Unlock instant, AI-driven research and patent intelligence for your innovation.

Registration protection method

A registry and protection chain technology, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve problems such as rare, blank file protection and registry protection, NIDS cannot meet the needs, etc.

Inactive Publication Date: 2009-12-09
HISENSE
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, with the widespread use of switches and the popularity of IPV6, NIDS has been unable to meet the needs of the market
It involves HIDS (Host-based Intrusion Detection System), a host intrusion detection system, which is rare in the market at present, and there are still gaps in file protection and registry protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registration protection method
  • Registration protection method
  • Registration protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 As shown, the registry protection system mainly includes an application program module and a driver program module. in,

[0020] The application module includes user interface, rule analysis module, driver management module and log display module. The application module is responsible for loading and running the HOOK API driver. in,

[0021] The user interface is used to display log information, call the driver management module to control the operation of the driver module, load rules, etc.;

[0022] The log display module displays the log information generated by the driver module in real time;

[0023] The rule parsing module is responsible for reading configuration information from the configuration file, and passing the parsed rule linked list to the driver module through the driver management module;

[0024] The driver management module is responsible for controlling functions such as starting, stopping, adding and deleting rules of the driv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A kind of brand-new registry protection system and method described in the present invention is mainly applied to the HIDS host intrusion detection system, and its purpose is to fill the gaps in the prior art and adapt to be used as the core module of the HIDS host intrusion detection system to realize registry log filtering and clear functions, and provide specified protection to the protected key value according to the information of the protected linked list. The registry protection system mainly includes an application program module and a driver program module. In the registry protection method, after the application module is started, the registry configuration file information is read and the file is formed into an application protection linked list, and the user can send control codes through menu commands to interact with the driver module to control the driver module Start and pause, log filtering, automatic scrolling, log clearing, and aborting the driver.

Description

technical field [0001] The invention relates to a registry protection method for network security detection. Background technique [0002] With the development of computer technology and the inseparability of the network with the existing economy and daily life, higher requirements are put forward for the security performance of the network itself. In order to prevent malicious attacks on the network, existing websites are equipped with a network intrusion detection system, which ensures the safe operation of the network by monitoring hacker ports. [0003] At present, the development of existing network attack technology makes intrusion behavior more and more common, and intrusion methods are also increasingly complicated. Automatic detection, analysis, and interception of intrusions have become an important requirement for network security. At present, the network-based intrusion detection system mainly adopts NIDS (Network-basedIntrusion Detection System) to realize rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 王鸿鹏王迎芳徐鄗谭俊峰文中领姜斌斌
Owner HISENSE