Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for monitoring tampering of a static object in a mixed environment

A mixed environment, static technology, applied in the field of computer security, can solve the problems of not being able to see tampered pages, static files being tampered, and not being able to count the frequency of tampering

Inactive Publication Date: 2019-04-05
STATE GRID SHAANXI ELECTRIC POWER +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The third-generation anti-tampering technology is a combination of file filtering driver and event triggering. Its core idea is to apply the core program of tampering monitoring to the Web server through file underlying driver technology, and automatically monitor through event triggering. All files in the database will be compared with their underlying file attributes, and the built-in fast hash algorithm will be used to calculate digital fingerprints for real-time monitoring. If attribute changes are found, the content of the backup path folder will be copied to the corresponding location of the monitoring folder through a non-protocol plain text safe copy method. Using the underlying file-driven technology, the entire file copy process is in milliseconds, so that the public cannot see the tampered pages
[0004] After the iterative development of multiple monitoring and tampering technologies, the existing monitoring methods for anti-tampering of static objects have become very mature. Monitor the static objects, and after monitoring, only the corresponding static files can be found to be tampered with, and then repaired
However, if the middleware of the system is tampered or, the repaired webpage will be tampered again, which will lead to repeated tampering of static files
Such a repair has no effect, and cannot count the frequency of tampering, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring tampering of a static object in a mixed environment
  • Method for monitoring tampering of a static object in a mixed environment
  • Method for monitoring tampering of a static object in a mixed environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, and the implementation scope of the present invention is not limited thereto.

[0045] The invention provides a monitoring method for static object tampering in a mixed environment. The terminology involved in the present invention is described as follows:

[0046] Hybrid environment: Data center IT infrastructure where the cloud computing environment and the traditional IT architecture-based physical computing environment exist side by side.

[0047] Static objects: refer to electronic files stored in computers such as documents, design drawings, videos, and images that are not changing.

[0048] Seed file: For the storage method in the cloud computing environment, all local data usage and systems are retrieved from the cloud platform. We call the storage content of static objects, middleware, and operating systems on the cloud platfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for monitoring tampering of a static object in a mixed environment, which comprises the following steps: monitoring whether the static object is tampered or not, sequentially monitoring whether the static object is tampered or not, recording the tampered frequency, judging whether the tampered frequency reaches a preset frequency t1 or not, and if yes, further monitoring whether the middleware is tampered or not; And when it is judged that the middleware is tampered, monitoring whether the operating system is tampered or not. According to the technical scheme provided by the invention, in the tampering monitoring process aiming at the static object, whether the static object is tampered or not can be rapidly monitored, the tampering reason of the static object is further mined, each detection step can be operated in parallel or in series, the deployment is flexible, and the operation is efficient.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a monitoring method for static object tampering in a mixed environment. Background technique [0002] As the Internet penetrates into people's daily life more and more, people obtain a lot of information through website resources, especially browsing official government websites and major portal websites. The information released by these websites is often policy and current affairs, so it is also easy to become a target for hackers. The primary target, cyberattacks are particularly prevalent. Once a webpage is tampered with by attackers, it will often cause bad social impact, especially tampering with political attack color, which will seriously damage the image of the government. Web servers that dominate the Internet, such as Apache and IIS, lack an integrity protection mechanism for pages requested by users, and cannot effectively prevent pages from being tampered with. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/565G06F21/64G06F21/57
Inventor 赵宏斌白开峰张根周朱朝阳周亮王明文李妍马勇
Owner STATE GRID SHAANXI ELECTRIC POWER
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More