Supercharge Your Innovation With Domain-Expert AI Agents!

A Virtualization-Based High-Availability System Design Method

A system design and virtualization technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of system impact, reduce system performance, and restore available means relying on detection, etc., to achieve the effect of small performance loss, prevention of attacks, and improved availability.

Active Publication Date: 2018-09-04
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional detection and recovery mechanism has the following two shortcomings: First, the available means of recovery depend on detection, that is, it cannot prevent the occurrence of damage events
The system may be affected to a certain extent before recovery; second, detecting and recovering threads brings a certain amount of time overhead and reduces system performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Virtualization-Based High-Availability System Design Method
  • A Virtualization-Based High-Availability System Design Method
  • A Virtualization-Based High-Availability System Design Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] The following describes the process of realizing the architecture of the present invention with a specific embodiment:

[0048] Using the override process to hide, according to its realization principle, the purpose of hiding the process is realized by using the current terminal as a backdoor program;

[0049] First, echo $$ indicates the current process id. In the demonstration case, the current process id is 2573, and then in the / root / Desktop / ha / rk directory, it is rootkit override. After loading, switch to the / proc file system , through the ls command, you can see that the current process information 2573 can exist in the directory, and then create a new directory grid-hide-pid-2573 in the / dev directory. This process will trigger the chdir system call, and this system call will also be reset Orientation, the chdir system call will add the 2573 process information to the hidden queue, and hide the created directory at the same time, and then go to the / proc file sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-availability system design method based on virtualization. Based on the virtualization technology, the protection strategy of the key data structure of the kernel is realized, which mainly depends on the shadow page table management mechanism and the hypercall mechanism, as well as the exception handling logic to ensure correctness and effectiveness. Execution; A high-availability system based on client exception handling is proposed. The overall system framework of the system is mainly composed of two types of modules: user operation module and kernel module. The high-availability system design method, based on the virtualization technology, utilizes the client's power-down execution and resource management means to protect the key data structure of the kernel, prevent malicious programs from tampering with the kernel key data to obtain the control authority process, and effectively improve The availability of the operating system kernel effectively prevents rootkit attacks, has little performance loss, does not depend on the hardware architecture, and is transparent to applications and users.

Description

technical field [0001] The invention relates to the field of high-availability system design, in particular to a virtualization-based high-availability system design method. Background technique [0002] The security of the operating system is an aspect that affects the usability of the kernel. The attack method of obtaining control authority by modifying the key data structure of the kernel has become one of the main means of rootkit tools at present. The availability of the operating system kernel determines the overall availability of the system, and security is one of the aspects that affect availability. After the Linux kernel provides the loadable module mechanism (LKM), while providing scalability to the kernel, it brings certain security risks. Rookit is usually based on the following system features in the Linux kernel: [0003] 1) SUID / SGID: Use suid to obtain root user authority to execute suid shell;; [0004] 2) A large number of daemons running in the system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/53G06F21/55
Inventor 刘璧怡宋立伟何志平周雄吴楠
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More