Check patentability & draft patents in minutes with Patsnap Eureka AI!

Protection method and device for Java malicious command execution

A technology of command execution and java virtual machine, which is applied in the field of network security, can solve problems such as the large amount of monitoring point settings affecting performance, and achieve the effect of reducing performance loss

Pending Publication Date: 2022-03-29
BEIJING QIANXIN TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Matching based on black rules can only protect against known vulnerabilities, and the large number of monitoring points affects performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and device for Java malicious command execution
  • Protection method and device for Java malicious command execution
  • Protection method and device for Java malicious command execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0031] figure 1 It is a flow chart of an embodiment of a method for protecting Java malicious command execution in the present invention. Such as figure 1 As shown, the protection method that the Java malicious command execution of the embodiment of the present invention comprises:

[0032] S101, the Java virtual machine executes a command issu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a Java malicious command execution protection method and device. A Java virtual machine executes a command sent by a target program and triggers a monitoring point to monitor the target program; the monitoring point obtains an execution thread of the command sent by the target program, and detects a stack of the execution thread to obtain a category of an execution code of the command; and if the category of the execution code is not stored on the preset white list, the monitoring point gives an alarm through a dynamic alarm module. A small number of monitoring points are set on the Java virtual machine to monitor the target program, so that the performance loss of the Java virtual machine is reduced; by judging that the category of the execution code is not in the preset white list, unknown vulnerabilities can be protected.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for protecting Java malicious command execution. Background technique [0002] Java script attacks can execute arbitrary commands on the operating system, causing great harm. [0003] At present, the protection method of Java malicious command execution mainly sets monitoring points for common vulnerabilities, obtains the code that executes the command, performs black rule matching on the code that executes the command, and sends an alarm to the code that hits the black rule. [0004] Matching based on black rules can only protect against known vulnerabilities, and a large number of monitoring points will affect performance. Contents of the invention [0005] Aiming at the problems in the prior art, the embodiment of the present invention provides a method and device for protecting Java malicious command execution. [0006] Specifically, the embod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/566G06F21/577
Inventor 霍辉东陈俊儒
Owner BEIJING QIANXIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More