Intrusion kernel detection method and device based on target range and computing equipment

A detection method and core technology, applied in computing, computer security devices, instruments, etc., can solve problems such as inability to guarantee detection results

Pending Publication Date: 2021-02-02
BEIJING QIHOO TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As for whether the detection of the intrusion kernel is effective and whether the attack on the ROOT by the process can be detected, it is only verified in the actual device, and the detection effect cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion kernel detection method and device based on target range and computing equipment
  • Intrusion kernel detection method and device based on target range and computing equipment
  • Intrusion kernel detection method and device based on target range and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] figure 1 A flow chart of a range-based intrusion kernel detection method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the intrusion kernel detection method based on the shooting range specifically includes the following steps:

[0025] Step S101 , implanting preset vulnerability codes into a device equipped with an intrusion kernel detection system to build a shooting range.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion kernel detection method and device based on a target range, computing equipment and a computer storage medium. The method comprises the steps of: implanting a preset vulnerability code into equipment provided with an intrusion kernel detection system to build the target range; running a process invading the kernel in a shooting range in a simulated manner to attack the preset vulnerability code; and obtaining a detection result of the intrusion kernel detection system to the process so as to determine whether the detection of the intrusion kernel detectionsystem is valid according to the detection result. The target range is built on the real equipment, the process of invading the kernel is simulated and operated, whether the invading kernel detectionsystem is effective or not can be detected, and the detection effect of the invading kernel detection system is evaluated.

Description

technical field [0001] The invention relates to the field of software, in particular to a shooting range-based intrusion kernel detection method and device, computing equipment, and a computer storage medium. Background technique [0002] The goal of an attacker invading the kernel is to obtain the ROOT privilege of the device, so that the ROOT privilege can be used to control the entire device. Based on kernel security considerations, the process of intrusion into the kernel is detected, so as to quickly and timely find out whether the process is attacking ROOT. [0003] As for whether the detection of the intrusion kernel is effective and whether the attack of the process on the ROOT can be detected, it is only verified in the actual device, and the detection effect cannot be guaranteed. Therefore, there is an urgent need for a shooting range for intrusion kernel detection to evaluate the detection effect of intrusion kernel detection. Contents of the invention [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 周明建姚俊王彦峰窦文科张继
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products