Virtual machine identification dodging method and device

A virtual machine, non-virtual technology, applied in the field of network security, to achieve the effect of increasing effectiveness

Inactive Publication Date: 2013-04-17
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method and device for avoiding identification of virtual machines, so as to solve the problem of malicious software identifying virtual machines and bypassing monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine identification dodging method and device
  • Virtual machine identification dodging method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention provides a method for avoiding recognition of a virtual machine, and its implementation method is as follows: figure 1 As shown, the specific implementation is as follows:

[0017] Step 100, acquiring a virtual machine characteristic parameter, the virtual machine characteristic parameter is a parameter used to identify a virtual machine;

[0018] Step 110, modifying the characteristic parameters of the above-mentioned virtual machine.

[0019] Wherein, modifying the characteristic parameters of the virtual machine may be, but not limited to: deleting the characteristic parameters of the virtual machine, modifying the characteristic parameters of the virtual machine to non-virtual machine characteristic parameters, and so on.

[0020] For the identification of the virtual machine, the feature parameters of the virtual machine are usually identified. The technical solution provided by the present invention, by deleting the characteristic parameter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual machine identification dodging method and device. The method comprises obtaining characteristic parameters of a virtual machine, wherein the characteristic parameters of the virtual machine are used for identifying the parameters of the virtual machine; and modifying the characteristic parameters of the virtual machine. The technical scheme is that identification of the virtual machine of malicious software through the characteristic parameters of the virtual machine can be dodged by modifying the characteristic parameters of the virtual machine, an effective virtual machine identification dodging scheme is provided, and accordingly monitoring and capturing effectiveness of the malicious software is increased.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method and device for avoiding identification of a virtual machine. Background technique [0002] A honeypot system is a computer system that runs on the Internet and contains vulnerabilities. It provides an easy target for attackers by simulating one or more vulnerable hosts, attracting and deceiving those who try to illegally break into other people's computer systems (such as computer hackers), so as to detect and capture malware attacks. [0003] Typically, the deployed honeypots are virtual machines. In order to avoid the monitoring and capture of the honeypot system, some malicious software will identify the virtual machine system, thereby bypassing the monitoring. Then, the virtual machine as a honeypot needs to perform an anti-identification operation. [0004] At present, there is no scheme to realize virtual machine evasion identification well. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F9/455
Inventor 王明华徐娜周勇林朱春鸽宋渊陈景妹陈云飞
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products