Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method used for defending APT (Advanced Persistent Threat) attack

An operating system, cloud operating system technology, applied in the field of information security, can solve problems such as difficult equipment or products, and achieve the effect of being conducive to system security

Active Publication Date: 2016-04-13
HARBIN ANTIY TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

and these questions are repetitive tasks
In the prior art, it is difficult to have equipment or products that uniformly solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method used for defending APT (Advanced Persistent Threat) attack
  • System and method used for defending APT (Advanced Persistent Threat) attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention provides a system and method for defending against APT attacks, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to enable the above-mentioned purposes, features and advantages of the present invention to be more Obvious and easy to understand, below in conjunction with accompanying drawing, technical solution among the present invention is described in further detail:

[0028] The present invention firstly provides a system embodiment for defending against APT attacks, such as figure 1 shown, including:

[0029] The cloud operating system terminal 101 is pre-installed with various types of operating systems. Commonly used software is installed in each type of operating system as needed, and a built-in restore point is used for system restoration at each startup and regular patch upgrades;

[0030] Among them, each operating system itself can be configured dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method used for defending APT (Advanced Persistent Threat) attack. The system comprises a cloud operation system side, a suspicious file server and a user machine, wherein the cloud operation system side preloads various types of operating systems, wherein each type of operating system installs common software according to requirements and is provided with built-in recovery points used for carrying out system recovery during each-time startup and carrying out patch updating in fixed time; the suspicious file server is used for collecting files generated by the cloud operating system side, causes the collected file to correspond to the user name or the ID (Identity) of the user machine one by one, detects whether the collected file is malicious or not or provides for professional analysts; the user machine is used for connecting to the cloud operating system side by a network startup form in bios during startup and selecting an operating system type to be started according to the requirements; and no operating systems are arranged in the user machine, and a hard disk permits to be built to store important files. The scheme avoids a plurality of repeated operations and can effectively defend the APT attack and other attack events.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a system and method for defending against APT attacks. Background technique [0002] A computer, commonly known as a computer, is an electronic computing machine used for high-speed calculations. It can perform numerical calculations, logical calculations, and has storage and memory functions. It is a modern intelligent electronic device that can run according to the program and process massive data automatically and at high speed. Composed of hardware systems and software systems, computers without any software installed are called bare metal. It can be divided into five categories: supercomputers, industrial control computers, network computers, personal computers, and embedded computers. More advanced computers include biological computers, photonic computers, and quantum computers. [0003] The application of computers is becoming more and more common i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
Inventor 刘佳男任洪伟李柏松
Owner HARBIN ANTIY TECH