This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2022-119406, filed on Jul. 27, 2022, the entire contents of which are incorporated herein by reference.
The embodiment discussed herein is related to a non-transitory computer-readable recording medium storing an attack situation output program, an attack situation output device, and an attack situation output system.
With development of computers and telecommunication networks, use of data communication has spread dramatically. Not only companies but also ordinary individuals are increasingly using the Internet to download various types of information and set up their own web pages to transmit information.
In recent years, some malicious persons spread computer viruses, unauthorizedly access computers to steal personal information and confidential information, or attack specific servers to disable use thereof. As a device for preventing unauthorized access, in addition to a firewall computer, an intrusion detection system (IDS) that monitors data flowing through an internal network and detects unauthorized access is known.
The intrusion detection system (IDS) is a device that monitors packets flowing in a network, gives an alert when a packet having a possibility of unauthorized access is found, and collects and stores the communication record. The intrusion detection system may detect a Denial of Services (Dos) attack and a Distributed Denial of Service (DDos) attack. Furthermore, as a method of detecting unauthorized access by the IDS, “signature”-based intrusion detection is known. In this method, an intrusion is detected by performing matching with a pattern of a way of intrusion called a signature registered in advance.
Furthermore, recently, an anomaly terminal detection technology is known as a technology that detects an abnormal terminal (suspicious terminal) by using an alert (including erroneous detection) detected by an IDS. In this technology, alerts are collected in units of transmission source terminals, and an abnormal terminal is detected by unsupervised training on the premise that many of the terminals are normal terminals.
International Publication Pamphlet No. WO 2021/038870, Japanese Laid-open Patent Publication No. 2010-55566, U.S. Patent Application Publication No. 2016/0359891, and U.S. Patent Application Publication No. 2017/0323102 are disclosed as related art.
According to an aspect of the embodiments, a non-transitory computer-readable recording medium storing an attack situation output program for causing a computer to execute a process, the process includes extracting, from information regarding communication that includes a threat level of an attack, information regarding first communication in which the threat level satisfies a first condition, executing anomaly detection processing that detects a suspicious terminal by using the information regarding the first communication of each terminal, and outputting information regarding a first terminal detected as the suspicious terminal by the anomaly detection processing and information regarding content of an attack that corresponds to the first condition, in association with each other.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention.
Since threat levels are set in signatures used in an IDS, the threat levels are also associated with alerts detected in the IDS. Therefore, in a case where abnormal terminals are detected as anomalies by using the alerts detected in the IDS, it is possible to improve accuracy of the anomaly detection by selecting the alerts based on the threat levels.
However, even when information regarding the abnormal terminals is output as a result of the anomaly detection, it is unclear what kind of attack each abnormal terminal is performing. Therefore, it is difficult for an administrator or the like to determine which terminal needs to be preferentially handled among the abnormal terminals.
Hereinafter, embodiments of techniques capable of outputting information by which a terminal that needs to be preferentially handled may be determined will be described with reference to the drawings.
An embodiment of an attack situation output system will be described in detail with reference to
The user terminal 70 is an information processing device such as a computer terminal, and has a function of accessing the network 80 (a function of transmitting and receiving information via the network 80).
The IDS terminal 20 is an information processing device (such as a workstation or a server) or a network appliance device. The IDS terminal 20 monitors all packets flowing through the network 80, and alerts communication matching a detection rule (signature) as suspicious communication having a possibility of an attack activity. Here, Snort, Suricata, and the like are known as open source software (OSS) of an IDS. An IDS alert has a data structure as illustrated in
The attack situation output device 30 is an information processing device (a workstation, a server, or the like) installed in a center that manages a situation regarding security of the user terminals 70. The attack situation output device 30 acquires and analyzes the IDS alert group (
Here, the IDS alerts transmitted from the IDS terminal 20 include business communication (erroneous detection) matching the signature. This is because operations frequently performed in business are also used in attack activities. Thus, the attack situation output device 30 of the present embodiment executes “anomaly detection” as an approach for extracting a particularly suspicious one from a huge number of IDS alerts.
The IDS alert extraction unit 40 extracts, based on a filter condition (first condition), a part or all of IDS alerts (IDS alert group acquired from the IDS terminal 20) stored in an IDS alert database (DB) 50 (information regarding first communication). Furthermore, the IDS alert extraction unit 40 executes processing of collecting the extracted IDS alerts for each user terminal 70 as a transmission source (for each SrcIP). Note that the filter condition (also referred to as an extraction condition) in the present embodiment changes an extraction range (lower limit value) stepwise such as the threat level of “3” or more, “2” or more, and “1” or more. However, the present disclosure is not limited to this, and there is a filter condition (extraction condition) that changes an extraction range (upper limit value) stepwise such as the threat level of “1” or less, “2” or less, and “3” or less. Furthermore, there is a filter condition (extraction condition) that changes an extraction range stepwise such as the threat level of “1” only, “2” only, and “3” only. The administrator may set in advance which filter condition to use.
The anomaly detection unit 42 executes anomaly detection by using IDS alerts (group) collected for each user terminal 70 (SrcIP) as a transmission source. The anomaly detection is also referred to as anomaly detection, abnormality detection, Anomaly Detection, or the like, and is machine learning classified as “unsupervised training” that detects abnormal data based on the premise that most of the entire given data is normal.
Here, as an example, it is assumed that an IDS alert group as illustrated in
On the other hand, it is assumed that, in a case where IDS alerts are extracted under a condition of the threat level (Priority) “3” or more as illustrated in
Note that the examples of
From the above, in the anomaly detection, it is considered that there is a possibility that an abnormal terminal may not be detected or an attack may be overlooked unless the extraction condition of the IDS alert is appropriately set. Furthermore, even when the extraction condition is changed stepwise and the anomaly detection is performed a plurality of times, it is considered that it is not possible to know which terminal needs to be preferentially handled by simply outputting results of the anomaly detection performed a plurality of times.
Thus, in the present embodiment, the detection result analysis unit 44 analyzes an attack situation of each user terminal 70 by using a result of executing the anomaly detection while changing the extraction condition stepwise. Here, in a case where the IDS alert is an attack, the detection result analysis unit 44 analyzes the attack situation by using a property that an attack progress stage may be estimated based on content of the threat level.
As described above, the threat level is often determined by “magnitude of authority needed for the operation (for example, high risk because the operation may only be executed with authority of the administrator).
On the other hand, a targeted attack progresses in a way that allows an attacker to increase the attacker's ability (increases authority) in an organization to be attacked for the purpose of “information theft” or “destruction”.
For example,
Note that, in a case where an alert is business (in the case of erroneous detection), it may be analyzed that there is a high possibility that the user terminal 70 in which the alert having the high threat level is generated is an important business terminal performing an operation with large authority.
For example, the IDS alert extraction unit 40 sets the extraction condition to the threat level “3” or more and extracts IDS alerts, and the anomaly detection unit 42 collects the extracted IDS alerts in units of the user terminals 70 and executes anomaly detection. Next, the IDS alert extraction unit sets the extraction condition to the threat level “2” or more and extracts IDS alerts, and the anomaly detection unit 42 collects the extracted IDS alerts in units of the user terminals 70 and executes anomaly detection. Moreover, the IDS alert extraction unit 40 sets the extraction condition to the threat level “1” or more and extracts IDS alerts, and the anomaly detection unit 42 collects the extracted IDS alerts in units of the user terminals 70 and executes anomaly detection. It is assumed that, as a result of the series of anomaly detection, a result as illustrated in
The detection result analysis unit 44 analyzes the situation of the attack (“threat level of the alert related to the attack” and “threat level of the alert related to business of the latent terminal”) by using the result of
Furthermore, for example, in a case where a result as illustrated in
Note that the detection result analysis unit 44 actually executes the analysis by using attack situation determination conditions as illustrated in FIG. Details of the attack situation determination conditions of
Returning to
[Processing of Attack Situation Output Device 30]
Next, processing of the attack situation output device 30 will be described in detail along a flowchart of
When the processing of
Next, in operation S12, the IDS alert extraction unit 40 extracts IDS alerts having a threat level n or more (here, 3 or more) from the IDS alert DB Here, the IDS alert extraction unit 40 also executes processing of collecting the extracted IDS alerts in units of the user terminals 70.
Next, in operation S14, the anomaly detection unit 42 executes anomaly detection on the extracted IDS alerts.
Next, in operation S16, the anomaly detection unit 42 records a result of the anomaly detection in intermediate data. Here, it is assumed that the intermediate data is data as illustrated in
Next, in operation S18, the IDS alert extraction unit 40 determines whether or not a value of the parameter n is 1. In a case where the determination is negative, the processing proceeds to operation S20, and the IDS alert extraction unit 40 decrements the parameter n by 1 (n=n−1). Thereafter, the processing returns to operation S12, and the processing and determination of operations S12 to S18 and S20 are executed in the state of n=2 (extraction condition is the threat level 2 or more). Moreover, in the state of n=1 (extraction condition is the threat level 1 or more), the processing and determination of operations S12 to S18 are executed. That is, the extraction of the IDS alerts and the anomaly detection are executed while changing the extraction condition so as to be loosened stepwise. Thereafter, when the determination in operation S18 is positive, the processing proceeds to operation S22.
When the processing proceeds to operation S22, the detection result analysis unit 44 analyzes an attack situation of each user terminal 70 from the intermediate data and the attack situation determination conditions. Specifically, the detection result analysis unit 44 analyzes the attack situation by comparing the intermediate data of
For example, in the case of the terminal with the IP address “10.10.10.10” of the intermediate data of
Furthermore, in the case of the terminal with the IP address “10.200.10.2” of the intermediate data of
Furthermore, in the case of the terminal with the IP address “10.200.10.3” of the intermediate data of
Furthermore, in the case of “10.200.10.4” of the intermediate data of
Moreover, in the case of “10.200.10.5” of the intermediate data of
Returning to
Furthermore, the result output unit 46 specifies an “importance level of the latent terminal (high/middle/low)” from the “threat level of the alert related to business of the latent terminal” of each user terminal 70 based on the table of
With the above processing, the entire processing of
As may be seen from the above description, in the present embodiment, the detection result analysis unit 44 and the result output unit 46 implement a function as an output unit that outputs information regarding a terminal determined to be an abnormal terminal and information regarding content of an attack in association with each other.
As described above in detail, according to the present embodiment, the IDS terminal 20 monitors communication and detects communication classified into any one of threat levels of a plurality of attacks according to a detection condition (signature). That is, the IDS terminal 20 detects information regarding communication including a threat level of an attack. Furthermore, in the attack situation output device 30, the IDS alert extraction unit 40 extracts IDS alerts satisfying a certain extraction condition from the IDS alert DB 50 (S12). Furthermore, the anomaly detection unit 42 executes anomaly detection that detects an abnormal terminal (anomaly terminal) by using the extracted IDS alerts of the respective user terminals 70 (S14). Then, the detection result analysis unit 44 and the result output unit 46 output information (IP address) regarding the abnormal terminal and information regarding content of the attack corresponding to an extraction condition when it is detected as the abnormal terminal in association with each other (S22 and S24, and
Furthermore, in the present embodiment, the processing of extracting the IDS alerts (S12) and the processing of performing the anomaly detection (S14) are executed a plurality of times by changing extraction conditions used by the IDS alert extraction unit 40. Furthermore, the detection result analysis unit 44 and the result output unit 46 output information (IP address) regarding the user terminal 70 detected at least once as an abnormal terminal and information regarding the content of the attack corresponding to results of the anomaly detection performed a plurality of times in association with each other. With this configuration, the detailed information regarding the content of the attack corresponding to the results of the anomaly detection performed a plurality of times may be provided to the administrator. Furthermore, according to the present embodiment, the administrator does not need to manually change the extraction condition, and may obtain appropriate information from an IDS alert group obtained from the IDS terminal 20.
Furthermore, in the present embodiment, the processing of extracting the IDS alerts (S12) and the processing of performing the anomaly detection (S14) are executed a plurality of times by changing the extraction conditions used by the IDS alert extraction unit 40 stepwise so as to be loosened. Furthermore, the detection result analysis unit 44 and the result output unit 46 determine information to be output based on whether an abnormal terminal has been detected before and after changing the extraction conditions (TRUE/FALSE) and whether the number of extracted IDS alerts has changed (present/absent) (see
Note that, in the embodiment described above, the case has been described where the detection result analysis unit 44 performs the analysis as illustrated in
[First Modification]
In the embodiment described above, the case has been described where the IDS alert extraction unit 40 changes the extraction condition stepwise such as the threat level of “3” or more, “2” or more, and “1” or more. According to this method, it is possible to perform analysis focusing on an alert having a high threat level. However, the present disclosure is not limited to this, and for example, the IDS alert extraction unit 40 may change the extraction condition stepwise such as the threat level of “1” or less, “2” or less, and “3” or less. According to this method, it is possible to perform analysis focusing on an alert having a low threat level.
In
Specifically, in operation S10′ of
Next, in operation S12′, the IDS alert extraction unit 40 extracts IDS alerts having a threat level n or less from the IDS alert DB 50. Furthermore, the IDS alert extraction unit 40 also executes processing of collecting the extracted IDS alerts in units of the user terminals 70. Thereafter, operations S14 and S16 are executed in a similar manner to those in the embodiment described above.
Then, when the processing proceeds to operation S18′, the IDS alert extraction unit 40 determines whether or not a value of the parameter n is 3. In a case where the determination is negative, the processing proceeds to operation S20′, and the IDS alert extraction unit 40 increments the parameter n by 1 (n=n+1). Thereafter, the processing returns to operation S12′.
Note that the processing in operations S22 and S24 is similar to that in the embodiment described above. That is, the detection result analysis unit 44 obtains an analysis result similar to that of
As described above, in the present first modification, the upper limit value of the threat level is changed stepwise as the extraction condition of the IDS alerts. Also in this way, effects similar to those of the embodiment described above may be obtained.
[Second Modification]
Note that, in the embodiment and the first modification described above, the case has been described where the lower limit value or the upper limit value of the extraction condition is changed stepwise. However, the present disclosure is not limited to this. For example, the IDS alert extraction unit 40 may change the threat level of an object to be extracted stepwise such as only “1”, only “2”, and only “3”. That is, the extraction condition may be changed stepwise so as not to overlap. According to this method, it is possible to perform analysis focusing on individual threat levels.
In
Note that, in
Note that, in the embodiment and the modifications described above, the extraction condition is changed stepwise to execute the extraction of the alerts and the anomaly detection, and the information regarding the content of the attack corresponding to the extraction condition when the user terminal is determined to be an abnormal terminal is output in association with the information regarding the user terminal 70. However, the present disclosure is not limited to this, and the alerts may be extracted by using one extraction condition (first condition) to execute the anomaly detection, and the information regarding the content of the attack corresponding to the extraction condition may be output in association with the information regarding the user terminal 70. Also in this way, it is possible to output information by which a terminal that needs to be preferentially handled may be determined.
Note that the processing functions described above may be implemented by a computer. In that case, a program in which processing content of functions that a processing device needs to have is described is provided. The program is executed in the computer, whereby the processing functions described above are implemented in the computer. The program in which the processing content is described may be recorded in a computer-readable storage medium (note that a carrier wave is excluded).
In the case of distributing the program, for example, the program is sold in a form of a portable storage medium such as a digital versatile disc (DVD) or a compact disc read only memory (CD-ROM) in which the program is recorded. Furthermore, it is also possible to store the program in a storage device of a server computer, and transfer the program from the server computer to another computer via a network.
The computer that executes the program stores, for example, the program recorded in the portable storage medium or the program transferred from the server computer in a storage device of its own. Then, the computer reads the program from the storage device of its own, and executes processing according to the program. Note that the computer may also read the program directly from the portable storage medium and execute the processing according to the program. Furthermore, the computer may also sequentially execute the processing according to the received program each time the program is transferred from the server computer.
The embodiment described above is a preferred example of the present disclosure. However, the present disclosure is not limited to this, and various modifications may be made in a range without departing from the scope of the present disclosure.
All examples and conditional language provided herein are intended for the pedagogical purposes of aiding the reader in understanding the invention and the concepts contributed by the inventor to further the art, and are not to be construed as limitations to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although one or more embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2022-119406 | Jul 2022 | JP | national |