CN105812324A - Method, device and system for IDC information safety management - Google Patents
Method, device and system for IDC information safety management Download PDFInfo
- Publication number
- CN105812324A CN105812324A CN201410843504.XA CN201410843504A CN105812324A CN 105812324 A CN105812324 A CN 105812324A CN 201410843504 A CN201410843504 A CN 201410843504A CN 105812324 A CN105812324 A CN 105812324A
- Authority
- CN
- China
- Prior art keywords
- log
- information security
- url
- missing
- policy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明实施例提供一种IDC信息安全管理的方法、装置及系统,该方法,包括:日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存;进一步地,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,从而实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿。
Embodiments of the present invention provide a method, device, and system for IDC information security management. The method includes: the log synthesis server identifies the access logs to be compensated, and caches the access logs to be compensated, wherein the to-be-compensated access logs are cached. The information security log generated by the user access corresponding to the compensated access log needs to be compensated for the URL of the uniform resource locator; the log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL; further Specifically, the log synthesis server compensates the information security log of the missing URL according to the access log to be compensated, so as to realize the compensation of the information security log of the missing URL in the same-source and same-destination scenario.
Description
技术领域technical field
本发明实施例涉及通信技术,尤其涉及一种IDC信息安全管理的方法、装置及系统。Embodiments of the present invention relate to communication technologies, and in particular to a method, device and system for IDC information security management.
背景技术Background technique
同源同宿的网络拓扑一般比较复杂,如包含非对称路由设备且存在多台深度包检测(DeepPacketInspection,简称DPI)设备,此时同一个互联网数据中心(InternetDataCenter,简称IDC)节点网络设备和同一个骨干网网络设备间有多条物理链路连接,并且所述链路的路由设备具有相同的优先级,两端的路由设备通常会在多条所述物理链路上采用负载分担的方式进行流量均衡处理,从而导致同一会话的上行流量和下行流量会经过不同物理链路达到对端路由设备,也即同一会话的上行流量和下行流量经过不同的信息安全检测设备,导致所述下行流量经过的信息安全检测设备上报的信息安全日志缺失资源定位符(UniformResourceLocator,简称URL),而无法满足IDC信息安全管理相关规范中对信息安全日志的规定(即信息安全日志应包含URL)。The network topology of the same source and the same destination is generally more complicated, such as including asymmetric routing devices and multiple Deep Packet Inspection (DPI) devices. At this time, the same Internet Data Center (IDC) node network device and the same There are multiple physical links between the backbone network devices, and the routing devices of the links have the same priority. The routing devices at both ends usually use load sharing to balance traffic on multiple physical links. As a result, the uplink traffic and downlink traffic of the same session will reach the peer routing device through different physical links, that is, the uplink traffic and downlink traffic of the same session go through different information security detection devices, resulting in the information that the downlink traffic passes through The information security log reported by the security detection device lacks a resource locator (UniformResourceLocator, referred to as URL), and cannot meet the requirements of the information security log in the relevant IDC information security management specifications (that is, the information security log should contain a URL).
因此,针对同源同宿场景下如何对缺失URL的信息安全日志进行补偿以实现IDC信息安全管理是本发明所要解决的技术问题。Therefore, the technical problem to be solved by the present invention is how to compensate the information security log of the missing URL in the same-source and same-destination scenario so as to realize IDC information security management.
发明内容Contents of the invention
本发明实施例提供一种IDC信息安全管理的方法、装置及系统,实现了针对同源同宿场景下缺失URL的信息安全日志进行了补偿。Embodiments of the present invention provide a method, device, and system for IDC information security management, which realizes compensation for information security logs missing URLs in a same-source and same-destination scenario.
第一方面,本发明实施例提供一种互联网数据中心IDC信息安全管理的方法,包括:In a first aspect, an embodiment of the present invention provides a method for Internet data center IDC information security management, including:
日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志为深度包检测DPI设备上报的访问日志,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;The log synthesis server identifies the access log to be compensated, and caches the access log to be compensated, wherein the access log to be compensated is the access log reported by the deep packet inspection DPI device, and the access log to be compensated corresponds to Uniform resource locator URL compensation is required for information security logs generated by user access;
所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存,其中,所述缺失URL的信息安全日志为信息安全检测设备上报的信息安全日志;The log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL, wherein the information security log of the missing URL is the information security log reported by the information security detection device;
所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。The log synthesis server compensates the information security log of the missing URL according to the access log to be compensated.
结合第一方面,在第一方面的第一种可能的实现方式中,所述日志合成服务器识别待补偿的访问日志,包括:With reference to the first aspect, in a first possible implementation manner of the first aspect, the log synthesis server identifies the access log to be compensated, including:
所述日志合成服务器根据所述待补偿的访问日志中的待补偿标识,识别所述待补偿的访问日志,其中,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿。The log synthesis server identifies the access log to be compensated according to the to-be-compensated identifier in the to-be-compensated access log, wherein the to-be-compensated identifier is used to indicate that the user accessing the corresponding access log to be compensated The generated information security logs need to be compensated by URL.
结合第一方面或第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现方式中,所述日志合成服务器识别缺失URL的信息安全日志,包括:With reference to the first aspect or the first possible implementation of the first aspect, in the second possible implementation of the first aspect, the log synthesis server identifying information security logs with missing URLs includes:
所述日志合成服务器根据所述缺失URL的信息安全日志中的异常标识,识别所述缺失URL的信息安全日志,其中,所述异常标识用于指示所述信息安全日志需要做URL补偿。The log synthesis server identifies the information security log of the missing URL according to the abnormal identifier in the information security log of the missing URL, wherein the abnormal identifier is used to indicate that URL compensation is required for the information security log.
结合第一方面的第二种可能的实现方式,在第一方面的第三种可能的实现方式中,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。With reference to the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
结合第一方面、第一方面的第一种至第三种任一种可能的实现方式,在第一方面的第四种可能的实现方式中,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,包括:With reference to the first aspect and any one of the first to third possible implementations of the first aspect, in the fourth possible implementation of the first aspect, the log synthesis server according to the access to be compensated The log compensates for the information security log of the missing URL, including:
所述日志合成服务器确定任一所述缺失URL的信息安全日志的关键标识字段;The log synthesis server determines the key identification field of any information security log of the missing URL;
所述日志合成服务器根据所述关键标识字段遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述关键标识字段匹配的待补偿的访问日志;The log synthesis server traverses all the access logs to be compensated in the query cache according to the key identification field until the access log to be compensated that matches the key identification field is determined;
所述日志合成服务器获取所述与所述关键标识字段匹配的待补偿的访问日志的URL,并将所述URL补偿给所述任一缺失URL的信息安全日志。The log synthesis server acquires the URL of the access log to be compensated that matches the key identification field, and compensates the URL for the information security log of any missing URL.
结合第一方面的第四种可能的实现方式,在第一方面的第五种可能的实现方式中,所述关键标识字段包括:源网络之间互连的协议IP、目的IP、源端口、目的端口及设备事务标识ID。With reference to the fourth possible implementation of the first aspect, in the fifth possible implementation of the first aspect, the key identification field includes: protocol IP, destination IP, source port, Destination port and device transaction ID.
结合第一方面的第三种至第五种任一种可能的实现方式,在第一方面的第六种可能的实现方式中,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿之后,还包括:In combination with any of the third to fifth possible implementations of the first aspect, in the sixth possible implementation of the first aspect, if the abnormal identification of the information security log of the missing URL is a result pending log After the log synthesis server compensates the information security log of the missing URL according to the access log to be compensated, it further includes:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中;其中,所述缺失URL的信息安全日志对应的策略信息包括策略域名和/或策略URL,所述策略信息为信息安全检测设备增加到所述缺失URL的信息安全日志中的。The log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL. If the matching is successful, the policy hits; wherein, the information security of the missing URL The policy information corresponding to the log includes a policy domain name and/or a policy URL, and the policy information is added to the information security log of the missing URL by the information security detection device.
结合第一方面的第六种可能的实现方式,在第一方面的第七种可能的实现方式中,若所述策略信息包括策略域名,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:With reference to the sixth possible implementation of the first aspect, in the seventh possible implementation of the first aspect, if the policy information includes a policy domain name, the log synthesis server The corresponding URL and the policy information corresponding to the information security log of the missing URL are matched, and if the match is successful, the policy hits, including:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;The log synthesis server acquires the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
所述日志合成服务器将所述缺失URL的信息安全日志对应的域名,与所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The log synthesis server matches the domain name corresponding to the information security log of the missing URL with the policy domain name, and if the domain name corresponding to the information security log of the missing URL is the same as the policy domain name, the policy hits.
结合第一方面的第六种可能的实现方式,在第一方面的第八种可能的实现方式中,若所述策略信息包括策略URL,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:With reference to the sixth possible implementation of the first aspect, in the eighth possible implementation of the first aspect, if the policy information includes a policy URL, the log synthesis server The corresponding URL and the policy information corresponding to the information security log of the missing URL are matched, and if the match is successful, the policy hits, including:
所述日志合成服务器将所述缺失URL的信息安全日志对应的URL,与所述策略URL进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,则策略命中。The log synthesis server matches the URL corresponding to the information security log with the missing URL with the policy URL, and if the URL corresponding to the information security log with the missing URL is the same as the policy URL, the policy hits.
结合第一方面的第六种可能的实现方式,在第一方面的第九种可能的实现方式中,若所述策略信息包括策略域名和策略URL,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:With reference to the sixth possible implementation of the first aspect, in the ninth possible implementation of the first aspect, if the policy information includes a policy domain name and a policy URL, the log synthesis server The URL corresponding to the information security log and the policy information corresponding to the information security log of the missing URL are matched. If the match is successful, the policy hits, including:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;The log synthesis server acquires the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
所述日志合成服务器将所述缺失URL的信息安全日志对应的URL以及域名,分别与所述策略URL及所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,且所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The log synthesis server matches the URL and domain name corresponding to the information security log of the missing URL with the policy URL and the policy domain name respectively, if the URL corresponding to the information security log of the missing URL matches the policy If the URLs are the same, and the domain name corresponding to the information security log with the missing URL is the same as the domain name of the policy, the policy is matched.
第二方面,本发明实施例提供一种互联网数据中心IDC信息安全管理的方法,包括:In a second aspect, an embodiment of the present invention provides a method for Internet data center IDC information security management, including:
信息安全检测设备对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志,所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿;The information security detection device adds an abnormality identifier to the information security log that detects the missing uniform resource locator URL, wherein the information security log containing the abnormal identifier is an information security log with a missing URL, and the abnormal identifier is used to indicate the URL compensation is required for information security logs with missing URLs;
所述信息安全检测设备将所述缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。The information security detection device reports the information security log of the missing URL to the log synthesis server, so that the log synthesis server can ensure the information security of the missing URL according to the access log to be compensated reported by the deep packet inspection DPI device. log for compensation.
结合第二方面,在第二方面的第一种可能的实现方式中,所述方法,还包括:With reference to the second aspect, in a first possible implementation manner of the second aspect, the method further includes:
所述信息安全检测设备通过哈希算法确保将相同用户访问的信息安全日志上报给同一日志合成服务器。The information security detection device uses a hash algorithm to ensure that the information security logs accessed by the same user are reported to the same log synthesis server.
结合第二方面或第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。With reference to the second aspect or the first possible implementation manner of the second aspect, in a second possible implementation manner of the second aspect, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
结合第二方面的第二种可能的实现方式,在第二方面的第三种可能的实现方式中,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述信息安全检测设备将所述缺失URL的信息安全日志上报给日志合成服务器之后,还包括:With reference to the second possible implementation of the second aspect, in the third possible implementation of the second aspect, if the abnormal identification of the information security log of the missing URL is the result pending log identification, the information security detection After the device reports the information security log of the missing URL to the log synthesis server, it also includes:
所述信息安全检测设备对所述缺失URL的信息安全日志进行关键字检测,并根据所述缺失URL的信息安全日志的关键字获知所述缺失URL的信息安全日志对应的策略信息,其中,所述策略信息包括策略域名和/或策略URL;The information security detection device performs keyword detection on the information security log of the missing URL, and acquires policy information corresponding to the information security log of the missing URL according to keywords of the information security log of the missing URL, wherein the The policy information includes a policy domain name and/or a policy URL;
所述信息安全检测设备将所述策略信息增加到所述缺失URL的信息安全日志中,并将包含所述策略信息的缺失URL的信息安全日志上报给日志合成服务器。The information security detection device adds the policy information to the information security log of the missing URL, and reports the information security log of the missing URL including the policy information to a log synthesis server.
第三方面,本发明实施例提供一种互联网数据中心IDC信息安全管理的方法,包括:In a third aspect, the embodiment of the present invention provides a method for Internet data center IDC information security management, including:
深度包检测DPI设备判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;The deep packet inspection DPI device judges whether the uplink and downlink of the user's access has passed through the DPI device, and if not, adds the identifier to be compensated in the access log corresponding to the user's access, wherein the access log containing the identifier to be compensated is The log to be compensated, the identifier to be compensated is used to indicate that the information security log generated by the user access corresponding to the access log to be compensated needs to be compensated for the uniform resource locator URL;
所述DPI设备将所述待补偿的访问日志上报给日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿。The DPI device reports the access log to be compensated to the log synthesis server, so that the log synthesis server compensates the information security log of the missing URL according to the access log to be compensated.
结合第三方面,在第三方面的第一种可能的实现方式中,所述方法,还包括:With reference to the third aspect, in a first possible implementation manner of the third aspect, the method further includes:
所述DPI设备通过哈希算法确保将相同用户访问的访问日志上报给同一日志合成服务器。The DPI device uses a hash algorithm to ensure that the access logs accessed by the same user are reported to the same log synthesis server.
第四方面,本发明实施例提供一种日志合成服务器,包括:In a fourth aspect, an embodiment of the present invention provides a log synthesis server, including:
第一识别模块,用于识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志为深度包检测DPI设备上报的访问日志,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;The first identification module is used to identify the access log to be compensated, and cache the access log to be compensated, wherein the access log to be compensated is the access log reported by the deep packet inspection DPI device, and the access log to be compensated The information security log generated by the user access corresponding to the access log needs to be compensated for the uniform resource locator URL;
第二识别模块,用于识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存,其中,所述缺失URL的信息安全日志为信息安全检测设备上报的信息安全日志;The second identification module is used to identify the information security log of the missing URL, and cache the information security log of the missing URL, wherein the information security log of the missing URL is the information security log reported by the information security detection device;
补偿模块,用于根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。A compensation module, configured to compensate the information security log of the missing URL according to the access log to be compensated.
结合第四方面,在第四方面的第一种可能的实现方式中,所述第一识别模块具体用于:With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the first identification module is specifically configured to:
根据所述待补偿的访问日志中的待补偿标识,识别所述待补偿的访问日志,其中,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿。Identify the access log to be compensated according to the to-be-compensated identifier in the to-be-compensated access log, wherein the to-be-compensated identifier is used to indicate the information security log generated by the user access corresponding to the to-be-compensated access log Need to do URL compensation.
结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第二种可能的实现方式中,所述第二识别模块具体用于:With reference to the fourth aspect or the first possible implementation manner of the fourth aspect, in the second possible implementation manner of the fourth aspect, the second identification module is specifically configured to:
根据所述缺失URL的信息安全日志中的异常标识,识别所述缺失URL的信息安全日志,其中,所述异常标识用于指示所述信息安全日志需要做URL补偿。The information security log of the missing URL is identified according to the abnormal identifier in the information security log of the missing URL, wherein the abnormal identifier is used to indicate that URL compensation is required for the information security log.
结合第四方面的第二种可能的实现方式,在第四方面的第三种可能的实现方式中,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。With reference to the second possible implementation manner of the fourth aspect, in a third possible implementation manner of the fourth aspect, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
结合第四方面、第四方面的第一种至第三种任一种可能的实现方式,在第四方面的第四种可能的实现方式中,所述补偿模块,包括:In combination with the fourth aspect and any one of the first to third possible implementations of the fourth aspect, in the fourth possible implementation of the fourth aspect, the compensation module includes:
第一确定单元,用于确定任一所述缺失URL的信息安全日志的关键标识字段;The first determination unit is used to determine the key identification field of the information security log of any of the missing URLs;
第二确定单元,用于根据所述关键标识字段遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述关键标识字段匹配的待补偿的访问日志;The second determination unit is configured to traverse all the access logs to be compensated in the query cache according to the key identification field until the access log to be compensated that matches the key identification field is determined;
补偿单元,用于获取所述与所述关键标识字段匹配的待补偿的访问日志的URL,并将所述URL补偿给所述任一缺失URL的信息安全日志。A compensating unit, configured to obtain the URL of the access log to be compensated that matches the key identification field, and compensate the URL to the information security log of any missing URL.
结合第四方面的第四种可能的实现方式,在第四方面的第五种可能的实现方式中,所述关键标识字段包括:源网络之间互连的协议IP、目的IP、源端口、目的端口及设备事务标识ID。With reference to the fourth possible implementation of the fourth aspect, in the fifth possible implementation of the fourth aspect, the key identification field includes: protocol IP, destination IP, source port, Destination port and device transaction ID.
结合第四方面的第三种至第五种任一种可能的实现方式,在第四方面的第六种可能的实现方式中,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述日志合成服务器,还包括:In combination with any of the third to fifth possible implementations of the fourth aspect, in the sixth possible implementation of the fourth aspect, if the abnormal identification of the information security log of the missing URL is a result pending log Identifies, the log synthesis server, further comprising:
匹配模块,用于根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中;其中,所述缺失URL的信息安全日志对应的策略信息包括策略域名和/或策略URL,所述策略信息为信息安全检测设备增加到所述缺失URL的信息安全日志中的。The matching module is configured to perform matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL. If the matching is successful, the policy hits; wherein, the information security of the missing URL The policy information corresponding to the log includes a policy domain name and/or a policy URL, and the policy information is added to the information security log of the missing URL by the information security detection device.
结合第四方面的第六种可能的实现方式,在第四方面的第七种可能的实现方式中,若所述策略信息包括策略域名,所述匹配模块具体用于:With reference to the sixth possible implementation of the fourth aspect, in the seventh possible implementation of the fourth aspect, if the policy information includes a policy domain name, the matching module is specifically configured to:
根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;Obtaining the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
将所述缺失URL的信息安全日志对应的域名,与所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The domain name corresponding to the information security log of the missing URL is matched with the domain name of the policy, and if the domain name corresponding to the information security log of the missing URL is the same as the domain name of the policy, the policy hits.
结合第四方面的第六种可能的实现方式,在第四方面的第八种可能的实现方式中,若所述策略信息包括策略URL,所述匹配模块具体用于:With reference to the sixth possible implementation of the fourth aspect, in the eighth possible implementation of the fourth aspect, if the policy information includes a policy URL, the matching module is specifically configured to:
将所述缺失URL的信息安全日志对应的URL,与所述策略URL进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,则策略命中。The URL corresponding to the information security log of the missing URL is matched with the policy URL, and if the URL corresponding to the information security log of the missing URL is the same as the policy URL, the policy hits.
结合第四方面的第六种可能的实现方式,在第四方面的第九种可能的实现方式中,若所述策略信息包括策略域名和策略URL,所述匹配模块具体用于:With reference to the sixth possible implementation of the fourth aspect, in the ninth possible implementation of the fourth aspect, if the policy information includes a policy domain name and a policy URL, the matching module is specifically configured to:
根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;Obtaining the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
将所述缺失URL的信息安全日志对应的URL以及域名,分别与所述策略URL及所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,且所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。Match the URL and domain name corresponding to the information security log of the missing URL with the policy URL and the policy domain name respectively, if the URL corresponding to the information security log of the missing URL is the same as the policy URL, and the If the domain name corresponding to the information security log with the missing URL is the same as the domain name of the policy, the policy is matched.
第五方面,本发明实施例提供一种信息安全检测设备,包括:In a fifth aspect, an embodiment of the present invention provides an information security detection device, including:
标识模块,用于对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志,所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿;An identification module, configured to add an abnormal identifier to an information security log that detects a missing uniform resource locator URL, wherein the information security log containing the abnormal identifier is an information security log that lacks a URL, and the abnormal identifier is used to indicate the URL compensation is required for information security logs with missing URLs;
第一上报模块,用于将所述缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。The first reporting module is used to report the information security log of the missing URL to the log synthesis server, so that the log synthesis server can analyze the information of the missing URL according to the access log to be compensated reported by the deep packet inspection DPI device Security log for compensation.
结合第五方面,在第五方面的第一种可能的实现方式中,所述第一上报模块还具体用于:通过哈希算法确保将相同用户访问的信息安全日志上报给同一日志合成服务器。With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the first reporting module is further specifically configured to: use a hash algorithm to ensure that information security logs accessed by the same user are reported to the same log synthesis server.
结合第五方面或第五方面的第一种可能的实现方式,在第五方面的第二种可能的实现方式中,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。With reference to the fifth aspect or the first possible implementation manner of the fifth aspect, in a second possible implementation manner of the fifth aspect, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
结合第五方面的第二种可能的实现方式,在第五方面的第三种可能的实现方式中,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述信息安全检测设备还包括:With reference to the second possible implementation of the fifth aspect, in the third possible implementation of the fifth aspect, if the abnormal identification of the information security log of the missing URL is the result pending log identification, the information security detection Equipment also includes:
检测模块,用于对所述缺失URL的信息安全日志进行关键字检测,并根据所述缺失URL的信息安全日志的关键字获知所述缺失URL的信息安全日志对应的策略信息,其中,所述策略信息包括策略域名和/或策略URL;A detection module, configured to perform keyword detection on the information security log of the missing URL, and obtain policy information corresponding to the information security log of the missing URL according to keywords of the information security log of the missing URL, wherein the Policy information includes policy domain name and/or policy URL;
第二上报模块,用于将所述策略信息增加到所述缺失URL的信息安全日志中,并将包含所述策略信息的缺失URL的信息安全日志上报给日志合成服务器。The second reporting module is configured to add the policy information to the information security log of the missing URL, and report the information security log of the missing URL including the policy information to the log synthesis server.
第六方面,本发明实施例提供一种深度包检测DPI设备,包括:In a sixth aspect, an embodiment of the present invention provides a deep packet inspection DPI device, including:
判断模块,用于判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;The judging module is used to judge whether the uplink and downlink of the user's access pass through the DPI device, if not, add the identifier to be compensated in the access log corresponding to the user's access, wherein the access log containing the identifier to be compensated is The log to be compensated, the identifier to be compensated is used to indicate that the information security log generated by the user access corresponding to the access log to be compensated needs to be compensated for the uniform resource locator URL;
上报模块,用于将所述待补偿的访问日志上报给日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿。The reporting module is configured to report the access log to be compensated to the log synthesis server, so that the log synthesis server can compensate the information security log of the missing URL according to the access log to be compensated.
结合第六方面,在第六方面的第一种可能的实现方式中,所述上报模块还具体用于:通过哈希算法确保将相同用户访问的访问日志上报给同一日志合成服务器。With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the reporting module is further specifically configured to: use a hash algorithm to ensure that the access logs accessed by the same user are reported to the same log synthesis server.
第七方面,本发明实施例提供一种互联网数据中心IDC信息安全管理系统,包括:In the seventh aspect, the embodiment of the present invention provides an Internet data center IDC information security management system, including:
如上述第四方面中任一实现方式所述的日志合成服务器、如上述第五方面中任一实现方式所述的信息安全检测设备、如上述第六方面中任一实现方式所述的深度包检测DPI设备以及路由设备。The log synthesis server described in any implementation manner of the above-mentioned fourth aspect, the information security detection device described in any implementation manner of the above-mentioned fifth aspect, and the deep package as described in any implementation manner of the above-mentioned sixth aspect Detect DPI devices as well as routing devices.
本发明中,日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;进一步地,所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存;进一步地,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,也即实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿。In the present invention, the log synthesis server identifies the access log to be compensated, and caches the access log to be compensated, wherein the information security log generated by the user access corresponding to the access log to be compensated needs to be unified resource location URL compensation; further, the log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL; further, the log synthesis server uses the access log to be compensated for The information security log of the missing URL is compensated, that is, the compensation of the information security log of the missing URL in the same-origin and same-destination scenario is realized.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description These are some embodiments of the present invention. For those skilled in the art, other drawings can also be obtained according to these drawings without any creative effort.
图1为本发明IDC信息安全管理方法的应用场景示意图;1 is a schematic diagram of an application scenario of the IDC information security management method of the present invention;
图2为本发明IDC信息安全管理的方法实施例一的流程示意图;FIG. 2 is a schematic flow diagram of Embodiment 1 of the method for IDC information security management of the present invention;
图3为本发明IDC信息安全管理的方法实施例二的流程示意图;3 is a schematic flow diagram of Embodiment 2 of the method for IDC information security management of the present invention;
图4为本发明IDC信息安全管理的方法实施例三的流程示意图;4 is a schematic flow diagram of Embodiment 3 of the method for IDC information security management of the present invention;
图5为本发明IDC信息安全管理的方法实施例四的流程示意图;5 is a schematic flow diagram of Embodiment 4 of the method for IDC information security management of the present invention;
图6为本发明日志合成服务器实施例一的结构示意图;FIG. 6 is a schematic structural diagram of Embodiment 1 of the log synthesis server of the present invention;
图7为本发明日志合成服务器实施例二的结构示意图;FIG. 7 is a schematic structural diagram of Embodiment 2 of the log synthesis server of the present invention;
图8为本发明信息安全检测设备实施例一的结构示意图;FIG. 8 is a schematic structural diagram of Embodiment 1 of the information security detection device of the present invention;
图9为本发明信息安全检测设备实施例二的结构示意图;FIG. 9 is a schematic structural diagram of Embodiment 2 of the information security detection device of the present invention;
图10为本发明深度包检测DPI设备实施例一的结构示意图;FIG. 10 is a schematic structural diagram of Embodiment 1 of a deep packet inspection DPI device according to the present invention;
图11为本发明深度包检测DPI设备实施例二的结构示意图;11 is a schematic structural diagram of Embodiment 2 of the deep packet inspection DPI device of the present invention;
图12为本发明互联网数据中心IDC信息安全管理系统实施例的结构示意图。Fig. 12 is a schematic structural diagram of an embodiment of the IDC information security management system of the Internet data center of the present invention.
具体实施方式detailed description
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
2012年底中国工业和信息化部发布了2个有关IDC信息安全管理系统的相关规范-《IDCISP信息安全管理系统技术要求》以及《IDCISP信息安全管理系统接口规范》,实现对IDC的信息监管。在上述规范中,明确要求:信息安全管理体系(InformationSecurityManagementSystem,简称ISMS)应对IDC/互联网服务提供商(InternetServiceProvider,简称ISP)的双向流量数据进行监测,对发现的违法信息进行记录及处置,以实现监测及过滤日志。根据规范,一个满足要求的系统应该至少具备以下条件:1)、能够根据网络之间互连的协议(InternetProtocol,简称IP)、域名、URL以及关键字等组合条件,对会话进行检测或者过滤;2)、在命中策略时,能够在上报日志中包含源/目的IP,源/目的端口、违法信息、采集时间以及触发的指令标识,其中,对超文本传输协议(HyperTextTransferProtocol,简称HTTP)还需要记录URL。At the end of 2012, the Ministry of Industry and Information Technology of China issued two relevant specifications on IDC information security management system - "IDCISP Information Security Management System Technical Requirements" and "IDCISP Information Security Management System Interface Specifications" to realize the information supervision of IDC. In the above specification, it is clearly required that the information security management system (Information Security Management System, referred to as ISMS) should monitor the two-way flow data of IDC/Internet Service Provider (Internet Service Provider, referred to as ISP), record and deal with the illegal information found, so as to realize Monitor and filter logs. According to the specification, a system that meets the requirements should at least meet the following conditions: 1) It can detect or filter sessions according to the combined conditions of the interconnection protocol between networks (Internet Protocol, referred to as IP), domain name, URL, and keywords; 2), when the strategy is hit, the source/destination IP, source/destination port, illegal information, collection time and triggered instruction identification can be included in the reported log, wherein, the hypertext transfer protocol (HyperTextTransferProtocol, referred to as HTTP) also needs to Record the URL.
现有技术中,在网络拓扑比较简单时,同一会话的上下行流量都能够经过同一台DPI设备,因此,检测、生成及上报访问日志都可以满足上述两个要求。但对于网络结构比较复杂,如包含非对称路由设备且存在多台DPI设备时,同一会话的上下行流量会经过不同信息安全检测设备,导致下行流量经过的信息安全检测设备无法上报满足IDC信息安全管理相关规范的信息安全日志(如缺失URL),因此,针对同源同宿场景下如何对缺失URL的信息安全日志进行补偿以实现IDC信息安全管理是急需解决的技术问题。In the prior art, when the network topology is relatively simple, the uplink and downlink traffic of the same session can pass through the same DPI device, therefore, the detection, generation and reporting of access logs can all meet the above two requirements. However, the network structure is more complicated. For example, if there are asymmetric routing devices and multiple DPI devices, the uplink and downlink traffic of the same session will pass through different information security detection devices, resulting in the information security detection devices that the downlink traffic passes cannot be reported to meet IDC information security requirements. Manage relevant standardized information security logs (such as missing URLs). Therefore, how to compensate the information security logs for missing URLs in the same-source and same-destination scenario to realize IDC information security management is an urgent technical problem to be solved.
现有技术中,虽然可以通过增加前置交换机/分流设备进行汇聚分流的方式,将同一用户访问的上下行流量都镜像到同一信息安全检测设备,以保证同一用户访问的上下行流量经过同一信息安全检测设备进行检测,但现有技术需配置额外的分流设备,提高用户成本,同时所述分流设备物理距离要求较高。因此,本发明实施例中提供了一种针对同源同宿场景下对缺失URL的信息安全日志进行补偿的技术方案。In the existing technology, although the uplink and downlink traffic accessed by the same user can be mirrored to the same information security detection device by adding a front-end switch/distribution device for aggregation and distribution, so as to ensure that the uplink and downlink traffic accessed by the same user passes through the same information Safety detection equipment is used for detection, but in the prior art, additional shunting equipment needs to be configured, which increases user costs, and at the same time, the physical distance of the shunting equipment requires high requirements. Therefore, an embodiment of the present invention provides a technical solution for compensating information security logs for missing URLs in a same-source and same-destination scenario.
图1为本发明IDC信息安全管理方法的应用场景示意图,如图1所示,本发明实施例中的网络结构包括:路由器1、路由器2、DPI设备1、DPI设备2、信息安全检测设备1、信息安全检测设备2、日志合成服务器1以及应用服务器。可选地,具体流程如下:(1)、用户访问的上行流量(即请求信息)通过路由器1分流到DPI设备1;(2)、所述DPI设备1针对业务链路上的公共信息数据进行全量检测,生成访问日志并将所述访问日志上报给所述日志合成服务器1;(3)、所述用户访问的下行流量(即响应消息)通过路由器2分流到DPI设备2;(4)、所述DPI设备2将所述下行流量镜像到信息安全检测设备2,其中,由于上行流量未经过所述DPI设备2,所述安全检测设备2获取不到所述用户访问的URL;(5)、所述信息安全检测设备2实现关键字检测,生成缺失URL的信息安全日志并将所述信息安全日志上报给日志合成服务器1;(6)、所述日志合成服务器1根据所述访问日志以及所述信息安全日志,合成完整的信息安全日志。Figure 1 is a schematic diagram of the application scenario of the IDC information security management method of the present invention, as shown in Figure 1, the network structure in the embodiment of the present invention includes: router 1, router 2, DPI device 1, DPI device 2, information security detection device 1 , an information security detection device 2, a log synthesis server 1 and an application server. Optionally, the specific process is as follows: (1), the upstream traffic (ie request information) accessed by the user is distributed to the DPI device 1 through the router 1; Full detection, generate access log and report the access log to the log synthesis server 1; (3), the downstream traffic (ie response message) accessed by the user is distributed to the DPI device 2 through the router 2; (4), The DPI device 2 mirrors the downlink traffic to the information security detection device 2, wherein, since the uplink traffic does not pass through the DPI device 2, the security detection device 2 cannot obtain the URL accessed by the user; (5) , the information security detection device 2 realizes keyword detection, generates the information security log of the missing URL and reports the information security log to the log synthesis server 1; (6), the log synthesis server 1 according to the access log and The information security log synthesizes a complete information security log.
图2为本发明IDC信息安全管理的方法实施例一的流程示意图,如图2所示,本实施例的方法可以包括:Fig. 2 is a schematic flow diagram of Embodiment 1 of the method for IDC information security management of the present invention. As shown in Fig. 2, the method of this embodiment may include:
S201、日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存。S201. The log synthesis server identifies access logs to be compensated, and caches the access logs to be compensated.
本发明实施例中,日志合成服务器接收由DPI设备上报的所有访问日志,由于部分用户访问的上下行流量都通过同一DPI设备,因此,所述部分用户访问所产生的信息安全日志是完整的,而不需要做URL补偿。可选地,本发明实施例中,所述日志合成服务器识别所述所有访问日志中的待补偿的访问日志,并仅将所述待补偿的访问日志进行缓存,以便所述日志合成服务器根据缓存的所述待补偿的访问日志对缺失URL的信息安全日志进行补偿,从而减少了所述日志合成服务器缓存的访问日志量,提高匹配效率;其中,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿。In the embodiment of the present invention, the log synthesis server receives all the access logs reported by the DPI device. Since the uplink and downlink traffic accessed by some users passes through the same DPI device, the information security logs generated by the part of the user access are complete. No need to do URL compensation. Optionally, in this embodiment of the present invention, the log synthesis server identifies the access logs to be compensated among all the access logs, and only caches the access logs to be compensated, so that the log synthesis server can The access log to be compensated compensates the information security log of the missing URL, thereby reducing the amount of access log cached by the log synthesis server and improving matching efficiency; wherein, the access log corresponding to the user access The generated information security logs need to be compensated by URL.
可选地,所述S201,包括:Optionally, said S201 includes:
所述日志合成服务器根据所述待补偿的访问日志中的待补偿标识,识别所述待补偿的访问日志,其中,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿。The log synthesis server identifies the access log to be compensated according to the to-be-compensated identifier in the to-be-compensated access log, wherein the to-be-compensated identifier is used to indicate that the user accessing the corresponding access log to be compensated The generated information security logs need to be compensated by URL.
本发明实施例中,所述日志合成服务器可以根据所述待补偿的访问日志中包含的用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿的待补偿标识,识别所述待补偿的访问日志。可选地,当所述日志合成服务器接收到一访问日志时,所述日志合成服务器可以先判断所述访问日志是否包含待补偿标识,若包含,则确定所述访问日志为待补偿的访问日志,进一步地,将所述待补偿的访问日志进行缓存;否则,则确定所述访问日志对应的用户访问所产生的信息安全日志为完整的日志,不需要进行URL补偿,进一步地,直接上报所述访问日志而不需要进行缓存。In the embodiment of the present invention, the log synthesis server may use the information security log generated by the user access corresponding to the access log to be compensated to indicate that URL compensation needs to be performed according to the to-be-compensated access log contained in the to-be-compensated access log ID, identifying the access log to be compensated. Optionally, when the log synthesis server receives an access log, the log synthesis server may first determine whether the access log contains an identifier to be compensated, and if so, determine that the access log is an access log to be compensated , further, cache the access log to be compensated; otherwise, determine that the information security log generated by the user access corresponding to the access log is a complete log, URL compensation is not required, and further, directly report the The above access logs do not need to be cached.
S202、所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存。S202. The log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL.
本发明实施例中,日志合成服务器接收由信息安全检测设备上报的所有信息安全日志,可选地,所述信息安全检测设备上报的信息安全日志包括两大部分,其中,第一部分确实为信息安全日志(该第一部分包括完整的信息安全日志,以及缺失URL的信息安全日志),第二部分为所述信息安全检测设备不确定该日志是否为信息安全日志(该第二部分为缺失URL且日志类型待定的日志,也即所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志)。其中,完整的信息安全日志对应的用户访问的上下行流量都通过同一DPI设备,因此,所述用户访问所产生的信息安全日志是完整的。可选地,本发明实施例中,所述日志合成服务器识别所述所有信息安全日志中的缺失URL的信息安全日志(包括所述信息安全检测设备可以确定的缺失URL的信息安全日志,以及所述信息安全检测设备不确定的缺失URL的信息安全日志),并仅将所述缺失URL的信息安全日志进行缓存,以便所述日志合成服务器根据缓存的所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,不仅减少了所述日志合成服务器缓存的日志量,同时减少了需要补偿的日志量,从而提高匹配效率。In the embodiment of the present invention, the log synthesis server receives all information security logs reported by the information security detection device. Optionally, the information security log reported by the information security detection device includes two parts, wherein the first part is indeed information security logs. log (the first part includes the complete information security log, and the information security log of the missing URL), and the second part is that the information security detection device does not determine whether the log is an information security log (the second part is the missing URL and the log A log of undetermined type, that is, the information security detection device is not sure whether the log is an information security log or other legal log). Wherein, the uplink and downlink traffic of the user access corresponding to the complete information security log all pass through the same DPI device, therefore, the information security log generated by the user access is complete. Optionally, in this embodiment of the present invention, the log synthesis server identifies information security logs with missing URLs in all information security logs (including information security logs with missing URLs that can be determined by the information security detection device, and the The information security log of the missing URL that is not determined by the information security detection device), and only caches the information security log of the missing URL, so that the log synthesis server can analyze the missing URL according to the cached access log to be compensated The information security log of the URL is compensated, which not only reduces the amount of logs cached by the log synthesis server, but also reduces the amount of logs that need to be compensated, thereby improving the matching efficiency.
可选地,所述S202,包括:Optionally, said S202 includes:
所述日志合成服务器根据所述缺失URL的信息安全日志中的异常标识,识别所述缺失URL的信息安全日志,其中,所述异常标识用于指示所述信息安全日志需要做URL补偿。The log synthesis server identifies the information security log of the missing URL according to the abnormal identifier in the information security log of the missing URL, wherein the abnormal identifier is used to indicate that URL compensation is required for the information security log.
本发明实施例中,所述日志合成服务器可以根据所述缺失URL的信息安全日志中包含的用于指示所述信息安全日志需要做URL补偿的异常标识,识别所述缺失URL的信息安全日志,可选地,所述异常标识包括:缺失URL日志标识以及结果待定日志标识,其中,异常标识为缺失URL日志标识的信息安全日志为所述信息安全检测设备可以确定该日志为信息安全日志的;异常标识为结果待定日志标识的信息安全日志不仅缺失URL,且日志类型待定,也即所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志,标识该日志为结果待定日志的目的是为了便于让所述日志合成服务器对该日志类型作进一步地判定,以确定该日志到底是信息安全日志还是其它合法日志。可选地,如异常标识为1表示该信息安全日志为缺失URL的信息安全日志,异常标识为2表示该信息安全日志为结果待定的信息安全日志。In the embodiment of the present invention, the log composition server may identify the information security log with the missing URL according to the abnormality identifier included in the information security log with the missing URL indicating that the information security log needs URL compensation, Optionally, the abnormality identification includes: a missing URL log identification and a pending result log identification, wherein the abnormal identification is an information security log with a missing URL log identification, which can be determined by the information security detection device as an information security log; The information security log identified as the result pending log is not only missing the URL, but also the log type is pending, that is, the information security detection device is not sure whether the log is an information security log or other legal log, and the purpose of marking the log as the result pending log It is for the convenience of allowing the log synthesis server to further determine the type of the log to determine whether the log is an information security log or other legal logs. Optionally, if the exception identifier is 1, it means that the information security log is an information security log with a missing URL, and if the exception identifier is 2, it means that the information security log is an information security log whose result is pending.
也即所述缺失URL的信息安全日志包括异常标识为缺失URL日志标识对应的信息安全日志(所述信息安全检测设备可以确定该日志为信息安全日志),以及异常标识为结果待定日志标识对应的信息安全日志(所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志)。可选地,当所述日志合成服务器接收到一信息安全日志时,所述日志合成服务器可以先判断所述信息安全日志是否包含异常标识,若包含,则确定所述信息安全日志为缺失URL的信息安全日志,进一步地,将所述缺失URL的信息安全日志进行缓存;否则,则确定所述信息安全日志为完整的日志,不需要进行URL补偿。That is to say, the information security log of the missing URL includes an information security log corresponding to the missing URL log identifier (the information security detection device can determine that the log is an information security log) with an abnormal identifier, and an abnormal identifier corresponding to the result pending log identifier. Information security log (the information security detection device does not determine whether the log is an information security log or other legal log). Optionally, when the log synthesis server receives an information security log, the log synthesis server may first determine whether the information security log contains an abnormal identifier, and if so, determine that the information security log is missing a URL The information security log further caches the information security log of the missing URL; otherwise, it is determined that the information security log is a complete log, and no URL compensation is required.
S203、所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。S203. The log synthesis server compensates the information security log of the missing URL according to the access log to be compensated.
本发明实施例中,DPI设备及信息安全检测设备通过哈希(Hash)算法保证将相同用户访问的对应日志发送到同一日志合成服务器,如:根据前述图1所述,所述DPI设备1将用户访问1的访问日志上报给所述日志合成服务器1,对应地,所述信息安全检测设备2将所述用户访问1对应的缺失URL的信息安全日志上报给所述日志合成服务器1。由于所述待补偿的访问日志中包含所述用户访问的URL,因此,可选地,所述日志合成服务器可以首先确定与某一缺失URL的信息安全日志对应的待补偿的访问日志,其次,获取与所述缺失URL的信息安全日志对应的待补偿的访问日志中包含的URL,最后,根据获取的所述URL对所述缺失URL的信息安全日志进行补偿。In the embodiment of the present invention, the DPI device and the information security detection device ensure that the corresponding logs accessed by the same user are sent to the same log synthesis server through a hash (Hash) algorithm, such as: according to the aforementioned Figure 1, the DPI device 1 will The access log of the user access 1 is reported to the log synthesis server 1 , and correspondingly, the information security detection device 2 reports the information security log of the missing URL corresponding to the user access 1 to the log synthesis server 1 . Since the access log to be compensated includes the URL accessed by the user, optionally, the log synthesis server may first determine the access log to be compensated corresponding to an information security log with a missing URL, and secondly, The URL contained in the access log to be compensated corresponding to the information security log of the missing URL is obtained, and finally, the information security log of the missing URL is compensated according to the obtained URL.
可选地,所述S203,包括:Optionally, said S203 includes:
所述日志合成服务器确定任一所述缺失URL的信息安全日志的关键标识字段;The log synthesis server determines the key identification field of any information security log of the missing URL;
所述日志合成服务器根据所述关键标识字段遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述关键标识字段匹配的待补偿的访问日志;The log synthesis server traverses all the access logs to be compensated in the query cache according to the key identification field until the access log to be compensated that matches the key identification field is determined;
所述日志合成服务器获取所述与所述关键标识字段匹配的待补偿的访问日志的URL,并将所述URL补偿给所述任一缺失URL的信息安全日志。The log synthesis server acquires the URL of the access log to be compensated that matches the key identification field, and compensates the URL for the information security log of any missing URL.
本发明实施例中,所述日志合成服务器首先通过关键字检测方式,以确定任一所述缺失URL的信息安全日志的关键标识字段;进一步地,所述日志合成服务器根据所述关键标识字段,遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述关键标识字段匹配的待补偿的访问日志,可选地,由于五个关键标识字段可以唯一确定任一访问,所述日志合成服务器通过五元组匹配方式确定与所述关键标识字段匹配的待补偿的访问日志,具体地,所述日志合成服务器根据五个关键标识字段,遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述五个关键标识字段匹配的待补偿的访问日志,可选地,所述关键标识字段包括:源网络之间互连的协议IP、目的IP、源端口、目的端口及设备事务标识(Identity,简称ID);进一步地,所述日志合成服务器获取所述与所述关键标识字段匹配的待补偿的访问日志的URL,并将所述URL补偿给所述任一缺失URL的信息安全日志,从而得到完整的信息安全日志。In the embodiment of the present invention, the log synthesis server first uses a keyword detection method to determine the key identification field of any information security log of the missing URL; further, the log synthesis server according to the key identification field, Traverse all the access logs to be compensated in the query cache until the access log to be compensated that matches the key identification field is determined. Optionally, since the five key identification fields can uniquely determine any access, the log synthesis The server determines the access log to be compensated that matches the key identification field through a quintuple matching method. Specifically, the log synthesis server traverses all the access logs to be compensated in the query cache according to the five key identification fields, Until the access log to be compensated matching the five key identification fields is determined, optionally, the key identification fields include: protocol IP, destination IP, source port, destination port, and device transactions interconnected between source networks Identification (Identity, referred to as ID); further, the log synthesis server obtains the URL of the access log to be compensated that matches the key identification field, and compensates the URL for the information of any missing URL Security log, so as to get a complete information security log.
可选地,本发明实施例中,并不限定S201与S202的前后顺序,可选地,S201可以在S202之前、在S202之后、或者S201与S202同时执行。可选地,本发明实施例中,所述日志合成服务器还可采用其它保存方式对所述待补偿的访问日志和/或所述缺失URL的信息安全日志进行保存,本发明实施例中对此并不作限制。Optionally, in this embodiment of the present invention, the sequence of S201 and S202 is not limited. Optionally, S201 may be performed before S202, after S202, or S201 and S202 are performed simultaneously. Optionally, in the embodiment of the present invention, the log synthesis server may also save the access log to be compensated and/or the information security log of the missing URL in other ways. In the embodiment of the present invention, this Not limiting.
本发明实施例中,日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;进一步地,所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存;进一步地,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,也即实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿。In the embodiment of the present invention, the log synthesis server identifies the access log to be compensated, and caches the access log to be compensated, wherein the information security log generated by the user access corresponding to the access log to be compensated needs to be unified resource locator URL compensation; further, the log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL; further, the log synthesis server according to the access to be compensated The log compensates the information security log of the missing URL, that is, realizes the compensation of the information security log of the missing URL in the scenario of the same source and same destination.
现有技术中同源同宿场景下,由于同一用户访问的上下行流量不经过同一信息安全检测设备,所述信息安全检测设备上报的信息安全日志为缺失URL的日志,导致所述日志合成服务器无法根据多种组合条件进行关联检测,也即未满足IDC信息安全管理相关规范。In the same-source and same-destination scenario in the prior art, since the uplink and downlink traffic accessed by the same user does not pass through the same information security detection device, the information security log reported by the information security detection device is a log with a missing URL, so that the log synthesis server cannot Correlation detection is performed based on multiple combination conditions, that is, it does not meet the relevant specifications of IDC information security management.
进一步地,本发明实施例中,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,也即所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志,因此,需要所述日志合成服务器对该日志类型作进一步地判定,以确定该日志到底是信息安全日志还是其它合法日志。进一步地,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿之后,还包括:Further, in the embodiment of the present invention, if the abnormality identification of the information security log with the missing URL is the result pending log identification, that is, the information security detection device is not sure whether the log is an information security log or other legal log, therefore, The log synthesis server needs to further determine the type of the log to determine whether the log is an information security log or other legal log. Further, after the log synthesis server compensates the information security log of the missing URL according to the access log to be compensated, it further includes:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中。The log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, and if the matching is successful, the policy is matched.
本发明实施例中,所述日志合成服务器若确定所述缺失URL的信息安全日志的异常标识为结果待定日志标识(该日志缺失URL,且日志类型待定),进一步地,所日志合成服务器将已获取到的所述缺失URL的信息安全日志对应的URL与所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则认为策略命中,即实现了组合条件的关联检测,从而确定该日志确实为信息安全日志;否则,确定该日志为合法日志,也即该日志对应的访问并未涉及到信息安全。其中,所述缺失URL的信息安全日志对应的策略信息包括策略域名和/或策略URL,所述策略信息为信息安全检测设备增加到所述缺失URL的信息安全日志中的。可选地,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配之前,还包括:所述日志合成服务器接收由所述信息安全检测设备上报的包含所述策略信息的所述缺失URL的信息安全日志。In the embodiment of the present invention, if the log synthesis server determines that the abnormal identification of the information security log with the missing URL is the result pending log identification (the log lacks a URL, and the log type is to be determined), further, the log synthesis server will have The obtained URL corresponding to the information security log of the missing URL is matched with the policy information corresponding to the information security log of the missing URL, and if the matching is successful, it is considered that the policy hits, that is, the association detection of the combination condition is realized, thereby determining The log is indeed an information security log; otherwise, it is determined that the log is a legal log, that is, the access corresponding to the log does not involve information security. Wherein, the policy information corresponding to the information security log of the missing URL includes a policy domain name and/or policy URL, and the policy information is added to the information security log of the missing URL by the information security detection device. Optionally, before the log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, it further includes: the log synthesis server receiving the An information security log including the missing URL of the policy information reported by the information security detection device.
可选地,若所述策略信息包括策略域名,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:Optionally, if the policy information includes a policy domain name, the log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, and if the matching is successful, Then the policy hits, including:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;The log synthesis server acquires the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
所述日志合成服务器将所述缺失URL的信息安全日志对应的域名,与所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The log synthesis server matches the domain name corresponding to the information security log of the missing URL with the policy domain name, and if the domain name corresponding to the information security log of the missing URL is the same as the policy domain name, the policy hits.
本发明实施例中,若所述策略信息包括策略域名(或者,所述策略信息为策略域名+关键字),所述日志合成服务器首先根据所述缺失URL的信息安全日志对应的URL,获取所述缺失URL的信息安全日志对应的域名;其次,所述日志合成服务器将所述缺失URL的信息安全日志对应的域名,与所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的域名与所述策略域名相同,即匹配成功,则认为策略命中,即实现了域名及关键字的关联检测,从而确定所述缺失URL的信息安全日志确实为信息安全日志;否则,确定所述缺失URL的信息安全日志为合法日志。In the embodiment of the present invention, if the policy information includes a policy domain name (or, the policy information is a policy domain name + keyword), the log synthesis server first obtains the URL corresponding to the information security log of the missing URL. The domain name corresponding to the information security log of the missing URL; secondly, the log synthesis server matches the domain name corresponding to the information security log of the missing URL with the policy domain name, if the information security log corresponding to the missing URL The domain name is the same as the domain name of the policy, that is, the matching is successful, then it is considered that the policy hits, that is, the association detection of the domain name and the keyword is realized, thereby determining that the information security log of the missing URL is indeed an information security log; otherwise, it is determined that the missing URL is an information security log; The information security log of the URL is a legal log.
可选地,若所述策略信息包括策略URL,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:Optionally, if the policy information includes a policy URL, the log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, and if the matching is successful, Then the policy hits, including:
所述日志合成服务器将所述缺失URL的信息安全日志对应的URL,与所述策略URL进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,则策略命中。The log synthesis server matches the URL corresponding to the information security log with the missing URL with the policy URL, and if the URL corresponding to the information security log with the missing URL is the same as the policy URL, the policy hits.
本发明实施例中,若所述策略信息包括策略URL(或者,所述策略信息为策略URL+关键字),所述日志合成服务器将所述缺失URL的信息安全日志对应的URL,与所述策略URL进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,即匹配成功,则认为策略命中,即实现了URL及关键字的关联检测,从而确定所述缺失URL的信息安全日志确实为信息安全日志;否则,确定所述缺失URL的信息安全日志为合法日志。In the embodiment of the present invention, if the policy information includes a policy URL (or, the policy information is a policy URL+keyword), the log synthesis server combines the URL corresponding to the information security log with the missing URL with the policy URL is matched, if the URL corresponding to the information security log of the missing URL is the same as the policy URL, that is, the matching is successful, then it is considered that the policy hits, that is, the association detection of the URL and the keyword is realized, thereby determining the URL of the missing URL. The information security log is indeed an information security log; otherwise, it is determined that the information security log with the missing URL is a legitimate log.
可选地,若所述策略信息包括策略域名和策略URL,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,包括:Optionally, if the policy information includes a policy domain name and a policy URL, the log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, if If the matching is successful, the policy hits, including:
所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;The log synthesis server acquires the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
所述日志合成服务器将所述缺失URL的信息安全日志对应的URL以及域名,分别与所述策略URL及所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,且所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The log synthesis server matches the URL and domain name corresponding to the information security log of the missing URL with the policy URL and the policy domain name respectively, if the URL corresponding to the information security log of the missing URL matches the policy If the URLs are the same, and the domain name corresponding to the information security log with the missing URL is the same as the domain name of the policy, the policy is matched.
本发明实施例中,若所述策略信息包括策略域名和策略URL(或者,所述策略信息为策略URL+策略域名+关键字),所述日志合成服务器首先根据所述缺失URL的信息安全日志对应的URL,获取所述缺失URL的信息安全日志对应的域名;其次,所述日志合成服务器将所述缺失URL的信息安全日志对应的URL以及所述域名,分别与所述策略URL及所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,且所述缺失URL的信息安全日志对应的域名与所述策略域名相同,即匹配成功,则认为策略命中,即实现了域名、URL及关键字的关联检测,从而确定所述缺失URL的信息安全日志确实为信息安全日志;否则,确定所述缺失URL的信息安全日志为合法日志。In the embodiment of the present invention, if the policy information includes a policy domain name and a policy URL (or, the policy information is a policy URL+policy domain name+keyword), the log synthesis server first corresponds to the information security log according to the missing URL. URL to obtain the domain name corresponding to the information security log of the missing URL; secondly, the log synthesis server combines the URL corresponding to the information security log of the missing URL and the domain name with the policy URL and the policy URL respectively. The domain name is matched, if the URL corresponding to the information security log of the missing URL is the same as the policy URL, and the domain name corresponding to the information security log of the missing URL is the same as the policy domain name, that is, the matching is successful, the policy is considered to be hit , that is, the association detection of domain names, URLs and keywords is realized, thereby determining that the information security log of the missing URL is indeed an information security log; otherwise, determining that the information security log of the missing URL is a legitimate log.
可选地,所述所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配之前,还包括:所述日志合成服务器确定所述缺失URL的信息安全日志的异常标识为结果待定日志标识。Optionally, before the log synthesis server performs matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL, the log synthesis server further includes: the log synthesis server determines the The exception ID of the information security log with the missing URL is the log ID of pending results.
本发明实施例中,日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;进一步地,所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存;进一步地,所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,也即实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿;进一步地,所述日志合成服务器根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中,实现了组合条件的关联检测,并确定异常标识为结果待定日志标识对应的信息安全日志确实为信息安全日志;否则,确定所述日志为合法日志。In the embodiment of the present invention, the log synthesis server identifies the access log to be compensated, and caches the access log to be compensated, wherein the information security log generated by the user access corresponding to the access log to be compensated needs to be unified resource locator URL compensation; further, the log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL; further, the log synthesis server according to the access to be compensated The log compensates the information security log of the missing URL, that is, realizes compensating the information security log of the missing URL in the same source and same destination scenario; further, the log synthesis server uses the information security log of the missing URL The corresponding URL and the policy information corresponding to the information security log of the missing URL are matched. If the match is successful, the policy hits, and the association detection of the combination condition is realized, and the abnormal identification is determined as the result pending. The information security log corresponding to the log identification is indeed is an information security log; otherwise, it is determined that the log is a legitimate log.
图3为本发明IDC信息安全管理的方法实施例二的流程示意图,如图3所示,本实施例的方法可以包括:FIG. 3 is a schematic flow diagram of Embodiment 2 of the method for IDC information security management of the present invention. As shown in FIG. 3 , the method of this embodiment may include:
S301、信息安全检测设备对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识。S301. The information security detection device adds an abnormality identifier to an information security log in which a missing URL is detected.
本发明实施例中,为了便于日志合成服务器能快速识别缺失URL的信息安全日志,可选地,所述信息安全检测设备对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志(包括所述信息安全检测设备可以确定的缺失URL的信息安全日志,以及所述信息安全检测设备不确定的缺失URL的信息安全日志),所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿,以便于当所述日志合成服务器在接收到某一信息安全日志时,可以通过判断所述信息安全日志中是否包含所述异常标识而快速确定所述信息安全日志是否为缺失URL的信息安全日志。可选地,所述异常标识包括:缺失URL日志标识(所述信息安全检测设备可以确定该日志为信息安全日志)以及结果待定日志标识(其中,结果待定日志标识表示该日志缺失URL,且日志类型待定,也即所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志)。也即,所述缺失URL的信息安全日志包括两大部分,其中,第一部分确实为信息安全日志(也即异常标识为缺失URL日志标识对应的信息安全日志),另一部分为所述信息安全检测设备不确定该日志是否为信息安全日志(也即异常标识为结果待定日志标识对应的信息安全日志);其中,标识该日志为结果待定日志的目的是为了便于让所述日志合成服务器对该日志类型作进一步地判定,以确定该日志到底是信息安全日志还是其它合法日志。可选地,如异常标识为1表示该信息安全日志为缺失URL的信息安全日志,异常标识为2表示该信息安全日志为结果待定的信息安全日志。In the embodiment of the present invention, in order to facilitate the log synthesis server to quickly identify information security logs with missing URLs, optionally, the information security detection device adds an abnormality identifier to the information security logs that detect missing URLs, wherein , the information security log containing the abnormal identification is an information security log of a missing URL (including an information security log of a missing URL that can be determined by the information security detection device, and an information security log of a missing URL that the information security detection device cannot determine. log), the exception identifier is used to indicate that the information security log of the missing URL needs to be compensated by URL, so that when the log synthesis server receives a certain information security log, it can judge the information security log in the information security log Whether the information security log contains the abnormality identifier quickly determines whether the information security log is an information security log with a missing URL. Optionally, the abnormality identification includes: a missing URL log identification (the information security detection device can determine that the log is an information security log) and a result pending log identification (wherein, the result pending log identification indicates that the log lacks a URL, and the log The type is to be determined, that is, the information security detection device is not sure whether the log is an information security log or other legal log). That is to say, the information security log of the missing URL includes two parts, wherein, the first part is indeed the information security log (that is, the abnormal identification is the information security log corresponding to the missing URL log identification), and the other part is the information security detection log. The device is not sure whether the log is an information security log (that is, the abnormal identification is the information security log corresponding to the result pending log identification); wherein, the purpose of marking the log as the result pending log is to facilitate the log synthesis server to analyze the log The type is further judged to determine whether the log is an information security log or other legal logs. Optionally, if the exception identifier is 1, it means that the information security log is an information security log with a missing URL, and if the exception identifier is 2, it means that the information security log is an information security log whose result is pending.
S302、所述信息安全检测设备将所述缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。S302. The information security detection device reports the information security log of the missing URL to the log synthesis server, so that the log synthesis server can analyze the information of the missing URL according to the access log to be compensated reported by the deep packet inspection DPI device. Information security logs for compensation.
本发明实施例中,所述信息安全监测设备将包含所述异常标识的缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。可选地,所述信息安全检测设备通过哈希(Hash)算法确保将相同用户访问的信息安全日志上报给同一日志合成服务器,以便于所述日志合成服务器实现URL补偿功能。In the embodiment of the present invention, the information security monitoring device reports the information security log containing the missing URL of the abnormality identifier to the log synthesis server, so that the log synthesis server can use the information to be compensated reported by the deep packet inspection DPI device The access log compensates the information security log of the missing URL. Optionally, the information security detection device uses a Hash algorithm to ensure that the information security logs accessed by the same user are reported to the same log synthesis server, so that the log synthesis server can realize the URL compensation function.
本发明实施例中,信息安全检测设备对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志,所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿;进一步地,所述信息安全检测设备将所述缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,也即实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿。In the embodiment of the present invention, the information security detection device adds an abnormality identifier to the information security log that detects the missing URL of the uniform resource locator, wherein the information security log containing the abnormal identifier is an information security log that lacks the URL, and the abnormality The information security log for identifying the missing URL needs to be compensated for URL; further, the information security detection device reports the information security log of the missing URL to the log synthesis server, so that the log synthesis server according to the The access log to be compensated reported by the deep packet inspection DPI device compensates the information security log of the missing URL, that is, realizes the compensation of the information security log of the missing URL in the same-source and same-destination scenario.
进一步地,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述信息安全检测设备将所述缺失URL的信息安全日志上报给日志合成服务器之后,还包括:Further, if the abnormal identification of the information security log of the missing URL is the result pending log identification, after the information security detection device reports the information security log of the missing URL to the log synthesis server, it further includes:
所述信息安全检测设备对所述缺失URL的信息安全日志进行关键字检测,并根据所述缺失URL的信息安全日志的关键字获知所述缺失URL的信息安全日志对应的策略信息,其中,所述策略信息包括策略域名和/或策略URL;The information security detection device performs keyword detection on the information security log of the missing URL, and acquires policy information corresponding to the information security log of the missing URL according to keywords of the information security log of the missing URL, wherein the The policy information includes a policy domain name and/or a policy URL;
所述信息安全检测设备将所述策略信息增加到所述缺失URL的信息安全日志中,并将包含所述策略信息的缺失URL的信息安全日志上报给日志合成服务器。The information security detection device adds the policy information to the information security log of the missing URL, and reports the information security log of the missing URL including the policy information to a log synthesis server.
本发明实施例中,所述信息安全检测设备在确定所述缺失URL的信息安全日志的异常标识为结果待定日志标识时,也即所述信息安全检测设备不确定该日志是信息安全日志还是其它合法日志,因此,需要所述日志合成服务器对该日志类型作进一步地判定,以确定该日志到底是信息安全日志还是其它合法日志;可选地,所述信息安全检测设备通过对所述缺失URL的信息安全日志进行关键字检测,并根据所述缺失URL的信息安全日志的关键字获知所述缺失URL的信息安全日志对应的策略信息,其中,所述策略信息包括策略域名和/或策略URL,(如所述策略信息为策略域名+关键字、策略URL+关键字、或者策略URL+策略域名+关键字);进一步地,所述信息安全检测设备将所述策略信息增加到所述缺失URL的信息安全日志中,并将包含所述策略信息的缺失URL的信息安全日志上报给日志合成服务器,以便于所述日志合成服务器根据按照本发明上述步骤S201-S203获取的缺失URL的信息安全日志对应的URL与所述缺失URL的信息安全日志对应的策略信息进行匹配,从而实现了关联检测。In the embodiment of the present invention, when the information security detection device determines that the abnormal identification of the information security log of the missing URL is the result pending log identification, that is, the information security detection device is not sure whether the log is an information security log or other legal log, therefore, the log synthesis server needs to further determine the log type to determine whether the log is an information security log or other legal log; optionally, the information security detection device detects the missing URL The information security log of the missing URL performs keyword detection, and obtains the policy information corresponding to the information security log of the missing URL according to the keyword of the information security log of the missing URL, wherein the policy information includes a policy domain name and/or a policy URL , (such as the policy information is policy domain name+keyword, policy URL+keyword, or policy URL+policy domain name+keyword); further, the information security detection device adds the policy information to the missing URL In the information security log, report the information security log containing the missing URL of the policy information to the log synthesis server, so that the log synthesis server can correspond to the information security log of the missing URL obtained according to the above steps S201-S203 The URL of the missing URL is matched with the policy information corresponding to the information security log of the missing URL, thereby implementing association detection.
图4为本发明IDC信息安全管理的方法实施例三的流程示意图,如图4所示,本实施例的方法可以包括:Fig. 4 is a schematic flow diagram of Embodiment 3 of the method for IDC information security management of the present invention. As shown in Fig. 4, the method of this embodiment may include:
S401、深度包检测DPI设备判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识。S401. The deep packet inspection DPI device judges whether both the uplink and downlink of the user's access pass through the DPI device, and if not, add an indicator to be compensated to the access log corresponding to the user's access.
本发明实施例中,为了便于日志合成服务器能快速识别待补偿的访问日志,可选地,所述DPI设备通过判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿,以便于当所述日志合成服务器在接收到某一访问日志时,可以通过判断所述访问日志中是否包含所述待补偿标识而快速确定所述访问日志是否为待补偿的访问日志。In the embodiment of the present invention, in order to facilitate the log synthesis server to quickly identify the access log to be compensated, optionally, the DPI device judges whether the uplink and downlink of the user's access pass through the DPI device, and if not, the An identifier to be compensated is added to the access log corresponding to the user access, wherein the access log containing the identifier to be compensated is a log to be compensated, and the identifier to be compensated is used to indicate that the access log to be compensated corresponds to the Uniform resource locator URL compensation is required for the information security logs, so that when the log synthesis server receives a certain access log, it can quickly determine whether the access log contains the identifier to be compensated. Whether the access log is the access log to be compensated.
S402、所述DPI设备将所述待补偿的访问日志上报给日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿。S402. The DPI device reports the access log to be compensated to a log synthesis server, so that the log synthesis server compensates the information security log of the missing URL according to the access log to be compensated.
本发明实施例中,所述DPI设备将包含所述待补偿标识的访问日志上报给所述日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿。可选地,所述DPI设备通过Hash算法确保将相同用户访问的访问日志上报给同一日志合成服务器,以便于所述日志合成服务器实现URL补偿功能。In the embodiment of the present invention, the DPI device reports the access log containing the identifier to be compensated to the log synthesis server, so that the log synthesis server can analyze the information security log of the missing URL according to the access log to be compensated Make compensation. Optionally, the DPI device uses a Hash algorithm to ensure that the access logs accessed by the same user are reported to the same log synthesis server, so that the log synthesis server can realize the URL compensation function.
本发明实施例中,深度包检测DPI设备判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;进一步地,所述DPI设备将所述待补偿的访问日志上报给日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿,也即实现了对同源同宿场景下缺失URL的信息安全日志进行了补偿。In the embodiment of the present invention, the deep packet inspection DPI device judges whether the uplink and downlink of the user's access pass through the DPI device, and if not, adds the to-be-compensated identifier to the access log corresponding to the user's access, which includes the to-be-compensated The access log with the compensation identifier is a log to be compensated, and the to-be-compensated identifier is used to indicate that the information security log generated by the user access corresponding to the access log to be compensated needs to be compensated for the Uniform Resource Locator URL; further, the The DPI device reports the access log to be compensated to the log synthesis server, so that the log synthesis server can compensate the information security log of the missing URL according to the access log to be compensated, that is, realizes the scenario of same source and same destination Compensated for the information security log under the missing URL.
图5为本发明IDC信息安全管理的方法实施例四的流程示意图,如图5所示,本实施例的方法可以包括:FIG. 5 is a schematic flow diagram of Embodiment 4 of the method for IDC information security management of the present invention. As shown in FIG. 5, the method of this embodiment may include:
S501、DPI设备上报所有访问日志。S501. The DPI device reports all access logs.
本发明实施中,所述DPI设备识别上下行不经过同一DPI设备的用户访问,并将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,也即所述DPI设备上报的访问日志分为两种:完整的访问日志以及待补偿的访问日志。In the implementation of the present invention, the DPI device identifies user accesses that do not pass through the same DPI device for uplink and downlink, and adds an identifier to be compensated to the access log corresponding to the user access, wherein the access log containing the identifier to be compensated is the The compensated log, that is, the access log reported by the DPI device is divided into two types: a complete access log and an access log to be compensated.
S502、日志合成服务器在接收所述所有访问日志后,合成符合要求的访问日志并上报。S502. After receiving all the access logs, the log synthesis server synthesizes the access logs meeting the requirements and reports them.
S503、所述日志合成服务器识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存。S503. The log synthesis server identifies the access log to be compensated, and caches the access log to be compensated.
S504、信息安全监测设备上报所有信息安全检测设备。S504. The information security monitoring equipment reports to all information security testing equipment.
本发明实施例中,所述信息安全监测设备对检测到缺失URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志,所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿,可选地,所述异常标识包括:缺失URL日志标识以及结果待定日志标识,也即所述信息安全检测设备上报的信息安全日志分为三种:完整的信息安全日志、缺失URL的信息安全日志以及结果待定信息安全日志,其中,结果待定信息安全日志不仅缺失URL,且日志类型待定。In the embodiment of the present invention, the information security monitoring device adds an abnormality identifier to the information security log that detects a missing URL, wherein the information security log containing the abnormal identifier is an information security log with a missing URL, and the abnormal identifier uses In order to indicate that the information security log of the missing URL requires URL compensation, optionally, the abnormality identifier includes: a missing URL log identifier and a pending result log identifier, that is, the information security log reported by the information security detection device is divided into Three types: complete information security log, information security log with missing URL, and information security log with pending result, among which, the information security log with pending result not only lacks URL, but also has a log type to be determined.
S505、日志合成服务器在接收所述所有信息安全日志后,合成符合要求的信息安全日志并上报。S505. After receiving all the information security logs, the log synthesis server synthesizes information security logs meeting requirements and reports them.
S506、所述日志合成服务器识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存。S506. The log synthesis server identifies the information security log of the missing URL, and caches the information security log of the missing URL.
S507、所述日志合成服务器根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿,以得到完整的信息安全日志。S507. The log synthesis server compensates the information security log of the missing URL according to the access log to be compensated, so as to obtain a complete information security log.
具体的实施过程,请详见本发明上述实施例,本实施例在此不再赘述。For the specific implementation process, please refer to the above-mentioned embodiments of the present invention for details, and details will not be repeated here in this embodiment.
图6为本发明日志合成服务器实施例一的结构示意图,如图6所示,本实施例提供的日志合成服务器60可以包括:第一识别模块601、第二识别模块602以及补偿模块603。FIG. 6 is a schematic structural diagram of Embodiment 1 of the log synthesis server of the present invention. As shown in FIG.
其中,第一识别模块601用于识别待补偿的访问日志,并将所述待补偿的访问日志进行缓存,其中,所述待补偿的访问日志为深度包检测DPI设备上报的访问日志,所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;Wherein, the first identification module 601 is configured to identify the access log to be compensated, and cache the access log to be compensated, wherein the access log to be compensated is the access log reported by the deep packet inspection DPI device, the The information security log generated by the user access corresponding to the access log to be compensated needs to be compensated for the uniform resource locator URL;
第二识别模块602用于识别缺失URL的信息安全日志,并将所述缺失URL的信息安全日志进行缓存,其中,所述缺失URL的信息安全日志为信息安全检测设备上报的信息安全日志;The second identification module 602 is configured to identify the information security log of the missing URL, and cache the information security log of the missing URL, wherein the information security log of the missing URL is the information security log reported by the information security detection device;
补偿模块603用于根据所述待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。The compensation module 603 is configured to compensate the information security log of the missing URL according to the access log to be compensated.
可选地,所述第一识别模块601具体用于:Optionally, the first identification module 601 is specifically configured to:
根据所述待补偿的访问日志中的待补偿标识,识别所述待补偿的访问日志,其中,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做URL补偿。Identify the access log to be compensated according to the to-be-compensated identifier in the to-be-compensated access log, wherein the to-be-compensated identifier is used to indicate the information security log generated by the user access corresponding to the to-be-compensated access log Need to do URL compensation.
可选地,所述第二识别模块602具体用于:Optionally, the second identification module 602 is specifically configured to:
根据所述缺失URL的信息安全日志中的异常标识,识别所述缺失URL的信息安全日志,其中,所述异常标识用于指示所述信息安全日志需要做URL补偿。The information security log of the missing URL is identified according to the abnormal identifier in the information security log of the missing URL, wherein the abnormal identifier is used to indicate that URL compensation is required for the information security log.
可选地,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。Optionally, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
可选地,所述补偿模块603包括:Optionally, the compensation module 603 includes:
第一确定单元,用于确定任一所述缺失URL的信息安全日志的关键标识字段;The first determination unit is used to determine the key identification field of the information security log of any of the missing URLs;
第二确定单元,用于根据所述关键标识字段遍历查询缓存的所有所述待补偿的访问日志,直至确定与所述关键标识字段匹配的待补偿的访问日志;The second determination unit is configured to traverse all the access logs to be compensated in the query cache according to the key identification field until the access log to be compensated that matches the key identification field is determined;
补偿单元,用于获取所述与所述关键标识字段匹配的待补偿的访问日志的URL,并将所述URL补偿给所述任一缺失URL的信息安全日志。A compensating unit, configured to obtain the URL of the access log to be compensated that matches the key identification field, and compensate the URL to the information security log of any missing URL.
可选地,所述关键标识字段包括:源网络之间互连的协议IP、目的IP、源端口、目的端口及设备事务标识ID。Optionally, the key identification field includes: protocol IP, destination IP, source port, destination port, and device transaction ID of interconnection between source networks.
可选地,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述日志合成服务器,还包括:Optionally, if the abnormal identification of the information security log of the missing URL is a pending log identification, the log synthesis server further includes:
匹配模块,用于根据所述缺失URL的信息安全日志对应的URL及所述缺失URL的信息安全日志对应的策略信息进行匹配,若匹配成功,则策略命中;其中,所述缺失URL的信息安全日志对应的策略信息包括策略域名和/或策略URL,所述策略信息为信息安全检测设备增加到所述缺失URL的信息安全日志中的。The matching module is configured to perform matching according to the URL corresponding to the information security log of the missing URL and the policy information corresponding to the information security log of the missing URL. If the matching is successful, the policy hits; wherein, the information security of the missing URL The policy information corresponding to the log includes a policy domain name and/or a policy URL, and the policy information is added to the information security log of the missing URL by the information security detection device.
可选地,若所述策略信息包括策略域名,所述匹配模块具体用于:Optionally, if the policy information includes a policy domain name, the matching module is specifically configured to:
根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;Obtaining the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
将所述缺失URL的信息安全日志对应的域名,与所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。The domain name corresponding to the information security log of the missing URL is matched with the domain name of the policy, and if the domain name corresponding to the information security log of the missing URL is the same as the domain name of the policy, the policy hits.
可选地,若所述策略信息包括策略URL,所述匹配模块具体用于:Optionally, if the policy information includes a policy URL, the matching module is specifically configured to:
将所述缺失URL的信息安全日志对应的URL,与所述策略URL进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,则策略命中。The URL corresponding to the information security log of the missing URL is matched with the policy URL, and if the URL corresponding to the information security log of the missing URL is the same as the policy URL, the policy hits.
可选地,若所述策略信息包括策略域名和策略URL,所述匹配模块具体用于:Optionally, if the policy information includes a policy domain name and a policy URL, the matching module is specifically configured to:
根据所述缺失URL的信息安全日志对应的URL获取所述缺失URL的信息安全日志对应的域名;Obtaining the domain name corresponding to the information security log of the missing URL according to the URL corresponding to the information security log of the missing URL;
将所述缺失URL的信息安全日志对应的URL以及域名,分别与所述策略URL及所述策略域名进行匹配,若所述缺失URL的信息安全日志对应的URL与所述策略URL相同,且所述缺失URL的信息安全日志对应的域名与所述策略域名相同,则策略命中。Match the URL and domain name corresponding to the information security log of the missing URL with the policy URL and the policy domain name respectively, if the URL corresponding to the information security log of the missing URL is the same as the policy URL, and the If the domain name corresponding to the information security log with the missing URL is the same as the domain name of the policy, the policy is matched.
本实施例的日志合成服务器,可以用于执行本发明上述IDC信息安全管理的方法实施例一及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The log synthesis server of this embodiment can be used to implement the technical solutions in the first and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图7为本发明日志合成服务器实施例二的结构示意图,如图7所示,本实施例提供的日志合成服务器70可以包括处理器701和存储器702。日志合成服务器70还可以包括数据接口单元703,该数据接口单元703可以和处理器701相连。其中,数据接口单元703用于接收/发送数据,存储器702用于存储执行指令。当日志合成服务器70运行时,处理器701与存储器702之间通信,处理器701调用存储器702中的执行指令,用以执行上述IDC信息安全管理的方法实施例一及四中的操作。FIG. 7 is a schematic structural diagram of Embodiment 2 of the log synthesis server of the present invention. As shown in FIG. 7 , the log synthesis server 70 provided in this embodiment may include a processor 701 and a memory 702 . The log synthesis server 70 may further include a data interface unit 703 , and the data interface unit 703 may be connected to the processor 701 . Wherein, the data interface unit 703 is used to receive/send data, and the memory 702 is used to store execution instructions. When the log synthesis server 70 is running, the processor 701 communicates with the memory 702, and the processor 701 invokes the execution instructions in the memory 702 to execute the operations in Embodiments 1 and 4 of the above-mentioned IDC information security management method.
本实施例的日志合成服务器,可以用于执行本发明上述IDC信息安全管理的方法实施例一及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The log synthesis server of this embodiment can be used to implement the technical solutions in the first and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图8为本发明信息安全检测设备实施例一的结构示意图,如图8所示,本实施例提供的信息安全检测设备80可以包括:标识模块801以及第一上报模块802。FIG. 8 is a schematic structural diagram of Embodiment 1 of the information security detection device of the present invention. As shown in FIG. 8 , the information security detection device 80 provided in this embodiment may include: an identification module 801 and a first reporting module 802 .
其中,标识模块801用于对检测到缺失统一资源定位符URL的信息安全日志中增加异常标识,其中,包含所述异常标识的信息安全日志为缺失URL的信息安全日志,所述异常标识用于指示所述缺失URL的信息安全日志需要做URL补偿;Wherein, the identification module 801 is configured to add an abnormality identifier to the information security log that detects a missing uniform resource locator URL, wherein the information security log containing the abnormality identifier is an information security log with a missing URL, and the abnormality identifier is used for An information security log indicating that the missing URL requires URL compensation;
第一上报模块802用于将所述缺失URL的信息安全日志上报给日志合成服务器,以使所述日志合成服务器根据由深度包检测DPI设备上报的待补偿的访问日志对所述缺失URL的信息安全日志进行补偿。The first reporting module 802 is used to report the information security log of the missing URL to the log synthesis server, so that the log synthesis server can analyze the information of the missing URL according to the access log to be compensated reported by the deep packet inspection DPI device Security log for compensation.
可选地,所述第一上报模块802还具体用于:通过哈希算法确保将相同用户访问的信息安全日志上报给同一日志合成服务器。Optionally, the first reporting module 802 is further specifically configured to: use a hash algorithm to ensure that information security logs accessed by the same user are reported to the same log synthesis server.
可选地,所述异常标识包括:缺失URL日志标识以及结果待定日志标识。Optionally, the exception identifier includes: a missing URL log identifier and a pending result log identifier.
可选地,若所述缺失URL的信息安全日志的异常标识为结果待定日志标识,所述信息安全检测设备还包括:Optionally, if the abnormal identification of the information security log of the missing URL is a result pending log identification, the information security detection device further includes:
检测模块,用于对所述缺失URL的信息安全日志进行关键字检测,并根据所述缺失URL的信息安全日志的关键字获知所述缺失URL的信息安全日志对应的策略信息,其中,所述策略信息包括策略域名和/或策略URL;A detection module, configured to perform keyword detection on the information security log of the missing URL, and obtain policy information corresponding to the information security log of the missing URL according to keywords of the information security log of the missing URL, wherein the Policy information includes policy domain name and/or policy URL;
第二上报模块,用于将所述策略信息增加到所述缺失URL的信息安全日志中,并将包含所述策略信息的缺失URL的信息安全日志上报给日志合成服务器。The second reporting module is configured to add the policy information to the information security log of the missing URL, and report the information security log of the missing URL including the policy information to the log synthesis server.
本实施例的信息安全检测设备,可以用于执行本发明上述IDC信息安全管理的方法实施例二及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The information security detection device of this embodiment can be used to implement the technical solutions in the second and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图9为本发明信息安全检测设备实施例二的结构示意图,如图9所示,本实施例提供的信息安全检测设备90可以包括处理器901和存储器902。信息安全检测设备90还可以包括数据接口单元903,该数据接口单元903可以和处理器901相连。其中,数据接口单元903用于接收/发送数据,存储器902用于存储执行指令。当信息安全检测设备90运行时,处理器901与存储器902之间通信,处理器901调用存储器902中的执行指令,用以执行上述IDC信息安全管理的方法实施例二及四中的操作。FIG. 9 is a schematic structural diagram of Embodiment 2 of the information security detection device of the present invention. As shown in FIG. 9 , the information security detection device 90 provided in this embodiment may include a processor 901 and a memory 902 . The information security detection device 90 may also include a data interface unit 903 , and the data interface unit 903 may be connected to the processor 901 . Wherein, the data interface unit 903 is used to receive/send data, and the memory 902 is used to store execution instructions. When the information security detection device 90 is running, the processor 901 communicates with the memory 902, and the processor 901 invokes the execution instructions in the memory 902 to execute the operations in Embodiments 2 and 4 of the above-mentioned IDC information security management method.
本实施例的信息安全检测设备,可以用于执行本发明上述IDC信息安全管理的方法实施例二及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The information security detection device of this embodiment can be used to implement the technical solutions in the second and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图10为本发明深度包检测DPI设备实施例一的结构示意图,如图10所示,本实施例提供的深度包检测DPI设备100可以包括:判断模块1001以及上报模块1002。FIG. 10 is a schematic structural diagram of Embodiment 1 of the deep packet inspection DPI device of the present invention. As shown in FIG. 10 , the deep packet inspection DPI device 100 provided in this embodiment may include: a judging module 1001 and a reporting module 1002 .
判断模块1001用于判断用户访问的上下行是否都经过所述DPI设备,若否,则将所述用户访问对应的访问日志中增加待补偿标识,其中,包含所述待补偿标识的访问日志为待补偿的日志,所述待补偿标识用于指示所述待补偿的访问日志对应的用户访问所产生的信息安全日志需要做统一资源定位符URL补偿;The judging module 1001 is used to judge whether the uplink and downlink of the user's access pass through the DPI device, if not, add the identifier to be compensated in the access log corresponding to the user's access, wherein the access log containing the identifier to be compensated is The log to be compensated, the identifier to be compensated is used to indicate that the information security log generated by the user access corresponding to the access log to be compensated needs to be compensated for the uniform resource locator URL;
上报模块1002用于将所述待补偿的访问日志上报给日志合成服务器,以使所述日志合成服务器根据所述待补偿的访问日志对缺失URL的信息安全日志进行补偿。The reporting module 1002 is configured to report the access log to be compensated to the log synthesis server, so that the log synthesis server can compensate the information security log of the missing URL according to the access log to be compensated.
可选地,所述上报模块还具体用于:通过哈希算法确保将相同用户访问的访问日志上报给同一日志合成服务器。Optionally, the reporting module is further specifically configured to: use a hash algorithm to ensure that the access logs accessed by the same user are reported to the same log synthesis server.
本实施例的深度包检测DPI设备,可以用于执行本发明上述IDC信息安全管理的方法实施例三及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The deep packet inspection DPI device of this embodiment can be used to implement the technical solutions in the third and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图11为本发明深度包检测DPI设备实施例二的结构示意图,如图11所示,本实施例提供的深度包检测DPI设备110可以包括处理器1101和存储器1102。深度包检测DPI设备110还可以包括数据接口单元1103,该数据接口单元1103可以和处理器1101相连。其中,数据接口单元1103用于接收/发送数据,存储器1102用于存储执行指令。当深度包检测DPI设备110运行时,处理器1101与存储器1102之间通信,处理器1101调用存储器1102中的执行指令,用以执行上述IDC信息安全管理的方法实施例三及四中的操作。FIG. 11 is a schematic structural diagram of Embodiment 2 of the deep packet inspection DPI device of the present invention. As shown in FIG. 11 , the deep packet inspection DPI device 110 provided in this embodiment may include a processor 1101 and a memory 1102 . The deep packet inspection DPI device 110 may further include a data interface unit 1103 , and the data interface unit 1103 may be connected to the processor 1101 . Wherein, the data interface unit 1103 is used to receive/send data, and the memory 1102 is used to store execution instructions. When the deep packet inspection DPI device 110 is running, the processor 1101 communicates with the memory 1102, and the processor 1101 invokes the execution instructions in the memory 1102 to execute the operations in the third and fourth embodiments of the above-mentioned IDC information security management method.
本实施例的深度包检测DPI设备,可以用于执行本发明上述IDC信息安全管理的方法实施例三及四中的技术方案,其实现原理和技术效果类似,此处不再赘述。The deep packet inspection DPI device of this embodiment can be used to implement the technical solutions in the third and fourth embodiments of the method for IDC information security management of the present invention, and its implementation principle and technical effect are similar, and will not be repeated here.
图12为本发明互联网数据中心IDC信息安全管理系统实施例的结构示意图,如图12所示,本实施例的IDC信息安全管理系统包括:日志合成服务器1201、信息安全检测设备1202、深度包检测DPI设备1203以及路由设备1204;其中,日志合成服务器1201可以采用上述日志合成服务器实施例一及实施例二的结构,其对应地,可以执行上述IDC信息安全管理的方法实施例一及实施例四的技术方案;信息安全检测设备1202可以采用上述信息安全检测设备实施例一及实施例二的结构,其对应地,可以执行上述IDC信息安全管理的方法实施例二及实施例四的技术方案;深度包检测DPI设备1203可以采用上述深度包检测DPI设备实施例一及实施例二的结构,其对应地,可以执行上述IDC信息安全管理的方法实施例三及实施例四的技术方案,其实现原理和技术效果类似,此处不再赘述。Figure 12 is a schematic structural diagram of an embodiment of the Internet data center IDC information security management system of the present invention, as shown in Figure 12, the IDC information security management system of this embodiment includes: a log synthesis server 1201, an information security detection device 1202, and a deep packet detection The DPI device 1203 and the routing device 1204; wherein, the log synthesis server 1201 can adopt the structure of the above-mentioned log synthesis server embodiment 1 and embodiment 2, and correspondingly, can execute the method embodiment 1 and embodiment 4 of the above-mentioned IDC information security management technical solution; the information security detection device 1202 can adopt the structures of the first and second embodiments of the above-mentioned information security detection device, and correspondingly, can execute the technical solutions of the second and fourth embodiments of the method for IDC information security management; The deep packet inspection DPI device 1203 can adopt the structure of the above-mentioned deep packet inspection DPI device embodiment 1 and embodiment 2, and correspondingly, can implement the technical solutions of the above-mentioned IDC information security management method embodiment 3 and embodiment 4, and its realization The principles and technical effects are similar and will not be repeated here.
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps for implementing the above method embodiments can be completed by program instructions and related hardware. The aforementioned program can be stored in a computer-readable storage medium. When the program is executed, it executes the steps including the above-mentioned method embodiments; and the aforementioned storage medium includes: ROM, RAM, magnetic disk or optical disk and other various media that can store program codes.
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present invention, rather than limiting them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: It is still possible to modify the technical solutions described in the foregoing embodiments, or perform equivalent replacements for some or all of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the technical solutions of the various embodiments of the present invention. scope.
Claims (33)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410843504.XA CN105812324B (en) | 2014-12-30 | 2014-12-30 | The method, apparatus and system of IDC information security management |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410843504.XA CN105812324B (en) | 2014-12-30 | 2014-12-30 | The method, apparatus and system of IDC information security management |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105812324A true CN105812324A (en) | 2016-07-27 |
| CN105812324B CN105812324B (en) | 2019-04-05 |
Family
ID=56421096
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410843504.XA Active CN105812324B (en) | 2014-12-30 | 2014-12-30 | The method, apparatus and system of IDC information security management |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105812324B (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108683598A (en) * | 2018-04-20 | 2018-10-19 | 武汉绿色网络信息服务有限责任公司 | A kind of asymmetrical network flow processing method and processing unit |
| CN109995602A (en) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团设计院有限公司 | A method, system and device for protocol identification |
| CN110417759A (en) * | 2019-07-16 | 2019-11-05 | 广东申立信息工程股份有限公司 | A kind of method of IDC information security management |
| CN112217770A (en) * | 2019-07-11 | 2021-01-12 | 奇安信科技集团股份有限公司 | A security detection method, device, computer equipment and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1403847A (en) * | 2001-08-31 | 2003-03-19 | 三星电子株式会社 | Projector equipment |
| CN103178982A (en) * | 2011-12-23 | 2013-06-26 | 阿里巴巴集团控股有限公司 | Method and device for analyzing log |
| US20130238473A1 (en) * | 2012-03-06 | 2013-09-12 | Jerry Fan | Systems and Methods for Billing Content Providers for Designated Content Delivered Over a Data Network |
| CN104156389A (en) * | 2014-07-04 | 2014-11-19 | 重庆邮电大学 | Deep packet detecting system and method based on Hadoop platform |
-
2014
- 2014-12-30 CN CN201410843504.XA patent/CN105812324B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1403847A (en) * | 2001-08-31 | 2003-03-19 | 三星电子株式会社 | Projector equipment |
| CN103178982A (en) * | 2011-12-23 | 2013-06-26 | 阿里巴巴集团控股有限公司 | Method and device for analyzing log |
| US20130238473A1 (en) * | 2012-03-06 | 2013-09-12 | Jerry Fan | Systems and Methods for Billing Content Providers for Designated Content Delivered Over a Data Network |
| CN104156389A (en) * | 2014-07-04 | 2014-11-19 | 重庆邮电大学 | Deep packet detecting system and method based on Hadoop platform |
Non-Patent Citations (1)
| Title |
|---|
| 顾欣,那业君等: "《IDC信息安全管理系统建设方案探讨》", 《互联网天地》 * |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109995602A (en) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团设计院有限公司 | A method, system and device for protocol identification |
| CN109995602B (en) * | 2017-12-29 | 2021-03-16 | 中国移动通信集团设计院有限公司 | A method, system and device for protocol identification |
| CN108683598A (en) * | 2018-04-20 | 2018-10-19 | 武汉绿色网络信息服务有限责任公司 | A kind of asymmetrical network flow processing method and processing unit |
| CN112217770A (en) * | 2019-07-11 | 2021-01-12 | 奇安信科技集团股份有限公司 | A security detection method, device, computer equipment and storage medium |
| CN112217770B (en) * | 2019-07-11 | 2023-10-13 | 奇安信科技集团股份有限公司 | Security detection method, security detection device, computer equipment and storage medium |
| CN110417759A (en) * | 2019-07-16 | 2019-11-05 | 广东申立信息工程股份有限公司 | A kind of method of IDC information security management |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105812324B (en) | 2019-04-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11050786B2 (en) | Coordinated detection and differentiation of denial of service attacks | |
| US7899849B2 (en) | Distributed security provisioning | |
| CN103209174B (en) | A kind of data prevention method, Apparatus and system | |
| CN106534051B (en) | Processing method and device for access request | |
| US8365259B2 (en) | Security message processing | |
| US8904524B1 (en) | Detection of fast flux networks | |
| CN103179132B (en) | A kind of method and device detecting and defend CC attack | |
| CN103609070B (en) | Network flow detection method, system, equipment and controller | |
| US8990938B2 (en) | Analyzing response traffic to detect a malicious source | |
| CN106550056B (en) | A kind of domain name analytic method and device | |
| US8713674B1 (en) | Systems and methods for excluding undesirable network transactions | |
| WO2018121331A1 (en) | Attack request determination method, apparatus and server | |
| KR20110089179A (en) | Network Intrusion Prevention | |
| US8055767B1 (en) | Proxy communication string data | |
| CN103957201A (en) | Method, device and system for processing domain name information based on DNS | |
| WO2014000303A1 (en) | Method for receiving message, and deep packet inspection device and system | |
| CN111726364A (en) | A host intrusion prevention method, system and related device | |
| CN107528812B (en) | An attack detection method and device | |
| CN105141573A (en) | Security protection method and security protection system based on WEB access compliance auditing | |
| CN105812324A (en) | Method, device and system for IDC information safety management | |
| CN102882880A (en) | Detection method and detection system of distributed denial of service (DDoS) attack aiming at domain name server (DNS) service | |
| HK1204728A1 (en) | System and method for generating blacklist of requests to access from network | |
| CN107623916A (en) | A method and device for monitoring WiFi network security | |
| TWI634769B (en) | Method for detecting domain name transformation botnet through proxy server log | |
| CN107147731A (en) | A method and system for actively measuring BT network node information |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |