Unlock instant, AI-driven research and patent intelligence for your innovation.

Invading detection method and system based on procedure action

A technology of intrusion detection and behavior, applied in digital transmission systems, electrical components, transmission systems, etc.

Active Publication Date: 2009-05-20
上海浦东软件园信息技术股份有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical difficulty of this type of model lies in: facing the increasingly complex information system, how to establish a security model of normal behavior that has good adaptability and is convenient for practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invading detection method and system based on procedure action
  • Invading detection method and system based on procedure action
  • Invading detection method and system based on procedure action

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0096] In order to explain the content of the invention, some necessary definitions and explanations are made first:

[0097] Behavioral characteristics of a certain software: the service and resource requests made to the system software operating platform (OS) in order to achieve all or part of the functions of the software design, and a collection of information composed of various characteristics of these requests. The so-called service refers to the various facilities provided by the system, such as creation process, network connection, etc. The so-called resources refer to files (including data files, configuration files, and executable files of shared libraries), equipment, etc. that need to be accessed in order to complete a predetermined function. Characteristics refer to its order, associativity, and (virtual) address space characteristic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for testing inbreak, which obtains the information of software behavior characters of a program, a structure access model and acts it on the program to prevent abnormal behavior so as to protect the entire network server system to avoid network inbreak including the following basic processes: collecting and processing a behavior security box to monitor the software behavior timely and a protection system suitable for the above mentioned method is also disclosed to realize the close coupling control to the behavior of the applied program.

Description

Technical field [0001] The present invention relates to the security and anti-intrusion field of computer network systems. More specifically, the present invention relates to a method and system for network intrusion detection based on program behavior. Background technique [0002] The security of network information systems can be divided into multiple aspects, and the use of vulnerabilities in the system, such as vulnerabilities in applications and possible vulnerabilities in system configuration and management, launching a purposeful attack on the system is one of the biggest threats to security. aspect. Due to the complexity of computer network information systems and security factors, security vulnerabilities emerge in endlessly, and incidents where vulnerabilities are discovered in patches also occur from time to time. According to the survey and statistics of authoritative departments, the existence and continuous discovery of various network security vulnerabilities will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 冯敏韩欣阎光
Owner 上海浦东软件园信息技术股份有限公司