The process of financial digitalization is accelerating. In order to facilitate customer access and rapidly develop customers, banks provide customers with a variety of access channels, including mobile banking app access, Web access, H5 access, WeChat access, mini-program access and API access. With the increase in traffic, the Web exposure risk and risk management chain brought by API business have expanded. Not only are various incidents of attacks using Web application vulnerabilities increasing day by day, but the impact of various anthropomorphic automated attacks, API business attacks, and 0day attacks on financial digital business is also rapidly increasing, and the means of attack are becoming more and more diversified. The main goal of Ruishu Dynamic Security Hyper-convergence Platform is to respond to the threats faced by Web business, App application and API application delivery in hybrid architecture, improve the ability to quickly deploy business, respond to unknown threats, distinguish and protect automation and human traffic, fight against business attacks from APIs, ensure interface security, and build and implement an integrated protection system for application security. 1. Project Introduction Through dynamic technology, unified protection is achieved for mobile banking apps, Web sites, H5 pages, WeChat, mini-programs and API interfaces. The data of various access clients is integrated on a dynamic security hyper-converged platform. The access data of each platform is associated and credit-scored through source IP and account information. Multi-platform business information linkage and threat perception are achieved, so as to accurately identify and intercept malicious automated illegal requests. The architecture diagram of the dynamic security hyper-convergence platform is as follows: Ruishu's dynamic security hyper-convergence platform has achieved "three unifications": 1. Unified protection for all-channel access <br /> Unified protection for all-channel services (mobile banking apps, web sites, H5 pages, WeChat, mini-programs, and API interfaces) is achieved, web page code hiding and automated tool protection are achieved, the web page code of the website is hidden to prevent malicious attackers from analyzing the website code and launching targeted attacks; efficient identification and protection of various automated tool attacks are achieved, such as identification and protection of website vulnerability scanning tools and batch financial business fraud tools. 2. Unified fusion analysis of cross-channel data <br /> On the dynamic security hyper-convergence platform, the integration of various access client data is realized, and the access data of each platform is associated and credit-scored through the source IP and account information, so as to realize the linkage and threat perception of multi-platform business information, and achieve the purpose of accurately identifying and intercepting malicious automated illegal requests. Through complete data records, the user's access trajectory can be seen through and the user's access behavior can be tracked. The system realizes data sharing among various businesses, forms the bank's risk control data accumulation, improves the overall risk control protection capabilities, and realizes unified data output and integration. 3. Build a unified standard for application security <br /> Establish a standard security for rapid online deployment, standardize the entire security process, and achieve heterogeneous integration to meet the seamless connection of security capabilities and reduce the cost of financial business innovation. Heterogeneous integration can quickly integrate new security capabilities, improve compatibility, and achieve rapid integration of security capabilities and rapid call of front-end applications. 2. Project Innovation 1. Web application collaborative protection <br /> Integrating the adaptability and scalability of traditional architecture and cloud application scenarios, migrating from traditional network boundaries to various Web applications, APP applications and API cloud services, building a trusted security architecture focused on business logic, users, data and applications, and fully resisting new security threats. After the system is deployed, the ability to identify and track fraud sources is greatly improved, and the entire attack picture can be controlled throughout the process, establishing a full-dimensional three-dimensional combat capability against cyberspace threats. 2. Security technology changes, turning passive into "active defense"
4. Strengthen protection against emerging bot threats III. Project Results At present, the dynamic security hyper-convergence platform has been running stably for nearly two years without any failures and is running well. Since the launch of the dynamic security hyper-convergence platform, it has effectively intercepted various CC attacks and automated attack behaviors. It also has the ability to protect against unknown attacks, protecting customers from zero-day vulnerability attacks, and providing security operations with enough time to repair vulnerabilities, allowing customers to respond more calmly. At the same time, by connecting all Web, App and API applications to the platform, using dynamic security technology to collect access client information, combined with full access records, and using big data technology to uniformly summarize access logs, comprehensive correlation security analysis is performed to discover possible attack behaviors, effectively intercept various automated attack behaviors, and prevent various business attacks initiated by the black industry, such as: batch queries and abnormal transactions initiated by automated tools are effectively blocked, and overseas IP uses multiple accounts to frequently log in and trade abnormally. In addition, Ruishu's dynamic security technology has the ability to protect against unknown attacks, protecting business systems from zero-day vulnerability attacks, and providing security operations and maintenance with sufficient time to repair vulnerabilities, allowing us to respond more calmly. It provides relevant front-line departments with automated tool interception, security alerts, and data output, and gives processing suggestions to achieve unified security threat protection and analysis. 4. Customer Recognition The security director of a state-owned bank spoke highly of the Ruishu Dynamic Security Hyper-Converged Platform: "Using the Ruishu Dynamic Security Hyper-Converged Solution, our bank's core business systems such as personal online banking, mobile banking, corporate online banking, and recruitment websites are all included in the protection, which helps us effectively solve the following three major problems: first, unified threat protection; second, cross-channel data fusion analysis; third, building a unified standard for application security."
5. Experience Summary The dynamic security hyper-convergence platform has been running stably for nearly two years since its official launch, protecting all core businesses of customers and enabling interception mode to intercept various automated attack behaviors in real time. The system has covered multiple data centers of customers, deployed multiple nodes in each data center, and achieved high business availability through load balancing devices. The promotion experience mainly includes the following aspects: First, it has achieved a good demonstration effect in the financial industry. Web, APP, API business full-channel protection, cross-channel data integration, business security, and application security unified management are serious risks faced by all financial companies. The protection effect and benefits of this project are of great reference significance to the majority of financial companies and have great promotion value in the financial industry. Second, it reduces the economic losses of financial enterprises. In order to improve economic benefits, financial enterprises often organize promotional activities, and a large number of wool parties also come with them using automated tools, which take away a large amount of promotional investment of financial enterprises, causing huge economic losses to enterprises. In addition, through this platform, we can clearly understand which businesses real users are more enthusiastic about, which businesses have a large number of participating users, and which activities can attract more registered users, thereby assisting business promotion; understanding the user's behavior model through user portraits can achieve precision marketing and increase revenue. The third is to help the financial industry fight against the black industry chain. The successful experience of this project has explored a new way to fight against the black industry for the financial industry. First, it starts from the core part of the black industry chain, "automation tools", making all automation tools unable to run, thus breaking the black industry chain; secondly, based on Web, APP, API business full-channel protection, cross-channel data integration, business security perspective, and application security unified management, a security joint defense situation is formed, which greatly improves security capabilities. It has established a successful case for all financial enterprises to fight against the black industry, which can be vigorously promoted within financial enterprises. Fourth, it has achieved a cross-industry demonstration effect. This solution includes a comprehensive protection platform that integrates multi-dimensional security capabilities such as intelligent WAF defense capabilities, Bots management and defense capabilities, application layer DDoS protection capabilities, API management and security protection capabilities, security visualization, and unified security management, and has built a unified security standard. These capabilities are also lacking in industries such as government and operators. This project can serve as a reference for various industries and play a good cross-industry demonstration effect. At present, this solution has been widely used in domestic financial, operator, government and enterprise customers. At the same time, Ruishu Information has participated in many national-level network security security work such as attack and defense actual combat exercises, CIIE security, and the 70th anniversary of the founding of the People's Republic of China. In the attack and defense actual combat exercises in the past two years, it has participated in the defense work of more than 30 important national departments and large banks, and has achieved good results and has been widely recognized by users. |
<<: "Have you eaten?" | A tragic experience of a message
>>: Does Localhost necessarily mean Localhost?
Kuroit is a foreign hosting company founded in 20...
We are not unfamiliar with number portability. As...
[[257539]] Judging from the development trend of ...
Introduction ForceView ITAM (IT Asset Management)...
RackNerd has launched two more FLASH SALE package...
"Knowledge is power." Intellectual prop...
Qualcomm, Telstra, Ericsson and NETGEAR recently ...
RAKsmart launched the Double 11 Carnival pre-sale...
In order to welcome the upcoming Double 12 and ov...
Computing network is an emerging technology conce...
The fifth generation of network bandwidth arrives...
When it comes to network security and performance...
5G is the latest generation of cellular network t...
When it comes to network cabling, outdoor connect...
Last month we shared information about DMIT.io...