basic design concept
Project Overview
Construction objectives, construction content and construction period
The construction objectives of this project are: the construction of CTOS system-related servers, terminals, networks and supporting security equipment, etc., to improve the operational efficiency of Sri Lanka terminals through informatization, strengthen the information security monitoring and early-warning capacity of Sri Lanka terminal units, mainly to solve the current information security monitoring and early-warning capacity of Sri Lanka terminals' networks is weak, a single source of data and other issues, and further improve the network security monitoring and early-warning capacity of Sri Lanka terminals. The main purpose of this project is to solve the problems of weak information security monitoring and early warning capability of the Sri Lankan terminal network, further improve the monitoring and early warning capability of network emergencies, and realize the closed-loop management of monitoring, early warning, notification, rectification, feedback and analysis of the overall network security risks.
Through the deployment of monitoring management platform, network security monitoring probes, etc., to achieve effective discovery of unknown threat attacks, to achieve the effect of upgrading from local security to global security, from single-point warning to collaborative warning, and from fuzzy management to quantitative management.
The main construction elements of this project are:
CTOS server construction;
CTOS system supporting terminal construction;
Security awareness platform, WAF firewall, load balancing construction;
CTOS supporting network construction;
Delivery time: 30 natural days from the date of entry into force of the contract;
On-site implementation duration: After the arrival of the subject goods 45natural days, complete the deployment and implementation of the system in accordance with the implementation requirements of the procurement requirements;
demand analysis
server equipment
2servers will be used for database servers,Oracledatabase and dataguardshould run on these servers as production databases and disaster recovery systems.
Windows Server 2019 English Standard Edition (set of 6 ) and Red Hat Enterprise Linux OEM (2). dl-uid="7">sets)are required for the server.
2Set of access switches(48aGE RJ45, 4. uid="8">aSFP + ports) with to act as a serverconnection.
AvailabilityAll hardware and software products provided must be mature and widely available and remain state-of-the-art. The system shall consist of mature products and technologies that are not in the nature of a pilot system, and these products and technologies shall have users with successful applications. The system shall be state-of-the-art and robust for this phase and be provided with an application assurance license for five or more years.
OpennessThe system's design specifications, technical specifications, and products are all in line with the international and industry standards for open systems, and it has the ability to support a wide range of products. All products used in the system must comply with relevant international and national standards, and it is an open and compatible system that can be interconnected between different systems.
High EfficiencyThe server must have strong real-time processing capabilities to meet the needs of the bidding terminal's production applications and should be able to provide fast response and high throughput for end-users' business transactions in a relatively idle state or during peak traffic.
ScalabilityBidding servers and storage systems need to be more than twice as vertically and horizontally scalable to support system upgrades while protecting the cost of the original investment.
High reliabilityIndividual devices must be highly reliable. If there is a single point of failure in the core equipment, it should be switched to the disaster environment in a timely manner. The entire system must be highly fault-tolerant and must have a detailed redundant backup program.
IntegrityContractors must ensure the integrity of the system design, that the hardware and software versions of the system are fully compatible, and that each part (component) of the system ensures the normal and stable operation of the entire system.
StabilityNatureThe system design should identify the necessary protective measures and present the relevant site and environmental requirements to ensure that in the event of a power outage or momentary power loss, the hardware and software performance will not be affected in any way. The hardware should be protected against overload, voltage rise and current increase, and the hardware should have a certain carrying capacity for any non-control operation.
The system must provide fault monitoring and diagnostic tools for both hardware devices and system software.
wireless device
In order to realize the information management operation of on-site loading and unloading of container terminals, so that quay cranes, tire gantry cranes,ITV, on-site handheld terminals and other wireless devices can access the employer's backbone through the public LTE network system.
Holding terminals and other auxiliary equipment.
Carrier terminals and other auxiliary equipment.
This project requires the contractor to provide ancillary software such as device drivers and software.
The contractor is responsible for completing the design, integration, and installation,
Debugging, system tuning, security control, interconnection with wired network, connection with production system and application testing, performance tuning, full acceptance check until the system is in normal production operation.
Development of various technical training programs and provision of comprehensive training Development of various technical training programs and provision of comprehensive training
Installation, operation, management, and maintenance of wireless terminal equipment.
Throughout the course of the project, the contractor must provide
Various technical documents in English conforming to Sri Lankan national standards and internationally recognized standards
Procurement, construction, delivery, assembly, installation, testing, commissioning, system tuning and handover of the following:
(a) 15SetHand-held terminal
(b) 5SetsHHTMulti-Charger
(c) 26SetRTG/RMGTerminal
(d) 35SetVMTTerminal
HIPG Cybersecurity Construction
Establishing a comprehensive port network security system, improving network availability, protection and emergency response capabilities, and ensuring the safe and stable operation of port information systems. At present, HIPG has 2 core switches: one One is located in the Administration Building (primary data center) and the other is located in the Engineering Operation Building (backup data center), adopting a star network architecture with dual switches. The core switch of the backup data center is connected to the core switch of the administration building in Layer 3 routing mode. The core switches in the backup data center are mainly used for office network access in the Work Building, Marline Building and Shop Building. The core switches in the administration building are primarily used for servers and office network access in the administration building. The two core switches are connected to different systems through VLANs . There are 2 firewalls connected to the core switch in the administration building, and 2 firewalls connected to the core switch. uid="13"> a dedicated line to the Internet.
With the development of the network, the Internet has gradually become indispensable in people's livesan important reliance, but the problem of information security is also higher. uid="3">but the problem of information securityisalsogrowing more and more criticalwith it. uid="7">. In recent years,information securityproblems have become increasingly serious. span>has become a hotspot for industry attention and discussion. Currently,Traditional cybersecurity threats such as Trojan Horses, Botnets, and Phishing sites continue unabated. Distributed Denial of Service (DDOS attacks), Advanced Persistent Threats (APT attacks) and other new types of cyberattacks are intensifying.
In the face of today's more and more serious security situation, the traditional security system is also facing a huge challenges. Data shows that more than 100,000 organizations have suffered data breaches, with nearly half of the Fortune 500 included, as security incidents have impacted numerous executives who have resigned from their companies. This is due to APT advanced persistent attacks caused by APT attacks with its unique attack methods and means, making the traditional security defense tools have been insufficient for effective defense. APT attacks are not a whole, but the integration of many invasion and penetration techniques to achieve the stealthy attack techniques, can be gradually completed over a long period of time to break through, penetration, eavesdropping, stealing data and other tasks. ,which embodies the characteristics of two aspects - "targeted" and "persistence".
The main target industries for APT attacksaregovernments,< span data-dl-uid="4">military,financial institutions, telecommunicationand other industries,The main wayis through email, social networking sites, system vulnerabilities, viruses, etc.A range of ways to invadeuser computers. Enterprises can't defend against APT attacks,mostly because they can't detect APTattackshow and by what means,becauseAPT attack is an unknown threat, it is impossible to determine its attackroute and channel, it has strong stealth and persistence,it can lurk in computers for a long timewithout being detected.
Not counting the process of preliminary reconnaissance and information acquisition, it takes an attacker only a few hours from the time of execution to the time of compromise, compared to more than 84 percent ofunits It takes weeks or even more than a month to discover a hacker attack, followed by days to weeks to complete the response and dispositionwork.
Traditional defenses rely on firewall technology,intrusion detection technologyantivirus technology,Any user, at the very beginning of the face of the security problem, to consider often is this three, the traditional defense defenseis this three. span>Althoughit has played a great role, it stillfacesmany new problems.
First of all, the user's system, although the deployment of firewalls, but still can not avoid the worm flood, spam, viruses, and denial of service infestation. There are inherent shortcomings in the early warning of individual products for intrusion detection that have not been deployed on a large scale, and there is still a lot of room for precise targeting and global management.
Secondly, although many users have installed antivirus products on standalone computers and terminals, the security of the intranet is not only a matter of antivirus, but also includes the implementation of security policies, foreign internet security. Anti-virus products are installed on individual computers and endpoints, but intranet security is not just about anti-virus, it also includes enforcement of security policies, external intrusion, patch management, and compliance management.
So, although the traditional defensestill plays an important role, users have gradually felt its inadequacybecauseit is no longer able todetect and defend againstnew types of attacks. Simply put, cyberattack technology has outpaced the defense techniques used by most organizations today.
Construction program
DesignPrinciples
The entire system should utilize the most mature and advanced technologies from various industries, such as IT network management, container operation management, shipping and logistics management. Vessel traffic management, etc. These systems must be recognized as industry-leading products.
Efficiency: Ensures uninterrupted high operational performance of containerized operations under high loads 24/7/365.
High reliability: Redundant components and functions should be designed for the entire system and must be very comprehensive and complete.
High security: As Internet-based open system technology and distributed information technology have greater flexibility and scalability, information security has become one of the important factors that cannot be ignored. There must be a strict and effective security mechanism to control and manage the system. How to ensure the stability and reliability of the system, maintain network security, and prevent hacker attacks and computer virus invasion is an integral part of system security that cannot be ignored.
Manageability and Maintainability: In a complex network and system environment, a high degree of manageability has become the key to system success. The system is designed with full consideration of using advanced system management software for daily monitoring, backup, setting thresholds and handling controllable events to ensure the reliability of the management system.
Scalability: In the rapidly developing information field, the application environment, hardware and software will be constantly updated, and the equipment system needs to fully consider the protection of current end-use investment. The development of the enterprise depends on the scalability, consistency and compatibility of the system.
Construction content
Hardware and software for production servers and other related accessory equipment
EquipmentDrivers, software and other related programs
Provide complete system design documents, installation screen records and configuration manuals, etc., as required by the technical specifications.
Responsible for site investigation, analysis, design, equipment procurement, installation, system commissioning, rollout, technical support and services for the entire system and ensuring network connectivity.
Prepare a technical training program and provide comprehensive training on the installation, operation, management and maintenance of the entire system.
Free 3-year warranty on all servers and 1-year warranty on all other equipment.
Security Sensing System
Improving network partitioning will require us to migrate the production network from the core switches in the administration building to two additional core switches that are dedicated to the production network. In addition, we will use two newly added firewalls to segregate the production network from the office network and provide four production network access switches.
The additional core switches, access switches and firewalls will be deployed in high availability mode.
Add two WAF (Web < span data-dl-uid="4">Application Firewall) appliance for enhanced protection of internal Web applications. High Availability Mode Deployment.
Add two load balancing devices to the production network to improve high availability of business systems. High-availability mode deployment.
Create a new security operations and maintenance zone (VLAN) on the core switch in the primary data center. Two Privileged Access Management (bastion hosts) are deployed in the Security Operations and Maintenance area to manage and maintain applications, databases, servers, and network devices, and to provide operation log auditing. High availability mode deployment.
A situational awareness platform is deployed in the security operations and maintenance area to monitor border traffic between the Internet and the production network. The platform visualizes the state of network security so that threats can be quickly detected and responded to in a timely manner.
Deploy enterprise antivirus software suite in secure operations and maintenance areas.
system architecture
Through the latent threat probes, the whole network security perception visualization platform, security services cloud platform constitutes the technical architecture of continuous detection and rapid response:
Figure 4-1 System Architecture of Security Awareness Platform
Subliminal Threat Agent (STA): Deploys Subliminal Threat Agent (STA) at the core switching layer and the internal security domain to internally identify user access to business assets, business relationships based on captured access to business assets and business. relationships are identified, and preliminary attacks are identified internally based on capturednetwork traffic, violation detection and intranet anomalous behavior identification. Probes are deployed in bypass mode, which is simple to implement and does not affect the original network structure at all, reducing the incidence of single-point network failure. At this time, the probe obtains a "copy" of the data in the link, which is mainly used to listen to and detect the data flow in the LAN and the network behavior of users or servers, as well as to realize the collection of TCP behavior of users or servers.
Security-awarenessPlatform (SIP): Deploying security-awarenessplatforms on the intranetWhole-networkinspection system to collect data from security detection probes at each node and present users with a visual representation of intranet business assets and critical business assets for the intranet. The detection system collects data from security detection probes at each node and presents users with intranet business assets and attacks and potentialattacks against intranet-critical business assets through visualization. data-dl-uid="6">threats; and unified management and policy issuance of all security systems on the existing network through this platform.
Component Implementation
The network-wide security awareness platform is mainly composed of two parts: threat latent probes, security awareness system, and supports seamless connection with other security devices, and provides in-depth analysis, threat correlation and service response capabilities based on the security service cloud. "3">, while supporting seamless interfacing with other security devices and providing in-depth analysis, threat correlation and service response capabilities based on the Security Service Cloud. Built on a 64-bit, multi-core, concurrent, high-speed hardware platform, Threat Probe uses a self-developed parallel operating system (Sangfor OS) to parallelize the forwarding plane and the security plane on a multi-core platform OS. span>, multiplanar concurrent processing, close collaboration, greatly improve the performance of network packet security processing the performance of secure processing of network packets. The security awareness system utilizes big dataparallel computing frameworks to support correlation analysis, traffic detection, machine learning, and other computational detection modules, thus realizing a full range of detection services in collaboration with massive data analysis.
latent threat probe
separation planar design
Threat Lurking Probe separates the data processing of network layer and application layer by software design, based on application recognition module in the bottom layer, it recognizes all the data received by NICs, and then grabs the application data messages that need to be processed to the application layer by packet grabbing driver. If data processing failure occurs in the application layer, it will not affect the forwarding of data in the network layer, thus realizing efficient and reliable data message processing.
multicore parallel processing
The design of Threat Lurking Probe not only adopts multi-core hardware architecture, but also adopts advanced lock-free parallel processing technology in the design of computational instructions, which can realize multi-pipeline simultaneous processing, exponentially increase the system throughput, and the performance is very excellent under multi-core system, which is a real multi-core parallel processing architecture.
single resolution architecture (SRA)
Threat Lurking Probe adopts single-parsing architecture to realize one-parsing and one-matching of messages, which effectively improves the efficiency of the application layer. One of the key elements to realize the single parsing technology is the software architecture design to realize the separation of the network layer, application layer plane, the data will be extracted to the application plane through the "0" copy technology to realize the unified parsing of the threat characteristics and unified detection, to reduce redundant packet encapsulation, and to achieve high-performance data processing.
jump scan technology
Threat Lurking Probe utilizes the application identification technology accumulated over the years to tag all packets passing through the probe with an application through a private protocol at the kernel driver level. When the packets are extracted to the content inspection plane for inspection, the device will find the corresponding application threat features. By using jump scanning technology to skip irrelevant application threat detection features, it reduces ineffective scanning and improves scanning efficiency. For example, if the traffic is recognized as HTTP traffic, then the relevant vulnerability attack features of FTP server-u will not pose a threat to the system, and the detection can be temporarily skipped for forwarding to improve the efficiency of forwarding.
Flow Records
Able to restore and record network communication behavior for security personnel to conduct forensic analysis, restore content includes: TCP session records, Web access records, SQL access records, DNS resolution records, file transfer behavior, LDAP login behavior.
message detection engine
It can realize IP fragmentation reorganization, TCP stream reorganization, application layer protocol identification and parsing, etc. It has various intrusion attack modes or malicious URL monitoring modes, can complete pattern matching and generate events, can extract URL records and domain name records, and can record original messages based on quintuple and binary (IP pairs) when triggered by characteristic events.
Sangfor Regex Regular Engine
Regular expressions are a method of recognizing specific patterns of data that can accurately identify attacks in a network. It has been found by security experts that the speed of regular expression matching methods already available in the industry is generally slow, which restricts the improvement of the whole speed of the probes. To this end, a new Sangfor Regex regular engine has been designed and implemented, which raises the regular expression matching speed to dozens of Gbps, tens of times faster than the well-known engines such as PCRE and Google's RE2, reaching the industry's leading level. tens of times faster than well-known engines such as PCRE and Google RE2, reaching an industry-leading level. .
Threat Latent Probe'sSangfor Regex drastically reduces CPU utilization and effectively improves Threat Latent Probe's throughput, enabling higher speed processing of customer business data. This technology is especially suitable for scenarios with particularly high throughput per second requirements, such as carriers and e-commerce companies. .
Security Awareness Platform
Asset operations management
According to functional division, intranet devices can be categorized into assets and services. The security awareness platform can actively identify intranet assets and actively discover IP addresses of undefined equipment assets in the intranet, eliminating the need for users to perform tedious statistics and entry and saving them time. Asset configuration details display module, can identify the IP address of the intranet server assets, operating system, open ports, as well as the transmission of the use of protocols and applications. Business-asset relationship display module, which can be combined into specific business groups by asset IP address/address segment.
Intranet Traffic Display
Access relationship display module, through the access relationship learning to display the access relationship between users, business systems, Internet, can identify the who, what, when, how of the access relationship, through the color to distinguish between different danger level users, business systems. Graphical display of intranet access violations, attacks, and abnormal traffic, displaying normal access, access violations, attacks, and abnormal traffic of the intranet for different business assets and distinguishing them with different colors, which is more intuitive for users to access.
Monitoring the identification knowledge base
The built-in detection and identification knowledge base of the security awareness platform covers more than 1,100 types of applications, with a total of more than 3,000 application identification rules, and has the ability to identify URLs at the level of hundreds of millions of dollars; the knowledge base covers more than 4,000 intrusion protection vulnerability rules and features, and the intrusion protection vulnerability features have a Chinese language introduction, including, but not limited to, the vulnerability description, vulnerability name, danger level, and the affected system, Corresponding CVE number, reference information and suggested solutions; the knowledge base has an independent bot host identification feature library, and the total number of malware identification features is more than 500,000 items.
Log collection and correlation
Security Awareness Platform can collect and analyze logs and alarms related to Next Generation Firewall (NGAF) and Endpoint Security System (EDR), and conduct corresponding analysis and correlation, and at the same time, for the security hazards found by the platform's analysis, it can also quickly At the same time, for the security risks found by the platform analysis, it can also quickly call these protection systems to block and kill the security risks and attack codes in response.
For third-party security devices that support syslog, the platform also supports the collection, storage and query services of related logs.
Visualization Platform
The network-wide attack monitoring and visualization platform supports security situational awareness, map presentation and visualization of network-wide security events and attacks. Statistics and display by attack event, attack source, attack target, attack type, and hazard level. The visualization platform supports network-wide business visualization, which can present the graphical display of the access relationship of the network-wide business objects and the invaded business. It supports user-defined visualization of business asset management. Support for analyzing the traffic passing through the device and discovering the vulnerabilities of the protected object (non-mainactive scanning). Business external connection monitoring large screen, displaying real-time dynamic map of assets and business attacked by external network, graphical large screen display. Branch security monitoring, capable of displaying the security status of branches/supervised organizations in the form of map topology, ranking the risk status and listing the security trends of branches/supervised organizations. Security log display supports the summary of security logs of all security devices, and can filter logs by multiple conditions such as time, type, severity level, action, region,IP, user, feature/vulnerability ID, reply status code, domain name/URL, device name, and other multiple conditions to query the filtered logs.
Big Data Analytics Engine
Big Data Analysis Engine is responsible for realizing all kinds of detection capabilities and big data correlation analysis capabilities. The engine consists of data preprocessing, data fusion, model construction, model fusion, analysis results generation and other major modules, with MapReduce as the underlying computing framework, MLibandTensorTensor as the underlying computing framework. span data-dl-uid="3">Tensorflow as the main machine learning frameworks, implementing SVM, Bayesian Networks, Random Forests, LDA, DGA, Markov Clustering, iForest, RNN, and other key machine learning algorithms to support security capabilities such as UEBA, failed host detection, and big data correlation analysis.
management function
The management function consists of several modules. The login module supports user identity security authentication mode, multiple login failures will lock the account within 5 minutes not to log in, support for the user to log in for the first time to force the password change function; upgrade module supports online upgrade and offline upgrade of two upgrade modes, and supports the automatic upgrade of the platform to unify the control of the probe upgrade; the user management module supports the addition of new users and management of the user, you can control user access rights, permissions include read time management module supports time synchronization, support for NTP V4.0 protocol; network management module provides network management functions, static routing configuration; device management module real-time monitoring of the device's CPU, memory, storage space usage, the ability to monitor the real-time traffic of the listening interface; data management module can analyze the number of files restored within a day or a week and the size and distribution of the traffic of each application. The data management module can analyze the statistics of the number of file restoration and the size and distribution of the traffic of each application in a day or a week.
Program Functional Design
From the perspective of network security construction, network traffic in the past can be said to be either black or white, black is risky traffic, white is safe traffic, and the black and white list filtering of firewall-type border protection equipment together with feature-based methods can intercept most threats. However, with the increasing number of Internet access devices, the increasing complexity of the network structure, the network environment has seen more and more exploitable weaknesses, hacker attacks are constantly improving and mutating, forming a gray area between black and white, and the scale is still expanding.
Traditional methods have struggled to effectively detect potential risks in the gray area,for whichwe adopted a key technology to deal with unknown threats, through which hacker invasion traces can be found faster and more accurately, so as to kill the hacker's attack plan in the cradle. Designed for the realization of the characteristics of hacker attacks, integrated consideration of each link of the hacker attack chain, is the key ability to guard the intranet security posture and guarantee the indispensable security of the enterprise network in today's constantly upgrading hacker attack methods.
Big Data Platform Processing Architecture
The platform adopts a hierarchical big data processing structure design, forming a complete processing logic process from data collection to final data analysis and presentation. The layers are divided as follows:
data acquisition layer
Collection includes terminal data, traffic collection, middleware data, third-party device logs, and threat intelligence docking. The layer provides a variety of interfaces for traffic and log data collection and docking, supporting syslog,webservie, restful api. "3">api, wmi, and other methods of collection.
Data preprocessing layer
Pre-processing of the collected data, including data cleansing, data merging, data enrichment, and ultimately data conversion into formatted data understandable by the platform, in the form of a file, waiting for analysis.
Big Data Analytics Layer
Read preprocessed data for offline calculation, or read ES (Eleastic Search) data for real-time calculation. Here the detection, analysis and statistics of the whole network security data, and combined with threat intelligence, behavioral analysis, intelligent analysis and other technologies, to discover the status quo of security threats, and at the same time, the built-in multiple security correlation rules can be the data for the consolidation of the alarm.
data storage layer
Analysis data and results are stored in the ES engine (Eleastic Search), which provides fast retrieval capabilities. At the same time, for the recent statistics that need to be presented quickly, the data is stored in MongoDB and can be read quickly without rendering and memory consumption compared to the ES engine.
data service layer
Based on the APP way to design the whole data visualization display, based on the interface to get data from the data storage layer, read the display data, provide various data security visualization services and external interface services.
Visualization usesext as the JS framework, based onECharts< as a graphic library, and vue architecture as a big screen visualization rendering support.
Big Data Analytics Support:Referring to hadoopcomputing frameworks, it uses the Hadoop MapReduce parallel computing framework for parallel processing, with reliability and fault tolerance, while providing support for large-scale cluster deployment and analysis of massive data sets. The use of ElasticSearchstructural engine (a common engine for big data analytics) provides fast retrieval capabilities for the underlying metadata, analytic data, and analysis results.
High-performance processing capabilities: Based on the above framework features, high-performance analysis capabilities can be obtained. At the same time based on the server hardware equipment as the basic running equipment, with high-performance analysis capabilities, to achieve daily billion real-time log analysis, about 3TB or so of data, while supporting billion logs second query. Performance Requirements Indicators:Stand-alone support for 20,000+ EPSDataInto the libraryData, standalone support for 100000+eps data analysis,32GSupport 100billiondata querying in second with memory.
Compute and storage scalability: Based on hadoopcomputing frameworks, it can Support for database-based cluster deployment mode, horizontal cluster expansion greatly improves the storage space and analysis performance of the big data platform. The following features are required: support for 64 analytic platforms for horizontal cluster expansion, support for 32 analytic platforms for vertical hierarchical cascading, automatic data balancing, distributed storage, optional multi-copy to improve data fault tolerance.
Asset identificationandVulnerability assessment
Asset Auto-Discovery: Adaptive identification of terminals, servers, etc.Asset Auto-Discovery: Adaptive identification of terminals , Servers, etc., < span data-dl-uid="3">.
Server Information Recognition: Automatic identification of server asset information, such as operating system, open ports, etc. It can be used to discover shadow assets, or with regular patrols, which can avoid security problems caused by frequent business updates (e.g., omissions, missed allocations, etc.).
Risky ports/applications: Identify risky ports opened by server assets and how they are being used (e.g., standard ports running non-standard protocols), and identify illegal connections due to exposure of risky application access methods (e.g., RDP, SSH, databases), and identify specific applications even if they are non-standard ports.
Organizational structure hierarchical division: Multi-level dimensional division of branch units, etc., and can be divided into assets, custom set the attributes of the assets, easy to locate the assets and manage them. The configured organizational hierarchy is also combined with a network-wide security situational awareness display to show the overall security situation.
Real-time Vulnerability Analysis: For application traffic passing through the device, the traffic is parsed for the corresponding application, and the parsed application data is matched with a real-time vulnerability analysis and identification library to discover possible vulnerabilities in the operating system, Web general-purpose software or frameworks, Web applications, protocols, and other vulnerabilities existing in the server. Meanwhile, it provides built-in and customized weak password libraries to analyze the weak passwords of user-specified servers, and analyze whether there is any risk of weak passwords on the servers.
Asset Operation Detection: Based on SNMP method, assets and devices are operated information and monitored, real-time display of CPU, memory, disk, upstream and downstream traffic and other information, and form historical records. It can be compared with historical records for administrators to analyze the abnormal situation of equipment resources.
Multi-dimensional threat detection
Basic testing capabilities
The reason why hackers can invade enterprise intranet, sometimes not by virtue of how clever skills, on the contrary, the network security incident to review and summarize found that many hackers invade the enterprise intranet to the enterprise losses, by virtue of only some traditional, simple means. For the enterprise network security construction, detection technology by simple and complex, but for the detection of hacking, the basic detection capabilities are also critical. Basic detection capability refers to the ability to detect those traditional and common abnormal traffic, mainly including abnormal session detection, Web application security detection, sensitive data leakage detection.
Anomalous session detection can realize the analysis and detection of abnormal communication behavior of multi-scenario network including outreach behavior analysis, intermittent session connection, encrypted channel analysis, abnormal domain name analysis, upstream and downstream traffic analysis, etc., and Web application security detection for B/S architecture applications, the scope of application includes mainstream scripting languages such as ASP, PHP, JSP and so on. webshellbackdoor script uploaded, detection of SQL injection, XSS, system commands and other injections, CSRF attacks, malicious crawler attacks, file inclusion, directory traversal, information leakage attacks and other attacks on the Security protection for mainstream CMS such as dedecms, phpcms. span data-dl-uid="6">,phpwindand so on. The sensitive data leakage detection capability, on the other hand, filters and detects information based on file types and sensitive keywords by customizing the sensitive information.
Deep Inspection Capability
Hackers bypass the traditional protection measures, often the first choice to lurk and hide, such as viruses are hackers invade the intranet is one of the common tools, the virus program into the system is generally not immediately after the onset of the program, but in the weeks or months or even a few years hidden in the legitimate files, the infection of the other system and undetected, the majority of virus Most viruses work by accessing specific URLs via the HTTP protocol to obtain or submit information, and some viruses use DNS to look up the IP of a domain name and then establish a connection with that IP to interact with the data. For example, in order to communicate with the C&C server, the botnet will request DNS to obtain the IP of the corresponding C&C server, these URL addresses and domain names corresponding to the IP of the host is usually the key to provide interactive information for the virus, effectively identify these hosts can block the connection between the intranet virus and the outside world. These attacks are much more effective than traditional attacks. These attacks are more sophisticated and insidious than traditional attacks, and the deep detection capability is designed to detect this insidious malicious behavior.
The in-depth detection capability of the Security Awareness Platform provides a session-level view of network traffic, builds a normal traffic model based on the normal behavioral profile characteristics of network traffic, and determines whether the traffic is abnormal or not, and can detect network worms, network horizontal scanning, network vertical scanning, IP address scanning, port scanning, and ARP spoofing. Meanwhile, the in-depth detection capability also includes password brute-force breaking detection, weak password scanning detection, black chain detection, and terminal virus/malware detection. In response to the characteristics of zombie machines and virus programs that need to communicate with external C&C servers to achieve seizure, the unique DGA detection algorithm of the Security Awareness Platform that integrates Markov model and information entropy uses machine learning to identify whether a domain name is generated by an algorithm, and estimates the domain name reputation value based on the randomness, so as to detect the traffic related to malicious IP addresses.
UEBA and Access Anomaly Detection
In the enterprise network environment, when an employee is not on night shift, the employee's host access to the business server at 4:00 a.m. belongs to the access anomaly. In the past, user business access control and Web business access control mainly rely on rules to achieve, but due to the existence of large differences in individual behavioral patterns, while hacker attacks are increasingly inclined to disguise themselves as normal user behavior so as to avoid the access rules, so it is difficult to effectively deal with the access anomalies of the rule-based control strategy. Machine learning algorithms are able to model diverse user behavior patterns and Web access patterns to achieve better detection results.
The user business access anomaly detection of the security awareness platform is based on the user's historical behavior and the behavioral similarity between users, the similarity for statistical analysis, and the use of machine learning for modeling, so as to analyze the user and the host and other entities (UEBA), identify the user's anomalous access to the business system, and then discover the potential threats such as customer credentials being stolen and the user's host being compromised. Web business access anomaly detection uses Markov random process and Bayesian recursive estimation, combined with other machine learning algorithms to analyze and model the interactive behavior of Web business, so as to detect all kinds of attacks on Web business, such as data leakage, Web Shell, intranet data proxy forwarding and other high-risk behaviors.
Comprehensive testing before, during and after the event
Failed Host Detection
After hackers attack the intranet, they will place Trojans and backdoors on the compromised hosts, so as to achieve the purpose of controlling the hosts. After hackers control a large number of compromised hosts, they will also launch DDOS attacks on the target hosts, scanning and breaking and other malicious behaviors. Host failure is the first step for hackers to enter the intranet, and timely discovery of failed hosts will be able to stifle the further actions of hackers as early as possible, thus ensuring the security of the enterprise network environment.
Currently there are more than 20 known compromised host detection algorithms, such as rule-based and library-based algorithms. The built-in algorithm of the security awareness platform is able to analyze features such as virus behavior, abnormal outreach behavior, and common hacker attacks, etc. The algorithm integrates fast-flux identification,iForest , host network traffic model, protocol model learning, while combining the linkage analysis provided by the big data correlation analysis engine as well as the DGA domain name discrimination to build a fusion detection model, so as to discover the out-of-control hosts in a timely manner.
Horizontal Threat Awareness
For most customers,the core business system will be deployed a large number of security protection system and formulate a detailed management system to ensure that the non-public services will not have any problems. , non-public service systems are not even exposed to the attacker's directly accessible view. Therefore, it is often difficult for hackers and attackers to penetrate and attack these systems directly, and so the classic APT "attack infiltration - control springboard - lateral movement - control the target - theft and destruction" process, by attacking and controlling the weak defense of the internal non-core assets, to use it as a springboard for infiltration and attack.
Lateral Threat Detection locates monitoring and analysis in the logical analysis of the behavior of internal operations and assets,Real-time monitoring of inter-system access requests ,packet contentand business logic, including:
for feature-matching-based attack detection,i.e., scanning, traditional attacks such as infiltration
Violation detection based on whitelisting policies,Discovery of asset behavior deviating from predefined security policies
Behavioral anomaly detection based on UEBA technology, which identifies deviations in asset behavioral logic from its own security baseline or the security baseline validation of similar assets
Common risky remote login, database request behavior
Through the behavioral characteristics of these assets to determine whether they appear to be controlled by hackers and become internal attack springboards. As the process of attack penetration and control springboard is always based on 0Day and unknown threats in most cases, but the process of internal lateral movement is inevitably accompanied by access requests, packet content and behavioral logic abnormalities of controlled assets, which can be used as an effective means of detecting APT attacks, and by detecting and blocking attacks at the lateral movement stage, we can effectively prevent the core business from falling into disrepair and sensitive information from being compromised. Loss of confidentiality.
Outreach Threat Awareness
Many customers often complain that traditional network security devices and solutions focus only on functionality, and even professional security operations and maintenance personnel are difficult to understand the security status of the entire network in real time. Enterprises need not only a secure network environment, but also need to understand the security status of the network environment in a simple, intuitive way, such as for post-mortem detection, customers are concerned about the focus is on their core business servers have been lost, the customer's business systems whether there is a situation of external connectivity, with which countries and provinces outside the connection, the external access to the presence of what risks and postures, and how to solve and so on.
Inspection of outgoing traffic from a business server is an effective means of determining the security status of that server. Failed servers generally behave differently from when they are operating normally. By analyzing the behavior of the server's outgoing connections, a model of the server's normal operation is established, which is used as a benchmark for detecting abnormal operation of the server. The visualization platform visualizes the external connection of the customer's business system, allowing the customer to intuitively perceive the dynamics of the business system, forming a complete "external connection situation awareness, external connection situation understanding, external connection situation prediction " closed loop, in the interactive experience, almost zero operation and zero learning cost, combined with the large screen put, clear and intuitive to do"Security posture can be perceived, security value can be presented".
Successful Attack in the Middle of the Matter
Typical APT attack process, the attacker often does not stop at controlling the target host or system, but through the system as a medium to implement further attacks and penetration. Therefore, in the analysis and judgment process of security incidents, it is not only necessary to analyze the source and mode of the attack, so as to determine the current emergency response program and after the fact security reinforcement strategy, but also need to track and analyze the possible impact of the surface and means of attack, to ensure that this successful attack has not yet been a successful attack on the actual impact of other more assets, or if it has caused the impact of a further Identify hazards and initiate appropriate disposal processes.
External risk visits
For most units, attackers from the outside are still the main threat they face, so in-depth analysis and detection of data from untrustworthy/relatively uncontrollable networks such as the Internet or branch offices, correlating their direct access logic, access requests, and behavioral characteristics, directory traversal, ftp bursting, well-known vulnerability exploitation attacks wenshellfile uploading, and many other mainstream high-risk penetration attacks.
Intelligence correlation and intelligent analysis
Threat Intelligence Correlation
Today's network security offensive and defensive war has formed a situation where attackers are organized and premeditated, and defenders are detected and tactical. To safeguard the enterprise's own network security, not only do we need hardware and software infrastructure, but we also need to understand the routines and movements of the hacker attacks through threat intelligence, so that we can know ourselves and our enemies. Threat intelligence is a threat that already exists or is being revealed, through the evidence of knowledge (including context, mechanism, impact, etc.), to address the threat or harm and decision-making knowledge.
The Security Awareness Platform utilizes threat intelligence such as threat rules and advance risk assessments to match current events in order to identify and respond to threats. The intelligence system has the following capabilities:
Threat assessment of an incident based on the level of credibility of the incident participants;
In cases where the threat level generated by an event does not reach the alert level, the threat level is increased if the event matches the threat intelligence profile;
Filtering out most incidents of low threat behavior facilitates the analysis of potential threats;
Sharing mechanisms and synergies are utilized to ensure that attacks encountered after the first attack can be quickly identified and responded to;
Raising the cost of attacking for attackers, who need more sophisticated hiding methods to bypass this system of concerted defense;
Targeted threat intelligence can detect APT attacks;
Threat intelligence provides more dimensional information for analysis of security logs, events, etc. Threats lurking in normal traffic can be discovered through correlation analysis methods.
Big Data Correlation Analysis
Traditional network border security techniques tend to focus on preventing attacks from the Internet, mainly from public Web servers such as HTTP or SMTP attacks, and when the hacker bypasses the border protection to enter the intranet, generally will first take control of a Server inside the local network, and then use it as a base to launch vicious attacks on other hosts in the network. It is difficult to detect hacker invasion only by a single data source. To address this issue, big data correlation analysis can dig out the traces of hacker invasion behavior from multi-dimensional massive data to help users effectively detect unknown threats, thus enhancing network security capabilities.
The big data analysis engine of the network-wide security awareness platform collects raw network traffic through dedicated probedevices and will gradually support the collectionof AF, AC, EPS, SSL and other security devices and hosts as a data source, combined with the cloud threat intelligence database, through multi-dimensional information fusion to achieve event correlation, cross-correlation and heuristic correlation based on attack scenarios, so as to assess the credibility of the security event, the threat level and the risk value. The engine discovers failed hosts and security threats in the network through big data correlation analysis, identifies potential security risks for business and advanced APT attack behaviors, and at the same time realizes the correlation based on attack scenarios to complete effective attack detection and exploited vulnerability detection, and then traces the attack back to the attack, and through graph correlation analysis, all the information of the hacker (IP, Domain, Virus, Hack tools, Hacker's location, Attack methods, Historical Attack Records), restore the entire attack scenario, form the attack story, and help customers better understand, analyze, and forensically verify the entire attack event.
Deep Dive and Assisted Decision Making
Security overview with big screen visibility
Security Overview abandons the traditional SOC and network management platform's one-size-fits-all network topology display, and innovatively adopts a display method for key business assets and business logic relationship networks:
Security Overview View: You can see at a glance the security risk status of information assets across the network, the logical relationship between the network and the abnormal access behavior, as well as the path and scope of influence of suspicious attacks, realizing the needs of network and security managers to quickly understand the network security posture.
For leaders and decision makers concerned about the overall posture of information security through network-wide attack monitoring,branch supervision, risk, risk, and risk. "3">Branch Supervision, RiskOutreach Monitoring, and many other different perspectives on the big screen display,Provides cockpit-style decision support services for information security executives:
Visualization of network-wide attack monitoring: Attack posture map can present the geographical distribution of attacks and outreach, as well as the ranking of various attacks; security managers can effectively set up external black and white lists to reduce the risk of business capture through the geographic distribution of attackers, combined with their own business and user characteristics.
Branch Supervision Visualization:Network situational monitoring of comprehensive security information across the network,supporting logical topology hierarchy, from the overall security posture of the whole network to the monitoring of information assets and security data,realizingall-around visualization and regulation.
Risky Outreach Monitoring Visualization:Outreach from compromised businesses and users is an important feature of data theft and hacking,Through the visual monitoring of outreach risk, it is possible to clearly see the business application that initiated the outreach access, the destination of the outreach, the application, the time of the outreach, the frequency of the outreach, and other information.
Lurking Threats Goldeneye
Security Perception System, as a detection and analysis class platform, also provides security analysts with professional event analysis aids, namely, Latent Threat Goldeneye, which provides fast query services based on IP addresses, analysts only need to enter the IP address to be analyzed, and the Goldeneye platform can be used to analyze the data based onpowerful background big data analysis and and correlation retrieval capabilities,providing analysts with security threat based onIP view analytics, including:
You can mine assets and business flows associated with specific IPs through automatic correlation analysis, and mine and analyze violations, abnormal behaviors and suspicious attacks;
Provides a tree-like business access and attack process relational network based on query IPs as root nodes;
Based on any node in the relational network, double-click to quickly drill down and analyze, digging deeper into the traces of the attack process, and intuitively understanding the causes and consequences of the entire security incident;
Provide the correlation display of the original logs, you can view the logs related to specific nodes and access paths at any time according to your needs, which is convenient for analysts to locate and analyze security issues.
Server Installation Program
1. Preparation of equipment list: Before starting the construction, it is necessary to prepare servers, racks, network switches, power supply equipment, network cabling materials, cable management components and so on.
Prepare tools and installation accessories.
Install a protective ground wire to ensure that the chassis ground is connected directly to the server room grounding strip or cabinet grounding point.
Install the network cables and ensure that connectivity is tested with a network cable tester before tying the cables.
Install fiber optics and ensure that the fiber optics and fiber optic patch cords meet the requirements before use.
Install the cables on the router, making sure that the cables are routed along the chassis' cable runners, plugged into the connectors on the daughter card and tighten the anti-dislodgement screws with a Phillips screwdriver.
Pre-power-up inspection, including cabinet electrical connection check, installation environment check, and cabinet installation check.
Power-up check to ensure that the input voltage is within the normal voltage range before powering up the device
2. Network Configuration: Pay special attention to the setting of network parameters such as IP address, subnet mask, default gateway and DNS service. At the same time, consider the network security configuration of the server, such as firewall rules and VPN settings.
Complete the installation and configuration of the operating system, including network configuration, administrator account setup, and security settings.
Install the necessary patches and drivers to keep the server running properly.
Configure the switch, including VLAN segmentation, STP configuration, and so on.
Configure network security devices, including security policies, firewall rules, etc.
Perform system testing to ensure that all equipment is functioning properly and network connections are stable.
3. Server monitoring and management: Choose appropriate monitoring tools and techniques, such as system log analysis, performance metrics monitoring, and anomaly detection.
4. Security measures: use strong password policies, restrict unnecessary service ports, configure security updates and patch management, and implement access control policies.
caveat
Power Requirements: Use a power supply that meets safe voltage requirements, and check that the power supply is correct before operating the equipment.
Use of environmental requirements: avoid installing the equipment in direct sunlight or near the heat source, keep the equipment placed horizontally and leave enough space around it to facilitate air evacuation and heat dissipation.
Working environment: Pay attention to environmental factors such as temperature, humidity and altitude.
Cable requirements: the installation of cables should be consistent with the original vehicle cable direction, along the original vehicle cable installation, and the original vehicle cable tie fixed, to achieve neat wiring, hidden.
Routine Maintenance: Avoid using the product by exposing it to working conditions other than those shown in the user manual, and prevent the equipment from being dropped from a high place or subjected to strong knocks.
Wireless Vehicle Mount Terminal Installation Program
Solutions for installation on port collection trucks, RTGs, QCs
1. Determine the appropriate location: determine the appropriate installation location in the vehicle, generally recommended to choose the front of the vehicle, so that the antenna directly facing the sky, receiving signals better.
QC/RTG/RMGInstallation solution:Add between the bracket and the terminal Universal joint connection to adjust the angleand extend the terminal outward distance.
VMT Installation Program
2. Mounting the antenna: Place the antenna on top of the vehicle and secure it with tape or screws. Make sure the antenna is centered and does not overlap vehicle seams or other obstacles.
3. Installation of equipment: choose a suitable location to install the equipment in the car, generally recommended to choose the windshield or the car equipment bracket area. At the same time, pay attention to avoid the driver's operation area.
4. Connecting the power supply: Before connecting the power supply, please be sure to read the instruction manual of the vehicle-mounted terminal carefully and follow the instructions.
caveat
1. Power supply: Strictly observe the electrical safety regulations of the place of use. Please use a power supply that meets the safety voltage requirements, and check whether the power supply is correct before the equipment is operated.
2. Use of environmental requirements: Do not install the equipment in places such as humid, dusty, extremely hot, extremely cold or strong electromagnetic interference.
3. Cable requirements: Wireless network antennas and positioning antennas need to be installed in places with good signals and pay attention to lightning protection, and ensure that there are no objects to cover or block.
4. Routine maintenance: If the equipment is not working properly, contact the manufacturer or the nearest service center. Do not disassemble or modify the equipment in any way at will.
Training programs
Technical training program for personnel
For our company, if we can make the project's management personnel skillful in mastering the CTOS system supporting equipment, the pressure of maintenance in the later stage will be reduced accordingly, and also make the conception of the pre-design program and the effect of the mid-term engineering construction to be a perfect embodiment.
Training will include two parts, one is the course training; the other part is the site operation training (including software and equipment), all of these trainings are provided free of charge, we will develop a systematic and detailed training program to ensure that Party A comprehensive and systematic mastery of the entire CTOS supporting equipment system. Correct and safe operation and effective maintenance of the system.
On-site training: The training is aimed at system operators; it covers the use of the product, system optimization, common troubleshooting and troubleshooting, and routine maintenance of each system.
Certified Training: The content of certified training is the installation, debugging, configuration and optimization of the product to achieve proficiency in the product. Carry out performance tuning, configure performance parameters, and how to diagnose the corresponding faults and so on.
TrainingMaterials and Faculty
We will provide training materials and relevant technical information to the staff concerned who receive relevant training. We will provide before the start of the training, the training materials include equipment operation manuals, maintenance manuals, user guides for each system, software maintenance manuals and some other necessary technical information. All technical materials will be provided in English. All training materials shall be deemed to be our property, submitted in a format (e.g. Word, Excel, etc.) and form duly approved by us and can be easily reproduced.
Our company guarantees that the instructors dispatched for the training courses are senior engineers with sufficient technology and experience, as well as the qualification certificates of engineers certified for the corresponding products. They will be involved in the design and installation of the project. Their names and positions will be submitted to Party A for approval along with the training program.
Training Venue and Facilities
Training courses for both course training and on-site operation training will be arranged on site, and Party A will provide the necessary basic training facilities, such as training site, blackboard, power supply, podium, etc., and the projector and other instruments and equipments needed for training will be prepared by us.
Training content
|
|
1 |
|
2 |
|
3 |
|
4 |
|
5 |
|
Training Arrangements
intend
In order to scientifically do a good job of training, understanding the current situation of the user is very necessary preparation, for which my company specially asked customers to fill out the basic situation of the training staff questionnaire. The questionnaire will be used as the basis for the training curriculum, class schedule.
|
|
|
|
|
|
|
Scheduled training time: specifically according to Party A's requirements.
TrainingObject
We will train a number of technicians for us free of charge. The personnel can be according to our requirements.
Classes are scheduled for two classes in the morning and two classes in the afternoon, with breaks in between according to the actual training situation. The total training time is 10 days.
Training Programs
|
|
1 |
|
2 |
|
3 |
|
4 |
|
5 |
|
Training organization, implementation and management
Based on the developed and approved training plan, a specific implementation plan is formulated, including the names and units of specific trainers, the identification of training materials, the identification of lecturers, and the implementation of lecture venues.
Training Lecturers
The training instructors sent by us have both long-term experience in system design, operation and maintenance, as well as rich experience in training and counseling.
Training Commitment
1) Free training for Party A's engineers and technicians and management personnel on technologies related to the project.
2) Training according to the system involved in this project to carry out independent training, each training shall fill in the "training records".
3) The number of on-site trainers can be unlimited, and the time is determined according to Party A's requirements and actual needs.
4) The number of on-site trainings can be unlimited and will be conducted according to Party A's requirements.
Training materials
Prior to the commencement of the training, we provide us with all training materials in English free of charge, including:
1) System design solution.
2) Systematic training materials.
3) Product manuals for the products used in the system.
4) System Operation Manual.
5) System Maintenance Manual.
Training Methods
1) The multimedia teaching method is adopted, and the training equipments include projector, physical display table and so on. It is also accompanied by the necessary practical exercises.
2) The teaching method combines the popularization of basic theories with practical operation, and combines centralized lectures with individual counseling.
3) Training audio-visual teaching aids, equipment to determine: the use of teaching materials are mainly to the product and the software comes with the manuals and the corresponding operation of the document is based on the teaching place for the project implementation site, teaching equipment can be all the equipment for the system integration.
4) Management of Specific Training Processes: In order to strengthen the management and to improve the quality of the training, the participants in the training should obey the guidance of the training teachers, and at the same time, the management of the information department should give the training teacher enough management power to ensure that the daily teaching content can be implemented.