The present invention relates to an unauthorized access information collection system for monitoring unauthorized access to a honeynet constructed of plural honey pots (for example, a decoy server or a decoy network device for decoying a virus or an attacker, etc.) to collect unauthorized access information. More particularly, the present invention relates to an unauthorized access information collection system in which unauthorized access information on wide address space can be collected at low cost and an operation analysis can be easily performed.
There are the following references as related arts relevant to a conventional unauthorized access information collection system for monitoring unauthorized access to a honeynet constructed of plural honey pots to collect unauthorized access information.
Patent Reference 1: JP-A-2002-111727
Patent Reference 2: JP-A-2004-234401
Patent Reference 3: JP-A-2006-025354
Patent Reference 4: JP-A-2006-099590
Patent Reference 5: JP-A-2006-243878
Also, numerals 2, 3, 4 and 5 construct the unauthorized access information collection system, and numerals 3, 4 and 5 construct a honeynet, respectively.
The terminal 1 is mutually connected to the Internet 100 and also one communication unit (for example, a network interface) of the unauthorized access information collection device 2 is mutually connected to the Internet 100. Also, the other communication unit of the unauthorized access information collection device 2 is mutually connected to the honey pots 3, 4 and 5.
Also,
The communication unit 6 is mutually connected to the Internet 100 (not shown) and also the input and output are mutually connected to the arithmetic control unit 7. On the other hand, the communication unit 8 is mutually connected to the honeynet (not shown) and also the input and output are mutually connected to the arithmetic control unit 7. Also, input and output of the storage unit 9 are mutually connected to the arithmetic control unit 7.
An action of the conventional example shown in
First, a global IP (Internet Protocol) address (hereinafter simply called a global address) is respectively allocated to each of the honey pots 3, 4 and 5 constructing the honeynet. A MAC (Media Access Control address) address and the global address of each of the honey pots 3, 4 and 5 are registered an address table, and the address table is previously stored in the storage unit 9 of the unauthorized access information collection device 50.
Also, limit information about, for example, discard of a packet or transfer to the Internet side of an IP (Internet Protocol) packet (hereinafter simply called a packet) with respect to a destination global address at the time of outbound communication is set a communication control list. The communication control list is previously stored in the storage unit 9 of the unauthorized access information collection device 50.
At the time of inbound communication (packet reception from the Internet side), in “S001” in
When the arithmetic control unit 7 decides that the MAC address is present in the address list in “S003” in
For example, when receiving a packet whose destination global address is “IP01”, from the terminal 1 located at the side of the Internet 100 as shown by “PC01” in
On the other hand, in the case of deciding that the MAC address is not present in the address list in “S003” in
For example, when receiving a packet whose destination global address is “IP05”, from the terminal 1 located at the side of the Internet 100 as shown by “PC02” in
Also, at the time of outbound communication (packet reception from the honeynet side), in “S101” in
When the arithmetic control unit 7 decides that the limit information about the destination private address is not present in the communication control list in “S103” in
For example, when receiving a packet whose private address of the honey pot 3 of the honeynet side is “IP11” as shown by “PC11” in
On the other hand, in the case of deciding that the limit information is present in the communication control list in “S103” in
For example, when receiving a packet whose private address of the honey pot 5 of the honeynet side is “IP12” as shown by “PC12” in
With such an action, packet information passing through the unauthorized access information collection device 50 is recorded in a log file of the storage unit 9, so that unauthorized access to a honeynet of an attacker or a virus can be grasped by analyzing the log file.
Also, since the unauthorized access information collection device 50 performs communication control of a packet from the honeynet side to the Internet side based on the preset communication control list, for example, it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
As a result of this, since an unauthorized access information collection device is provided between the Internet and the honeynet, packet information passing through the unauthorized access information collection device is recorded and communication control from the honeynet side to the Internet side is performed based on a set communication control list, it is possible to collect unauthorized access information and also it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
However, in the conventional example shown in
Also,
Therefore, the problems that the invention is to solve are to achieve an unauthorized access information collection system in which unauthorized access information can be collected in wide address space at low cost and operating analysis can be easily performed.
In order to achieve the above problems, according to the invention set forth in claim 1, in an unauthorized access information collection system for monitoring unauthorized access to a honeynet so as to collect unauthorized access information, the system comprises: a plurality of honey pots in which a private address or a global address is respectively set and which construct the honeynet; and an unauthorized access information collection device which is disposed between an Internet and the honeynet and which allocates a plurality of global addresses to the private address or the global address by setting of a routing table to transfer a received packet and which performs a communication control from the honeynet side to the Internet side based on a communication control list and records the passing packets. Therefore, unauthorized access information can be collected in a wide address space at low cost and, for example, it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
According to the invention set forth in claim 2, in the unauthorized access information collection system as claimed in claim 1, the unauthorized access information collection device comprises: a first communication unit for conducting a communication through the Internet; a second communication unit for conducting a communication through the honeynet; a storage unit which stores the routing table; and an arithmetic control unit which controls the entire device and records a packet received through the first communication unit in the storage unit and which writes a first detection point identifier, a destination global address and a destination port number into the recorded packet and which, if the destination global address is present in the routing table, rewrites a destination address of the received packet into the private address or the global address and which rewrites a destination address of the previously recorded packet into the private address or the global address and writes a second detection point identifier and stores the second detection point identifier in the storage unit and which transfers the received packet rewritten into the private address or the global address through the second communication unit and which discards the received packet when the destination global address is not present in the routing table. Therefore, unauthorized access information can be collected in a wide address space at low cost and, for example, it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
According to the invention set forth in claim 3, in the unauthorized access information collection system as claimed in claim 1, the unauthorized access information collection device comprises: a first communication unit for conducting a communication through the Internet; a second communication unit for conducting a communication through the honeynet; a storage unit which stores the communication control list; and an arithmetic control unit which controls the entire device and which, if limit information about a source global address or a source private address of a packet received through the second communication unit is not registered in the communication control list, records the received packet in the storage unit and writes a third detection point identifier into the recorded packet and which rewrites a source address of the received packet into a global address and transfers the global address through the first communication unit and which, if the limit information is present in the communication control list, records the received packet in the storage unit, writes a fourth detection point identifier into the recorded packet and discards the received packet. Therefore, unauthorized access information can be collected in a wide address space at low cost and, for example, it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
According to the invention set forth in claim 4, in the unauthorized access information collection system as claimed in claim 2 or 3, the arithmetic control unit: displays an Internet plane, an device plane and a honeynet plane which use an IP address and a port number as each of coordinate axes on a display unit and reads a recorded packet out of the storage unit; makes a drawing between the Internet plane and the device plane when the first detection point identifier is written; makes a drawing between the device plane and the honeynet plane when the second detection point identifier is written; makes a drawing between the honeynet plane and the Internet plane when the third detection point identifier is written; and makes a drawing between the honeynet plane and the device plane when the fourth detection point identifier is written. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can e easily performed.
According to the invention set forth in claim 5, in the unauthorized access information collection system as claimed in claim 4, when the first detection point identifier is written, the arithmetic control unit displays a source address in coordinates of the Internet plane and displays the destination address in coordinates of the device plane and makes a drawing such that two points are connected to each other with a line segment. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can e easily performed.
According to the invention set forth in claim 6, in the unauthorized access information collection system as claimed in claim 4, when the second detection point identifier is written, the arithmetic control unit displays a destination global address before rewriting in coordinates of the device plane and displays the rewritten private address or the rewritten global address in coordinates of the honeynet plane and makes a drawing such that two points are connected to each other with a line segment. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can e easily performed.
According to the invention set forth in claim 7, in the unauthorized access information collection system as claimed in claim 4, when the third detection point identifier is written, the arithmetic control unit displays a source address in coordinates of the honeynet plane and displays a destination address in coordinates of the Internet plane and makes a drawing such that two points are connected to each other with a line segment. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can e easily performed.
According to the invention set forth in claim 8, in the unauthorized access information collection system as claimed in claim 4, when the fourth detection point identifier is written, the arithmetic control unit displays a source address in coordinates of the honeynet plane and displays a destination address in coordinates of the device plane and makes a drawing such that two points are connected to each other with a line segment. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can e easily performed.
According to the invention set forth in claim 9, in the unauthorized access information collection system as claimed in any one of claims 5 to 8, the arithmetic control unit performs a color coding display on the line segment. Therefore, a protocol type of a packet passing through the respective devices can be intuitively separated and observed with color, so that operation analysis can be performed more easily.
According to the invention set forth in claim 10, in the unauthorized access information collection system as claimed in any one of claims 5 to 8, the arithmetic control unit moves a marker toward a packet propagation direction such that the marker traces the line segment. Therefore, it is possible to intuitively grasp the packet propagation direction.
According to the invention set forth in claim 11, in the unauthorized access information collection system as claimed in any one of claims 5 to 8, the arithmetic control unit displays the marker in any shape. Therefore, it is possible to intuitively grasp the packet propagation direction.
According to the invention set forth in claim 12, in the unauthorized access information collection system as claimed in any one of claims 5 to 8, the arithmetic control unit sets luminance of the marker such that luminance of the marker is different from ambient luminance. Therefore, it is possible to intuitively grasp the packet propagation direction.
There are the following advantages in the present invention.
According to the invention set forth in claims 1 to 3, an unauthorized access information collection device is disposed between the Internet and the honeynet and also the private address is allocated to each of the honey pots constructing the honeynet and the plurality of global addresses are allocated to the private address by setting of a routing table and a received packet is transferred and the packet into which a detection point identifier is written is recorded and communication control from the honeynet side to the Internet side is performed based on the set communication control list. Therefore, unauthorized access information can be collected in wide address space at low cost and, for example, it is possible to prevent the honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
Also, according to the invention set forth in claims 4 to 8, based on a recorded packet to which a detection point identifier are added, the arithmetic control unit makes a drawings between the Internet plane and the device plane with a line segment, makes a drawing between the device plane and a honeynet plane with a line segment or makes a drawing between the Internet plane and the honeynet plane with a line segment. Therefore, a communication situation between the respective devices can be displayed in three dimensions, so that operation analysis can be performed easily.
Also, according to the invention set forth in claim 9, the arithmetic control unit performs color coding display on the line segment. Therefore, a protocol type of a packet passing through the respective devices can be intuitively separated and observed by color, so that operation analysis can be performed more easily.
Also, according to the invention set forth in claims 10 to 12, the arithmetic control unit moves a marker toward the packet propagation direction such that the marker traces the line segment. Therefore, the marker moves toward the packet propagation direction such that the marker traces the line segment, so that packet the propagation direction can be grasped intuitively.
The invention will be now described in detail with reference to the drawings.
In
Also, numerals 10, 11, 12 and 13 construct the unauthorized access information collection system, and numerals 11, 12 and 13 construct a honeynet, respectively.
The terminal 1 is mutually connected to the Internet 100, and also one communication unit (for example, a network interface) of the unauthorized access information collection device 10 is mutually connected to the Internet 100. Also, the other communication unit of the unauthorized access information collection device 10 is mutually connected to the honey pots 11, 12 and 13. Further, the management terminal 14 is mutually connected to the Internet 100.
Also,
The communication unit 15 is mutually connected to the Internet 100 (not shown), and also the input and output are mutually connected to the arithmetic control unit 16. On the other hand, the communication unit 17 is mutually connected to the honeynet (not shown), and also the input and output are mutually connected to the arithmetic control unit 16. Also, input and output of the storage unit 18 are mutually connected to the arithmetic control unit 16 and a display output of the arithmetic control unit 16 is connected to the display unit 19.
An action of the embodiment shown in
First, a private IP (Internet Protocol) address (hereinafter simply called a private address) is respectively allocated to each of the honey pots 11, 12 and 13 constructing the honeynet, and a relation between private addresses of each of the honey pots 11, 12 and 13 and global addresses allocated to the private addresses is registered in a routing table. The routing table is previously stored in the storage unit 18 of the unauthorized access information collection device 51.
Also, for example, global addresses “210.220.230.241”, “210.220.230.242” and “210.220.230.244” are allocated to a private address “192.168.0.2”.
Further, limit information about, for example, discard of a packet or transfer to the Internet side of a packet with respect to a destination global address at the time of outbound communication is set in a communication control list, The communication control list is previously stored in the storage unit 18 of the unauthorized access information collection device 51.
At the time of inbound communication (packet reception from the Internet side), the arithmetic control unit 16 decides whether or not a packet is received from the terminal 1 of the Internet side through the communication unit 15 in “S201” in
For example, it is assumed that a packet shown by “PC21” in
In the case of deciding that the packet is received from the terminal 1 of the Internet side through the communication unit 15 in “S201” in
For example, in the packet recorded in the storage unit, a source address and a destination address are stored in the portions shown by “SA31” and “DA31” in
That is, information as shown in
For example, “1” is written into the portion shown by “ID41” in
Incidentally, the detection point identifier “1” indicates a point when a packet is received from the Internet side.
Next, the arithmetic control unit 16 retrieves whether or not a destination global address is registered in a routing table previously stored in the storage unit 9 in “S203” in
When the arithmetic control unit 16 decides that the global address is present in a routing list in “S204” in
Also, the arithmetic control unit 16 rewrites a destination address of the packet recorded in step “S202” in
That is, information as shown in
For example, the portion shown by “DA51” in
Incidentally, the detection point identifier “2” indicates a point when the portion shown by “DA51” is rewritten into the private address.
The arithmetic control unit 16 transfers the received packet rewritten into a private address, based on the routing table, to a honey pot having the private address of the honeynet side through the communication unit 15 in “S207” in
For example, the received packet is rewritten into a private address as shown by “CA21” in
On the other hand, in the case of deciding that the destination global address is not present in the routing list in “S204” in
Also, at the time of outbound communication (packet reception from the honeynet side), the arithmetic control unit 16 decides whether or not a packet is received from a certain honey pot located at the honeynet side through the communication unit 17 in “S301” in
For example, it is assumed that a packet as shown by “PC61” in
Also, at this time, the unauthorized access information collection device 11 shall transfer a packet to the Internet using “210.220.230.240” among global addresses allocated to a private address of the honey pot 14 as a sending address.
If deciding that the packet is received from the certain honey pot located at the honeynet side through the communication unit 17 in “S301” in
When the arithmetic control unit 16 decides that the limit information about the source private address is not present in the communication control list in “S303” in
That is, information as shown in
For example, “3” is written into the portion shown by “ID71” in
Incidentally, the detection point identifier “3” indicates a point when a packet is transferred to the Internet side.
The arithmetic control unit 16 rewrites a source address of the received packet into a global address “210.220.230.240” in “S305” in
For example, the received packet is rewritten into a global address from a source address as shown by “CA61” in
On the other hand, in the case of deciding that the limit information is present in the communication control list in “S303” in
That is, information as shown in
For example, “4” is written into the portion shown by “ID81” in
Incidentally, the detection point identifier “4” indicates a point when a packet is discarded without transferring the packet to the Internet side.
With such an action, it is possible to collect unauthorized access information since a packet to which the detection point identifier is added is stored in the storage unit 18.
Also, a private address is allocated to each of the honey pots constructing a honeynet and plural global addresses are allocated to the private address by setting a routing table. Thus, when unauthorized access information about wide address space is collected, it becomes unnecessary to prepare a large number of honey pots (a network device, a server or the like) and the unauthorized access information about wide address space can be collected at low cost.
Also, the unauthorized access information collection device 51 performs communication control of a packet from the honeynet side to the Internet side based on a preset communication control list. Accordingly, for example, it is possible to prevent a honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
As a result of this, the unauthorized access information collection device is provided between the Internet and the honeynet, and also a private address is allocated to each of the honey pots constructing the honeynet and plural global addresses are allocated to the private address by setting a routing table. Then, a received packet is transferred and the packet into which a detection point identifier is written is recorded and communication control from the honeynet side to the Internet side is performed based on the set communication control list. Accordingly, it is possible to collect unauthorized access information about wide address space at low cost and, for example, it is possible to prevent the honey pot to which unauthorized access is made from being used as the ladder for an attack on other networks.
A display method of the unauthorized access information recorded thus will be now described further with reference to
In order to visualize a situation of communication between a terminal located at the Internet side and the unauthorized access information collection device, a situation of communication between the unauthorized access information collection device and a honey pot located at the honeynet side and a situation of communication between the terminal located at the Internet side and the honey pot located at the honeynet side in three dimensions, the arithmetic control unit 16 controls the display unit 19 and sets display coordinates of a configuration as shown in
In the display coordinates shown in
Also, IP address ranges of the respective axes of ordinates are “0.0.0.0” to “255.255.255.255” in the Internet plane shown by “IN91” in
Similarly, the IP address range is “the minimum IP address” to “the maximum IP address” of a private address (private address registered in the routing table) allocated to each honey pot in the honeynet plane shown by “HP91” in
On the other hand, port number ranges of the respective axes of abscissas are “0” to “65535” in the Internet plane, the Internet side device plane, the honeynet side device plane and the honeynet plane shown by “IN91”, “NI9”, “NH91” and “HP91” in
That is, the arithmetic control unit 16 visualizes a communication situation between the terminal of the Internet side and the unauthorized access information collection device between the Internet plane shown by “IN91” in
Further, a communication situation between the terminal of the Internet side and the honey pot of the honeynet side is visualized between the Internet plane shown by “IN91” in
However, in the following action explanation, the explanation about a port number which is the axis of abscissa will be properly omitted for simplicity of explanation.
The arithmetic control unit 16 reads a packet recorded at the time of the previous inbound communication or the outbound communication out of the storage unit 18 in “S401” in
For example, a detection point identifier is written into the portion shown by “ID31” in
The arithmetic control unit 16 decides whether or not the extracted detection point identifier is “1”, in other words, whether or not it is a point when a packet is received from the Internet side in “S403” in
If the detection point identifier is “1”, the read-out packet is constructed as shown in, for example,
Concretely, when a port number “80” of an IP address “210.220.230.240” is accessed from the Internet side, as shown in
In the case of deciding that the detection point identifier extracted in “S403” in
If the detection point identifier is “2”, the read-out packet is constructed as shown in, for example,
Concretely, when an IP address (global address) “210.220.230.240” is allocated to a private address “192.168.0.1”, as shown in
In the case of deciding that the detection point identifier extracted in “S405” in
When the detection point identifier is “3”, the read-out packet is constructed as shown in, for example,
Concretely, when a port number “35000” corresponding to an IP address (global address) “210.220.230.240” is accessed from the honeynet side, as shown in
In the case of deciding that the detection point identifier extracted in “S407” in
If the detection point identifier is “4”, the read-out packet is constructed as shown in, for example,
Concretely, when a global address (a port number is “6667”) is accessed from a private address “192.168.0.2” in which limit information is set from a honey pot infected with a bot having a private address “192.168.0.2”, the packet is discarded by the unauthorized access information collection device. Thus, as shown in
Finally, in the case of deciding that the detection point identifier extracted in “S409” in
Incidentally,
As a result of this, based on the recorded packet to which the detection point identifier is added, the arithmetic control unit makes a drawing between the Internet plane and the Internet side device plane with the line segment, makes a drawing between the honeynet side device plane and the honeynet plane with the line segment or makes a drawing between the Internet plane and the honeynet plane with the line segment. Accordingly, a communication situation between the respective devices can be displayed in three dimensions, so that an operating analysis can be easily performed.
In addition, in the description of the embodiment shown in
In this case, since drawing processing is performed by the management terminal 14, it is possible to reduce a load of drawing processing of the unauthorized access information collection device 10.
Also, in the description of the embodiment shown in
Also, in the description of the embodiment shown in
Also, in the description of the embodiment shown in
In this case, the protocol type of the packet passing through the respective devices can intuitively be separated and observed by color, so that operating analysis can be performed more easily.
Also, in the description of the embodiment shown in
Incidentally, as the marker, all shapes may be used as long as it is any shape such as any diagram or a line segment thicker and shorter than the line segment. Further, visibility can be improved by making luminance of the marker higher than ambient luminance (concretely, setting the luminance of the marker to be different from the ambient luminance).
In this case, since the marker moves toward a packet propagation direction so as to trace the line segment, the packet propagation direction can be grasped intuitively.
Also, in the description of the embodiment shown in
Also, in the description of the embodiment shown in
In this case, it is possible to intuitively grasp the behavior of a packet varying constantly.
Also, in the description of
Also, a routing table of the unauthorized access information collection device may be dynamically changed by a management terminal connected to the Internet. Further, a communication limit list of the unauthorized access information collection device may be dynamically changed by the management terminal connected to the Internet.
Also, as information stored in the routing table, an IP including a port number or a communication protocol as well as an IP address may be allocated to the respective honey pots.
Also, in the description of the embodiment shown in
Also, in the case of explanation of the embodiment shown in
Also, in the description of the embodiment shown in
Also, in the description of the embodiment shown in
For example, when a destination IP address is “210.220.230.240”, the destination IP address is converted into “240.230.220.210”.
In this case, when a honey pot continuously scans an IP address, line segments are separately displayed without overlapping mutually, and thus the visibility can be improved.
The present application is based on Japanese patent application No. 2007-004038, filed on Jan. 12, 2007, and the contents of which are hereby incorporated by reference.
Number | Date | Country | Kind |
---|---|---|---|
2007-004038 | Jan 2007 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2007/075213 | 12/27/2007 | WO | 00 | 7/9/2009 |