本文已被:浏览 3455次 下载 3751次
投稿时间:2017-11-10 修订日期:2017-12-11
投稿时间:2017-11-10 修订日期:2017-12-11
中文摘要: 软件与系统漏洞是国家网络空间安全的重要战略资源。中国关键基础设施和重要信息系统部分核心技术受制于人,软件与系统漏洞普遍存在的现状短期之内无法根除,需要开展深层次、大规模、智能化漏洞挖掘研究;随着移动互联网、工业控制网和物联网等领域的新技术和新应用的推广,现有漏洞挖掘分析技术体系不能满足新的需求;此外,中国漏洞研究团队资源相对分散,国家层面漏洞研究协作机制尚未形成,难以支撑国家对漏洞战略资源的把控。以提升国家开展漏洞战略资源把控能力为导向,针对软件与系统漏洞研究现状,目前亟待解决的四大难题,即漏洞挖掘分析智慧性弱、大流量监测精度低、危害评估验证难、规模协同能力缺。围绕四大难题开展攻关:一是,软件与系统漏洞智慧挖掘方法及关键技术,包括模糊推理经验库的构建方法、基于基因图谱的漏洞挖掘方法、智能引导优化问题、基于策略的漏洞识别方法。二是,软件与系统漏洞分析与可利用性判定技术,包括漏洞成因分析技术、程序异常路径构造技术、同源性漏洞分析技术、漏洞可利用性判定技术、多场景漏洞分析平台建设。三是,基于网络流量的漏洞分析与检测技术,包括利用动静态方法的漏洞攻击样本检测技术、研制软件漏洞攻击样本自动化检测原型系统、针对疑似网络攻击流量的深度检测与智能识别技术、网络攻击样本自动化分析与精准验证、面向攻击流量的漏洞检测与综合服务平台。四是,漏洞危害评估与验证技术,包括基于硬件虚拟化的动态污点分析技术、漏洞自动利用技术、研制基于虚拟环境的漏洞自动化验证系统、漏洞危害性评估体系和危害性评估算法。五是,漏洞规模化协同挖掘分析技术研究与应用,包括多任务多引擎自适应均衡规模化漏洞挖掘技术、多维度多任务智能协同技术、开放协作的知识复用技术、面向多计算环境的规模化协同漏洞发掘的一体化平台、规模化协同条件下漏洞挖掘、分析和可利用性评估技术、规模化协同漏洞发掘一体化平台在典型行业的应用验证。通过以上研究内容实现以下五个方面创新:一是,基因图谱定式复盘,基于基因图谱构建与经验知识复用的漏洞智慧挖掘技术;二是,多源分析多态利用,基于多源漏洞分析的多态可利用性评估技术;三是,动静结合意图推演,大流量环境下基于数据驱动与行为认知关联的攻击检测技术;四是,状态切片叠加复现,活体漏洞库构建技术;五是,智能连接迭代适应,多任务多引擎自适应均衡规模化漏洞挖掘技术。最终,构建集漏洞挖掘、分析、监测、评估、验证于一体的规模协同平台,形成知识复用、智能连接、开放协作的生态系统,为国家摸清网络空间安全家底、扭转攻防博弈被动局面提供技术支撑。
Abstract:The vulnerability in software and system is an important resource for national cyberspace security.By now,some key techniques of Chinese critical infrastructures and significant information system are controlled by other countries.The ubiquity of vulnerabilities in software and system cannot be eliminated in a short while.Therefore,it is necessary to carry outin-depth,large-scale,intelligent vulnerability mining research.With the popularization of new technologies and applications in the fields of mobile Internet,industrial control network and Internet of Things,the existing technical architecture of vulnerability mining and analysis cannot meet the new requirements.Besides,China's vulnerability research teams are relatively fragmented and collaboration mechanisms at the national level have not yet been established,which makes it difficult to support the country's control of vulnerability resources.In view of the current situation of software and system vulnerability research,four major problems are urgently needed to be solvedin order to enhance the country's ability to control the strategic resources of vulnerabilities:1)The weak intelligence of vulnerability mining;2)The low monitoring accuracy of large flow;3)The difficulty in verifying hazard assessment;4)The lacking in large-scale collaborative ability.Focusing on the four major problems above,this paper carries out the following five aspects of research.1)Intelligent vulnerability mining methods and key techniques in software and system,including the construction method of fuzzy inference experience base,the genetic map based method of vulnerability mining,optimization problem guided by intelligence,the strategy-based method of vulnerability identification.2)The techniques to parse vulnerabilities in software and system and judge whether they could be exploited,including techniques of analyzing the causes of vulnerabilities,construction techniques of the abnormal path,analytical techniques of homology vulnerabilities,techniques on the exploitability determination of vulnerabilities,the construction of multi-scene vulnerability analysis platform.3)The network flow-based analytical techniques to parse and detect vulnerabilities,including:The techniques to detect the vulnerability attack samples with dynamic and static methods,development of the prototype system to automatically detect vulnerabilities in software,the techniques to detect and identify the suspected network attacks,automatic analysis and precise verification of the network attacks samples,the attack-oriented platform to offer the vulnerability detection and comprehensive service.4)The techniques to evaluate and verify the vulnerability damages,including:The dynamic hardware virtualization-based techniques to parse stains,the techniques to automatically exploit vulnerabilities,development of the virtual environment-based system to automatically verify the vulnerabilities,the system and algorithm to evaluate the damages of vulnerabilities.5)The study and application of large-scale cooperative vulnerabilities mining techniques,including:The multi-tasking multi-engine adaptive large-scale vulnerability mining techniques;the multi-dimensional multi-tasking intelligent collaborative techniques;the open and collaborative techniques to reuse knowledge;the study of the multi-computing environments-oriented integration platform for large-scale collaborative vulnerability mining;vulnerability mining,analysis and availability evaluation techniques under large-scale collaborative conditions;the verification of the large-scale collaborative vulnerability mining integration platform application in typical industries.The project realized the innovation in the following five aspects with the research mentioned above:1)The fixed reconstruction of gene mapping,in detail,the gene mapping construction and knowledge reuse-based intelligent vulnerability mining techniques;2)Multi-source analysis and polymorphism utilization,in detail,the multi-source vulnerability analysis-based techniques to evaluate availability of polymorphism;3)Dynamic and static intention deduction,in detail,the data driven and behavior recognition-based techniques to detect attacks in the large-flow;4)Status slice overlay recurrence,in detail,the techniques to build the living vulnerability library;5) Iterative adaptation of intelligent connection,in detail,the multi-tasking multi-engine adaptive large-scale vulnerability mining techniques.Finally,a large-scale collaborative platform,that integrating vulnerability mining,analysis,monitoring,evaluation and verification,is build.It forms an ecosystem with knowledge reuse,intelligent connectivity and open collaboration,which provides technical support for our country to find out the security circumstances of cyberspace and reverse the passive situation of the game of attack-and-defense.
keywords: vulnerabilities in software and system intelligence mining expolitable inference safety monitoring of large flow vulnerability assessment large-scale collaboration
文章编号:201701043 中图分类号: 文献标志码:
基金项目:国家重点研发计划资助项目(2017YFB0802900)
Author Name | Affiliation |
RAO Zhihong | China Electronics Technol. Cyber Security Co., Ltd., Chengdu 610041, China |
FANG Enbo | China Electronics Technol. Cyber Security Co., Ltd., Chengdu 610041, China |
作者简介:饶志宏(1970-),男,高级工程师(研究员级).研究方向:网络安全.E-mail:charao@tom.com
引用文本:
饶志宏,方恩博.软件与系统漏洞分析与发现技术研究构想和成果展望[J].工程科学与技术,2018,50(1):9-21.
RAO Zhihong,FANG Enbo.Research Plan and Achievements Prospects for the Analysis and Discovery Technology of Vulnerabilities in Software and System[J].Advanced Engineering Sciences,2018,50(1):9-21.
引用文本:
饶志宏,方恩博.软件与系统漏洞分析与发现技术研究构想和成果展望[J].工程科学与技术,2018,50(1):9-21.
RAO Zhihong,FANG Enbo.Research Plan and Achievements Prospects for the Analysis and Discovery Technology of Vulnerabilities in Software and System[J].Advanced Engineering Sciences,2018,50(1):9-21.