A system and method for protecting Linux operating system security base on IMA

An operating system and security technology, applied in computer security devices, platform integrity maintenance, instruments, etc., can solve problems such as the inability of security protection software to effectively protect, and pay little attention to the security of Linux operating system, so as to protect integrity and enhance safety effect

Inactive Publication Date: 2019-03-29
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Firewalls and anti-virus software mostly passively detect network attacks and virus behaviors, and do not pay much attention to the security of the Linux operating system itself. For example, when the system dynamic link library is attacked, most traditional security protection software cannot effectively protect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for protecting Linux operating system security base on IMA
  • A system and method for protecting Linux operating system security base on IMA
  • A system and method for protecting Linux operating system security base on IMA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046]Embodiment 1 of the present invention provides a system and method for protecting the security of a Linux operating system based on IMA. Such as figure 1 Shown is a system architecture diagram for protecting the security of a Linux operating system based on IMA in Embodiment 1 of the present invention. The system includes a safety management center node unit and a protected node unit.

[0047] The security management center node unit is used for unified policy configuration and security status judgment, and mainly includes a security policy configuration module, a benchmark value collection module and a security status judgment module.

[0048] The security policy configuration module is responsible for security configuration and delivery, and is used to deliver basic files to the protected node node unit. At the same time, set the working mode of the safety management center node unit; the working mode of the safety management center node unit is divided into two type...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for protecting security of Linux operating system base on IMA. At first, that node unit of the security management cent configures a protection policy to the protect node unit, Asthat system executable file, system dynamic link library, System configuration files on the protected node unit need to be run and loaded into the Linux operating system, A measure value of that protected node element is obtain by measuring the object using an IMA technology, and then reporting the measure value to the node unit of the security management center. At last, after that node unit of the security management center analyze and confirms the identity information of the protected node unit, whether the upload metric value is the same as the reference value collected beforehand is compared to judge whether the protected object is tampered with or not, so as to protect the security of the Linux operating system on the protected node unit. The invention protects the integrity of the Linux operating system core system file, enhances the security of the Linux operating system, and the protection cycle will accompany the whole operating system running phase.

Description

technical field [0001] The invention relates to the field of Linux operating system security, and relates to a system and method for protecting the security of a Linux operating system based on IMA. Background technique [0002] With the development of computer technology and the popularization of network applications, people pay more and more attention to information security. The computer operating system is not only the basis for the operation of various applications, but also the carrier of various applications. At present, the security of the Linux operating system is mainly protected by firewalls and antivirus software. Firewalls mainly prevent network attacks and network penetration, and antivirus software mainly relies on virus databases and virus behavior characteristics for alarm and interception. Firewalls and antivirus software mostly passively detect network attacks and virus behaviors, and do not pay much attention to the security of the Linux operating syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 刘海伟
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products