Safe defense system
A security defense and file defense technology, applied in the field of security defense systems, can solve the problems of false negatives or false positives, inability to register and/or file defense, etc., and achieve the effect of reducing false negatives or false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] refer to figure 1 , shows a flowchart of steps of a security defense method according to Embodiment 1 of the present invention.
[0024] The security defense method of the present embodiment includes the following steps:
[0025] Step S102: The active defense system determines that the registry target item written by the current program does not exist.
[0026] When the program writes to the registry, the active defense system will start RD. RD provides monitoring of common system sensitive registry items, such as the addition and modification of startup items, service driver items, system policy items, browser settings or network settings (including NameServer). When a program modifies table entries, it is currently regarded as a sensitive behavior by RD by default and intercepted and suspended. This intercepted suspension has caused false negatives or false positives in the existing active defense system. In this embodiment, when the program writes the registry ent...
Embodiment 2
[0031] refer to figure 2 , shows a flowchart of steps of a security defense method according to Embodiment 2 of the present invention.
[0032] The security defense method of the present embodiment includes the following steps:
[0033] Step S202: the current program writes the registry target item into the registry.
[0034] Step S204: The active defense system determines whether the registry target item written by the current program complies with the registry defense rules; if yes, conducts registry defense and ends this process; if not, executes step S206.
[0035] Registry defense provides monitoring of common system sensitive registry items, such as monitoring of addition and modification of startup items, service driver items, system policy items, browser settings or network setting items. Generally speaking, these entries will be added to the registry defense rules. When these entries are changed, the active defense system will judge whether the change is allowed. . ...
Embodiment 3
[0052] refer to image 3 , shows a flowchart of steps of a security defense method according to Embodiment 3 of the present invention.
[0053] In this embodiment, the joint defense of RD and FD of HIPS is taken as an example to illustrate the security defense scheme of the present invention. The solution of this embodiment includes content that can be used to statically scan startup items and add FD rules to prevent files from being tampered with.
[0054] The security defense method of the present embodiment includes the following steps:
[0055] Step S302: The active defense system obtains the registry entry of the boot program in the registry, parses out the path of the boot program, and adds the path of the boot program to the FD rule.
[0056] For example, the active defense system can obtain the registry entry of the boot program in the registry when scanning the boot program, parse out the path of the boot program, and then add the path of the boot program to the FD ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


