The present invention relates to a method and a firewall configured to control messages transiting between two communication elements.
In the scope of the present invention, it is meant:
Various application firewall solutions are known, such as firewall of WAF type (“Web Application Firewall”) or “pattern” recognition application firewalls.
In particular, firewalls are known for an OSI model (“Open System Interconnection”). These firewalls are generally very efficient on the layers 2 to 6 of the OSI model. However, for the applications (i.e. the layer 7 of the OSI model), the usual firewalls are limited to a functionality referred to as of “pattern” or of “signature”. The treatment is limited to looking at the content of the message only to find out whether a form of signature exists or not. They do not cover the security needs of the most critical applications in great depth.
These standard firewall solutions are therefore not satisfactory, in particular for the application layer of a communication model.
The present invention relates to a firewall configured to control messages transiting in at least one direction between two communication elements, for example two computer networks or a computer and a computer network, which allows the aforementioned disadvantages to be remedied, said firewall comprising interfaces towards said communication elements.
To this end, according to the invention, said firewall further comprises:
Advantageously, said firewall is configured to control messages of an application layer of a communication model used for the communication between the two communication elements, in particular a layer referred to as “7” of an OSI model (for “Open System Interconnection”).
Thus, thanks to the invention, said firewall (of the application type) allows to verify, in real time, the conformity of the contents of the messages controlled with respect to predetermined reference data (concerning known messages). These reference data are adapted to the characteristics of the communication system in question and to the data and information intended to be exchanged by that communication system, as specified below.
The firewall thus verifies every message in transit for perfectly known and determined messages. The firewall is thus particularly well applied to the industrial domain, when the messages considered (received and/or emitted) are known.
In a preferred embodiment, said firewall is configured to control the messages transiting in both directions between the two communication elements.
Furthermore, advantageously, the verification unit is configured to recognise, among the messages transiting between the two communication elements, the same messages as those of the reference data, and the verification unit is configured to compare with the reference data only the messages which are thus recognised.
Furthermore, advantageously, the reference data contained in the database are transcribed into a computer format exploitable by the verification unit, preferably an XML format.
In a preferred embodiment, the reference data is representative of information intended to be exchanged between the communication elements. For example, for communication elements in an industrial unit, this may be information relating to products manufactured or used by that industrial unit or information for the operation or the management of that industrial unit.
The present invention also relates to a communication system comprising at least one communication element. According to the invention, said communication system further comprises at least one firewall as described above.
Advantageously, the communication system further comprises at least one database containing the reference data, said reference data thus comprising predetermined messages and at least permitted values for fields of said predetermined messages.
Advantageously, the communication system further comprises an alert signal management device configured to generate an action in case of reception of an alert signal from the firewall.
Advantageously, the alert signal management device is configured not to let a detected non-conforming message pass. In the context of the present invention, other actions are possible, as described below.
In a particular embodiment, the alert signal management device is configured to be able to generate a plurality of different possible actions and to generate, if applicable, from said plurality of possible actions, an action depending on the detected non-conforming message.
Furthermore, in a particular embodiment, the communication system also comprises at least one common auxiliary firewall.
The present invention further relates to a communication network which comprises at least said firewall and said two communication elements.
The present invention also relates to a method for treating and filtering messages transiting in at least one direction between two communication elements.
According to the invention, said method comprises at least:
Advantageously, said method further comprises a protection step, implemented by an alert signal management device, consisting of implementing an action, in particular a protection action, in case of generation of an alert signal in the alert step.
In addition, advantageously, the verification step comprises:
The figures of the attached drawing will make it clear how the invention can be carried out. In these figures, identical references designate similar elements.
The firewall 1 shown schematically in
The firewall 1 comprises interfaces 5 and 6 (shown in
In a particular embodiment, said firewall 1 is configured to control the messages transiting in one direction I1 or I2 between the two communication elements 2 and 3. By way of illustration, these may be messages emitted from the communication element 3, for example a computer network external to an organisation or to a local entity such as a business, to the communication element 2, for example a computer or a network of the local entity, with the aim of protecting the communication element 2 against an non permitted message which could be potentially malicious and correspond, in particular, to an intrusion attempt.
In a preferred embodiment, shown in
Furthermore, in a preferred variant of this preferred embodiment, said firewall 1 is configured to control the messages transiting in both directions I1 and I2 between the two communication elements 2 and 3, as illustrated by double arrows F and G in
In a particular embodiment, the firewall 1 and the two communication elements 2 and 3 may be part of a communication network 15, for example a military (communication) network.
The firewall 1 comprises, as shown in
The verification unit 7 is configured to be able to recognise (or identify), among the messages transiting between the two communication elements 2 and 3, the messages of the same type (e.g. of the same protocol) as those stored in the database 8. The verification unit 7 compares with the reference data of said database 8 only the contents of the messages (in transit between the two communication elements 2 and 3) which are thus previously recognised.
In addition to generating the alert signals, the central unit 10 is also configured to allow the management of the verification unit 7 and the downloading of the reference data from the database 8.
As shown in
The interfaces 5 and 6 are responsible for transmitting and receiving messages that pass through the firewall 1, from or to the communication element 2 and the communication element 3 respectively.
The communication system 4 also comprises a database 8, preferably external to the electronic board 14, which contains the above-mentioned reference data. The reference data comprise at least:
In a particular embodiment, the firewall 1 may also comprise a number of databases 8, each of which, for example, comprises data relating to messages of a particular type in each case, which are, for example, intended for a particular project or a particular product. A database is any electronic means, such as a memory, which is part of the communication system 4 and which allow to store the assembly of the data necessary for allowing the verification unit 7 to carry out the intended comparisons.
Thus, said firewall 1 allows to verify, in real time, the conformity of the content of the controlled messages with respect to predetermined reference data. This reference data are adapted to the data exchanged by the communication system 4. The firewall 1 thus verifies each message in transit for perfectly known and determined messages.
In particular, the messages (controlled by the firewall 1) are fully known, and the possible content of each of these messages is precisely identified, for example, in interface documents used to define or update the reference data contained in the database 8. They may depend, in particular, on the data and information that it is envisaged that the communication system 4 will exchange. The documents specifying the interfaces and therefore the messages to be used for the communication system 4 allow a list of messages that can be used and the assembly of possible values for each field of these messages to be established in a precise manner. The firewall 1 is therefore particularly well suited to the industrial domain, and more specifically to the companies or the activity sectors in which the messages exchanged are perfectly known.
The firewall 1 can therefore read each message precisely and verify whether the values that make it up in the various fields are part of the possible values, and whether the message is therefore conforming or not.
For this purpose, the reference data in the database 8 is transcribed into a computer format exploitable by the verification unit 7 of the firewall 1, preferably an XML format.
The XML (Extensible Markup Language) files are simple text documents that use custom tags to describe and structure data. The XML message format used allows for the description of messages that are to be analysed at the application level. It contains the description of the different fields of each message (including in particular minimum values, maximum values, types, sizes) that are specified in the interface documents.
The present invention can be applied to different types of protocols, for example Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
The firewall 1 is of the application type. It is configured to control messages of an application layer of a communication model used for the communication between the two communication elements 2 and 3.
Preferably, the firewall 1 is configured to control messages of the layer 7 of the OSI model. The OSI model, which represents a network communication standard for computer systems, comprises seven layers. The layer 7, which is an application layer, is the access point to the network services. In the context of the present invention, the firewall 1 can also be applied to the application layer of a communication model other than the OSI model.
The communication system 4 furthermore comprises an alert signal management device 12, for example of the SIEM (Security Information and Event Management) type, which is configured to generate an action, in particular a protective action, in case of reception of an alert signal. For this purpose, the device 12 is connected by means of a link 13 (
In a preferred embodiment, the alert signal management device 12 is configured to act, in the usual way, by not allowing a non-conforming message to pass. Thus:
In the context of the present invention, other actions (controlled or managed by the device 12) are conceivable in case of detection of a non-conforming message. By way of illustration, this may include deleting the message, archiving the message, transmitting the message to an analysis element (for analysing it), cutting off any further transmission between the communication elements 2 and 3, complex operations on the alert signals (such as time correlations for example), etc.
In a particular embodiment, the alert signal management device 12 is configured to generate an action which is dependent on the detected non-conforming message. A plurality of different possible actions is therefore provided for, and when a message is considered as non-conforming, at least one action (among said possible actions) which depends on said message is implemented. These actions may, for example, depend on the type of communication system 4, to which the firewall 1 is applied, or on the nature of the data exchanged by the communication system 4.
Furthermore, in a particular embodiment, the communication system 4 comprises, in addition to the firewall 1, one or preferably a plurality of usual auxiliary firewalls (not shown). This may include in particular one or more common firewalls that are designed to analyse messages that are not recognised by the verification unit 7 and are therefore not controlled by the firewall 1.
In particular, it may be one or more common firewalls that are designed to protect the layers 2 to 6 of the OSI models, and are thus complementary to the firewall 1 when it is intended to protect the layer 7 of the OSI model. In this particular embodiment, the communication system 4 thus has effective protections against the assembly of the layers 2 to 7 of the OSI model.
The firewall 1, as described above, being part of the communication system 4, allows to implement a method P for treating and filtering messages transiting in at least one (communication) direction between the two communication elements 2 and 3 or in both directions.
To this end, this method P comprises, as shown in
The reference data comprises predetermined messages that are known and permitted values for fields of said predetermined messages;
In addition, the verification step E1, implemented by the verification unit 7, comprises:
Therefore, the verification unit 7 tries to recognise and identify all the messages in transit between the communication elements 2 and 3. A message that is not recognised by the verification unit 7 will not be controlled by the latter and will therefore be permitted to pass through the firewall 1. This message can be controlled by other common firewalls of the communication system 4, which will decide whether or not it conforms with the current security policy. It will then either be blocked by this usual firewall or allowed to pass.
On the other hand, a message that is recognised by the verification unit 7 will be controlled by the latter, which will emit an alert signal in case of lack of conformity of this controlled message with the corresponding reference data. In such a case, the alert signal management device 12 will generate an appropriate action. In particular, it will prevent the message from being communicated to the recipient communication element 2, 3.
The firewall 1 and the method P, as described above, can be used in many different applications. In particular, they are particularly well suited to the industrial domain (aviation, military, etc.), in companies or sectors of activity where the messages exchanged are perfectly known.
In the military domain, the firewall 1 can be in particular used in addition to the usual firewalls in order to provide an effective protection allowing for monitoring of the communication flows, in input and output of military systems such as a control centre, a mission preparation station, a launcher, etc.
Number | Date | Country | Kind |
---|---|---|---|
2009292 | Sep 2020 | FR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FR2021/051473 | 8/19/2021 | WO |