Check patentability & draft patents in minutes with Patsnap Eureka AI!

A Monitoring Method for Static Object Tampering in Mixed Environment

一种混合环境、静态的技术,应用在计算机安全领域,能够解决静态文件被篡改、无法看到被篡改页面、不能统计被篡改频次等问题

Inactive Publication Date: 2021-03-02
STATE GRID SHAANXI ELECTRIC POWER +2
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The third-generation anti-tampering technology is a combination of file filtering driver and event triggering. Its core idea is to apply the core program of tampering monitoring to the Web server through file underlying driver technology, and automatically monitor through event triggering. All files in the database will be compared with their underlying file attributes, and the built-in fast hash algorithm will be used to calculate digital fingerprints for real-time monitoring. If attribute changes are found, the content of the backup path folder will be copied to the corresponding location of the monitoring folder through a non-protocol plain text safe copy method. Using the underlying file-driven technology, the entire file copy process is in milliseconds, so that the public cannot see the tampered pages
[0004] After the iterative development of multiple monitoring and tampering technologies, the existing monitoring methods for anti-tampering of static objects have become very mature. Monitor the static objects, and after monitoring, only the corresponding static files can be found to be tampered with, and then repaired
However, if the middleware of the system is tampered or, the repaired webpage will be tampered again, which will lead to repeated tampering of static files
Such a repair has no effect, and cannot count the frequency of tampering, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Monitoring Method for Static Object Tampering in Mixed Environment
  • A Monitoring Method for Static Object Tampering in Mixed Environment
  • A Monitoring Method for Static Object Tampering in Mixed Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, and the implementation scope of the present invention is not limited thereto.

[0045] The invention provides a monitoring method for static object tampering in a mixed environment. The terminology involved in the present invention is described as follows:

[0046] Hybrid environment: Data center IT infrastructure where the cloud computing environment and the traditional IT architecture-based physical computing environment exist side by side.

[0047] Static objects: refer to electronic files stored in computers such as documents, design drawings, videos, and images that are not changing.

[0048] Seed file: For the storage method in the cloud computing environment, all local data usage and systems are retrieved from the cloud platform. We call the storage content of static objects, middleware, and operating systems on the cloud platfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring method for tampering of a static object in a mixed environment, comprising: monitoring whether the static object is tampered with, the static object is sequentially monitored for tampering, recording the number of times of tampering, and judging whether the number of times of tampering reaches a predetermined value. Set the number of times t1, if it is, then further monitor whether the middleware has been tampered with; when it is judged that the middleware has been tampered with, then execute to monitor whether the operating system has been tampered with. Through the technical solution provided in the present invention, in the process of tampering monitoring for static objects, it is not only possible to quickly monitor whether the static objects have been tampered with, but also to further dig out the reason why the static objects have been tampered with, and each detection step can run in parallel or in series , flexible deployment and efficient operation.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a monitoring method for static object tampering in a mixed environment. Background technique [0002] As the Internet penetrates into people's daily life more and more, people obtain a lot of information through website resources, especially browsing official government websites and major portal websites. The information released by these websites is often policy and current affairs, so it is also easy to become a target for hackers. The primary target, cyberattacks are particularly prevalent. Once a webpage is tampered with by attackers, it will often cause bad social impact, especially tampering with political attack color, which will seriously damage the image of the government. Web servers that dominate the Internet, such as Apache and IIS, lack an integrity protection mechanism for pages requested by users, and cannot effectively prevent pages from being tampered with. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/565G06F21/64G06F21/57
Inventor 赵宏斌白开峰张根周朱朝阳周亮王明文李妍马勇
Owner STATE GRID SHAANXI ELECTRIC POWER
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More