Invading detection method and system based on procedure action
A technology of intrusion detection and behavior, applied in digital transmission systems, electrical components, transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0095] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.
[0096] In order to explain the content of the invention, some necessary definitions and explanations are made first:
[0097] Behavioral characteristics of a certain software: the service and resource requests made to the system software operating platform (OS) in order to achieve all or part of the functions of the software design, and a collection of information composed of various characteristics of these requests. The so-called service refers to the various facilities provided by the system, such as creation process, network connection, etc. The so-called resources refer to files (including data files, configuration files, and executable files of shared libraries), equipment, etc. that need to be accessed in order to complete a predetermined function. Characteristics refer to its order, associativity, and (virtual) address space characteristic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 