MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND PROGRAM
20230006969 · 2023-01-05
Assignee
Inventors
Cpc classification
H04L63/10
ELECTRICITY
H04L63/145
ELECTRICITY
H04L63/0236
ELECTRICITY
International classification
Abstract
In order to appropriately manage address information that may be a target of access control, a management apparatus includes an address information obtain section configured to obtain address information as a management target for access control via a communication network, and a setting section configured to set, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
Claims
1. A management apparatus comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: obtain address information as a management target for access control via a communication network; and for the address information, an effective management period of the management target for the access control, based on information related to the address information.
2. The management apparatus according to claim 1, wherein the information related to the address information includes location information assigned to the address information.
3. The management apparatus according to claim 1, wherein the information related to the address information includes attack history information related to a cyberattack from a network node specified by the address information.
4. The management apparatus according to claim 3, wherein the attack history information includes information related to the number of appearances of the address information appearing as threat information in a plurality of pieces of threat information collected by a plurality of observation points on the communication network.
5. The management apparatus according to claim 1, wherein the one or more processors are configured to execute the instructions to: determine whether or not communication can be performed with a network node specified by the address information, and the setting includes set the effective management period, based on the information related to the address information and the result of the determination.
6. The management apparatus according to claim 1, wherein the effective management period includes a period from a time point when the address information becomes the management target to a time point when the address information is to be excluded from the management target.
7. The management apparatus according to claim 1, wherein the effective management period includes a period from a time point when last communication is performed from the network node specified by the address information to a time point when the address information is to be excluded from the management target.
8. The management apparatus according to claim 1, wherein the one or more processors are configured to execute the instructions to: manage the address information as the management target, based on the effective management period.
9. The management apparatus according to claim 8, wherein the one or more processors are configured to execute the instructions to perform processing of excluding the address information from the management target after the effective management period set for the address information elapses.
10. The management apparatus according to claim 1, wherein the one or more processors are configured to execute the instructions to generate information indicating correspondence relation between the address information and the effective management period.
11. A management method comprising: obtaining address information as a management target for access control via a communication network; and setting, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
12. A non-transitory computer readable recording medium storing a program for causing a computer to execute: obtaining address information as a management target for access control via a communication network; and setting, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
DESCRIPTION OF THE EXAMPLE EMBODIMENTS
[0027] Hereinafter, example embodiments of the present invention will be described in detail with reference to the accompanying drawings. Note that, in the Specification and drawings, elements to which similar descriptions are applicable are denoted by the same reference signs, and overlapping descriptions may hence be omitted.
[0028] Descriptions will be given in the following order.
[0029] 1. Overview of Example Embodiments of Present Invention
[0030] 2. First Example Embodiment [0031] 2.1. Configuration of Management Apparatus 100a [0032] 2.2. Operation Example [0033] 2.3. Example Alteration
[0034] 3. Second Example Embodiment [0035] 3.1. Configuration of Management Apparatus 100c [0036] 3.2. Operation Example
[0037] 4. Other Example Embodiments
1. Overview of Example Embodiments of Present Invention
[0038] First, an overview of example embodiments of the present invention will be described.
(1) Technical Issue
[0039] In recent years, cyberattacks on the government, corporations, and the like have been increasing. Accordingly, cases that cause severe damage frequently occur. Defensive measures against such cyberattacks have been studied.
[0040] For example, as an example of the defensive measures, there are measures to repel cyberattacks, utilizing cyber threat intelligence (hereinafter also referred to as CTI). CTI is threat information gathering the origins of attacks, types, techniques, and the like of cyberattacks targeting the government and corporations. The government and corporations take countermeasures to forestall cyberattacks by utilizing CTI.
[0041] In CTI, pieces of information such as an IP address of the origin of an attack and a hash value indicating malware are mainly used. Such pieces of information are referred to as a block list, for example. In other words, the government and corporations use such a block list as, for example, an access control list (ACL) of a firewall, that is, a list of IP addresses to be repelled.
[0042] However, the block list may have a considerable volume. Thus, if all of the pieces of address information included in the block list are continuously managed as targets of access control, for example, performance of a firewall may deteriorate.
[0043] In particular, having the IP address of the origin of an attack recognized is fatal to cyberattackers, and thus the IP address of the origin of an attack tends to be rarely continuously used. Thus, it is highly likely that the IP address of the origin of an attack is deleted immediately after the attack. In other words, it is highly likely that the cyberattacker carries out a new attack using another IP address. It is hence highly likely that the generated block list immediately becomes obsolete.
[0044] In view of this, the present example embodiments have an example object to appropriately manage address information that may be a target of access control. More specifically, the present example embodiments have an example object to appropriately determine whether or not it is effective for management of address information that may be a target of access control.
(2) Technical Features
[0045] In the example embodiments of the present invention, address information as a management target for access control via a communication network is obtained, and an effective management period of the management target for the access control is set for the address information, based on information related to the address information.
[0046] With this configuration, for example, the address information that may be a target of the access control can be appropriately managed. Note that the technical features described above are a specific example of the example embodiments of the present invention, and as a matter of course, the example embodiments of the present invention are not limited to the technical features described above.
2. First Example Embodiment
[0047] Next, with reference to
2.1. Configuration of Management Apparatus 100a
[0048] With reference to
(1) Network Communication Section 110
[0049] The network communication section 110 receives a signal from a network and transmits a signal to the network.
(2) Storage Section 120
[0050] The storage section 120 temporarily or permanently stores programs (instructions) and parameters for operations of the management apparatus 100a as well as various data. The programs include one or more instructions for the operations of the management apparatus 100a.
(3) Processing Section 130
[0051] The processing section 130 provides various functions of the management apparatus 100a. The processing section 130 includes an address information obtain section 131, a setting section 133, a risk information obtain section 135, a determining section 137, and a generation section 139. Note that the processing section 130 may further include constituent elements other than these constituent elements. In other words, the processing section 130 may also perform operations other than the operations of these constituent elements. Specific operations of the address information obtain section 131, the setting section 133, the risk information obtain section 135, the determining section 137, and the generation section 139 will be described later in detail.
(4) Implementation Example
[0052] The network communication section 110 may be implemented with a network adapter and/or a network interface card, and the like. The storage section 120 may be implemented with a memory (e.g., a nonvolatile memory and/or a volatile memory) and/or a hard disk, and the like. The processing section 130 may be implemented with one or more processors. The address information obtain section 131, the setting section 133, the risk information obtain section 135, the determining section 137, and the generation section 139 may be implemented with the same processor, or may be separately implemented with different processors. The memory (storage section 120) may be included in the one or more processors or may be provided outside the one or more processors.
[0053] The management apparatus 100a may include a memory that stores programs (instructions), and one or more processors that can execute the programs (instructions). The one or more processors may execute the programs to thereby perform the operations of the processing section 130 (operations of the address information obtain section 131, the setting section 133, the risk information obtain section 135, the determining section 137, and/or the generation section 139). The programs may be programs for causing the processor(s) to execute the operations of the processing section 130 (operations of the address information obtain section 131, the setting section 133, the risk information obtain section 135, the determining section 137, and/or the generation section 139).
2.2. Operation Example
[0054] Next, an operation example according to the first example embodiment will be described.
[0055] According to the first example embodiment, the management apparatus 100a (address information obtain section 131) obtains address information as a management target for access control via a communication network. The management apparatus 100a (setting section 133) sets, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
[0056] According to the first example embodiment, by setting the effective management period of the management target for the access control for the address information, the address information that may be a target of the access control can be appropriately managed.
(1) Address Information
[0057] Specifically, examples of the address information include pieces of information (an IP address, a domain name, and the like) included in threat information as described below. Specifically, the threat information is a list that suggests cyberattacks, and is a list of pieces of information related to attacks.
[0058]
[0059] The threat information 200 described above is, for example, collected by the address information obtain section 131. In other words, the address information obtain section 131 receives the threat information 200 through crawling for automated collection, or receives the threat information 200 from another system. For example, the address information obtain section 131 causes the storage section 120 to store the collected threat information 200.
(2) Information Related to Address Information
[0060] The information related to the address information includes, for example, location information assigned to the address. Specifically, examples of the location information assigned to the address information include country information and area information specified based on the address information (for example, the IP address) and the like.
Second Specific Example
[0061] The information related to the address information may include attack history information related to a cyberattack from a network node specified by the address information.
[0062] Specifically, the attack history information is history information acquired based on a plurality of pieces of threat information having different obtaining paths and obtaining timings as will be specifically described later. More specifically, the attack history information includes information related to the number of appearances (hereinafter also referred to as appearance frequency) of the address information appearing as the threat information in the plurality of pieces of threat information collected by a plurality of observation points on the communication network. For example, it can be determined that the address collected as the threat information by the plurality of observation points is highly likely to be the origin of the attack of the cyberattack. Each of the observation points is, for example, specified by the type included in the threat information 200 illustrated in
[0063] Note that the attack history information may include information (attack frequency) related to the number of times of attacks of the cyberattacks in a predetermined period.
(3) Effective Management Period
[0064] The effective management period includes a period from a time point when the address information becomes the management target to a time point when the address information is to be excluded from the management target. Such a period corresponds to, specifically, an effective management period for a hard timeout, in which validity forcibly expires at designated time.
[0065] The effective management period may include a period from a time point when last communication is performed from the network node specified by the address information to a time point when the address information is to be excluded from the management target. Such a period corresponds to, specifically, an effective management period for an idle timeout, in which validity is extended if there is an access that satisfies a predetermined condition from the network node before the designated time.
(3-1) Setting Processing of Effective Management Period
(3-1-1) First Specific Example: Setting Processing of Effective Management Period for Idle Timeout
[0066] As the first specific example, setting processing of the effective management period for an idle timeout will be described.
[0067] First, with reference to
[0068] Next, the management apparatus 100a (setting section 133) refers to geopolitical risk information, and specifies a risk value associated with the location information (for example, the country information) assigned to the address information (Step S303). Here, the geopolitical risk information is, for example, information that is subjected to information update on a monthly or daily basis, and is information including a geopolitical risk value of each country. Such information is, for example, obtained by the risk information obtain section 135, and is stored in the storage section 120.
[0069] Next, the management apparatus 100a (setting section 133) sets the effective management period for a hard timeout, based on the risk value associated with the location information (Step S305). For example, the set effective management period for a hard timeout is stored in the storage section 120. With this, the processing illustrated in
[0070]
[0071] In contrast, a case 420 is an example of the effective management period for a hard timeout that is calculated based on the risk value at a time point (October 20xx) after the elapse of eight months since the case 410. In the case 420, in comparison to the case 410, the risk value of “country X” being a country assigned to the IP address is high, in other words, the risk value changes from “81.94” to “210.6”, and the effective management period for a hard timeout is thus set to “231.3 days”.
[0072] In the example illustrated in
[0073] In this manner, according to the first specific example, the management apparatus 100a (setting section 133) can appropriately set the effective management period for a hard timeout by taking the geopolitical risk information into consideration.
(3-1-2) Second Specific Example: Setting Processing of Effective Management Period for Idle Timeout
[0074] With reference to
[0075] With reference to
[0076] Next, the management apparatus 100a (setting section 133) calculates the appearance frequency of addresses (for example, IP addresses) included in the address information as a setting target of the effective management period, based on the plurality of pieces of threat information (Step S503).
[0077]
[0078] Next, the management apparatus 100a (setting section 133) sets the effective management period for an idle timeout, based on the calculated appearance frequency of the addresses (Step S505). For example, it is assumed that, as the appearance frequency is higher, the risk is higher, in other words, necessity as an access target is higher. Thus, as the appearance frequency of an address is higher, the management apparatus 100a (setting section 133) sets the effective management period for an idle timeout so that the period is longer. In a case of application to the calculation case 600 illustrated in
[0079] For example, the set effective management periods for an idle timeout are stored in the storage section 120. With this, the processing illustrated in
(3-1-3) Additional Notes
[0080] For example, in addition to the first and second specific examples described above, various modifications can be made. For example, the management apparatus 100a (setting section 133) may calculate the effective management period for a hard timeout based on the appearance frequency of addresses, or may calculate the effective management period for an idle timeout based on the geopolitical risk information.
(3-2) Adjustment of Effective Management Periods
[0081] Next, with reference to
[0082] With reference to
[0083] Next, the management apparatus 100a (setting section 133) accesses the storage section 120, and determines whether or not the effective management period for an idle timeout has been set regarding the address information as a setting target of the effective management period, for example (Step S707). Then, when the effective management period for an idle timeout has been set (S707: Yes), the management apparatus 100a (setting section 133) updates the effective management period for an idle timeout (Step S709), and terminates the processing illustrated in
[0084]
(4) Setting of Effective Management Period based on Communication Check
[0085] The management apparatus 100a (determining section 137) may determine whether or not communication can be performed with the network node specified by the address information.
[0086] With reference to
[0087] Next, the management apparatus 100a (determining section 137) determines whether or not communication to the IP address can be performed (Step S903). Specifically, the management apparatus 100a (determining section 137) may determine whether or not communication to the IP address can be performed by using a typical communication check tool such as ping and Traceroute. Note that not only the above examples but also other communication check tools may be used.
[0088] When it is determined that communication can be performed (S903: Yes), the management apparatus 100a (determining section 137) registers information indicating that communication can be performed (Step S905). In other words, information indicating that communication can be performed is stored in the storage section 120. With this, the processing illustrated in
[0089] In contrast, when it is determined that communication cannot be performed (S903: No), the management apparatus 100a (determining section 137) registers information indicating that communication cannot be performed (Step S907). In other words, information indicating that communication cannot be performed is stored in the storage section 120. With this, the processing illustrated in
[0090] As illustrated in
(5) Generation of Information Related to Effective Management Period
[0091] The management apparatus 100a (generation section 139) generates information indicating correspondence between the address information and the effective management period set for the address. The information generated as described above is stored in the storage section 120, and thereby the information is managed.
[0092]
(6) Flow of Entire Processing of Management Apparatus 100a
[0093]
[0094] Next, the management apparatus 100a (setting section 133) sets the effective management period for a hard timeout related to the address information, based on the geopolitical risk information and the like (S1107). The set effective management period is stored (registered) in the storage section 120. Next, the management apparatus 100a (setting section 133) sets the effective management period for an idle timeout related to the address information, based on the threat information and the like (S1109). The set effective management period is stored (registered) in the storage section 120.
[0095] Next, the information indicating the correspondence between the address information and the effective management period, which is the information generated by the management apparatus 100a (generation section 139), is stored (registered) in the storage section 120 as information related to the effective management period (S1111). Subsequently, the processing illustrated in
[0096] According to the processing illustrated in
[0097] In addition, by utilizing the latest threat information, the management apparatus 100a can manage the effective management period by taking update of each of the effective management periods described above and information indicating whether or not communication to the IP address can be performed into consideration. In this manner, the management apparatus 100a can appropriately manage validity of the block list, for example.
2.3. Example Alteration
[0098] Next, with reference to
[0099] Specifically, the management apparatus 100b (management control section 141) performs processing of excluding the address information from the management target in a case that the effective management period set for the address information elapses.
[0100] As an example, the management apparatus 100b (management control section 141) activates a timer function for the hard timeout and the idle timeout set for the IP address, and at the moment that respective effective management periods have elapsed, the management apparatus 100b (management control section 141) instructs a security device (for example, a device configuring a firewall) capable of communicating with the management apparatus 100b to delete the IP address from the block list.
[0101]
[0102] When information related to the effective management period is registered (S1311), for example, the management apparatus 100b (management control section 141) manages the effective management periods such as by activating a timer function for the hard timeout and the idle timeout (S1313). Then, the management apparatus 100b (management control section 141) performs access control, such as instructing a security device to delete the IP address, based on the timer function (S1315).
[0103] According to the processing illustrated in
3. Second Example Embodiment
[0104] Next, with reference to
3.1. Configuration of Management Apparatus 100c
[0105]
[0106] The obtain section 151 and the setting section 153 may be implemented with one or more processors, a memory (e.g., a nonvolatile memory and/or a volatile memory), and/or a hard disk. The obtain section 151 and the setting section 153 may be implemented with the same processor, or may be separately implemented with different processors. The memory may be included in the one or more processors or may be provided outside the one or more processors.
3.2. Operation Example
[0107] An operation example according to the second example embodiment will be described.
[0108] According to the second example embodiment, the management apparatus 100c (obtain section 151) obtains address information as a management target for access control via a communication network. The management apparatus 100c (setting section 153) sets, for the address information, an effective management period as the management target for the access control, based on information related to the address information.
Relationship with First Example Embodiment
[0109] As an example, the obtain section 151 and the setting section 153 included in the management apparatus 100c according to the second example embodiment may perform the operations of the address information obtain section 131 and the setting section 133 included in the management apparatuses 100a and 100b according to the first example embodiment, respectively. In this case, description regarding the first example embodiment may also be applied to the second example embodiment. Note that the second example embodiment is not limited to this example.
[0110] The second example embodiment has been described above. According to the second example embodiment, the address information that may be a target of access control can be appropriately managed.
4. Other Example Embodiments
[0111] Descriptions have been given above of the example embodiments of the present invention. However, the present invention is not limited to these example embodiments. It should be understood by those of ordinary skill in the art that these example embodiments are merely examples and that various alterations are possible without departing from the scope and the spirit of the present invention.
[0112] For example, the steps in the processing described in the Specification may not necessarily be executed in time series in the order described in the corresponding sequence diagram. For example, the steps in the processing may be executed in an order different from that described in the corresponding sequence diagram or may be executed in parallel. Some of the steps in the processing may be deleted, or more steps may be added to the processing.
[0113] An apparatus including constituent elements (e.g., the obtain section and/or the setting section) of the management apparatus described in the Specification (e.g., one or more apparatuses (or units) among a plurality of apparatuses (or units) constituting the management apparatus or a module for one of the plurality of apparatuses (or units)) may be provided. Moreover, methods including processing of the constituent elements may be provided, and programs for causing a processor to execute processing of the constituent elements may be provided. Moreover, non-transitory computer readable recording media (non-transitory computer readable media) having recorded thereon the programs may be provided. It is apparent that such apparatuses, modules, methods, programs, and non-transitory computer readable recording media are also included in the present invention.
[0114] Some of or all the above-described example embodiments can be described as in the following Supplementary Notes, but are not limited to the following.
Supplementary Note 1
[0115] A management apparatus including:
[0116] an obtain section configured to obtain address information as a management target for access control via a communication network; and
[0117] a setting section configured to set, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
Supplementary Note 2
[0118] The management apparatus according to supplementary note 1, wherein
[0119] the information related to the address information includes location information assigned to the address information.
Supplementary Note 3
[0120] The management apparatus according to supplementary note 1, wherein
[0121] the information related to the address information includes attack history information related to a cyberattack from a network node specified by the address information.
Supplementary Note 4
[0122] The management apparatus according to supplementary note 3, wherein
[0123] the attack history information includes information related to the number of appearances of the address information appearing as threat information in a plurality of pieces of threat information collected by a plurality of observation points on the communication network.
Supplementary Note 5
[0124] The management apparatus according to any one of supplementary notes 1 to 4, further including
[0125] a determining section configured to determine whether or not communication can be performed with a network node specified by the address information, wherein
[0126] the setting section is configured to set the effective management period, based on the information related to the address information and the result of the determination.
Supplementary Note 6
[0127] The management apparatus according to any one of supplementary notes 1 to 5, wherein
[0128] the effective management period includes a period from a time point when the address information becomes the management target to a time point when the address information is to be excluded from the management target.
Supplementary Note 7
[0129] The management apparatus according to any one of supplementary notes 1 to 5, wherein
[0130] the effective management period includes a period from a time point when last communication is performed from the network node specified by the address information to a time point when the address information is to be excluded from the management target.
Supplementary Note 8
[0131] The management apparatus according to any one of supplementary notes 1 to 7, further including
[0132] a management control section configured to manage the address information as the management target, based on the effective management period.
Supplementary Note 9
[0133] The management apparatus according to supplementary note 8, wherein
[0134] the management control section is configured to perform processing of excluding the address information from the management target after the effective management period set for the address information elapses.
Supplementary Note 10
[0135] The management apparatus according to any one of supplementary notes 1 to 9, further including
[0136] a generation section configured to generate information indicating correspondence relation between the address information and the effective management period.
Supplementary Note 11
[0137] A management method including:
[0138] obtaining address information as a management target for access control via a communication network; and
[0139] setting, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
Supplementary Note 12
[0140] A program for causing a computer to execute:
[0141] obtaining address information as a management target for access control via a communication network; and
[0142] setting, for the address information, an effective management period of the management target for the access control, based on information related to the address information.
INDUSTRIAL APPLICABILITY
[0143] In access management via a communication network, address information that may be a target of access control can be appropriately managed.
REFERENCE SIGNS LIST
100a, 100b, 100c Management Apparatus
131 Address Information Obtain Section
133, 153 Setting Section
135 Risk Information Obtain Section
137 Determining Section
139 Generation Section
141 Management Control Section
151 Obtain Section