The present invention relates to a technology for promptly cleansing malware from a terminal device.
The malware collectively refers to malicious and harmful software or malicious and harmful codes such as computer viruses, computer worms, back doors, keyloggers, spywares, and Trojan Horses, which have been generated with an intention of performing a wrongful and harmful operation.
Conventionally, as a technology of coping with the malware, which is a malicious program, a technology of automatically applying an update patch or anti-virus countermeasure software has been commonly introduced. The update patch (being a module for fixing a bug of a program) takes care of vulnerability of an operating system or software which may be abused by the malware.
As shown in Patent Document 1, for example, a system (generally referred to as a quarantine system) for maintaining the software and the anti-virus countermeasure software in a most recent state is devised. This system is devised so as to have a terminal connected to a network be highly immune to the malware.
A method of performing a quarantine process on a user terminal device is devised (in Patent Document 2, for example). In this method, a gateway apparatus installed at a connecting point (an exchange station) to the Internet and connected to the user terminal device detects whether or not the user terminal device is infected with the malware. When the infection is detected, the gateway apparatus disconnects the user terminal device from the Internet, and connects the user terminal device to a restoration support device (installed within the exchange station) by a VPN (Virtual Private Network) to perform the quarantine process on the user terminal device.
According to Patent Document 2, even when monitoring means such as the anti-virus countermeasure software is not provided on the user terminal device, infection of the terminal device with the malware is detected by a communication pattern transmitted from the user terminal, and the malware is thereby cleansed by the quarantine process.
In addition, restoration support audio service using an IP (Internet Protocol) telephone can be received. Thus, even when a user of the terminal device does not have particular knowledge about the malware, flowing of harmful communication (communication infected with the malware or denial of service attack communication) to the Internet from the terminal device infected with the malware is prevented. In addition, the malware may be cleansed from the user terminal device.
[Patent Document 1] JP-2007-299342A
[Patent Document 2] JP-2007-102697A
In the conventional quarantine systems (in Patent Documents 1 and 2), since security measures for the terminal device connected to the network are maintained in the most recent state, the terminal device is highly immune to malware infection and the malware is cleansed when the terminal device infected with the malware is detected. However, there is a problem that a zero-day attack (attack where adequate countermeasure means is not established) and unknown malware cannot be coped with.
The present invention mainly aims to solve the above-mentioned problems. A main object of the present invention is to implement a configuration in which analysis for cleansing the malware from the terminal device may be promptly performed when a terminal device is highly likely to be infected with malware.
An infection inspection system according to the present invention is an infection inspection system that performs inspection of a terminal device that may be infected with malware. The system may include:
an inspection reference information management unit that stores inspection reference information indicating software properly installed to the terminal device as proper software; and
an inspection execution unit that detects software which is present in the terminal device and inspects whether or not the detected software in the terminal device coincides with the proper software indicated by the inspection reference information stored in the inspection reference information management unit.
In the present invention, it is inspected whether or not the proper software properly installed to one terminal device coincides with the software detected from another terminal device.
For this reason, software that does not coincide with the proper software is extracted from the another terminal device infected with the malware. It is highly likely that the extracted software is associated with the malware. Then, by performing analysis of the extracted software, the malware may be promptly identified.
In first to fourth embodiments, a description will be directed to an infection inspection system capable of promptly performing analysis when a malware main program is removed from a terminal device.
More specifically, in the infection inspection system, software that is properly installed to the terminal device and a setting according to which the software normally operates are held as inspection reference information. When a traffic abnormality occurs inside an enterprise, software that is present in a terminal device that has caused abnormal traffic is detected, and contents of the detected software and the inspection reference information are compared. Besides, a setting of the terminal device that has caused the abnormal traffic is detected, and contents of the detected setting and the inspection reference information are compared.
Then, when software or a setting that is not included in the inspection reference information is found, the software or the setting is highly likely to be associated with malware. Accordingly, by continuing the analysis focusing on the software or the setting, the malware may be promptly cleansed.
In the first to fourth embodiments, a description will be given using an enterprise's internal network as an example. The system according to this embodiment may be applied to an internal network of a public office or a predetermined organization as well.
Referring to
The enterprise's internal network 101 includes a router apparatus 121, switch devices 122 to 124, and a communication cable that connects the router apparatus 121 and the switch devices 122 to 124.
Each of the router apparatus 121 and the switch devices 122 to 124 periodically generates traffic information.
The traffic information will be described later.
Terminal devices 141 to 146 are connected to the switch device 122 to 124. Each of the terminal devices 141 to 146 is used by a user in the enterprise for business. Each of the terminal devices 141 to 146 accesses another terminal devices or accesses an external network (Internet, a node-to-node connection network, or the like) through the router apparatus 121 and a corresponding one of the switch device 122 to 124. Basic configurations of the terminal devices 141 to 146 are assumed to be managed by the system manager of the enterprise's internal network 101.
The user additionally installs necessary software to each of the terminal devices 141 to 146 according to content of business.
The same assumption as described above is established in a thin client environment as well.
It is also assumed that an update patch (module for fixing a bug of a program) determined to be necessary by the system manager of the enterprise's internal network 101 is managed by patch management means (update management system) not shown in
Each of the terminal devices 141 to 146 may possibly be infected with malware.
An abnormality detection apparatus 131 monitors a behavior of traffic that flows through the enterprise's internal network 101, and detects occurrence of abnormal traffic.
The abnormality detection apparatus 131 is an example of an abnormality detection unit in the infection inspection system.
The behavior of traffic is defined as a time-series characteristic variation of a value obtained by aggregating the traffic information collected from each of the apparatus and the devices (router apparatus and switch devices) that constitute the enterprise's internal network 101.
As a method of aggregating the traffic information, aggregation of the number of generation of data per unit time or a data transfer amount per unit time without setting any condition may be considered. Alternatively one can conceive of aggregating the number of data per unit time or a data transfer amount per unit time, corresponding to any one of, or any combination of a source IP address, a destination IP address, a transmission source port number, and a destination port number. The traffic behavior indicates the time-series characteristic variation of the value obtained as a result of the aggregation as described above.
When a characteristic variation amount obtained by aggregating the traffic information exceeds a predetermined level, the abnormality detection apparatus 131 determines that a traffic abnormality has occurred.
For example, when the data transfer amount per unit time has abruptly increased in a given unit time, the abnormality detection unit 131 determines that the traffic abnormality has occurred.
The traffic information herein means packet dump data or flow statistic information for each packet transmitted from each terminal device.
The packet dump data is recorded data of the packet that has flown at a certain observation point on the network, without alteration.
Data communication by the terminal device is defined in terms of the concept of a flow, and the flow statistic information is recorded statistic information such as the number of transmitted packets, the number of received packets, a data transmitted byte amount, and a data received byte amount for each flow of communication performed by the terminal device.
Common examples of the flow statistic information are NetFlow, sFlow, or the like.
The packet dump data and the flow statistic information both include observation time information and information on the source IP address, the destination IP address, the transmission source port number, and the destination port number.
When each of the router apparatus 121 and the switch devices 122 to 124 included in the enterprise's internal network 101 does not include a function of generating the traffic information, a sensor dedicated to generating the traffic information may be disposed on the enterprise's internal network 101 to collect the traffic information.
An asset management ledger database apparatus 132 manages installed software including an operating system, for each of the terminal devices 141 to 146 connected to the enterprise's internal network 101.
Information that is managed by the asset management ledger database apparatus 132 includes at least the terminal device ID (host name and MAC address), user ID (user name, user specific number, telephone number, and e-mail address) and a type and a version of the software including the operating system installed in each of the terminal device.
A reference terminal device 134 is a terminal device that is arranged not to be infected with the malware.
The reference terminal device 134 is physically or logically disconnected from the switch devices 122 to 124 and the terminal devices 141 to 146 so as not to be infected with the malware.
All the software (operating system, middleware, applications, update patches, and the like) properly installed to the terminal devices 141 to 146 connected to the enterprise's internal network 101 is installed to the reference terminal device 134, and a setting for normally operating each software is set at the reference terminal device 134.
The software installed to the reference terminal device 134 will be hereinafter also referred to as proper software.
The setting set at the reference terminal device 134 will be hereinafter also referred to as normal setting.
The normal settings of the reference terminal device 134 include various settings such as hash values, variables, values, and parameters for the software installed to the respective terminal devices to normally operate.
The normal setting of the reference terminal device 134 are defined by the system manager.
As described above, the proper software is installed to the reference terminal device 134. The reference terminal device 134 holds the normal settings. The reference terminal device 134 is an example of a normal setting holding unit in the infection inspection system.
In a normal state not infected with the malware, one of the proper software installed to the reference terminal device 134 is installed to each of the terminal devices 141 to 146. The same settings as the normal settings of the reference terminal device 134 are set at each of the terminal devices 141 to 146.
A terminal whitelist generation apparatus 133 generates a list (whitelist) of information on software and setting that are allowed to be installed to the terminal device doubted to be infected with the malware, based on the information in the asset management ledger database apparatus 132.
The information (whitelist information) on the software and the setting allowed to be installed to each of the terminal devices 141 to 146, which provides basis for the whitelist, is generated and accumulated by the terminal whitelist generation apparatus 133, by referring to the reference terminal device 134.
The whitelist information is information indicating the setting (normal setting) for normally operating the proper software, for each proper software installed to the reference terminal device 134.
As described above, the whitelist information held by the terminal whitelist generation apparatus 133 is information indicating the proper software and the normal setting of the reference terminal device 134, and is an example of inspection reference information.
The terminal whitelist generation apparatus 133 selects the whitelist information corresponding to the software allowed to be installed to the terminal device doubted to be infected with the malware, and combines the selected whitelist information to generate the whitelist.
As described above, the whitelist is a collection of the selected whitelist information, and the whitelist is a collection of the inspection reference information that has been selected.
The terminal whitelist generation apparatus 133 is an example of an inspection reference information management unit in the infection inspection system.
The terminal whitelist generation apparatus 133 is an example of a first computer in an infection inspection method.
This embodiment focuses on a malware countermeasure process starting from detection of a traffic abnormality by the abnormality detection apparatus 131. Thus, no particular limitation is imposed on a method of implementing the abnormality detection apparatus 131 in this embodiment.
It is, however, assumed that the abnormality detection apparatus 131 includes at least a function of detecting a traffic abnormality and a function of identifying the IP address of the terminal device of an origin of the abnormal traffic.
The terminal device that has caused the abnormal traffic is the one that may have been infected with the malware, and is to be inspected using the whitelist.
Hereinafter, the terminal device that has caused the abnormal traffic, namely, the terminal device that may have been infected with the malware is also referred to as a malware infected terminal.
The malware infected terminal is to be inspected using the whitelist and is an example of a terminal device to be inspected.
In addition to the above-mentioned functions, the abnormality detection apparatus 131 may further include a function of identifying the MAC (Media Access Control) of the terminal device from the identified IP address, and at least one of functions to isolate the malware infected terminal from the enterprise's internal network 101 based on the IP address and the MAC address (the functions such as filtering of specific communication or linkdown of a connection port using the router apparatus or the switch device that forms the enterprise's internal network, and filtering using a personal firewall on the terminal).
Next, details of the terminal whitelist generation apparatus 133 will be described.
Referring to
As described above, the whitelist information is generated for each proper software of the reference terminal device 134.
A whitelist information management unit 202 includes a function of managing the whitelist information generated by the whitelist information generation unit 201.
The whitelist information management unit 202 stores the whitelist information generated by the whitelist information generation unit 201 in an information storage unit 205, for example, and reads one of the whitelist information to be integrated by a whitelist integration unit 203 from the information storage unit 205.
The whitelist integration unit 203 integrates the whitelist information to generate the whitelist used for extracting the main body of the malware and a suspicious change in the settings from the malware infected terminal.
A communication unit 204 performs communication with the abnormality detection apparatus 131, the asset management ledger database apparatus 132, the reference terminal device 134 and the like while managing a physical interface, a transmission control procedure, a network connection procedure, and the like.
The information storage unit 205 stores whitelist information 206 generated by the whitelist information generation unit 201.
The information storage unit 205 stores an inspection object extraction program 207.
The inspection object extraction program 207 performs inspection of the malware infected terminal using the whitelist.
The inspection object extraction program 207 is stored in a predetermined recording medium, together with the whitelist generated by the whitelist integration unit 203. Then, when the recording medium is installed in the malware infected terminal, the inspection object extraction program 207 is loaded into a memory on the malware infected terminal.
Then, the inspection object extraction program 207 is started by a CPU on the malware infected terminal, detects software that is present in the malware infected terminal, and inspects whether or not the software in the malware infected terminal coincides with the proper software shown in the whitelist. Further, the inspection object extraction program 207 detects setting of the malware infected terminal and inspects whether or not the setting of the malware infected terminal coincides with the normal setting shown in the whitelist.
Details of operation of the inspection object extraction program 207 will be described later.
A medium I/F (Interface) 208 is an interface for the recording medium in which the inspection object extraction program 207 and the whitelist are stored.
Next, input/output data and an internal process of the terminal whitelist generation apparatus 133 will be described, using
Referring to
Reference numerals 311 to 315 denote whitelist information, while reference numeral 321 denotes a whitelist.
As shown in
Then, the whitelist information management unit 202 obtains each of the whitelist information 312 to 314 generated by the whitelist information generation unit 201, and stores the whitelist information 312 to 314 in the information storage unit 205.
When a traffic abnormality is detected and the malware infected terminal of the origin of the traffic abnormality is identified by the abnormality detection apparatus 131, the whitelist integration unit 203 receives notification of the IP address (or the MAC address) of the malware infected terminal from the abnormality detection apparatus 131, and then notifies the IP address (or the MAC address) to the asset management ledger database apparatus 132 through the communication unit 204.
Then, the whitelist integration unit 203 obtains a list of software that is allowed to be installed to the malware infected terminal from the asset management ledger database apparatus 132 through the communication unit 204.
Then, the whitelist integration unit 203 requests the whitelist information management unit 202 to read the whitelist information corresponding to the software shown in the obtained list of software. The whitelist information management unit 202 reads the corresponding whitelist information 315 from the information storage unit 205, and supplies the whitelist information 315 to the whitelist integration unit 203.
The whitelist integration unit 203 combines the whitelist information 315 received from the whitelist information management unit 202 to generate the whitelist 321.
Then, the whitelist integration unit 203 stores the inspection object extraction program 207 and the whitelist 321 in the recording medium.
The recording medium in which the inspection object extraction program 207 and the whitelist 321 are stored is attached to the malware infected terminal by the system manager 600.
Referring to
The terminal device 140 is the malware infected terminal which is to be inspected.
The terminal device 140 is one of the terminal devices 141 to 146.
The terminal device 140 is an example of the terminal device to be inspected, and is a device that executes the inspection object extraction program 207. Together with the inspection object extraction program 207, the terminal device 140 serves as an example of an inspection execution unit in the infection inspection system.
The terminal device 140 is also an example of a second computer in the infection inspection method.
The terminal device 140 includes a CPU (central Processing Unit) 1401, a memory 1402, an HDD (Hard Disk Drive) 1403, a medium I/F 1404, and a communication unit 1405.
The recording medium 150 in which the inspection object extraction program 207 and the whitelist 321 have been stored by the terminal whitelist generation apparatus 133 is attached to the medium I/F 1404 of the terminal device 140 by the system manager 600, and is loaded into the memory 1402 of the terminal device 140 through the medium I/F 1404. The CPU 1401 executes the inspection object extraction program 207.
The inspection object extraction program 207 detects software that is present in the terminal device 140, and inspects whether or not the detected software in the terminal device 140 coincides with the proper software shown in the whitelist 321. Besides, the inspection object extraction program 207 detects setting of the terminal device 140, and inspects whether or not the detected setting of the terminal device 140 coincide with the normal setting shown in the whitelist 321.
When the software or the setting that does not coincide with content of the whitelist 321 is present in the terminal device 140, a list of the software or the setting that does not coincide with the content of the whitelist 321 is stored in the recording medium 150.
Then, after completion of the inspection, the system manager 600 detaches the recording medium 150 from the medium I/F 140. The list in the recording medium 150 extracted by the inspection object extraction program 207 is sent to an anti-virus vendor, for example, to ask for an analysis of the malware with which the terminal device 140 is infected.
Next, a flow of generating whitelist information by the whitelist information generation unit 201 will be shown in
The whitelist information generation unit 201 receives information indicating the proper software (file name and version) and the normal setting (hash value, installation path, specific set path, variable, and value) from the reference terminal device 134 through the communication unit 204.
Then, based on the information from the reference terminal device 134, the whitelist information generation unit 201 generates the whitelist information 311 on the software including the operating system and the settings that may have been installed to the terminal devices 141 to 146 (in step S401). Then, the whitelist generation unit 201 supplies the generated whitelist information 311 to the whitelist information management unit 202.
The whitelist information includes a file name, a version, a hash value, an installation path, a specific set path, a variable, and a value, as items, for example.
The version is identified from information on installation of applications managed by the operating system, based on the names of the applications.
The hash value is a data string of a fixed length that has been processed and output by a one-way collision function (MD5: Message Digest Algorithm 5, SHA: Secure Hash Algorithm, or the like) upon reception of file data.
The whitelist information is generated, for usually activated execution files, executable files on the hard disk, libraries (DLLs: Dynamic Link Libraries, device drivers), document files, a list of files stored under specific paths, and specific set paths on the reference terminal device 134.
The whitelist information is generated (updated) when updating of the software is applied to each of the terminal devices 141 to 146, when software is newly installed to each of the terminal devices 141 to 146, or when there is the software that is not currently used, as shown in steps S402 and S403 in
The whitelist information is generated (updated) also when there is a change in the settings of each of the terminal devices 141 to 146, as shown in steps S404 to S406 in
Now, a configuration example of the reference terminal device 134 will be shown in
Like the terminal devices 141 to 146 connected to the enterprise's internal network 101, the reference terminal device 134 is managed by the update management system 301 (in
Further, as described above, all the software (various applications 501 and an operating system 502) properly installed to the terminal devices 141 to 146 connected to the enterprise's internal network 101 is installed to the reference terminal device 134. Then, the reference terminal device 134 is set so that each software normally operates (various setting information in an information storage unit 503).
A plurality of the reference terminal devices 134 may be installed. When there is software that cannot be installed with other software to the same terminal device (such as the operating system and software competing against other software for resources on the terminal device), installation of the software over a plurality of the reference terminals is performed.
The reference terminal device 134 may be a physically identical device to each of the terminal devices 141 to 146, or may be implemented as a virtual machine that is fulfilled by a virtualization technology.
The reference terminal device 134 may be physically separated from the enterprise's internal network 101 to make sure that the reference terminal device 134 is not infected with the malware and then, may be directly connected to the terminal whitelist generation apparatus 133.
In this case, updating and a change in the settings of the reference terminal device 134 are manually performed by the system manager 600.
The reference terminal device may be logically separated from the enterprise's internal network 101 by additionally carrying out an access control measure based on a Firewall, an access permission IP address, and the user authority of the system manager, even though the reference terminal device is not physically separated from the enterprise's internal network 101.
In this case, as in the terminal devices 141 to 146, communication access control is applied so that only minimum necessary communication is allowed to update the software or the settings of the reference terminal device 134.
The whitelist information management unit 202 manages n generations (in which n is a natural number) of the whitelist information generated by the whitelist information generation unit 201 when the whitelist information is different according to the version of the software and a time period in which the whitelist information has been generated. The whitelist information older the n generations is deleted from the information storage unit 205.
The whitelist integration unit 203 receives IP address information on the malware infected terminal from the abnormality detection apparatus 131, notifies the IP address of the malware infected terminal to the asset management ledger database apparatus 132, and obtains information on a list of the software of the malware infected terminal from the asset management ledger database apparatus 132.
Then, the whitelist integration unit 203 selects the whitelist information corresponding to the software (software allowed to be installed to the malware infected terminal) shown in the list of the software from the asset management ledger database apparatus 132, for generation of the whitelist.
Then, the whitelist integration unit 203 requests reading of the selected whitelist information to the whitelist information management unit 202, and obtains the whitelist information from the whitelist information management unit 202 to generate the whitelist.
An example of a whitelist 601 generated by the whitelist integration unit 203 is shown in
An item “type” included in the whitelist 601 is used to make distinction among objects for generation of the whitelist information (usually activated execution files, executable files on the hard disk, libraries, document files, a list of files stored under a specific path, and specific set paths).
For the object for generation of the whitelist information to which the version is not explicitly given (such as document files and settings) unlike the software or the library, the generation managed by the whitelist information management unit 202 may be used in place of a version in an item “version” included in the whitelist 601.
Referring to the column indicating the item “type” in
Further, an item “file name” and the item “version” indicate proper software, and items of “hash value”, “path”, “variable name”, and “value” in the white list 601 indicate normal settings for normally operating each proper software.
Details of each of the apparatus and the devices that are included in this embodiment were described so far.
Next, a sequence of flow when the operations of the respective apparatuses and devices function as the overall system will be described.
Each of
A detection of an abnormal behavior of traffic by the abnormality detection apparatus 131 starts the malware countermeasure process implemented in this embodiment.
When the abnormality detection apparatus 131 detects the abnormal traffic behavior (in step S701), the abnormality detection apparatus 131 identifies the IP address of the terminal device (malware infected terminal) that generates abnormal traffic.
The abnormality detection apparatus 131 further identifies the MAC address corresponding to the IP address of the malware infected terminal.
Then, the abnormality detection apparatus 131 performs a process of isolating the malware infected terminal from the enterprise's internal network 101 (in step S702), and notifies the IP address or the MAC address of the malware infected terminal to the terminal whitelist generation apparatus 133.
In the terminal whitelist generation apparatus 133, the communication unit 204 receives the IP address or the MAC address of the malware infected terminal (in step S703), and gives the IP address or the MAC address of the malware infected terminal to the whitelist integration unit 203.
Next, the whitelist integration unit 203 in the terminal whitelist generation apparatus 133 notifies the IP address or the MAC address received from the abnormality detection apparatus 131 to the asset management ledger database apparatus 132 through the communication unit 204, and then obtains a list of the software installed to the malware infected terminal from the asset management ledger database apparatus 132 (in step S704).
Next, the whitelist integration unit 203 requests the whitelist information management unit 202 to read whitelist information corresponding to the obtained list of software. The whitelist information management unit 202 reads the corresponding whitelist information from the information storage unit 205 (in step S705), and supplies the read whitelist information to the whitelist integration unit 203.
The whitelist integration unit 203 combines the whitelist information (whitelist information corresponding to the list of software installed to the malware infected terminal) obtained from the whitelist information management unit 202 to generate a whitelist.
The whitelist integration unit 203 stores the generated whitelist in the recording medium 150 (preferably, an unrewritable medium) together with the inspection object extraction program 207.
As described above, the inspection object extraction program 207 is a program which is for inspecting whether or not a file and a setting at the malware infected terminal coincide with the content of the whitelist, and identifying the file or the setting that does not coincide with the content of the whitelist.
The whitelist information supplied from the whitelist information management unit 202 corresponds to the software that is allowed to be installed to the malware infected terminal. The whitelist generated from these whitelist information indicates settings of the software allowed to be installed to the malware infected terminal.
For this reason, when an element that does not coincide with the software and the setting described in the whitelist is included as a result of inspection by the inspection object extraction program 207, the element is highly likely to be associated with the malware.
When the inspection object extraction program 207 includes a function of detecting and cleansing a route kit (program for hiding a malware file), accuracy of extracting a malware inspection object is further improved.
The system manager 600 connects the recording medium 150 to the malware infected terminal (terminal device 140 in
The system manager 600 separately puts a result of extraction in the (writable) recording medium, sends the recording medium to the vendor and asks the vendor to analyze the result of extraction.
An operation example when the inspection object extraction program 207 is executed by the CPU 1401 of the terminal device 140 (malware infected terminal) is as shown in
After reading the whitelist 321 in the recording medium 150 and loading the whitelist 321 into the memory 1402 in the terminal device 140, the inspection object extraction program 207 searches the software that is present in the terminal device 140 (in step S801), and determines whether or not the detected software coincides with the proper software included in the whitelist 321 (in steps 802 and 803).
In the process in step S801, the inspection object extraction program 207 searches for usually activated execution files, executable files, libraries (DLLs, device drivers), document files, and files stored under specific paths on the terminal device 140 that are to be inspected, in the memory and the hard disk in the terminal device 140 into which the software is installed, based on attributes of the files (execution files, libraries, document files, and the like).
When the detected software does not coincide with the proper software (No in step S802 or YES in step S803), the inspection object extraction program 207 adds the software detected in step S801 to a list of inspection objects (in step S804).
The list of inspection objects is temporarily stored in a predetermined storage region of the memory 1402 of the terminal device 140.
When inspection of all the software in the terminal device 140 is finished (YES in step S805), the inspection object extraction program 207 loads the settings of the terminal device 140 (setting information within the information storage unit 503 in
Determination as to whether or not the inspection of all the software has been finished in step S805 is made, according to whether or not the process in step S801 on all the files in the terminal device has been finished.
When the loaded setting does not coincide with the proper setting (No in step S807 or YES in step S808), the inspection object extraction program 207 adds the setting which has been loaded in step S806 and does not coincide with the proper setting to a list of extracted settings (S809).
In step S806, inspection object extraction program 207 refers to a set path on the terminal device 140, based on the specific set path included in the whitelist, thereby loads set variable and value.
The list of extracted settings is temporarily stored in a predetermined storage region in the memory 1402 of the terminal device 140.
When inspection of all the settings in the terminal device 140 is finished (YES in step S810), the inspection object extraction program 207 outputs the list of inspection objects and the list of extracted settings to the recording medium 150.
Determination as to whether or not the inspection of all the settings has been finished in step S810 is made, according to whether or not inspection of the variables and values for all the specific set paths included in the whitelist has been finished.
By performing the above steps, inspection of the terminal device 140 by the inspection object extraction program 207 is finished. The system manager 600 detaches the recording medium 150 from the terminal device 140, and gives the list of inspection objects and the list of extracted settings in the recording medium 150 to the vendor to ask for a detection of malware.
Herein, the result of extraction by the malware infected terminal by the system manager 600 is put in the recording medium 150 and is sent to the vendor. By setting the malware infected terminal so as to accept only communication from the inspection object extraction program 207 when the malware infected terminal is isolated, the result of extraction may be automatically or manually sent to the terminal whitelist generation apparatus 133.
That is, the terminal whitelist generation apparatus 133 does not store the inspection object extraction program 207 in the recording medium 150, together with the whitelist 321. The CPU of the terminal whitelist generation apparatus 133 activates the inspection object extraction program 207 in the information storage unit 205 and performs the processes shown in
Then, the list of inspection objects and the list of extracted settings are automatically or manually sent to the anti-virus vendor from the terminal whitelist generation unit 133 as an inspection object.
In this case, the terminal whitelist generation apparatus 133 is an example of the inspection execution unit in the infection inspection system.
In this case, the terminal whitelist generation apparatus 133 is also an example of the second computer in the infection inspection method.
In the example shown in
In this case, a configuration as shown in
That is, the inspection object extraction program 207 is installed in the HDD 1403 of the terminal device 140 in advance. When the terminal device 140 is isolated as the malware infected terminal, the CPU 1401 activates the inspection object extraction program 207, and the communication unit 204 (not shown in
Then, the inspection object extraction program 207 in the terminal device 140 performs the processes shown in
Then, the inspection object extraction program 207 of the terminal device 140 sends the list of inspection objects and the list of extracted settings to the communication unit 204 of the terminal whitelist generation apparatus 133 from the communication unit 1405.
The list of inspection objects and the list of extracted settings are automatically or manually sent to the anti-virus vendor from the terminal whitelist generation apparatus 133 as the inspection object.
In the example in
In the example in
Alternatively, a configuration shown in
Referring to
The inspection object extraction apparatus 160 is a portable computer, for example, may be brought in the vicinity of the terminal device 140, which is the malware infected terminal, and may perform near-distance wireless communication (such as ISO/IEC 18092) with the terminal device 140.
The inspection object extraction apparatus 160 includes a CPU 161, a memory 162, an HDD 163, and a communication unit 164.
The communication unit 164 may perform the near-distance wireless communication, as described above.
The inspection object extraction program 207 is installed in the HDD 163 in advance. When the terminal device 140 is isolated as the malware infected terminal, the CPU 161 activates the inspection object extraction program 207, and the communication unit 164 receives the whitelist 321 from the communication unit 204 (not shown in
Then, when the inspection object extraction apparatus 160 is disposed in the vicinity of the terminal device 140, the communication unit 164 performs communication with the communication unit 1405 of the terminal device 140 to read the software and the settings in the terminal device 140.
The inspection object extraction program 207 performs the processes shown in
Then, the inspection object extraction program 207 of the inspection object extraction apparatus 160 transmits the list of inspection objects and the list of extracted settings to the communication unit 204 of the terminal whitelist generation apparatus 133 from the communication unit 164.
The list of inspection objects and the list of extracted settings are automatically or manually sent to the anti-virus vendor from the terminal whitelist generation apparatus 133.
In the example in
In the example in
Orders of inspection (order of inspection among the software and the order of inspection among the settings) done by the inspection object extraction program 207 may be provided in the whitelist information.
Priorities may be set, with attention paid to commonness (operating system and frequency of use) of the software and the settings among the terminal devices.
With this arrangement, by preferentially inspecting the software and the settings that are highly common, efficiency of extracting a malware inspection object may also be improved.
The efficiency of extracting a malware inspection object may also be improved by prioritizing with attention paid to importance of the software and the settings other than commonness of the software and the settings. For example, a high priority level is set for the software and the settings such as introduced software or the operating system that are important for operation of the terminal device, and a low priority level is set to the software and the settings such as the DLL and the document files that will not greatly influence the operation of the terminal device.
As described above, according to this embodiment, the malware infected terminal is isolated, based on the result of detection by the abnormality detection apparatus. In addition, the whitelist is prepared, based on the information in the terminal device (reference terminal device) not infected with the malware, and the main body of the malware is automatically identified from the malware infected terminal. Thus, the main body of the malware may be promptly analyzed.
For this reason, a countermeasure against new malware may be implemented quickly, so that a vulnerable period in which there is no countermeasure against the malware may be shortened.
Whitelist information on each software including the operating system is prepared in advance by the terminal whitelist generation apparatus, and the generated whitelist information is held and managed. When the malware infected terminal is detected, the information in the asset management ledger database apparatus is used.
Accordingly, the whitelist is generated without obtaining information from the malware infected terminal device that is not reliable. Thus, the whitelist that is highly reliable and is constituted from the minimum necessary information may be obtained.
With this arrangement, a highly accurate and high-speed malware inspection object extracting process is implemented.
Further, according to this embodiment, a program that is not basically allowed to be installed into the terminal device may also be extracted, like the malware. Unauthorized use of software may also be detected.
In the first embodiment, whitelist information is managed by the whitelist information management unit 202 of the terminal whitelist generation unit 133 for each of software including the operating system.
Next, in this embodiment, a description will be directed to a method of increasing efficiency of a whitelist integration process by the whitelist integration unit 203 when software allowed to be installed to terminal devices 141 to 146 can be categorized by usage of each terminal device.
More specifically, in this embodiment, each of the terminal devices 141 to 146 belongs to either one of a plurality of categories.
Then, a terminal whitelist generation apparatus 133 groups proper software based on attributes of the proper software, and whitelist information (inspection reference information) on the proper software categorized as a same group is grouped. Then, each group of the whitelist information is managed associated with one of the categories.
When the malware infected terminal is detected by an abnormality detection apparatus 131, the terminal whitelist generation apparatus 133 selects the whitelist information of the group corresponding to the category to which the malware infected terminal belongs. Then, a whitelist is generated from the selected whitelist information.
Referring to
Each of usage categorized whitelist information 811 to 815 contains the whitelist information on software categorized as a same usage.
Then, the usage categorized whitelist information 811 to 815 are managed in connection with categories of terminal devices 141 to 146.
In the example shown in
In the example in
A development use terminal's whitelist 821 is a whitelist obtained by integrating the whitelist information grouped for common use 811 and the whitelist information grouped for development 812 when the terminal device classified into the category “development” becomes the malware infected terminal.
By inquiring the asset management ledger database apparatus 132, the whitelist integration unit 203 may know the category to which the malware infected terminal belongs. Then, the whitelist information corresponding to the category to which the malware infected terminal belongs may be thereby integrated to generate a whitelist for each terminal usage.
Referring to
In other words, illustration of arrows and the like related to an update management system 301, a reference terminal device 134, and generation of the whitelist information is omitted.
Next, operation of the terminal whitelist generation apparatus 133 in the second embodiment will be described, using
The whitelist information generation unit 201 generates whitelist information by the same operation as in the first embodiment, and supplies the generated white information to a whitelist information management unit 302.
The whitelist information management unit 302 determines the usage of software which the whitelist information supplied from the whitelist information generation unit 201 is about, using the software usage categorization unit 801 newly added in the second embodiment, and categorizes and manages the whitelist information, as one of the usage categorized whitelist information 811 to 815.
The whitelist information may be categorized and managed, based on information presenting the departments where users belong, instead of the terminal device usage.
This arrangement is made for the following reason. Since the way of using each terminal device tends to be similar at one department to which users belong, a similar effect to that when the whitelist information is categorized for each terminal device usage may be expected.
Both of the terminal device usage and the information presenting the departments where users belong, may be used as categorization conditions.
It is assumed that managements on generations over the whitelist information is performed by the whitelist information management unit 302 in the second embodiment as well.
It is further assumed that, list information that defines for which usage the supplied whitelist information is used is set in advance as data in the software usage categorization unit 801 and is appropriately managed by the system manager 600.
When the IP address or the MAC address of the malware infected terminal is notified from the abnormality detection apparatus 131, the whitelist integration unit 203 notifies the IP address or the MAC address received from the abnormality detection apparatus 131 to the asset management ledger database apparatus 132. Then, the whitelist integration unit 203 receives asset information on the malware infected terminal from the asset management ledger database apparatus 132, determines the usage of the malware infected terminal, and extracts necessary whitelist information categorized by usage to generate a whitelist.
The asset management ledger database apparatus 132 includes information on the usages of the terminal devices and the information presenting the departments where terminal device users belong, in addition to the information described in the first embodiment.
The information on the usages of the terminal devices and the information presenting the departments where terminal device users belong in the asset management ledger database apparatus 132 include information by which the whitelist integration unit 203 may determine the usage of the malware infected terminal and the department where the user of the malware infected terminal belongs.
Operations that will be performed thereafter are similar to those in the first embodiment. In the configuration shown in each of
In this case, orders of inspection (order of inspection among software and the order of inspection among settings) done by the inspection object extraction program 207 may be provided in the whitelist information, as in the first embodiment.
Priorities may be set, with attention paid to commonness of the software and the settings among the terminal devices (operating system, usage, and department where each terminal device belongs).
Alternatively, priorities may be set with attention paid to importance of each software, as in the first embodiment.
As described above, in this embodiment, whitelist information is managed as the usage categorized whitelist information. After the IP address or the MAC address of the malware infected terminal has been notified from the abnormality detection apparatus, the usage of the malware infected terminal is identified, and the whitelist is generated using the usage categorized whitelist information categorized by usage. With this arrangement, the time for generating the whitelist may be reduced.
In the above-mentioned first and second embodiments, the whitelist integration unit 203 generates a whitelist after the IP address (or the MAC address) of the malware infected terminal has been notified from the abnormality detection apparatus 131.
Next, this embodiment will show a method in which, by generating a whitelist in advance, the whitelist integration process is not performed when an abnormality is detected.
Assume that, software SW1 and software SW2 are properly installed in common to the terminal devices 141 and 142, software SW3 and software SW4 are properly installed in common to the terminal devices 143 and 144, and software SW5 and software SW6 are properly installed in common to the terminal devices 145 and 146, for example. In the first embodiment, when the terminal device 141 becomes the malware infected terminal, the terminal whitelist generation apparatus 133 generates a whitelist for the terminal device 141 by integrating whitelist information on the software SW1 and whitelist information on the software SW2.
In this embodiment, before the malware infected terminal is detected, six whitelist information on the software SW1, the software SW2 the software SW3, the software SW4, the software SW5, and the software SW6, is integrated to generate a whitelist which can be used in common to all of the terminal devices.
Then, when the malware infected terminal is detected, inspection on the software and settings on the malware infected terminal is performed, employing the whitelist used in common to all of the terminal devices.
Referring to
The whitelist common to all terminal devices 911 is an aggregation of whitelist information on software installed to respective terminal devices 141 to 146 connected to an enterprise's internal network 101.
Information on the software installed to the respective terminal devices 141 to 146 is obtained by extracting information on the types of the installed software from the asset management ledger database apparatus 132.
Referring to
In other words, illustration of arrows and the like related to the update management system 301, the reference terminal device 134, and generation of the whitelist information shown in
It is assumed that managements on generations over the whitelist information included in the whitelist common to all terminal devices 911 is performed by the whitelist information management unit 901 in the third embodiment as well.
As described above, in the configuration shown in each of
In this case, as in the first and second embodiments, the whitelist information included in the whitelist is prioritized, and the software and settings that are highly common are preferentially inspected. With this arrangement, efficiency of extracting a malware inspection object may also be improved.
As described above, in this embodiment, whenever whitelist information is newly generated, the whitelist information is aggregated as the whitelist common to all terminal devices, and is managed and stored. With this arrangement, when the malware infected terminal is detected by the abnormality detection apparatus, the already integrated whitelist is output. The time taken until starting the process of extracting a malware inspection object may be reduced.
In the first to third embodiments, the terminal whitelist generation apparatus 133 receives notification of the IP address (or the MAC address) of the malware infected terminal from the abnormality detection apparatus 131, prepares the whitelist, and performs the malware inspection object extraction process.
Next, in this embodiment, a description will be directed to a method of using the terminal whitelist generation apparatus 133 for daily preventing malware when there is no abnormal detection by the abnormality detection apparatus 131.
A system configuration diagram in a fourth embodiment is the same as that in
Next, the fourth embodiment will be described.
In the fourth embodiment, the malware inspection object extraction process by the inspection object extraction program 207 based on the whitelist generated by the terminal whitelist generation unit 133 is performed on each terminal connected to the enterprise's internal network 101 at certain intervals set in advance, or when the terminal device is activated.
That is, in this embodiment, the terminal device to be inspected is not the one in which an abnormality has been detected by the abnormality detection apparatus 131. The terminal device that has been activated, or the terminal device that has had a turn at being subject to the inspection is inspected.
In this case, the whitelist used for malware inspection object extraction may be determined based on the priority level as described in the first to third embodiments.
In the malware inspection object detection executing when the terminal device is activated, for example, the whitelist generated based on whitelist information with a high priority level may be used to improve efficiency of the malware inspection object extraction.
When a malware inspection object is extracted in the fourth embodiment, a list of the extracted inspection object and a list of an extracted setting are sent to the terminal whitelist generation apparatus 133 from the terminal device. Then, the list of the extracted inspection object and the list of the extracted setting are automatically sent from the terminal whitelist generation apparatus 133 to a vendor or manually sent by a system manger to the vendor.
When the list of the extracted inspection object and the list of the extracted setting are manually sent by the system manger, the system manager may check whether or not the lists of the extracted inspection object and setting include information such as enterprise's confidential information.
The terminal whitelist generation apparatus 133 may instruct the abnormality detection apparatus 131 to isolate from the enterprise's internal network 101 the terminal device from which the malware inspection object has been extracted.
As described above, by daily performing the malware inspection object extraction for preventing the malware, the malware or an unauthorized setting change may be extracted from the terminal device even if a traffic abnormality is not detected by the abnormality detection apparatus. Accordingly, before the malware gets active, a malware inspection object may be extracted.
In each of the above-mentioned first to fourth embodiments, the description was given about the system that performs the following operations of:
1) generating whitelist information that constitutes a whitelist based on the terminal device (reference terminal device) used as a reference for the terminal devices in the enterprise;
2) managing the generated whitelist information by a predetermined software group;
3) managing the generations of the generated whitelist information;
4) obtaining information on the malware infected terminal device from the asset management ledger database apparatus and generating the whitelist that is referenced for extracting malware from the malware infected terminal device, based on the managed whitelist information; and
5) extracting the malware from the malware infected terminal device, based on the generated whitelist.
The description was given about grouping the whitelist information by software and managing the whitelist information by software.
The description was given about grouping the whitelist information by terminal usage and managing the whitelist information after categorizing the whitelist information on the software for the same usage as a same group.
The description was given about collectively managing all the software allowed to be used and generating the whitelist applicable to all the software.
The description was given about extraction of the malware from the malware infected terminal device, based on the whitelist automatically generated by the terminal whitelist generation apparatus, triggered by detection of a traffic abnormality.
Finally, hardware configuration examples of the terminal whitelist generation apparatus 133, the reference terminal device 134, the terminal device 140, and the inspection object extraction apparatus 160 (hereinafter referred to as the terminal whitelist generation apparatus 133 and the like) shown in the first to fourth embodiments will be described.
The configuration in
Referring to
The CPU 1911 is connected to a ROM (Read Only Memory) 1913, a RAM (Random Access Memory) 1914, a communication board 1915, a display device 1901, a keyboard 1902, a mouse 1903, and a magnetic disk device 1920 through a bus 1912, for example, and controls these hardware devices.
Further, the CPU 1911 may be connected to an FDD (Flexible Disk Drive) 1904, a compact disk drive (CDD) 1905, a printer device 1906, and a scanner device 1907. A storage device such as an SSD (Solid State Drive), an optical disk device, a memory card (registered trademark), or a read/write device may be used in place of the magnetic disk device 1920.
The RAM 1914 is an example of a volatile memory. A storage medium such as the ROM 1913, the FDD 1904, the CDD 1905, or the magnetic disk device 1920 is an example of a nonvolatile memory. Each of these media is an example of a memory device.
The “information storage unit” described in the first to fourth embodiments is implemented by the RAM 1914, the magnetic disk device 1920, and the like.
Each of the communication board 1915, the keyboard 1902, the mouse 1903, the scanner device 1907, and the FDD 1904 is an example of an input device.
Each of the communication board 1915, the display device 1901, and the printer device 1906 is an example of an output device.
The communication board 1915 is connected to the enterprise's internal network as shown in
An operating system (OS) 1921, a window system 1922, programs 1923, and files 1924 are stored in the magnetic disk device 1920.
Each program of the programs 1923 is executed by the CPU 1911, while the CPU 1911 uses the operating system 1921 and the window system 1922.
At least one portion of programs of the operating system 1921 and an application program that is executed by the CPU 1911 is temporarily stored in the RAM 1914.
Various data necessary for processes by the CPU 1911 are stored in the RAM 1914.
A BIOS (Basic Input Output System) program is stored in the ROM 1913, and a boot program is stored in the magnetic disk device 1920.
When the terminal whitelist generation apparatus 133 and the like are activated, the BIOS program in the ROM 1913 and the boot program in the magnetic disk device 1920 are executed. The operating system 1921 is started by the BIOS program and the boot program.
The program for executing the function described as the “--- unit” (the same as below except the “information storage unit”) in the description of the first to fourth embodiments is stored in the programs 1923. The program is read and executed by the CPU 1911.
In the files 1924, information, data, signal values, variable values, and parameters showing results of the processes described as “determination of ---”, “computation of ---”, “comparison of ---”, “check of ---”, “integration of ---”, “generation of ---”, “confirmation of ---”, “specification of ---”, “identification of ---”, “instruction of ---”, “extraction of ---”, “detection of ---”, “updating of ---”, “setting of ---”, “registration of ---”, “selection of ---” are stored as respective items of “---files”, “---databases”.
The “---files” and “---databases” are stored in a storage medium such as a disk and a memory.
The information, the data, the signal values, the variable values, and the parameters stored in the storage medium such as the disk and the memory are loaded into a main memory or a cache memory by the CPU 1911 through a read/write circuit.
Then, the information, the data, the signal values, the variable values, and the parameters that have been read are used for operations of the CPU such as extraction, retrieval, reference, comparison, arithmetic operation, computation, processing, editing, output, printing, and display.
During the operations of the CPU such as extraction, retrieval, reference, comparison, arithmetic operation, computation, processing, editing, output, printing, and display, the information, the data, the signal values, the variable values, and the parameters are temporarily stored in the main memory, a register, the cache memory, a buffer memory, or the like.
An arrow portion in the flowcharts described in the first to fourth embodiments mainly indicates a data or signal input/output.
The data and the signal values are recorded in recording media such as the memory of the RAM 1914, the flexible disk of the FDD 1904, the compact disk of the CDD 1905, the magnetic disk of the magnetic disk device 1920, and other optical disk, minidisk, and DVD.
The data and signals are on-line transmitted through the bus 1912, signal lines, cables, or the other transmission media.
The “---unit” described in this embodiment may be a “---circuit”, an “---apparatus”, or a “---device”. Alternatively, the “---unit” may be a “---step”, a “---procedure”, or a “---process”.
That is, the infection inspection method according to the present invention may be implemented by the steps, the procedures, and the processes shown in the flowcharts described in each of the first to fourth embodiments.
Alternatively, the “---unit” described herein may be implemented by firmware stored in the ROM 1913.
Alternatively, the “---unit” described herein may be implemented only by software, only by hardware such as elements, devices, a substrate, or wires, or by a combination of the software and the hardware, or further, by a combination of the software and the firmware.
The firmware and the software are stored in the recording media such as the magnetic disk, the flexible disk, the optical disk, the compact disk, the minidisk, and the DVD, as the programs.
Each program is read from the CPU 1911 and is executed by the CPU 1911.
That is, the program has a computer function as the “---unit” in the first to fourth embodiments. Alternatively, the program has the procedure or method of the “---unit” in the first to fourth embodiments executed by the computer.
As described above, each of the terminal whitelist generation apparatus 133 and the like shown in the first to fourth embodiments is the computer including the CPU as the processing device, the memories, the magnetic disks, and the like as memory devices, the keyboard, the mouse, and the communication board as input devices, and the display device and the communication board as output devices.
Then, as described above, the functions shown as the “---units” are implemented by these processing device, memory devices, input devices, and output devices.
Number | Date | Country | Kind |
---|---|---|---|
2010-148670 | Jun 2010 | JP | national |