Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invading detection method and system based on procedure action

A technology of intrusion detection and behavior, applied in transmission systems, digital transmission systems, electrical components, etc.

Active Publication Date: 2006-06-28
上海浦东软件园信息技术股份有限公司
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical difficulty of this type of model lies in: facing the increasingly complex information system, how to establish a security model of normal behavior that has good adaptability and is convenient for practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invading detection method and system based on procedure action
  • Invading detection method and system based on procedure action
  • Invading detection method and system based on procedure action

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0096] For the convenience of explaining the content of the invention, some necessary definitions and explanations are first made:

[0097] Behavior characteristics of a certain software: the service and resource requests made to the system software operating platform (OS) in order to achieve all or part of the functions designed by the software, and the information collection composed of various characteristics of these requests. The so-called service refers to various facilities provided by the system, such as creating processes, network connections, etc. The so-called resources refer to files (including data files, configuration files, and execution files of shared libraries), devices, etc. that need to be accessed in order to complete predetermined functions. Characteristics refer to its order, associativity, and (virtual) address space c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for testing inbreak, which obtains the information of software behavior characters of a program, a structure access model and acts it on the program to prevent abnormal behavior so as to protect the entire network server system to avoid network inbreak including the following basic processes: collecting and processing a behavior security box to monitor the software behavior timely and a protection system suitable for the above mentioned method is also disclosed to realize the close coupling control to the behavior of the applied program.

Description

technical field [0001] The invention relates to the field of security and anti-intrusion of computer network systems, more specifically, the invention relates to a method and system for network intrusion detection based on program behavior. Background technique [0002] The security of the network information system can be divided into many aspects, and using the loopholes in the system, such as the loopholes in the application program and the loopholes that may exist in the system configuration and management, to launch a purposeful attack on the system is the biggest threat in security. aspect. Due to the complexity of computer network information systems and security factors, security loopholes emerge in endlessly, and incidents of loopholes found in patches also occur from time to time. According to the survey and statistics of authoritative departments, the existence and continuous discovery of a large number of various network security loopholes will still be the bigg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24
Inventor 冯敏韩欣阎光
Owner 上海浦东软件园信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products