Linux network access monitoring method and device

A network access and monitoring device technology, applied in the field of information security, can solve problems such as inability to monitor

Active Publication Date: 2019-03-12
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a Linux network access monitoring method for the problem that the application program cannot monitor the Linux system network access, and the method includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux network access monitoring method and device
  • Linux network access monitoring method and device
  • Linux network access monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] figure 1 Be the flowchart of the Linux network access monitoring method in an embodiment, as figure 1 The Linux network access monitoring method in the shown embodiment includes:

[0046] Step S100, receiving a running command of the application program, and obtaining the identification of the application program.

[0047] Specifically, the identification of the application program refers to a mark used to distinguish different application programs, or a mark for distinguishing characteristics of different application programs, including any one of program category, name, and version number of the application program.

[0048] Step S200, loading preset hijacking function library and dynamic library.

[0049] Specifically, the preset hijacking function library includes open series functions, close functions, create series functions, read functions, write functions, socket operation series functions (socket, listen, bind, connect, send, receive, etc.), kill function et...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for Linux network access monitoring. The method includes receiving a run command of an application program and acquiring an identifier of the application program, loading preset hijacking function library and dynamic library, operating the application program and identifying network access function of the application program, searching the hijacking function library according to the network access function and the identifier of the application program, carrying out running of the hijacking function if the hijacking function corresponding to the network access function and the identifier of the application program is searched, and judging whether to call the hijacking function of the dynamic library or not and whether to monitor the network access function according to running result of the hijacking function or not. According to the Linux network access monitoring method, network access can be monitored in the Linux system according to different application programs, and access log in network access of different application programs can be recorded.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a Linux network access monitoring method and device. Background technique [0002] With the popularization and development of Internet applications, there are more and more insecure factors in the Internet. Especially in large-scale networks with internal networks, how to monitor access to external networks and ensure the security of internal networks is a must. Important topics in the field of information security technology. [0003] At present, the commonly used methods for network access monitoring under Linux include IPTABLES. If the Linux system is connected to an Internet server or proxy server, IPTABLES facilitates better control of IP packet filtering and firewall configuration on the Linux system. The IPTABLES component is a tool, also known as userspace, that makes it easy to insert, modify, and remove rules in packet filtering tables. [0004] The trad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/30
CPCG06F11/3093
Inventor 程广连
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products