Method and apparatus for preventing malevolence program from accessing network

A technology for accessing the network, malicious programs, applied in the field of preventing malicious programs from creating trusted network application objects to access the network

Active Publication Date: 2009-04-22
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the surface, the initiator of such an access action is a trusted network access program, so the existing security software usually allows the network access action, even if a prompt is given, the user sees that the initiator is trusted program, it does not block it, and as a result, the malware successfully breaks through the protection of security software to achieve its own illegal purpose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing malevolence program from accessing network
  • Method and apparatus for preventing malevolence program from accessing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.

[0010] First refer to figure 1 , illustrating a flow chart of a method for preventing malicious programs from accessing a network according to the present invention, wherein:

[0011] In step S10, the monitoring dynamic library is injected into the processes in the system, so as to monitor the actions of each process in real time. It should be noted that it can be injected into all processes in the system, and can also be injected into some processes in the system according to specific requirements, which are all within the protection scope of the present invention.

[0012] In step S20, when it is found that a certain process wants to create an object of an application program capable of accessing the network, the object creation action is intercepted. It should be noted here that the method of the present invention does not intercept the actions of certain p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method used for stopping vicious programs from accessing the network, comprising a monitoring step in which a monitoring dynamic database is injected into one or more processes of the system so as to carry out monitoring, an intercepting step in which the action to establish the objects of the network application program is incepted, a judging step in which whether the process is allowed to access the network or not is judged according to the defined rule, and a processing step in which the corresponding disposal is carried out according to the judgment results.

Description

technical field [0001] The present invention relates to a method and device for preventing malicious programs from accessing a network, and more particularly, to a method and device for preventing malicious programs from creating a trusted network application program object to access the network. Background technique [0002] With the rapid development of computer technology and the rapid popularization of the network, malicious programs such as Trojan horse virus emerge in an endless stream, which seriously endangers the information security of computer users. [0003] Usually, after a user's computer is infected with a malicious program, the malicious program will access the network through itself without the user's knowledge, thereby performing operations such as transmitting the stolen user information. In this regard, existing security software such as firewalls will intercept such network access actions, determine the initiator of the action, and take corresponding rel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26G06F17/30
Inventor 罗学军
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products