CN103581104A - Active trapping method based on behavior capturing - Google Patents

Active trapping method based on behavior capturing Download PDF

Info

Publication number
CN103581104A
CN103581104A CN201210247893.0A CN201210247893A CN103581104A CN 103581104 A CN103581104 A CN 103581104A CN 201210247893 A CN201210247893 A CN 201210247893A CN 103581104 A CN103581104 A CN 103581104A
Authority
CN
China
Prior art keywords
behavior
attack
engine
initiatively
entrapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210247893.0A
Other languages
Chinese (zh)
Inventor
赵象元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU ZHONGKE HUICHUANG INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
JIANGSU ZHONGKE HUICHUANG INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU ZHONGKE HUICHUANG INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical JIANGSU ZHONGKE HUICHUANG INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201210247893.0A priority Critical patent/CN103581104A/en
Publication of CN103581104A publication Critical patent/CN103581104A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention brings forward an active trapping method based on behavior capturing. A trapping system is established in a formulated network area. The active trapping method comprises the following three links: (1) an active trapping system is established in an advance defense of a network defense system, and an active trapping engine technology is adopted; an active trapping engine, target cheating, attack capturing, attack control, attack analysis and characteristic extracting are established in multiple systems included by a computer; (2) a dynamic depth target cheating attack behavior is utilized to trap a real attack objective of an attacker; (3) and the active trapping system makes the attacker be sure of the attack target according to the aforementioned judgment results so that the real attack objective of the attacker is trapped. According to the active trapping method based on behavior capturing, known and unknown attack behaviors can be captured, the security state of the whole network is mastered and the network security level is enhanced.

Description

A kind of active method for entrapping catching based on behavior
Technical field
The present invention is specifically related to a kind of active method for entrapping catching based on behavior, for the PC terminal on network, server, work station, carries out active, efficient, system-level Prevention-Security.
 
Background technology
Nowadays along with the extensive use of network technology, assault emerges in an endless stream, network security becomes the focus of current study hotspot and social concerns, and existing network safe practice be take the defense technique that fire compartment wall (firewall) and intruding detection system (IDS) be core and conventionally lagged behind various attack technologies.Honeypot Techniques, as a kind of new network security technology, receives people's concern gradually.It takes a proactive approach, and by its distinctive feature, attracts assailant, the method that effectively tackles is analyzed and found in assailant's various attack behavior simultaneously.
Data capture technology is one of key technology of existing honey jar.Can catch the significant datas such as Firewall Log, network traffics, system activity, be then sent to far-end log server and analyze.
The unknown attack of the non-feature formula of current appearance to existing Prevention-Security System forming serious threat.Unknown attack is exactly unknown threat, refers to not yet foundly to have unknown characteristics and information system is existed the Activity Type of potential threat simultaneously.Unknown threat may be to be caused by unknown virus, wooden horse, hacker, or a kind of illegal abuse to resource.
Although Honeypot Techniques is under the cooperation of the safety measures such as network firewall, intruding detection system, can make up the deficiency of original passive security defence, but still there is the shortcoming that some cannot overcome: the data that capture are not comprehensive, there is no specific aim, be difficult to analyze real attack data, to unknown attack, cannot play effective protection.
 
Summary of the invention
The present invention produces in order to solve the shortcoming of existing honey pot system technology just, its object is to provide a kind of active method for entrapping catching based on behavior, to condition code formula, known attack has good protection effect, unknown attack to reply potential threat can more effectively catch, and guarantees the safety of computer.
For achieving the above object, the technical solution adopted in the present invention is:
The active method for entrapping catching based on behavior of the present invention, the embodiment of the present invention provides a kind of active method for entrapping catching based on behavior, comprises following three links:
(1) initiatively trapping system is set up in the defence in advance in cyber-defence system, adopts and initiatively traps engine technique; In foundation such as the operating system nucleus system of computer, background service system, application program, communication system, account system, file system, initiatively trap engine, target deception, attack and catch, attack control, attack analysis and feature extraction;
(2) dynamic depth target spoofing attack behavior, the true attack object of traping out assailant;
(3) initiatively trapping system, according to above-mentioned judged result, makes assailant be sure of that this is target of attack, thereby traps out assailant's true attack object;
With said method, in the network area of formulating, build trapping system.Control, attack analysis and feature extraction are caught, are attacked in target deception, attack, find that in advance network, main frame and the application of the existence in this region attacked.
The present invention also provides a kind of active method for entrapping catching based on behavior another kind of execution mode, comprising:
In the behavior of setting up of operating system nucleus system, background service system, application program, communication system, account system, the file system of the computer of computer, detect engine, analysis engine, Initiative Defense engine; By whole system of defense, form and initiatively trap engine, simultaneously by behavior capturing technology, at related system, dispose attack capture engine, program behavior is carried out to depth analysis, and the various actions of a certain working procedure are carried out to combinatory analysis, by program behavior characteristics algorithm storehouse (various malicious code behavioural characteristic algorithm models storehouse), combination behavior is analyzed to judgement, judged result is delivered to each defence engine in real time; Realization can catch known and unknown attack and security strategy is controlled.
Further, described malicious code behavior comprises that process creation, thread creation, file operation, network operation, registry operations, stack manipulation, thread inject, senior continuation threatens and attacks, and the operation of user account.Can obtain malicious code behavior by Hook Technique, obtain the three kinds of approach that mainly contain: interception system service distribution table, intercept and capture the software terminal of transplantable execution body, interception system service.
With respect to prior art, the active method for entrapping catching based on behavior of the present invention, has following useful technique effect:
The invention has the beneficial effects as follows, can initiatively to the program behavior operating in computer system, carry out target deception, attack and catch, attack control, attack analysis and feature extraction, thereby prevent network host by malicious code invasion, attack and destroy.By behavior capturing technology, realization can be caught known and unknown attack simultaneously, holds network-wide security situation, improves network security level.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of embodiment of a kind of active method for entrapping catching based on behavior of the present invention.
Fig. 2 is the composition diagram of the embodiment of the active method for entrapping catching based on behavior of the present invention based on Fig. 1.
 
Embodiment
The embodiment of the present invention provides a kind of and has caught the initiatively method and system of trapping based on behavior, to solve the defect of the data capture technology of existing honey pot system employing, the PC terminal, server, the work station that are mainly used on network carry out active, efficient, system-level Prevention-Security.
For making object of the present invention, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Some malicious acts that the present invention defends comprise: process creation, thread creation, file operation, network operation, registry operations, stack manipulation, thread inject, senior continuation threatens and attacks (APT attack), and the operation of user account etc., can obtain program behavior by Hook Technique, obtain the three kinds of approach that mainly contain, interception system service distribution table (SSDT), intercept and capture the software terminal (HOOK INT 2E) of transplantable execution body (HOOK PE), interception system service.
Behavior in conjunction with Fig. 1 catches the initiatively flow chart of the embodiment of the method for trapping.
Step 101: carry out the behavior of automatic network;
Step 102: catch and initiatively trap engine by behavior, network behavior is carried out to depth detection, obtain program behavior;
Step 103: malicious code determining device, if this walking of this program is normal, proceed to 105 steps, behavior catches and initiatively traps engine permission program continuation execution.If malicious code determining device judges that this walking of this program, for for abnormal, proceeds to 104 steps;
Step 104: the behavior of a certain program is carried out to preanalysis, if the behavior of program (referring to a behavior in numerous behaviors) means no harm or danger, enter next step; If program behavior is abnormal, containing malice or hazardous act, this behavior is combined with malice or dangerous process before this program, judges the extent of injury of this group abnormal behaviour according to behavior algorithms library.Afterwards, enter next step.
Step 106: rogue program determining device, the safe class requiring according to network system and the hazard level of program, determine whether malicious code or rogue program, if be only slight dangerous, forward 110 steps to, if rogue program determining device judges by program exception behavior combination, be defined as serious harm, enter 108 steps, continue the execution of the follow-up behavior of this program, 108 steps and 110 steps enter next step simultaneously;
Step 111: behavior seizure is initiatively traped engine and sent data to GMC, and analyzes data by control desk.
Flow process by above embodiment is described, to coming the attack of automatic network to carry out behavior seizure, and a plurality of abnormal behaviour combination of same program judgement extent of injury, just more accurate to the judgement of rogue program (code) like this, greatly improved capturing ability.
The method that the present invention adopts behavior to catch, the system of initiatively traping that provides behavior to catch.
Behavior in conjunction with Fig. 2 catches the initiatively composition diagram of the embodiment of the method for trapping.
It is a scheme of initiatively traping based on behavior that behavior catches initiatively trapping system, and it comprises initiatively traps system service end software specialized hardware platform, GMC, control desk, dedicated security hardware platform composition.
As 201 of Fig. 2 for initiatively to trap system service end software specialized hardware platform, dispose real working environment, by system vulnerability, SQL leak, account leak, web leak etc., trapping carrys out the attack of automatic network.By behavior algorithms library and safety regulation, the extent of injury of accurate early warning malicious act, emergency processing malicious act.
As 202 of Fig. 2 being GMC data acquisition platform, it completes from initiatively traping the collection of the data that system service end software specialized hardware platform sends over, storage.
As 203 of Fig. 2 being control desk, it completes the analysis to data in GMC, and implementing monitoring malicious act, is recorded to safety archive, on early warning map, present in real time simultaneously malicious act dynamically.
Above-described embodiment is just to allow one of ordinary skilled in the art can understand content of the present invention and implement according to this for technical conceive of the present invention and feature being described, its objective is, can not limit the scope of the invention with this.Every equivalent variation or modification that according to the present invention, the essence of content has been done, all should be encompassed in protection scope of the present invention.

Claims (6)

1. the active method for entrapping catching based on behavior, is characterized in that, in the network area of formulating, builds trapping system, comprises following three links:
(1) initiatively trapping system is set up in the defence in advance in cyber-defence system, adopts and initiatively traps engine technique; In the some systems that comprise at computer, set up and initiatively trap engine, target deception, attack and catch, attack control, attack analysis and feature extraction;
(2) utilize dynamic depth target spoofing attack behavior, the true attack object of traping out assailant;
(3) initiatively trapping system, according to above-mentioned judged result, makes assailant be sure of that this is target of attack, thereby traps out assailant's true attack object.
2. the active method for entrapping catching based on behavior according to claim 1, is characterized in that, in the network area of formulating, builds trapping system, also comprises following link:
The behavior of setting up in the some systems that comprise at computer detects engine, analysis engine, Initiative Defense engine; By whole system of defense, form and initiatively trap engine, simultaneously by behavior capturing technology, at related system, dispose attack capture engine, program behavior is carried out to depth analysis, and the various actions of a certain working procedure are carried out to combinatory analysis, by program behavior characteristics algorithm storehouse, combination behavior is analyzed to judgement, judged result is delivered to each defence engine in real time; Realization can catch known and unknown attack and security strategy is controlled.
3. the active method for entrapping catching based on behavior according to claim 1 and 2, it is characterized in that, some systems that described computer comprises comprise operating system nucleus system, background service system, application program, communication system, account system and file system.
4. the active method for entrapping catching based on behavior according to claim 2, is characterized in that, described characteristics algorithm model library comprises various malicious code behaviors.
5. the active method for entrapping catching based on behavior according to claim 4, is characterized in that,
Described malicious code behavior comprises that process creation, thread creation, file operation, network operation, registry operations, stack manipulation, thread inject, senior continuation threatens and attacks, and the operation of user account.
6. the active method for entrapping catching based on behavior according to claim 5, it is characterized in that, can obtain malicious code behavior by Hook Technique, obtain the three kinds of approach that mainly contain: interception system service distribution table, intercept and capture the software terminal of transplantable execution body, interception system service.
CN201210247893.0A 2012-07-18 2012-07-18 Active trapping method based on behavior capturing Pending CN103581104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210247893.0A CN103581104A (en) 2012-07-18 2012-07-18 Active trapping method based on behavior capturing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210247893.0A CN103581104A (en) 2012-07-18 2012-07-18 Active trapping method based on behavior capturing

Publications (1)

Publication Number Publication Date
CN103581104A true CN103581104A (en) 2014-02-12

Family

ID=50052049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210247893.0A Pending CN103581104A (en) 2012-07-18 2012-07-18 Active trapping method based on behavior capturing

Country Status (1)

Country Link
CN (1) CN103581104A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488394A (en) * 2014-12-27 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for carrying out intrusion behavior identification and classification on hotpot system
CN105721416A (en) * 2015-11-16 2016-06-29 哈尔滨安天科技股份有限公司 Apt event attack organization homology analysis method and apparatus
CN106961442A (en) * 2017-04-20 2017-07-18 中国电子技术标准化研究院 A kind of network method for entrapping based on honey jar
CN109218327A (en) * 2018-10-15 2019-01-15 西安电子科技大学 Initiative type safeguard technology based on cloud container
CN110855697A (en) * 2019-11-20 2020-02-28 国网湖南省电力有限公司 Active defense method for network security in power industry
CN110944014A (en) * 2019-12-18 2020-03-31 北京天融信网络安全技术有限公司 Terminal data security active defense method and device
CN111431881A (en) * 2020-03-18 2020-07-17 广州锦行网络科技有限公司 Method and device for trapping nodes based on windows operating system
CN111541701A (en) * 2020-04-24 2020-08-14 上海沪景信息科技有限公司 Attack trapping method, device, equipment and computer readable storage medium
CN112804204A (en) * 2020-12-30 2021-05-14 上海磐御网络科技有限公司 Intelligent network safety system based on big data analysis
CN113965409A (en) * 2021-11-15 2022-01-21 北京天融信网络安全技术有限公司 Network trapping method and device, electronic equipment and storage medium
CN114491516A (en) * 2022-01-26 2022-05-13 北京小佑网络科技有限公司 Threat detection trapping method based on container environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1748342A1 (en) * 2005-07-29 2007-01-31 H+BEDV Datentechnik GmbH Honeypot computer system for detecting viruses in computer networks
CN101262351A (en) * 2008-05-13 2008-09-10 华中科技大学 A network tracking system
CN101582817A (en) * 2009-06-29 2009-11-18 华中科技大学 Method for extracting network interactive behavioral pattern and analyzing similarity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1748342A1 (en) * 2005-07-29 2007-01-31 H+BEDV Datentechnik GmbH Honeypot computer system for detecting viruses in computer networks
CN101262351A (en) * 2008-05-13 2008-09-10 华中科技大学 A network tracking system
CN101582817A (en) * 2009-06-29 2009-11-18 华中科技大学 Method for extracting network interactive behavioral pattern and analyzing similarity

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488394A (en) * 2014-12-27 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for carrying out intrusion behavior identification and classification on hotpot system
CN105488394B (en) * 2014-12-27 2018-06-12 哈尔滨安天科技股份有限公司 A kind of method and system that intrusion behavior identification and classification are carried out towards honey pot system
CN105721416A (en) * 2015-11-16 2016-06-29 哈尔滨安天科技股份有限公司 Apt event attack organization homology analysis method and apparatus
CN105721416B (en) * 2015-11-16 2019-09-13 哈尔滨安天科技股份有限公司 A kind of apt event attack tissue homology analysis method and device
CN106961442A (en) * 2017-04-20 2017-07-18 中国电子技术标准化研究院 A kind of network method for entrapping based on honey jar
CN109218327A (en) * 2018-10-15 2019-01-15 西安电子科技大学 Initiative type safeguard technology based on cloud container
CN110855697A (en) * 2019-11-20 2020-02-28 国网湖南省电力有限公司 Active defense method for network security in power industry
CN110944014A (en) * 2019-12-18 2020-03-31 北京天融信网络安全技术有限公司 Terminal data security active defense method and device
CN111431881A (en) * 2020-03-18 2020-07-17 广州锦行网络科技有限公司 Method and device for trapping nodes based on windows operating system
CN111541701A (en) * 2020-04-24 2020-08-14 上海沪景信息科技有限公司 Attack trapping method, device, equipment and computer readable storage medium
CN112804204A (en) * 2020-12-30 2021-05-14 上海磐御网络科技有限公司 Intelligent network safety system based on big data analysis
CN113965409A (en) * 2021-11-15 2022-01-21 北京天融信网络安全技术有限公司 Network trapping method and device, electronic equipment and storage medium
CN114491516A (en) * 2022-01-26 2022-05-13 北京小佑网络科技有限公司 Threat detection trapping method based on container environment
CN114491516B (en) * 2022-01-26 2023-04-14 北京小佑网络科技有限公司 Threat detection trapping method based on container environment

Similar Documents

Publication Publication Date Title
CN103581104A (en) Active trapping method based on behavior capturing
CN106790023B (en) Network security Alliance Defense method and apparatus
Vidal et al. Adaptive artificial immune networks for mitigating DoS flooding attacks
KR101057432B1 (en) System, method, program and recording medium for detection and blocking the harmful program in a real-time throught behavior analysis of the process
CN107888607A (en) A kind of Cyberthreat detection method, device and network management device
CN107046543A (en) A kind of threat intelligence analysis system traced to the source towards attack
CN109617865A (en) A kind of network security monitoring and defence method based on mobile edge calculations
Anagnostakis et al. A cooperative immunization system for an untrusting internet
CN105024976B (en) A kind of advanced constant threat attack recognition method and device
Fultz et al. Blue versus red: Towards a model of distributed security attacks
CN106888196A (en) A kind of coordinated defense system of unknown threat detection
CN103561004A (en) Cooperative type active defense system based on honey nets
CN113422771A (en) Threat early warning method and system
CN103634264A (en) Active trapping method based on behavior analysis
CN110855697A (en) Active defense method for network security in power industry
CN109302426A (en) Unknown loophole attack detection method, device, equipment and storage medium
CN101087196A (en) Multi-layer honey network data transmission method and system
CN102457495A (en) Method and system for defending network virus
CN110401638B (en) Network traffic analysis method and device
TWI407328B (en) Network virus protection method and system
CN108965210A (en) Safety test platform based on scene-type attacking and defending simulation
CN107347067B (en) Network risk monitoring method and system and security network system
CN107241338A (en) Network anti-attack devices, systems, and methods, computer-readable recording medium and storage control
CN102571786A (en) Method for linkage defense among multiple safety modules in firewall and firewall
CN115134166B (en) Attack tracing method based on honey hole

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140212