Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Design method of active defense system based on white list technology and system

A technology of active defense and design method, applied in the field of security, can solve the problems of difficult to deal with zero-day attacks, specific attacks, very large number of software resources, insufficient security, etc., to ensure effectiveness and identification efficiency, non-limited design implementation method, the effect of ensuring the speed

Inactive Publication Date: 2018-04-20
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional blacklist technology is faced with the blacklist library tends to be infinite, and it is difficult to deal with security threats such as zero-day attacks and specific attacks. Security experts are eager to find a technology that can solve the problems faced by the blacklist
Whitelist, as a technology that was questioned when it was first proposed, is now being used in the design of active defense by more and more security software, but most of the existing whitelist products are limited to user-defined whitelists, or require powerful software resources to identify the credibility of the program, the former is not safe enough, and the latter requires a very large number of software resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design method of active defense system based on white list technology and system
  • Design method of active defense system based on white list technology and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment 1 (a design method of an active defense system based on whitelist technology)

[0044] as attached figure 1 As shown, a kind of design method of the active defense system based on white list technology of the present invention, its specific implementation steps are as follows:

[0045] 1) list collection : The server software collects the executable files in the OS installation image downloaded from the official website of the operating system, obtains the detailed information of the executable files, such as file name, operating system version, file modification time, file Hash value, etc., and trusts them The level is set to white (allow execution), and MySQL is used to generate the manifest library.

[0046] [Design intent: collect the OS installation image downloaded from the official website of the operating system through the server software, and obtain the hash value of the built-in program of the operating system from it, ensuring the reliability o...

Embodiment 2

[0066] Embodiment 2 (a design system of an active defense system based on whitelist technology)

[0067] as attached figure 2 As shown, the present invention also provides a design system of an active defense system based on whitelist technology, wherein,

[0068] Server equipment includes:

[0069] The list collection module is used to collect the OS installation image downloaded from the official website of the operating system, obtain the hash value of the built-in program of the operating system from it, and generate a list library;

[0070] The white list total library generated by the list library on the server side;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a design method of an active defense system based on white list technology and a system, belonging to the technical field of safety. According to the design method of the activedefense system, the reliability of a white list source is guaranteed through collecting the Hash value of a legal copy operation system mirror image; network visits are reduced through generating andcustomizing a local white list library for a customer, the recognition efficiency of a program is improved to some extent, and the starting speed of a run program is guaranteed; the pragmaticality and recognition efficiency of the white list are guaranteed through acquiring a patch updated by an operating system in real time; a recognition function is trusted through an unknown program, the resource requirement on traditional white list technology is solved, and the non-limitation of the white list is guaranteed. The method and the system can be used for effectively solving the problem whicha blacklist confronts, and are reliable, efficient, pragmatic and non-limited in the realization of the active defense system design of the white list.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a design method and system of an active defense system based on white list technology. Background technique [0002] With the openness and interconnection of computer networks, network information security is facing various threats, and malicious programs such as viruses emerge in endlessly. The traditional blacklist technology is faced with the blacklist library tends to be infinite, and it is difficult to deal with security threats such as zero-day attacks and specific attacks. Security experts are eager to find a technology that can solve the problems faced by the blacklist. Whitelist, as a technology that was questioned when it was first proposed, is now being used in the design of active defense by more and more security software, but most of the existing whitelist products are limited to user-defined whitelists, or require powerful software resources to identify the cred...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/51G06F21/57
CPCG06F21/121G06F21/51G06F21/57
Inventor 唐洪英
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products