Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fault detection technology of server operating system

An operating system and fault detection technology, applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve the problems of lack of key files, malicious modification of configuration files, mistaken deletion, etc., to achieve the effect of ensuring safety

Inactive Publication Date: 2010-11-03
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (1) Some key files are missing or deleted by mistake, such as boot files
[0014] (2) The configuration file is maliciously changed, such as the server ip address, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fault detection technology of server operating system
  • Fault detection technology of server operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] A secure kernel module is added to the driver layer (layer 0) to intercept and record all kernel access paths, so as to meet the technical requirements for handling server failures. The customer's business continuity does not even require the customer to restart the system. It supports all upper-layer applications and all lower-layer systems and machines, and can ensure the security of upper-layer applications at the granularity of the operating system.

[0044] It mainly consists of the following modules:

[0045] 1. File Mandatory Access Control Module

[0046] Allows users or processes to set access rules for files / directories with different access rights, and can set security levels for files / directories and users, and implement access control through security models by level. Any user (including system administrators) and unauthorized When a process creates, deletes, modifies, reads and other operations on sensitive files or directories, it will filter (allow or d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fault detection technology of a server operating system. The technology comprises the following contents: (1) carrying out file integrity detection by comparing feature codes, and confirming the position of a file to be modified; (2) replacing the file to be modified with a normal file, and then carrying out forced access control on an object file by using the system reinforcement technology; and (3) recording a process item to change the file and a specific absolute path, detecting the destructive action of a malicious process, and establishing a scheme for recovering the server based on the action of the process. Compared with traditional products such as fire walls, antivirus software and the like, the fault detection technology of the server operating system can quickly process faults of the server operating system and locate fault points by forced access control, and can quickly detect and locate the faults caused by attacks to the server operating system, including known or unknown virus programs, ROOTKIT-level backdoor trojan and the like.

Description

technical field [0001] The invention relates to the field of computer system kernel reinforcement, mainly to control the communication between the user layer and the system layer, the core is to reconstruct the permission access model of the operating system at the core layer of the operating system, and handle server failures by implementing mandatory access control , quickly locate the fault point and its cause. Background technique [0002] While the rapid development of network technology has brought about earth-shaking changes in information sharing, it has also brought security risks. The ubiquitous and close combination of Internet and Intranet also makes network security problems stand out. For a long time, the network security community has paid more attention to external defense technologies based on network applications, but they are often at a loss for failures in server operating systems, neither can quickly detect failures nor quickly restore services. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56
Inventor 周水波井明阳
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products