Attacking control method for protecting kernel system

A control method and core technology, applied in the fields of platform integrity maintenance, instrumentation, electrical digital data processing, etc., can solve the problems of data lack of identification ability, reduce the security of core system protection, etc., and achieve the effect of ensuring safety and credibility

Inactive Publication Date: 2014-03-26
江苏中科慧创信息安全技术有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the honeypot technology can make up for the deficiencies of the original passive security defense with the cooperation of security measures such as network firewalls and intrusion detection systems, it still has some insurmountable shortcomings: traditional data control technology only transfers data entering the honeypot system Record or modify without the ability to identify the data itself, which greatly reduces the security of protecting the core system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attacking control method for protecting kernel system
  • Attacking control method for protecting kernel system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The embodiment of the present invention provides an attack control method for protecting the kernel system to solve the existing traditional data control technology, which only records or modifies the data entering the honeypot system, but has no ability to identify the data itself. The present invention is mainly used for active, efficient and system-level safety defense of the pre-defense system, server and active trapping system of the network.

[0018] In order to make the object, technical solution, and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0019] The invention prevents the kernel file from being replaced by the attack behavior through the control attack engine deployed in the kernel system, prevents the attack behavior from running, so that the use of the attack function is lost, and finally deletes it from the kernel system. Some of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attacking control method for protecting a kernel system. The attacking control method includes the step 101 that an active trapping system is set up in pre-defense in a network defense system, an attacking control engine of the trapping system is arranged in the kernel system, and an attacking detection engine, an analysis engine and a control engine are set up in the kernel system of an operating system of a computer to detect and control act information, the step 102 that information from the step 101 is obtained through the attacking control engine arranged in the kernel system, and the attacking control engine can prevent files in a kernel from being maliciously attacked and replaced, prevent running of malicious acts and utilization of the functions of the malicious acts and finally uninstall the malicious acts from the kernel system, and the step 103 that the process is ended. According to the attacking control method, whether acts are control acts or not can be judged, and the malicious control acts can be timely blocked by conducting fine-grained searching and killing such as pilot system file protection check, loading system file protection check, drive module protection check and hardware supporting module protection check, and security and credibility of the kernel system are ensured.

Description

technical field [0001] The invention specifically relates to an attack control method for protecting a kernel system, which is used for controlling attackers' controlling malicious behavior on key positions of the kernel system, and protecting a trapping computer from attacking other internal real servers. Background technique [0002] Nowadays, with the wide application of network technology, network attack incidents emerge in an endless stream, and network security has become the focus of today's research hotspots and social concerns. Existing network security technologies with firewalls and intrusion detection systems (IDS) as the core defense technologies usually lag behind. in a variety of attack techniques. As a new network security technology, honeypot technology has gradually attracted people's attention. It adopts a proactive approach, attracts attackers with its unique features, and at the same time analyzes various attack behaviors of attackers and finds effecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 赵象元
Owner 江苏中科慧创信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products