Disclosure of Invention
Aiming at the technical problems, the technical scheme of the invention is that a high-performance server is arranged in an enterprise, and all devices to be detected in the enterprise are not installed with a soft component, but the data of all the devices to be detected are synchronized to the high-performance server; and the high-performance server judges whether suspicious attacks exist or not based on the synchronous data so as to judge whether APT attack events exist or not. The high-performance server is independent of each device to be detected, and the attacker cannot acquire relevant information of the high-performance server, so that the high-performance server can detect and protect each device to be detected in an enterprise conveniently.
The invention is realized by adopting the following method: an enterprise-level-based remote APT detection method comprises the following steps:
setting a high-performance server inside an enterprise;
synchronizing data of equipment to be detected in an enterprise to the high-performance server; wherein the data is selected as desired, including but not limited to: hash values of system disk information, process information, thread information, port information, service information or registry information;
the high performance server detects the data and determines whether an APT attack event exists.
Further, the high-performance server detects the data and determines whether an APT attack event exists as follows:
the high-performance server customizes a detection rule according to the type of the equipment to be detected;
the high-performance server detects the data to judge whether an APT attack event exists or not based on the detection rule;
wherein, the type of equipment to be detected includes: a work machine or a server, the server comprising: web servers or FTP servers.
Still further, the detection rule includes: system integrity checking, difference analysis, timing analysis, or digital signature.
In the method, the step of synchronizing the data of the device to be detected in the enterprise to the high-performance server comprises the following steps: and synchronizing the data of the equipment to be detected in the enterprise to the high-performance server based on a preset time interval or in real time.
The invention can be realized by adopting the following system: an enterprise-level-based remote APT detection high-performance server, provided inside an enterprise, comprising:
the data synchronization module is used for synchronizing the data of the equipment to be detected in the enterprise to the high-performance server; wherein the data is selected as desired, including but not limited to: hash values of system disk information, process information, thread information, port information, service information or registry information;
and the detection judging module is used for detecting the data synchronized by the data synchronizing module and judging whether an APT attack event exists or not.
Further, the detection determination module is specifically configured to:
customizing a detection rule according to the type of the equipment to be detected;
detecting the data based on the detection rule and judging whether an APT attack event exists or not;
wherein, the type of equipment to be detected includes: a work machine or a server, the server comprising: web servers or FTP servers.
Still further, the detection rule includes: system integrity checking, difference analysis, timing analysis, or digital signature.
In the high-performance server, the data synchronization module is specifically configured to: and synchronizing the data of the equipment to be detected in the enterprise to the high-performance server based on a preset time interval or in real time.
In summary, the invention provides an enterprise-level-based remote APT detection method, which includes firstly, setting a high-performance server inside an enterprise; synchronizing data of equipment to be detected in an enterprise to the high-performance server; the high performance server detects the data and determines whether an APT attack event exists. The invention also provides an enterprise-level-based remote APT detection high-performance server.
The beneficial effects are that: the technical scheme of the invention is different from the traditional checking and killing method, and antivirus software is not installed in each device to be detected in an enterprise, because an attacker can bypass the antivirus software, the device to be detected cannot be effectively detected and protected. According to the technical scheme, the high-performance server is erected in the enterprise and is independent from each device to be detected, so that an attacker cannot acquire relevant information of the high-performance device, an APT attack event can be detected more effectively, and the information security of the enterprise is better protected.
Detailed Description
The present invention provides an enterprise-level-based remote APT detection method and an embodiment of a high-performance server, so that those skilled in the art can better understand the technical solutions in the embodiments of the present invention and make the above objects, features and advantages of the present invention more obvious and understandable, the following will explain the technical solutions in the present invention in detail with reference to the accompanying drawings:
the present invention first provides an embodiment of an enterprise-level-based remote APT detection method, as shown in fig. 1, including:
s101, setting a high-performance server inside an enterprise; the high-performance server is independent of other equipment to be detected;
s102, synchronizing data of equipment to be detected in an enterprise to the high-performance server; wherein the data is selected as required, including: hash values of system disk information, process information, thread information, port information, service information, or registry information, etc.;
s103, the high-performance server detects the data and judges whether an APT attack event exists.
Preferably, the detecting the data and determining whether there is an APT attack event by the high-performance server is:
the high-performance server customizes a detection rule according to the type of the equipment to be detected;
the high-performance server detects the data based on the detection rule and judges whether an APT attack event exists or not;
wherein, the type of equipment to be detected includes: a work machine or a server, the server comprising: web servers or FTP servers.
More preferably, the detection rule includes: system integrity checking, difference analysis, timing analysis, or digital signature.
Wherein the system integrity detection considers that the change of the system is mainly represented by the change of the file and the registry. Therefore, information composed of the file and the registry is 'snapshot' and synchronized to the high-performance server at different time points or before and after malicious code infection, and the high-performance server judges whether attack behaviors exist or not based on the information change composed of the file and the registry.
The difference analysis method starts from the analysis of the system abnormity, various types of malicious codes show certain abnormity in the aspects of the system process, port, thread, service, drive, registry, directory, file and the like according to the behaviors of trigger conditions, attack modes, anti-killing means, propagation ways and the like, and whether the attack behaviors exist can be judged according to the change of synchronous data before and after the abnormity.
The time sequence analysis method considers that the malicious codes have time attributes, namely, certain time sequence correlation is formed among files of the malicious codes. This timing can be used to detect the presence of an attack.
The digital signature method judges the integrity of the file and the identity of the signer by verifying the digital signature of the file. Many files of the Windows operating system have microsoft's digital signature, while files other than microsoft cannot have microsoft's digital signature; and performing information correspondence on a common program with a digital signature, namely, the program name corresponds to the digital signature, and if the program name corresponds to the digital signature, the program is abnormal or suspicious. According to a similar method, system files with digital signatures, common applications, suspicious files can be easily distinguished.
For example: the type of the equipment to be detected is a web server, the web server generally has changes except web directory files, and other files do not have changes at ordinary times, so that the high-performance server customizes detection rules according to the characteristics of the web server, can select a system integrity check method to detect synchronous data, judges whether changes of suspicious files exist or whether PE files exist or whether active external connection behaviors exist, further filters external connected URLs by using a white list, and further improves the judgment accuracy.
If the type of the device to be detected is an FTP server, a difference analysis method can be selected to pay attention to the directory change according to the working characteristics of the FTP server, and then whether suspicious operation exists or not is judged.
If the type of the equipment to be detected is a common working machine, the hash of a working machine system disk file can be synchronized to the high-performance server, and whether suspicious operation exists or not is judged through the change before and after detection.
In the embodiment of the method, the step of synchronizing the data of the device to be detected in the enterprise to the high-performance server comprises the following steps: and synchronizing the data of the equipment to be detected in the enterprise to the high-performance server based on a preset time interval or in real time.
The present invention further provides an embodiment of an enterprise-level-based remote APT detection high-performance server, as shown in fig. 2, where the high-performance server is disposed inside an enterprise, and includes:
the data synchronization module 201 is used for synchronizing data of the equipment to be detected in the enterprise to the high-performance server;
a detection and determination module 202, configured to detect data synchronized by the data synchronization module 201 and determine whether an APT attack event exists.
Preferably, the detection determining module is specifically configured to:
customizing a detection rule according to the type of the equipment to be detected;
detecting the data based on the detection rule and judging whether an APT attack event exists or not;
wherein, the type of equipment to be detected includes: a work machine or a server, the server comprising: web servers or FTP servers.
More preferably, the detection rule includes: system integrity checking, difference analysis, timing analysis, or digital signature.
In the embodiment of the high-performance server, the data synchronization module is specifically configured to: and synchronizing the data of the equipment to be detected in the enterprise to the high-performance server based on a preset time interval or in real time.
The embodiments are described in a progressive manner, and the same or similar parts in the various embodiments can be referred to each other, and each embodiment focuses on differences from the other embodiments. The method embodiment and the high-performance server embodiment can participate in the related places.
As described above, the embodiments above provide an enterprise-level-based remote APT detection method and an embodiment of a high-performance server, where a high-performance server is built inside an enterprise, key data of all devices to be detected inside the enterprise are synchronized to the high-performance server, and whether an APT attack event exists inside the enterprise is determined by comparing previous and subsequent data or selecting or customizing a detection rule based on the type of each device to be detected.
In summary, the embodiment described above separately sets a high-performance server, thereby preventing an attacker from perceiving the high-performance server and then performing some countermeasure operations; the high-performance server can communicate with all devices in the enterprise, receive data synchronized by all devices to be detected in the enterprise, and judge whether suspicious attack events exist or not based on the synchronized data; more preferably, the embodiment of the invention can customize the detection rule according to the type and the characteristics of each device to be detected, so that the APT attack event can be more effectively identified. The technical scheme of the invention is different from a detection method of uploading cloud, and the invention only has a one-way operation behavior, namely, the data of the equipment to be detected is synchronized to the high-performance server, and the data feedback or software updating operation and the like of the equipment to be detected are not carried out.
The above examples are intended to illustrate but not to limit the technical solutions of the present invention. Any modification or partial replacement without departing from the spirit and scope of the present invention should be covered in the claims of the present invention.