Unlock instant, AI-driven research and patent intelligence for your innovation.

USB camouflage intrusion detection method and device

A detection method and a detection device technology, which are applied in the field of information security, can solve problems such as detection and defense technologies that cannot be discovered in time, and achieve the effect of improving system security

Pending Publication Date: 2021-09-03
GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, even if the attack point of BadUSB often starts at the driver layer, existing detection and defense technologies cannot detect it in time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB camouflage intrusion detection method and device
  • USB camouflage intrusion detection method and device
  • USB camouflage intrusion detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The embodiment of the present invention provides a USB masquerading intrusion detection method and device, which can improve system security by timely discovering damage activities to the target machine or information stealing activities to the target machine initiated based on the USB interface.

[0045] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] see figure 1 , figure 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USB camouflage intrusion detection method and device, and the method comprises the steps: S1, responding to the insertion operation of USB equipment, and generating drive information corresponding to the USB equipment; S2, matching the driving information with a preset risk feature, and determining whether the USB equipment has a BadUSB feature or not; if yes, executing the step S4; if not, driving the USB device by a keyboard to run, and executing the step S3; S3, monitoring whether an input command of a simulation keyboard and / or a mouse of the USB equipment repeatedly contains a preset keyboard instruction or not; if not, determining that the USB equipment is normal USB equipment; if yes, executing the step S4; the input command is generated by the USB equipment through the keyboard driver; and S4, determining that the USB equipment is a disguised USB, and disconnecting the connection with the USB equipment. The system security is improved by timely discovering the damage activity to the target machine or the information stealing activity to the target machine initiated based on the USB interface.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for detecting USB masquerading and intrusion. Background technique [0002] The traditional host protection method is to install protection software on the protected host. These protection software pay more attention to whether there are viruses and Trojan horses in the files in the USB flash drive, but they are not enough to protect against new types of attacks like BadUSB. Therefore, even if the attack point of BadUSB often starts at the driver layer, existing detection and defense technologies cannot find it in time. Contents of the invention [0003] The invention provides a USB masquerade intrusion detection method and device, which can improve system security by timely discovering damage activities to the target machine or information stealing activities to the target machine initiated based on the USB interface. [0004] In the first as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F13/40
CPCG06F21/562G06F21/567G06F13/4068Y02D10/00
Inventor 林丹生曾智勇胡春潮尤毅
Owner GUANGDONG ELECTRIC POWER SCI RES INST ENERGY TECH CO LTD