Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Server mining virus protection system and method

A server and virus technology, applied in the direction of instrument, platform integrity maintenance, electrical digital data processing, etc., can solve the problems of server performance loss, running rate drop, denial of service, etc., to reduce the false positive rate and increase the accuracy rate.

Pending Publication Date: 2019-12-13
慧盾信息安全科技(苏州)股份有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Not only that, because the CPU of the computer is occupied by mining Trojan horses, your computer will become very hot and the operating speed will drop sharply. If the servers of some enterprises and institutions that provide external services are infected with mining viruses, it may cause Due to the serious performance loss of the server, there are problems such as denial of service that seriously affect the business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server mining virus protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Including anti-mining security software and anti-mining security gateway hardware equipment, the security protection of server mining viruses is realized through software and hardware linkage.

[0021] The anti-mining security software is installed on the server and starts automatically when the server starts; its initial configuration or security policy adjustment is managed by the anti-mining security gateway hardware device; the software includes the four modules mentioned above: process control Driver, resource control module, mining virus blocking module.

[0022] The anti-mining security gateway hardware device is an embedded hardware device, which adopts the core switch bypass deployment method to realize the anti-mining security software for policy management and automatic delivery, log collection, known and unknown mining detection, and mining virus attacks Network traffic detection and blocking. The hardware includes the two modules mentioned above: full flow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a server mining virus protection system and method. At present, most of hacker organizations turn to the camp of mining viruses due to enormous benefits of the virtual currency and gradual rising of gas flames of the mining viruses, so that the mining viruses have very many novel variants, and most of the existing mining virus protection modes based on the feature librarycannot achieve a very good effect. Server resource fine-grained management and control are taken as a core, a process management and control driving technology is utilized to control the utilizationrate of core resources (a CPU, an internal memory, a video memory, a hard disk and a network) of the server, and illegal processes using the resources are limited at a very low level, so that the corefunction of the mining virus is fundamentally limited. The traffic for a protected server is analyzed in combination with the network side. The traffic is compared with mining virus flow characteristics. The traffic is compared with a mine pool resource pool so as to identify whether mining virus flow exists in the network or not. Resources, a host and a network are linked, so that mining viruseshave no place to hide, and meanwhile, the mining virus epidemic situation can be notified to a safety administrator in time to be treated in time.

Description

technical field [0001] The invention relates to a system and method for server mining virus protection, which implements in-depth defense against mining viruses at the three levels of host, process and network. At the resource level, use server resource consumption control technology combined with whitelist technology; at the process level, use blacklist technology and driver layer process start-stop control technology; at the network level, use traffic analysis technology and mining threat intelligence technology. Visualization technology is used to present the discovered mining virus risk warning in real time. [0002] Abbreviations and explanations: Background technique [0003] Like traditional Trojan horses, these miners who "kidnap" your computer will implant these mining viruses into certain programs. If you download these programs, it is very likely that your computer will be invaded by mining Trojan horses. Different from traditional Trojans, these mining Trojans ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/561G06F21/554G06F21/566
Inventor 鞠鑫张冉冉刘兴鹏
Owner 慧盾信息安全科技(苏州)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products