Unix white-list control method based on hook technology

A control method and whitelist technology, which are applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., and can solve the problem that the computing environment is no longer safe.

Inactive Publication Date: 2017-06-20
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, if hackers or insiders add, modify, or replace any of these three types of files, resulting in malicious files in the current operating system, the computing environment will no longer be safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unix white-list control method based on hook technology
  • Unix white-list control method based on hook technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. It should be noted that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0018] The Unix whitelist control method based on hook technology adds a filter driver module on the Unix system, and the filter driver module is implemented in a kernel-driven manner, and is installed and started by the whitelist main service process; the filter driver module is used throughout On the operating system, control the startup of processes in the non-white list, control the loading of dynamic libraries in the non-white list, control the loading of drivers in the non-white list, control the addition of binary files, and control the writing, overwriting, and replaceme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Unix white-list control method based on a hook technology. According to the Unix white-list control method based on the hook technology, a filter driving module is added in a Unix system, on the whole operation system, starting of processes not in a white list is controlled, loading of dynamic libraries and drives not in the white list is controlled, the addition of binary files is controlled, and writing, covering, replacing, deletion and renaming of binary files in the white list are controlled. According to the Unix white-list control method based on the hook technology, processes not in the white list can be forbidden to start, the dynamic libraries and the drives not in the white list can be forbidden to load, and at the same time, and it can be ensured that process files, dynamic library files and drive files are not illegally written in, covered, replaced, deleted and renamed; it is ensured that the current operation system no longer establishes new binary files, so that a safe operation system calculation environment is established.

Description

technical field [0001] The invention relates to the technical field of computer operating system security, in particular to a hook technology-based Unix whitelist control method. Background technique [0002] With the development of new technologies such as cloud computing and big data, the requirements for the secure computing environment of cloud hosts and servers are getting higher and higher. A secure computing environment is the basis for the development of cloud computing. Without a secure computing environment, the security of cloud data cannot be guaranteed, and without a secure computing environment, the sustainability of cloud services cannot be guaranteed. The software whitelist mechanism is an important measure to build a secure computing environment. [0003] In the prior art, the Unix whitelist control method based on the hook technology can effectively solve the problem of the implementation mechanism and deployment of the software whitelist technology on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/52G06F21/57
CPCG06F21/51G06F21/52G06F21/57
Inventor 邢希双
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products