Method and system for document security operation and analysis against overflow attack

A technology for safe operation and anti-overflow, applied in the field of information security, it can solve the problems that network administrators and system administrators are difficult to patch and repair, and document overflow attacks cannot be effectively defended. Follow-up analysis, the effect of ensuring system security

Active Publication Date: 2019-04-05
SHENZHEN ANZHITIAN INFORMATION TECH
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3. It is difficult for network administrators and system administrators to repair patches and vulnerabilities in the first time, and attackers use 0day vulnerabilities to make it impossible to effectively defend against document overflow attacks;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for document security operation and analysis against overflow attack
  • Method and system for document security operation and analysis against overflow attack
  • Method and system for document security operation and analysis against overflow attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0041] The present invention provides an embodiment of a method for document security operation and analysis against overflow attacks, such as figure 1 shown, including:

[0042] S101: Initialize the public key and private key pair required for encryption;

[0043] The public key-private key pair is used for encrypted data transmission between the terminal and the specified device, the public key can be stored in the terminal, and the private key can be stored in the specified device;

[0044] S102: Establish an encrypted one-way communication protocol for the terminal to s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-overflow-attack document security operation and analysis method and system. Firstly public key and private key pairs required by encryption are initialized; an encryption one-way communication protocol for a terminal to transmit information to specified equipment and an encryption one-way communication protocol for the specified equipment to transmit the information to the terminal are established; then operation of the terminal on suspicious documents in the specified equipment and static and dynamic analysis of the specified equipment on the operation process of the suspicious documents are realized through the two encryption one-way protocols; and finally the characteristics of the data and the suspicious documents are collated and analyzed and uploaded to a protection mechanism. The suspicious documents are put in the specified equipment to be operated and analyzed so that system security of the terminal can be guaranteed, and the way of cross infection of malicious codes can be effectively blocked.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for document security operation and analysis against overflow attacks. Background technique [0002] With the development of network technology, the Internet has brought great convenience to people's life and work. However, due to the openness of the Internet, the form of network security has become increasingly severe. Cyber ​​attacks have evolved from a technology show-off to a conflict of interest. There have been many cyber hacker organizations of a certain scale in the world, using advanced persistent threats to carry out long-term intrusion, latent, and stealing of confidential information against governments, individual companies, etc. The attack methods are flexible and changeable, and the advanced concealment makes traditional defense methods unable to effectively defend against them. In some classic attack cases, it is found that many ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0245H04L63/0442H04L63/145
Inventor 庞齐宁世宇徐翰隆肖新光
Owner SHENZHEN ANZHITIAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products