Unlock instant, AI-driven research and patent intelligence for your innovation.

Linux network access control method and device

A technology of network access control and network access, which is applied in the field of Linux network access control, can solve problems such as uncontrollability, and achieve the effect of improving flexibility

Active Publication Date: 2017-05-10
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide a Linux network access control method for the problem that the network access of the Linux system cannot be controlled for the application program, and the method includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux network access control method and device
  • Linux network access control method and device
  • Linux network access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1 It is a flow chart of the Linux network access control method in one embodiment, such as figure 1 The Linux network access control method in the shown embodiment includes:

[0040] Step S100, receiving a running command of the application program, and obtaining the identification of the application program.

[0041] Specifically, the identification of the application program refers to a mark used to distinguish different application programs, or a mark for distinguishing characteristics of different application programs, including any one of program category, name, and version number of the application program.

[0042] Step S200, loading preset hijacking function library and dynamic library.

[0043] Specifically, the preset hijacking function library includes open series functions, close functions, create series functions, read functions, write functions, socket operation series functions (socket, listen, bind, connect, send, recieve, etc.), kill function ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Linux network access control method and device. The method includes receiving an operation command of an application program and obtaining a logo of the application program; loading a preset hijacking function database and a dynamic database; operating the application program and identifying a network access function in the application program; looking up in the hijacking function database according to the operation function and the logo of the application program, wherein the hijacking function database includes the correspondence relationship between the network access function as well as the logo of the application program and a hijacking function; operating the hijacking function if the hijacking function corresponding to the network access function and the logo of the application program and judging whether to call the network access function in the dynamic database or not according to the operation result of the hijacking function. According to the invention, control of network access can be realized in a Linux system aiming at different application programs, so that network access control flexibility is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a Linux network access control method and device. Background technique [0002] With the popularization and development of Internet applications, there are more and more insecure factors in the Internet. Especially in large-scale networks with internal networks, how to control access to external networks and ensure the security of internal networks is a key issue. Important topics in the field of information security technology. Currently, commonly used methods for network access control under Linux include iptables and netfilter. If the Linux system is connected to an Internet server or proxy server, iptables facilitates better control of IP packet filtering and firewall configuration on the Linux system. The iptables component is a tool, also known as user space, that makes it easy to insert, modify, and remove rules in the packet filtering table; the netfilter c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/54
Inventor 刘思宇
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD