Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Loophole attack prevention method, device and system

A vulnerability and active defense technology, applied in the field of network security, can solve the problem that vulnerabilities cannot be exhausted, and achieve the effect of fast and efficient active defense

Inactive Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In real life, the vulnerabilities in applications or operating systems cannot be exhausted, and new vulnerabilities may appear as the vulnerabilities are patched
Therefore, this defense method is more passive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Loophole attack prevention method, device and system
  • Loophole attack prevention method, device and system
  • Loophole attack prevention method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0038] In order to implement active defense against vulnerability attacks without repairing the vulnerabilities, embodiments of the present invention provide a method for defending against vulnerability attacks, which is mainly applied to the terminal side. Such as figure 1 As shown, the method includes:

[0039] 101. Monitor the running process to obtain the actual behavior characteristics of the process.

[0040] In this embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a loophole attack prevention method, device and system, and relates to the field of network security. The loophole attack prevention method, device and system aim to actively defense a loophole attack timely and effectively under the situation that a loophole is not repaired. The method includes the steps that a running process is monitored, the actual behavior feature of the process is obtained, and the process comprises an application process and a system process; the actual behavior feature is compared with a standard behavior feature in a behavior feature library, and the standard behavior feature is used for describing behaviors related to the loophole attack; if the actual behavior feature is consistent with the standard behavior feature, an attack log of the loophole attack is reported to a cloud server so that the cloud server can inform other terminals to actively defense the same loophole attack according to the attack log. The loophole attack prevention method is mainly applied to active attack defense under a private cloud environment.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method, device and system for defending against vulnerability attacks. Background technique [0002] Vulnerability refers to the weakness or defect of a system, the susceptibility of the system to specific threat attacks or dangerous events, or the possibility of the threat effect of the attack. Vulnerabilities may come from flaws in the design of applications or operating systems or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be maliciously used by hackers, thereby adversely affecting the operation of an application, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and the system being used as a tool to invade other host systems. Springboard etc. [0003] In order to prevent vulnerability atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/1433H04L63/1441H04L67/10
Inventor 汪圣平汤迪斌杨晓东
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products