Data tampering monitoring method based on iNotify real-time response

A data tampering and real-time response technology, applied in the field of information security, can solve the problems of the failure of the file signature, the inability to guarantee the authenticity of the data, and the inability to detect the arrival of new files in time. Effects of Sex and Reliability

Pending Publication Date: 2022-05-31
桔帧科技(江苏)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the 4A system cannot guarantee the authenticity of data, nor can it provide proof of data authenticity to third parties
[0004] At present, there is also a method of signing files based on timed tasks. Due to the limitations of the timed task itself, this method cannot detect the arrival of new files in time. The data file is modified, which makes the file signature function invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tampering monitoring method based on iNotify real-time response

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] Such as figure 1 As shown, in the present embodiment, the data tampering monitoring method based on iNotify real-time response of the present invention, the specific steps are as follows:

[0028] Step 1: Install the iNotify module on the CentOS 7.8 Linux system, and then enable the iNotify function.

[0029] Enter the "ls -lsart / proc / sys / fs / inotify" command in the Linux system console, if you see the output in the monitor:

[0030] total 0

[0031] -rw-r--r-- 1 root root 0 Oct 9 09:36 max_queued_events

[0032] -rw-r--r-- 1 root root 0 Oct 9 09:36 max_user_instances

[0033] -rw-r--r-- 1 root root 0 Oct 9 09:36 max_user_watches

[0034] It means that the iNotify mechanism has been successfully started.

[0035] Step 2: Write the monitoring proxy module of the Linux system, so that the monitoring proxy module can monitor iNotify notification events.

[0036] Among them, use the "ssh-keygen" tool to generate a dedicated key pair for account user1, such as the priv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data tampering monitoring method based on iNotify real-time response, and belongs to the technical field of information. The method comprises the following steps of: 1, installing and starting an iNotify function of a Linux system; 2, setting a monitoring agent module of the Linux system; 3, when real-time monitoring is started, starting a monitoring agent module and waiting for triggering of an iNotify function; 4, the monitoring agent module receives an event which is reminded and responded by the iNotify in real time; 5, the monitoring agent module generates a signature string of the newly-added file; 6, reporting the signature string of the newly added file to a server for storage; and step 7, when a third party uses the original file, performing verification. The method is high in universality and can be applied to an operating system with the same event notification based on a Linux-like file system; the authenticity and reliability of the data file are guaranteed; most importantly, the file signature can be completed as quickly as possible through the real-time response function of the iNotify function of the Linux system.

Description

technical field [0001] The invention relates to a data tampering monitoring method based on iNotify real-time response, belonging to the technical field of information security. Background technique [0002] Data has always been an important asset for enterprise development, and the reliability, completeness, and authenticity of data are the basic attributes of data records. However, in reality, driven by various purposes or interests, data is often artificially modified, which affects the efficiency of data use. [0003] In order to deal with the problem of data modification, in the IT system, a log audit system is often used for tracking, such as the 4A system, which has the functions of authentication, authorization, account management and audit management, and all user operations are under the control of the 4A system. However, the 4A system cannot guarantee the authenticity of the data, nor can it provide proof of the authenticity of the data to third parties. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L67/56H04L9/32
CPCH04L9/3247
Inventor 寇红侠闫兴秀卢军
Owner 桔帧科技(江苏)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products