The invention relates to a security analysis assistance apparatus and a security analysis assistance method for assisting security analysis of a network system, and further relates to a computer-readable recording medium in which a program for realizing these is recorded.
In recent years, network systems of organizations such as companies and government offices have become targets of cyber attacks for the purpose of data exploitation, destruction, and falsification. Accordingly, the administrator of the network system needs to analyze various alerts output from the network system, and respond to the cyber attacks.
Specifically, the administrator collects information related to cyber attacks distributed outside the organization, analyzes alerts output from the system, based on the collected information and internal-organization information such as correspondence between IP addresses and terminals, and determines the risk of the network system. The information inside the organization includes IP addresses and email addresses of terminals belonging to each department forming the organization. The reason why such internal-organization information is used is that, in a very large organization, the network system is also very large, and cyber attacks need to be dealt with for each department.
However, such analysis is performed manually, and the determination of a risk of the network system imposes a heavy burden on the administrator. Accordingly, Non-Patent Document 1 discloses a system for visualizing traffic in a network in real time. According to the system disclosed in Non-Patent Document 1, because the administrator can quickly grasp unauthorized traffic, it is considered that the burden on the administrator in determining the risk of the network system is reduced.
However, in the system disclosed in Non-Patent Document 1, traffic is visualized in units of IP addresses on a network topology, but is not visualized in units of departments of an organization. When a thin client service is introduced into a network system, it is difficult to specify a department by tracing the IP address of a terminal. Accordingly, when the administrator wants to determine the risk of the network system in units of departments of the organization, the system disclosed in Non-Patent Document 1 does not sufficiently reduce the burden in making the determination.
An example object of the invention is to provide a security analysis assistance apparatus, a security analysis assistance method, and a computer-readable recording medium capable of solving the above issues and assisting security analysis in units of departments in security analysis of a network system of an organization.
In order to achieve the example object described above, a security analysis assistance apparatus according to an example aspect of the invention is an apparatus for assisting security analysis in a network system of an organization, including:
In order to achieve the example object described above, a security analysis assistance method according to an example aspect of the invention is a method for assisting security analysis in a network system of an organization, including:
Furthermore, in order to achieve the example object described above, a computer-readable recording medium according to an example aspect of the invention includes a program for assisting security analysis in a network system of an organization by a computer, the program being recorded on the computer-readable recording medium and including instructions that cause the computer to carry out:
As described above, according to the present invention, it is possible to assist security analysis in units of departments in security analysis of a network system of an organization.
Hereinafter, a security analysis assistance apparatus, a security analysis assistance method, and a program according to an example embodiment of the invention will be described with reference to
First, a schematic configuration of a security analysis assistance apparatus according to the example embodiment of the invention will be described with reference to
A security analysis assistance apparatus 10 in the example embodiment shown in
The analysis target obtaining unit 11 obtains an alert generated in a network system. The information obtaining unit 12 obtains organization address information. The organization address information is information for specifying at least departments forming the organization and addresses used in the respective departments.
The analysis unit 13 compares the alert obtained by the information obtaining unit 12 with the organization address information. Then, the analysis unit 13 analyzes the occurrence tendency of the alert for each department of the specific organization, based on the result of the comparison. The visualization unit 14 visualizes the result of the analysis performed by the analysis unit 13.
As described above, in the security analysis assistance apparatus 10 according to the example embodiment, the occurrence tendency of the alert is analyzed for each the departments forming the organization, and the result is visualized. Accordingly, according to the security analysis assistance apparatus 10, it is possible to assist security analysis in units of departments in security analysis of a network system of an organization.
Next, with reference to
As shown in
As shown in
The security appliance 21 is a server that manages the security of the system, and outputs an alert when, for example, a suspicious event, a malicious event, or the like occurs in the network system 20. In the example embodiment, the analysis target obtaining unit 11 obtains an alert from the security appliance 21. The analysis target obtaining unit 11 stores the obtained alert in the alert storage unit 19.
The service server 22 is a server that provides various services in the organization. In the example embodiment, the organization information obtaining unit 15 obtains, from the service server 22, organization information that specifies at least departments forming the organization, members of the departments, and email addresses of the members. Upon obtaining the organization information, the organization information obtaining unit 15 stores the obtained organization information in the organization information storage unit 16.
The information generation unit 17 specifies an email address of each member and an IP address corresponding to the email address (for example, an IP address of a terminal device that has transmitted and received emails), based on transmission processing and receiving processing of email used in the organization.
For example, it is assumed that a user name of an account authenticated by the mail server 23 is set as an email address. In this case, the information generation unit 17 specifies the email address (user name) and the IP address of the terminal device 25, when the terminal device 25 requests authentication from the mail server 23 and receives an email.
Specifically, the information generation unit 17 obtains a log of mail software used in the terminal device 25, data output by an agent program, and the like from a communication path between the terminal device 25 and the mail server 23, using DPI (Deep Packet Inspection), packet capture, or the like. Then, the information generation unit 17 obtains the email address (user name) and the IP address of the terminal device 25, based on the obtained data.
When the terminal device 25 transmits an email to the mail server 23, the information generation unit 17 can also specify an email address (user name) and the IP address of the terminal device 25. Specifically, in this case, the information generation unit 17 specifies an email address described by the MAIL command of the SMTP used when an email is transmitted and the IP address of the terminal device 25 of the transmission source from the communication path between the terminal device 25 and the mail server 23, using DPI, packet capture, or the like.
Furthermore, when the terminal device 25 requests the directory server 24 to perform authentication and the authentication is successful, the information generation unit 17 specifies the IP address of the terminal device 25 that requested the authentication and the information requested by the terminal device 25 from the directory server 24. The information generation unit 17 specifies the email address used in the terminal device 25 from the information requested by the terminal device 25.
Thereafter, the information generation unit 17 compares the specification result with the organization information stored in the organization information storage unit 16, generates organization address information, and stores the generated organization address information in the organization address information storage unit 18.
In the example embodiment, the information obtaining unit 12 obtains organization address information from the organization address information storage unit 18. The information obtaining unit 12 sends the obtained organization address information to the analysis unit 13.
In the example embodiment, for example, the analysis unit 13 calculates the number of occurrences of the alert for each department of the organization, thereby analyzing the occurrence tendency of the alert. In addition, when the organization has a hierarchical configuration, the analysis unit 13 analyzes the occurrence tendency of the alert for each department, from a higher-level department to a lower-level department.
In the example embodiment, for example, the visualization unit 14 visualizes the analysis result for each department, from a higher-level department to a lower-level department. Specifically, the visualization unit 14 creates image data for visualization and outputs the created image data to the terminal device of the administrator or a display device (not shown in
Next, the operations of the security analysis assistance apparatus 10 according to the example embodiment of the invention will be described with reference to
First, the process for generating organization address information will be described with reference to
As shown in
Next, the information generation unit 17 specifies the email address of each member and the IP address corresponding to the email address, based on the transmission processing and the receiving processing of the email used in the organization (step A2).
Next, the information generation unit 17 compares the specification result in step A1 with the organization information stored in the organization information storage unit 16 in step A1, generates organization address information, and stores the generated organization address information in the organization address information storage unit 18 (step A3).
Next, visualization processing will be described with reference to
As shown in
Next, the information obtaining unit 12 obtains the organization address information from the organization address information storage unit 18, and sends the obtained organization address information to the analysis unit 13 (step B2).
Next, the analysis unit 13 extracts each alert stored in the alert storage unit 19, compares each extracted alert with the organization address information obtained in step B2, and analyzes the occurrence tendency of the alert for each department of the organization (step B3). Specifically, in step B3, the analysis unit 13 calculates the number of occurrences of the alert for each department of the organization, thereby analyzing the alert occurrence tendency.
Next, the visualization unit 14 visualizes the analysis result of the step B3 (step B41). As a result of executing step B4, the analysis result is visualized as shown in
As described above, in the example embodiment, the occurrence tendency of the alert is analyzed for the departments forming the organization, and the result is visualized. Further, in the example embodiment, the occurrence tendency of the alert is analyzed from the entire organization to the lower levels of the organization. As a result, according to the example embodiment, it is possible to assist security analysis in units of departments in security analysis of a network system of an organization.
In the example embodiment, the organization address information can be created in advance at a time different from the time when visualization processing is performed. Accordingly, it is possible to speed up the visualization processing, compared to a case where the visualization processing and the generation processing of the organization address information are simultaneously performed.
The program in the example embodiment may be a program that causes a computer to execute steps A1 to A3 shown in
In the example embodiment, the organization information storage unit 16, the organization address information storage unit 18, and the alert storage unit 19 can be realized by storing data files forming these units in a storage device such as a hard disk provided in a computer.
The program in the present embodiment may be executed by a computer system constructed by a plurality of computers. In this case, for example, each computer may function as any one of the analysis target obtaining unit 11, the information obtaining unit 12, the analysis unit 13, the visualization unit 14, the organization information obtaining unit 15, and the information generation unit 17. The organization information storage unit 16, the organization address information storage unit 18, and the alert storage unit 19 may also be constructed on a computer different from the computer that executes the program in the example embodiment.
Here, a computer that realizes the security analysis assistance apparatus by executing the program according to the present embodiment will be described with reference to
As shown in
The CPU 111 loads program (codes) according to the example embodiment, which are stored in the storage device 113, to the main memory 112, and executes the codes in a predetermined order, thereby performing various types of arithmetic operations. The main memory 112 is typically a volatile storage device such as a DRAM (Dynamic Random Access Memory). The program according to the example embodiment is provided in a state of being stored in a computer-readable recording medium 120. The program according to the example embodiment may also be distributed on the Internet connected via the communication interface 117.
Specific examples of the storage device 113 include a hard disk drive and a semiconductor storage device such as a flash memory. The input interface 114 mediates data transmission between the CPU 111 and input devices 118 such as a keyboard and a mouse. The display controller 115 is connected to a display device 119, and controls display on the display device 119.
The data reader/writer 116 mediates data transmission between the CPU 111 and the recording medium 120, and executes reading of a program from the recording medium 120 and writing of a processing result in the computer 110 to the recording medium 120. The communication interface 117 mediates data transmission between the CPU 111 and another computer.
Specific examples of the recording medium 120 include general-purpose semiconductor storage devices such as CF (Compact Flash (registered trademark)) and SD (Secure Digital), magnetic recording media such as a flexible disk, and optical recording media such as CD-ROM (Compact Disk Read Only Memory).
The security analysis assistance apparatus 10 according to the example embodiment can also be realized by using hardware corresponding to each unit, instead of a computer in which programs are installed. Furthermore, a portion of the security analysis assistance apparatus 10 may be realized by a program, and the remaining portion may be realized by hardware.
Some or all of the example embodiment described above can be expressed by (Supplementary Note 1) to (Supplementary Note 12) described below, but is not limited to the following description.
A security analysis assistance apparatus that is an apparatus for assisting security analysis in a network system of an organization, including:
The security analysis assistance apparatus according to Supplementary note 1, further including:
The security analysis assistance apparatus according to Supplementary note 1 or 2,
The security analysis assistance apparatus according to any one of Supplementary notes 1 to 3,
A security analysis assistance method that is a method for assisting security analysis in a network system of an organization, including:
The security analysis assistance method according to Supplementary note 5, further including:
The security analysis assistance method according to Supplementary note 5 or 6,
The security analysis assistance method according to any one of Supplementary notes 5 to 7,
A computer-readable recording medium including a program for assisting security analysis in a network system of an organization by a computer, the program being recorded on the computer-readable recording medium and including instructions that cause the computer to carry out:
The computer-readable recording medium according to Supplementary Note 9, the program further including instructions that cause the computer to carry out:
The computer-readable recording medium according to Supplementary note 9 or 10,
The computer-readable recording medium according to any one of Supplementary notes 9 to 11,
Although the invention has been described with reference to the example embodiment, the invention is not limited to the above example embodiment. Various changes that can be understood by those skilled in the art can be made to the configuration and details of the invention within the scope of the invention.
As described above, according to the invention, it is possible to assist security analysis in units of departments in security analysis of a network system of an organization. The invention is useful for security analysis of a network system.
This application is a continuation of U.S. application Ser. No. 17/285,957 filed Apr. 16, 2021, which is a National Stage of International Application No. PCT/JP2018/039247 filed Dec. 22, 2018, the contents of all of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 17285957 | Apr 2021 | US |
Child | 18763000 | US |