the forwarding plane includes the host terminal business unit, application server and data resource business unit, and the forwarding module of the transmission network element. Specifically, the forwarding module serves as the execution point of the security forwarding policy.
- the forwarding network element includes the message forwarding component, ACL component, statistics component, sampling component, and log tracing component to perform forwarding control, log auditing, threat analysis, log tracing and accountability, and data statistics sampling for threat response.
- the control plane includes: a secure network controller, a policy server, an identity management authorization server, a log sampling and analysis server, and a control module for transmission network elements; the control plane is used to perform bidirectional authentication on intercommunication request devices to enable communication on the control plane; specifically, the identity management authorization server authenticates and authorizes the service data flow to form corresponding blacklists, whitelists, and graylists; the transmission network elements are deployed in a distributed manner, and anti-loop operations are performed using preset protocols.
- the network topology is discovered based on preset routing protocols, and distributed path calculations are performed; the secure network controller is used to perform centralized path calculations to find the transmission network elements related to the optimal path, and the control unit and policy execution unit in the transmission network element are used to generate and send forwarding table entries to the forwarding unit.
- the intrinsically secure network architecture includes:
- Forwarding information extraction module used to extract forwarding feature information of normal business data flow
- a forwarding basis formation module is used to send forwarding feature information of normal business data flows to the transmission network element to form forwarding table entries, flow tables and forwarding whitelists.
- the forwarding basis formation module also includes: an authentication and authorization module and an automatic learning module;
- a message forwarding module is used to forward messages based on the forwarding characteristic information of normal business data flows in the transmission network element
- a discard operation is performed on abnormal business data flow messages, wherein the messages are automatically generated into a whitelist for forwarding operation judgment based on the configuration files of the switch and router and the characteristics of normal business data flow, and the message forwarding module is connected to the forwarding basis formation module.
- the authentication and authorization module also includes:
- An access request sending unit configured to send an access request message to a specific server or specific resource using a host terminal
- An authentication and authorization processing unit configured to use a transmission network element to send an access request message to an authentication server and an authorization server for authorization and authentication, and the authentication and authorization processing unit is connected to the access request sending unit;
- the forwarding feature extraction unit is used to automatically extract the forwarding feature information of the normal business data flow when authorization and authentication are successful; when authorization and authentication fail, it returns failure information and discards the access request message.
- the forwarding feature extraction unit is connected to the authentication and authorization processing unit;
- the forwarding feature processing unit sends the forwarding feature information of the normal service data flow to the transmission network element, uses the processor of the control plane of the transmission network element to receive the forwarding feature information, and is connected to the forwarding feature extraction unit;
- a forwarding basis generation and delivery unit is used to generate and deliver forwarding table entries, flow tables, and forwarding whitelists to the forwarding plane in the processor of the control plane.
- the forwarding basis generation and delivery unit is connected to the forwarding feature processing unit.
- the authorization and authentication normal message forwarding unit is used to forward the normal business data flow message according to the forwarding table, flow table and forwarding whitelist when the transmission network element receives the authorization successful business data flow message.
- the authorization and authentication normal message forwarding unit is connected to the forwarding basis generation and issuance unit.
- the automatic learning module also includes:
- a forwarding table entry generating unit configured to generate forwarding table entries during operation of the transmission network element
- the table entry data reading and storage unit is used to read the table entry data from the forwarding table entry according to the preset reading time, store the table entry data in a temporary table, and store the temporary table in the transmission network element.
- the table entry data reading and storage unit is connected to the forwarding table entry generation unit;
- a table entry data continuous processing unit configured to continuously execute step S2' when the preset learning time threshold is not reached, so as to record the forwarding entries generated by normal business access in a temporary table, the table entry data continuous processing unit being connected to the table entry data reading and storing unit;
- a baseline database generation storage unit is configured to generate a forwarding baseline database when a preset learning time threshold is reached, store the forwarding baseline database in a transmission network element, and switch the transmission network element to a baseline control mode accordingly to query the forwarding baseline database, generate subsequent forwarding table entries, and add forwarding table entries to the forwarding plane.
- the forwarding baseline database storage method includes: distributed storage and centralized storage.
- the baseline database generation storage module is connected to the table entry data reading storage unit.
- a service data forwarding control unit is used to obtain baseline data from a forwarding baseline database, determine a forwarding baseline based on the baseline data, and control the transmission network element to forward service data packets according to the forwarding baseline.
- the service data forwarding control unit is connected to a storage unit generated by the baseline database;
- An exceeding baseline processing unit used to record and extract forwarding information of the current service data message when the service data message exceeds the forwarding baseline, and the exceeding baseline processing unit is connected to the service data forwarding control unit;
- the exception handling and baseline update processing unit is used to judge abnormal messages to determine and discard abnormal business messages.
- the business data message is determined to be a normal business data message, it obtains and updates the forwarding baseline database based on the current message forwarding information.
- the exception handling and baseline update processing unit is connected to the exceeding baseline processing unit and the business data forwarding control unit.
- a temporary table is stored in each transmission network element, wherein the temporary table storage methods include: distributed storage and centralized storage; in the centralized storage method, the temporary table is stored in the server of the control plane.
- a computer storage medium stores a plurality of instructions, wherein the instructions are suitable for an intrinsic security network method loaded and executed by a processor.
- an electronic device includes: a processor and a memory; wherein the memory stores a computer program, and the computer program is suitable for an endogenous security network method loaded and executed by the processor.
- This application provides business security capabilities based on a routing and switching architecture platform, eliminating the need for various complex hardware platforms, enabling platform reuse, inherent security, and simultaneous improvement of security and business capabilities.
- This application is based on a routing and switching platform, has inherent security, and can form an integrated, low-cost security value without causing increasing complexity in product types and difficulties in coordination.
- the security configuration of this application is automatically generated and issued based on normal business, thereby reducing configuration workload, lowering usage difficulty and maintenance costs.
- This application can always be online to play its value and maintain a normalized basic level of security, not just for compliance.
- the application By reducing the difficulty of deploying and using the product, the application reduces deployment costs and enables adoption by both large and small customers, further amortizing costs and increasing customer value.
- the inherent security of this application is integrated into the infrastructure budget, eliminating the need for separate security equipment procurement.
- This application's technical solution possesses universal basic security attributes, addressing customization issues.
- This application reduces the reliance on delivery, deployment, and operation and maintenance personnel through automated associated deployment, thereby reducing deployment costs.
- This application addresses the openness of IP communication systems, which can lead to a wide range of attack points and surfaces. It implements policy control on transmission and information processing network element devices, and each transmission and information processing network element is a policy execution point, thereby building a three-dimensional defense, and constructing enterprise, park, data center and other networks into networks through which only normal business traffic can pass (guaranteed by authentication and traceability capabilities).
- This application links the control and forwarding capabilities of network devices with the authentication and authorization system through a policy controller, blocking the path of attack traffic on each network information processing unit, making it difficult for attack traffic to penetrate the network, thereby effectively protecting assets such as business, network and data.
- This application uses transmission network elements, rather than adding a lot of external security devices, to build a relatively closed network based on business attributes on an open IP system.
- the transmission network elements can not only continue to develop along with the development of open IP network equipment capabilities, but also solve the problem of high protection costs brought by open networks in networks with clear business attributes, thereby realizing an endogenous security solution.
- this application also designs supplementary technologies for automatic learning and protection.
- This application provides a technical solution that eliminates various security risks by enabling transmission network elements such as switches and routers to only forward normal business data streams and not forward other data streams, thereby filtering out illegal access.
- This application is based on the distributed router computing of traditional switches and routers, and superimposed with SDN functions. If the SDN controller fails, it can still operate in the form of a traditional switching and routing network.
- This application solves the technical problem that due to the openness of IP networks, their own security protection capabilities are low, a large number of external security protection facilities are required, the effect is poor and the cost is high, it is difficult to form low-cost security protection capabilities, and it is easy to attack but difficult to defend.
- FIG1 is a schematic diagram of a data flow of a traditional network security architecture of background technology
- FIG2 is an architectural diagram of the technical requirements for security design of information security technology network security level protection in the background technology
- FIG3 is a JIE framework diagram of the U.S. military in the background art
- FIG4 is a schematic diagram of the SCCA secure cloud computing architecture in the U.S. military JIE of the background technology
- FIG5 is a ZTA architecture diagram of background technology
- FIG6 is a diagram of the inherent security mechanism of the background technology of mimicry defense technology - dynamic heterogeneous redundant construction
- FIG7 is a typical NAC networking diagram of the background technology
- FIG8 is a schematic diagram of the basic steps of the endogenous security network method of Example 1 of the present application.
- FIG9 is a schematic diagram of a specific implementation process of the endogenous security network method using the authentication and authorization method in Example 1 of the present application;
- FIG10 is a schematic diagram of the logical architecture of binding and forwarding service feature data streams according to Example 1 of the present application;
- FIG11 is a schematic diagram of the authentication, authorization and forwarding process for a user to access a service in Example 1 of the present application;
- Example 12 is a schematic diagram of steps for processing service packets based on a forwarding table and an ACL by a transmission unit in Example 1 of the present application;
- FIG13 is a schematic diagram of specific steps for binding normal service data flows to a forwarding table and a whitelist through automatic learning in Example 1 of the present application;
- FIG14 is a schematic diagram of the basic structure of the endogenous security network architecture of Example 2 of the present application.
- FIG16 is a logical architecture diagram of the endogenous security network architecture of Example 2 of the present application.
- FIG17 is a schematic diagram of the actual deployment of the endogenous security network architecture of Example 3 of the present application.
- FIG18 is a schematic diagram of a basic module of a transmission network element according to Example 3 of the present application.
- FIG19 is a schematic diagram of the functional modules of the endogenous security network security policy server of Example 3 of the present application.
- FIG20 is a flowchart of the self-learning method of Example 3 of the present application.
- FIG21 is a schematic diagram of the abnormal message reporting process of the host terminal and the application server business unit in Example 3 of the present application;
- FIG22a is a schematic diagram of the centralized distributed storage of the MA address library according to Example 3 of the present application.
- FIG22 b is a schematic diagram of several methods of adding a MAC address to a MAC address database according to Example 3 of the present application;
- FIG22 c is a schematic diagram of the MAC address library self-learning process in Example 3 of the present application.
- FIG22 d is a schematic diagram of a process for preventing non-owned devices from accessing the system according to Example 3 of the present application;
- FIG23 is a schematic diagram of fast-start forwarding, cache entry writing, and reading of a switch in Example 3 of the present application.
- the basic steps of the endogenous security network method provided by this application include but are not limited to:
- forwarding feature information includes but is not limited to 5-tuple information such as source IP, destination IP, destination port, IP protocol type, source port, and protocol.
- information extraction supported in this embodiment also includes, for example, destination MAC, source MAC, Ethernet type, VLAN ID, VLAN priority, IP service type, and key fields of the application layer.
- the characteristic information of the normal service data flow is sent to the transmission network element to form a forwarding table, a flow table or a forwarding whitelist.
- a forwarding table a flow table or a forwarding whitelist.
- it can be, for example, a MAC table, a FIB table, a flow table, a whitelist based on an ACL or a user-defined list (UDL).
- the transmission network element forwards the message based on the characteristic information of the normal service data flow
- the forwarding table entries, flow table or whitelist have been issued according to the characteristics of the normal service data flow in the aforementioned step S2, when a normal service data packet arrives at a transmission network element such as a switch, router, or gateway, the aforementioned transmission network element will forward the normal packet according to the corresponding table entry;
- routing protocol messages will automatically generate a whitelist based on the configuration files of switches and routers, and can be forwarded.
- messages include but are not limited to: routing protocols.
- some control plane related messages need to be forwarded, including but not limited to: routing protocol messages.
- the aforementioned messages can use multicast addresses, where the content of some messages includes their own protocol type, for example: the protocol type of OSPF messages is 89, and that of IGMP is 2;
- NAC opens the access control port on the access control device.
- Authenticated terminals can access servers and other terminals within the network.
- the method of the present application also differs from NAC in that it binds normal service traffic characteristics to the forwarding table, flow table, and whitelist of the transmission network element. Only normal service data flows can be forwarded, and the transmission network element cannot forward abnormal service data flows.
- the present application can isolate the host terminal from accessing unauthorized services, resources, and other terminals, thereby avoiding the existence of junk traffic and malicious traffic.
- the method for binding service data flow forwarding characteristics to transmission network element forwarding entries further includes the following specific implementation process using authentication and authorization:
- the host terminal initiates an access request to a specific server and resource
- the message will be sent by the transmission network element to the authentication and authorization server for authorization and authentication;
- abnormal service messages are not forwarded by default
- the forwarding characteristic information of the normal service data flow is automatically extracted.
- the aforementioned forwarding characteristic information includes but is not limited to: 5-tuple information, including: source IP, destination IP, destination port, IP protocol type, source port, and protocol.
- the characteristic information of the normal service data flow is sent to the transmission network element, and the control plane CPU of the transmission network element receives the characteristic information of the normal service data flow.
- the transmission network element includes but is not limited to: a switch, a router, and a gateway;
- the transmission network element generates forwarding entries and ACL whitelist
- control plane CPU of the transport network element forms a forwarding table entry, a flow table, and a forwarding whitelist for normal service data flows, which may be, for example, a MAC table, a FIB table, a flow table, a whitelist based on an ACL or a user-defined list (UDL), and sends it to the forwarding plane.
- the transmission network element forwards the service data flow that is successfully authorized.
- the transmission network element if it receives a service data flow message that is successfully authorized, it forwards the normal service message according to the forwarding table entry and the whitelist.
- the service feature data flow binding forwarding logic architecture includes but is not limited to: a host terminal module, a transmission forwarding module, a service resource module, a forwarding feature extraction module, an authentication and authorization module, and a self-learning module;
- the transmission forwarding module is connected to the host terminal module, the service resource module, and the forwarding feature extraction module, and the forwarding feature extraction module is connected to the self-learning module, the authentication and authorization module, and the transmission forwarding module;
- the forwarding feature extraction module When the host terminal module in this embodiment accesses the business resource module, the forwarding feature extraction module, with the help of the authentication and authorization module or the self-learning module, extracts the forwarding feature information of the access data flow and sends it to the transmission forwarding module for binding the flow table or forwarding table and ACL table. After that, the transmission forwarding module can forward the data packets with normal access. In this embodiment, abnormal data packets without binding table entries will not be forwarded, which can prevent the forwarding of malicious traffic and achieve the effect of isolation and protection.
- the process of a transmission network element processing a service message based on a forwarding table and an ACL includes:
- the transmission network element checks the forwarding table and the blacklist and whitelist
- the security network controller forwards the message to be forwarded to the identity authentication authorization audit server
- the identity authentication and authorization audit server authenticates and authorizes the user to access the network according to the authorization policy and sends the access policy to the security network controller;
- the security network controller adds the access policy to the whitelist and sends it to the transmission network element;
- the transmission network element generates a corresponding forwarding table entry
- the control plane processes the graylist message and determines how to handle it.
- the control plane reports the exception to the security network controller and sends the message to be forwarded to the security network controller for processing.
- the security network controller integrates various policy information to convert the gray list into specific operations.
- the specific operations include: white list, black list, deletion, etc.
- the forwarding table entries, ACLs, and flow tables of switches and routers are utilized for fine-grained access control of business flows. Encryption, authentication, authorization, or self-learning are used to ensure that only normal business data flows are sent, avoiding abnormal vertical and horizontal data flows, reducing security risks, and avoiding the consumption of large amounts of computing power and the delay impact on normal business.
- the authorized access objects include but are not limited to: servers and resources.
- the process of the green box part in the figure is not just to open the port of the access device, but to send it to the access control device based on the characteristics of the authorized access data flow, and further to form corresponding entries and whitelists in all transmission network elements along the entire path.
- the access control of the host terminal and the accessed server can be further controlled, so that the full-path, end-to-end data forwarding control is achieved, thereby forming a path for normal data flow, and other abnormal data flows have no path. Therefore, junk flow and malicious traffic cannot be forwarded in the network.
- FIG 12 in this embodiment, compared to SDN switches that support flow tables, traditional switches can use a forwarding table and an ACL table to perform forwarding control. See Figure 12, which shows the specific process of the transmission unit processing service messages based on the forwarding table and ACL.
- the host terminal initiates access to the application server and various resources.
- the processing process of the transmission network element includes but is not limited to: the transmission network element will process different situations.
- the above-mentioned processing can be carried out in different orders, checking whether the characteristics of the data message to be forwarded are in the blacklist. If it is in the blacklist, the data is directly discarded. If it is in the forwarding table item and in the forwarding whitelist, the data is forwarded.
- a forwarding table is established and forwarded.
- the security network controller can be reported to issue a forwarding table establishment instruction before forwarding the message. If the data is not in the forwarding table and is not on the blacklist or whitelist, the data is sent to the security network controller through the control plane, which forwards the message to the identity authentication and authorization audit server.
- the identity authentication and authorization audit server passes the authentication and determines that it can access the network based on the authorization policy, and then feeds it back to the security network controller.
- the security network controller adds the access policy to the whitelist and sends it to the transmission network element.
- the aforementioned transmission network element is a logical concept and may correspond to multiple.
- the security network controller has global switching and routing information, and can send whitelist policies to all relevant network elements. In this embodiment, if the authentication fails, it can be discarded. If multiple frequent authentication behaviors of the same host terminal are found, an early warning prompt can be issued. If it is found to be a malicious terminal, it can be directly added to the blacklist.
- the identity authentication authorization audit server authentication includes but is not limited to: two-way authentication, one-way authentication;
- the security network based on the service whitelist only allows clear service messages to pass through the entire network, and all unclear service messages are discarded, thereby forming a three-dimensional closed service network.
- a graylist mechanism is added for adaptability and flexibility.
- the graylist policy can be defined, and the default graylist does not forward and reports exceptions. It can also be defined as sending the graylist message to the control plane for processing, and the control plane changes the graylist into a whitelist, blacklist, or deletes it according to the corresponding policy and information.
- a graylist There are many ways to define a graylist. As shown in Table 2, a special graylist list type is directly defined, and this list type can be converted into a whitelist or a blacklist. Therefore, the scheme adopts a dynamic whitelist, dynamic blacklist and graylist mechanism. By dynamically refreshing the business whitelist, access is only allowed with authorization, and clear threat IPs and URLs are added to the blacklist and access is prohibited.
- Table 2 below adds status flags to the ACL table to distinguish between blacklist, whitelist, and graylist. Status 11 indicates whitelist, status 00 indicates blacklist, and status 10 indicates graylist.
- FIG12 defines the grey list as an entry in the forwarding table but not in the white list or the black list.
- the grey list default policy can be defined.
- the message can be forwarded to the policy management component and then connected to the business unit to confirm whether it meets the business requirements. After confirmation, it is sent to the white list and the message is forwarded. If it is incorrect, the message is discarded and sent to the black list.
- the aforementioned forwarding table includes, but is not limited to, a switch's Layer 2 forwarding table based on MAC and VLAN, a route-based Layer 3 forwarding table, and a forwarding table based on 5-tuples or even more tuples.
- the forms of blacklists, whitelists, and graylists include, but are not limited to, MAC, VLAN, IP, Port, and corresponding combinations.
- the access control policy can be such that at the end of a session, the application server or service proxy gateway notifies the policy server to delete the access control list. It can also be automatically deleted, for example, through an aging mechanism. For frequently accessed internal services, a long lifecycle policy can also be used to reduce the pressure of continuous authentication analysis and frequent entry downloads.
- access control is performed on the forwarding network element, ensuring that only messages with genuine business needs that have passed authentication and authorization can be forwarded. Unauthorized and blacklisted messages cannot pass through.
- This application can increase attack costs, reduce protection costs, and curb the formation of a black market industry.
- access to Internet content can be controlled by using an access whitelist; a content classification and security classification mechanism based on URLs and IP addresses, generated by a cloud-based threat analysis server, is used to assist in access filtering and control; and access control is performed in conjunction with other security filtering methods.
- the forwarding plane automatically deploys CP-CAR and IP+MAC+port binding to protect against address spoofing attacks and DDoS traffic attacks.
- the control plane protection against address spoofing attacks and DDoS traffic attacks includes, but is not limited to, DHCP snooping, RADIUS snooping, and IGMP snooping.
- ARP attack protection is enabled by default.
- forwarding network elements are deployed in a distributed manner, protocols such as STP, RSTP, MSTP, and ERPS can prevent loops, and the routing protocol automatically discovers the network topology and has a high self-healing ability.
- the security network controller has the forwarding information of the entire network, can perform forwarding optimization, and send the corresponding forwarding information to the corresponding network elements. Therefore, this network structure has both centralized full-network optimization capabilities and distributed self-healing capabilities, and has strong elasticity. Even if the security controller fails, distributed routing and forwarding can still be performed.
- the security network controller is preferably deployed redundantly, with dual-machine backup or even multi-machine distributed deployment to further enhance the network's elasticity.
- the method for binding service data flow forwarding characteristics to transmission network element forwarding table entries further includes the following method of binding normal service data flows to the forwarding table and whitelist through automatic learning.
- the specific implementation process of this method includes:
- the normal operation of the transmission network element automatically generates various table entries; in this embodiment, the aforementioned table entries include but are not limited to: MAC table, FIB table, ARP table;
- the above-mentioned interval can be set to, for example, 60 seconds;
- the data of each table entry is read at regular intervals and stored in a temporary table.
- This temporary table can be distributed and stored in a medium such as the memory, flash, SSD, or hard disk of the transmission network element, or can be centrally stored in a control plane server, such as a security network controller.
- the centralized storage here refers to the transmission network element.
- the control plane server can also be redundantly distributed on two or more machines.
- the aforementioned interval can be set to, for example, 60 seconds.
- the learning time is reached; in this embodiment, the learning time may be, for example, 12 hours;
- a forwarding baseline database is formed.
- the baseline database can be distributedly stored in the memory, flash, or SSD storage of the transmission network element, or centrally stored in a service, such as a security controller.
- a service such as a security controller.
- the operation of reading each entry and storing it in the temporary table is continuously performed at a certain interval.
- Different services occur at different times, and the entries usually have an aging mechanism. Therefore, the MAC table, FIB table, and ARP table obtained each time are usually different.
- the interval By repeatedly learning over a period of time, such as multiple times within 12 hours, all entries generated by normal service access can be recorded in the temporary table. It is preferable to set the interval to be less than or equal to the aging time to obtain more comprehensive entries.
- abnormal message judgment can be performed automatically in conjunction with other components or manually confirmed. If it is an abnormal service message, it is discarded and logged. If it is determined to be a newly added normal service data message, the message forwarding information is added to the baseline database, thereby updating the service baseline database.
- the determination method includes but is not limited to: automatic determination and manual confirmation;
- the automatic learning business binding method has the advantages of strong adaptability and good compatibility.
- This self-learning mode can be used in MAC authentication mode to automatically learn and generate a MAC address library, thereby generally solving the problem of registering MAC addresses and complex management, thereby enhancing the adaptability of the MAC authentication mode and avoiding the complex deployment of 802.1X.
- the above two modes disclosed in this embodiment both realize the automatic binding of normal business data flows and the forwarding table entries and whitelists of transmission network elements, thereby realizing endogenous security and automation.
- the method of preventing unknown attacks has always been difficult.
- this application is automatically bound and deployed with normal business. Therefore, abnormal data flows are difficult to penetrate the network, which improves the basic security protection level and reduces security operation and maintenance costs.
- the endogenous security network architecture includes: n host terminals, n transmission network elements, n servers, and a security network controller.
- the host terminals are connected to the transmission network elements, which are connected to the servers.
- the transmission network elements are connected to the security network controller, and the transmission network elements forward normal service packets, discard abnormal service packets, and generate alarms.
- the transmission network elements include: Ethernet transmission network elements and IP transmission network elements.
- access control functions and sampling, statistics and other functions are integrated into the transmission network element.
- the IP network is evolved from a completely open network to a business-based elastic, dynamic closed network, forming a three-dimensional defense, thereby ensuring the inherent security of the network. Even if there are some unknown vulnerabilities inside, they are difficult to exploit.
- This application also integrates traditional distributed path calculation with forwarding and software-defined network functions, combining distributed high survivability with centralized optimization control. By integrating the traditional distributed path calculation and security control network architecture with the centralized path calculation and security control network architecture of SDN, the elasticity of network robustness is improved.
- the transmission network element deployed in the enterprise network is a non-open forwarding table.
- the entire network is not divided into different trust domains. Instead, a forwarding table entry or a control list is generated according to the actual business data flow. Only the actual business data flow can be forwarded.
- the first data flow 101 is the actual business flow, and there are forwarding table entries on the Ethernet/IP transmission network element A1 and the Ethernet/IP transmission network element B1; and because the abnormal business data flow has no corresponding forwarding table entry, in this embodiment, the second data flow 102, the third data flow 103, the fourth data flow 104, the fifth data flow 105, and the sixth data flow 106 are abnormal business data flows and do not exist, thereby eliminating the generation and forwarding of junk traffic and malicious traffic.
- the entire network is divided end-to-end into a management plane, a control plane, and a forwarding plane. These three planes are isolated from each other, particularly to limit data impact on the forwarding plane.
- Traditional solutions lack a strict three-dimensional separation, which can easily lead to risk proliferation.
- the main terminals, servers, data assets, storage devices, and other components are incorporated into the overall management of the secure network as part of the network services.
- the logical components of the network architecture include, but are not limited to: host terminals, transmission network elements, application servers, various resource security network controllers, policy servers, identity authentication and authorization audit servers, network management switches, servers, and log sampling and threat analysis servers. All network elements include encryption and authentication units. Encryption ensures the confidentiality of information and the accuracy and integrity of authentication information, while authentication ensures the legitimacy of identity. Authentication precedes authorization.
- management switch referring to the management switch, management server, and management units of each end-to-end component in FIG16 , they are located in the management plane.
- the management server will configure the devices with management units in the network accordingly. To ensure security, two-way authentication is required between each network element by default.
- the management switch and management server can access the management units of each network element through preset usernames, passwords, digital certificates, etc., and perform mutual authentication. Communication on the management plane can only be carried out after mutual authentication. It is best for the application server and the management units and control units of various data resources to communicate with the rest of the management and control plane components through independent interfaces;
- the forwarding plane includes but is not limited to: the business unit of the host terminal, the business units of the application server and various data resources, and the forwarding unit of the forwarding network element.
- the forwarding unit serves as the execution point of the security forwarding policy, including but not limited to: message forwarding, ACL, statistics, sampling, and logging to support forwarding control, log auditing, threat analysis and other functions.
- Log retention facilitates tracing and accountability, and data statistical sampling facilitates threat analysis and attack detection, as well as rapid response.
- the distributed sampling and logging functions built into the transmission network element are adopted. Compared with the existing solutions in which probes are deployed separately, this has the advantages of wide distribution and no need for separate deployment.
- the sampled data coverage is more comprehensive, which is more conducive to data analysis.
- control plane includes but is not limited to: a secure network controller, a policy server, an identity management authorization server, and a log sampling and analysis server.
- the devices that need to communicate with each other on the control plane also undergo two-way authentication. Control plane communication can only be carried out after authentication is passed. In order to improve compatibility, non-authentication mode is also supported. In order to improve security, authentication is supported by default. Protocol messages, multicast and unknown unicast messages have blacklists, whitelists and speed limit measures, and are sent to the secure network controller only after security review by the transmission network element.
- the secure network controller finds the transmission network element related to the optimal path through centralized path calculation, and sends the forwarding table entries to the forwarding unit through the control unit and the policy sending unit to realize the forwarding of normal service data flow.
- the transmission network element also includes: a control protocol unit and a distributed path calculation unit, which can collect network topology and perform distributed path calculation.
- a control protocol unit When centralized control cannot be performed due to a security network controller failure or a link failure, the transmission network element can perform distributed path calculation and forwarding, using a customized default policy. Each forwarding network element performs access control for unknown traffic based on the customized default policy.
- the transmission network element also includes: ML and AI units that can learn to form a forwarding baseline, thereby forwarding normal business traffic.
- the aforementioned management unit and control unit can exist in the form of software, for example; for example, the control unit of the host terminal can control the software installed on the local machine, only allow software on the white list to be installed or only allow software on the white list to communicate externally, review the peripherals connected to the host terminal and report data checks, etc.
- the control unit and management unit of the host terminal usually interact with the management plane server and relevant components of the control plane through in-band communication, and the control unit of the host terminal is included in the security network controller for control. Only the service port opened by the host terminal is allowed to be accessed by other devices, and access to the network is allowed only after complying with the necessary specifications and installing the necessary patches, etc. Similarly, application servers and various data resources can be controlled accordingly.
- the transport network element is a mandatory logical component of the logical architecture. Its form can be adapted to different scenarios. For example, in some small enterprises, the security network controller, policy server, and identity association authorization and audit server can be deployed on a single server. In large enterprises, identity authentication, authorization, and audit can be deployed on different servers. To improve reliability, the security network controller can also be deployed in dual-server backup or even in a distributed deployment. Application servers and various resources typically have a management network port, which can be connected to a network management switch for management, or to a server management platform for management.
- a transmission network element in a secure network architecture also includes: switches and routers.
- the aforementioned transmission network elements no longer only provide open forwarding capabilities, but participate in service-level access control, associating normal service access with the transmission network element's forwarding table or whitelist, and only authorized access is allowed to be forwarded.
- the network includes but is not limited to: access switches, aggregation switches, core switches, DC switches, and routing gateways; in this embodiment, the transmission units in the forwarding plane constitute the basic network, in which the business class devices include but are not limited to: internal application servers, cloud business servers, and host terminals; the network control plane includes but is not limited to: security network controllers, policy servers, sampling, log analysis servers, LDAP servers, DNS servers, local threat analysis servers, and cloud threat intelligence servers; in this embodiment, the management plane of the network includes but is not limited to: management switches and network management servers.
- the network is deployed and isolated based on the management plane, control plane, and forwarding plane.
- the management plane uses the management interface, the management port connected to the CPU.
- Switches and routers have one or two Ethernet management ports directly connected to the CPU.
- a management switch is used to link the management ports of all service switches to the management switch, forming a single management plane.
- the switch's management and service ports are isolated by default, and service port messages cannot be sent to the management port.
- switches also have console ports, which can be linked to the service switch's console ports using a serial port server/management switch. This allows for deeper management of switches and routers and enables appropriate intervention and management during the startup process. This allows the management plane to be hidden within the network, preventing messages from the external forwarding plane from entering the management plane, thereby achieving three-sided isolation for security reasons.
- access switches include but are not limited to: wireless AP-type access devices; DC switches include but are not limited to: data center switches, TOP switches, aggregation switches, core switches, and spine-leaf structures; in this embodiment, LDAP server is used for identity management and authorization functions.
- control plane of the network, terminal, cloud, and service includes, but is not limited to, controllers related to connection and forwarding control of the network, terminal, cloud, and service, servers, security network controllers, terminal controllers, policy servers, LDAP servers, sampling statistics log servers, and threat analysis servers.
- the terminal controller and the security network controller can be integrated into one, and a unified controller can be used.
- the centralized routing calculation module of the security network controller can select an optimized path based on the implementation traffic situation, and can determine the transmission network element through which the data flow is to pass based on the optimized path.
- the policy server includes, but is not limited to, a policy engine unit and a policy management unit
- the LDAP server includes, but is not limited to, identity authentication management and authorization functions.
- control plane messages of the switch itself are processed by the CPU, and the control plane and forwarding plane can be logically isolated.
- the connection and communication between the switch, router, etc. and the network controller use dedicated interfaces and automatically configure forwarding tables and ACLs.
- Non-transmission unit IP addresses cannot access the controller.
- the traffic of the forwarding plane will not impact the communication between the switching, routing and other network elements and the controller.
- it can also be transmitted in-band, through encrypted transmission and ACL control to achieve relative isolation.
- Control messages such as routing protocols are transmitted between transmission network elements, usually in-band. In order to improve security, it is necessary to automatically generate ACLs for protection. According to the configured protocol type and peer address, an ACL whitelist based on the protocol and peer address can be automatically generated.
- encryption, authentication, authorization, logging and other technologies are used to ensure the authenticity and traceability of the business, and the key characteristics of the real business data traffic are associated with the forwarding table items or access control lists or flow tables of the transmission network elements, so as to ensure that only normal business messages are forwarded.
- the main terminal 1 sends an access authentication request message for the service.
- This message passes through the access switch or wireless AP.
- the secure network controller can be, for example, a controller in an SDN network or a traditional network manager.
- the controller then sends the user authentication message to the policy server for access policy query.
- the policy server obtains the user's username and password and sends an administrator bind request message to the LDAP server using the administrator DN and password as parameters to obtain query permission.
- the user DN obtained from the query can be one and/or at least two.
- the policy server sends a user bind request message to the LDAP server based on the user DN obtained from the query and the password entered by the user. After receiving the user bind request message, the LDAP server checks whether the password entered by the user is correct.
- the LDAP server sends a bind response message to the policy server indicating that the binding is successful. If the password entered by the user is incorrect, the LDAP server sends a bind failure response message to the policy server.
- the policy server uses the next user DN found in the query as a parameter and continues to send binding requests to the LDAP server until one DN is successfully bound; if all user DNs fail to bind, the policy server notifies the user of the authentication and authorization failure through the security network controller; if the policy server receives information that the LDAP server has successfully authorized, it performs a DNS query on the authorized service.
- the policy server checks other relevant policies, including compliance review of the host client, compliance of the accessed application server, and whether it is Internet access; if it is Internet access, it will query the accessed URL and remote IP for infection risks. If the address is included in the risk blacklist, access is not allowed. If the security review is passed, access is allowed; after the policy check is passed, the authorization pass information is sent to the security network controller.
- the authorization pass information includes but is not limited to: host terminal IP address, business server IP address, protocol type, and protocol port number information.
- the security network controller uses the reply information from the policy server and the network topology database to calculate the transmission unit passed through the forwarding path and generate the table entry corresponding to the transmission unit.
- the transmission unit includes but is not limited to: flow table, forwarding table, and ACL.
- the matching items of the flow table are shown in Table 3 below:
- the security network controller sends corresponding table entries to switches, routers, and other transmission network elements at all levels.
- Typical forwarding table entries are shown in Table 4 below, forming a forwarding path for this authorized data flow on the forwarding plane:
- the accessible ACL is sent to the corresponding service server, the server opens the access restriction, and an authorization success message is sent to the host terminal 1, and the host terminal 1 opens the access control.
- the host terminal 1 accesses the authorized services normally.
- transmission network elements such as switches and routers at all levels continuously perform logging, sampling, and analysis operations.
- the default policy is executed, which is usually discarded and the event is reported to the log server for analysis and audit. All access information is logged for easy tracing.
- black, white, and gray list control is implemented on transmission network elements such as switches and routers to control service data flows.
- data transmission network elements such as switches, routers, and gateways not only perform forwarding functions, but should also have more unit modules when implemented.
- the transmission network elements include but are not limited to: forwarding unit, access control unit, statistics unit, sampling unit, log unit, encryption unit, control protocol unit, policy execution unit, authentication unit, sending and receiving unit, ML AI unit, and security unit.
- Some of the functions of the security unit are implemented in the forwarding engine, and some are implemented on the CPU.
- the ML AI unit can perform intelligent statistical analysis and processing based on some information. The description of each module is as follows:
- Encryption unit Provides encryption functions for authentication, control information, and forwarded messages. It can be implemented in hardware form, such as ASIC or FPGA, or in software plus CPU form.
- the CPU can support commercial encryption algorithms including but not limited to AES, DES, RSA, SM2, SM3, and SM4.
- An encryption unit is provided in the forwarding module to support the MacSec function.
- This unit authenticates the device's identity and authenticates the management server, security network manager, authentication and authorization server, security policy server, log, sampling, and threat analysis servers.
- authentication can be performed using, for example, a username and password.
- Using a certificate system can provide higher security, such as Kerberos-based authentication. Kerberos uses TCP/UDP port 88 for authentication and TCP/UDP port 464 for password resets. Ports 88 and 464 must be open on the transmission network element and related servers.
- Management unit used to manage the transmission network element.
- Supported management protocols include but are not limited to: SSH, telnet, Https, SNMP, and use a dedicated management interface.
- Figure 18 shows the eth0-0-1 port connected to the CPU. This management port is isolated from the control plane network port and the forwarding plane and does not communicate with each other, thereby isolating the security risk transmission of the forwarding plane and the control plane.
- the management server needs to first authenticate with the management unit of the transmission network element. After the authentication is passed, a connection is established and an access control list is automatically generated.
- the IP address of the management server in the figure is 10.0.0.1, so after the authentication is passed, the following ACL table entry is associated and established: 10 permit src-ip host 10.0.0.1 dest-ip 10.0.0.2; 20 permit src-ip host 10.0.0.2 dest-ip 10.0.0.1; 30 deny src-ip any dest-ip any;
- the ACL automatically adjusts to: 10 permit src-ip any dest-ip 10.0.0.2; 20 permit src-ip host 10.0.0.2 dest-ip any; 30 deny src-ip any dest-ip any;
- a new management connection and authentication of the 10.0.0.0/24 network segment may be received.
- Forwarding unit can forward or discard data packets based on MAC table, ARP table, FIB table, and flow table.
- the MAC table has the following format:
- the ARP table is in the following format:
- the IP routing table is in the following format: Codes:C-connected,S-static,R-RIP, O-OSPF, I-IS-IS, B-BGP, P-PIM, >-selected route,*-FIB route, [*]-[AD/Metric] C>*10.0.2.0/24is directly connected,vlan1 C>*10.0.0.2/32is directly connected,loopback0 C>*0 10..1.0/24is directly connected,,eth0-0-2
- the structure of the flow table is as follows:
- Match Field is used to match messages and consists of the ingress port and message header.
- Priority field For flow tables with the same priority, the message will be matched with the flow table entry that is delivered first.
- the value range is 0-65535, and the default value is 32768.
- Counters flow table statistics field recording the count of packets matching the flow table.
- Instruction field supports immediate execution of apply-actions.
- Timeout supports hard_timeout and idle_timeout.
- Hard_timeout indicates the fixed lifetime of the flow table, which will be automatically deleted upon expiration.
- Idle_timeout indicates the aging time of the flow table, which will be refreshed if a message matches.
- the Cookie field is mainly used by the controller to filter the flow table, such as cookie to modify/delete an existing flow table.
- the available matching items of the flow table are shown in Table 3 above, and the typical flow table format is shown in Table 4 above.
- the Action field supports many types, as shown in Table 6 below. Commonly used are OUTPUT, Drop, and Normal. OUTPUT indicates the outbound interface, Drop indicates discarding, and Normal indicates the traditional forwarding process, that is, forwarding based on the MAC table, ARP table, and FIB table.
- the host terminal accesses the service server. After authentication is passed, the security network controller sends the following flow table to the transmission network element:
- Packets that match the flow table are forwarded according to the flow table. For example, there is a data flow with a source address of 10.0.2.10 and a destination address of 10.0.2.6. Since no flow table is matched, the packet is sent to the control plane process. It is first rate-limited and then forwarded to the security network controller for authentication and identification. If the authentication fails, the packet is discarded and the following flow table is issued:
- the access control unit generates a dynamic whitelist, a dynamic blacklist, and a dynamic graylist.
- Methods for generating these lists include, but are not limited to, issuing them from a secure network controller or generating them by a machine learning or artificial intelligence learning unit.
- the forwarding unit, statistics unit, sampling unit, and access control unit may be implemented separately or in combination.
- Each ACE includes an action element (allow or deny) and a series of standard-based filtering elements, such as source address, destination address, protocol, and specific protocol parameters.
- Layer 2 reference elements include MAC-SA, MAC-DA, and other Layer 2 fields for filtering packets, such as COS, VLAN-ID, INNER-COS, INNER-VLAN-ID, and L2 type.
- Layer 3 reference elements include IP-SA, IP-DA, and other Layer 3 fields for filtering packets, such as DSCP, L4 Protocol field, and other fields (TCP port, UDP port, etc.).
- MAC ACL can filter packets based on MAC-SA and MAC-DA. MAC addresses can be configured with masks or configured as host MAC. MAC ACL can also filter packets based on other Layer 2 fields.
- examples include COS, VLAN ID, INNER-COS, INNER-VLAN ID, and L2 type.
- IP ACL IP ACLs can filter packets based on IP-SA and IP-DA. IP addresses can be configured with masks or host IP addresses. IP ACLs can also filter packets based on other Layer 3 fields, such as DSCP, L4 Protocol, and other fields (TCP port, UDP port, etc.).
- Time period defines a time period or time cycle during which the ACE is valid; outside this time period or cycle, the ACE is invalid.
- the forwarding unit with flow table function gives priority to using flow table forwarding, and the forwarding of data packets from the host terminal to the server can be completed according to Table 7 and Table 5 if there is no flow table function, while the remaining non-business packets are discarded.
- CoPP is automatically configured.
- the forwarding plane limits the rate of packets sent to the control plane.
- CoPP ACLs process packets based on the CPU exceptions associated with the packets. Supported exceptions include: any, ipda, fwd-to-cpu, slow-protocol, bpdu, erps, eapol, smart-link, dhcp, rip, ospf, pim, bgp, vrrp, ldp, ptp, rsvp, icmp-redirect, mcast-rpf-fail, macsamismatch, vlan-security-discard, port-security-discard, ip-option, udld, dot1x-macbypass, 12protocol-tunnel, arp, igmp, ssh, mlag, and telnet.
- CoPP only limits or filters packets
- the activation status of the control plane protocol can be determined based on the configuration of the transmission network element.
- the protocol packets that are not enabled can be further discarded. For example, if ospf is not enabled, the IP packet with protocol number 89 can be configured with a corresponding ACL to be discarded.
- the enabled protocol packets can be limited in the upload rate after learning.
- Statistics can be collected based on port, VLAN, IP, and quintuple data, including packet pps, bps, packet loss, and latency. In this embodiment, these statistics can be used as input for the ML AI unit for analysis and learning.
- Sampling unit It can sample and send the sampled data to the corresponding server based on SNMP, CLI, Syslog, NetStream, sFlow, and IPFIX.
- the sampled data information can be used as learning input information for the ML AI unit for analysis and learning.
- the CTC7132 chip has a Flow Tracing engine that can support, for example, sFlow and IPFIX flow sampling.
- sFlow is a technology for monitoring the traffic entering the device. It is applied on the monitoring device, samples at a certain rate through a sampling mechanism, and then sends the sampled information to the monitoring server. The traffic status of multiple agents can be viewed on the server.
- Sflow has two types of sampling information: one is the statistical information of the port, and the other is the header of the sampled message.
- the SFLOW Flow-sampling field supports, for example: Raw packet Header: intercepting all or part of the original message header; Ethernet Frame Data: for Ethernet messages, parsing the Ethernet header information of the message; IPV4 Data: for IPV4 messages, parsing the IPV4 header information of the message; Extended Router Data: for routed forwarded messages, recording the route forwarding information of the message; Extended Switch Data: for Ethernet messages forwarded at Layer 2, recording the VLAN conversion of the message and the conversion of the VLAN priority.
- the SFLOW Counter-sampling field supports: Generic Interface Counters: general interface statistics, including basic interface information and general interface traffic statistics; Ethernet Interface Counters: for Ethernet interfaces, used to count Ethernet-related traffic statistics;
- Processor Information Used to collect statistics on device CPU usage and memory usage. sFlow uses the UDP protocol for data transmission, with the default destination port being 6343. This can be configured to a different port for improved security. By combining these sampling methods and sending the sampled information to the collector, a data flow-based information database can be formed, facilitating machine learning and analysis.
- the transmission network element can view the following sFlow information: sFlow Version:5 sFlow Global Information: Agent IPv4 address:10.0.1.8 Counter Sampling Interval:15 seconds Collector 1: IPv4 Address:10.0.1.5 Port:6342 sFlow Port Information:
- the above configuration can enable sFlow on the eth1-1-1 port connected to the host terminal and the eth1-1-2 port connected to the service server, and send the sampled information to the sampling server 10.0.1.5 through the 6342 port of the UDP protocol.
- Log unit records information such as forwarding table entries and control table entries, message protocol types and quantities, and forms a log, which is then sent to the log server.
- control table entries include but are not limited to: separate control table entries and unified control table entries.
- ML AI unit used to analyze and learn the protocol data of the control plane, the management data of the management plane, the table items, sampling, and statistical data of the forwarding plane, and form relevant strategies for execution or reporting to the upper-level control entity.
- This unit is an optional function for transmission network elements and can be learned on a remote server.
- Control protocol unit The unit that processes the inherent Layer 2, Layer 3, and application layer protocols of the transmission network element.
- control protocols such as STP, RSTP, MSTP, RIP, OSPF, BGP, and IGMP used for topology information collection, identification, and presentation, and network application processing such as DHCP, DNS, 802.1X, and AAA.
- Distributed path calculation unit performs distributed path calculation. Traditional routers use distributed routing calculation, and the network survivability is relatively high. Since the path information does not take into account the usage status of the link, the selected path is often not optimal.
- the centralized path calculation method based on the security network controller can calculate a better path and can perform path optimization and adjustment. This technical solution combines the two. When the centralized path calculation fails, the path calculation can be performed independently, which can improve network resilience.
- Policy execution unit executes the relevant policies issued by the network control unit and security control unit and sends them to the forwarding unit and access control unit.
- Transmitter and receiver units These transmit and receive functions communicate with other devices on the management and control planes. Control plane messages pass through dedicated interfaces.
- Figure 18 shows eth0-0-2 used to establish a connection with the security network controller after authentication. The protocols used can be SNMP, Netconf, OpenFlow, and others. Once the connection is established, the following ACL is automatically generated: 10 permit src-ip host 10.0.1.1 dest-ip 10.0.1.8 20 permit src-ip host 10.0.1.8 dest-ip 10.0.1.1 30 deny src-ip any dest-ip any
- a security controller connection and authentication may be received on the 10.0.1.0/24 network segment.
- the policy execution unit, forwarding unit, and access control unit collaborate to execute the authentication and authorization-based forwarding policy issued by the security network controller.
- the self-learning unit records and compiles forwarding entries over a period of time based on a normal service baseline, forming a historical record baseline. If data that exceeds this baseline requires forwarding, an alarm is generated, initiating the authentication and authorization process.
- This unit acts as the security policy server to interact with other devices in the endogenous security network and is connected to the rest of the internal modules.
- Management unit This unit is connected to the sending and receiving unit. The function of this unit is similar to the management unit of the transmission network element. It also establishes a connection with the management server after passing the authentication.
- Authentication and authorization proxy unit This unit is connected to the sending and receiving unit. On the one hand, the function of this unit is to perform self-identity authentication between other devices in the endogenous security network. On the other hand, it connects the security network controller and the authentication and authorization server, and acts as an authentication and authorization agent for the complete network controller, thereby providing a basis for forwarding message feature extraction.
- DNS query unit This unit is connected to the authentication and authorization proxy unit, the forwarding feature extraction unit, and the sending and receiving unit. After the authentication is passed, the domain name information of the authorized domain name is usually returned. The domain name information needs to be converted into IP and port number information. This unit provides this function as the basis for forwarding feature extraction. If the authentication and authorization proxy unit returns the IP address and port number of the accessible business server, there is no need to perform a DNS query and this unit can be directly bypassed.
- This unit is connected to the security policy generation unit, the sending and receiving unit, the DNS unit, the sampling analysis learning unit, the forwarding table learning unit, and the statistical analysis learning unit.
- the function of this unit is to extract the IP source address, IP destination address, protocol number, destination port number, and source port number information between authenticated access connections for use by the security policy generation unit.
- Forwarding Table Learning Unit This unit is connected to the sending and receiving unit and the forwarding feature extraction unit. It continuously reads forwarding table entries from the transmission network element and generates temporary table entries. Table entries include but are not limited to: MAC table, ARP table, FIB table, and flow table. The format is described in Figure 18.
- Sampling, Analysis, and Learning Unit This unit connects to the sending and receiving units and the forwarding feature extraction unit. It reads data from the collection and collection units, performs data analysis, and extracts forwarding data features from the sampled data for use by the forwarding feature extraction unit.
- IPFIX sampling is based on the concept of "flows."
- a flow is a packet originating from the same sub-interface with the same source and destination IP addresses, protocol type, source and destination protocol port numbers, and ToS, typically a 5-tuple. IPFIX records statistics for this flow, including timestamp, number of packets, and total byte count.
- IPFIX primarily consists of three devices: Exporter, Collector, and Analyzer.
- the relationship between these three devices is as follows: Exporter analyzes and processes network flows, extracts qualified flow statistics, and outputs these statistics to Collector.
- Collector parses Exporter data packets and collects the statistics into a database for analysis by Analyzer. Analyzer extracts the statistics from Collector for subsequent processing, providing a basis for various services.
- the Sampling, Analysis, and Learning Unit acts as an analyzer, extracting characteristics of the data flows forwarded by transmission network elements over a period of time and sending them to the forwarding feature extraction unit for use.
- This unit is connected to the sending and receiving unit and the forwarding feature extraction unit. It receives statistical information on convection, port, CPU utilization, etc. provided by transmission network elements and collectors, uses machine learning methods to monitor traffic conditions, and can generate corresponding rules for use by the security policy generation unit.
- the remaining security policy input units are connected to the sending and receiving units and the security policy generation unit. They receive threat information and other server information provided by the local threat analysis server and the cloud security threat analysis server, and sort out their features into the form of, for example, 5-tuples and 7-tuples, and provide them to the security policy generation unit for use.
- This unit is connected to the forwarding feature extraction unit, other security policy input units, the sending and receiving unit, and the security policy management unit. This unit integrates the input information of the aforementioned related units and generates a security policy, which is then output to the security policy management unit.
- Security policy management unit This unit is connected to the security policy generation unit and the sending and receiving unit. This unit is mainly responsible for maintaining the security policy library, optimizing the rule set, and issuing security policies.
- the self-learning method of this embodiment establishes a whitelist rule table for normal service data flows and distributes it to the flow table, forwarding table, and ACL table of the transmission network element.
- the forwarding table entry learning unit continuously reads forwarding table entries, ACLs, and flow tables at regular intervals (e.g., 60 seconds) during the learning period to form a temporary database of table entries.
- the statistical analysis learning unit continuously reads and preprocesses statistical data to form a statistical database.
- the sampling, analysis, and learning unit reads flow sampling data in real time, performs preprocessing to form flow data, and then queries whether the flow data rules are in the flow table. If so, it returns to the step of reading the flow sampling data. If not, it queries whether it is in the ACL.
- the security policy generation unit determines whether to add to the whitelist rule table based on the health status of the port bandwidth, CPU, and memory usage provided by the statistical analysis and learning unit. If the health status is good, the new rule is added to the whitelist rule table. If the port bandwidth, CPU, or memory usage exceeds the health threshold, an alarm is issued and the process stops.
- the security policy management unit optimizes the whitelist rule set generated by the security policy generation unit.
- the unit is responsible for issuing the security policy to the security policy execution unit of the transmission network element through the security network controller.
- the self-learning algorithm based on the access path of the source host and the destination host includes but is not limited to the following logic:
- the function r[count] represents the number of visits to the source host and the destination host, which also corresponds to the number of times the transmission network element receives the corresponding message.
- the threshold value is set by the network administrator based on the actual data pattern in the recorded processing method-level network. After a period of machine learning, the data statistically generated by machine learning can also be used as the threshold value.
- a service baseline is established by using methods such as automatic learning or artificial intelligence, and a forwarding table or flow table and an access control list are formed in the transmission network element to ensure that only normal service data packets are forwarded.
- a secure network architecture also includes: a management plane, a control plane, and a service forwarding plane.
- the management plane, the control plane, and the service forwarding plane are isolated from each other to achieve risk isolation and ensure that attacks and risks on the service forwarding plane do not spread to the control plane and the management plane.
- a dynamic graylist mechanism can be used for unknown traffic access, and the forwarding network element transmits it to the security controller and authentication and authorization system through the management control channel for authentication or through manual confirmation or automatic security review. If it passes, it is placed in the whitelist; if it fails, it is discarded by default and notified to relevant platforms such as threat analysis; how to handle graylist traffic can be customized. If the authentication fails, according to the macro security policy, it can be prohibited, an alarm can be issued, or it can be temporarily forwarded and included in the monitoring. In this embodiment, a dynamic blacklist can be added, etc. When the security policy, authentication, and authorization server are unavailable, a customized default policy is adopted. Each forwarding network element performs access control for unknown traffic based on the customized default policy, or adopts distributed automatic learning and AI statistics.
- transmission network element statistics are used for reporting operations, including but not limited to statistics and sampling, to collaborate with relevant servers for threat analysis, attack detection, and response. Based on the latest threat analysis results, access control lists are issued to isolate risks. In this embodiment, isolation is based on security enhancements required for network deployment, implementation, and management, with the goal of preventing the cross-plane spread of risks.
- all communication information-related resources are included in the overall management of the secure network as part of the network service. Only the normally open service ports of servers and terminals are open to access, and access to non-open ports is prohibited. Access control can be based on ACLs and flow tables on transmission network elements, or on units with strong forwarding processing capabilities such as smart network cards and data processing units.
- communication information-related resources include but are not limited to: main terminals, servers, storage devices, and data assets.
- an attack detection mechanism based on a business processing unit/program is set in the software of the host terminal and the server.
- the business unit/program receives an abnormal message during normal communication, the abnormal message is forwarded to the local control unit for processing.
- the local control unit extracts the characteristics of the abnormal message.
- the characteristics of the abnormal message include but are not limited to: source IP, source MAC, protocol type and source port, and reports the characteristic information to the corresponding device of the control plane, which issues a blocking strategy and notifies the relevant analysis and processing unit to start analysis and processing.
- the process of reporting abnormal service unit messages of the host terminal and the application server includes the following specific steps:
- the business unit opens the port to establish a normal session
- S102' The service unit receives a message of an abnormal session
- control unit extracts abnormal message features, source IP, source MAC, protocol type, source port and other information;
- control unit reports the characteristic information to the security network controller, which issues a blocking strategy and notifies the relevant analysis unit to process;
- detection enhancement is performed, and a host terminal and application server attack detection mechanism based on a service processing unit/program is designed.
- a service unit/program receives an abnormal message during normal communication, the abnormal message is forwarded to the local control unit for processing.
- the local control unit extracts the characteristics of the abnormal message and reports the characteristic information to the corresponding device on the control plane, such as the security network controller, which issues a blocking policy and notifies the relevant analysis and processing unit to initiate analysis and processing.
- the report to the security network controller can be based on the pre-configured IP address of the other end (usually mutual authentication is done) or a specific multicast address.
- the advantage of using a multicast address is that multiple devices can receive the information and start processing synchronously.
- the characteristics of the abnormal message include, but are not limited to: source IP, source MAC, protocol type, and source port.
- the TCP port or UDP port used for normal business can detect abnormal messages and attacks, report them for processing, and automatically issue a forwarding blacklist, thereby further enhancing the inherent security of the network. It has very good application value in industrial scenarios, autonomous driving and other scenarios that attach great importance to security.
- the abnormal message acquisition method includes but is not limited to: message sequence number, source port number, source IP address, etc., and refer to the following Table 4:
- a MAC restriction solution can be used to facilitate transitional deployment.
- the MAC addresses of the enterprise's host terminals, servers, etc. are input into the enterprise's MAC address library through camera scanning or manual input, and stored in the network controller or authentication server.
- the switch has ASIC and CPU, and can perform hardware MAC learning based on ASIC or software MAC learning based on CPU; referring to Figure 22b, which shows the process of hardware MAC learning, and referring to Figure 22c, which shows the process of CPU software MAC learning.
- the function of address library verification is added to the flowchart of CPU software learning, and MAC learning is configured as a soft learning solution (sent to CPU for learning).
- MAC address database can also be stored/cached within the switch's control layer for verification. See Figure 22d. To improve learning speed, hardware learning can be used at startup to form a forwarding table.
- the MAC table is sent to the CPU for soft learning.
- the MAC table entry is then checked against the company's MAC address database. If not, the packet is discarded, the entry is not added, and an alarm is generated. If the MAC address is manually confirmed to be the company's device, it can be added to the company's address database. If it is confirmed to be a non-company device, it can be added to a blacklist, prohibiting packet forwarding, further improving security. This prevents access by non-company devices.
- Figures 22a, 22b, 22c, and 22d illustrate the formation and use of the company's MAC address database, with Figure A demonstrating the use of a distributed MAC address database. In small and medium-sized enterprises, there are few IT operation and maintenance personnel and the IT system is not well-developed. This solution can improve network security while reducing the complexity and difficulty of operation and maintenance.
- switches and routers store learned MAC and IP table entries, or flow tables and ACL rule tables. This storage operation is performed every 10 minutes.
- the cached MAC and IP table entries, flow tables, and ACL rule tables are quickly retrieved and distributed to the forwarding plane, enabling rapid service recovery.
- the control layer then refreshes the cached MAC and IP table entries. This further enhances network resiliency. Rapid communication restoration is a crucial requirement in networks such as military vehicles, ships, and unmanned equipment, ensuring the survivability of both the equipment itself and its personnel. This feature meets these requirements.
- the automatic learning service binding method adopted in this application has the advantages of strong adaptability and good compatibility.
- the disadvantage is that when adding a new service, either learning or reconfirmation is required.
- This self-learning mode can be used in MAC authentication mode to automatically learn and generate a MAC address database, thereby solving the problem of registering MAC addresses and complex management, thereby enhancing the adaptability of MAC authentication mode and avoiding the complex deployment of 802.1X.
- a device for binding service data flow forwarding characteristics to transmission network element forwarding table entries comprising:
- a computer execution program wherein the computer execution program is set in the memory, and the computer execution program is executed by the processor.
- the processor executes the computer execution program, the method for binding the service data flow forwarding characteristics to the transmission network element forwarding table items as described in the aforementioned embodiment 1 is implemented.
- the device for binding service data flow forwarding characteristics to transmission network element forwarding entries is a computer-readable storage medium including a memory, a processor, a communication interface, and a bus.
- the aforementioned memory may include a large-capacity memory for data or instructions.
- the memory may include: an HDD, a floppy disk drive, a flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a universal serial bus (USB) drive, or a combination of two or more of these.
- the memory may include a removable or non-removable and/or fixed computer program stored in a computer-readable storage medium.
- the memory may be in a forwarding table entry for a type of service data flow forwarding feature binding transmission network element;
- the aforementioned memory may be, for example, a non-volatile solid-state memory.
- the aforementioned memory includes a read-only memory (ROM).
- the ROM may be, for example, a mask-programmable ROM, a programmable ROM (PROM), an erasable PROM (EPROM), an electrically erasable PROM (EEPROM), an electrically rewritable ROM (EAROM), or a flash memory, or a combination of two or more of these.
- the processor may include a central processing unit (CPU) or an application specific integrated circuit (ASIC).
- CPU central processing unit
- ASIC application specific integrated circuit
- it may be configured to implement one and/or multiple integrated circuits of the embodiments of the present application.
- the communication interface is mainly used to realize the communication between the modules and units in the embodiments of the present application.
- the memory, the processor and the communication interface are connected via the bus and communicate with each other.
- the aforementioned memory is used to store program code.
- the aforementioned processor reads the executable program code stored in the memory to run the program corresponding to the executable program code to implement the endogenous security network method.
- the method for binding service data flow forwarding characteristics to transmission network element forwarding table entries includes but is not limited to steps S1 to S4 in the above-mentioned embodiment.
- this application is suitable for large and medium-sized enterprises with corresponding IT management personnel to deploy the automatic binding mode of authentication and authorization business data flow.
- This application adopts two modes, both of which realize the automatic binding of normal business data flow and the forwarding table items and whitelists of transmission network elements, thereby realizing endogenous security and automation. There is no need for external equipment and separate deployment of security policies as before, which increases procurement costs and operation and maintenance costs. In addition, the method of preventing unknown attacks has always been difficult. This application is automatically bound and deployed with normal business. Therefore, abnormal data flows are difficult to penetrate the network, which improves the basic security protection level and greatly reduces the security operation and maintenance costs.
- This application provides business security capabilities based on the routing and switching architecture platform, without the need for various complex hardware platforms;
- Secure configuration is automatically generated and issued based on normal business operations, thus reducing configuration workload, ease of use, and maintenance costs.
- Automated associated deployment reduces reliance on delivery, deployment, operations, and maintenance personnel, thereby reducing deployment costs.
- This application solves the technical problem that due to the openness of IP networks, their own security protection capabilities are low, a large number of external security protection facilities are required, the effect is poor and the cost is high, it is difficult to form low-cost security protection capabilities, and it is easy to attack but difficult to defend.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本申请涉及通信网络安全技术领域,具体涉及内生安全网络方法、架构、介质及设备。The present application relates to the field of communication network technology, and specifically to endogenous security network methods, architectures, media and equipment.
如图1所示,现有技术中基于IP/TCP的网络通信系统通常由交换机、路由器、网关、终端、服务器组成,相互之间具有开放的可达性,这就导致存在数据信息泄露、完整性、可用性、网络可用性的风险,为了解决这种安全风险,通常的安全防御理念是分区隔离的思路,在通信信息系统中基于位置、业务等划分安全区域,然后增加FW(防火墙)、IDS(入侵检测系统)、IPS(入侵防护系统)、WAF、沙箱、DLP、EDR、NDR、等大量设备进行隔离防护。As shown in Figure 1, in the existing technology, IP/TCP-based network communication systems are usually composed of switches, routers, gateways, terminals, and servers, which have open accessibility to each other. This leads to risks of data leakage, integrity, availability, and network availability. To address this security risk, the usual security defense concept is the idea of zoning and isolation. In the communication information system, security areas are divided based on location, business, etc., and then a large number of devices such as FW (firewall), IDS (intrusion detection system), IPS (intrusion protection system), WAF, sandbox, DLP, EDR, NDR, etc. are added for isolation and protection.
在企业网络安全防护方面,网络安全域隔离是网络安全防御最重要、最基础的手段之一,也是企业数据中心、信息系统建设最先需要考虑的基础性问题。网络安全域就是一组安全等级相同、业务类型/功能相似的计算机、服务器、数据库、业务系统等构成的系统,具体表现在网络中可能是一个IP网段(一个C段、一个B段)或几个网段,或者是一个VLAN或几个VLAN,或者是连接一个防火墙接口下的整个网络区域,或者是机房里的一个机柜或几个机柜等。网络安全域隔离其实就是将整个网络划分为一个一个比较小的安全信任域,要不然攻击者拿下一个地址之后,可以对整个网络进行扫描探测发现。When it comes to enterprise network security protection, network security domain isolation is one of the most important and fundamental means of network security defense, and it's also a fundamental consideration when building enterprise data centers and information systems. A network security domain is a group of computers, servers, databases, business systems, and other systems with the same security level and similar service types and functions. Specifically, in a network, this might be an IP segment (a C segment, a B segment) or several segments, a VLAN or several VLANs, an entire network area connected to a firewall interface, or a cabinet or cabinets in a computer room. Network security domain isolation essentially divides the entire network into smaller, secure trust domains. Otherwise, an attacker who compromises a single address could scan and detect the entire network.
现有的边界防御架构虽然在网络边界处部署了防护机制,但该架构在当前来看存在一定的局限性。有如下缺陷(1):由于边界防御架构只在网络边界处设置防护措施,将不安全的外部威胁挡在边界外,而内部恶意用户和缺乏安全意识的用户的存在,都会给系统内部带来安全风险,参见图1,绿色的数据流是正常业务流,大量的垃圾流量(图中黄色数据流)及大量的恶意流量(图中红色数据流),都可以在一个安全域内转发,因此,无法防范来自网络内部的安全威胁。(2):无法防范绕过边界防御的攻击。边界防御是单一的、相对静态的安全防护技术,只要携带病毒的文件通过某种手段绕过边界防御的检测,便可以进入网络内部散播病毒,威胁整个系统的安全,图1中数据流和⑥就是穿透边界防御的流量,(3)难以抵御DoS、DDoS类攻击数据流,感染病毒、被控肉鸡的网络中甚至存在大量的单向流量攻击(图1中数据流),可以攻击企业资源,其他终端,传输设备控制面,甚至FW、IDS、IPS等安全设备,导致服务、网络设备、安全防护设备瘫痪。(4)再者,无法抵御数据驱动型攻击。在边界防御架构中,它通常无法抵御数据投毒等数据驱动型网络攻击。(5)也难以防范各种0Day攻击。(6)网络中部署大量的各类安全设备,成本较高,而且又加大了正常业务的访问时延,(7)最后,由于安全管理与业务部署不是同步部署,需要持续的进行安全管理部署,风险面的管理和配置,一方面及时性存在问题,风险管理存在滞后性,另一方面也导致高昂的维护成本。Although the existing border defense architecture deploys a protection mechanism at the network boundary, it currently has certain limitations. It has the following defects: (1) Since the border defense architecture only sets up protection measures at the network boundary, it blocks unsafe external threats outside the boundary. However, the presence of internal malicious users and users who lack security awareness will bring security risks to the system. See Figure 1. The green data flow is the normal business flow. A large amount of junk traffic (yellow data flow in the figure) and a large amount of malicious traffic (red data flow in the figure) can be forwarded within a security domain. Therefore, it cannot prevent security threats from within the network. (2) It cannot prevent attacks that bypass the border defense. Border defense is a single, relatively static security protection technology. As long as a file carrying a virus bypasses the detection of the border defense by some means, it can enter the network and spread the virus, threatening the security of the entire system. The data flow and ⑥ in Figure 1 are the traffic that penetrates the border defense. (3) It is difficult to resist DoS and DDoS attack data flows. In the network infected with viruses and controlled by zombies, there are even a large number of one-way traffic attacks (data flows in Figure 1), which can attack enterprise resources, other terminals, transmission equipment control planes, and even security equipment such as FW, IDS, and IPS, causing services, network equipment, and security protection equipment to be paralyzed. (4) Furthermore, it cannot resist data-driven attacks. In the border defense architecture, it is usually unable to resist data-driven network attacks such as data poisoning. (5) It is also difficult to prevent various zero-day attacks. (6) Deploying a large number of various security devices in the network is costly and increases the access delay of normal business. (7) Finally, since security management and business deployment are not deployed synchronously, continuous security management deployment, risk management and configuration are required. On the one hand, there are problems with timeliness and risk management lags, and on the other hand, it also leads to high maintenance costs.
前述现有方案虽然存在以上问题,依然是目前主流的安全部署方式,比如,在《GB/T25070-2019信息安全技术网络安全等级保护安全设计技术要求》中,将企业内部网络按照不同的等级保护级别进行安全域划分,不同级别安全域之间采用安全互联部件进行数据交互,如图2所示。Although the aforementioned existing solutions have the above problems, they are still the mainstream security deployment methods. For example, in the "GB/T25070-2019 Information Security Technology Network Security Level Protection Security Design Technical Requirements", the internal network of the enterprise is divided into security domains according to different levels of protection. Security domains of different levels use secure interconnection components for data exchange, as shown in Figure 2.
如图3所示,现有为了解决安全设备、方案多而杂的问题,实施了SSA(单一安全架构),SSA的安全能力包含了JIE中所有安全能力:边界保护、端点安全、移动端点安全、数据中心安全、网络安全态势感知分析能力、身份和访问管理。缩减了处理节点的数量由1000多个缩减到50个,SCCA(安全云计算架构)的产品组件包括:As shown in Figure 3, to address the complexity of security devices and solutions, the Single Security Architecture (SSA) has been implemented. The SSA's security capabilities encompass all JIE security capabilities: perimeter protection, endpoint security, mobile endpoint security, data center security, network security situational awareness and analysis, and identity and access management. The number of processing nodes has been reduced from over 1,000 to 50. The SCCA (Secure Cloud Computing Architecture) product components include:
云访问点(CAP):提供对云的访问(提供连接到经批准的云提供商),并保护DISN免受云发起的攻击。简化保护,重点保护网络边界。Cloud Access Point (CAP): Provides access to the cloud (provides connectivity to approved cloud providers) and protects the DISN from cloud-initiated attacks. Simplifies protection and focuses on protecting the network perimeter.
如图4所示,虚拟数据中心安全栈(VDSS):提供虚拟网络飞地安全,以保护商业云产品中的应用程序和数据,参见图4,可以看到也是基于域的NFW、NIDS、NIPS、WAF及抓包检测传统安全组件。As shown in Figure 4, the Virtual Data Center Security Stack (VDSS) provides virtual network enclave security to protect applications and data in commercial cloud products. Figure 4 also shows the domain-based NFW, NIDS, NIPS, WAF, and traditional security components for packet capture and detection.
虚拟数据中心管理服务(VDMS):商业环境中特殊权限用户访问的应用程序主机安全、补丁、配置、管理。参见图4。Virtual Data Center Management Services (VDMS): Application host security, patching, configuration, and management accessible to privileged users in a business environment. See Figure 4.
可信云凭证管理器(TCCM):云凭证管理器,用于强制实施RBAC(基于角色的访问控制)和最小特权访问。参见图4。Trusted Cloud Credential Manager (TCCM): A cloud credential manager that enforces RBAC (role-based access control) and least privilege access. See Figure 4.
随着云计算的兴起,网络边界变得模糊,2010年提出的ZTA(零信任安全架构)理念,是假定网络不可信任的情况下,每个每次访问和每个链接都要先认证授权才能访问,而且要持续的进行安全评估和再认证,参见图5,ZTA架构图中零信任的核心组件是具有策略引擎、策略管理器和策略执行点的设备,通常称之为云安全代理,在访问云资源之前,先访问安全代理,安全代理会结合很多外部组件进行访问的认证和评估,通过后才能访问云资源/企业资源。With the rise of cloud computing, network boundaries have become blurred. The ZTA (Zero Trust Security Architecture) concept proposed in 2010 assumes that the network is untrustworthy. Every access and every link must be authenticated and authorized before access, and security assessment and re-authentication must be performed continuously. See Figure 5. The core component of zero trust in the ZTA architecture diagram is a device with a policy engine, policy manager, and policy execution point, usually called a cloud security agent. Before accessing cloud resources, you must first access the security agent. The security agent will combine many external components to perform access authentication and assessment. Only after passing the authentication and assessment can you access cloud resources/enterprise resources.
如图5所示,为适用云计算环境的虚拟化,采用微隔离,将安全域变小,使用传统的防火墙带来困难,因此,采用虚拟化的防火墙,这样会消耗主机计算资源。As shown in Figure 5, in order to adapt to the virtualization of the cloud computing environment, micro-isolation is used to reduce the security domain, which brings difficulties to the use of traditional firewalls. Therefore, a virtualized firewall is used, which will consume host computing resources.
零信任的核心理念是网络内外的设备/系统默认永不信任,需要基于认证和授权重构访问控制的信任基础,并且需要持续的验证。零信任的实施面临着以下几个方面的困难:The core concept of zero trust is that devices and systems inside and outside the network are never trusted by default. The trust foundation of access control needs to be rebuilt based on authentication and authorization, and continuous verification is required. The implementation of zero trust faces the following difficulties:
1)、零信任的实现复杂性:1) Complexity of implementing zero trust:
零信任的实际实现和操作,在包括网络配置、软件定义网络(SDN)、数据标签、分析、访问控制、策略编排、加密、自动化,以及端到端ICAM(身份、凭证和访问管理)等方面,具有显著的复杂性。企业级考虑还包括确定需要保护的数据、应用程序、资产、服务,以及映射事务流、策略决策、策略实施位置。The actual implementation and operation of Zero Trust has significant complexity in terms of network configuration, software-defined networking (SDN), data labeling, analytics, access control, policy orchestration, encryption, automation, and end-to-end ICAM (identity, credential, and access management). Enterprise-level considerations also include determining the data, applications, assets, and services that need to be protected, as well as mapping transaction flows, policy decisions, and policy enforcement locations.
2)、零信任需要新的分析能力:2) Zero Trust requires new analytical capabilities:
分析将需要额外的能力来处理与零信任安全相关的所需传感器和日志数据。Analytics will require additional capabilities to process the required sensor and log data associated with zero-trust security.
可能需要采用不同的过程和程序,来测量网络的健康状况并识别异常行为。例如,网络内部资源之间的端到端加密,将限制内部数据包检查以检测问题的能力。需要采用新的分析措施,以确保只有经过授权的通信才能发生。Different processes and procedures may be needed to measure the health of the network and identify anomalous behavior. For example, end-to-end encryption between resources within the network will limit the ability to inspect internal packets to detect problems. New analytical measures will be needed to ensure that only authorized communications can occur.
3)过渡到ZTA所需的资源巨大。实施ZTA的组织将需要额外的计算资源以及新的工具、实践和培训,这可能是昂贵和耗时的。例如,为了建立适当的访问策略,组织需要开发和维护有关系统、网络和数据的完整信息。3) The resources required to transition to ZTA are substantial. Organizations implementing ZTA will require additional computing resources as well as new tools, practices, and training, which can be expensive and time-consuming. For example, to establish appropriate access policies, organizations need to develop and maintain complete information about systems, networks, and data.
4)互操作性。由于没有单一技术的ZTA解决方案,ZTA实施需要将现有技术相互集成,并与新技术集成。这些技术可能无法协同工作,特别是在对传统技术进行大量投资的组织中。4) Interoperability. Since there is no single-technology ZTA solution, ZTA implementation requires integrating existing technologies with each other and with new technologies. These technologies may not work together, especially in organizations with significant investments in legacy technologies.
5)ZTA标准。ZTA的治理框架和技术标准仍在形成,对于如何将现有行业标准应用于ZTA的实施,目前尚无共识。5) ZTA Standards. The governance framework and technical standards for ZTA are still being formed, and there is currently no consensus on how to apply existing industry standards to ZTA implementation.
所以ZTA需要大量的人力和资源消耗,存在落地难的问题。Therefore, ZTA requires a lot of manpower and resources, and is difficult to implement.
零信任本质上意味着所有试图连接到军事网络的用户和设备在被授予访问权限前都将被识别和验证,旨地在允许网络连接前“永不信任”并“始终验证”。Zero Trust essentially means that all users and devices attempting to connect to a military network will be identified and authenticated before being granted access, with the goal of "never trust" and "always verify" before allowing network connection.
现有的描述安全技术能力目标状态的参考架构,是目前的主流安全部署方案,其以安全技术部署架构图的形式,全面表达了政企机构网络全景、信息化和网络安全的融合关系、以及安全全景,展示了网络安全技术部署的目标状态,比如,按照区域,把政企机构的信息化系统分成总部、区域中心、分支机构及网络节点等多种类型;按照业务类别和功能,又把政企机构的信息化分成了全局网络、骨干网络、区域边界、通信网络、信息系统、云平台、大数据平台、数字化终端等层级、组件,并标记出他们的位置和形态。在这个基础上,把所有的安全能力组件,分别以系统、服务、软硬件资源的形态,合理部署到信息化系统的不同区域、节点、层级中,各种安全组件之间,通过网络和数据进行协同,使安全能力全面覆盖信息化的所有范围,实现各个层级的管理、消除盲点,增强安全资源的丰富性、灵活性、完整性。可以看到图中部署了大量的安全组件,其架构是将现有的安全组件进行了梳理、安排在网络和信息系统的不同位置,并将部分安全组件联动起来,形成安全层,奇安信在现有的网络架构不变的情况下,信息化系统内部加上大量的外挂安全设备,并联动起来,这需要大量的外挂设备,成本高,部署维护麻烦。The existing reference architecture that describes the target state of security technology capabilities is the current mainstream security deployment approach. This comprehensive security technology deployment architecture diagram comprehensively depicts the network landscape of government and enterprise organizations, the integration of information technology and cybersecurity, and the overall security landscape, showcasing the target state of cybersecurity technology deployment. For example, by region, the information technology systems of government and enterprise organizations are divided into various types, including headquarters, regional centers, branches, and network nodes. Based on business categories and functions, the information technology of government and enterprise organizations is further divided into layers and components, including the global network, backbone network, regional boundaries, communication networks, information systems, cloud platforms, big data platforms, and digital terminals, with their locations and forms marked. Based on this foundation, all security capability components are rationally deployed in the form of systems, services, and software and hardware resources to different regions, nodes, and layers of the information technology system. These various security components collaborate through networks and data, ensuring comprehensive security capability coverage across all aspects of information technology, enabling management at all levels, eliminating blind spots, and enhancing the richness, flexibility, and integrity of security resources. It can be seen from the figure that a large number of security components are deployed. Its architecture is to sort out the existing security components, arrange them in different locations of the network and information system, and link some security components together to form a security layer. Qi'anxin adds a large number of external security devices to the information system without changing the existing network architecture, and links them together. This requires a large number of external devices, which is costly and troublesome to deploy and maintain.
综上,可见传统的防护手段假定到处都不安全,需要在网络中外挂大量的安全部件,造成安全部署成本高、安全部署运维难,难以标准化和降低安全成本,导致好多企事业单位的安全疲劳,更有小企业难以承受安全的高成本,放弃部署安全设备和策略。In summary, traditional protection methods assume that security is not everywhere and require a large number of external security components to be added to the network, resulting in high security deployment costs, difficult security deployment and operation and maintenance, and difficulty in standardization and reducing security costs. This has led to security fatigue in many enterprises and institutions, and even small businesses cannot afford the high security costs and give up deploying security equipment and strategies.
由于以上原因,信息网络安全方面,易攻难守,防护成本很高,安全非标化,导致安全市场很碎片化,造成目前安全行业有以下弊病:Due to the above reasons, information network security is easy to attack but difficult to defend, the protection cost is very high, and security is non-standardized, resulting in a fragmented security market. This has led to the following drawbacks in the current security industry:
1)产品多而杂,产品研发缺乏统一开发平台或架构,研发人员、资源无法复用;1) There are many diverse products, and product R&D lacks a unified development platform or architecture, making it impossible to reuse R&D personnel and resources;
2)安全能力无法协同、迭代缓慢;2) Security capabilities cannot be coordinated and iteration is slow;
3)产品种类日益繁杂,但极难进行协同,无法形成一体化低成本的安全价值;3) Product categories are becoming increasingly complex, but coordination is extremely difficult, making it impossible to form integrated, low-cost security value;
4)产品非核心功能冗余,配置复杂,使用难度较大;4) The product's non-core functions are redundant, the configuration is complex, and it is difficult to use;
5)产品价值合规属性偏重,无法在客户场景发挥实际价值,无法帮客户维护常态化的安全水位;5) The product's value is too focused on compliance, failing to deliver real value in customer scenarios and unable to help customers maintain a normalized safety level;
6)厂商核心竞争点体现在围绕大客户与高毛利行业的销售及渠道资源PK,产品同质化严重,性能指标差异不大;6) The core competitive advantage of manufacturers lies in the competition for sales and channel resources around major customers and high-gross-profit industries. Products are highly homogenized, with little difference in performance indicators.
7)客户场景信息化程度及人员水平参差不齐,定制化比重较高;7) The degree of informatization of customer scenarios and the level of personnel vary, and the proportion of customization is relatively high;
8)交付部署、运营维护人员依赖度较高,成本较高;需面对大量适配、配置工作,甚至要响应一些跟自身产品无关的的故障问题。8) The delivery, deployment, operation and maintenance personnel are highly dependent and costly; a large amount of adaptation and configuration work needs to be done, and even some fault issues unrelated to the product itself need to be responded to.
挖漏洞、打补丁、查毒杀马乃至设蜜罐、布沙箱,层层叠叠的附加式防护措施,即使这样也难以处理未知威胁,0day攻击经常发生,大量的DDoS攻击存在,基于这个情况,2008年由中国工程院院士邬江兴提出拟态防御的概念,2013年形成拟态防御理论体系,提出了动态异构冗余构造(Dynamic Heterogeneous Redundancy,DHR)的核心技术,来化解或规避目标对象内部“已知的未知风险”或“未知的未知威胁”的原理与方法,即网络空间拟态防御(Cyberspace Mimic Defense,CMD)。Exploiting vulnerabilities, patching, virus detection and antivirus, even setting up honeypots and sandboxes, and other layers of additional protection measures are still difficult to deal with unknown threats. 0day attacks often occur, and a large number of DDoS attacks exist. Based on this situation, the concept of mimicry defense was proposed by Wu Jiangxing, an academician of the Chinese Academy of Engineering in 2008. In 2013, the theoretical system of mimicry defense was formed, and the core technology of dynamic heterogeneous redundancy (DHR) was proposed to resolve or avoid the principles and methods of "known unknown risks" or "unknown unknown threats" within the target object, namely Cyberspace Mimic Defense (CMD).
如图6所示,动态异构冗余构造(DHR)建立在“相对正确公理”逻辑表达与闭环鲁棒控制基础上,是一种基于策略裁决的闭环迭代式多维动态重构鲁棒控制结构。由功能等价的异构执行体以及输入出代理、采用迭代机制的策略裁决和反馈控制和调度器构成,其中输入代理用于分发外部的输入信号序列(非必要),输出代理与迭代(由多种表决算法构成的)裁决共同组成可归一化的判决界面,反馈控制与调度器的核心由一组预先设置的调度策略和智能学习算法组成,当收到判决器发现异常的信息后,反馈调度器被激活并指令相关部件作当前运行环境的更换、迁移、清洗、重组、重构等操作,这一过程是迭代执行的,直至判决器异常情况消失或发生频度低于某个设定的阈值为止。As shown in Figure 6, the Dynamic Heterogeneous Redundancy (DHR) architecture is based on the logical expression of "relative correctness axioms" and closed-loop robust control. It is a closed-loop, iterative, multi-dimensional, dynamically reconfigurable robust control structure based on policy adjudication. It consists of functionally equivalent heterogeneous executors, input and output agents, and iterative policy adjudication, feedback control, and a scheduler. The input agent distributes external input signal sequences (optional), while the output agent and iterative adjudication (composed of multiple voting algorithms) form a normalized decision interface. The core of the feedback control and scheduler consists of a set of pre-set scheduling policies and intelligent learning algorithms. Upon receiving information from the adjudicator that an anomaly has been detected, the feedback scheduler is activated and instructs relevant components to replace, migrate, clean, reorganize, and reconfigure the current operating environment. This process is iteratively executed until the adjudicator's anomaly disappears or its occurrence frequency falls below a set threshold.
DHR构造具有独特的“测不准”运行机制,能够抑制或管控异构执行体集合K中广义不确定扰动的影响,所形成“安全防御迷雾”,不论是自然因素导致的可靠性风险,还是人为蓄意行为导致的安全威胁,只要是以差模形态的表达均可以100%得到抑制,对于裁决环节有感的共模形态的表达也能控制在设计给定的阈值范围内。The DHR structure has a unique "uncertainty" operating mechanism that can suppress or control the impact of generalized uncertain disturbances in the heterogeneous executor set K, forming a "security defense fog". Whether it is reliability risks caused by natural factors or security threats caused by intentional human behavior, as long as they are expressed in differential mode, they can be 100% suppressed. The expression of common mode that is sensitive to the judgment link can also be controlled within the threshold range given by the design.
但拟态防御的最大问题是成本过于高昂,由于同一个功能需要多个异构执行体来执行,而且异构执行体越多,安全防护能力越强,这类似于密钥界推崇的一次一密,不过由于成本高,截至目前没有实现一次一密,通过内部多种异构模式来提升攻击成本的同时,自身的成本代价也大幅提升,例如至少要求有三个执行体,本来用一个执行体完成的工作,用3个以上来完成,在提升防攻击能力的同时,自己本身的成本提升更快。从理论的提出,到目前已经有15年之久,依然没能推广,成本太高是主要原因,并且,近期内也难以被主流安全厂商认可。However, the biggest problem with mimetic defense is its high cost. The same function requires multiple heterogeneous executors, and the more heterogeneous executors, the stronger the security protection. This is similar to the one-time pad system favored by the cryptography community, but due to its high cost, it has not yet been implemented. While increasing the cost of attack through multiple internal heterogeneous modes, the cost itself also increases significantly. For example, requiring at least three executors means that the work originally completed by one executor now requires three or more. While improving attack defense capabilities, the cost itself increases even faster. Fifteen years after the theory was proposed, it has yet to be widely adopted, primarily due to its high cost. Furthermore, it is unlikely to be accepted by mainstream security vendors in the near future.
NAC(Network Admission Control)称为网络接入控制,是一种接入控制机制,包括802.1X认证、MAC认证与Portal认证。NAC (Network Admission Control) is called network access control and is an access control mechanism that includes 802.1X authentication, MAC authentication and Portal authentication.
NAC安全解决方案从接入网络的终端安全控制入手,将终端安全状况和网络准入控制结合在一起,通过检查、隔离、加固和审计等手段,加强网络用户终端的主动防御能力,保证企业中每个终端的安全性,进而保护企业整网的安全性。The NAC security solution starts with the security control of terminals accessing the network, combining terminal security status with network access control. Through inspection, isolation, reinforcement and auditing, it strengthens the active defense capabilities of network user terminals, ensuring the security of every terminal in the enterprise and thus protecting the security of the entire enterprise network.
如图7所示,NAC安全构架包括三个关键组件:NAC终端、网络准入设备和准入服务器。As shown in Figure 7, the NAC security architecture includes three key components: NAC terminal, network access device, and access server.
三种认证方式比较Comparison of three authentication methods
NAC包括三种认证方式:802.1X认证、MAC认证和Portal认证。由于三种认证方式认证原理不同,各自适合的场景也有所差异,实际应用中,可以根据场景部署某一种合适的认证方式,也可以部署几种认证方式组成的混合认证,混合认证的组合方式以设备实际支持为准。三种认证方式比较如下表所示:NAC includes three authentication methods: 802.1X authentication, MAC authentication, and Portal authentication. Because the three authentication methods have different authentication principles, they are suitable for different scenarios. In actual applications, you can deploy a suitable authentication method according to the scenario, or you can deploy a hybrid authentication method composed of several authentication methods. The combination of hybrid authentication methods is based on the actual support of the device. The following table compares the three authentication methods:
表1认证方式对比
Table 1 Comparison of authentication methods
NAC技术的问题:Problems with NAC technology:
NAC是一种接入控制技术,是否允许终端接入是建立在终端身份的验证和是否部署了传统的安全手段,例如:安装防病毒软件,安装了操作系统漏洞补丁等,在用户认证通过后,才允许打开NAC设备的数据端口或建立MAC表项,从而实现网络的接入,接入网络后,在同一个vlan内,甚至跨vlan并没有相应的访问限制;因此,在实际使用中,通常认证通过的主机终端有很大的访问自由度,由于不可能完全避免主机的感染,例如利用0day漏洞的感染,如果某主机终端被感染,依然能够将病毒、肉鸡等恶意软件传播到很多其他终端和服务器,造成业务系统、数据、网络被攻击。因此,NAC技术虽然可以降低被攻击风险,但并不能降低传统的安全部署方式和安全维护方式的依赖,安全的部署及运维成本依然很高。NAC is an access control technology. Whether or not a terminal is allowed access is based on terminal identity verification and the deployment of traditional security measures, such as antivirus software and operating system vulnerability patches. Only after a user passes authentication is the NAC device's data port opened or a MAC address entry created, allowing network access. Once connected, there are no corresponding access restrictions within the same VLAN or even across VLANs. Therefore, in practice, authenticated host terminals typically have significant access freedom. However, since it's impossible to completely prevent host infection, such as through the exploitation of zero-day vulnerabilities, an infected host terminal can still spread viruses, botnet malware, and other malware to numerous other terminals and servers, potentially compromising business systems, data, and networks. Therefore, while NAC technology can reduce the risk of attack, it doesn't reduce reliance on traditional security deployment and maintenance methods, and security deployment and maintenance costs remain high.
公布号为CN115843429A的现有发明专利申请文献《用于网络切片中隔离支持的方法与装置》,该现有方法包括:接收传输网络(TN)域中的网络切片子网(NSS)的切片隔离策略,将切片隔离策略映射到网络资源隔离策略和业务隔离策略,以及将网络资源隔离策略和业务隔离策略分别映射到网络资源分配策略和数据业务转发策略。网络资源分配策略和数据业务转发策略可以应用于TN NSS的创建。前述现有技术用于网络切片中隔离支持的方法,5G网络切片,本身是基于其承载的不同业务特征,划分不同的承载资源(转发资源、管理资源、监视资源),有点类似虚拟专用网的技术,其实质上是资源虚拟化成多份来做不同使用的技术,但前述现有技术无法实现细粒度的安全控制和基于安全性考虑的三面隔离,网络安全性仍存在漏洞。The existing invention patent application document "Method and Apparatus for Isolation Support in Network Slicing" with publication number CN115843429A, includes the following steps: receiving a slice isolation policy of a network slice subnet (NSS) in a transport network (TN) domain, mapping the slice isolation policy to a network resource isolation policy and a service isolation policy, and mapping the network resource isolation policy and the service isolation policy to a network resource allocation policy and a data service forwarding policy, respectively. The network resource allocation policy and the data service forwarding policy can be applied to the creation of a TN NSS. The aforementioned existing technology is used for a method for isolation support in network slicing. 5G network slicing itself divides different bearer resources (forwarding resources, management resources, and monitoring resources) based on the different service characteristics it carries. It is somewhat similar to virtual private network technology. In essence, it is a technology that virtualizes resources into multiple copies for different uses. However, the aforementioned existing technology cannot achieve fine-grained security control and three-sided isolation based on security considerations, and network security still has loopholes.
公布号为CN116707980A的现有发明专利申请文献《一种基于零信任的免疫安全防御方法》,该现有方法通过对访问主体进行持续安全检测,对访问行为进行细粒度管控,控制风险的传播,保障未被感染的应用正常运营;使用大数据分析和AI技术,通过历史数据,自我完善安全策略。其以网络安全技术为基础,结合实体行为分析等系统,实现了网络安全系统的自适应免疫安全机制。零信任本身是一种理念,遵循永不信任、从零开始、动态验证,通常在数据中心实施,它是假设失陷,是对网络设施及边界安全等都不信任,对每用户的每次访问都进行认证和授权验证,决定设否允许访问,需要大量的检测和分析能力,因此,其需要大量的计算能力,其缺陷如前面讲到的零信任架构是一样的。The existing invention patent application document, "A Zero-Trust Based Immune Security Defense Method," with publication number CN116707980A, implements continuous security testing of access entities, fine-grained control of access behavior, and controls the spread of risks to ensure the normal operation of uninfected applications. It also uses big data analysis and AI technology to self-improve security policies based on historical data. Based on network security technology and combined with systems such as entity behavior analysis, it implements an adaptive immune security mechanism for network security systems. Zero trust itself is a concept that adheres to the principles of never trusting, starting from scratch, and dynamic verification. It is typically implemented in data centers. It assumes compromise and distrusts network infrastructure and perimeter security. Every user's access is authenticated and authorized to determine whether access is permitted. This requires extensive detection and analysis capabilities, and therefore, a significant amount of computing power. Its drawbacks are the same as those of the zero-trust architecture discussed earlier.
综上,现有安全技术方案是以挖漏洞、打补丁、查毒杀马乃至设蜜罐、布沙箱、设防火墙、入侵防护,层层叠叠的附加式防护措施,即使这样也难以处理未知威胁,0day攻击经常发生,大量的DDoS攻击存在,这种修补式防护,导致即使部署了大量安全设备,网络依然易攻难守,难以形成有效的立体防御体系和低成本安全能力,网络弹性能力较低、而且带来大量的计算消耗和人力消耗,安全运维成本也一直居高不下。In summary, existing security technology solutions rely on exploiting vulnerabilities, patching, virus detection and antivirus, and even setting up honeypots, sandboxes, firewalls, and intrusion protection, a layered approach of additional protection. Even with these measures, it's still difficult to handle unknown threats. Zero-day attacks frequently occur, and a large number of DDoS attacks exist. This patch-based protection approach means that even with a large number of security devices deployed, the network remains vulnerable to attack and difficult to defend, making it difficult to form an effective three-dimensional defense system and low-cost security capabilities. The network's resilience is low, and it consumes a lot of computing and manpower, resulting in high security operation and maintenance costs.
本申请所要解决的技术问题在于:如何解决现有技术中因IP网络的开放性,导致自身安全防护能力低,需外挂大量安全防护设施,效果差、成本高,难以形成低成本的安全防护能力,导致易攻难守的技术问题。The technical problem to be solved by this application is: how to solve the technical problem in the existing technology that due to the openness of the IP network, its own security protection capability is low, a large number of external security protection facilities are required, the effect is poor, the cost is high, it is difficult to form a low-cost security protection capability, and it is easy to attack but difficult to defend.
本申请是采用以下技术方案解决上述技术问题的:内生安全网络方法包括:This application adopts the following technical solutions to solve the above technical problems: The endogenous security network method includes:
S1、提取正常业务数据流的转发特征信息;S1. Extract forwarding feature information of normal business data flow;
S2、将正常业务数据流的转发特征信息下发到传输网元,形成转发表项、流表以及转发白名单,其中,内生安全网络方法的方式包括:认证授权方式以及自动学习方式;S2. Send forwarding feature information of normal service data flow to the transmission network element to form forwarding table entries, flow table and forwarding whitelist. Among them, the endogenous security network method includes: authentication and authorization method and automatic learning method;
S3、传输网元依据正常业务数据流的转发特征信息进行报文转发;S3. The transmission network element forwards the message based on the forwarding characteristic information of the normal service data flow;
S4、对非正常业务数据流报文执行丢弃操作,其中,报文根据交换机、路由器的配置文件及正常业务数据流特征自动生成转发表或白名单供转发操作判别。S4. Execute a discard operation on the abnormal business data flow message, wherein the message automatically generates a forwarding table or a whitelist for forwarding operation judgment based on the configuration files of the switch and router and the normal business data flow characteristics.
在更具体的技术方案中,在认证授权方式下,业务数据流转发特征绑定传输网元转发表项方法还包括:In a more specific technical solution, under the authentication and authorization mode, the method for binding the service data flow forwarding characteristics to the transmission network element forwarding table entry further includes:
S21’、利用主机终端对特定服务器、特定资源发送访问请求报文;S21', using the host terminal to send an access request message to a specific server or specific resource;
S22’、利用传输网元将访问请求报文发送至认证服务器、授权服务器进行授权、认证;S22', using the transmission network element to send the access request message to the authentication server and the authorization server for authorization and authentication;
S23’、在授权、认证成功时,自动提取正常业务数据流的转发特征信息,生成授权成功业务数据流报文转发特征;S23', when authorization and authentication are successful, automatically extract the forwarding feature information of the normal business data flow and generate the forwarding feature of the authorized successful business data flow message;
S24’、在授权、认证失败时,返回失败信息,并丢弃访问请求报文;S24', when authorization or authentication fails, returns failure information and discards the access request message;
S25’、将正常业务数据流的转发特征信息下发至传输网元,利用传输网元的控制平面的处理器,接收转发特征信息;S25', sending the forwarding characteristic information of the normal service data flow to the transmission network element, and using the processor of the control plane of the transmission network element to receive the forwarding characteristic information;
S26’、在控制平面的处理器,生成并下发转发表项、流表以及转发白名单至转发平面;S26', the processor in the control plane generates and sends forwarding entries, flow tables, and forwarding whitelists to the forwarding plane;
S27’、在传输网元收到授权成功业务数据流报文时,根据转发表项、流表以及转发白名单,转发正常业务数据流的报文。S27', when the transmission network element receives the authorization success service data flow message, it forwards the normal service data flow message according to the forwarding table entry, flow table and forwarding whitelist.
在更具体的技术方案中,在自动学习方式下,业务数据流转发特征绑定传输网元转发表项方法还包括:In a more specific technical solution, in an automatic learning mode, the method for binding service data flow forwarding characteristics to transmission network element forwarding table entries further includes:
S21”、在传输网元运行过程中,生成转发表项,具体地,转发表项包括但不限于:S21″: During the operation of the transmission network element, a forwarding table entry is generated. Specifically, the forwarding table entry includes but is not limited to:
流表、ACL表、MAC表、FIB表、ARP表;Flow table, ACL table, MAC table, FIB table, ARP table;
S22”、按照预置读取时间,从转发表项中读取表项数据,将表项数据存至临时表,将临时表存放与传输网元;S22″, read the table entry data from the forwarding table according to the preset reading time, store the table entry data in a temporary table, and store the temporary table with the transmission network element;
S23”、在未达到预设学习时间阈值时,持续执行步骤S2”,以将正常业务访问产生的转发表项,记录在临时表;S23 ″, when the preset learning time threshold is not reached, continue to execute step S2 ″ to record the forwarding entries generated by normal business access in the temporary table;
S24”、在达到预设学习时间阈值时,生成转发基线数据库,将转发基线数据库存储至传输网元,据以将传输网元切换为基线控制模式,以查询转发基线数据库,生成后续的转发表项,在转发平面添加转发表项,其中,转发基线数据库的存储方式包括:分布式存储、集中式存储;具体地,学习处理方式包括但不限于:分布式、集中式;S24”, when a preset learning time threshold is reached, generating a forwarding baseline database, storing the forwarding baseline database in a transmission network element, switching the transmission network element to a baseline control mode based on the forwarding baseline database, querying the forwarding baseline database, generating subsequent forwarding table entries, and adding the forwarding table entries to the forwarding plane, wherein the storage method of the forwarding baseline database includes: distributed storage and centralized storage; specifically, the learning processing method includes but is not limited to: distributed and centralized;
S25”、从转发基线数据库中获取基线数据,据以确定转发基线,根据转发基线控制传输网元转发数据报文;S25”, obtaining baseline data from a forwarding baseline database, determining a forwarding baseline based on the data, and controlling the transmission network element to forward data packets according to the forwarding baseline;
S26”、在数据报文超出转发基线时,记录、提取当前的数据报文的转发信息;S26”, when the data message exceeds the forwarding baseline, record and extract the forwarding information of the current data message;
S27”、进行异常报文判断,以判定并丢弃非正常业务报文,在数据报文判定为正常业务数据报文时,获取并根据当前报文转发信息更新转发基线数据库。S27″, perform abnormal message judgment to determine and discard abnormal business messages, and when the data message is determined to be a normal business data message, obtain and update the forwarding baseline database according to the current message forwarding information.
在更具体的技术方案中,步骤S22”中,临时表存放于各传输网元,其中,临时表存放的方式包括:分布式存放、集中存放;在集中存放的方式下,将临时表存放至控制平面的服务器。In a more specific technical solution, in step S22", the temporary table is stored in each transmission network element, wherein the temporary table storage method includes: distributed storage and centralized storage; in the centralized storage method, the temporary table is stored in the server of the control plane.
在更具体的技术方案中,内生安全网络方法中,还包括内生安全弹性网络,内生安全弹性网络的逻辑部件包括:主机终端、传输网元、应用服务器及资源、安全网络控制器、策略服务器、身份认证授权审计服务器、网络管理交换机、服务器、日志采样威胁分析服务器;具体地,传输网元包括但不限于:以太传输网元、IP传输网元。In a more specific technical solution, the endogenous security network method also includes an endogenous security elastic network. The logical components of the endogenous security elastic network include: host terminal, transmission network element, application server and resources, security network controller, policy server, identity authentication and authorization audit server, network management switch, server, log sampling and threat analysis server; specifically, the transmission network element includes but is not limited to: Ethernet transmission network element, IP transmission network element.
在更具体的技术方案中,内生安全弹性网络的逻辑架构包括:管理平面、控制平面以及转发平面;In a more specific technical solution, the logical architecture of the intrinsically secure elastic network includes: management plane, control plane, and forwarding plane;
在管理平面中,利用管理交换机将所有业务交换机的管理口链接至管理交换机,对管理交换机以及业务交换机的接口进行隔离;具体地,管理平面包括但不限于:管理交换机、管理面服务器以及端到端部件管理单元,其中,管理服务器,用以对内生安全弹性网络中,具有端到端布局管理单元的设备进行配置,为保证安全,各传输网元与管理服务器间进行双向认证,以在管理平面进行通信;In the management plane, the management ports of all service switches are connected to the management switch using a management switch, isolating the interfaces of the management switch and the service switches. Specifically, the management plane includes but is not limited to: a management switch, a management plane server, and an end-to-end component management unit. The management server is used to configure devices with end-to-end layout management units in an inherently secure elastic network. To ensure security, each transmission network element and the management server perform bidirectional authentication to communicate on the management plane.
转发平面包括:主机终端业务单元、应用服务器及数据资源业务单元、传输网元的转发模块;具体地,利用转发模块,作为安全转发策略执行点,转发网元包括:报文转发组件、ACL组件、统计组件、采样组件、日志追溯组件,以进行转发控制、日志审计、威胁分析、日志溯源追责、数据统计采样,供威胁响应;The forwarding plane includes the host terminal business unit, application server and data resource business unit, and the forwarding module of the transmission network element. Specifically, the forwarding module serves as the execution point of the security forwarding policy. The forwarding network element includes the message forwarding component, ACL component, statistics component, sampling component, and log tracing component to perform forwarding control, log auditing, threat analysis, log tracing and accountability, and data statistics sampling for threat response.
控制平面包括:安全网络控制器、策略服务器、身份管理授权服务器、日志采样分析服务器、传输网元的控制模块;利用控制平面对互通请求设备进行双向认证,以在控制平面进行通信;具体地,以身份管理授权服务器对业务数据流进行认证授权后形成相应的黑名单、白名单以及灰名单;传输网元进行分布式部署,利用预置协议进行防环操作,根据预置路由协议发现网络拓扑,进行分布式路径计算;利用安全网络控制器进行集中式路径计算,找到最优路径相关的传输网元,通过传输网元中的控制单元、策略执行单元,生成并下发转发表项至转发单元。The control plane includes: a secure network controller, a policy server, an identity management authorization server, a log sampling and analysis server, and a control module for transmission network elements; the control plane is used to perform bidirectional authentication on intercommunication request devices to enable communication on the control plane; specifically, the identity management authorization server authenticates and authorizes the service data flow to form corresponding blacklists, whitelists, and graylists; the transmission network elements are deployed in a distributed manner, and anti-loop operations are performed using preset protocols. The network topology is discovered based on preset routing protocols, and distributed path calculations are performed; the secure network controller is used to perform centralized path calculations to find the transmission network elements related to the optimal path, and the control unit and policy execution unit in the transmission network element are used to generate and send forwarding table entries to the forwarding unit.
在更具体的技术方案中,内生安全网络架构包括:In more specific technical solutions, the intrinsically secure network architecture includes:
转发信息提取模块,用以提取正常业务数据流的转发特征信息;Forwarding information extraction module, used to extract forwarding feature information of normal business data flow;
转发依据形成模块,用以将正常业务数据流的转发特征信息下发到传输网元,形成转发表项、流表以及转发白名单,其中,转发依据形成模块还包括:认证授权模块以及自动学习模块;A forwarding basis formation module is used to send forwarding feature information of normal business data flows to the transmission network element to form forwarding table entries, flow tables and forwarding whitelists. The forwarding basis formation module also includes: an authentication and authorization module and an automatic learning module;
报文转发模块,用以在传输网元依据正常业务数据流的转发特征信息进行报文转发;A message forwarding module is used to forward messages based on the forwarding characteristic information of normal business data flows in the transmission network element;
对非正常业务数据流报文执行丢弃操作,其中,报文根据交换机、路由器的配置文件及正常业务数据流特征自动生成白名单供转发操作判别,报文转发模块与转发依据形成模块连接。A discard operation is performed on abnormal business data flow messages, wherein the messages are automatically generated into a whitelist for forwarding operation judgment based on the configuration files of the switch and router and the characteristics of normal business data flow, and the message forwarding module is connected to the forwarding basis formation module.
在更具体的技术方案中,认证授权模块还包括:In a more specific technical solution, the authentication and authorization module also includes:
访问请求发送单元,用以利用主机终端对特定服务器、特定资源发送访问请求报文;An access request sending unit, configured to send an access request message to a specific server or specific resource using a host terminal;
认证授权处理单元,用以利用传输网元将访问请求报文发送至认证服务器、授权服务器进行授权、认证,认证授权处理单元与访问请求发送单元连接;An authentication and authorization processing unit, configured to use a transmission network element to send an access request message to an authentication server and an authorization server for authorization and authentication, and the authentication and authorization processing unit is connected to the access request sending unit;
转发特征提取单元,用以在授权、认证成功时,自动提取正常业务数据流的转发特征信息;在授权、认证失败时,返回失败信息,并丢弃访问请求报文,转发特征提取单元与认证授权处理单元连接;The forwarding feature extraction unit is used to automatically extract the forwarding feature information of the normal business data flow when authorization and authentication are successful; when authorization and authentication fail, it returns failure information and discards the access request message. The forwarding feature extraction unit is connected to the authentication and authorization processing unit;
转发特征处理单元,将正常业务数据流的转发特征信息下发至传输网元,利用传输网元的控制平面的处理器,接收转发特征信息,转发特征处理单元与转发特征提取单元连接;The forwarding feature processing unit sends the forwarding feature information of the normal service data flow to the transmission network element, uses the processor of the control plane of the transmission network element to receive the forwarding feature information, and is connected to the forwarding feature extraction unit;
转发依据生成下发单元,用以在控制平面的处理器,生成并下发转发表项、流表以及转发白名单至转发平面,转发依据生成下发单元与转发特征处理单元连接;A forwarding basis generation and delivery unit is used to generate and deliver forwarding table entries, flow tables, and forwarding whitelists to the forwarding plane in the processor of the control plane. The forwarding basis generation and delivery unit is connected to the forwarding feature processing unit.
授权认证正常报文转发单元,用以在传输网元收到授权成功业务数据流报文时,根据转发表项、流表以及转发白名单,转发正常业务数据流的报文,授权认证正常报文转发单元与转发依据生成下发单元连接。The authorization and authentication normal message forwarding unit is used to forward the normal business data flow message according to the forwarding table, flow table and forwarding whitelist when the transmission network element receives the authorization successful business data flow message. The authorization and authentication normal message forwarding unit is connected to the forwarding basis generation and issuance unit.
在更具体的技术方案中,自动学习模块还包括:In a more specific technical solution, the automatic learning module also includes:
转发表项生成单元,用以在传输网元运行过程中,生成转发表项;A forwarding table entry generating unit, configured to generate forwarding table entries during operation of the transmission network element;
表项数据读取存储单元,用以按照预置读取时间,从转发表项中读取表项数据,将表项数据存至临时表,将临时表存放于传输网元,表项数据读取存储单元与转发表项生成单元连接;The table entry data reading and storage unit is used to read the table entry data from the forwarding table entry according to the preset reading time, store the table entry data in a temporary table, and store the temporary table in the transmission network element. The table entry data reading and storage unit is connected to the forwarding table entry generation unit;
表项数据持续处理单元,用以在未达到预设学习时间阈值时,持续执行步骤S2”,以将正常业务访问产生的转发表项,记录在临时表,表项数据持续处理单元与表项数据读取存储单元连接;A table entry data continuous processing unit, configured to continuously execute step S2' when the preset learning time threshold is not reached, so as to record the forwarding entries generated by normal business access in a temporary table, the table entry data continuous processing unit being connected to the table entry data reading and storing unit;
基线数据库生成存储单元,用以在达到预设学习时间阈值时,生成转发基线数据库,将转发基线数据库存储至传输网元,据以将传输网元切换为基线控制模式,以查询转发基线数据库,生成后续的转发表项,在转发平面添加转发表项,其中,转发基线数据库的存储方式包括:分布式存储、集中式存储,基线数据库生成存储模块与表项数据读取存储单元连接;A baseline database generation storage unit is configured to generate a forwarding baseline database when a preset learning time threshold is reached, store the forwarding baseline database in a transmission network element, and switch the transmission network element to a baseline control mode accordingly to query the forwarding baseline database, generate subsequent forwarding table entries, and add forwarding table entries to the forwarding plane. The forwarding baseline database storage method includes: distributed storage and centralized storage. The baseline database generation storage module is connected to the table entry data reading storage unit.
业务数据转发控制单元,用以从转发基线数据库中获取基线数据,据以确定转发基线,根据转发基线控制传输网元转发业务数据报文,业务数据转发控制单元与基线数据库生成存储单元连接;A service data forwarding control unit is used to obtain baseline data from a forwarding baseline database, determine a forwarding baseline based on the baseline data, and control the transmission network element to forward service data packets according to the forwarding baseline. The service data forwarding control unit is connected to a storage unit generated by the baseline database;
超出基线处理单元,用以在业务数据报文超出转发基线时,记录、提取当前的业务数据报文的转发信息,超出基线处理单元与业务数据转发控制单元连接;An exceeding baseline processing unit, used to record and extract forwarding information of the current service data message when the service data message exceeds the forwarding baseline, and the exceeding baseline processing unit is connected to the service data forwarding control unit;
异常处理及基线更新处理单元,用以进行异常报文判断,以判定并丢弃非正常业务报文,在业务数据报文判定为正常业务数据报文时,获取并根据当前报文转发信息更新转发基线数据库,异常处理及基线更新处理单元与超出基线处理单元及业务数据转发控制单元连接。The exception handling and baseline update processing unit is used to judge abnormal messages to determine and discard abnormal business messages. When the business data message is determined to be a normal business data message, it obtains and updates the forwarding baseline database based on the current message forwarding information. The exception handling and baseline update processing unit is connected to the exceeding baseline processing unit and the business data forwarding control unit.
在更具体的技术方案中,项数据读取存储单元中,临时表存放于各传输网元,其中,临时表存放的方式包括:分布式存放、集中存放;在集中存放的方式下,将临时表存放至控制平面的服务器。In a more specific technical solution, in the item data reading storage unit, a temporary table is stored in each transmission network element, wherein the temporary table storage methods include: distributed storage and centralized storage; in the centralized storage method, the temporary table is stored in the server of the control plane.
在更具体的技术方案中,一种计算机存储介质,存储有多条指令,指令适于由处理器加载并执行的内生安全网络方法。In a more specific technical solution, a computer storage medium stores a plurality of instructions, wherein the instructions are suitable for an intrinsic security network method loaded and executed by a processor.
在更具体的技术方案中,一种电子设备包括:处理器和存储器;其中,存储器存储有计算机程序,计算机程序适于由处理器加载并执行的内生安全网络方法。In a more specific technical solution, an electronic device includes: a processor and a memory; wherein the memory stores a computer program, and the computer program is suitable for an endogenous security network method loaded and executed by the processor.
本申请相比现有技术具有以下优点:Compared with the prior art, this application has the following advantages:
本申请基于路由交换架构平台提供业务安全能力,无需各种复杂的硬件平台,平台复用,内生安全,安全能力和业务能力同步提升。This application provides business security capabilities based on a routing and switching architecture platform, eliminating the need for various complex hardware platforms, enabling platform reuse, inherent security, and simultaneous improvement of security and business capabilities.
本申请基于路由交换平台,内生安全,能形成一体化的低成本的安全价值,不会导致产品种类日益繁杂,和协同困难问题。This application is based on a routing and switching platform, has inherent security, and can form an integrated, low-cost security value without causing increasing complexity in product types and difficulties in coordination.
本申请安全的配置基于正常的业务自动生成和下发,从而减少配置工作量,降低使用难度和维护成本。The security configuration of this application is automatically generated and issued based on normal business, thereby reducing configuration workload, lowering usage difficulty and maintenance costs.
本申请能始终在线发挥价值,维护常态化的基本安全水平,而不仅仅是为了合规。This application can always be online to play its value and maintain a normalized basic level of security, not just for compliance.
由于申请了产品的部署使用难度,从而降低了部署使用成本,大中小客户也可以使用,从而进一步摊销成本,提升客户价值。本申请的内生安全,跟随基础设施预算,无需单独立项采购安全设备。本申请的技术方案具有通用的基本安全属性,解决定制化问题。By reducing the difficulty of deploying and using the product, the application reduces deployment costs and enables adoption by both large and small customers, further amortizing costs and increasing customer value. The inherent security of this application is integrated into the infrastructure budget, eliminating the need for separate security equipment procurement. This application's technical solution possesses universal basic security attributes, addressing customization issues.
本申请通过自动化关联部署,降低对交付部署、运营维护人员依赖,从而降低部署成本。本申请针对IP通信体系的开放性会导致攻击点、面广泛存在,在传输、信息处理网元设备上执行策略控制、每一个传输信息处理网元都是策略执行点,从而构筑立体防御,将企业、园区、数据中心等网络构筑成只有正常业务的流量能够通过的网络(通过认证和溯源能力来保障)。This application reduces the reliance on delivery, deployment, and operation and maintenance personnel through automated associated deployment, thereby reducing deployment costs. This application addresses the openness of IP communication systems, which can lead to a wide range of attack points and surfaces. It implements policy control on transmission and information processing network element devices, and each transmission and information processing network element is a policy execution point, thereby building a three-dimensional defense, and constructing enterprise, park, data center and other networks into networks through which only normal business traffic can pass (guaranteed by authentication and traceability capabilities).
本申请将网络设备的控制转发能力和认证授权体系通过策略控制器联动起来,在每一个网络信息处理单元上封闭了攻击流量的道路,使攻击流量难以打穿网络,从而有力的保护了业务、网络和数据等资产。This application links the control and forwarding capabilities of network devices with the authentication and authorization system through a policy controller, blocking the path of attack traffic on each network information processing unit, making it difficult for attack traffic to penetrate the network, thereby effectively protecting assets such as business, network and data.
本申请使用传输网元,而不是另外加很多外挂安全设备的形式,在开放IP的体系上根据业务属性构筑成相对封闭的网络,传输网元既可以一直跟随开放IP网络设备能力的发展而持续发展,又可以在业务属性明确的网络中解决开放网络带来的防护成本高的问题,从而实现内生安全的方案。This application uses transmission network elements, rather than adding a lot of external security devices, to build a relatively closed network based on business attributes on an open IP system. The transmission network elements can not only continue to develop along with the development of open IP network equipment capabilities, but also solve the problem of high protection costs brought by open networks in networks with clear business attributes, thereby realizing an endogenous security solution.
同时为了便于过渡和实施,本申请还设计了自动学习和防护的补充技术。At the same time, in order to facilitate transition and implementation, this application also designs supplementary technologies for automatic learning and protection.
本申请通过使交换机、路由器等传输网元仅转发正常业务数据流,不转发其他数据流,过滤掉非法的访问,从而消除各种安全风险的技术方案。This application provides a technical solution that eliminates various security risks by enabling transmission network elements such as switches and routers to only forward normal business data streams and not forward other data streams, thereby filtering out illegal access.
本申请以传统的交换机、路由器的分布式路由器计算为基础,并叠加了SDN功能,如果SDN控制器失效后,仍然可以以传统交换、路由网络的形式运行。This application is based on the distributed router computing of traditional switches and routers, and superimposed with SDN functions. If the SDN controller fails, it can still operate in the form of a traditional switching and routing network.
本申请解决了因IP网络的开放性,导致自身安全防护能力低,需外挂大量安全防护设施,效果差、成本高,难以形成低成本的安全防护能力,导致易攻难守的技术问题。This application solves the technical problem that due to the openness of IP networks, their own security protection capabilities are low, a large number of external security protection facilities are required, the effect is poor and the cost is high, it is difficult to form low-cost security protection capabilities, and it is easy to attack but difficult to defend.
图1为背景技术的传统网络安全架构数据流示意图;FIG1 is a schematic diagram of a data flow of a traditional network security architecture of background technology;
图2为背景技术的信息安全技术网络安全等级保护安全设计技术要求的架构图;FIG2 is an architectural diagram of the technical requirements for security design of information security technology network security level protection in the background technology;
图3为背景技术的美军JIE框架图;FIG3 is a JIE framework diagram of the U.S. military in the background art;
图4为背景技术的美军JIE中的SCCA安全云计算架构示意图;FIG4 is a schematic diagram of the SCCA secure cloud computing architecture in the U.S. military JIE of the background technology;
图5为背景技术的ZTA架构图;FIG5 is a ZTA architecture diagram of background technology;
图6为背景技术的拟态防御技术-动态异构冗余构造内生安全机制图;FIG6 is a diagram of the inherent security mechanism of the background technology of mimicry defense technology - dynamic heterogeneous redundant construction;
图7为背景技术的NAC典型组网图;FIG7 is a typical NAC networking diagram of the background technology;
图8为本申请实施例1的内生安全网络方法基本步骤示意图;FIG8 is a schematic diagram of the basic steps of the endogenous security network method of Example 1 of the present application;
图9为本申请实施例1的内生安全网络方法采用认证授权方式的具体实施流程示意图;FIG9 is a schematic diagram of a specific implementation process of the endogenous security network method using the authentication and authorization method in Example 1 of the present application;
图10为本申请实施例1的业务特征数据流绑定转发逻辑架构示意图;FIG10 is a schematic diagram of the logical architecture of binding and forwarding service feature data streams according to Example 1 of the present application;
图11为本申请实施例1的用户访问某业务的认证授权及转发流程示意图;FIG11 is a schematic diagram of the authentication, authorization and forwarding process for a user to access a service in Example 1 of the present application;
图12为本申请实施例1的传输单元基于转发表和ACL进行业务报文处理步骤示意图;12 is a schematic diagram of steps for processing service packets based on a forwarding table and an ACL by a transmission unit in Example 1 of the present application;
图13为本申请实施例1的通过自动学习,将正常业务数据流绑定到转发表和白名单具体步骤示意图;FIG13 is a schematic diagram of specific steps for binding normal service data flows to a forwarding table and a whitelist through automatic learning in Example 1 of the present application;
图14为本申请实施例2的内生安全网络架构基本结构示意图;FIG14 is a schematic diagram of the basic structure of the endogenous security network architecture of Example 2 of the present application;
图15为本申请实施例2的内生安全的弹性网络数据效果流示意图;FIG15 is a schematic diagram of the data effect flow of the elastic network with inherent security according to Example 2 of the present application;
图16为本申请实施例2的内生安全网络架构逻辑架构图;FIG16 is a logical architecture diagram of the endogenous security network architecture of Example 2 of the present application;
图17为本申请实施例3的内生安全网络架构实际部署示意图;FIG17 is a schematic diagram of the actual deployment of the endogenous security network architecture of Example 3 of the present application;
图18为本申请实施例3的传输网元基本模块示意图;FIG18 is a schematic diagram of a basic module of a transmission network element according to Example 3 of the present application;
图19为本申请实施例3的内生安全网络安全策略服务器功能模块示意图;FIG19 is a schematic diagram of the functional modules of the endogenous security network security policy server of Example 3 of the present application;
图20为本申请实施例3的自学习方法工作流程图;FIG20 is a flowchart of the self-learning method of Example 3 of the present application;
图21为本申请实施例3的主机终端、应用服务器业务单元异常报文上报流程示意图;FIG21 is a schematic diagram of the abnormal message reporting process of the host terminal and the application server business unit in Example 3 of the present application;
图22a为本申请实施例3的MA地址库集中式分布式存放示意图;FIG22a is a schematic diagram of the centralized distributed storage of the MA address library according to Example 3 of the present application;
图22b为本申请实施例3的向MAC地址库添加MAC地址的几种方式示意图;FIG22 b is a schematic diagram of several methods of adding a MAC address to a MAC address database according to Example 3 of the present application;
图22c为本申请实施例3的MAC地址库自学习流程示意图;FIG22 c is a schematic diagram of the MAC address library self-learning process in Example 3 of the present application;
图22d为本申请实施例3的防止非自有设备接入流程示意图;FIG22 d is a schematic diagram of a process for preventing non-owned devices from accessing the system according to Example 3 of the present application;
图23为本申请实施例3的交换机快速启动转发、缓存表项写入和读出示意图。FIG23 is a schematic diagram of fast-start forwarding, cache entry writing, and reading of a switch in Example 3 of the present application.
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。To make the purpose, technical solutions, and advantages of the embodiments of this application more clear, the technical solutions in the embodiments of this application will be clearly and completely described below in conjunction with the embodiments of this application. Obviously, the described embodiments are part of the embodiments of this application, not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by ordinary technicians in this field without making creative efforts are within the scope of protection of this application.
实施例1Example 1
如图8所示,本申请提供的内生安全网络方法,其基本步骤包括但不限于:As shown in FIG8 , the basic steps of the endogenous security network method provided by this application include but are not limited to:
S1、提取正常业务数据流的转发特征信息;S1. Extract forwarding feature information of normal business data flow;
在本实施例中,转发特征信息包括但不限于:源IP、目的IP、目的端口、IP协议类型、源端口、协议等5元组信息,此外,在本实施例中支持的信息提取还包括例如:目的MAC、源MAC、以太网类型、VLAN ID、VLAN优先级、IP服务类型、以及应用层的关键字段。In this embodiment, forwarding feature information includes but is not limited to 5-tuple information such as source IP, destination IP, destination port, IP protocol type, source port, and protocol. In addition, the information extraction supported in this embodiment also includes, for example, destination MAC, source MAC, Ethernet type, VLAN ID, VLAN priority, IP service type, and key fields of the application layer.
S2、将正常业务数据流的转发信息下发到传输网元;S2. Send forwarding information of normal service data flow to the transmission network element;
在本实施例中,将正常业务数据流的特征信息下发到传输网元,形成转发表项、流表或者转发白名单,在本实施例中,可为例如:MAC表、FIB表、流表、基于ACL、用户定义列表UDL的白名单;In this embodiment, the characteristic information of the normal service data flow is sent to the transmission network element to form a forwarding table, a flow table or a forwarding whitelist. In this embodiment, it can be, for example, a MAC table, a FIB table, a flow table, a whitelist based on an ACL or a user-defined list (UDL).
S3、传输网元依据正常业务数据流的特征信息进行报文转发;S3, the transmission network element forwards the message based on the characteristic information of the normal service data flow;
在本实施例中,由于前述步骤S2已根据正常业务数据流的特征下发了转发表项、流表或者白名单,故在有正常业务数据报文到达交换机、路由器、网关等传输网元时,前述传输网元会依据相应表项进行正常报文的转发;In this embodiment, since the forwarding table entries, flow table or whitelist have been issued according to the characteristics of the normal service data flow in the aforementioned step S2, when a normal service data packet arrives at a transmission network element such as a switch, router, or gateway, the aforementioned transmission network element will forward the normal packet according to the corresponding table entry;
S4、非正常业务数据流报文丢弃。S4. Abnormal business data flow packets are discarded.
在本实施例中,由于默认策略是不转发报文,所以到达交换机、路由器、网关等传输网元的没有形成表项的非正常数据报文会被丢弃掉,在本实施例中,路由协议报文会根据交换、路由器的配置文件自动生成白名单,是可以转发的,在本实施例中,报文包括但不限于:路由协议。在本实施例中,除正常业务报文外,还有部分控制面的相关报文需要转发,包括但不限于:路由协议报文,前述报文可采用组播地址,其中,部分报文的内容包括自身的协议类型,例如:OSPF报文的协议类型是89,IGMP是2;In this embodiment, since the default policy is not to forward messages, abnormal data messages that do not form table entries and arrive at transmission network elements such as switches, routers, and gateways will be discarded. In this embodiment, routing protocol messages will automatically generate a whitelist based on the configuration files of switches and routers, and can be forwarded. In this embodiment, messages include but are not limited to: routing protocols. In this embodiment, in addition to normal business messages, some control plane related messages need to be forwarded, including but not limited to: routing protocol messages. The aforementioned messages can use multicast addresses, where the content of some messages includes their own protocol type, for example: the protocol type of OSPF messages is 89, and that of IGMP is 2;
在本实施例中,NAC在认证通过后,将在接入控制设备上将访问控制端口打开,认证通过的终端可以访网络内的服务器和其他终端,还存在横向流量和其他纵向流量的转发能力和可能,所以,如果被0Day攻击等恶意软件感染后,可以在网络内横向和纵向传播;相对于前述方案,本申请的方法与NAC的区别还在于,将正常的业务流量特征和传输网元的转发表、流表、白名单进行绑定,仅能转发正常业务数据流,传输网元不能转发非正常业务数据流,而且是可以在全部传输网元上进行生效,而不仅仅是接入控制设备,因此,本申请能够隔离主机终端对非授权服务、资源及其他终端的访问,因此,避免了垃圾流量和恶意流量的存在。In this embodiment, after authentication, NAC opens the access control port on the access control device. Authenticated terminals can access servers and other terminals within the network. There is also the ability and possibility to forward lateral and vertical traffic. Therefore, if infected by malware such as zero-day attacks, it can spread horizontally and vertically within the network. Compared with the aforementioned solutions, the method of the present application also differs from NAC in that it binds normal service traffic characteristics to the forwarding table, flow table, and whitelist of the transmission network element. Only normal service data flows can be forwarded, and the transmission network element cannot forward abnormal service data flows. Moreover, it can be effective on all transmission network elements, not just the access control device. Therefore, the present application can isolate the host terminal from accessing unauthorized services, resources, and other terminals, thereby avoiding the existence of junk traffic and malicious traffic.
如图9所示,在本实施例中,业务数据流转发特征绑定传输网元转发表项方法,还包括以下采用认证授权方式的具体实施流程:As shown in FIG9 , in this embodiment, the method for binding service data flow forwarding characteristics to transmission network element forwarding entries further includes the following specific implementation process using authentication and authorization:
S1’、主机终端发起对特定服务器、资源的访问请求;S1’, the host terminal initiates an access request to a specific server and resource;
S2’、进行认证和授权处理;S2’, perform authentication and authorization processing;
在本实施例中,报文会被传输网元发送到认证、授权服务器进行授权认证;In this embodiment, the message will be sent by the transmission network element to the authentication and authorization server for authorization and authentication;
S3’、判断授权是否成功;S3’, determine whether the authorization is successful;
S4’、若否,则传输网元丢弃报文;S4', if not, the transmission network element discards the message;
在本实施例中,非正常业务报文默认不转发;In this embodiment, abnormal service messages are not forwarded by default;
S5’、若是,则提取授权成功的业务数据流转发特征;S5', if yes, extract the service data flow forwarding characteristics of successful authorization;
在本实施例中,前述业务访问请求如果授权成功,自动提取正常业务数据流的转发特征信息,在本实施例中,前述转发特征信息包括但不限于:5元组信息,包括:源IP、目的IP、目的端口、IP协议类型、源端口、协议。In this embodiment, if the aforementioned service access request is authorized successfully, the forwarding characteristic information of the normal service data flow is automatically extracted. In this embodiment, the aforementioned forwarding characteristic information includes but is not limited to: 5-tuple information, including: source IP, destination IP, destination port, IP protocol type, source port, and protocol.
S6’、将转发流特征下发到传输网元;S6', sending the forwarding flow characteristics to the transmission network element;
在本实施例中,将正常业务数据流的特征信息下发到传输网元,传输网元的控制面CPU接收正常业务数据流的特征信息,在本实施例中,传输网元包括但不限于:交换机、路由器以及网关;In this embodiment, the characteristic information of the normal service data flow is sent to the transmission network element, and the control plane CPU of the transmission network element receives the characteristic information of the normal service data flow. In this embodiment, the transmission network element includes but is not limited to: a switch, a router, and a gateway;
S7’、传输网元生成转发表项、ACL白名单;S7’, the transmission network element generates forwarding entries and ACL whitelist;
在本实施例中,传输网元的控制平面CPU形成发正常业务数据流的转发表项、流表、转发白名单,可为例如:MAC表、FIB表、流表、基于ACL、用户定义列表UDL的白名单,并下发到转发平面;In this embodiment, the control plane CPU of the transport network element forms a forwarding table entry, a flow table, and a forwarding whitelist for normal service data flows, which may be, for example, a MAC table, a FIB table, a flow table, a whitelist based on an ACL or a user-defined list (UDL), and sends it to the forwarding plane.
S8’、传输网元转发授权成功的业务数据流。S8’, the transmission network element forwards the service data flow that is successfully authorized.
在本实施例中,如果传输网元接收到授权成功的业务数据流报文,根据转发表项、白名单来转发正常业务报文。In this embodiment, if the transmission network element receives a service data flow message that is successfully authorized, it forwards the normal service message according to the forwarding table entry and the whitelist.
如图10所示,在本实施例中,业务特征数据流绑定转发逻辑架构包括但不限于:主机终端模块、传输转发模块、业务资源模块、转发特征提取模块、认证授权模块、自学习模块;As shown in FIG10 , in this embodiment, the service feature data flow binding forwarding logic architecture includes but is not limited to: a host terminal module, a transmission forwarding module, a service resource module, a forwarding feature extraction module, an authentication and authorization module, and a self-learning module;
在本实施例中,前述传输转发模块与主机终端模块、业务资源模块、转发特征提取模块相连,转发特征提取模块与自学习模块、认证授权模块、传输转发模块相连;In this embodiment, the transmission forwarding module is connected to the host terminal module, the service resource module, and the forwarding feature extraction module, and the forwarding feature extraction module is connected to the self-learning module, the authentication and authorization module, and the transmission forwarding module;
在本实施例中的主机终端模块访问业务资源模块时,转发特征提取模块在认证授权模块或自学习模块的帮助下,提取访问数据流的转发特征信息并下发到传输转发模块进行流表或转发表、ACL表的绑定后,传输转发模块就可以转发正常访问的数据报文;在本实施例中,没有绑定表项的非正常数据报文不会被转发,能够防范恶意流量的转发,达到了隔离防护的效果。When the host terminal module in this embodiment accesses the business resource module, the forwarding feature extraction module, with the help of the authentication and authorization module or the self-learning module, extracts the forwarding feature information of the access data flow and sends it to the transmission forwarding module for binding the flow table or forwarding table and ACL table. After that, the transmission forwarding module can forward the data packets with normal access. In this embodiment, abnormal data packets without binding table entries will not be forwarded, which can prevent the forwarding of malicious traffic and achieve the effect of isolation and protection.
如图11所示,在本实施例中,传输网元基于转发表和ACL进行业务报文处理流程包括:As shown in FIG11 , in this embodiment, the process of a transmission network element processing a service message based on a forwarding table and an ACL includes:
S101、主机端发起对应用服务器及各类资源访问;S101, the host initiates access to the application server and various resources;
S102、传输网元检查转发表和黑白名单列表;S102, the transmission network element checks the forwarding table and the blacklist and whitelist;
S103、当待转发报文在黑名单中,则丢弃;S103: If the message to be forwarded is in the blacklist, it is discarded;
S104、当待转发报文在转发表且在白名单中,则转发;S104. If the message to be forwarded is in the forwarding table and in the whitelist, forward it;
S105、待转发报文在白名单中但不在转发表中,则建转发表并转发;S105: If the message to be forwarded is in the whitelist but not in the forwarding table, a forwarding table is created and forwarded;
S106、待转发报文不在转发表且不在黑、白名单中,则通过控制平面将待转发报文转发到安全网络控制器;S106: If the message to be forwarded is not in the forwarding table and is not in the blacklist or whitelist, the message to be forwarded is forwarded to the security network controller through the control plane;
S107、安全网络控制器将待转发报文转发到身份认证授权审计服务器;S107, the security network controller forwards the message to be forwarded to the identity authentication authorization audit server;
S108、身份认证授权审计服务器认证通过并根据授权策略授权可以访问网络并将访问策略发给安全网络控制器;S108, the identity authentication and authorization audit server authenticates and authorizes the user to access the network according to the authorization policy and sends the access policy to the security network controller;
S109、安全网络控制器将访问策略加入白名单并下发到传输网元;S109. The security network controller adds the access policy to the whitelist and sends it to the transmission network element;
S1010、传输网元生成相应的转发表项;S1010. The transmission network element generates a corresponding forwarding table entry;
S1011、当待转发报文在转发表中,但不在黑名单和白名单中时,将前述情形判定属于灰名单,可预定义默认处理策略,根据策略定义处理;S1011. When the message to be forwarded is in the forwarding table but not in the blacklist or whitelist, the above situation is determined to belong to the gray list, and a default processing policy can be predefined and processed according to the policy definition;
S1012、当灰名单不转发时,通过控制面上报异常到安全网络控制器并丢弃待转发报文;S1012. When the gray list does not forward the message, report the exception to the security network controller through the control plane and discard the message to be forwarded;
S1013、当灰名单转发时,通过控制面上报异常到安全网络控制器并按转发表转发待转发报文;S1013. When the gray list is forwarded, the abnormality is reported to the security network controller through the control plane and the message to be forwarded is forwarded according to the forwarding table;
S1014、灰名单报文由控制面处理后判定如何处理,通过控制面上报异常到安全网络控制器并将待转发报文发送到安全网络控制器进行处理;S1014. The control plane processes the graylist message and determines how to handle it. The control plane reports the exception to the security network controller and sends the message to be forwarded to the security network controller for processing.
S1015、安全网络控制器综合各种策略信息将灰名单转换为特定操作,在本实施例中,前述特定操作包括:白名单、黑名单、删除等。S1015. The security network controller integrates various policy information to convert the gray list into specific operations. In this embodiment, the specific operations include: white list, black list, deletion, etc.
在本实施例中,将交换机、路由器的转发表项、ACL、流表利用到细粒度的业务流的访问控制,通过加密、认证、授权或自学习来保证仅发送正常业务数据流,避免非正常的纵向和横向数据流,降低安全风险,同时避免大量计算力的消耗及对正常业务造成的延迟影响。In this embodiment, the forwarding table entries, ACLs, and flow tables of switches and routers are utilized for fine-grained access control of business flows. Encryption, authentication, authorization, or self-learning are used to ensure that only normal business data flows are sent, avoiding abnormal vertical and horizontal data flows, reducing security risks, and avoiding the consumption of large amounts of computing power and the delay impact on normal business.
参见图11,在本实施例图中的蓝色框部分,不仅返回授权成功,还会通过查DNS等方式,获取授权访问对象的转发业务特征,通常是IP地址、IP协议、端口号等信息,并且还可以做进一步的安全审查后,将正常访问的业务数据流特征返回。在本实施例中,授权访问对象包括但不限于:服务器、资源。图中绿框部分的流程,也不仅仅是将接入设备的端口打开,而是根据授权访问的数据流的特征下发到接入控制设备,更进一步可以在全路径的所有传输网元形成相应的表项和白名单等。图11的浅蓝色框中,进一步的可以控制主机终端和被访问服务器的访问控制,这样达到了全路径、端到端的数据转发控制,从而形成一条正常数据流的通路,其他非正常数据流是没有通路的,因此,垃圾流和恶意流量是无法在网络中转发的。Referring to Figure 11, in the blue box part of the figure in this embodiment, not only the authorization success is returned, but also the forwarding service characteristics of the authorized access object are obtained by checking DNS and other methods, usually the IP address, IP protocol, port number and other information, and the business data flow characteristics of normal access can be returned after further security review. In this embodiment, the authorized access objects include but are not limited to: servers and resources. The process of the green box part in the figure is not just to open the port of the access device, but to send it to the access control device based on the characteristics of the authorized access data flow, and further to form corresponding entries and whitelists in all transmission network elements along the entire path. In the light blue box of Figure 11, the access control of the host terminal and the accessed server can be further controlled, so that the full-path, end-to-end data forwarding control is achieved, thereby forming a path for normal data flow, and other abnormal data flows have no path. Therefore, junk flow and malicious traffic cannot be forwarded in the network.
如图12所示,在本实施例中,相对于支持流表的SDN交换机,传统交换机可以使用转发表和ACL表配合的形式,来进行转发控制,参见图12,图中展示了传输单元基于转发表和ACL进行业务报文处理的具体流程。图12中主机终端发起对应用服务器及各类资源访问,传输网元的处理过程包括但不限于:传输网元会会分不同情况处理,在本实施例中,前述处理可采用不同的顺序,检查待转发数据报文特征是否在黑名单中,如果在黑名单中,则直接丢弃数据,如果在转发表项中,且在转发白名单中,则转发数据,如果在白名单中但不在转发表中,则建转发表并转发,在本实施例中,可以报安全网络控制器,由其下发建转发表指令后再转发报文。如果不在转发表且不在黑、白名单中,则将数据通过控制平面发送到安全网络控制器将报文转发到身份认证授权审计服务器,身份认证授权审计服务器认证通过并根据授权策略判断可以访问网络反馈给安全网络控制器,安全网络控制器将访问策略加入白名单并下发到传输网元,在本实施例中,前述传输网元是逻辑概念,可能对应多个,安全网络控制器上有全域交换、路由信息,可以在相关网元上都下发白名单策略;在本实施例中,如果认证不通过,可以丢弃处理,发现同一个主机终端的多次频繁认证行为,可以进行预警提示。如果发现是恶意终端,可以直接加入黑名单。As shown in Figure 12, in this embodiment, compared to SDN switches that support flow tables, traditional switches can use a forwarding table and an ACL table to perform forwarding control. See Figure 12, which shows the specific process of the transmission unit processing service messages based on the forwarding table and ACL. In Figure 12, the host terminal initiates access to the application server and various resources. The processing process of the transmission network element includes but is not limited to: the transmission network element will process different situations. In this embodiment, the above-mentioned processing can be carried out in different orders, checking whether the characteristics of the data message to be forwarded are in the blacklist. If it is in the blacklist, the data is directly discarded. If it is in the forwarding table item and in the forwarding whitelist, the data is forwarded. If it is in the whitelist but not in the forwarding table, a forwarding table is established and forwarded. In this embodiment, the security network controller can be reported to issue a forwarding table establishment instruction before forwarding the message. If the data is not in the forwarding table and is not on the blacklist or whitelist, the data is sent to the security network controller through the control plane, which forwards the message to the identity authentication and authorization audit server. The identity authentication and authorization audit server passes the authentication and determines that it can access the network based on the authorization policy, and then feeds it back to the security network controller. The security network controller adds the access policy to the whitelist and sends it to the transmission network element. In this embodiment, the aforementioned transmission network element is a logical concept and may correspond to multiple. The security network controller has global switching and routing information, and can send whitelist policies to all relevant network elements. In this embodiment, if the authentication fails, it can be discarded. If multiple frequent authentication behaviors of the same host terminal are found, an early warning prompt can be issued. If it is found to be a malicious terminal, it can be directly added to the blacklist.
在本实施例中,身份认证授权审计服务器认证包括但不限于:双向认证、单向认证;In this embodiment, the identity authentication authorization audit server authentication includes but is not limited to: two-way authentication, one-way authentication;
在本实施例中,基于业务白名单的安全网络,整个网络仅允许明确的业务报文通过,非明确的业务报文都被丢弃,从而成为一个立体的封闭的业务网络。In this embodiment, the security network based on the service whitelist only allows clear service messages to pass through the entire network, and all unclear service messages are discarded, thereby forming a three-dimensional closed service network.
在本实施例中,为了适应性和弹性,加入灰名单机制。在本实施例中,灰名单策略是可以定义的,默认灰名单不转发并上报异常。也可以定义为灰名单报文上送控制面处理,控制面根据相应策略和信息将灰名单变为白名单、黑名单、删除。灰名单的定义方式可以有多种,如表2所示是直接定义一个专门的灰名单列表类型,此列表类型可以转化为白名单或黑名单。因此,采用方案中采用了动态白名单、动态黑名单及灰名单机制,通过动态刷新业务白名单,做到有授权才能访问,而明确的威胁IP、URL加入黑名单,禁止访问。In this embodiment, a graylist mechanism is added for adaptability and flexibility. In this embodiment, the graylist policy can be defined, and the default graylist does not forward and reports exceptions. It can also be defined as sending the graylist message to the control plane for processing, and the control plane changes the graylist into a whitelist, blacklist, or deletes it according to the corresponding policy and information. There are many ways to define a graylist. As shown in Table 2, a special graylist list type is directly defined, and this list type can be converted into a whitelist or a blacklist. Therefore, the scheme adopts a dynamic whitelist, dynamic blacklist and graylist mechanism. By dynamically refreshing the business whitelist, access is only allowed with authorization, and clear threat IPs and URLs are added to the blacklist and access is prohibited.
下表2中在ACL表中添加了状态标志,来区分是黑名单、白名单、灰名单。状态11表示白名单,状态00表示黑名单,状态10表示灰名单。Table 2 below adds status flags to the ACL table to distinguish between blacklist, whitelist, and graylist. Status 11 indicates whitelist, status 00 indicates blacklist, and status 10 indicates graylist.
表2
Table 2
在本实施例中,还包括隐性灰名单方式,图12中是将在转发表项中,但不在白名单也不在黑名单的定义为灰名单,灰名单默认策略可定义,可将报文转发到策略管理部件然后与业务单元对接,确认其是否符合业务需求,确认正确后下发到白名单,并转发报文,如果不正确就丢弃报文,并且下发到黑名单。In this embodiment, an implicit grey list method is also included. FIG12 defines the grey list as an entry in the forwarding table but not in the white list or the black list. The grey list default policy can be defined. The message can be forwarded to the policy management component and then connected to the business unit to confirm whether it meets the business requirements. After confirmation, it is sent to the white list and the message is forwarded. If it is incorrect, the message is discarded and sent to the black list.
在本实施例中,前述转发表包括但不限于:交换机的基于MAC、vlan的二层转发表、基于路由的三层转发表,以及基于5元组甚至更多元信息的转发表。在本实施例中,黑名单、白名单、灰名单的形式包括但不限于:MAC、VLAN、IP、Port及相应组合。在本实施例中,访问控制策略可以在session结束时,应用业务服务器或业务代理网关通知策略服务器将访问控制列表删除,还可采用例如:通过老化机制自动删除掉,对内部频繁的访问业务,也可以使用长生命周期策略,以减轻持续认证分析和频发下发表项的压力。In this embodiment, the aforementioned forwarding table includes, but is not limited to, a switch's Layer 2 forwarding table based on MAC and VLAN, a route-based Layer 3 forwarding table, and a forwarding table based on 5-tuples or even more tuples. In this embodiment, the forms of blacklists, whitelists, and graylists include, but are not limited to, MAC, VLAN, IP, Port, and corresponding combinations. In this embodiment, the access control policy can be such that at the end of a session, the application server or service proxy gateway notifies the policy server to delete the access control list. It can also be automatically deleted, for example, through an aging mechanism. For frequently accessed internal services, a long lifecycle policy can also be used to reduce the pressure of continuous authentication analysis and frequent entry downloads.
在本实施例中,进一步的访问控制策略可以下发到应用服务器和主体终端侧,将非授权端口都关闭掉,从而也大大缩小了应用服务器和主机的暴露风险。In this embodiment, further access control policies can be issued to the application server and the main terminal side to close all unauthorized ports, thereby greatly reducing the exposure risk of the application server and the host.
在本实施例中,通过在转发网元上进行访问控制,形成仅有认证授权通过的真实业务需求的报文才能转发,非授权和黑名单报文不能通过,包括内部互访流量,外部访问内部,也包括,内部访问互联网的流量,都纳入认证授权和访问控制机制,这样形成了一个严格的转发控制面,企业内部网络不再是一个开放的网络,而是严密的访问控制的网络,这样外面的攻击流量进不来,难以对内部机器进行感染,即使是有漏洞,也难以利用,里面的流量也进行了监控,如果有感染扫描等行为,立即能够发现,消除了内部的肉鸡、木马、病毒。本申请能够提高攻击成本、降低防护成本,抑制黑色产业链的形成。在本实施例中,互联网内容的访问,可以采用访问白名单;使用由云端威胁分析服务器形成的基于url、IP的内容分类、安全分机制,辅助进行访问过滤和控制;配合其他的安全过滤手段来做访问控制。In this embodiment, access control is performed on the forwarding network element, ensuring that only messages with genuine business needs that have passed authentication and authorization can be forwarded. Unauthorized and blacklisted messages cannot pass through. This includes internal traffic, external traffic to the internal network, and internal traffic to the Internet. All traffic is included in the authentication, authorization, and access control mechanisms. This creates a strict forwarding control plane, and the enterprise's internal network is no longer an open network, but a network with strict access control. This prevents external attack traffic from entering and infecting internal machines. Even if there are vulnerabilities, they are difficult to exploit. Internal traffic is also monitored, and any infection scanning or other activities can be immediately detected, eliminating internal botnets, Trojans, and viruses. This application can increase attack costs, reduce protection costs, and curb the formation of a black market industry. In this embodiment, access to Internet content can be controlled by using an access whitelist; a content classification and security classification mechanism based on URLs and IP addresses, generated by a cloud-based threat analysis server, is used to assist in access filtering and control; and access control is performed in conjunction with other security filtering methods.
在本实施例中,转发平面通过自动部署cp-car、IP+MAC+端口绑定防范地址仿冒类攻击和DDoS流量攻击控制面,在本实施例中,防范地址仿冒类攻击和DDoS流量攻击控制面包括但不限于:DHCP snooping、radius snooping、IGMP snooping。在本实施例中,默认启用ARP攻击防护。本申请通过关联自动部署,能够简化部署难度,提升防攻击能力,替换了传统技术采用的手动部署方式。In this embodiment, the forwarding plane automatically deploys CP-CAR and IP+MAC+port binding to protect against address spoofing attacks and DDoS traffic attacks. In this embodiment, the control plane protection against address spoofing attacks and DDoS traffic attacks includes, but is not limited to, DHCP snooping, RADIUS snooping, and IGMP snooping. In this embodiment, ARP attack protection is enabled by default. By associating automatic deployment, this application simplifies deployment and improves attack prevention capabilities, replacing the manual deployment method used in traditional technologies.
在本实施例中,转发网元分布式部署,STP、RSTP、MSTP、ERPS等协议可以防环,路由协议进行网络拓扑的自动发现,具有很高的自愈能力,而安全网络控制器拥有全网的转发信息,可以做转发优化,并将相应的转发信息下发到相应网元,因此,此种网络结构即具有集中式的全网优化能力,又具有分布式的自愈能力,具有很强的弹性,即使安全控制器故障,依然能进行分布式的路由和转发,安全网络控制器最好是冗余部署,可以双机备份,甚至是多机分布式部署,进一步提升网络的弹性能力。In this embodiment, forwarding network elements are deployed in a distributed manner, protocols such as STP, RSTP, MSTP, and ERPS can prevent loops, and the routing protocol automatically discovers the network topology and has a high self-healing ability. The security network controller has the forwarding information of the entire network, can perform forwarding optimization, and send the corresponding forwarding information to the corresponding network elements. Therefore, this network structure has both centralized full-network optimization capabilities and distributed self-healing capabilities, and has strong elasticity. Even if the security controller fails, distributed routing and forwarding can still be performed. The security network controller is preferably deployed redundantly, with dual-machine backup or even multi-machine distributed deployment to further enhance the network's elasticity.
如图13所示,在本实施例中,业务数据流转发特征绑定传输网元转发表项方法,还包括以下的通过自动学习,将正常业务数据流绑定到转发表和白名单的方式,该方式的具体实施流程包括:As shown in FIG13 , in this embodiment, the method for binding service data flow forwarding characteristics to transmission network element forwarding table entries further includes the following method of binding normal service data flows to the forwarding table and whitelist through automatic learning. The specific implementation process of this method includes:
S1”、传输网元正常运行自动生成各种表项;在本实施例中,前述表项包括但不限于:MAC表、FIB表、ARP表;S1", the normal operation of the transmission network element automatically generates various table entries; in this embodiment, the aforementioned table entries include but are not limited to: MAC table, FIB table, ARP table;
S2”、每隔一定时间读取各表项数据,并存入临时表,在本实施例中,前述间隔时间可设为例如:60秒;S2”, read the data of each table item at a certain interval and store it in a temporary table. In this embodiment, the above-mentioned interval can be set to, for example, 60 seconds;
在本实施例中,每隔一定时间读取各中表项数据,并存入临时表中,此临时表可以是分布式存放在传输网元的内存、flash、SSD、硬盘等媒介中,也可以是集中式的存放于控制面的服务器中,例如安全网络控制器,这里的集中式存放是相对于传输网元来说的,控制面的服务器也可以是双机或多机冗余分布的,在本实施例中,前述间隔时间可设为例如:60秒;In this embodiment, the data of each table entry is read at regular intervals and stored in a temporary table. This temporary table can be distributed and stored in a medium such as the memory, flash, SSD, or hard disk of the transmission network element, or can be centrally stored in a control plane server, such as a security network controller. The centralized storage here refers to the transmission network element. The control plane server can also be redundantly distributed on two or more machines. In this embodiment, the aforementioned interval can be set to, for example, 60 seconds.
S3”、达到学习时间;在本实施例中,前述学习时间可为例如:12小时;S3”, the learning time is reached; in this embodiment, the learning time may be, for example, 12 hours;
S4”、在达到学习时间时,形成转发基线数据库;S4”, when the learning time is reached, a forwarding baseline database is formed;
S5”、在达到学习时间时,传输网元切换为基线控制方式;S5”, when the learning time is reached, the transmission network element switches to the baseline control mode;
在本实施例中,在达到设定的学习时间后,形成转发基线数据库,基线数据库可以分布式存储在传输网元的内存、flash、SSD存储中,也可以集中式存储在服务其中,例如安全控制器,传输网元切换为基线控制模式,后续的转发表项生成时要去查询基线数据库,在基线数据库里查找到的表项信息,才会在转发层面添加相应的转发表项;In this embodiment, after the set learning time is reached, a forwarding baseline database is formed. The baseline database can be distributedly stored in the memory, flash, or SSD storage of the transmission network element, or centrally stored in a service, such as a security controller. When the transmission network element switches to the baseline control mode, the baseline database must be queried when subsequent forwarding entries are generated. Only when the entry information found in the baseline database is added to the corresponding forwarding entry at the forwarding layer;
S6”、在未达到学习时间时,跳转执行前述步骤S2”;S6”, when the learning time has not been reached, jump to execute the above step S2”;
在本实施例中,在未达到设定的学习时间时,一直执行每间隔一定时间读取各项表项并存入临时表的动作,不同的业务发生的时间也不同,通常表项又有老化机制,因此,每次获取的MAC表、FIB表、ARP表通常并不一样,通过一段时间,例如12个小时内的多次的循环学习,能够将正常业务访问产生过的表项都记录在临时表中,宜将间隔时间设定的小于等于老化时间,这样获取的表项更全面;In this embodiment, if the set learning time has not been reached, the operation of reading each entry and storing it in the temporary table is continuously performed at a certain interval. Different services occur at different times, and the entries usually have an aging mechanism. Therefore, the MAC table, FIB table, and ARP table obtained each time are usually different. By repeatedly learning over a period of time, such as multiple times within 12 hours, all entries generated by normal service access can be recorded in the temporary table. It is preferable to set the interval to be less than or equal to the aging time to obtain more comprehensive entries.
S7”、利用传输网元以基线数据转发报文;S7”, using the transmission network element to forward the message with the baseline data;
在本实施例中,进行异常报文判断,可以是和其他部件结合的自动判断,也可以是人工确认,如果是非正常业务报文做丢弃处理,并做log记录,如果判定是新增的正常的业务数据报文,则将报文转发信息加入基线数据库中,从而更新业务基线数据库;In this embodiment, abnormal message judgment can be performed automatically in conjunction with other components or manually confirmed. If it is an abnormal service message, it is discarded and logged. If it is determined to be a newly added normal service data message, the message forwarding information is added to the baseline database, thereby updating the service baseline database.
S8”、在有超出基线的报文时,记录并提取转发信息;S8”, when there are messages exceeding the baseline, record and extract forwarding information;
S9”、判别是否为正常业务数据;在本实施例中,判别方式包括但不限于:自动判别、人工确认;S9”, determine whether it is normal business data; in this embodiment, the determination method includes but is not limited to: automatic determination and manual confirmation;
S10”、若否,则丢弃报文。S10", if not, discard the message.
自动学习的业务绑定方式,优点是适应能力强,兼容性好。The automatic learning business binding method has the advantages of strong adaptability and good compatibility.
这种自学习的模式,可以用在MAC认证模式中,自动学习生成MAC地址库,从而通常解决需登记MAC地址,管理复杂问题,从而增强MAC认证模式的适应性,规避802.1X部署复杂的问题。This self-learning mode can be used in MAC authentication mode to automatically learn and generate a MAC address library, thereby generally solving the problem of registering MAC addresses and complex management, thereby enhancing the adaptability of the MAC authentication mode and avoiding the complex deployment of 802.1X.
在大、中型企业中,有相应的IT管理人员,布设认证授权认证业务数据流自动绑定模式比较好。In large and medium-sized enterprises, it is better to have corresponding IT management personnel to deploy the automatic binding mode of authentication and authorization business data flow.
在小微型企业,以及一些小的局域网中,例如战舰、坦克、装甲车、自动驾驶车辆中,可部署轻量级的认证授权方案或自动化学习的方式,在工业网络中,业务变化较慢的场景中,自动化学习的方式应用效果更好。In small and micro enterprises, as well as some small local area networks, such as warships, tanks, armored vehicles, and self-driving vehicles, lightweight authentication and authorization solutions or automated learning methods can be deployed. In industrial networks, where business changes are slow, automated learning methods are more effective.
本实施例披露的以上两种模式,都实现了正常业务数据流和传输网元的转发表项和白名单的自动绑定,从而实现安全内生化,自动化,无需像以前那样外挂设备、单独部署安全策略,从而增加采购成本、运维成本,且防止未知攻击的方式一直是难度较大的,而本申请是与正常业务自动化绑定部署,因此,非正常数据流难以穿透网络,提高了基本安全防护水平,降低安全运维成本。The above two modes disclosed in this embodiment both realize the automatic binding of normal business data flows and the forwarding table entries and whitelists of transmission network elements, thereby realizing endogenous security and automation. There is no need for external equipment and separate deployment of security policies as before, which increases procurement costs and operation and maintenance costs. In addition, the method of preventing unknown attacks has always been difficult. However, this application is automatically bound and deployed with normal business. Therefore, abnormal data flows are difficult to penetrate the network, which improves the basic security protection level and reduces security operation and maintenance costs.
实施例2Example 2
如图14所示,本申请提供的内生安全网络架构包括:n个主机终端、n个传输网元、n个服务器以及安全网络控制器;在本实施例中,主机终端与传输网元连接,传输网元与服务器连接;传输网元与安全网络控制器连接,传输网元进行正常业务报文转发,以及非正常业务报文丢弃,并告警。在本实施例中,传输网元包括:以太传输网元以及IP传输网元;As shown in Figure 14, the endogenous security network architecture provided by this application includes: n host terminals, n transmission network elements, n servers, and a security network controller. In this embodiment, the host terminals are connected to the transmission network elements, which are connected to the servers. The transmission network elements are connected to the security network controller, and the transmission network elements forward normal service packets, discard abnormal service packets, and generate alarms. In this embodiment, the transmission network elements include: Ethernet transmission network elements and IP transmission network elements.
在本实施例中,将访问控制功能和采样、统计等功能融合到传输网元中,以加密、身份认证、授权为基础,以访问控制为中心、以日志审计保障可追溯性,将IP网络从完全开放的网络,演变为基于业务的弹性、动态封闭网络,形成立体防御,从而保证网络内生安全,即使内部有些未知漏洞也难以被利用,本申请还将传统的分布式路径计算与转发和软件定义网络的功能相融合,将分布式的高生存性和集中式的优化控制结合在一起,通过将传统分布式路径计算及安全控制的网络架构和SDN的集中式路径计算及安全控制网络架构融合起来,提升网络健壮性的弹性。In this embodiment, access control functions and sampling, statistics and other functions are integrated into the transmission network element. Based on encryption, identity authentication and authorization, with access control as the center and log auditing to ensure traceability, the IP network is evolved from a completely open network to a business-based elastic, dynamic closed network, forming a three-dimensional defense, thereby ensuring the inherent security of the network. Even if there are some unknown vulnerabilities inside, they are difficult to exploit. This application also integrates traditional distributed path calculation with forwarding and software-defined network functions, combining distributed high survivability with centralized optimization control. By integrating the traditional distributed path calculation and security control network architecture with the centralized path calculation and security control network architecture of SDN, the elasticity of network robustness is improved.
如图15所示,在本实施例中,企业网络中部署的传输网元为非开放的转发表,整个网络不划分不同的信任域,而是根据实际业务数据流生成转发表项或控制列表,仅有实际业务数据流可以转发,参见图15,第一数据流101是实际业务流,在以太/IP传输网元A1、以太/IP传输网元B1上有转发表项;而非正常业务数据流因为没有相应的转发表项,在本实施例中,第二数据流102、第三数据流103、第四数据流104、第五数据流105、第六数据流106为非正常业务数据流,而不存在,因此杜绝了垃圾流量和恶意流量的生成和转发。As shown in Figure 15, in this embodiment, the transmission network element deployed in the enterprise network is a non-open forwarding table. The entire network is not divided into different trust domains. Instead, a forwarding table entry or a control list is generated according to the actual business data flow. Only the actual business data flow can be forwarded. Referring to Figure 15, the first data flow 101 is the actual business flow, and there are forwarding table entries on the Ethernet/IP transmission network element A1 and the Ethernet/IP transmission network element B1; and because the abnormal business data flow has no corresponding forwarding table entry, in this embodiment, the second data flow 102, the third data flow 103, the fourth data flow 104, the fifth data flow 105, and the sixth data flow 106 are abnormal business data flows and do not exist, thereby eliminating the generation and forwarding of junk traffic and malicious traffic.
如图16所示,在本实施例中,在内生安全弹性网络的逻辑架构中,整个网络端到端的划分为管理平面、控制平面、转发平面,三个平面相互隔离,尤其是限制转发平面的数据冲击控制、管理平面,传统方案没有严格的三面划分,容易导致风险扩散。在本实施例中,将主体终端、服务器、数据资产、存储设备等的作为网络服务的一部分纳入安全网络整体管理。在本实施例中,网络架构的逻辑部件包括但不限于:主机终端、传输网元、应用服务器及各类资源安全网络控制器、策略服务器、身份认证授权审计服务器、网络管理交换机、服务器、日志采样威胁分析服务器。所有网元都包括加密认证单元,加密保证信息的不泄密和认证信息的正确性和完整性,认证保证身份的合法性。先认证、后授权。As shown in Figure 16, in this embodiment, within the logical architecture of an endogenously secure and resilient network, the entire network is divided end-to-end into a management plane, a control plane, and a forwarding plane. These three planes are isolated from each other, particularly to limit data impact on the forwarding plane. Traditional solutions lack a strict three-dimensional separation, which can easily lead to risk proliferation. In this embodiment, the main terminals, servers, data assets, storage devices, and other components are incorporated into the overall management of the secure network as part of the network services. In this embodiment, the logical components of the network architecture include, but are not limited to: host terminals, transmission network elements, application servers, various resource security network controllers, policy servers, identity authentication and authorization audit servers, network management switches, servers, and log sampling and threat analysis servers. All network elements include encryption and authentication units. Encryption ensures the confidentiality of information and the accuracy and integrity of authentication information, while authentication ensures the legitimacy of identity. Authentication precedes authorization.
在本实施例中参见图16中的管理交换机、管理服务器,以及端到端的各部件都具有的管理单元,位于管理平面,管理服务器会对网络中的具有管理单元的设备进行相应的配置,为保证安全,各网元之间默认都需要双向认证,管理交换机、管理服务器可通过预置用户名密码、数字证书等去访问各个网元的管理单元,并进行相互认证。相互之间通过认证后才能进行管理面的通信。应用服务器及各类数据资源的管理单元和控制单元最好通过独立的接口与管理面、控制面其余部件进行通信;In this embodiment, referring to the management switch, management server, and management units of each end-to-end component in FIG16 , they are located in the management plane. The management server will configure the devices with management units in the network accordingly. To ensure security, two-way authentication is required between each network element by default. The management switch and management server can access the management units of each network element through preset usernames, passwords, digital certificates, etc., and perform mutual authentication. Communication on the management plane can only be carried out after mutual authentication. It is best for the application server and the management units and control units of various data resources to communicate with the rest of the management and control plane components through independent interfaces;
在本实施例中,转发平面包括但不限于:主机终端的业务单元、应用服务器及各类数据资源的业务单元、转发网元的转发单元,在本实施例中,转发单元作为安全转发策略的执行点,包括但不限于:报文转发、ACL、统计、采样、日志,以支撑转发控制、日志审计、威胁分析等功能,日志留存便于溯源追责,数据统计采样,便于进行威胁分析和攻击检测,及快速响应。In this embodiment, the forwarding plane includes but is not limited to: the business unit of the host terminal, the business units of the application server and various data resources, and the forwarding unit of the forwarding network element. In this embodiment, the forwarding unit serves as the execution point of the security forwarding policy, including but not limited to: message forwarding, ACL, statistics, sampling, and logging to support forwarding control, log auditing, threat analysis and other functions. Log retention facilitates tracing and accountability, and data statistical sampling facilitates threat analysis and attack detection, as well as rapid response.
本实施例中,采用了传输网元内置分布式的采样、日志功能,相对于现有解决方案单独部署的探针,具有分布广,无需单独部署的优势,采样的数据覆盖更全面,更有利于数据的分析。In this embodiment, the distributed sampling and logging functions built into the transmission network element are adopted. Compared with the existing solutions in which probes are deployed separately, this has the advantages of wide distribution and no need for separate deployment. The sampled data coverage is more comprehensive, which is more conducive to data analysis.
在本实施例中,控制平面包括但不限于:安全网络控制器、策略服务器、身份管理授权服务器、日志采样分析服务器,控制面需要互通的设备也进行双向认证,认证通过后才能进行控制面通信,为了提高兼容性,也支持不认证模式,为提升安全性,默认要支持认证。协议报文和组播及未知单播报文都有黑、白名单及限速措施,经过传输网元的安全审查后才发往安全网络控制器。业务数据流通过身份管理授权服务器的认证授权后,经过策略服务器的策略审计后,安全网络控制器通过集中式路径计算,找到最优路径相关的传输网元,通过控制单元、策略下发单元,将转发表项下发到转发单元,实现正常业务数据流的转发。In this embodiment, the control plane includes but is not limited to: a secure network controller, a policy server, an identity management authorization server, and a log sampling and analysis server. The devices that need to communicate with each other on the control plane also undergo two-way authentication. Control plane communication can only be carried out after authentication is passed. In order to improve compatibility, non-authentication mode is also supported. In order to improve security, authentication is supported by default. Protocol messages, multicast and unknown unicast messages have blacklists, whitelists and speed limit measures, and are sent to the secure network controller only after security review by the transmission network element. After the service data flow passes the authentication and authorization of the identity management authorization server and the policy audit of the policy server, the secure network controller finds the transmission network element related to the optimal path through centralized path calculation, and sends the forwarding table entries to the forwarding unit through the control unit and the policy sending unit to realize the forwarding of normal service data flow.
在本实施例中,传输网元还包括:控制协议单元、分布式路径计算单元,能够收集网络拓扑和进行分布式的路径计算,在安全网络控制器故障或链路故障等无法进行集中式控制时,传输网元可以进行分布式路径计算和转发,采用定制的默认策略,各转发网元依据定制的默认策略执行未知流量的访问控制,传输网元还包括:ML、AI单元能够进行学习,形成转发基线,从而转发正常业务流量。In this embodiment, the transmission network element also includes: a control protocol unit and a distributed path calculation unit, which can collect network topology and perform distributed path calculation. When centralized control cannot be performed due to a security network controller failure or a link failure, the transmission network element can perform distributed path calculation and forwarding, using a customized default policy. Each forwarding network element performs access control for unknown traffic based on the customized default policy. The transmission network element also includes: ML and AI units that can learn to form a forwarding baseline, thereby forwarding normal business traffic.
在本实施例中,由于主机终端存在没有管理和控制的情形,故加入管理单元和控制单元,前述管理单元和控制单元能够以例如软件的形式存在;例如主机终端的控制单元可以对本机安装的软件进行控制,仅允许在白名单的软件进行安装或仅允许在白名单的软件进行对外通信,对主机终端连接的外设进行审查和数据检查上报等,主机终端的控制单元和管理单元通常通过带内通信与管理面服务器和控制面的相关部件进行交互,将主机终端的控制单元纳入安全网络控制器进行控制,只有主机终端开通的服务端口才允许其他设备访问,符合必要的规范、安装必要的补丁后才允许接入网络等,同样应用服务器及各类数据资源更是可以进行相应的控制。In this embodiment, since the host terminal is not managed and controlled, a management unit and a control unit are added. The aforementioned management unit and control unit can exist in the form of software, for example; for example, the control unit of the host terminal can control the software installed on the local machine, only allow software on the white list to be installed or only allow software on the white list to communicate externally, review the peripherals connected to the host terminal and report data checks, etc. The control unit and management unit of the host terminal usually interact with the management plane server and relevant components of the control plane through in-band communication, and the control unit of the host terminal is included in the security network controller for control. Only the service port opened by the host terminal is allowed to be accessed by other devices, and access to the network is allowed only after complying with the necessary specifications and installing the necessary patches, etc. Similarly, application servers and various data resources can be controlled accordingly.
在本实施例中,传输网元是逻辑架构的必选逻辑部件,其存在形式虽不同场景适应调整,例如在有些小企业中,安全网络控制器、策略服务器、身份关联授权审计服务器可以部署在一台服务器中,在大企业中身份认证、授权和审计可以部署在不同的服务器中,为了提升可靠性,安全网络控制器还可以双机备份,甚至采用分布式部署。应用服务器及各类资源通常有管理网口,可将此网口连接到网络管理交换机由管理面管理,也可以连接到服务器管理平台,由其进行管理。In this embodiment, the transport network element is a mandatory logical component of the logical architecture. Its form can be adapted to different scenarios. For example, in some small enterprises, the security network controller, policy server, and identity association authorization and audit server can be deployed on a single server. In large enterprises, identity authentication, authorization, and audit can be deployed on different servers. To improve reliability, the security network controller can also be deployed in dual-server backup or even in a distributed deployment. Application servers and various resources typically have a management network port, which can be connected to a network management switch for management, or to a server management platform for management.
实施例3Example 3
如图17所示,在本实施例中,一种安全网络架构中的传输网元还包括:交换机、路由器,前述传输网元不再仅提供开放的转发能力,而是参与业务层面的访问控制,将正常业务访问与传输网元的转发表项或白名单关联,只有授权的访问才被允许转发。As shown in Figure 17, in this embodiment, a transmission network element in a secure network architecture also includes: switches and routers. The aforementioned transmission network elements no longer only provide open forwarding capabilities, but participate in service-level access control, associating normal service access with the transmission network element's forwarding table or whitelist, and only authorized access is allowed to be forwarded.
在本实施例中,参见图17,网络包括但不限于:接入交换机、汇聚交换机、核心交换机、DC交换机、路由网关;在本实施例中,转发平面中的传输单元构成基础网络,其中业务类设备包括但不限于:内部应用服务器、云业务服务器、主机终端;网络控制面包括但不限于:安全网络控制器、策略服务器、采样、日志分析服务器、LDAPserver、DNS server、本地威胁分析服务器、云端威胁情报服务器;在本实施例中,网络的管理面包括但不限于:管理交换机、网络管理服务器。In this embodiment, referring to Figure 17, the network includes but is not limited to: access switches, aggregation switches, core switches, DC switches, and routing gateways; in this embodiment, the transmission units in the forwarding plane constitute the basic network, in which the business class devices include but are not limited to: internal application servers, cloud business servers, and host terminals; the network control plane includes but is not limited to: security network controllers, policy servers, sampling, log analysis servers, LDAP servers, DNS servers, local threat analysis servers, and cloud threat intelligence servers; in this embodiment, the management plane of the network includes but is not limited to: management switches and network management servers.
在本实施例中,按管理平面、控制平面、和转发平面来部署网络,而且进行隔离,交换机、路由器上,管理平面走管理接口,CPU链接的管理口,交换机、路由器具有1-2个直接与CPU相连接的以太管理口,用管理交换机将所有业务交换机的管理口链接到管理交换机,组成一个管理平面,交换机的管理口和业务口默认隔离,业务口报文无法发送到管理口,另外,交换机也会出console口,可以用串口服务器/管理交换机将业务交换机的console口链接起来,这样对交换机和路由器的管理程度更深,在启动过程也能进行相应的干预管理。这样管理平面隐藏在网络内部,外部转发平面上的报文不能进入管理平面,从而实现基于安全性考虑的三面隔离。In this embodiment, the network is deployed and isolated based on the management plane, control plane, and forwarding plane. On switches and routers, the management plane uses the management interface, the management port connected to the CPU. Switches and routers have one or two Ethernet management ports directly connected to the CPU. A management switch is used to link the management ports of all service switches to the management switch, forming a single management plane. The switch's management and service ports are isolated by default, and service port messages cannot be sent to the management port. Furthermore, switches also have console ports, which can be linked to the service switch's console ports using a serial port server/management switch. This allows for deeper management of switches and routers and enables appropriate intervention and management during the startup process. This allows the management plane to be hidden within the network, preventing messages from the external forwarding plane from entering the management plane, thereby achieving three-sided isolation for security reasons.
在本实施例中,接入交换机包括但不限于:无线AP类接入设备;DC交换机包括但不限于:数据中心交换机、TOP交换机、汇聚交换机、核心交换机、spine-leaf结构;在本实施例中,利用LDAPserver进行身份管理、授权功能。In this embodiment, access switches include but are not limited to: wireless AP-type access devices; DC switches include but are not limited to: data center switches, TOP switches, aggregation switches, core switches, and spine-leaf structures; in this embodiment, LDAP server is used for identity management and authorization functions.
在本实施例中,网络、终端、云、业务的控制面包括但不限于:对网络、终端、云、业务进行连接、转发控制的相关控制器、服务器、安全网络控制器、终端控制器、策略服务器、LDAP Server、采样统计日志服务器、威胁分析服务器。在本实施例中,终端控制器可以和安全网络控制器合一,可采用统一控制器,安全网络控制器的集中式路由计算模块能够基于实施流量情况选择优化的路径,且能够基于优化路径确定数据流要通过的传输网元,能将正常业务报文的转发特征绑定下发到路径上每个传输网元的流表、转发表、ACL表中,使所有传输网元具备了仅转发正常业务数据流的特点,从而实现立体的防护;策略服务器包括但不限于:策略引擎单元、策略管理单元;LDAP Server包括但不限于:身份认证管理、授权功能。In this embodiment, the control plane of the network, terminal, cloud, and service includes, but is not limited to, controllers related to connection and forwarding control of the network, terminal, cloud, and service, servers, security network controllers, terminal controllers, policy servers, LDAP servers, sampling statistics log servers, and threat analysis servers. In this embodiment, the terminal controller and the security network controller can be integrated into one, and a unified controller can be used. The centralized routing calculation module of the security network controller can select an optimized path based on the implementation traffic situation, and can determine the transmission network element through which the data flow is to pass based on the optimized path. It can bind and send the forwarding characteristics of normal service messages to the flow table, forwarding table, and ACL table of each transmission network element on the path, so that all transmission network elements have the characteristic of forwarding only normal service data flows, thereby realizing three-dimensional protection; the policy server includes, but is not limited to, a policy engine unit and a policy management unit; the LDAP server includes, but is not limited to, identity authentication management and authorization functions.
在本实施例中,交换机自身的控制平面报文是由CPU进行处理的,控制平面与转发平面可以进行逻辑隔离,交换机、路由器等与网络控制器的连接通信,走专用接口、并自动配置转发表、ACL,非传输单元自身IP地址不可访问控制器,这样转发平面的流量不会冲击交换、路由等网元与控制器的通信,当然也可以走带内传输,通过加密传输,通过ACL控制实现相对隔离;对路由协议等控制类报文,是在传输网元间传输的,通常是走带内传输的,为了提升安全性,需要自动生成ACL来做防护,可以根据配置的协议类型、对端地址,自动生成基于协议和对端地址的ACL白名单。In this embodiment, the control plane messages of the switch itself are processed by the CPU, and the control plane and forwarding plane can be logically isolated. The connection and communication between the switch, router, etc. and the network controller use dedicated interfaces and automatically configure forwarding tables and ACLs. Non-transmission unit IP addresses cannot access the controller. In this way, the traffic of the forwarding plane will not impact the communication between the switching, routing and other network elements and the controller. Of course, it can also be transmitted in-band, through encrypted transmission and ACL control to achieve relative isolation. Control messages such as routing protocols are transmitted between transmission network elements, usually in-band. In order to improve security, it is necessary to automatically generate ACLs for protection. According to the configured protocol type and peer address, an ACL whitelist based on the protocol and peer address can be automatically generated.
在本实施例中,利用加密、认证、授权、日志等技术保证业务的真实性和可追溯性,并将真实的业务数据流量关键特征关联到传输网元的转发表项或访问控制列表或流表等,从而保证仅转发正常的业务报文。In this embodiment, encryption, authentication, authorization, logging and other technologies are used to ensure the authenticity and traceability of the business, and the key characteristics of the real business data traffic are associated with the forwarding table items or access control lists or flow tables of the transmission network elements, so as to ensure that only normal business messages are forwarded.
如图18所示,在本实施例中,用户访问某业务的认证授权及转发的具体过程中,主体终端1发送某业务的访问认证请求的报文,经过接入交换机或无线AP,在本实施例中,因为交换机中没有转发表项,则通过控制通道发送到安全网络控制器,在本实施例中,此处的安全网络控制器可采用例如:SDN网络中的控制器、传统网络管理器;控制器将用户认证报文发送到策略服务器,进行访问策略查询;由策略服务器获取到用户的用户名和密码,以管理员DN和管理员密码为参数向LDAP服务器发送管理员绑定请求报文以获得查询权限;LDAP服务器收到管理员绑定请求报文后,验证管理员DN和管理员密码是否正确。如果管理员DN和管理员密码正确,则绑定成功,LDAP服务器向策略服务器发送管理员绑定响应报文;策略服务器收到绑定响应报文后,以用户输入的用户名为参数构造过滤条件,向LDAP服务器发送用户DN查询请求报文。例如:构造过滤条件为CN=User1;LDAP服务器收到用户DN查询请求报文后,根据报文中的查询起点、查询范围、以及过滤条件,对用户DN进行查找。如果查询成功,则向策略服务器发送查询成功的响应报文。查询得到的用户DN可以是一个和/或不少于2个,在本实施例中,查询起点为“dc=lhzs,dc=com”,则返回的DN为“CN=User1,Departments=R&D,OU=People,dc=lhzs,dc=com”和“CN=User1,Departments=R&D,OU=Equipment,dc=lhzs,dc=com”;策略服务器根据查询得到的用户DN和用户输入的密码为参数,向LDAP服务器发送用户绑定请求报文;LDAP服务器收到用户绑定请求报文后,检查用户输入的密码是否正确;如果用户输入的密码正确,则向策略服务器发送绑定成功的绑定响应报文;如果用户输入的密码不正确,则向策略服务器发送绑定失败的响应报文。策略服务器以查询到的下一个用户DN为参数,继续向LDAP服务器发送绑定请求,直至有一个DN绑定成功;如果所有用户DN都绑定失败,则策略服务器通过安全网络控制器通知用户认证授权失败;如果策略服务器收到LDAP服务器授权成功的信息,则对授权通过的服务进行DNS查询,如果DNS中有SRV记录,则返回服务对应的IP地址、协议类型、端口号信息给策略服务器;策略服务器对其进行其他相关策略的检查,包括主机客户端的合规审查,所访问应用服务器的合规性,是否是互联网访问;如果是互联网访问,会去查询访问的URL、远端IP是否存在感染风险,如果该地址被列入风险黑名单,则不允许访问,如果安全审查通过,则允许访问;策略检查通过后,给安全网络控制器发送授权通过信息,在本实施例中,授权通过信息包括但不限于:主机终端IP地址、业务服务器IP地址、协议类型、协议端口号信息。在本实施例中,安全网络控制器通过策略服务器的回复信息,根据网络拓扑数据库,计算转发路径经过的传输单元并生成该传输单元对应的表项,在本实施例中,传输单元包括但不限于:流表、转发表、ACL。流表的匹配项见下表3:As shown in Figure 18, in this embodiment, during the authentication, authorization, and forwarding process for user access to a service, the main terminal 1 sends an access authentication request message for the service. This message passes through the access switch or wireless AP. In this embodiment, because the switch does not have a forwarding table entry, it is sent via a control channel to the secure network controller. In this embodiment, the secure network controller can be, for example, a controller in an SDN network or a traditional network manager. The controller then sends the user authentication message to the policy server for access policy query. The policy server obtains the user's username and password and sends an administrator bind request message to the LDAP server using the administrator DN and password as parameters to obtain query permission. After receiving the administrator bind request message, the LDAP server verifies whether the administrator DN and password are correct. If the administrator DN and password are correct, the binding is successful, and the LDAP server sends an administrator bind response message to the policy server. After receiving the bind response message, the policy server constructs a filtering condition using the user-entered username as a parameter and sends a user DN query request message to the LDAP server. For example, the constructed filtering condition is CN=User1. After receiving the user DN query request message, the LDAP server searches for the user DN based on the query starting point, query scope, and filtering condition in the message. If the query is successful, a successful query response message is sent to the policy server. The user DN obtained from the query can be one and/or at least two. In this embodiment, the query starting point is "dc=lhzs,dc=com", and the returned DNs are "CN=User1, Departments=R&D, OU=People, dc=lhzs,dc=com" and "CN=User1, Departments=R&D, OU=Equipment, dc=lhzs,dc=com". The policy server sends a user bind request message to the LDAP server based on the user DN obtained from the query and the password entered by the user. After receiving the user bind request message, the LDAP server checks whether the password entered by the user is correct. If the password entered by the user is correct, the LDAP server sends a bind response message to the policy server indicating that the binding is successful. If the password entered by the user is incorrect, the LDAP server sends a bind failure response message to the policy server. The policy server uses the next user DN found in the query as a parameter and continues to send binding requests to the LDAP server until one DN is successfully bound; if all user DNs fail to bind, the policy server notifies the user of the authentication and authorization failure through the security network controller; if the policy server receives information that the LDAP server has successfully authorized, it performs a DNS query on the authorized service. If there is an SRV record in the DNS, it returns the IP address, protocol type, and port number information corresponding to the service to the policy server; the policy server checks other relevant policies, including compliance review of the host client, compliance of the accessed application server, and whether it is Internet access; if it is Internet access, it will query the accessed URL and remote IP for infection risks. If the address is included in the risk blacklist, access is not allowed. If the security review is passed, access is allowed; after the policy check is passed, the authorization pass information is sent to the security network controller. In this embodiment, the authorization pass information includes but is not limited to: host terminal IP address, business server IP address, protocol type, and protocol port number information. In this embodiment, the security network controller uses the reply information from the policy server and the network topology database to calculate the transmission unit passed through the forwarding path and generate the table entry corresponding to the transmission unit. In this embodiment, the transmission unit includes but is not limited to: flow table, forwarding table, and ACL. The matching items of the flow table are shown in Table 3 below:
表3
Table 3
安全网络控制器给各级交换机、路由器等传输网元下发对应的表项,典型转发表项如下表4所示,在转发平面上形成针对此授权的数据流的转发路径:
The security network controller sends corresponding table entries to switches, routers, and other transmission network elements at all levels. Typical forwarding table entries are shown in Table 4 below, forming a forwarding path for this authorized data flow on the forwarding plane:
在本实施例中,给相应的业务服务器发送可以访问的ACL、服务器打开访问限制,给主机终端1发送授权成功消息,主机终端1打开访问控制。In this embodiment, the accessible ACL is sent to the corresponding service server, the server opens the access restriction, and an authorization success message is sent to the host terminal 1, and the host terminal 1 opens the access control.
主机终端1正常访问被授权的业务。The host terminal 1 accesses the authorized services normally.
在本实施例中,各级交换机、路由器等传输网元持续进行日志、采样、分析的操作。In this embodiment, transmission network elements such as switches and routers at all levels continuously perform logging, sampling, and analysis operations.
在本实施例中,如果认证授权没有通过,则根据默认策略执行,通常是丢弃,并将事件上报日志服务器,便于进行分析和审计。所有的访问信息都是有日志的,便于溯源。In this embodiment, if the authentication and authorization fails, the default policy is executed, which is usually discarded and the event is reported to the log server for analysis and audit. All access information is logged for easy tracing.
在本实施例中,在交换机、路由器等传输网元上对业务数据流实施黑、白、灰名单控制。In this embodiment, black, white, and gray list control is implemented on transmission network elements such as switches and routers to control service data flows.
如图18所示,在本实施例中,交换机、路由器、网关等数据传输网元,不仅执行转发功能,传输网元在实现时应该有更多的单元模块,在本实施例中,传输网元包括但不限于:转发单元、访问控制单元、统计单元、采样单元、日志单元、加密单元、控制协议单元、策略执行单元、认证单元、发送接收单元、ML AI单元、安全单元,安全单元的功能有些在转发引擎中实现,有些在CPU上实现,ML AI单元,能够根据一些信息做智能的统计分析及处理。各模块的说明如下:As shown in Figure 18, in this embodiment, data transmission network elements such as switches, routers, and gateways not only perform forwarding functions, but should also have more unit modules when implemented. In this embodiment, the transmission network elements include but are not limited to: forwarding unit, access control unit, statistics unit, sampling unit, log unit, encryption unit, control protocol unit, policy execution unit, authentication unit, sending and receiving unit, ML AI unit, and security unit. Some of the functions of the security unit are implemented in the forwarding engine, and some are implemented on the CPU. The ML AI unit can perform intelligent statistical analysis and processing based on some information. The description of each module is as follows:
加密单元:提供认证、控制信息和转发报文的加密功能,可采用例如:ASIC、FPGA硬件形式实现、以软件加CPU的形式用软件实现,CPU可以支持商用加密算法包括但不限于:AES、DES、RSA、SM2、SM3、SM4,转发模块中设有加密单元以支撑MacSec功能。Encryption unit: Provides encryption functions for authentication, control information, and forwarded messages. It can be implemented in hardware form, such as ASIC or FPGA, or in software plus CPU form. The CPU can support commercial encryption algorithms including but not limited to AES, DES, RSA, SM2, SM3, and SM4. An encryption unit is provided in the forwarding module to support the MacSec function.
认证单元:用于设备本身身份的认证、对管理服务器、安全网络管理器、认证授权服务器、安全策略服务器、日志、采样、威胁分析服务器进行身份认证。在本实施例中,可采用例如:用户名、密码方式进行认证,使用证书体系能提供更高的安全性,例如基于Kerberos方式进行认证,Kerberos使用TCP/UDP 88端口进行认证,使用TCP/UDP 464端口进行密码重设,传输网元及相关的服务器上需要开放88和464端口。Authentication Unit: This unit authenticates the device's identity and authenticates the management server, security network manager, authentication and authorization server, security policy server, log, sampling, and threat analysis servers. In this embodiment, authentication can be performed using, for example, a username and password. Using a certificate system can provide higher security, such as Kerberos-based authentication. Kerberos uses TCP/UDP port 88 for authentication and TCP/UDP port 464 for password resets. Ports 88 and 464 must be open on the transmission network element and related servers.
管理单元:用于对传输网元进行管理,可支持的管理协议包括但不限于:SSH、telnet、Https、SNMP,使用专用的管理接口,图18中是与CPU相连的eth0-0-1口,此管理口与与控制平面面网口及转发平面隔离,不互通,从而隔离转发平面和控制平面的安全风险传递,管理服务器需要先跟传输网元的管理单元进行身份认证,认证通过后建立连接,并自动生成访问控制列表,例如:图中管理服务器的IP地址为10.0.0.1,所以认证通过后就关联建立如下ACL表项:
10 permit src-ip host 10.0.0.1 dest-ip 10.0.0.2;
20 permit src-ip host 10.0.0.2 dest-ip 10.0.0.1;
30 deny src-ip any dest-ip any;Management unit: used to manage the transmission network element. Supported management protocols include but are not limited to: SSH, telnet, Https, SNMP, and use a dedicated management interface. Figure 18 shows the eth0-0-1 port connected to the CPU. This management port is isolated from the control plane network port and the forwarding plane and does not communicate with each other, thereby isolating the security risk transmission of the forwarding plane and the control plane. The management server needs to first authenticate with the management unit of the transmission network element. After the authentication is passed, a connection is established and an access control list is automatically generated. For example: the IP address of the management server in the figure is 10.0.0.1, so after the authentication is passed, the following ACL table entry is associated and established:
10 permit src-ip host 10.0.0.1 dest-ip 10.0.0.2;
20 permit src-ip host 10.0.0.2 dest-ip 10.0.0.1;
30 deny src-ip any dest-ip any;
在管理连接断开时,则ACL自动调整为:
10 permit src-ip any dest-ip 10.0.0.2;
20 permit src-ip host 10.0.0.2 dest-ip any;
30 deny src-ip any dest-ip any;When the management connection is disconnected, the ACL automatically adjusts to:
10 permit src-ip any dest-ip 10.0.0.2;
20 permit src-ip host 10.0.0.2 dest-ip any;
30 deny src-ip any dest-ip any;
在本实施例中,可以接收例如:10.0.0.0/24网段的新的管理连接和认证。In this embodiment, for example, a new management connection and authentication of the 10.0.0.0/24 network segment may be received.
转发单元:可以基于MAC表、ARP表、FIB表、流表对数据报文进行转发、丢弃,Forwarding unit: can forward or discard data packets based on MAC table, ARP table, FIB table, and flow table.
在本实施例中,MAC表的形式如下:In this embodiment, the MAC table has the following format:
表5 Mac Address Table:
Table 5 Mac Address Table:
在本实施例中,ARP表的形式如下:
In this embodiment, the ARP table is in the following format:
在本实施例中,IP路由表的形式如下:
Codes:C-connected,S-static,R-RIP,
O-OSPF,I-IS-IS,B-BGP,P-PIM,
>-selected route,*-FIB route,
[*]-[AD/Metric]
C>*10.0.2.0/24is directly connected,vlan1
C>*10.0.0.2/32is directly connected,loopback0
C>*0 10..1.0/24is directly connected,,eth0-0-2In this embodiment, the IP routing table is in the following format:
Codes:C-connected,S-static,R-RIP,
O-OSPF, I-IS-IS, B-BGP, P-PIM,
>-selected route,*-FIB route,
[*]-[AD/Metric]
C>*10.0.2.0/24is directly connected,vlan1
C>*10.0.0.2/32is directly connected,loopback0
C>*0 10..1.0/24is directly connected,,eth0-0-2
在本实施例中,流表的结构如下:
In this embodiment, the structure of the flow table is as follows:
Match Field用于匹配报文,由ingress port和报文头部组成。Match Field is used to match messages and consists of the ingress port and message header.
Priority优先级字段,相同优先级的流表,报文优先匹配先下发的流表条目取值范围0-65535,默认为32768。Priority field: For flow tables with the same priority, the message will be matched with the flow table entry that is delivered first. The value range is 0-65535, and the default value is 32768.
Counters流表统计字段,记录流表匹配报文计数。Counters flow table statistics field, recording the count of packets matching the flow table.
Instruction指令字段,支持apply-actions立即执行。Instruction field supports immediate execution of apply-actions.
Timeout支持hard_timeout和idle_timeout hard_timeout表示流表固定生存时间,到期自动删除;Idle_timeout表示流表老化时间,有报文匹配,则刷新。Timeout supports hard_timeout and idle_timeout. Hard_timeout indicates the fixed lifetime of the flow table, which will be automatically deleted upon expiration. Idle_timeout indicates the aging time of the flow table, which will be refreshed if a message matches.
Cookie Cookie字段,主要是控制器过滤流表使用,比如cooike来修改/删除已存在的流表。Cookie The Cookie field is mainly used by the controller to filter the flow table, such as cookie to modify/delete an existing flow table.
在本实施例中,流表的可使用的匹配项见上表3所示,典型的流表形式如上表4所示,In this embodiment, the available matching items of the flow table are shown in Table 3 above, and the typical flow table format is shown in Table 4 above.
ACtion字段支持的种类有很多,见下表6,经常使用的是OUTPUT和Drop、Normal,OUTPUT是出接口,Drop是丢弃,Normal是走传统的转发流程,即基于MAC表、ARP表、FIB表转发。The Action field supports many types, as shown in Table 6 below. Commonly used are OUTPUT, Drop, and Normal. OUTPUT indicates the outbound interface, Drop indicates discarding, and Normal indicates the traditional forwarding process, that is, forwarding based on the MAC table, ARP table, and FIB table.
表6
Table 6
在本实施例中,具体参见图18,主机终端访问业务服务器,认证通过后,安全网络控制器会在传输网元上下发如下流表:In this embodiment, specifically referring to FIG. 18 , the host terminal accesses the service server. After authentication is passed, the security network controller sends the following flow table to the transmission network element:
dl_src=14-a5-1a-b0-3c-2a,dl_dst=b6-2e-55-5b-d2-a4,actions=output:eth1-1-2-Oopenflow13dl_src=14-a5-1a-b0-3c-2a, dl_dst=b6-2e-55-5b-d2-a4, actions=output:eth1-1-2-Oopenflow13
dl_src=b6-2e-55-5b-d2-a4,dl_dst=14-a5-1a-b0-3c-2a,actions=output:eth1-1-1-Oopenflow13dl_src=b6-2e-55-5b-d2-a4, dl_dst=14-a5-1a-b0-3c-2a, actions=output:eth1-1-1-Oopenflow13
和/或以IP对下发如下流表And/or send the following flow table by IP pair
ip,nw_src=10.0.2.1,nw_dst=10.0.2.6,actions=output:eth1-1-2-O openflow13ip,nw_src=10.0.2.1,nw_dst=10.0.2.6,actions=output:eth1-1-2-O openflow13
ip,nw_src=10.0.2.6,nw_dst=10.0.2.1,actions=output:eth1-1-1-O openflow13ip,nw_src=10.0.2.6,nw_dst=10.0.2.1,actions=output:eth1-1-1-O openflow13
匹配流表的报文按照流表进行转发,假设有一个源地址是10.0.2.10,目的地址是10.0.2.6的数据流,由于没有匹配到流表,报文走上送控制面流程,首先被限速后,转发到安全网络控制器进行认证识别,如果认证不通过,丢弃报文,并下发如下流表:Packets that match the flow table are forwarded according to the flow table. For example, there is a data flow with a source address of 10.0.2.10 and a destination address of 10.0.2.6. Since no flow table is matched, the packet is sent to the control plane process. It is first rate-limited and then forwarded to the security network controller for authentication and identification. If the authentication fails, the packet is discarded and the following flow table is issued:
ip,nw_src=10.0.2.10,nw_dst=10.0.2.6,actions=drop-O openflow13ip,nw_src=10.0.2.10,nw_dst=10.0.2.6,actions=drop-O openflow13
后续此类特征的报文将被丢弃,直到流表老化后,再走上送认证流程。Subsequent packets with such characteristics will be discarded until the flow table ages and then sent to the authentication process.
在本实施例中,访问控制单元生成动态白名单、动态黑名单、动态灰名单,前述名单的生成方式包括但不限于:由安全网络控制器下发;由机器学习、人工智能学习单元生成。在本实施例中,转发单元、统计单元、采样单元和访问控制单元实现形式包括但不限于:分开实现、合在一起实现。In this embodiment, the access control unit generates a dynamic whitelist, a dynamic blacklist, and a dynamic graylist. Methods for generating these lists include, but are not limited to, issuing them from a secure network controller or generating them by a machine learning or artificial intelligence learning unit. In this embodiment, the forwarding unit, statistics unit, sampling unit, and access control unit may be implemented separately or in combination.
在本实施例中,访问控制条目(ACE):每一个ACE包括一个动作元素(允许或者拒绝)和一系列基于标准的过滤元素,例如源地址、目的地址、协议、特定协议参数等等。二层基准元素包括MAC-SA、MAC-DA,以及其他二层字段过滤报文,例如COS、VLAN-ID、INNER-COS、INNER-VLAN-ID、L2 type。三层基准元素包括IP-SA、IP-DA以及其他三层字段过滤报文,例如DSCP、L4 Protocol字段以及其他字段(TCP端口、UDP端口等等)。In this embodiment, access control entries (ACEs): Each ACE includes an action element (allow or deny) and a series of standard-based filtering elements, such as source address, destination address, protocol, and specific protocol parameters. Layer 2 reference elements include MAC-SA, MAC-DA, and other Layer 2 fields for filtering packets, such as COS, VLAN-ID, INNER-COS, INNER-VLAN-ID, and L2 type. Layer 3 reference elements include IP-SA, IP-DA, and other Layer 3 fields for filtering packets, such as DSCP, L4 Protocol field, and other fields (TCP port, UDP port, etc.).
MAC ACL:MAC ACL可以根据MAC-SA和MAC-DA过滤报文,MAC地址可以配置掩码,或者配置为主机MAC。MAC ACL也可以根据其他二层字段过滤报文,MAC ACL: MAC ACL can filter packets based on MAC-SA and MAC-DA. MAC addresses can be configured with masks or configured as host MAC. MAC ACL can also filter packets based on other Layer 2 fields.
在本实施例中,例如COS、VLAN-ID、INNER-COS、INNER-VLAN-ID、L2 type。IP ACL:IP ACL可以根据IP-SA和IP-DA过滤报文,IP地址可以配置掩码或者配置为主机IP地址。IP ACL也可以根据其他三层字段过滤报文,例如DSCP、L4 Protocol字段以及其他字段(TCP端口、UDP端口等等)。In this embodiment, examples include COS, VLAN ID, INNER-COS, INNER-VLAN ID, and L2 type. IP ACL: IP ACLs can filter packets based on IP-SA and IP-DA. IP addresses can be configured with masks or host IP addresses. IP ACLs can also filter packets based on other Layer 3 fields, such as DSCP, L4 Protocol, and other fields (TCP port, UDP port, etc.).
时间段:定义一个时间段或时间周期,在这段时间内,ACE是有效的;在这个时间段或周期之外,ACE无效。Time period: defines a time period or time cycle during which the ACE is valid; outside this time period or cycle, the ACE is invalid.
表7 ACL表的形式如下:
Table 7 The format of the ACL table is as follows:
在本实施例中,转发单元有流表功能的优先使用流表转发,没有流表功能的可依据表7和表5完成主机终端到服务器的数据报文的转发,而其余非业务报文则丢弃。In this embodiment, the forwarding unit with flow table function gives priority to using flow table forwarding, and the forwarding of data packets from the host terminal to the server can be completed according to Table 7 and Table 5 if there is no flow table function, while the remaining non-business packets are discarded.
在本实施例中,为了将转发平面和控制平面隔离,自动配置CoPP功能,在转发平面将上送控制平面的报文进行限速,copp acl是根据报文上CPU的exception处理报文的,支持如下:exception:any,ipda,fwd-to-cpu,slow-protocol,bpdu,erps,eapol,smart-link,dhcp,rip,ospf,pim,bgp,vrrp,ldp,ptp,rsvp,icmp-redirect,mcast-rpf-fail,macsamismatch,vlan-security-discard,port-security-discard,ip-option,udld,dot1x-macbypass,12protocol-tunnel,arp,igmp,ssh,mlag,telnet。COPP仅仅对上送CPU的报文进行限速或者过滤,不处理转发的报文.In this embodiment, to isolate the forwarding and control planes, CoPP is automatically configured. The forwarding plane limits the rate of packets sent to the control plane. CoPP ACLs process packets based on the CPU exceptions associated with the packets. Supported exceptions include: any, ipda, fwd-to-cpu, slow-protocol, bpdu, erps, eapol, smart-link, dhcp, rip, ospf, pim, bgp, vrrp, ldp, ptp, rsvp, icmp-redirect, mcast-rpf-fail, macsamismatch, vlan-security-discard, port-security-discard, ip-option, udld, dot1x-macbypass, 12protocol-tunnel, arp, igmp, ssh, mlag, and telnet. CoPP only limits or filters packets sent to the CPU and does not process forwarded packets.
在本实施例中,根据传输网元的配置可以确定控制面协议的启用情况,没有启用的协议报文,可以进一步的进行丢弃处理,例如如果ospf没有启用,则可以将协议号是89号的IP报文配置相应的ACL以进行丢弃,启用的协议报文,可以通过学习后,分别限制上送速率。In this embodiment, the activation status of the control plane protocol can be determined based on the configuration of the transmission network element. The protocol packets that are not enabled can be further discarded. For example, if ospf is not enabled, the IP packet with protocol number 89 can be configured with a corresponding ACL to be discarded. The enabled protocol packets can be limited in the upload rate after learning.
统计功能:可以基于端口、VLAN、IP、五元组统计数据包的pps值、bps值、丢包数、时延数据。在本实施例中,统计数据可以作为ML AI单元的学习输入信息,进行分析学习。Statistics: Statistics can be collected based on port, VLAN, IP, and quintuple data, including packet pps, bps, packet loss, and latency. In this embodiment, these statistics can be used as input for the ML AI unit for analysis and learning.
采样单元:能够采样并基于SNMP、CLI、Syslog、NetStream、sFlow、IPFIX将采样数据发送到相应服务器。在本实施例中,采样数据信息可以作为ML AI单元的学习输入信息,进行分析学习。CTC7132芯片有Flow Tracing引擎,可以支持例如:sFlow、IPFIX流采样,在本实施例中sFlow是一种监视进入设备流量的技术。它在监视设备上应用,通过一种采样机制以一定速率采样,然后将采样信息送到监视server。在server端可以查看多个agent的流量情况。在本实施例中,Sflow有两种类型的采样信息:一种是端口的统计信息,一种是被采样报文的头部。在本实施例中,SFLOW Flow-sampling字段支持例如:Raw packet Header:截取原始报文全部或者一部分报文头;Ethernet Frame Data:针对Ethernet报文,解析报文的Ethernet头信息;IPV4 Data:针对IPV4报文,解析报文的IPV4头信息;Extended Router Data:针对路由转发的报文,记录报文的路由转发信息;Extended Switch Data:针对二层转发的Ethernet报文,记录报文的vlan转换以及vlan优先级的转换。SFLOWCounter-sampling字段支持有:Generic Interface Counters:通用接口统计信息,包括接口的基本信息,通用的接口流量统计;Ethernet Interface Counters:针对于Ethernet接口,用于统计Ethernet相关的流量统计信息;Sampling unit: It can sample and send the sampled data to the corresponding server based on SNMP, CLI, Syslog, NetStream, sFlow, and IPFIX. In this embodiment, the sampled data information can be used as learning input information for the ML AI unit for analysis and learning. The CTC7132 chip has a Flow Tracing engine that can support, for example, sFlow and IPFIX flow sampling. In this embodiment, sFlow is a technology for monitoring the traffic entering the device. It is applied on the monitoring device, samples at a certain rate through a sampling mechanism, and then sends the sampled information to the monitoring server. The traffic status of multiple agents can be viewed on the server. In this embodiment, Sflow has two types of sampling information: one is the statistical information of the port, and the other is the header of the sampled message. In this embodiment, the SFLOW Flow-sampling field supports, for example: Raw packet Header: intercepting all or part of the original message header; Ethernet Frame Data: for Ethernet messages, parsing the Ethernet header information of the message; IPV4 Data: for IPV4 messages, parsing the IPV4 header information of the message; Extended Router Data: for routed forwarded messages, recording the route forwarding information of the message; Extended Switch Data: for Ethernet messages forwarded at Layer 2, recording the VLAN conversion of the message and the conversion of the VLAN priority. The SFLOW Counter-sampling field supports: Generic Interface Counters: general interface statistics, including basic interface information and general interface traffic statistics; Ethernet Interface Counters: for Ethernet interfaces, used to count Ethernet-related traffic statistics;
Processor Information:用于统计设备CPU占用率,内存使用情况。sFlow使用的是UDP协议进行数据传输,目的端口默认是6343,为提升安全性,可以配置更改成其他端口。配合使用这几种采样方式,将采样信息发送到收集器,可以形成基于数据流的信息库,便于进行机器学习和分析。Processor Information: Used to collect statistics on device CPU usage and memory usage. sFlow uses the UDP protocol for data transmission, with the default destination port being 6343. This can be configured to a different port for improved security. By combining these sampling methods and sending the sampled information to the collector, a data flow-based information database can be formed, facilitating machine learning and analysis.
在本实施例中,sFlow配置后,传输网元可查看到如下sFlow信息:
sFlow Version:5
sFlow Global Information:
Agent IPv4 address:10.0.1.8
Counter Sampling Interval:15 seconds
Collector 1:
IPv4 Address:10.0.1.5
Port:6342
sFlow Port Information:
In this embodiment, after sFlow is configured, the transmission network element can view the following sFlow information:
sFlow Version:5
sFlow Global Information:
Agent IPv4 address:10.0.1.8
Counter Sampling Interval:15 seconds
Collector 1:
IPv4 Address:10.0.1.5
Port:6342
sFlow Port Information:
在本实施例中,以上配置可以在连接主机终端的eth1-1-1端口和连接业务服务器的eth1-1-2端口启用sFlow,并将采样的信息通过UDP协议的6342端口发送到采样服务器10.0.1.5上。In this embodiment, the above configuration can enable sFlow on the eth1-1-1 port connected to the host terminal and the eth1-1-2 port connected to the service server, and send the sampled information to the sampling server 10.0.1.5 through the 6342 port of the UDP protocol.
日志单元:将转发表项和控制表项、报文协议类型数量等信息记录下来,并形成日志,发送到日志服务器。在本实施例中,控制表项包括但不限于:分开控制表项、合一控制表项。Log unit: records information such as forwarding table entries and control table entries, message protocol types and quantities, and forms a log, which is then sent to the log server. In this embodiment, the control table entries include but are not limited to: separate control table entries and unified control table entries.
ML AI单元:用于控制平面的协议数据、管理平面的管理数据、转发平面的表项、采样、统计数据进行分析和学习,形成相关的策略进行下发执行或者上报到上级控制实体,此单元对传输网元是可选性功能,可以在远端的服务器上进行学习。ML AI unit: used to analyze and learn the protocol data of the control plane, the management data of the management plane, the table items, sampling, and statistical data of the forwarding plane, and form relevant strategies for execution or reporting to the upper-level control entity. This unit is an optional function for transmission network elements and can be learned on a remote server.
控制协议单元:传输网元处理固有的二层、三层、应用层协议的单元,例如:STP、RSTP、MSTP、RIP、OSPF、BGP、IGMP等用来进行拓扑信息收集、识别和呈现的控制协议和DHCP、DNS、802.1X、AAA等网络应用处理。Control protocol unit: The unit that processes the inherent Layer 2, Layer 3, and application layer protocols of the transmission network element. For example, control protocols such as STP, RSTP, MSTP, RIP, OSPF, BGP, and IGMP used for topology information collection, identification, and presentation, and network application processing such as DHCP, DNS, 802.1X, and AAA.
分布式路径计算单元:进行分布式路径计算,传统的路由器采用分布式的进行路由计算,网络的生存性相对较高,由于路径信息没有考虑到链路的使用状态情况,所选路径往往不是最优的,而基于安全网络控制器的集中式的路径计算方式能够算出更优路径,可以进行路径优化和调整,本技术方案将二者结合在一起,在集中式路径计算失效时,可以独立进行路径计算,可以提升网络弹性。Distributed path calculation unit: performs distributed path calculation. Traditional routers use distributed routing calculation, and the network survivability is relatively high. Since the path information does not take into account the usage status of the link, the selected path is often not optimal. The centralized path calculation method based on the security network controller can calculate a better path and can perform path optimization and adjustment. This technical solution combines the two. When the centralized path calculation fails, the path calculation can be performed independently, which can improve network resilience.
策略执行单元:将执行网络控制单元、安全控制单元下发的相关策略下发到转发单元和访问控制单元。Policy execution unit: executes the relevant policies issued by the network control unit and security control unit and sends them to the forwarding unit and access control unit.
发送、接收单元:与管理平面和控制平面其他设备通信的发送接收功能。控制平面的报文通过专用接口,图18中是使用eth0-0-2与安全网络控制器在认证通过后建立连接,使用的协议可以是SNMP、Netconf、Openflow等,建立连接后自动生成如下ACL:
10 permit src-ip host 10.0.1.1 dest-ip 10.0.1.8
20 permit src-ip host 10.0.1.8 dest-ip 10.0.1.1
30 deny src-ip any dest-ip anyTransmitter and receiver units: These transmit and receive functions communicate with other devices on the management and control planes. Control plane messages pass through dedicated interfaces. Figure 18 shows eth0-0-2 used to establish a connection with the security network controller after authentication. The protocols used can be SNMP, Netconf, OpenFlow, and others. Once the connection is established, the following ACL is automatically generated:
10 permit src-ip host 10.0.1.1 dest-ip 10.0.1.8
20 permit src-ip host 10.0.1.8 dest-ip 10.0.1.1
30 deny src-ip any dest-ip any
如果管理连接断开则ACL自动调整为
10 permit src-ip any dest-ip 10.0.1.8
20 permit src-ip host 10.0.0.8 dest-ip any
30 deny src-ip any dest-ip anyIf the management connection is disconnected, the ACL is automatically adjusted to
10 permit src-ip any dest-ip 10.0.1.8
20 permit src-ip host 10.0.0.8 dest-ip any
30 deny src-ip any dest-ip any
在本实施例中,可以接收10.0.1.0/24网段的安全控制器连接和认证。In this embodiment, a security controller connection and authentication may be received on the 10.0.1.0/24 network segment.
如图19所示,在本实施例中,策略执行单元和转发单元、访问控制单元配合能够执行安全网络控制器下发的基于认证授权的业务数据流的是否转发的策略。自学习单元,是基于平常的业务基线,记录统计一段时间的转发表项,形成历史记录基线,如果有超出此基线的数据需要转发,就会上报告警、启动认证、授权流程。As shown in Figure 19, in this embodiment, the policy execution unit, forwarding unit, and access control unit collaborate to execute the authentication and authorization-based forwarding policy issued by the security network controller. The self-learning unit records and compiles forwarding entries over a period of time based on a normal service baseline, forming a historical record baseline. If data that exceeds this baseline requires forwarding, an alarm is generated, initiating the authentication and authorization process.
参见图19,描述了安全策略服务器内部模块及内外部连接关系。Refer to Figure 19, which describes the internal modules of the security policy server and the internal and external connection relationships.
发送接收单元:,该单元作为安全策略服务器与内生安全网络内其他设备进行交互的单元,与内部其余模块都相连接。Sending and receiving unit: This unit acts as the security policy server to interact with other devices in the endogenous security network and is connected to the rest of the internal modules.
管理单元:该单元与发送接收单元连接,该单元的功能类似传输网元的管理单元,同样是认证通过后与管理服务器建立连接关系。Management unit: This unit is connected to the sending and receiving unit. The function of this unit is similar to the management unit of the transmission network element. It also establishes a connection with the management server after passing the authentication.
认证授权代理单元:该单元与发送接收单元连接,该单元功能一方面是内生安全网络的其他设备间进行自身身份认证,另一方面连接了安全网络控制器和认证授权服务器,对完全网络控制器作为认证授权的代理,从而为转发报文特征提取提供基础。Authentication and authorization proxy unit: This unit is connected to the sending and receiving unit. On the one hand, the function of this unit is to perform self-identity authentication between other devices in the endogenous security network. On the other hand, it connects the security network controller and the authentication and authorization server, and acts as an authentication and authorization agent for the complete network controller, thereby providing a basis for forwarding message feature extraction.
DNS查询单元:该单元与认证授权代理单元、转发特征提取单元、发送接收单元相连,在认证通过后,通常返回的是授权通过的域名信息,需要将域名信息转换为IP及端口号信息,本单元即提供此功能,作为转发特征提取的基础,如果认证授权代理单元返回的就是可以访问的业务服务器的IP地址及端口号,则不用再进行DNS查询,直接越过此单元。DNS query unit: This unit is connected to the authentication and authorization proxy unit, the forwarding feature extraction unit, and the sending and receiving unit. After the authentication is passed, the domain name information of the authorized domain name is usually returned. The domain name information needs to be converted into IP and port number information. This unit provides this function as the basis for forwarding feature extraction. If the authentication and authorization proxy unit returns the IP address and port number of the accessible business server, there is no need to perform a DNS query and this unit can be directly bypassed.
转发特征提取单元:该单元与安全策略生成单元、发送接收单元、DNS单元、采样分析学习单元、转发表项学习单元、统计分析学习单元相连,该单元功能是提取认证通过的访问连接间的IP源地址、IP目的地址、协议号、目的端口号、源端口号信息,以供安全策略生成单元使用。Forwarding feature extraction unit: This unit is connected to the security policy generation unit, the sending and receiving unit, the DNS unit, the sampling analysis learning unit, the forwarding table learning unit, and the statistical analysis learning unit. The function of this unit is to extract the IP source address, IP destination address, protocol number, destination port number, and source port number information between authenticated access connections for use by the security policy generation unit.
转发表项学习单元:该单元与发送接收单元、转发特征提取单元连接,其从传输网元持续读入转发表项并生成临时表项。表项包括但不限于:MAC表、ARP表、FIB表、流表,形式见图18部分的描述。Forwarding Table Learning Unit: This unit is connected to the sending and receiving unit and the forwarding feature extraction unit. It continuously reads forwarding table entries from the transmission network element and generates temporary table entries. Table entries include but are not limited to: MAC table, ARP table, FIB table, and flow table. The format is described in Figure 18.
采样分析学习单元:该单元与发送接收单元、转发特征提取单元连接,该单元从采集收集器读取数据,并进行数据分析,从采样数据中提取转发数据特征,然后供转发特征提取单元使用。例如IPFIX采样,PFIX是基于“流”的概念,一个流是指,来自相同的子接口,有相同的源和目的IP地址,协议类型,相同的源和目的协议端口号,以及相同ToS的报文,通常为5元组。IPFIX会记录这个流的统计信息,包括:时间戳,报文数,总的字节数。IPFIX主要包括三个设备Export、Collector、Analyzer,三个设备之间的关系如下:Export对网络流进行分析处理,提取符合条件的流统计信息,并将统计信息输出Collector;Collector负责解析Export的数据报文,把统计数据收集到数据库中,可供Analyser进行解析。Analyser从Collector中提取统计数据,进行后续处理,为各种业务提供依据。采样分析学习单元就是作为Analyser,提取一段时间传输网元转发数据流特征信息并发送给转发特征提取单元使用。Sampling, Analysis, and Learning Unit: This unit connects to the sending and receiving units and the forwarding feature extraction unit. It reads data from the collection and collection units, performs data analysis, and extracts forwarding data features from the sampled data for use by the forwarding feature extraction unit. For example, IPFIX sampling is based on the concept of "flows." A flow is a packet originating from the same sub-interface with the same source and destination IP addresses, protocol type, source and destination protocol port numbers, and ToS, typically a 5-tuple. IPFIX records statistics for this flow, including timestamp, number of packets, and total byte count. IPFIX primarily consists of three devices: Exporter, Collector, and Analyzer. The relationship between these three devices is as follows: Exporter analyzes and processes network flows, extracts qualified flow statistics, and outputs these statistics to Collector. Collector parses Exporter data packets and collects the statistics into a database for analysis by Analyzer. Analyzer extracts the statistics from Collector for subsequent processing, providing a basis for various services. The Sampling, Analysis, and Learning Unit acts as an analyzer, extracting characteristics of the data flows forwarded by transmission network elements over a period of time and sending them to the forwarding feature extraction unit for use.
统计分析学习单元:该单元与发送接收单元、转发特征提取单元相连,该单元接收传输网元及收集器等提供的对流、端口、CPU利用率等的统计信息,利用机器学习手段监视流量状况,可以生成相应的规则提供给安全策略生成单元使用。Statistical analysis and learning unit: This unit is connected to the sending and receiving unit and the forwarding feature extraction unit. It receives statistical information on convection, port, CPU utilization, etc. provided by transmission network elements and collectors, uses machine learning methods to monitor traffic conditions, and can generate corresponding rules for use by the security policy generation unit.
其余安全策略输入单元与发送接收单元、安全策略生成单元相连,其接收本地威胁分析服务器和云端安全威胁分析服务器提供的威胁信息及其他服务器信息,并将其特征梳理为例如:5元组、7元组的形式,提供给安全策略生成单元使用。The remaining security policy input units are connected to the sending and receiving units and the security policy generation unit. They receive threat information and other server information provided by the local threat analysis server and the cloud security threat analysis server, and sort out their features into the form of, for example, 5-tuples and 7-tuples, and provide them to the security policy generation unit for use.
安全策略生成单元:该单元与转发特征提取单元、其余安全策略输入单元、发送接收单元、安全策略管理单元相连。该单元综合前述相关单元的输入信息,并生成安全策略,输出给安全策略管理单元。Security Policy Generation Unit: This unit is connected to the forwarding feature extraction unit, other security policy input units, the sending and receiving unit, and the security policy management unit. This unit integrates the input information of the aforementioned related units and generates a security policy, which is then output to the security policy management unit.
安全策略管理单元:该单元与安全策略生成单元、发送接收单元相连,该单元主要进行安全策略库的维护、规则集的优化、安全策略的下发管理。Security policy management unit: This unit is connected to the security policy generation unit and the sending and receiving unit. This unit is mainly responsible for maintaining the security policy library, optimizing the rule set, and issuing security policies.
如图20所示,本实施例的自学习方法建立正常业务数据流建立白名单规则表,并下发到传输网元的流表、转发表及ACL表。转发表项学习单元在学习期间每个一定时间,例如60S,持续读取转发表项、ACL、流表,形成表项临时数据库;统计分析学习单元会持续读取统计数据并进行预处理,并形成统计数据库。采样分析学习单元,实时读取流采样数据,进行预处理形成流数据,然后查询流数据规则是否在流表中,如已经在流表中则返回到读取流采样数据步骤,如果不在流表中,则查询是否在ACL中,如果已在ACL中则返回到读取流采样数据步骤,如果不在ACL中则统计源目的主机访问次数,并读取设定的阈值,与阈值比较,如果主机访问次数小于设定的阈值,则该路径的访问次数+1,如果大于设定的阈值,则加入默认安全列表;安全策略生成单元会根据统计分析学习单元提供的端口带宽、CPU、内存的使用率健康情况判断是否加入白名单规则表,如果是健康的则添加新规则到白名单规则表,如果发现端口带宽、CPU、内存使用率超出健康阈值则会告警并停止;安全策略管理单元会依据安全策略生成单元生成的白名单规则集进行规则优化,通常依据业务的优先级和数据流量的大小进行优化,优先级高的放在规则库的前面,流量大的次之,并负责将安全策略通过安全网络控制器下发到传输网元的安全策略执行单元。As shown in Figure 20, the self-learning method of this embodiment establishes a whitelist rule table for normal service data flows and distributes it to the flow table, forwarding table, and ACL table of the transmission network element. The forwarding table entry learning unit continuously reads forwarding table entries, ACLs, and flow tables at regular intervals (e.g., 60 seconds) during the learning period to form a temporary database of table entries. The statistical analysis learning unit continuously reads and preprocesses statistical data to form a statistical database. The sampling, analysis, and learning unit reads flow sampling data in real time, performs preprocessing to form flow data, and then queries whether the flow data rules are in the flow table. If so, it returns to the step of reading the flow sampling data. If not, it queries whether it is in the ACL. If so, it returns to the step of reading the flow sampling data. If not, it counts the number of source and destination host accesses and reads the set threshold. If the host access count is less than the set threshold, the access count of the path is increased by 1. If it is greater than the set threshold, it is added to the default security list. The security policy generation unit determines whether to add to the whitelist rule table based on the health status of the port bandwidth, CPU, and memory usage provided by the statistical analysis and learning unit. If the health status is good, the new rule is added to the whitelist rule table. If the port bandwidth, CPU, or memory usage exceeds the health threshold, an alarm is issued and the process stops. The security policy management unit optimizes the whitelist rule set generated by the security policy generation unit. It usually optimizes based on the priority of the service and the size of the data flow, placing the higher priority rules at the top of the rule base, followed by the higher traffic flow. The unit is responsible for issuing the security policy to the security policy execution unit of the transmission network element through the security network controller.
在本实施例中,基于源主机、目的主机的访问路径的自学习算法包括但不限于如下逻辑:In this embodiment, the self-learning algorithm based on the access path of the source host and the destination host includes but is not limited to the following logic:
输入:规则集R,阈值thresholdInput: rule set R, threshold threshold
输出:新的规则列表集Output: New rule list set
算法过程:
(1)//初始时RuleSets为空
(2)For each rule r∈R
(3)r[count]=1;
(4)End for
(5)Set threshold;
(6)While r∈R;r[count]>threshold do
(7)Add whitelist;
(8)Else
(9)R[count]=r[count]+1;
(10)End while
(11)Output all updated set of rulesAlgorithm process:
(1) //Initially, RuleSets is empty
(2)For each rule r∈R
(3) r[count] = 1;
(4)End for
(5)Set threshold;
(6)While r∈R; r[count]>threshold do
(7)Add whitelist;
(8)Else
(9) R[count]=r[count]+1;
(10)End while
(11)Output all updated set of rules
前述算法中,函数r[count]表示源主机与目的主机的访问次数,也对应传输网元收到相应报文的次数,阈值threshold则由网络管理员根据记录的处理方法级网络中的实际数据模式而设定,通过一段时间的机器学习后,也可以以机器学习统计出的数据作为设定阈值。In the aforementioned algorithm, the function r[count] represents the number of visits to the source host and the destination host, which also corresponds to the number of times the transmission network element receives the corresponding message. The threshold value is set by the network administrator based on the actual data pattern in the recorded processing method-level network. After a period of machine learning, the data statistically generated by machine learning can also be used as the threshold value.
在本实施例中,利用自动学习或人工智能等方法,建立业务基线,在传输网元形成:转发表项或流表、访问控制列表,保证仅转发正常的业务数据报文。In this embodiment, a service baseline is established by using methods such as automatic learning or artificial intelligence, and a forwarding table or flow table and an access control list are formed in the transmission network element to ensure that only normal service data packets are forwarded.
在本实施例中,一种安全网络架构还包括:管理面、控制面、业务转发面,管理面、控制面以及业务转发面相互隔离,以实现风险隔离,保证业务转发面的攻击、风险不扩散到控制面和管理面。In this embodiment, a secure network architecture also includes: a management plane, a control plane, and a service forwarding plane. The management plane, the control plane, and the service forwarding plane are isolated from each other to achieve risk isolation and ensure that attacks and risks on the service forwarding plane do not spread to the control plane and the management plane.
在本实施例中,为了使网络架构具有网络弹性,将传统的分布式路径计算与转发和软件定义网络的功能相融合,将分布式的高生存性和集中式的优化控制结合在一起,能够在安全网络控制器故障和损毁的情况下,保证分布式的路由计算和转发的有效性,利用安全网络控制器进行冗余部署、分布式部署。In this embodiment, in order to make the network architecture have network resilience, traditional distributed path calculation is integrated with forwarding and software-defined network functions, and distributed high survivability and centralized optimization control are combined together. In the event of failure or damage of the security network controller, the effectiveness of distributed routing calculation and forwarding can be guaranteed, and the security network controller is used for redundant deployment and distributed deployment.
在本实施例中,将特定的恶意、或潜在威胁的访问加入黑名单,禁止访问;未知流量访问可使用动态灰名单机制,转发网元通过管理控制通道传送到安全控制器和认证授权系统进行认证或通过人工确认或自动安全审查,通过后放入白名单,不通过,默认丢弃,并通告到威胁分析等相关平台;灰名单流量如何处理可定制,如果认证不通过,根据宏观安全策略,可以是禁止、并告警,可以是临时转发并纳入监控,在本实施例中中,可加入动态黑名单等,在安全策略、认证、授权服务器不可用时,采用定制的默认策略,各转发网元依据定制的默认策略执行未知流量的访问控制,或者采用分布式自动学习、AI统计方式工作。In this embodiment, specific malicious or potential threat access is added to the blacklist and access is prohibited; a dynamic graylist mechanism can be used for unknown traffic access, and the forwarding network element transmits it to the security controller and authentication and authorization system through the management control channel for authentication or through manual confirmation or automatic security review. If it passes, it is placed in the whitelist; if it fails, it is discarded by default and notified to relevant platforms such as threat analysis; how to handle graylist traffic can be customized. If the authentication fails, according to the macro security policy, it can be prohibited, an alarm can be issued, or it can be temporarily forwarded and included in the monitoring. In this embodiment, a dynamic blacklist can be added, etc. When the security policy, authentication, and authorization server are unavailable, a customized default policy is adopted. Each forwarding network element performs access control for unknown traffic based on the customized default policy, or adopts distributed automatic learning and AI statistics.
在本实施例中,利用传输网元统计进行上报操作,上报操作包括但不限于:统计、采样,以与相关服务器配合进行威胁分析和攻击检测及响应,根据最新的威胁分析结果,下发访问控制列表,从而隔离风险。在本实施例中,隔离是基于安全的增强需要在网络部署和实施、管理上做出的划分和隔离,目的是为了防范风险的跨面传播。In this embodiment, transmission network element statistics are used for reporting operations, including but not limited to statistics and sampling, to collaborate with relevant servers for threat analysis, attack detection, and response. Based on the latest threat analysis results, access control lists are issued to isolate risks. In this embodiment, isolation is based on security enhancements required for network deployment, implementation, and management, with the goal of preventing the cross-plane spread of risks.
在本实施例中,将所有通信信息相关资源的作为网络服务的一部分纳入安全网络整体管理,仅开放服务器、终端正常开放的业务端口的访问,非开放端口禁止访问,可以在传输网元上基于ACL、流表来控制,或在智能网卡、数据处理单元等转发处理能力强的单元上进行访问控制;在本实施例中,通信信息相关资源包括但不限于:主体终端、服务器、存储设备、数据资产。In this embodiment, all communication information-related resources are included in the overall management of the secure network as part of the network service. Only the normally open service ports of servers and terminals are open to access, and access to non-open ports is prohibited. Access control can be based on ACLs and flow tables on transmission network elements, or on units with strong forwarding processing capabilities such as smart network cards and data processing units. In this embodiment, communication information-related resources include but are not limited to: main terminals, servers, storage devices, and data assets.
在本实施例中,在主机终端、服务器的软件中设置基于业务处理单元/程序的攻击检测机制,当业务单元/程序在正常通信过程中,接收到异常的报文,将异常报文转发给本机的控制单元去处理,本机控制单元提取非正常报文的特征,在本实施例中,非正常报文的特征包括但不限于:源IP、源MAC、协议类型以及源端口,并将特征信息上报给控制面的相应设备,由其下发阻断策略,并通知相关分析处理单元启动分析处理。In this embodiment, an attack detection mechanism based on a business processing unit/program is set in the software of the host terminal and the server. When the business unit/program receives an abnormal message during normal communication, the abnormal message is forwarded to the local control unit for processing. The local control unit extracts the characteristics of the abnormal message. In this embodiment, the characteristics of the abnormal message include but are not limited to: source IP, source MAC, protocol type and source port, and reports the characteristic information to the corresponding device of the control plane, which issues a blocking strategy and notifies the relevant analysis and processing unit to start analysis and processing.
如图21所示,在本实施例中,主机终端、应用服务器的业务单元异常报文上报流程,包括以下具体步骤:As shown in FIG21 , in this embodiment, the process of reporting abnormal service unit messages of the host terminal and the application server includes the following specific steps:
S101’、业务单元打开端口建立正常会话;S101', the business unit opens the port to establish a normal session;
S102’、业务单元接收到非正常会话的报文;S102': The service unit receives a message of an abnormal session;
S103’、业务单元将非正常报文发送给控制单元处理;S103', the business unit sends the abnormal message to the control unit for processing;
S104’、控制单元提取非正常报文特征,源IP、源MAC、协议类型、源端口等信息;S104', the control unit extracts abnormal message features, source IP, source MAC, protocol type, source port and other information;
S105’、控制单元将特征信息上报安全网络控制器,由其下发阻断策略,并通知相关分析单元处理;S105', the control unit reports the characteristic information to the security network controller, which issues a blocking strategy and notifies the relevant analysis unit to process;
在本实施例中,通过上述的管理平面、控制平面以及转发平面的端到端接入控制,基本杜绝了恶意访问和攻击的出现,参见图19,在本实施例中,进行检测增强操作,设计一个主机终端、应用服务器基于业务处理单元/程序的攻击检测机制,当业务单元/程序在正常通信过程中,接收到异常的报文,将异常报文转发给本机的控制单元去处理,本机控制单元提取非正常报文的特征并将特征信息上报给控制面的相应设备,例如安全网络控制器,由其下发阻断策略,并通知相关分析处理单元启动分析处理,上报安全网络控制器,可以是基于已经预配置好的对端的IP地址(通常相互做好认证),也可以设置成特定的组播地址,用组播地址的好处就是多个设备都可以接收该信息,并同步启动处理。在本实施例中,非正常报文的特征包括但不限于:源IP、源MAC、协议类型以及源端口。In this embodiment, through the end-to-end access control of the management plane, control plane, and forwarding plane, malicious access and attacks are essentially eliminated. Referring to FIG19 , in this embodiment, detection enhancement is performed, and a host terminal and application server attack detection mechanism based on a service processing unit/program is designed. When a service unit/program receives an abnormal message during normal communication, the abnormal message is forwarded to the local control unit for processing. The local control unit extracts the characteristics of the abnormal message and reports the characteristic information to the corresponding device on the control plane, such as the security network controller, which issues a blocking policy and notifies the relevant analysis and processing unit to initiate analysis and processing. The report to the security network controller can be based on the pre-configured IP address of the other end (usually mutual authentication is done) or a specific multicast address. The advantage of using a multicast address is that multiple devices can receive the information and start processing synchronously. In this embodiment, the characteristics of the abnormal message include, but are not limited to: source IP, source MAC, protocol type, and source port.
通过此实施例,正常业务使用的TCP端口或UDP端口可以发现异常报文和攻击,并上报处理,自动下发转发黑名单,从而进一步增强了网络的内生安全性,在特别重视安全的工业场景、自动驾驶等场景有非常好的应用价值。Through this embodiment, the TCP port or UDP port used for normal business can detect abnormal messages and attacks, report them for processing, and automatically issue a forwarding blacklist, thereby further enhancing the inherent security of the network. It has very good application value in industrial scenarios, autonomous driving and other scenarios that attach great importance to security.
在本实施例中,异常报文获得方式包括但不限于:报文序列号、源端口号、源IP地址等以及参考下表4:In this embodiment, the abnormal message acquisition method includes but is not limited to: message sequence number, source port number, source IP address, etc., and refer to the following Table 4:
表4异常报文情况列表
Table 4 Abnormal message list
如图22a、图22b、图22c以及图22d所示,在本实施例中,便于过渡部署,可以使用MAC限制方案,参见图22a,将本企业主机终端、服务器等的MAC地址,通过摄像头扫描或者手工输入的方式输入到本企业MAC地址库,存到网络控制器或者认证服务器中,交换机具有ASIC和CPU,可以基于ASIC进行硬件MAC学习,也可以基于CPU进行软件MAC学习;参见图22b,显示了硬件MAC学习的流程,参见图22c,显示了CPU软件MAC学习流程,CPU软件学习的流程图中增加地址库核验的功能,配置MAC学习为软学习的方案(上送CPU学习),新的报文到来,如果没有MAC表项就上送CPU进行源MAC学习,在学习时是与安全网络控制器或认证服务器通信,核验源MAC地址是否在地址库中,在地址库中的才能学习并下发到转发层面的MAC表中,不在地址库中则丢弃,不学习到转发层面MAC表中,并且未知MAC要上送告警进行审查处理,为了加快处理速度,也可以在交换机的自身控制层面存储/缓存MAC地址库以供核验;参见图22d,为提升学习速度,在启动时可以先用硬件学习的模式,形成转发表,启动一段时间后转为上送CPU软学习MAC表的方式,然后进行一次MAC表项和是否在本企业MAC地址库中的核验,如果不在,丢弃报文、不添加表项并,告警,如果人工确认是本企业设备MAC地址后可以加入本企业地址库中,如果确认非本企业设备MAC地址,可以加入黑名单中,禁止报文转发,进一步提升安全性。这样可以防止非自有设备的接入。图22a、图22b、图22c以及图22d描述了本企业MAC地址库的形成和使用,其中A图是展示可以采用分布式MAC地址库。在中小企业中,IT运维人员少,IT体系完善度低,此方案可以降低运维复杂度和难度的情况下,提升网络安全性。As shown in Figures 22a, 22b, 22c and 22d, in this embodiment, a MAC restriction solution can be used to facilitate transitional deployment. Referring to Figure 22a, the MAC addresses of the enterprise's host terminals, servers, etc. are input into the enterprise's MAC address library through camera scanning or manual input, and stored in the network controller or authentication server. The switch has ASIC and CPU, and can perform hardware MAC learning based on ASIC or software MAC learning based on CPU; referring to Figure 22b, which shows the process of hardware MAC learning, and referring to Figure 22c, which shows the process of CPU software MAC learning. The function of address library verification is added to the flowchart of CPU software learning, and MAC learning is configured as a soft learning solution (sent to CPU for learning). When a new message arrives, if there is no MAC table entry, it is sent to the CPU for source MAC learning. During learning, it is connected to the security network controller or authentication server. When communicating with the server, the source MAC address is verified to see if it exists in the address database. Only if it does, it is learned and sent to the forwarding layer's MAC table. If it does not exist, it is discarded and not learned into the forwarding layer's MAC table. Furthermore, an unknown MAC address is sent as an alarm for review and processing. To speed up processing, the MAC address database can also be stored/cached within the switch's control layer for verification. See Figure 22d. To improve learning speed, hardware learning can be used at startup to form a forwarding table. After a period of startup, the MAC table is sent to the CPU for soft learning. The MAC table entry is then checked against the company's MAC address database. If not, the packet is discarded, the entry is not added, and an alarm is generated. If the MAC address is manually confirmed to be the company's device, it can be added to the company's address database. If it is confirmed to be a non-company device, it can be added to a blacklist, prohibiting packet forwarding, further improving security. This prevents access by non-company devices. Figures 22a, 22b, 22c, and 22d illustrate the formation and use of the company's MAC address database, with Figure A demonstrating the use of a distributed MAC address database. In small and medium-sized enterprises, there are few IT operation and maintenance personnel and the IT system is not well-developed. This solution can improve network security while reducing the complexity and difficulty of operation and maintenance.
如图23所示,在本实施例中,为了在网络设备掉电时,快速启动,并快速恢复网络的转发,参见图23,展示了一种转发能力快速恢复的机制,交换机、路由器运行一段时间,例如10分钟后,将学习的MAC表项和IP表项或者流表、ACL规则表存储下来,每过10分钟执行一次存储动作;当交换机重启时,快速将缓存的MAC表项、IP表项、流表、ACL规则表读取出来,快速下发到转发面,从而实现业务的快速恢复,然后再由控制层进行刷新。这样又增强了网络弹性。在军用的车辆、轮船、无人设备等网络中,能够快速恢复通信是非常重要的需求,能够提供设备自身及己方人员的生存性,此特性就满足此类需求。As shown in Figure 23, in this embodiment, to quickly boot up and restore network forwarding when network devices lose power, a mechanism for rapid forwarding capacity recovery is demonstrated. After a period of operation, for example, 10 minutes, switches and routers store learned MAC and IP table entries, or flow tables and ACL rule tables. This storage operation is performed every 10 minutes. When the switch restarts, the cached MAC and IP table entries, flow tables, and ACL rule tables are quickly retrieved and distributed to the forwarding plane, enabling rapid service recovery. The control layer then refreshes the cached MAC and IP table entries. This further enhances network resiliency. Rapid communication restoration is a crucial requirement in networks such as military vehicles, ships, and unmanned equipment, ensuring the survivability of both the equipment itself and its personnel. This feature meets these requirements.
本申请采用的自动学习的业务绑定方式,优点是适应能力强,兼容性好,缺点是,新增业务时,要么再次进行学习,要么进行再确认。The automatic learning service binding method adopted in this application has the advantages of strong adaptability and good compatibility. The disadvantage is that when adding a new service, either learning or reconfirmation is required.
这种自学习的模式,可以用在MAC认证模式中,自动学习生成MAC地址库,从而解决需登记MAC地址,管理复杂问题,从而增强MAC认证模式的适应性,规避802.1X部署复杂的问题。This self-learning mode can be used in MAC authentication mode to automatically learn and generate a MAC address database, thereby solving the problem of registering MAC addresses and complex management, thereby enhancing the adaptability of MAC authentication mode and avoiding the complex deployment of 802.1X.
实施例3Example 3
一种业务数据流转发特征绑定传输网元转发表项设备,包括:A device for binding service data flow forwarding characteristics to transmission network element forwarding table entries, comprising:
处理器;processor;
存储器;Memory;
计算机执行程序,所述计算机执行程序设置于所述存储器中,所述计算机执行程序由所述处理器执行,所述处理器执行计算机执行程序时实现如前述实施例1所述的业务数据流转发特征绑定传输网元转发表项方法。A computer execution program, wherein the computer execution program is set in the memory, and the computer execution program is executed by the processor. When the processor executes the computer execution program, the method for binding the service data flow forwarding characteristics to the transmission network element forwarding table items as described in the aforementioned embodiment 1 is implemented.
实施例4Example 4
在本实施例中,业务数据流转发特征绑定传输网元转发表项设备一种计算机可读存储介质,包括存储器、处理器、通信接口以及总线。In this embodiment, the device for binding service data flow forwarding characteristics to transmission network element forwarding entries is a computer-readable storage medium including a memory, a processor, a communication interface, and a bus.
在本实施例中,前述存储器可以包括用于数据或指令的大容量存储器。举例来说而非限制,存储器可包括:HDD、软盘驱动器、闪存、光盘、磁光盘、磁带或通用串行总线(USB)驱动器或者两个或更多个以上这些的组合。在合适的情形下,存储器可包括可移除或不可移除和/或固定的计算机程序,所述计算机程序存储于计算机可读存储介质。在合适的情况下,存储器可在种业务数据流转发特征绑定传输网元转发表项中;In this embodiment, the aforementioned memory may include a large-capacity memory for data or instructions. By way of example and not limitation, the memory may include: an HDD, a floppy disk drive, a flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a universal serial bus (USB) drive, or a combination of two or more of these. Where appropriate, the memory may include a removable or non-removable and/or fixed computer program stored in a computer-readable storage medium. Where appropriate, the memory may be in a forwarding table entry for a type of service data flow forwarding feature binding transmission network element;
在所述计算机程序运行时,控制计算机可读存储介质在外界设备的内部或外部。在特定实施例中,上执行如前述存储器可为例如:非易失性固态存储器。在特定实施例中,前述存储器包括只读存储器(ROM)。在合适的情况下,该ROM可为例如:掩模编程的ROM、可编程ROM(PROM)、可擦除PROM(EPROM)、电可擦除PROM(EEPROM)、电可改写ROM(EAROM)或闪存或者两个或更多个以上这些的组合。When the computer program is executed, the computer-readable storage medium is controlled to be inside or outside the external device. In a specific embodiment, the aforementioned memory may be, for example, a non-volatile solid-state memory. In a specific embodiment, the aforementioned memory includes a read-only memory (ROM). Where appropriate, the ROM may be, for example, a mask-programmable ROM, a programmable ROM (PROM), an erasable PROM (EPROM), an electrically erasable PROM (EEPROM), an electrically rewritable ROM (EAROM), or a flash memory, or a combination of two or more of these.
在本实施例中,处理器可以包括中央处理器(CPU),或者特定集成电路(ASIC),In this embodiment, the processor may include a central processing unit (CPU) or an application specific integrated circuit (ASIC).
或者可以被配置成实施本申请实施例的一个和/或多个集成电路。Alternatively, it may be configured to implement one and/or multiple integrated circuits of the embodiments of the present application.
通信接口,主要用于实现本申请实施例中各模块以及单元之间的通信。The communication interface is mainly used to realize the communication between the modules and units in the embodiments of the present application.
所述存储器、所述处理器和所述通信接口通过所述总线连接并完成相互间的通信。The memory, the processor and the communication interface are connected via the bus and communicate with each other.
也即,前述存储器用于存储程序代码。前述处理器通过读取存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于执行内生安全网络方法。其中,该业务数据流转发特征绑定传输网元转发表项方法包括但不限于上述实施例中的步骤S1至步骤S4。That is, the aforementioned memory is used to store program code. The aforementioned processor reads the executable program code stored in the memory to run the program corresponding to the executable program code to implement the endogenous security network method. The method for binding service data flow forwarding characteristics to transmission network element forwarding table entries includes but is not limited to steps S1 to S4 in the above-mentioned embodiment.
综上,本申请在大、中型企业中,有相应的IT管理人员,布设认证授权业务数据流自动绑定模式比较好。In summary, this application is suitable for large and medium-sized enterprises with corresponding IT management personnel to deploy the automatic binding mode of authentication and authorization business data flow.
在小微型企业,以及一些小的局域网中,例如战舰、坦克、装甲车、自动驾驶车辆中,可部署轻量级的认证授权方案或自动化学习的方式,在工业网络中,业务变化比较慢的场景中,自动化学习的方式应用效果也比较好。In small and micro enterprises, as well as some small local area networks, such as warships, tanks, armored vehicles, and self-driving vehicles, lightweight authentication and authorization solutions or automated learning methods can be deployed. In industrial networks, where business changes are relatively slow, automated learning methods are also more effective.
本申请采用两种模式,都实现了正常业务数据流和传输网元的转发表项和白名单的自动绑定,从而实现安全内生化,自动化,无需像以前那样外挂设备、单独部署安全策略,从而增加采购成本、运维成本,且防止未知攻击的方式一直是难度较大的,而本申请是与正常业务自动化绑定部署,因此,非正常数据流难以穿透网络,提高了基本安全防护水平,并且大大降低的安全运维成本。This application adopts two modes, both of which realize the automatic binding of normal business data flow and the forwarding table items and whitelists of transmission network elements, thereby realizing endogenous security and automation. There is no need for external equipment and separate deployment of security policies as before, which increases procurement costs and operation and maintenance costs. In addition, the method of preventing unknown attacks has always been difficult. This application is automatically bound and deployed with normal business. Therefore, abnormal data flows are difficult to penetrate the network, which improves the basic security protection level and greatly reduces the security operation and maintenance costs.
本申请基于路由交换架构平台提供业务安全能力,无需各种复杂的硬件平台;This application provides business security capabilities based on the routing and switching architecture platform, without the need for various complex hardware platforms;
平台复用,内生安全,安全能力和业务能力同步提升;Platform reuse, inherent security, and simultaneous improvement of security and business capabilities;
基于路由交换平台,内生安全,能形成一体化的低成本的安全价值,不会导致产品种类日益繁杂,和协同困难问题;Based on a routing and switching platform, it provides inherent security and can form an integrated, low-cost security value chain, without causing increasing complexity in product types and difficulties in coordination.
安全的配置基于正常的业务自动生成和下发,从而减少配置工作量,降低使用难度和维护成本;Secure configuration is automatically generated and issued based on normal business operations, thus reducing configuration workload, ease of use, and maintenance costs.
能始终在线发挥价值,维护常态化的基本安全水平,而不仅仅是为了合规;Ability to always be online to deliver value and maintain a normalized basic level of security, not just for compliance purposes;
由于降低了产品的部署使用难度,从而降低了部署使用成本,大中小客户也可以使用,从而进一步摊销成本,提升客户价值;By reducing the difficulty of product deployment and use, the deployment and use costs are reduced, and large, medium and small customers can also use it, thereby further amortizing costs and improving customer value;
内生安全,跟随基础设施预算,无需单独立项采购安全设备。Built-in security follows the infrastructure budget, eliminating the need to purchase security equipment separately.
通用的基本安全属性,解决定制化问题。Universal basic security attributes to solve customization problems.
自动化关联部署,降低对交付部署、运营维护人员依赖,从而降低部署成本。Automated associated deployment reduces reliance on delivery, deployment, operations, and maintenance personnel, thereby reducing deployment costs.
本申请解决了因IP网络的开放性,导致自身安全防护能力低,需外挂大量安全防护设施,效果差、成本高,难以形成低成本的安全防护能力,导致易攻难守的技术问题。This application solves the technical problem that due to the openness of IP networks, their own security protection capabilities are low, a large number of external security protection facilities are required, the effect is poor and the cost is high, it is difficult to form low-cost security protection capabilities, and it is easy to attack but difficult to defend.
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。The above embodiments are only used to illustrate the technical solutions of the present application, rather than to limit them. Although the present application has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that they can still modify the technical solutions described in the aforementioned embodiments, or make equivalent replacements for some of the technical features therein. However, these modifications or replacements do not deviate the essence of the corresponding technical solutions from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (14)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410208320.XA CN120474727A (en) | 2024-02-26 | 2024-02-26 | Intrinsically secure network methods, architectures, media, and devices |
| CN202410208320.X | 2024-02-26 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025180269A1 true WO2025180269A1 (en) | 2025-09-04 |
Family
ID=96637502
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2025/077983 Pending WO2025180269A1 (en) | 2024-02-26 | 2025-02-19 | Endogenous-security network method and architecture, medium, and device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN120474727A (en) |
| WO (1) | WO2025180269A1 (en) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160352731A1 (en) * | 2014-05-13 | 2016-12-01 | Hewlett Packard Enterprise Development Lp | Network access control at controller |
| CN110022262A (en) * | 2018-01-09 | 2019-07-16 | 杭州达乎科技有限公司 | A kind of mthods, systems and devices for realizing planar separation based on SDN network |
| CN110958262A (en) * | 2019-12-15 | 2020-04-03 | 国网山东省电力公司电力科学研究院 | Ubiquitous Internet of Things security protection gateway system, method and deployment architecture for power industry |
| CN114978584A (en) * | 2022-04-12 | 2022-08-30 | 深圳市蔚壹科技有限公司 | Network security protection security method and system based on unit unit |
| CN115865456A (en) * | 2022-11-25 | 2023-03-28 | 中国船舶集团有限公司第七〇九研究所 | DDoS attack defense method, device and system based on SDN network |
| CN117234857A (en) * | 2023-11-10 | 2023-12-15 | 之江实验室 | An endogenous security architecture system and anomaly detection method |
-
2024
- 2024-02-26 CN CN202410208320.XA patent/CN120474727A/en active Pending
-
2025
- 2025-02-19 WO PCT/CN2025/077983 patent/WO2025180269A1/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160352731A1 (en) * | 2014-05-13 | 2016-12-01 | Hewlett Packard Enterprise Development Lp | Network access control at controller |
| CN110022262A (en) * | 2018-01-09 | 2019-07-16 | 杭州达乎科技有限公司 | A kind of mthods, systems and devices for realizing planar separation based on SDN network |
| CN110958262A (en) * | 2019-12-15 | 2020-04-03 | 国网山东省电力公司电力科学研究院 | Ubiquitous Internet of Things security protection gateway system, method and deployment architecture for power industry |
| CN114978584A (en) * | 2022-04-12 | 2022-08-30 | 深圳市蔚壹科技有限公司 | Network security protection security method and system based on unit unit |
| CN115865456A (en) * | 2022-11-25 | 2023-03-28 | 中国船舶集团有限公司第七〇九研究所 | DDoS attack defense method, device and system based on SDN network |
| CN117234857A (en) * | 2023-11-10 | 2023-12-15 | 之江实验室 | An endogenous security architecture system and anomaly detection method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN120474727A (en) | 2025-08-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11843577B2 (en) | Fingerprinting to identify devices and applications for use in management and policy in the cloud | |
| US20230164116A1 (en) | Multi-tenant cloud-based firewall systems and methods | |
| US11134386B2 (en) | Device identification for management and policy in the cloud | |
| US10511607B2 (en) | Multidimensional risk profiling for network access control of mobile devices through a cloud based security system | |
| Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
| US10728246B2 (en) | Service driven split tunneling of mobile network traffic | |
| US10225740B2 (en) | Multidimensional risk profiling for network access control of mobile devices through a cloud based security system | |
| Li et al. | A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures | |
| US7735116B1 (en) | System and method for unified threat management with a relational rules methodology | |
| US9723019B1 (en) | Infected endpoint containment using aggregated security status information | |
| CN101674307B (en) | Hierarchical application of security services with a computer network | |
| US8584215B2 (en) | System and method for securing distributed exporting models in a network environment | |
| Hussein et al. | Software-Defined Networking (SDN): the security review | |
| Thimmaraju et al. | Outsmarting network security with SDN teleportation | |
| US10021070B2 (en) | Method and apparatus for federated firewall security | |
| US20250317466A1 (en) | System and Method for Improving Cybersecurity of a Network | |
| Belmonte Martin et al. | Threat landscape and good practice guide for software defined networks/5g | |
| Soltani et al. | Security of topology discovery service in sdn: Vulnerabilities and countermeasures | |
| US12120128B1 (en) | Route and packet flow evaluation on a cloud exchange | |
| WO2025180269A1 (en) | Endogenous-security network method and architecture, medium, and device | |
| Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
| Abd-Allah et al. | A Comprehensive Survey on Security Challenges and Solutions in Software-Defined Network | |
| Keromytis et al. | Designing firewalls: A survey | |
| Schmitt | A Framework for Cyber Vulnerability Assessments of InfiniBand Networks | |
| Ali et al. | Software-Defined Networks Topology Discovery Security and Drawbacks: A Survey of Attacks and Defenses. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25760811 Country of ref document: EP Kind code of ref document: A1 |