AG¹«Ë¾

AG¹«Ë¾

AG¹«Ë¾¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

Çå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ|ÍþвÊÓ²ìÆÊÎöÓïÑÔ¸ÅÊö

2021-04-19

ÓïÑÔµÄʵÖÊÔ´ÓÚ¹æÔò£¬×¼È·µÄ¹æÔòÊÇÇå¾²Âß¼­ÅбðµÄ±ê³ß £»ÓïÑÔµÄ÷ÈÁ¦ÔÚÓÚÈö²¥£¬ÓÐÓõÄÈö²¥ÊÇÇå¾²Ç鱨ÓëÊÖÒÕÍ»ÆÆÇå¾²ÐÅÏ¢¹ÂµºµÄÒªº¦Â·¾¶¡ £»ØÊ××ܽáÇå¾²ÖÇÄÜÓëÔËÓªÖÇÄÜÊÖÒÕµÄÑݽø£¬±ÊÕßÓú·¢ÒÔΪ£¬ÍøÂçÇå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ£¬ÐèÒªÉîÈë½â¶ÁÓë̽ÌÖ£¬ÒÔͨ¹ýÓïÑÔÄ£×ӵĹ¹½¨¡¢ÓïÒåµÄ»³±§£¬À´ÌáÉýÊý¾ÝÇý¶¯ÒªÁìÔÚÇå¾²³¡¾°Öеij°ôÐÔÓë˳ӦÐÔ¡£Òò´Ë£¬¡¶Çå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ¡·½«·Ö¶à¸öƪÕ£¬ÊáÀíÇå¾²ÕâÃÅÓïÑÔÒÕÊõµÄÊÖÒÕ˼Ë÷ÓëʵÏÖ£¬ÏÈÈÝ×Ô¶¯»¯ÓëÖÇÄÜ»¯ÊÖ¶ÎÔõÑùÖúÁ¦ÐµÄÇå¾²ÓïÑÔÉè¼ÆºÍÓ¦Óá£

±¾ÎÄΪϵÁÐÊׯª£¬½«Ç³Ì¸¶ÔÇå¾²ÁìÓòרÓÃÓïÑÔµÄ˼Ë÷£¬½ø¶ø¸ÅÊö×ܽáÃæÏòÍþвá÷ÁÔµÄÊÓ²ìÆÊÎöÓïÑÔ£¨Threat Hunting Investigation and Analysis Language£©ÊÖÒÕÓë¼Æ»®¡£

Ò»¡¢  Çå¾²Êý¾ÝÆÊÎöÊÖÒÕÓëÁìÓòרÓÃÓïÑÔ

ÊìϤÇå¾²ÁìÓòѧÊõÂÛÎĵÄÅóÙ­Ó¦¸Ã¶¼ÓÐÌå»á£¬ÂÛÖ¤Êý¾ÝÇý¶¯µÄ£¨Data driven£©ºÍÖÇÄÜÇý¶¯µÄ£¨AI driven£©ÒªÁìÏà¶Ô¹Å°åÒªÁìµÄÓÐÓÃÐÔ£¬Ò»Ñùƽ³£»á°Ñ»ùÓÚ¹æÔòµÄ£¨Rule based£©ÒªÁìÄóöÀ´±ÈÕÕһϡ£ÔÚÊý¾Ý¹ýÔØµÄʱ´úÅä¾°Ï£¬Çå¾²´óÊý¾Ý¸øÌáÈ¡Ö¸ÎÆÌØÕ÷¡¢Ð´¼ì²â¹æÔòÕâÖֹŰ崿ÊÖ¹¤µÄÇå¾²·À»¤Ä£Ê½³öÁ˶àµÀÄÑÌ⣺¹æÔòµÄ·º»¯ÄÜÁ¦¡¢Ë³Ó¦ÐÔ¡¢ÁýÕÖÂʵÈÖ¸±êÔõÑù¸úÉÏÊý¾Ý¡¢³¡¾°¡¢ÊÖ·¨ÊýÄ¿µÄ±¬Õ¨Ê½ÔöÌí¡£

´Ëʱ£¬»úеѧϰ¡¢Éî¶Èѧϰ¡¢Í¼Ëã·¨µÈÊý¾ÝÇý¶¯µÄÒªÁìµÄÓÅÔ½ÐÔ¾ÍÌåÏÖ³öÀ´ÁË¡£Êý¾ÝÖÐÔ̺¬µÄ¼ÍÂɺÍģʽ£¬ÊÇ¿ÉÒÔͨ¹ýÊý¾ÝÍÚ¾òµÄÒªÁì·ºÆð³öÀ´µÄ¡£Á÷Á¿ÌØÕ÷¡¢Ñù±¾ÌØÕ÷¡¢±àÂëÌØÕ÷¡¢ÐòÁÐÌØÕ÷¡¢¹ØÁªÌØÕ÷¡¢Ê±ÐòÌØÕ÷µÈµÈ£¬ÕâЩҪº¦µÄÊý×Öά¶ÈÄܹ»ÔÚûÓÐר¼Ò¼ÓÈëµÄÇéÐÎÏ£¬ÔÚÏÞÖÆÌõ¼þÏÂÍê³É¼ì²â¡¢ËÝÔ´¡¢ÆÀ¹ÀµÈʹÃü¡£ÕâÀïµÄ“ÏÞÖÆÌõ¼þ”ÊÇÒ»¸öÒªº¦µÄÎÊÌâ¡£Öî¶àʵÑéÐÔÄ£×ÓÓëËã·¨£¬ÔÚʵս»¯µÄÇå¾²ÔËÓªÖÐÄÑÒÔÓÐÓÃʩչ×÷Óá£Ö÷Ҫƿ¾±ÌåÏÖÔÚ£º

l  Òì¹¹¶àÔ´Êý¾ÝǷȱ¹æ·¶Ô¼Êø¡£Êý¾ÝÊÕÂÞϵͳËùÍøÂçµÄÊý¾ÝÍêÕû¶È£¬°üÀ¨»ù´¡µÄ×Ö¶ÎÍêÕûÐÔ£¬ÐÅÏ¢Á÷µÄÃè»æÍêÕûÐÔ£¬ÐÅÏ¢¹éÊôµÄÍêÕûÐԵȵÈ£¬ÄÑÒÔÓÐÓõġ¢¹æ·¶»¯µÄÁô´æ¡£Óë´Ëͬʱ£¬Êý¾ÝÆÊÎöÖеÄѵÁ·Êý¾Ý¼¯ÍùÍù¾­ÓɶàÂִεÄϴ媡¢¹ýÂ˺ͱê¼Ç¡£¶øÏÖʵ°²ÅÅÇéÐÎÏ£¬ÀíÏëµÄÊý¾ÝÂþÑܼÙÉè¿Õ¼äÄÑÒÔÁýÕÖÖØ´ó¶¯Ì¬µÄÍøÂçÇéÐÎÓë¹¥»÷¼¼Õ½Êõת±ä¡£

l  Ä£×ÓºÚºÐȱ·¦¿ÉÚ¹ÊÍÐÔ¡£Ä³Ð©ÖØ´ó¸ßÈÝÁ¿µÄÄ£×Ó£¬¶Ëµ½¶ËµÄ¸ø³öµÄÕ¹ÍûЧ¹û£¬ÎÞÂÛÊǶñÒâµÄÁ÷Á¿»òÑù±¾£¬»òÊǸßΣº¦µÄ¸æ¾¯£¬¶¼ÎÞ·¨Í¬Ê±¸ø³öºÏÀíµÄ×ôÖ¤¡£ÕâÔÚÔËÓª»·½ÚÖдøÀ´ÖØ´óµÄÆÊÎö±¾Ç®¡£

l  ͳ¼ÆÊý¾ÝØÑ·¦ÓïÒåÄÚÔÚ¡£Óëȱ·¦¿ÉÚ¹ÊÍÐÔÏà¹Ø£¬Í³¼ÆÇý¶¯µÄ»úеѧϰҪÁìϰµÃµÄÊý¾Ýģʽ£¬²»×ÜÊÇÄܹ»Æ¥ÅäÇå¾²ÂÄÀúÓëÖ±¾õ£¬¶Ô²»ÆëÇå¾²µÄ¹Ø×¢½¹µã¡£¾Ù¸öÀý×Ó£¬Òì³£¼ì²âÊÇÇå¾²ÖÇÄÜÊÖÒÕÖеÄÖ÷Òª×é³ÉÖ®Ò»¡£È»¶ø£¬Òì֪ʶ±ðµÄά¶È¿ÉÔ´ÓÚ¶àÖÖÀàÐ͵ÄÊý¾Ýͳ¼ÆÎ¬¶È£¬ÀýÈçÃܶȡ¢¾àÀë¡¢¹ØÁªÐԵȵÈ¡£ÕâЩͳ¼ÆÎ¬¶ÈµÄÀëÉ¢µã£¬ÐèÒªÔÚÇå¾²³¡¾°Öиø¶¨Ò»¸ö¶ÔÓ¦µÄÓïÒ廯“ãÐÖµ”²Å»ªÓÐDZÔÚµÄÇå¾²¼ÄÒå¡£

l  ÊÕÂÞÊý¾ÝÒþ˽й¶ÒþÓÇ¡£Êý¾ÝʹÓÃÓëÊý¾ÝÒþ˽± £»¤Ö®¼äµÄ¶Ô¿¹ÓëÆ½ºâ£¬Ê¼ÖÕÊÇÇå¾²ÊÖÒÕÉý¼¶µÄÇý¶¯Á¦Ö®Ò»¡£Ëæ×ÅÇå¾²·ÀÓùÍøÂçµÄÊý¾ÝÆÕ±éÐÔºÍÉî¶ÈµÄÌáÉý£¬±»ÊÕÂ޶˵ÄÊý¾ÝËùÓÐÕß¶ÔÊÕÂÞϵͳµÄµÖ´¥ÐÄÀíÓú·¢Ã÷ÏÔ¡£Êý¾Ý´ÓÃ÷Îĵ½¼ÓÃÜ£¬ÉõÖÁ¾Ü¾ø“³ö¾³”£¬ÕâЩ¶¼ÏÞÖÆÁËÊý¾ÝÇýÏÂÊÖÒռƻ®µÄÂ䵨¡£

ÉÏÊöö¾ÙµÄ¶à¸öÊÖÒÕÆ¿¾±£¬¸øÊý¾ÝÍÚ¾òÒªÁìµÄÇå¾²Ó¦ÓüÓÈëÁ˲»ÉÙÏÞÖÆ¡£ÓëÖ®Ïà¶ÔÓ¦µÄÊÇ£¬Çå¾²ÊÖÒյĹ¤ÒµÊµÏÖÖУ¬Óë¹¥»÷·½ÎäÆ÷¿âÏà¶ÔÓ¦µÄ£¬ÖÖÖÖÀàÐ͵ĹæÔòÈÔÈ»ÊÇ×îÃû¹óµÄÇ鱨սÂÔ×ÊÔ´ £»ÖÖÖÖÀà¼ì²â·ÀÓùϵͳµÄ½¹µãµ¥Î»£¬¾ø´ó²¿·ÖÕվɹæÔòÒýÇæ£¬¶ø²»ÊÇij¸ö»ùÓÚ»úеѧϰµÄ¼ì²âÄ£×Ó¡£ÄÇô£¬ÊÇ·ñÓÐÒ»Ì죬µ±Ä£×ÓµÄ׼ȷÐÔ×ã¹»¸ß¡¢·º»¯ÄÜÁ¦×㹻ǿ£¬Ä£×ÓÓëËã·¨½«Í³Ò»Çå¾²·ÀÓùϵͳµÄÌìÏÂÄØ£¿ÖÇÄÜ»¯ÊÖ¶ÎÓëÒªÁ죬Ӧ¸ÃÔÚÇå¾²³¡¾°ÖÐʩչÔõÑùµÄ×÷ÓÃÄØ£¿

Ϊ»Ø¸²ÉÏÊöÎÊÌ⣬ÎÞ·ÁÉèÏëºÍ»ØÊ×ÍøÂçÇå¾²µÄʵÖÊ¡£Çå¾²¿ÉÒÔÒÔΪÊÇÒ»ÖÖ״̬£¬ÔÚÕâÖÖ״̬Ï£¬ÈË¡¢ÏµÍ³¡¢¹¤ÒµµÈÏÖʵ»òÐéÄâʵÌåδÊܵ½ÍþвÓëË𺦡£ÄÇôÔõô½ç¶¨ÓëÆÀ¼ÛʵÌåÊÇ·ñÊܵ½ÍþвºÍËðº¦ÄØ£¿±ÊÕßÒÔΪÆäÖеÄÒªº¦ÔÚÓÚ“Á¢·¨”£¬Ò²¾ÍÊÇÉ趨½çÏßÓë¹æÔò£¬¶ÔÔ½½ç¡¢Î¥¹æÐÐΪ¾ÙÐд¦·Ö¡£ÕâÀïµÄ“·¨”²»ÌØÖ¸Ö´·¨»òÕßÖ´·¨£¬¶øÊÇÇ¿µ÷½çÏßÓë¹æÔòµÄÖ÷ÒªÐÔ¡£“²»ÒÔ¹æÔò£¬²»¿É³ÉÖÜÔ┣¬ÔÚÍøÂçÇå¾²µÄ³¡¾°ÏÂÃ÷ȷʹÃü½çÏßÓÈΪҪº¦¡£¶øÇå¾²³¡¾°ÏÂÖ´ÐÐʹÃüµÄÒªº¦£¬ÔòÔÚÓÚ“ÒÀ·¨”Ö´ÐÐÓë“Ö´·¨”͸Ã÷¡£ÒÔÉÏ¿Éͳ³ÆÎª“ÒÀ·¨”ÊôÐÔ¡£Çå¾²ÐÐÒµµÄ“ÒÀ·¨”ÊôÐÔ£¬¾öÒéÁ˹æÔòÒýÇæµÄÇå¾²ÊÖÒÕµ××ù½¹µãְλ¡£´ÓÕâ¸ö½Ç¶ÈÀ´¿´£¬Êý¾ÝÇý¶¯µÄÄ£×ÓµÄÖ÷Ҫƿ¾±£¬ÔÚÓÚÆä¶Ô½çÏß½ç˵µÄÄ£ºýÐÔ¡£Ä£ºýµÄ½çÏß½ç˵¸øÍ³¼ÆÀàÄ£×Ó¸¶ÓëÁËÁè¼Ý¹æÔòµÄÎÞаÐÔ£¬µ«Í¬Ê±×¢¶¨ÁËÆäÎÞ·¨¶ÔÈκÎÊÂÎñÆÊÎö¸ø³öÃ÷È·µÄÔðÈλ®¶¨¡£ÒÔÊÇ¿ÉÒԵóöÕâÑùµÄÖÊÆÓ½áÂÛ£ºÊý¾ÝÇý¶¯ÒªÁìÓ¦µ±ÓÃÓÚ¸¨ÖúÇå¾²“Á¢·¨”Óë“Ö´·¨”£¬¶ø²»Ó¦¸ÃÊÇ“Á¢·¨”Óë“Ö´·¨”µÄÖ÷Ìå¡£

AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø

ͼ1   Íþв¼ì²âÁìÓòµÄ¾­µäÓïÑÔ

»Øµ½±¾ÎĵÄÖ÷Ì⣬ËùνÓïÑÔ£¬ÕýÊǹæÔòµÄÜöÝÍ£¬ÊÇ“·¨”µÄÏêϸÌåÏÖÐÎʽ¡£Ò»Ì×ÃæÏòÌØ¶¨³¡¾°µÄ¡¢×Ô³ÉϵͳµÄ¹æÔòϵͳ£¬¿É³ÆÎªÒ»ÖÖÁìÓòÓïÑÔ £»¶øÐÎò»òÕß½ç˵¹æÔòϵͳµÄ¹æÔò£¬¿É³ÆÎªÁìÓòÓïÑÔµÄÓïÑÔ£¬¼´ÔªÓï¡ £»Øµ½ÍøÂçÇå¾²ÁìÓò£¬½ÏÁ¿¾­µäµÄ¹æÔòϵͳ£¬°üÀ¨ÓÃÓÚÁ÷Á¿¹¥»÷¼ì²âµÄSnort¹æÔò£¬ÓÃÓÚ¶ñÒâÎļþ¼ì²âµÄYARA¹æÔò£¬ÓÃÓÚÈÕÖ¾Íþв¼ì²âµÄSigma¹æÔòµÈµÈ¡£ÕâЩ¹æÔòϵͳ¶¼×Ô³Éϵͳ£¬ÐγÉÁìÓòרÓõÄÓïÑÔϵͳ¡£¶øSnort¡¢YARA¡¢Sigma¹æÔòµÄÌÜд¹æ·¶Óë¹æÔò£¬¾ÍÊÇÆä¶ÔÓ¦µÄÔªÓï¡£

Çå¾²ÁìÓòרÓÃÓïÑÔ£¨Domain Specific Language For Security£©£¬ÔÚÍþв¼ì²âµÄ¸÷¸öÁìÓò£¬¶¼¾ßÓкÜÇ¿µÄͳÖÎְλ¡£ÕâÖÖ¹æÔòϵͳµÄÍêÉÆ£¬»ò³ÆÎªÓïÑÔϵͳµÄ³ÉÊ죬»á³ä·ÖÑéÕ¹ÓïÑԵĹ淶ÐÔ¡¢±í´ïÁ¦£¬ÓÐÓÃÌáÉýÆä×Ô¼ºµÄÈö²¥ÐÔÓëÓ°ÏìÁ¦¡£½üÄêÀ´ATT&CK֪ʶ¿âµÄ·çÐУ¬ÕýµÃÒæÓÚÍþв·ÖÀàÓëÐÎòԪÓïÉè¼ÆµÄÍêÕûÐÔÓë±í´ïÁ¦¡£

¶þ¡¢  Íþвá÷ÁÔÊÓ²ìÆÊÎöÓïÑÔ¸ÅÊö

ÓïÑÔµÄÉè¼ÆÔ´ÓÚ¿ÆÑ§µÄÈÏÖª£¬Ò²¸üÒÀÀµ¶ÔÊÂÎïÃ÷È·µÄÒÕÊõ¡£±ê×¼ÓïÑÔ£¬ÀàËÆÍ¨Ë×»°£¬Äܹ»Ôö½øÐÅÏ¢µÄ½»Á÷ÓëÈö²¥£¬ïÔÌ­ÐÅÏ¢¹ÂµºÐ§Ó¦¡£ÔÚÇå¾²ÁìÓò£¬³ýÁËÉÏÊöÌáµ½µÄ¼ì²âÓïÑÔ£¬ÍþвÇ鱨¹æ·¶STIX£¬¶ñÒâÈí¼þÐÎòÓïÑÔMAEC£¬Íþв¼ì²â¿ò¼ÜATT&CKµÈµÈ£¬¶¼ÊǾßÓÐÆÕ±éÓ°ÏìÁ¦µÄÁìÓòÐÅÏ¢½»Á÷ÓëÐÎòÓïÑÔ£¬ËäÈ»·×Æç¶¨³ÆÎª±ê×¼£¬µ«ÆäÓ°ÏìÁ¦±»ÐÐÒµÆÕ±éÈϿɡ£±ê×¼ÓïÑÔµÄÀֳɯռ°Ò»·½ÃæÒÀÀµÓÚ¹¤ÒµÊÖÒյijÉÊ죬ÁíÒ»·½ÃæÐèҪǿÓÐÁ¦µÄÐÐÒµÏòµ¼ÕßÀ´Íƶ¯¡£³ýÁ˱ê×¼ÓïÑÔ£¬¶¨ÖÆÓïÑÔÒ²ºÜÖ÷Òª£¬ÀàËÆ·½ÑÔ£¬Äܹ»ÌáÉý¾Ö²¿ÐÅÏ¢µÄ¸ßЧÁ÷תÓë¾öÒéʵÑé¡£¶¨ÖÆÓïÑÔ¾ÍÊÇΪÁËЧÂʶøÉú£¬Ò»Ç§¸ö³ÉÊì³§É̾ͿÉÄÜÓÐһǧ¸ö¶¨ÖƵļì²â¹æÔòÒýÇæÏµÍ³¡£

ÎÒÃÇÒѾ­¿´µ½£¬ÔÚÍþв¼ì²âÁìÓò£¬¼´¶¨Î»ÍþвµÄÒªÁìÂÛÉÏ£¬ÒѾ­ÓнÏΪ³ÉÊìµÄÓïÑÔϵͳ¡£µ«Ëæ×Ÿ߼¶¹¥»÷¼¼Õ½ÊõµÄÑݽøÓë¹¥»÷ÃæµÄÍØÕ¹£¬ÍþвÆÊÎöÒѾ­²»µ«ÏÞÓÚ³õ¼¶µÄÍþв¶¨Î»¡£×Ô¶¯µÄÍþвá÷ÁÔ£¬¶ÔÎÞаµÄÍþв¶¨Î»¡¢¸ßЧµÄÉÏÏÂÎÄÍØÕ¹¡¢¾«×¼µÄ·¾¶ËÝÔ´Ìá³öÁ˸ü¸ßµÄÒªÇ󡣹ŰåÁ÷Á¿¡¢Ñù±¾¡¢Ç鱨¡¢ÈÕÖ¾·ÖÁ¢µÄ“ÓïÑÔÄ£×Ó”Óë¹æÔòϵͳ£¬ÒѾ­ÄÑÒÔ˳Ӧ¿ç¶àÔ´¡¢¶àÀàÐÍÈÕÖ¾µÄÍþвÊÓ²ìÓëÆÊÎöÐèÇó¡£

ͼ2   й¶µÄFireEye¹¥»÷¹¤¾ß¼ì²âÒªÁì¸ÅÊö

Èçͼ1Ëùʾ£¬ÎªÁËÓ¦¶Ô¹¥»÷¹¤¾ß¼¯Ð¹Â¶£¬FireEye¸ø³öÁËÊý°ÙÌõ¼ì²â¹æÔò£¬ÆäÖаüÀ¨Snort¡¢Yara¡¢ClamAV¡¢HXIOCµÈ¶àÖÖÓïÑÔÃûÌÃ[1]¡£Ö»¹ÜÏà¹Ø¹æÔò¶¼ÊǸ÷×ÔÁìÓòµÄϵͳÖеÄÓïÑÔ“±ê×¼”£¬µ«ÔÚÇå¾²ÔËÓªÖÐÐÄÈÕ½¥³ÉÊìµÄ½ñÌ죬ȱ·¦Ò»ÖÖ¸üÎÞаµÄ¡¢Äܹ»ÓÐÓÃÁýÕÖ¶àÖÖÈÕÖ¾Êý¾ÝµÄ±ê×¼ÓïÑÔ£¬Ö§³Ö½»»¥Ê½µÄÍþвÊÓ²ìÓëÆÊÎö£¬ÕâÎÞÒÉÊÇÊÖÒÕÉú³¤µÄÍ´µãÖ®Ò»¡£±ðµÄ£¬ÕâЩ¹æÔòϵͳÈÔÈ»ÆÕ±é¾ÖÏÞÓÚ»ùÓÚIOCµÄÌØÕ÷Ö¸ÎÆÆ¥ÅäÔ¤¶¨Î»¹¦Ð§£¬ÎÞ·¨²¶»ñÍþвÊÂÎñµÄʱÐòÒÀÀµ¡¢ÐÅÏ¢Á÷ÒÀÀµµÈÖØ´ó¹ØÏµÌØÕ÷¡£

ËäȻȱ·¦ÊÂʵµÄ¹«ÈÏÒªÁìÓë±ê×¼£¬¿ÉÊÇÃæÏò×Ô¶¯Íþвá÷ÁÔ³¡¾°ÏµÄÍþвÊÓ²ìÓëÆÊÎö£¬¹¤Òµ½çÓëѧÊõ½çÍŶÓÈÔÈ»¸ø³öÁ˲»ÉÙ“·½ÑÔ”°æÊµÑ飬ÒÔÏÂͨ¹ý±í¸ñ¸ÅÊö¼¸ÖÖÇ°ÑØÊÖÒռƻ®¡£

±í1   ÍþвÊÓ²ìÆÊÎöÓïÑÔ×ܽá

Èç±í1Ëùʾ£¬ÎÒÃÇÖ÷Òª´Ó¸ÃÓïÑÔÄ£×ÓÕë¶ÔµÄÊý¾ÝÀàÐÍ¡¢Ö§³ÖµÄģʽÀàÐÍ¡¢ÊµÊ±ÐÔÈý¸ö½Ç¶ÈÀ´ÆðÔ´±ê¶¨¸÷ÊÖÒռƻ®Ö÷ÒªµÄÓ¦ÓÃÁìÓòÓë·½·¨¡£Êý¾ÝÀàÐÍ·½Ã棬ÐÐΪ¡¢ÇéÐΡ¢Ç鱨¡¢ÖªÊ¶ËÄÖÖÀàÐ͵ÄÊý¾Ý¿ÉÁýÕÖÇå¾²ÔËÓªÖÐÐÄËù½ÓÈëµÄ²î±ðÀàÐÍÊý¾Ý¡£ÔÚģʽÀàÐÍÖУ¬“µ¥µã”Ö¸µÄÊÇÒÔÌØÕ÷»òÖ¸ÎÆÆ¥ÅäΪÖ÷µÄµ¥¸öÊÂÎñģʽ £»“ÜöÝÍ”ÌåÏÖ¶à¸öÊÂÎñµÄÎÞÐò×éºÏ £»“ÐòÁДÌåÏÖÓÐÐòµÄÊÂÎñ×éºÏ £»“¾²Ì¬Í¼”ÌåÏÖÐÅÏ¢Á÷»ò½á¹¹Ïà¹ØµÄÊÂÎñ×éºÏ £»“ʱÐòͼ”ÌåÏÖÓÐÐò²¢ÇÒ±£´æÐÅÏ¢¹ØÁªµÄÊÂÎñ×éºÏ £»“Ä£×Ó”ÌåÏÖ»ùÓÚ»úеѧϰµÈÄ£×ÓÒªÁ죬ÔÚͳ¼ÆÌØÕ÷ÉϿɹØÁªÆðÀ´µÄÊÂÎñ×éºÏ¡£ÊµÊ±ÐÔ·½Ã棬Ö÷Òª°üÀ¨Á÷ʽµÄÆÊÎöģʽºÍÅúÁ¿µÄÊÓ²ìģʽ¡£

ÍþвÊÓ²ìÆÊÎöÓïÑÔ£¬½¹µãÔÚÓÚ“±í´ïÁ¦”£¬¼´ÄÜ·ñÎÞаµÄÖ§³ÖÍþвá÷ÁÔÀú³ÌÖеÄÒ»Á¬ÑéÖ¤Àú³Ì¡£Îª´Ë£¬Êý¾ÝÀàÐÍÁýÕÖÔ½ÖÜÈ«£¬Ö§³ÖµÄÊÂÎñģʽÀàÐÍÔ½¸»ºñ£¬ÓïÑԵıí´ïÄÜÁ¦Ô½Ç¿£¬Ô½Äܹ»ÓÐÓõĽµµÍÊÓ²ìÀú³ÌÖеĿçÊý¾Ý¿ªÏúºÍÖØ´óÊÂÎñ¹ØÁªÆÊÎö¿ªÏú¡£ÍþвÊÓ²ìÆÊÎöÓïÑÔ²»ÏÞÓÚ±íÖÐ×ܽáµÄ¼¸ÖÖʵÏּƻ®¡£ÈçǰÎÄËùÊö£¬Ä¿½ñÕë¶ÔÍþвÊÓ²ìÁìÓòÓïÑÔµÄÉè¼Æ£¬Òµ½çÉд¦ÓÚ̽Ë÷Ö®ÖУ¬ÊÇÇ徲ѧÊõÓ빤ҵÑо¿ÖеÄÖ÷Òª¿ÎÌâÖ®Ò»¡£ÏÞÓÚÆª·ù£¬±¾ÎļòÒª×ܽáÔÚ´Ë£¬¸ÐÐËȤµÄ¶ÁÕß¿ÉÔڲο¼ÎÄÏ×»ò×ÊÁÏÖÐÉîÈëÑо¿ÏêϸµÄÊÖÒÕʵÏÖ¡£

Èý¡¢  ×ܽá

ÓëÓïÑԵĽ¨Ä£ÓëÆÊÎöÏà¹Ø£¬Ç徲֪ʶ¿â¡¢ÖªÊ¶Í¼Æ×¡¢ÓïÒåÆÊÎö¡¢¿ÉÚ¹ÊÍÖÇÄÜ¡¢Òò¹ûÍÚ¾òµÈµÈ£¬ÕâЩÊÖÒÕÃû´ÊÒѾ­Öð½¥ÈÚÈëÇå¾²ÊÖÒÕÉú³¤µÄÊÓÒ°ÖС£Å×È¥×·ÖðÈÈÃŵIJ¿·Ö£¬´ÓÓïÑÔÉè¼ÆÓëÓ¦ÓõĽǶÈÉóÔÄÇå¾²ÊÖÒÕµÄÉú³¤£¬ÄܸüÇåÎúµÄÉóÔÄÎÒÃÇΪʲôҪ×öÓëÔõÑù×ö¡£

 

²Î¿¼ÎÄÏ×

[1]     https://github.com/fireeye/red_team_tool_countermeasures

[2]     https://github.com/endgameinc/eql

[3]     Noel S, Harley E, Tam K H, et al.: CyGraph: graph-based analytics and visualization for cybersecurity, Handbook of Statistics: Elsevier, 2016: 117-167.

[4]     Shu X, Araujo F, Schales D L, et al. Threat Intelligence Computing[C]. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018: 1883-1898.

[5]     https://github.com/SigmaHQ/sigma

[6]     https://ci.apache.org/projects/flink/flink-docs-stable/dev/libs/cep.html

[7]     Gao P, Shao F, Liu X, et al. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence[J]. arXiv preprint arXiv:2010.13637, 2020.

[8]     Gao P, Xiao X, Li D, et al. {SAQL}: A stream-based query system for real-time abnormal system behavior detection[C]. 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018: 639-656.

[9]     Gao P, Xiao X, Li Z, et al. {AIQL}: Enabling efficient attack investigation from system monitoring data[C]. 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 2018: 113-126.

?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈëAG¹«Ë¾¿Æ¼¼£¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
  • Ìá½»µ½ÓÊÏä
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
AG¹«Ë¾¿Æ¼¼ÉçÇø
AG¹«Ë¾¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷

? 2025 NSFOCUS AG¹«Ë¾¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼