Çå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ|ÍþвÊÓ²ìÆÊÎöÓïÑÔ¸ÅÊö
2021-04-19
ÓïÑÔµÄʵÖÊÔ´ÓÚ¹æÔò£¬×¼È·µÄ¹æÔòÊÇÇå¾²Âß¼ÅбðµÄ±ê³ß£»ÓïÑÔµÄ÷ÈÁ¦ÔÚÓÚÈö²¥£¬ÓÐÓõÄÈö²¥ÊÇÇå¾²Ç鱨ÓëÊÖÒÕÍ»ÆÆÇå¾²ÐÅÏ¢¹ÂµºµÄÒªº¦Â·¾¶¡£»ØÊ××ܽáÇå¾²ÖÇÄÜÓëÔËÓªÖÇÄÜÊÖÒÕµÄÑݽø£¬±ÊÕßÓú·¢ÒÔΪ£¬ÍøÂçÇå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ£¬ÐèÒªÉîÈë½â¶ÁÓë̽ÌÖ£¬ÒÔͨ¹ýÓïÑÔÄ£×ӵĹ¹½¨¡¢ÓïÒåµÄ»³±§£¬À´ÌáÉýÊý¾ÝÇý¶¯ÒªÁìÔÚÇå¾²³¡¾°Öеij°ôÐÔÓë˳ӦÐÔ¡£Òò´Ë£¬¡¶Çå¾²ÊÇÒ»ÃÅÓïÑÔµÄÒÕÊõ¡·½«·Ö¶à¸öƪÕ£¬ÊáÀíÇå¾²ÕâÃÅÓïÑÔÒÕÊõµÄÊÖÒÕ˼Ë÷ÓëʵÏÖ£¬ÏÈÈÝ×Ô¶¯»¯ÓëÖÇÄÜ»¯ÊÖ¶ÎÔõÑùÖúÁ¦ÐµÄÇå¾²ÓïÑÔÉè¼ÆºÍÓ¦Óá£
±¾ÎÄΪϵÁÐÊׯª£¬½«Ç³Ì¸¶ÔÇå¾²ÁìÓòרÓÃÓïÑÔµÄ˼Ë÷£¬½ø¶ø¸ÅÊö×ܽáÃæÏòÍþвá÷ÁÔµÄÊÓ²ìÆÊÎöÓïÑÔ£¨Threat Hunting Investigation and Analysis Language£©ÊÖÒÕÓë¼Æ»®¡£
Ò»¡¢ Çå¾²Êý¾ÝÆÊÎöÊÖÒÕÓëÁìÓòרÓÃÓïÑÔ
ÊìϤÇå¾²ÁìÓòѧÊõÂÛÎĵÄÅóÙÓ¦¸Ã¶¼ÓÐÌå»á£¬ÂÛÖ¤Êý¾ÝÇý¶¯µÄ£¨Data driven£©ºÍÖÇÄÜÇý¶¯µÄ£¨AI driven£©ÒªÁìÏà¶Ô¹Å°åÒªÁìµÄÓÐÓÃÐÔ£¬Ò»Ñùƽ³£»á°Ñ»ùÓÚ¹æÔòµÄ£¨Rule based£©ÒªÁìÄóöÀ´±ÈÕÕһϡ£ÔÚÊý¾Ý¹ýÔØµÄʱ´úÅä¾°Ï£¬Çå¾²´óÊý¾Ý¸øÌáÈ¡Ö¸ÎÆÌØÕ÷¡¢Ð´¼ì²â¹æÔòÕâÖֹŰ崿ÊÖ¹¤µÄÇå¾²·À»¤Ä£Ê½³öÁ˶àµÀÄÑÌ⣺¹æÔòµÄ·º»¯ÄÜÁ¦¡¢Ë³Ó¦ÐÔ¡¢ÁýÕÖÂʵÈÖ¸±êÔõÑù¸úÉÏÊý¾Ý¡¢³¡¾°¡¢ÊÖ·¨ÊýÄ¿µÄ±¬Õ¨Ê½ÔöÌí¡£
´Ëʱ£¬»úеѧϰ¡¢Éî¶Èѧϰ¡¢Í¼Ëã·¨µÈÊý¾ÝÇý¶¯µÄÒªÁìµÄÓÅÔ½ÐÔ¾ÍÌåÏÖ³öÀ´ÁË¡£Êý¾ÝÖÐÔ̺¬µÄ¼ÍÂɺÍģʽ£¬ÊÇ¿ÉÒÔͨ¹ýÊý¾ÝÍÚ¾òµÄÒªÁì·ºÆð³öÀ´µÄ¡£Á÷Á¿ÌØÕ÷¡¢Ñù±¾ÌØÕ÷¡¢±àÂëÌØÕ÷¡¢ÐòÁÐÌØÕ÷¡¢¹ØÁªÌØÕ÷¡¢Ê±ÐòÌØÕ÷µÈµÈ£¬ÕâЩҪº¦µÄÊý×Öά¶ÈÄܹ»ÔÚûÓÐר¼Ò¼ÓÈëµÄÇéÐÎÏ£¬ÔÚÏÞÖÆÌõ¼þÏÂÍê³É¼ì²â¡¢ËÝÔ´¡¢ÆÀ¹ÀµÈʹÃü¡£ÕâÀïµÄ“ÏÞÖÆÌõ¼þ”ÊÇÒ»¸öÒªº¦µÄÎÊÌâ¡£Öî¶àʵÑéÐÔÄ£×ÓÓëËã·¨£¬ÔÚʵս»¯µÄÇå¾²ÔËÓªÖÐÄÑÒÔÓÐÓÃʩչ×÷Óá£Ö÷Ҫƿ¾±ÌåÏÖÔÚ£º
l Òì¹¹¶àÔ´Êý¾ÝǷȱ¹æ·¶Ô¼Êø¡£Êý¾ÝÊÕÂÞϵͳËùÍøÂçµÄÊý¾ÝÍêÕû¶È£¬°üÀ¨»ù´¡µÄ×Ö¶ÎÍêÕûÐÔ£¬ÐÅÏ¢Á÷µÄÃè»æÍêÕûÐÔ£¬ÐÅÏ¢¹éÊôµÄÍêÕûÐԵȵȣ¬ÄÑÒÔÓÐÓõġ¢¹æ·¶»¯µÄÁô´æ¡£Óë´Ëͬʱ£¬Êý¾ÝÆÊÎöÖеÄѵÁ·Êý¾Ý¼¯ÍùÍù¾ÓɶàÂִεÄϴ媡¢¹ýÂ˺ͱê¼Ç¡£¶øÏÖʵ°²ÅÅÇéÐÎÏ£¬ÀíÏëµÄÊý¾ÝÂþÑܼÙÉè¿Õ¼äÄÑÒÔÁýÕÖÖØ´ó¶¯Ì¬µÄÍøÂçÇéÐÎÓë¹¥»÷¼¼Õ½Êõת±ä¡£
l Ä£×ÓºÚºÐȱ·¦¿ÉÚ¹ÊÍÐÔ¡£Ä³Ð©ÖØ´ó¸ßÈÝÁ¿µÄÄ£×Ó£¬¶Ëµ½¶ËµÄ¸ø³öµÄÕ¹ÍûЧ¹û£¬ÎÞÂÛÊǶñÒâµÄÁ÷Á¿»òÑù±¾£¬»òÊǸßΣº¦µÄ¸æ¾¯£¬¶¼ÎÞ·¨Í¬Ê±¸ø³öºÏÀíµÄ×ôÖ¤¡£ÕâÔÚÔËÓª»·½ÚÖдøÀ´ÖØ´óµÄÆÊÎö±¾Ç®¡£
l ͳ¼ÆÊý¾ÝØÑ·¦ÓïÒåÄÚÔÚ¡£Óëȱ·¦¿ÉÚ¹ÊÍÐÔÏà¹Ø£¬Í³¼ÆÇý¶¯µÄ»úеѧϰҪÁìϰµÃµÄÊý¾Ýģʽ£¬²»×ÜÊÇÄܹ»Æ¥ÅäÇå¾²ÂÄÀúÓëÖ±¾õ£¬¶Ô²»ÆëÇå¾²µÄ¹Ø×¢½¹µã¡£¾Ù¸öÀý×Ó£¬Òì³£¼ì²âÊÇÇå¾²ÖÇÄÜÊÖÒÕÖеÄÖ÷Òª×é³ÉÖ®Ò»¡£È»¶ø£¬Òì֪ʶ±ðµÄά¶È¿ÉÔ´ÓÚ¶àÖÖÀàÐ͵ÄÊý¾Ýͳ¼ÆÎ¬¶È£¬ÀýÈçÃܶȡ¢¾àÀë¡¢¹ØÁªÐԵȵȡ£ÕâЩͳ¼ÆÎ¬¶ÈµÄÀëÉ¢µã£¬ÐèÒªÔÚÇå¾²³¡¾°Öиø¶¨Ò»¸ö¶ÔÓ¦µÄÓïÒ廯“ãÐÖµ”²Å»ªÓÐDZÔÚµÄÇå¾²¼ÄÒå¡£
l ÊÕÂÞÊý¾ÝÒþ˽й¶ÒþÓÇ¡£Êý¾ÝʹÓÃÓëÊý¾ÝÒþ˽±£»¤Ö®¼äµÄ¶Ô¿¹ÓëÆ½ºâ£¬Ê¼ÖÕÊÇÇå¾²ÊÖÒÕÉý¼¶µÄÇý¶¯Á¦Ö®Ò»¡£Ëæ×ÅÇå¾²·ÀÓùÍøÂçµÄÊý¾ÝÆÕ±éÐÔºÍÉî¶ÈµÄÌáÉý£¬±»ÊÕÂ޶˵ÄÊý¾ÝËùÓÐÕß¶ÔÊÕÂÞϵͳµÄµÖ´¥ÐÄÀíÓú·¢Ã÷ÏÔ¡£Êý¾Ý´ÓÃ÷Îĵ½¼ÓÃÜ£¬ÉõÖÁ¾Ü¾ø“³ö¾³”£¬ÕâЩ¶¼ÏÞÖÆÁËÊý¾ÝÇýÏÂÊÖÒռƻ®µÄÂ䵨¡£
ÉÏÊöö¾ÙµÄ¶à¸öÊÖÒÕÆ¿¾±£¬¸øÊý¾ÝÍÚ¾òÒªÁìµÄÇå¾²Ó¦ÓüÓÈëÁ˲»ÉÙÏÞÖÆ¡£ÓëÖ®Ïà¶ÔÓ¦µÄÊÇ£¬Çå¾²ÊÖÒյĹ¤ÒµÊµÏÖÖУ¬Óë¹¥»÷·½ÎäÆ÷¿âÏà¶ÔÓ¦µÄ£¬ÖÖÖÖÀàÐ͵ĹæÔòÈÔÈ»ÊÇ×îÃû¹óµÄÇ鱨սÂÔ×ÊÔ´£»ÖÖÖÖÀà¼ì²â·ÀÓùϵͳµÄ½¹µãµ¥Î»£¬¾ø´ó²¿·ÖÕվɹæÔòÒýÇæ£¬¶ø²»ÊÇij¸ö»ùÓÚ»úеѧϰµÄ¼ì²âÄ£×Ó¡£ÄÇô£¬ÊÇ·ñÓÐÒ»Ì죬µ±Ä£×ÓµÄ׼ȷÐÔ×ã¹»¸ß¡¢·º»¯ÄÜÁ¦×㹻ǿ£¬Ä£×ÓÓëËã·¨½«Í³Ò»Çå¾²·ÀÓùϵͳµÄÌìÏÂÄØ£¿ÖÇÄÜ»¯ÊÖ¶ÎÓëÒªÁ죬Ӧ¸ÃÔÚÇå¾²³¡¾°ÖÐʩչÔõÑùµÄ×÷ÓÃÄØ£¿
Ϊ»Ø¸²ÉÏÊöÎÊÌ⣬ÎÞ·ÁÉèÏëºÍ»ØÊ×ÍøÂçÇå¾²µÄʵÖÊ¡£Çå¾²¿ÉÒÔÒÔΪÊÇÒ»ÖÖ״̬£¬ÔÚÕâÖÖ״̬Ï£¬ÈË¡¢ÏµÍ³¡¢¹¤ÒµµÈÏÖʵ»òÐéÄâʵÌåδÊܵ½ÍþвÓëË𺦡£ÄÇôÔõô½ç¶¨ÓëÆÀ¼ÛʵÌåÊÇ·ñÊܵ½ÍþвºÍËðº¦ÄØ£¿±ÊÕßÒÔΪÆäÖеÄÒªº¦ÔÚÓÚ“Á¢·¨”£¬Ò²¾ÍÊÇÉ趨½çÏßÓë¹æÔò£¬¶ÔÔ½½ç¡¢Î¥¹æÐÐΪ¾ÙÐд¦·Ö¡£ÕâÀïµÄ“·¨”²»ÌØÖ¸Ö´·¨»òÕßÖ´·¨£¬¶øÊÇÇ¿µ÷½çÏßÓë¹æÔòµÄÖ÷ÒªÐÔ¡£“²»ÒÔ¹æÔò£¬²»¿É³ÉÖÜÔ┣¬ÔÚÍøÂçÇå¾²µÄ³¡¾°ÏÂÃ÷ȷʹÃü½çÏßÓÈΪҪº¦¡£¶øÇå¾²³¡¾°ÏÂÖ´ÐÐʹÃüµÄÒªº¦£¬ÔòÔÚÓÚ“ÒÀ·¨”Ö´ÐÐÓë“Ö´·¨”͸Ã÷¡£ÒÔÉÏ¿Éͳ³ÆÎª“ÒÀ·¨”ÊôÐÔ¡£Çå¾²ÐÐÒµµÄ“ÒÀ·¨”ÊôÐÔ£¬¾öÒéÁ˹æÔòÒýÇæµÄÇå¾²ÊÖÒÕµ××ù½¹µãְλ¡£´ÓÕâ¸ö½Ç¶ÈÀ´¿´£¬Êý¾ÝÇý¶¯µÄÄ£×ÓµÄÖ÷Ҫƿ¾±£¬ÔÚÓÚÆä¶Ô½çÏß½ç˵µÄÄ£ºýÐÔ¡£Ä£ºýµÄ½çÏß½ç˵¸øÍ³¼ÆÀàÄ£×Ó¸¶ÓëÁËÁè¼Ý¹æÔòµÄÎÞаÐÔ£¬µ«Í¬Ê±×¢¶¨ÁËÆäÎÞ·¨¶ÔÈκÎÊÂÎñÆÊÎö¸ø³öÃ÷È·µÄÔðÈλ®¶¨¡£ÒÔÊÇ¿ÉÒԵóöÕâÑùµÄÖÊÆÓ½áÂÛ£ºÊý¾ÝÇý¶¯ÒªÁìÓ¦µ±ÓÃÓÚ¸¨ÖúÇå¾²“Á¢·¨”Óë“Ö´·¨”£¬¶ø²»Ó¦¸ÃÊÇ“Á¢·¨”Óë“Ö´·¨”µÄÖ÷Ìå¡£

ͼ1 Íþв¼ì²âÁìÓòµÄ¾µäÓïÑÔ
»Øµ½±¾ÎĵÄÖ÷Ì⣬ËùνÓïÑÔ£¬ÕýÊǹæÔòµÄÜöÝÍ£¬ÊÇ“·¨”µÄÏêϸÌåÏÖÐÎʽ¡£Ò»Ì×ÃæÏòÌØ¶¨³¡¾°µÄ¡¢×Ô³ÉϵͳµÄ¹æÔòϵͳ£¬¿É³ÆÎªÒ»ÖÖÁìÓòÓïÑÔ£»¶øÐÎò»òÕß½ç˵¹æÔòϵͳµÄ¹æÔò£¬¿É³ÆÎªÁìÓòÓïÑÔµÄÓïÑÔ£¬¼´ÔªÓï¡£»Øµ½ÍøÂçÇå¾²ÁìÓò£¬½ÏÁ¿¾µäµÄ¹æÔòϵͳ£¬°üÀ¨ÓÃÓÚÁ÷Á¿¹¥»÷¼ì²âµÄSnort¹æÔò£¬ÓÃÓÚ¶ñÒâÎļþ¼ì²âµÄYARA¹æÔò£¬ÓÃÓÚÈÕÖ¾Íþв¼ì²âµÄSigma¹æÔòµÈµÈ¡£ÕâЩ¹æÔòϵͳ¶¼×Ô³Éϵͳ£¬ÐγÉÁìÓòרÓõÄÓïÑÔϵͳ¡£¶øSnort¡¢YARA¡¢Sigma¹æÔòµÄÌÜд¹æ·¶Óë¹æÔò£¬¾ÍÊÇÆä¶ÔÓ¦µÄÔªÓï¡£
Çå¾²ÁìÓòרÓÃÓïÑÔ£¨Domain Specific Language For Security£©£¬ÔÚÍþв¼ì²âµÄ¸÷¸öÁìÓò£¬¶¼¾ßÓкÜÇ¿µÄͳÖÎְλ¡£ÕâÖÖ¹æÔòϵͳµÄÍêÉÆ£¬»ò³ÆÎªÓïÑÔϵͳµÄ³ÉÊ죬»á³ä·ÖÑéÕ¹ÓïÑԵĹ淶ÐÔ¡¢±í´ïÁ¦£¬ÓÐÓÃÌáÉýÆä×Ô¼ºµÄÈö²¥ÐÔÓëÓ°ÏìÁ¦¡£½üÄêÀ´ATT&CK֪ʶ¿âµÄ·çÐУ¬ÕýµÃÒæÓÚÍþв·ÖÀàÓëÐÎòԪÓïÉè¼ÆµÄÍêÕûÐÔÓë±í´ïÁ¦¡£
¶þ¡¢ Íþвá÷ÁÔÊÓ²ìÆÊÎöÓïÑÔ¸ÅÊö
ÓïÑÔµÄÉè¼ÆÔ´ÓÚ¿ÆÑ§µÄÈÏÖª£¬Ò²¸üÒÀÀµ¶ÔÊÂÎïÃ÷È·µÄÒÕÊõ¡£±ê×¼ÓïÑÔ£¬ÀàËÆÍ¨Ë×»°£¬Äܹ»Ôö½øÐÅÏ¢µÄ½»Á÷ÓëÈö²¥£¬ïÔÌÐÅÏ¢¹ÂµºÐ§Ó¦¡£ÔÚÇå¾²ÁìÓò£¬³ýÁËÉÏÊöÌáµ½µÄ¼ì²âÓïÑÔ£¬ÍþвÇ鱨¹æ·¶STIX£¬¶ñÒâÈí¼þÐÎòÓïÑÔMAEC£¬Íþв¼ì²â¿ò¼ÜATT&CKµÈµÈ£¬¶¼ÊǾßÓÐÆÕ±éÓ°ÏìÁ¦µÄÁìÓòÐÅÏ¢½»Á÷ÓëÐÎòÓïÑÔ£¬ËäÈ»·×Æç¶¨³ÆÎª±ê×¼£¬µ«ÆäÓ°ÏìÁ¦±»ÐÐÒµÆÕ±éÈϿɡ£±ê×¼ÓïÑÔµÄÀֳɯռ°Ò»·½ÃæÒÀÀµÓÚ¹¤ÒµÊÖÒյijÉÊ죬ÁíÒ»·½ÃæÐèҪǿÓÐÁ¦µÄÐÐÒµÏòµ¼ÕßÀ´Íƶ¯¡£³ýÁ˱ê×¼ÓïÑÔ£¬¶¨ÖÆÓïÑÔÒ²ºÜÖ÷Òª£¬ÀàËÆ·½ÑÔ£¬Äܹ»ÌáÉý¾Ö²¿ÐÅÏ¢µÄ¸ßЧÁ÷תÓë¾öÒéʵÑé¡£¶¨ÖÆÓïÑÔ¾ÍÊÇΪÁËЧÂʶøÉú£¬Ò»Ç§¸ö³ÉÊì³§É̾ͿÉÄÜÓÐһǧ¸ö¶¨ÖƵļì²â¹æÔòÒýÇæÏµÍ³¡£
ÎÒÃÇÒѾ¿´µ½£¬ÔÚÍþв¼ì²âÁìÓò£¬¼´¶¨Î»ÍþвµÄÒªÁìÂÛÉÏ£¬ÒѾÓнÏΪ³ÉÊìµÄÓïÑÔϵͳ¡£µ«Ëæ×Ÿ߼¶¹¥»÷¼¼Õ½ÊõµÄÑݽøÓë¹¥»÷ÃæµÄÍØÕ¹£¬ÍþвÆÊÎöÒѾ²»µ«ÏÞÓÚ³õ¼¶µÄÍþв¶¨Î»¡£×Ô¶¯µÄÍþвá÷ÁÔ£¬¶ÔÎÞаµÄÍþв¶¨Î»¡¢¸ßЧµÄÉÏÏÂÎÄÍØÕ¹¡¢¾«×¼µÄ·¾¶ËÝÔ´Ìá³öÁ˸ü¸ßµÄÒªÇ󡣹ŰåÁ÷Á¿¡¢Ñù±¾¡¢Ç鱨¡¢ÈÕÖ¾·ÖÁ¢µÄ“ÓïÑÔÄ£×Ó”Óë¹æÔòϵͳ£¬ÒѾÄÑÒÔ˳Ӧ¿ç¶àÔ´¡¢¶àÀàÐÍÈÕÖ¾µÄÍþвÊÓ²ìÓëÆÊÎöÐèÇó¡£

ͼ2 й¶µÄFireEye¹¥»÷¹¤¾ß¼ì²âÒªÁì¸ÅÊö
Èçͼ1Ëùʾ£¬ÎªÁËÓ¦¶Ô¹¥»÷¹¤¾ß¼¯Ð¹Â¶£¬FireEye¸ø³öÁËÊý°ÙÌõ¼ì²â¹æÔò£¬ÆäÖаüÀ¨Snort¡¢Yara¡¢ClamAV¡¢HXIOCµÈ¶àÖÖÓïÑÔÃûÌÃ[1]¡£Ö»¹ÜÏà¹Ø¹æÔò¶¼ÊǸ÷×ÔÁìÓòµÄϵͳÖеÄÓïÑÔ“±ê×¼”£¬µ«ÔÚÇå¾²ÔËÓªÖÐÐÄÈÕ½¥³ÉÊìµÄ½ñÌ죬ȱ·¦Ò»ÖÖ¸üÎÞаµÄ¡¢Äܹ»ÓÐÓÃÁýÕÖ¶àÖÖÈÕÖ¾Êý¾ÝµÄ±ê×¼ÓïÑÔ£¬Ö§³Ö½»»¥Ê½µÄÍþвÊÓ²ìÓëÆÊÎö£¬ÕâÎÞÒÉÊÇÊÖÒÕÉú³¤µÄÍ´µãÖ®Ò»¡£±ðµÄ£¬ÕâЩ¹æÔòϵͳÈÔÈ»ÆÕ±é¾ÖÏÞÓÚ»ùÓÚIOCµÄÌØÕ÷Ö¸ÎÆÆ¥ÅäÔ¤¶¨Î»¹¦Ð§£¬ÎÞ·¨²¶»ñÍþвÊÂÎñµÄʱÐòÒÀÀµ¡¢ÐÅÏ¢Á÷ÒÀÀµµÈÖØ´ó¹ØÏµÌØÕ÷¡£
ËäȻȱ·¦ÊÂʵµÄ¹«ÈÏÒªÁìÓë±ê×¼£¬¿ÉÊÇÃæÏò×Ô¶¯Íþвá÷ÁÔ³¡¾°ÏµÄÍþвÊÓ²ìÓëÆÊÎö£¬¹¤Òµ½çÓëѧÊõ½çÍŶÓÈÔÈ»¸ø³öÁ˲»ÉÙ“·½ÑÔ”°æÊµÑ飬ÒÔÏÂͨ¹ý±í¸ñ¸ÅÊö¼¸ÖÖÇ°ÑØÊÖÒռƻ®¡£
±í1 ÍþвÊÓ²ìÆÊÎöÓïÑÔ×ܽá

Èç±í1Ëùʾ£¬ÎÒÃÇÖ÷Òª´Ó¸ÃÓïÑÔÄ£×ÓÕë¶ÔµÄÊý¾ÝÀàÐÍ¡¢Ö§³ÖµÄģʽÀàÐÍ¡¢ÊµÊ±ÐÔÈý¸ö½Ç¶ÈÀ´ÆðÔ´±ê¶¨¸÷ÊÖÒռƻ®Ö÷ÒªµÄÓ¦ÓÃÁìÓòÓë·½·¨¡£Êý¾ÝÀàÐÍ·½Ã棬ÐÐΪ¡¢ÇéÐΡ¢Ç鱨¡¢ÖªÊ¶ËÄÖÖÀàÐ͵ÄÊý¾Ý¿ÉÁýÕÖÇå¾²ÔËÓªÖÐÐÄËù½ÓÈëµÄ²î±ðÀàÐÍÊý¾Ý¡£ÔÚģʽÀàÐÍÖУ¬“µ¥µã”Ö¸µÄÊÇÒÔÌØÕ÷»òÖ¸ÎÆÆ¥ÅäΪÖ÷µÄµ¥¸öÊÂÎñģʽ£»“ÜöÝÍ”ÌåÏÖ¶à¸öÊÂÎñµÄÎÞÐò×éºÏ£»“ÐòÁДÌåÏÖÓÐÐòµÄÊÂÎñ×éºÏ£»“¾²Ì¬Í¼”ÌåÏÖÐÅÏ¢Á÷»ò½á¹¹Ïà¹ØµÄÊÂÎñ×éºÏ£»“ʱÐòͼ”ÌåÏÖÓÐÐò²¢ÇÒ±£´æÐÅÏ¢¹ØÁªµÄÊÂÎñ×éºÏ£»“Ä£×Ó”ÌåÏÖ»ùÓÚ»úеѧϰµÈÄ£×ÓÒªÁ죬ÔÚͳ¼ÆÌØÕ÷ÉϿɹØÁªÆðÀ´µÄÊÂÎñ×éºÏ¡£ÊµÊ±ÐÔ·½Ã棬Ö÷Òª°üÀ¨Á÷ʽµÄÆÊÎöģʽºÍÅúÁ¿µÄÊÓ²ìģʽ¡£
ÍþвÊÓ²ìÆÊÎöÓïÑÔ£¬½¹µãÔÚÓÚ“±í´ïÁ¦”£¬¼´ÄÜ·ñÎÞаµÄÖ§³ÖÍþвá÷ÁÔÀú³ÌÖеÄÒ»Á¬ÑéÖ¤Àú³Ì¡£Îª´Ë£¬Êý¾ÝÀàÐÍÁýÕÖÔ½ÖÜÈ«£¬Ö§³ÖµÄÊÂÎñģʽÀàÐÍÔ½¸»ºñ£¬ÓïÑԵıí´ïÄÜÁ¦Ô½Ç¿£¬Ô½Äܹ»ÓÐÓõĽµµÍÊÓ²ìÀú³ÌÖеĿçÊý¾Ý¿ªÏúºÍÖØ´óÊÂÎñ¹ØÁªÆÊÎö¿ªÏú¡£ÍþвÊÓ²ìÆÊÎöÓïÑÔ²»ÏÞÓÚ±íÖÐ×ܽáµÄ¼¸ÖÖʵÏּƻ®¡£ÈçǰÎÄËùÊö£¬Ä¿½ñÕë¶ÔÍþвÊÓ²ìÁìÓòÓïÑÔµÄÉè¼Æ£¬Òµ½çÉд¦ÓÚ̽Ë÷Ö®ÖУ¬ÊÇÇ徲ѧÊõÓ빤ҵÑо¿ÖеÄÖ÷Òª¿ÎÌâÖ®Ò»¡£ÏÞÓÚÆª·ù£¬±¾ÎļòÒª×ܽáÔÚ´Ë£¬¸ÐÐËȤµÄ¶ÁÕß¿ÉÔڲο¼ÎÄÏ×»ò×ÊÁÏÖÐÉîÈëÑо¿ÏêϸµÄÊÖÒÕʵÏÖ¡£
Èý¡¢ ×ܽá
ÓëÓïÑԵĽ¨Ä£ÓëÆÊÎöÏà¹Ø£¬Ç徲֪ʶ¿â¡¢ÖªÊ¶Í¼Æ×¡¢ÓïÒåÆÊÎö¡¢¿ÉÚ¹ÊÍÖÇÄÜ¡¢Òò¹ûÍÚ¾òµÈµÈ£¬ÕâЩÊÖÒÕÃû´ÊÒѾÖð½¥ÈÚÈëÇå¾²ÊÖÒÕÉú³¤µÄÊÓÒ°ÖС£Å×È¥×·ÖðÈÈÃŵIJ¿·Ö£¬´ÓÓïÑÔÉè¼ÆÓëÓ¦ÓõĽǶÈÉóÔÄÇå¾²ÊÖÒÕµÄÉú³¤£¬ÄܸüÇåÎúµÄÉóÔÄÎÒÃÇΪʲôҪ×öÓëÔõÑù×ö¡£
²Î¿¼ÎÄÏ×
[1] https://github.com/fireeye/red_team_tool_countermeasures
[2] https://github.com/endgameinc/eql
[3] Noel S, Harley E, Tam K H, et al.: CyGraph: graph-based analytics and visualization for cybersecurity, Handbook of Statistics: Elsevier, 2016: 117-167.
[4] Shu X, Araujo F, Schales D L, et al. Threat Intelligence Computing[C]. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018: 1883-1898.
[5] https://github.com/SigmaHQ/sigma
[6] https://ci.apache.org/projects/flink/flink-docs-stable/dev/libs/cep.html
[7] Gao P, Shao F, Liu X, et al. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence[J]. arXiv preprint arXiv:2010.13637, 2020.
[8] Gao P, Xiao X, Li D, et al. {SAQL}: A stream-based query system for real-time abnormal system behavior detection[C]. 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018: 639-656.
[9] Gao P, Xiao X, Li Z, et al. {AIQL}: Enabling efficient attack investigation from system monitoring data[C]. 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 2018: 113-126.

¾ÅÓÎÀϸçÔÆ







