Intrusion detection method and device
An intrusion detection and entry technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of inability to detect intrusion events, inability to detect Linux system kernels, etc., to improve system reliability and achieve the effect of protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0086] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0087] figure 1 It is a flowchart of an intrusion detection method provided by an embodiment of the present invention. The executive body of this embodiment is a terminal device, see figure 1 , the method includes:
[0088] 101. Obtain a system call list;
[0089] 102. Deriving a system call pointer from the system call linked list;
[0090] 103. Process the system call pointer with a fingerprint algorithm to obtain system call pointer fingerprint data;
[0091] 104. Comparing the fingerprint data of the currently acquired system call pointer with the fingerprint data of the system call pointer pre-stored at the local end;
[0092] 105. When it is determined that the currently acquired system call pointer fingerprint data is incon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 