RussianPatents.com
|
Method for remote monitoring and control of networking information security based on use of domain name system. RU patent 2503059. |
|||||||||||||||||||||
IPC classes for russian patent Method for remote monitoring and control of networking information security based on use of domain name system. RU patent 2503059. (RU 2503059):
|
FIELD: information technology. SUBSTANCE: method involves modifying DNS response to resolution of a domain name of a target information service such that, an "Additional" field specified by configuration information and security policy rules is added to the DNS response, said field initiating the beginning of the process of monitoring and controlling communication security, after which the modified DNS response is sent from a controlled DNS server to the DNS server of an internet provider; a request is sent on behalf of a client to the target information service; the request from the client is received at the monitoring point; the necessary control actions are determined based on the network security policy and information in the request to the target information service; control actions are carried out for network traffic. EFFECT: providing remote monitoring and control of networking information security regardless of network topology and the location of the monitoring point and high security of controlled information structures. 3 dwg
The invention relates to the field of data protection, namely to ensure information security, networking, information services and clients. The proposed method allows to remotely monitor the network interaction information services and clients using domain name system, on the basis of modification of DNS packets transaction and further active participation in information exchange. Known "Method and device for remote monitoring of network traffic in the networks of General use" for U.S. patent no 7899048 B1 from March 01, 2011 (David S. Walker, Kalyan K. Ghosh, Thomas J. Edsall). The known method are that there is a network device, participating in information exchange network clients network of General use, i.e. physically connected to the public network used by clients, and being a mediator network clients, which is determined by the configuration of the network of General use. Implementation is that, receiving data packets being transmitted from one client to another, this network device additionally generates a data packet containing a copy of the data from the source package and transferred later to the device network traffic monitoring. The disadvantage of this method is the dependence of the number of participants of the communications network, which ensures the monitoring of network traffic, network topology, network location, controlled participants and the location of the switch, network traffic, ensuring the communication of copies of network packets to the network analyzer. Thus, if the routing of network traffic passes through the network on which access to the switch that directs packets to the network analyzer, the monitoring of network interaction for the information of participants is not provided. Closest in its technical nature and carried out functions equivalent (prototype) to the claimed is a "Switch DNS traffic (U.S. patent no 2007/0180090 A1, class G06F 15/173 (2006.01) 02 August 2007 (Robert M.Fleischman, William Thomas Waters). The known method includes the following steps: take a DNS query DNS for the client to a DNS server, identify the DNS information from the DNS query to define the necessary control actions on the basis of the network security policy and information in the DNS transaction, perform control actions on the network traffic. If such a set of these items and links prototype allows information security management network interaction based on the domain name system, the control actions are formed only on the basis of the data received by the DNS transaction and the available a priori rules of security policy. The disadvantage of this method is the low security level of computer networks, expressed probability of reliable protection of information in computer networks. Insufficient level of protection due to the limited number of objects of the computer network and the number of States (modes) of objects of computer network for which monitoring information security management and network communication. The limited number of objects of computer network occurs due to the nature used in the prototype of the domain name system for management of information security computer network, when the control is carried out only for those objects of computer networks which work through DNS switch described in the prototype, the objects of computer networks using the DNS switch, control and management are not exposed. The limited number of States (modes) of objects of computer network due to the use of a data-only DNS transaction for generation of control actions and for the monitoring network, as well as the fact that the monitoring and management of information security of the network interaction in the prototype is only when establishing a connection (resolution procedures of the requested domain name) between the client and information service and, as a consequence, lack of monitoring and management of network interaction in the process of information exchange after the session is established, that does not allow to perform tasks such as filtering of information interaction of the customer and information services at the network level, filtering, taking into account any significant fields of network packets, customer access control to information services after establishing a connection filter the traffic on the presence information of a confidential nature and information constituting a state secret. The objective of the invention is to provide a method of remote monitoring and information security management network interaction on the basis of use of the domain name system, which allows to increase the security of the network of customer interaction and information services that use the domain name system, expressed by the probability of reliable data protection: P = ∏ i = 1 N P i , ( 1 )where P - the probability of information security at the i-site, participating in networking, N - the number of objects for which you will manage information security. Security of the information on the i-th object depends on information security in each state (mode) of each object. Thus, the security of the information on the i-th object is expressed: P i = 1 - ∏ k = 1 M ( 1 - P i k ) , ( 2 )where P ik probability of security of information on the i-th subject in the k-m state (mode) of the automated system, M - number of States for an automated system. Because the claimed method traffic unlike the prototype allows regardless of the network topology and the location of the monitoring point (firewall) and customers to information security management and monitoring of network interaction, N C and I in l > N p R about t ( 3 ) ,where N and Appl N FR - number of objects for which monitoring and management of information security for the claimed method and prototype respectively. Moreover, the claimed method allows information security management and monitoring of network interaction as when establishing a connection and information exchange client and information services, to filter traffic based on any significant fields of network packets, customer access control to information services after establishing a connection, filter the traffic on the presence information of a confidential nature and information constituting a state secret. Thus M C and I in l > M p R about t ( 4 ) ,where M and M Appl FR - number of States (modes) of the automated system for the claimed method and prototype respectively, which is monitored and information security management. On the basis of (1-4): P i C and I in l > P i p R about t ( 4 ) , where P i C and I in l and P i p R about t- the probability of information security for the claimed method and prototype respectively. This problem is solved by the method of remote monitoring and information security management network interaction on the basis of use take a DNS query DNS for the client to a DNS server, identify the DNS information from the DNS query to define the necessary control actions on the basis of the network security policy and information in the DNS transaction. Carry out controlling actions at the network traffic - modification of the DNS response in such a way that the DNS reply is added to the specified configuration information and the rules of security policy field "Additional"to trigger the beginning of the process of monitoring and management of information exchange, after which additionally according to the invention send a modified DNS response from a DNS server, take a DNS query to the DNS server of the Internet service provider (ISP initialize the values in the cache of a DNS server provider. Take requesting permissions of the specified host name, send DNS response to using values from the cache of a DNS server provider, take the DNS response from a DNS server provider, submit a request on behalf of the client to the target information service, accept a request from a customer at the point of monitoring, determine the necessary control actions on the basis of the network security policy and information in the request to the target information service, carry out controlling actions at the network traffic, submit a request to the target information service, accept a response from the target information service for the client to define the necessary control actions on the basis of the network policy security and information in the request to the target information service, carry out controlling actions at the network traffic, send the response to the client on behalf of the target information service. It is essential modification of the DNS response by adding a field "Additional"containing the information about the domain name, for which you will be monitoring. Thus, in case of absence in the cache memory of the provider claimed domain name from the field "Additional", it together with the corresponding(and) to IP addresses will be placed into the cache of a DNS server of the Internet provider to start the monitoring and management of informational interaction of the client and the information service. The analysis of the equipment has allowed to establish that the analogues, characterized by the totality of features identical to all features of the claimed technical solutions, no, that indicates compliance of the invention with the condition of patentability «novelty». Industrial applicability of the proposed method is due to the fact that the proposed solution can be implemented with the help of modern element base with the corresponding software. The claimed method is illustrated by drawings, showing: figure 1 - block diagram of the action carrying out a way to remotely monitor and control the information security of the network interaction on the basis of use of the domain name system; figure 2 - the algorithm of operation of the DNS switch in the structure of the controlled DNS server; figure 3 - the block diagram of a typical computer network that implements the method of remote monitoring and information security management network interaction on the basis of use of the domain name system. Figure 1 shows the block diagram of the order of actions for the implementation of the proposed method implemented by a typical computer network, presented in figure 3. In the composition of a typical computer network that implements the claimed method, includes the following elements. 1. Client PC (Client). 2. Internet service provider (composed of: a caching DNS server, gateway). 3. The subsidiary client. 4. The domain name system. 5. Point monitoring (firewall, filter, proxy server). 6. Server information service. As a client can act as PC users of computer networks, and a variety of services (such as FTP, WEB, SMTP, POP). As information services are any services that use the domain name system. These include, for example, WEB, FTP, EMAIL, POP, SMTP, IMAP. For successful implementation of methods for remote monitoring and information security management network communication through the use of domain names to a number of conditions: 1. There is controlled by the DNS server responsible for some (any) zone domain name system. 2. The client is served by an Internet access provider with the caching DNS server, or known to the other DNS server, the services which the customer has, and this server is caching. 3. At the moment of receiving the DNS response from controlled DNS server in the DNS cache server of the Internet provider does not have a record with the target DNS host name information service. 4. The monitoring point there is a database of IP addresses and domain names of target information service in respect of which there is a monitoring and management of network interaction with the client. To initialize the process of monitoring need to make a request to resolve the DNS name of the zone that is controlled by the DNS server. Due to this, there is a possibility to form the DNS response to a request with the specified parameters. According to the recommendations of RFC 1034, RFC 1035, establishing the procedure of functioning, the specification and use of the domain name system, the formation of the DNS response allowed to add, so-called field "Additional". These fields are required to record the IP address of auxiliary units of various types, including, for preventing repeated requests to the DNS server, in cases when for some reason, the primary site, the recording of which is transferred in the "Answer"is unavailable. In case of application of the proposed method, field "Additional" is the IP address, in compliance domain name of the target information service, but actually owned by the monitoring point - firewall. Based on these provisions the initiator of the beginning of the monitoring process is an "auxiliary" the client sending the request to the caching DNS server provider for hostname resolution is in the zone that is controlled by the DNS server. In the role of "subsidiary" of a customer can be information services (WEB, FTP, MAIL and others), user programs or any hardware and software, uses in his work appeals to the sites with the domain names. Thus, in addition to direct the formation and sending the DNS query to the resolution of the domain name, the request can be sent automatically DNS client included with the operating system (or any other software and hardware environment) in case, if the reference to the node occurs at the domain name is not in the cache, the DNS client service. After the resolution of the specified DNS name DNS server of your Internet service provider (ISP) receives a DNS response, in the absence of entries in its cache relevant records of the additional fields DNS response, he places the record in the cache memory. Thus, in the cache memory of the DNS server of the Internet provider are placed records establishing the conformity of the domain name information services to be monitored, and the IP addresses belonging to the monitoring point. From that moment, in case the client makes a DNS request for the permission of the host name of the target information service domain name stored in the cache provider and saved from the additional field, received after processing of the DNS query "subsidiary" of the client, the DNS server of your Internet provider generates and sends a DNS response to the client on the basis of data from its cache. Thus, the customer gets the permission for the domain name requested information service with the IP address collected from a controlled DNS server and stored at the time of processing client request Internet provider in the cache memory of the provider. The IP address does not belong to the target information service requested by the client, and the monitoring point. Accordingly, the next request from the client to the target information service occurs at the IP address belonging to the monitoring point. When a client on the received IP address to the point of monitoring, which on the basis of predefined settings in the network security policy is a number of control actions. These steps include: 1. Parsing received from the client transaction. 2. The elaboration and implementation of the control actions. 3. Audit received transactions and actions performed. 4. Formation on the basis of the data received by the client transaction request to the information service. The point of monitoring is, essentially, a firewall (ITU), which can meet certain requirements for information security. Execution of requirements, ITU is characterized by the presence and execution of a number of security parameters, which include: 1. Access control (data filtering and address translation). 2. Identification and authentication. 3. Registration. 4. Administration: identification and authentication. 5. Administration: registration. 6. Administration: ease of use. 7. Integrity. 8. Restore. 9. Testing. The monitoring point - ITU is NAT (Network Address Translation - NAT), which allows to provide its "transparent" work with the client's perspective and target information service. Realization of the claimed process includes the consistent implementation of the following actions. 1. Stage 1. Transfer commands (control) "subsidiary" to the client initiating the request to the DNS server of the Internet provider's domain name resolution of domain zone that is controlled by the DNS server. Instead of using the client can be used and direct request to the DNS server of the Internet provider. 2. Stage 2. Formation and sending the DNS query from the "subsidiary" of a customer to the DNS server of the Internet provider. 3. Stage 3. Processing of the DNS query to an Internet provider. At this stage, if the DNS server of your Internet provider does not find in its cache for the requested name, it generates a DNS query to the root DNS server. If the entry is already in the cache, the DNS server sends the response to the client. In this case, for the implementation of this method, we must create and send a second request with a modified domain name. 4. Steps 4-7. Sequential processing of the DNS query to the requested domain name system domain name until the domain name or is found, or a response is received, that such name does not exist. A DNS query is first processed root server, then GTLD server level 1 (eng. generic Top-Level Domain - Generic top-level domain) and by the hierarchy of DNS servers until the request reaches authoritative for the requested zone DNS server. In case of realization of the proposed method of the authoritative server is controlled. 5. Step 8. After taking a controlled DNS server receives a request and the queried DNS domain name switch, built-in DNS server, adds in accordance with configuration information for an additional field in the DNS response, which triggers the beginning of a process for monitoring and management of informational interaction of the client and the information service. 6. Step 9. DNS response is controlled DNS server to the DNS server of the provider. 10. Step 15. At the point of monitoring is to process the client request to the information service in accordance with the rules of security policy, on the basis of which can be a number of control actions. After processing a client request is NAT, then the client request to the information service transmitted from the name (IP address) of the monitoring point. 11. Step 17. After receiving and processing the request, the server information service sends a reply, which comes to the point monitoring. 12. Step 18. Similarly 15th happens processing response information service to the client and application of the relevant rules of security policy. Then reverse NAT (see step 15) and response information service is sent to the address of the client. 13. Stages 19-20. With the participation of the gateway ISP processed point monitoring - firewall answer from the information service transmitted to the client. Figure 2 presents the algorithm of operation of the DNS switch in the structure of the controlled DNS server. DNS switch, actually implements the DNS server in full compliance with the recommendations of RFC 1034, RFC 1035, except that on the 6th stage (see box 6 figure 2) in the DNS response "Additional", an entry is added with the IP address of the point of monitoring, which is associated with the domain name of the target information service. Figure 3 presents the structural scheme of processing of DNS DNS transaction switch, operational within the controlled DNS server. Composition and appointment of blocks DNS switch similar to the composition and purpose of the DNS switch prototype (for U.S. patent no 2007/0180090 A1, class G06F 15/173 (2006.01) 02 August, 2007), except that the Executive block implements other (additional) functions. The Executive unit with the treatment received transaction (DNS query) on the basis of data from the DNS database and configuration information forms a DNS response, allowing the requested domain name, and adds the additional response field "Additional Records records in accordance with configuration information. In the DNS response "Additional" add one or multiple entries with the IP address of the monitoring point, which corresponds to the requested domain name of the target information service. In case of successful processing of the generated DNS response DNS server of your Internet provider, the data from the field "Additional records will be written to the cache memory of the DNS server of the Internet provider. The proposed method is implemented using the computer network. In the composition of the computer network includes: 1. The DNS server authoritative for the zone. "or"domain name "ns.a". 2. The DNS server authoritative for the zone "b", with the domain name "ns.b". 3. Client PC IP address 10.0.33.13. 4. The point of monitoring, firewall with the IP address 10.0.33.13. Between all objects of a computer network is configured network communication. Principle of operation of a computer network is the following. Between DNS servers forwarding zones, so that upon receipt of a request for domain name resolution of the zone, which is responsible for the other DNS server, the current DNS server generates and sends to it the repeated DNS query and, having received from him the answer generates and sends a DNS response to the client, the first request, simultaneously placing it in its cache the response from the second DNS server. Thus, we model the DNS server of the Internet provider. At the 1st stage of the DNS server responsible for the zone ".b", runs the script fakedns"modeling the operation of the DNS on the switch. In the script task includes the processing of the received DNS query to resolve the domain name from the zone "b" and add a DNS response, an additional field "Additional" to the domain name (in the example - "victim.com")corresponding to the target information service for which you will be monitoring and managing the security of the network interaction with the client, and with the specified IP address (in the example above, 10.0.33.13"), the relevant point of the monitoring firewall. Run script "fakedns" with the given parameters, simulating the work of a DNS switch command: [root@fakedns]# ./fakedns 10.0.33.3 victim com. 10.0.33.13 At the 2nd stage, the generation and transfer of DNS query for the domain name "test.b" from the client to the domain name system, consisting of the DNS server ns.a" and DNS server ns.b". The primary DNS server (DNS server ISP) for the client is the DNS server "ns.a". At the 3rd stage is formed and transmitted DNS response for a domain name "test.b" with an extra field "Additional" and the specified domain name "victim.com", the relevant information service, which corresponds to the specified IP address "10.0.33.13", corresponding to the monitoring point. The package structure of the DNS response in this case is as follows. Domain Name System (response) Transaction ID: 0 x 4895 Flags: 0 x 8400 (Standard query response. No error) Questions: 1 Answer RRs: 1 Authority RRs: 1 Additional RRs: 1 Queriestest.b: type A, class IN Name: test.b Type: A (Host address) Class: IN (0 x 0001) Answerstest.b: type A class IN, addr 10.0.33.13 Name: test.b Type: A (Host address) Class: IN (0 x 0001) Time to live: 7 days Data length: 4 Addr: 10.0.33.13 Authoritative nameservers com: type NS, class IN, ns http://victim.com Name: com Type: NS Authoritative name server) Class: IN (0 x 0001) Time to live: 7 days Data length: 12 Name server: http://victim.com Additional records http://victim.com: type A class IN, addr 10.0.33.13 Name: http://victim.com Type: A (Host address) Class: IN (0 x 0001) Time to live: 7 days Data length: 4 Addr: 10.0.33.13 Step 5 of the reply is received on the availability of a DNS cache server "ns.a" domain name". The structure of the DNS response in this case is as follows: Domain Name System (response) Transaction ID: 0 x b33f Flags: 0 x 8400 (Standard query response. No error) Questions: 1 Answer RRs: 1 Authority RRs: 1 Additional RRs: 1 Querieshttp://victim.com: type A, class IN Name: http://victim.com Type: A (Host address) Class: IN (0 x 0001) Answershttp://victim.com: type A class IN, addr 10.0.33.13 Name: http://victim.com Type: A (Host address) Class: IN (0 x 0001) Time to live: 7 days Data length: 4 Addr: 10.0.33.13 Authoritative nameservers com: type NS, class IN, ns http://victim.com Name: com Type: NS Authoritative name server) Class: IN (0 x 0001) Time to live: 7 days Data length: 12 Name server: http://victim.com Additional records http://victim.com: type A class IN, addr 10.0.33.13 Name: http://victim.com Type: A (Host address) Class: IN (0 x 0001) Time to live: 7 days Data length: 4 Addr: 10.0.33.13 It is obvious that with further treatment of the client to the host "" an IP address from the received DNS response appeal will take place at the IP address specified in the parameters to the script "fakedns" and the respective monitoring point - firewall. Thus, we can conclude that when the conditions of the implementation of the proposed method, and through the use of the domain name system, and add an additional field "Additional" in the DNS switch when processing a request in resolution of the domain name of the target information service occurs ability to monitor the network between the client and specified information services regardless of their location and the topology of the network. Also there is a possibility of monitoring and control of the network between the client and specified information services as at the stage of establishing a session, and at the stage of information exchange, that allows to provide filtering of traffic on the presence information of a confidential nature and state secret data, preventing unauthorized access to information. Method of remote monitoring and information security management network interaction on the basis of use of the domain name system, which consists in the fact that they receive DNS queries from DNS client to a DNS server, identify the DNS information from the DNS query to define the necessary control actions on the basis of the network security policy and information in the DNS transaction, perform control actions on the network traffic, featuring the fact that the control action is a modification of the DNS response in such a way that the DNS reply is added to the specified configuration information and the rules of security policy field "Additional"to trigger the beginning of the process of monitoring and management of security information exchange, and then send the modified DNS response from controlled DNS server to the DNS server of your Internet provider, take a DNS query to the DNS server of the Internet service provider (ISP initialize the values in the cache of a DNS server provider, take requesting permissions of the specified host name, send a DNS answer based on the values in the cache of a DNS server provider, take the DNS response from a DNS server provider, submit a request on behalf of the client to the target information service, accept a request from a customer at the point of monitoring, determine the necessary control actions on the basis of the network security policy and information in the request to the target information service, carry out controlling actions at the network traffic, submit a request to the target information service, accept a response from the target information service for the client to define the necessary control actions on the basis of the network security policy and information in the request to the target information service, carry out controlling actions at the network traffic, send the response to the client on behalf of the target information service.
|
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |