当前位置:网站首页>The essence of attack and defense strategy behind the noun of network security
The essence of attack and defense strategy behind the noun of network security
2022-07-26 09:03:00 【Domestic giant panda】
I think the attack and defense confrontation of network security is a confrontation on the cross coordinate
1) The attacker is concerned about source -> sink In the process of data flow , Whether there is an opportunity to attack , When attacking bypass The point is sanitize Is it tight enough
2) The corresponding protective personnel need to build protective measures at multiple levels , Whether it's the network layer 、 application layer 、 The host layer is erected tightly enough sanitize

3) As shown in the figure above , If we take blue in the figure as the coordinate system , Red 1 2 3 Think of it as three functions , The grey content is regarded as the dangerous threshold of function input
3.1) The danger threshold of function input parameter exceeds the green line , Then the safety personnel should receive the alarm , If the danger threshold exceeds the red line, the function call should be blocked directly
3.2) The order of function calls ( for example 1 2 3 Is a common buffer overflow attack chain ), Alarm or intercept if certain rules are met
3.3) Function input parameters and function order of function call ( for example 1 2 3 Is a common buffer overflow attack chain also The risk threshold of participation reaches the green line or even the red line ), Alarm or intercept if certain rules are met


summary : The security protection strategy is mainly aimed at the input parameter verification ( Ordinate )、 Logical chain check ( Abscissa ) And the double check of the input parameter combination logic chain ( Horizontal ordinate )
We bring this idea into practice :
4)edr、hids、 Why do products such as situational awareness say their names are different , But the essence is the same ? Because they use the same protection theory
4.1) The danger threshold of function input parameter reaches the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
4.2) The call order of the function has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
4.3) The input participating function call has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Refer to the following figure :

5) Further, let's take a look at application protection RASP product , The underlying logic is exactly the same
5.1) The danger threshold of function input parameters reaches a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Take part in the picture below , Use the blacklist to intercept the call input parameters :

5.2) The calling sequence of functions meets a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
5.3) The input participating function call has reached the threshold , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
Take part in the picture below , Verify the context logic and input parameters of the call stack :

6) As for the flow level, it is also completely consistent , But the real-time traffic is too high , It is difficult to do something similar to the application side 、 The host side can guarantee logical context verification , So at present, there is only one case basically covered by the flow side
6.1) The danger threshold of function input parameters reaches a certain standard , Corresponding to the implementation of a certain safety behavior ( Alarm or intercept )
7) Finally, let's talk about the so-called pseudo defense , Please look at the picture below first :

If you put XY Section formed by coordinates , As the coverage of a security policy .
Then the essence of pseudo defense is to compare and verify the integrity of each coverage using different logical implementation methods .
All network security protection is maintained : confidentiality 、 integrity 、 Usability
And the logic behind it can use one XYZ Coordinates explain , So please don't reinvent words , Please concentrate on improving the hard power of the industry .
Reference address :
https://mp.weixin.qq.com/s/cIJTyjusZbM5ndSTMjECUg
https://github.com/baidu/openrasp
Prohibited reproduced thank you
边栏推荐
- Study notes of automatic control principle --- stability analysis of control system
- Laravel框架日志文件存放在哪里?怎么用?
- Datawhale panda book has been published!
- My meeting of OA project (meeting seating & submission for approval)
- Advanced mathematics | Takeshi's "classic series" daily question train of thought and summary of error prone points
- Error: Cannot find module ‘umi‘ 问题处理
- Node-v download and application, ES6 module import and export
- Database operation skills 6
- Recurrence of SQL injection vulnerability in the foreground of a 60 terminal security management system
- Sklearn machine learning foundation (linear regression, under fitting, over fitting, ridge regression, model loading and saving)
猜你喜欢

CSDN TOP1“一个处女座的程序猿“如何通过写作成为百万粉丝博主?

The lessons of 2000. Web3 = the third industrial revolution?

Advanced mathematics | Takeshi's "classic series" daily question train of thought and summary of error prone points

redis原理和使用-基本特性

The idea shortcut key ALT realizes the whole column operation

数据库操作 题目一

分布式跟踪系统选型与实践

(1) CTS tradefed test framework environment construction

Innovus卡住,提示X Error:

CSDN Top1 "how does a Virgo procedural ape" become a blogger with millions of fans through writing?
随机推荐
Media at home and abroad publicize that we should strictly grasp the content
Two tips for pycharm to open multiple projects
Set of pl/sql -2
Node-v download and application, ES6 module import and export
My meeting of OA project (query)
[search topics] flood coverage of search questions after reading the inevitable meeting
Web overview and b/s architecture
QtCreator报错:You need to set an executable in the custom run configuration.
深度学习常用激活函数总结
合工大苍穹战队视觉组培训Day5——机器学习,图像识别项目
Pan micro e-cology8 foreground SQL injection POC
Web概述和B/S架构
Kotlin properties and fields
Center an element horizontally and vertically
【ARKit、RealityKit】把图片转为3D模型
[encryption weekly] has the encryption market recovered? The cold winter still hasn't thawed out. Take stock of the major events that occurred in the encryption market last week
Pytoch learning - from tensor to LR
布隆过滤器
ext3文件系统的一个目录下,无法创建子文件夹,但可以创建文件
2022流动式起重机司机考试题模拟考试题库模拟考试平台操作