Method for controlling software behavior based on least privilege principle

A control method and minimization technology, applied in the field of information security, can solve problems such as frequent access to the registry, suspicious system file writing operations, etc., and achieve the effects of convenient communication, avoiding cross-border behavior, and high stability

Inactive Publication Date: 2011-10-05
江苏云木养老科技有限公司
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, from the perspective of the user's usage logic, the behavior of the software should conform to the conventional operation logic: for example, when using a browser, known applications such as download tools and readers may be launched when the browser is running. If there are some unknown processes, the behavior is suspicious; the browser will access a large numb

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling software behavior based on least privilege principle
  • Method for controlling software behavior based on least privilege principle
  • Method for controlling software behavior based on least privilege principle

Examples

Experimental program
Comparison scheme
Effect test
No Example Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for controlling software behavior based on a least privilege principle, used for protecting a computer operating system from being damaged by malicious behaviors. The method comprises the following specific steps: setting parameters of a monitoring module according to the least privilege principle, storing the parameters in a registration list, and reading and storing through a control module interface; creating a process behavior sandbox, a file behavior sandbox and a registration list behavior sandbox, and monitoring the clue of process tree by the behaviorsand boxes; for interaction with users or file operation, filtering IRP (input/ output request package) process, and determining different operations according to different function request control codes; for process or registration list monitoring, not carrying out IRP filtration process; turning to step 5) and keeping monitoring if no abnormal situation is monitored; actively transmitting alarming information in real time to a control module positioned at an user layer; and carrying out system alarming.

Description

technical field [0001] The invention proposes a software behavior control scheme based on the principle of least privilege, which can be used to protect computer operating systems from malicious acts, and belongs to the field of information security. Background technique [0002] The demand for information in modern warfare is becoming more and more intense. Information equipment with computers as the core is widely used in the military field, which has become an important symbol of military modernization and advanced weapons. The nerve center, its performance and condition will directly affect the combat effectiveness of the army and its performance. Information confrontation with the goal of competing for the right to control information, that is, "information warfare", has become the key to determining the outcome of a war. Malicious code technologies represented by computer viruses and network worms have been confirmed to destroy data, interrupt operations, affect and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/50
Inventor 张登银赵晓强王汝传李鹏张伟肖甫
Owner 江苏云木养老科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products