当前位置:网站首页>The essence of attack and defense strategy behind the noun of network security
The essence of attack and defense strategy behind the noun of network security
2022-07-26 09:03:00 【Domestic giant panda】
I think the attack and defense confrontation of network security is a confrontation on the cross coordinate
1) The attacker is concerned about source -> sink In the process of data flow , Whether there is an opportunity to attack , When attacking bypass The point is sanitize Is it tight enough
2) The corresponding protective personnel need to build protective measures at multiple levels , Whether it's the network layer 、 application layer 、 The host layer is erected tightly enough sanitize
3) As shown in the figure above , If we take blue in the figure as the coordinate system , Red 1 2 3 Think of it as three functions , The grey content is regarded as the dangerous threshold of function input
3.1) The danger threshold of function input parameter exceeds the green line , Then the safety personnel should receive the alarm , If the danger threshold exceeds the red line, the function call should be blocked directly
3.2) The order of function calls ( for example 1 2 3 Is a common buffer overflow attack chain ), Alarm or intercept if certain rules are met
3.3) Function input parameters and function order of function call ( for example 1 2 3 Is a common buffer overflow attack chain also The risk threshold of participation reaches the green line or even the red line ), Alarm or intercept if certain rules are met
summary : The security protection strategy is mainly aimed at the input parameter verification ( Ordinate )、 Logical chain check ( Abscissa ) And the double check of the input parameter combination logic chain ( Horizontal ordinate )
We bring this idea into practice :
4)edr、hids、 Why do products such as situational awareness say their names are different , But the essence is the same ? Because they use the same protection theory
4.1) The danger threshold of function input parameter reaches the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
4.2) The call order of the function has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
4.3) The input participating function call has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Refer to the following figure :
5) Further, let's take a look at application protection RASP product , The underlying logic is exactly the same
5.1) The danger threshold of function input parameters reaches a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Take part in the picture below , Use the blacklist to intercept the call input parameters :
5.2) The calling sequence of functions meets a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
5.3) The input participating function call has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Take part in the picture below , Verify the context logic and input parameters of the call stack :
6) As for the flow level, it is also completely consistent , But the real-time traffic is too high , It is difficult to do something similar to the application side 、 The host side can guarantee logical context verification , So at present, there is only one case basically covered by the flow side
6.1) The danger threshold of function input parameters reaches a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
7) Finally, let's talk about the so-called pseudo defense , Please look at the picture below first :
If you put XY Section formed by coordinates , As the coverage of a security policy .
Then the essence of pseudo defense is to compare and verify the integrity of each coverage using different logical implementation methods .
All network security protection is maintained : confidentiality 、 integrity 、 Usability
And the logic behind it can use one XYZ Coordinates explain , So please don't reinvent words , Please concentrate on improving the hard power of the industry .
Reference address :
https://mp.weixin.qq.com/s/cIJTyjusZbM5ndSTMjECUg
https://github.com/baidu/openrasp
Prohibited reproduced thank you
边栏推荐
- 堆外内存的使用
- Day06 homework - skill question 7
- 220. Presence of repeating element III
- Study notes of automatic control principle -- correction and synthesis of automatic control system
- Vision Group Training Day5 - machine learning, image recognition project
- Two tips for pycharm to open multiple projects
- Pytoch learning - from tensor to LR
- Center an element horizontally and vertically
- 第6天总结&数据库作业
- 巴比特 | 元宇宙每日必读:元宇宙的未来是属于大型科技公司,还是属于分散的Web3世界?...
猜你喜欢
[eslint] Failed to load parser ‘@typescript-eslint/parser‘ declared in ‘package. json » eslint-confi
第6天总结&数据库作业
垂直搜索
Database operation skills 6
at、crontab
数据库操作技能7
Cat安装和使用
Nuxt - 项目打包部署及上线到服务器流程(SSR 服务端渲染)
ES6 modular import and export) (realize page nesting)
03 exception handling, state keeping, request hook -- 04 large project structure and blueprint
随机推荐
Ueditot_ JSP SSRF vulnerability recurrence
Overview of motion recognition evaluation
Horizontal comparison of the data of the top ten blue chip NFTs in the past half year
QtCreator报错:You need to set an executable in the custom run configuration.
[eslint] Failed to load parser ‘@typescript-eslint/parser‘ declared in ‘package. json » eslint-confi
高数 | 武爷『经典系列』每日一题思路及易错点总结
unity简易消息机制
tcp 解决short write问题
【final关键字的使用】
03 exception handling, state keeping, request hook -- 04 large project structure and blueprint
day06 作业---技能题7
Learning notes of automatic control principle --- linear discrete system
What are the differences in the performance of different usages such as count (*), count (primary key ID), count (field) and count (1)? That's more efficient
力扣——二叉树剪枝
HBuilderX 运行微信开发者工具 “Fail to open IDE“报错解决
Okaleido launched the fusion mining mode, which is the only way for Oka to verify the current output
数据库操作 题目二
Typescript snowflake primary key generator
Nuxt - 项目打包部署及上线到服务器流程(SSR 服务端渲染)
[recommended collection] MySQL 30000 word essence summary index (II) [easy to understand]