A kind of
P2P
Active defense method and system
Technical field
The present invention relates to computer network security technology field, particularly to a kind of P2P active defense method and system.
Background technology
Rogue program is a recapitulative term, refers to that any intentional establishment is for performing without permission and the software program of typically harmful act.Virus, backdoor programs, wooden horse or spyware etc. are all that some can be referred to as the example of rogue program.Senior persistence threatens (Advanced
Persistent Threat, APT) threaten the data safety of enterprise.APT be hacker for the purpose of stealing core data, the network attack started for client and invasion and attack behavior, be a kind of malice corporate espionage kept on plotting for a long time threaten.This behavior is often over long-term operation and planning, and possesses the disguise of height.Various Malware, system vulnerability and social engineering means would generally be comprehensively utilized.Existing malware detection method and active defense method are all to identify that malicious act is as core, regardless of whether use cloud security technology to depend on the identification to malicious act, and one of advanced feature of APT is exactly antagonism, in terms of feature and behavior, accomplishes to avoid to be identified as rogue program or increase is identified as time of rogue program;The mode blocked with cloud communication the most also can be utilized to resist cloud killing, cloud Initiative Defense.
Summary of the invention
The present invention provides a kind of P2P active defense method and system, solves prior art and depends on Cloud Server, the problem that cannot be carried out Prevention-Security when cloud communication is blocked.
A kind of P2P active defense method, including:
To all service end device degree of belief classifications, at least include high trusted terminal, general terminal, insincere terminal;
Detecting and collect the file characteristic of program to be detected, described file characteristic at least includes that file hash, file Process Attributes, function call information, program run stack information or the network behavior of program;File characteristic is not limited only to above listed content;
Judge whether described file characteristic is included in local list, local list at least includes file characteristic, black and white mark and disposal options;
If it is, be disposed according to the disposal options in local list;Otherwise sending inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device, request judges whether in the local list of other service end device;
Receive and judge feedback information, if the feedback information received comprises list information, then identify according to the black and white in list information and disposal options is disposed, and by the list information updating that receives to local list, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed;
Judge whether service end device is high trusted terminal, if it is, file characteristic, black and white lists mark and disposal options are updated local list, the most do not update local list;
Described blacklist disposal options at least includes that prevention program is run, stops process creation, stoped network to connect or deletion program, and described white list disposal options at least includes that permission program is run, allowed process creation or allow network to connect.
In described method, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed, it is also possible to for: if the feedback information received is do not exist, then carry out blacklist disposal.
In described method, after file characteristic, black and white lists mark and disposal options are updated local list by service end device, newly added list information is sent to other service end device.
In described method, described sends inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device also include, the file characteristic associated with program to be detected is sent to other service terminals simultaneously, and the file that program described and to be detected associates is at least the dynamic link library of executable program or same catalogue file.
In described method, also include: service end device receives inquiry request, the file characteristic received is mated with local list, if it is present return list information, otherwise return and there is not information.
In described method, service end device returns list information and also includes returning other features of group same with the file characteristic received.
In described method, also include: service end device receives request of data, and judge that request of data is removal request or more newly requested, if removal request, then delete the respective items in local list according to the file characteristic in removal request, if more newly requested, then the file characteristic in more newly requested, black and white lists mark and disposal options are updated local list.
The present invention also provides for a kind of P2P Active Defending System Against, first to all service end device degree of belief classifications, at least includes high trusted terminal, general terminal, insincere terminal;
Described service end device includes:
Detection module, for detecting and collect the file characteristic of program to be detected, described file characteristic at least includes that file hash, file Process Attributes, function call information, program run stack information or the network behavior of program;
Judge module, is used for judging whether described file characteristic is included in local list, at least includes file characteristic, black and white mark and disposal options in local list;
Dispose module, for when local list exists file characteristic, be disposed according to the disposal options in local list;Otherwise sending inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device, request judges whether in the local list of other service end device;
Communication module, receive and judge feedback information, if the feedback information received comprises list information, then dispose module to be disposed according to the black and white mark in list information and disposal options, and the list information received is updated local list by more new module, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed;
More new module, is used for judging whether service end device is high trusted terminal, if it is, file characteristic, black and white lists mark and disposal options are updated local list, does not the most update local list;
Described blacklist disposal options at least includes that prevention program is run, stops process creation, stoped network to connect or deletion program, and described white list disposal options at least includes that permission program is run, allowed process creation or allow network to connect.
In described system, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed, it is also possible to for: if the feedback information received is do not exist, then carry out blacklist disposal.
In described system, newly added list information, after file characteristic, black and white lists mark and disposal options are updated local list by service end device, is sent to other service end device by more new module.
In described system, described sends inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device also include, the file characteristic associated with program to be detected is sent to other service terminals simultaneously, and the file that program described and to be detected associates is at least the dynamic link library of executable program or same catalogue file.
In described system, also include: service end device receives inquiry request, the file characteristic received is mated with local list, if it is present return list information, otherwise return and there is not information.
In described system, service end device returns list information and also includes returning other features of group same with the file characteristic received.
In described system, also include: service end device receives request of data, and judge that request of data is removal request or more newly requested, if removal request, then delete the respective items in local list according to the file characteristic in removal request, if more newly requested, then the file characteristic in more newly requested, black and white lists mark and disposal options are updated local list.
The method of the present invention does not relies on traditional black and white lists decision procedure, after can judging according to known list, disposal options is selected by user, the strict service terminal disposed of, needs higher for reliability rating, the disposal options of " non-black the whitest " can be used, the most not in local list, i.e. carry out blacklist disposal.The present invention is also not dependent on Cloud Server simultaneously, and timely Cloud Server is blocked, but still can obtain Query Result and disposal options by other-end.
The present invention provides a kind of P2P active defense method and system, and described method is: to all service end device degree of belief classifications;Detect and collect the file characteristic of program to be detected;Judge whether described file characteristic is included in local list;If it is, be disposed according to the disposal options in local list;Otherwise send inquiry request to other service end device to judge whether in the local list of other service end device;If it is, identify according to the black and white in list information and disposal options is disposed, and by the list information updating that receives to local list, otherwise prompting user selects blacklist to dispose or white list disposal;If service end device is high trusted terminal simultaneously, then file characteristic, black and white lists mark and disposal options are updated local list.The method and device of the present invention does not relies on Cloud Server, and timely Cloud Server blocks, and still can obtain disposal options by other-end.
Accompanying drawing explanation
In order to be illustrated more clearly that the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments described in the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of P2P active defense method flow chart;
Fig. 2 is a kind of P2P Active Defending System Against structural representation.
Detailed description of the invention
For the technical scheme making those skilled in the art be more fully understood that in the embodiment of the present invention, and it is understandable to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, and is described in further detail technical scheme in the present invention below in conjunction with the accompanying drawings.
The present invention provides a kind of P2P active defense method and system, solves prior art and depends on Cloud Server, the problem that cannot be carried out Prevention-Security when cloud communication is blocked.
A kind of P2P active defense method, as it is shown in figure 1, include:
S101: to all service end device degree of belief classifications, at least include high trusted terminal, general terminal, insincere terminal;When all service end device are carried out classification, it is a kind of special case that all terminals are in same rank, and all of terminal is all believable;Also being a kind of special case when there is a service end device as the terminal only providing inquiry service, this service end device is high believable, according to concrete application scenarios, it is also possible to the degree of belief classification more refined;
S102: detect and collect the file characteristic of program to be detected, described file characteristic at least includes that file hash, file Process Attributes, function call information, program run stack information or the network behavior of program;File characteristic is not limited only to above listed content;
S103: judge whether described file characteristic is included in local list, at least includes file characteristic, black and white mark and disposal options in local list;If it is, perform S104, otherwise perform S105
S104: be disposed according to the disposal options in local list;
S105: send inquiry request to other service end device in addition to insincere terminal, is sent to other service end device by file characteristic, and request judges whether in the local list of other service end device;
S106: receive and judge feedback information, it is judged that whether comprise list information in the feedback information received, if it is, perform S107, if the feedback information received is does not exists, then performs S108;
S107: identify according to the black and white in list information and disposal options is disposed, and by the list information updating that receives to local list;
S108: prompting user selects blacklist to dispose or white list is disposed;
S109: judge whether service end device is high trusted terminal, if it is, perform S110, does not the most update local list;
S110: file characteristic, black and white lists mark and disposal options are updated local list.
Described blacklist disposal options at least includes that prevention program is run, stops process creation, stoped network to connect or deletion program, and described white list disposal options at least includes that permission program is run, allowed process creation or allow network to connect.
In described method, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed, it is also possible to for: if the feedback information received is do not exist, then carry out blacklist disposal.
In described method, after file characteristic, black and white lists mark and disposal options are updated local list by service end device, newly added list information is sent to other service end device.
In described method, described sends inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device also include, the file characteristic associated with program to be detected is sent to other service terminals simultaneously, and the file that program described and to be detected associates is at least the dynamic link library of executable program or same catalogue file.
In described method, also include: service end device receives inquiry request, the file characteristic received is mated with local list, if it is present return list information, otherwise return and there is not information.
Described method, it is characterised in that service end device returns list information and also includes returning other features of group same with the file characteristic received.
In described method, also include: service end device receives request of data, and judge that request of data is removal request or more newly requested, if removal request, then delete the respective items in local list according to the file characteristic in removal request, if more newly requested, then the file characteristic in more newly requested, black and white lists mark and disposal options are updated local list.
For being best understood from the inventive method, the application to the inventive method is illustrated.
Embodiment 1, the service end device of the present embodiment is made up of some clients and some servers, and wherein client is insincere terminal.When program to be detected is scanned by client, extraction document feature, in the present embodiment, file characteristic is the MD5 hashed value of file;
Client judges in local list according to file characteristic, and local list content in the present embodiment is the MD5 hashed value of file, black and white mark and disposal options, and black and white is designated in the present embodiment, black for malicious code title, Bai Weikong;Disposal options is, if malicious code, then prompting user's malicious code title, the most then without operation.Judge whether local list exists the MD5 hashed value of this document, if there is, then it is disposed according to the disposal options in local list, otherwise send inquiry request to server, file characteristic is sent to Servers-all, server judges whether in the local list of server, if, the list information then returned according to server is disposed, and list information is saved in local list, and otherwise prompting user selects disposal options.Owing to client is insincere terminal, then the disposal options that user selects is not updated local list by client.
In the present embodiment, when user end to server sends inquiry request, it is also possible to the alternative document feature being associated with detected file is sent jointly to server, the dynamic link library that relied on such as executable file or be in the file of same catalogue with this document.And when server returns list information, file characteristic can be sent jointly to client, to reduce the inquiry of client with other features of group.
Embodiment 2, the service end device in the present embodiment is made up of some honey jar equipment and some firewall boxs, and wherein honey jar equipment is high trusted terminal.File characteristic is network linking objective main frame and port in the present embodiment.
When honey jar equipment generation network behavior, obtain network linking objective main frame and port, local list judges, local list content in the present embodiment is network linking objective main frame and interface, black and white mark and disposal options, black and white is designated in the present embodiment, black for malicious code title, Bai Weikong;Disposal options is, if malicious code, then stops network behavior, the most then lets pass.Judge whether local list exists this document feature, if there is, then it is disposed according to the disposal options in local list, otherwise send inquiry request to other honey jar equipment, judge whether in the local list of other honey jar equipment, if, the list information then returned according to other honey jar equipment is disposed, and list information is saved in local list, otherwise prompting user selects disposal options, and by the information updating that postpones at user to local list, then the list information being labeled as blacklist is sent to firewall box.Firewall box is being attached filtering when, and whether inquiry local list determines to connect lets pass.Can reach after honey jar finds Cyberthreat with this, it is provided that to the purpose of other computers in firewall protection net.
The present invention also provides for a kind of P2P Active Defending System Against, first to all service end device degree of belief classifications, at least includes high trusted terminal, general terminal, insincere terminal;
Described service end device is as in figure 2 it is shown, include:
Detection module 201, for detecting and collect the file characteristic of program to be detected, described file characteristic at least includes that file hash, file Process Attributes, function call information, program run stack information or the network behavior of program;
Judge module 202, is used for judging whether described file characteristic is included in local list, at least includes file characteristic, black and white mark and disposal options in local list;
Dispose module 203, for when local list exists file characteristic, be disposed according to the disposal options in local list;Otherwise sending inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device, request judges whether in the local list of other service end device;
Communication module 204, receive and judge feedback information, if the feedback information received comprises list information, then dispose module to be disposed according to the black and white mark in list information and disposal options, and the list information received is updated local list by more new module 205, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed;
More new module 205, is used for judging whether service end device is high trusted terminal, if it is, file characteristic, black and white lists mark and disposal options are updated local list, does not the most update local list;
Described blacklist disposal options at least includes that prevention program is run, stops process creation, stoped network to connect or deletion program, and described white list disposal options at least includes that permission program is run, allowed process creation or allow network to connect.
In described system, if the feedback information received is do not exist, then prompting user selects blacklist to dispose or white list is disposed, it is also possible to for: if the feedback information received is do not exist, then carry out blacklist disposal.
In described system, newly added list information, after file characteristic, black and white lists mark and disposal options are updated local list by service end device, is sent to other service end device by more new module.
In described system, described sends inquiry request to other service end device in addition to insincere terminal, file characteristic is sent to other service end device also include, the file characteristic associated with program to be detected is sent to other service terminals simultaneously, and the file that program described and to be detected associates is at least the dynamic link library of executable program or same catalogue file.
In described system, also include: service end device receives inquiry request, the file characteristic received is mated with local list, if it is present return list information, otherwise return and there is not information.
In described system, service end device returns list information and also includes returning other features of group same with the file characteristic received.
In described system, also include: service end device receives request of data, and judge that request of data is removal request or more newly requested, if removal request, then delete the respective items in local list according to the file characteristic in removal request, if more newly requested, then the file characteristic in more newly requested, black and white lists mark and disposal options are updated local list.
The method of the present invention does not relies on traditional black and white lists decision procedure, after can judging according to known list, disposal options is selected by user, the strict service terminal disposed of, needs higher for reliability rating, the disposal options of " non-black the whitest " can be used, the most not in local list, i.e. carry out blacklist disposal.The present invention is also not dependent on Cloud Server simultaneously, and timely Cloud Server is blocked, but still can obtain Query Result and disposal options by other-end.
The present invention provides a kind of P2P active defense method and system, and described method is: to all service end device degree of belief classifications;Detect and collect the file characteristic of program to be detected;Judge whether described file characteristic is included in local list;If it is, be disposed according to the disposal options in local list;Otherwise send inquiry request to other service end device to judge whether in the local list of other service end device;If it is, identify according to the black and white in list information and disposal options is disposed, and by the list information updating that receives to local list, otherwise prompting user selects blacklist to dispose or white list disposal;If service end device is high trusted terminal simultaneously, then file characteristic, black and white lists mark and disposal options are updated local list.The method and device of the present invention does not relies on Cloud Server, and timely Cloud Server blocks, and still can obtain disposal options by other-end.
Each embodiment in this specification all uses the mode gone forward one by one to describe, and between each embodiment, identical similar part sees mutually, and what each embodiment stressed is the difference with other embodiments.For system embodiment, owing to it is substantially similar to embodiment of the method, so describe is fairly simple, relevant part sees the part of embodiment of the method and illustrates.
The present invention can be used in numerous general or special purpose computing system environment or configuration.Such as: personal computer, server computer, handheld device or portable set, laptop device, multicomputer system, system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, the distributed computing environment including any of the above system or equipment etc..
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention has many deformation and the change spirit without deviating from the present invention, it is desirable to appended claim includes these deformation and the change spirit without deviating from the present invention.