期刊文献+

基于系统安全的软件检测设计

Based on system security software designed to detect
下载PDF
导出
摘要 基于SDK平台,采用内核检测技术,设计开发了一种新型的系统安全检测软件。其主要功能包括系统服务程序监视及相关操作;监视注册表值的变化;检测病毒、木马等恶意软件隐藏的文件、进程及内核模块等;强制结束掉被保护的进程和删掉被保护的文件,并通过进程端口映射能够查找系统打开的端口信息及打开端口的进程;有效地查找木马及NTFS流文件中的流病毒;通过查看BHO(Browser Helper Objects)、LSP(Layer Service Provider),防止浏览器和网络被劫持;通过查看被HOOK的SSDT(System Service Descript Table)及SSDT Shadow(System Service Descript Table Shadow)恢复被修改的内容。经过实际系统测试与比较表明,该系统能有效地保障系统软件的安全。 In this paper, based on the SDK platform, USES the kernel detection technology, designed and developed a new type of system security detection software. Its main functions include system service routine surveillance and related operations; Monitor the registry value changes; Detect viruses, trojans and other malicious software hidden files, processes, and the kernel module, etc.;Forced to end off a protected process and delete protected files, and through the process of port mapping system that can find open port information and the process of opening ports; Effectively find the Trojan and NTFS file virus; By looking at the BHO(Browser Helper Objects), the LSP(Layer Service Provider), to prevent the Browser and the web is hijacked; By looking at the HOOK SSDT(System Service Descript the Table) and the SSDT Shadow(System Service Descript the Table Shadow) to restore the modified content. Through the actual system test and comparison show that the system can effectively guarantee the safety of the system software.
作者 李邕
机构地区 甘肃政法学院
出处 《自动化与仪器仪表》 2015年第1期89-91 94,94,共4页 Automation & Instrumentation
关键词 系统服务描述表 根权限工具 输入输出请求包 System service description table Root access tools Input/output request packets
  • 相关文献

参考文献4

二级参考文献23

  • 1吴亚峰,苏亚光.Android应用案例开发大全[M].北京:人民邮电出版社,2011.
  • 2Michael J Ktchabaw,Hanan L Lutfiyya,Andrew D.Marshall Policy-Driven Fault Management in Distributed Systems Software ReliabilityEngineering [C]//Proceedings-Dept.of Comput.Sci.,Univ.ofWestern Ontario,London,Ont,1996.
  • 3Ferenc Bodon Informatics Laboratory,Computer and Automation Re-search Institute Hungarian Academy of Sciences H-llll Budapest,h'agymr anyosi u.11,Hungary.
  • 4司徒放,曹建.基于事件的分布式系统监控[D].上海交通大学,2010.
  • 5Matteo Migliavacca,Ioannis Papagiannis,David M Eyers,et al.Dis-tributed Middleware Enforcement of Event Flow Security Policy[C]//Lecture Notes in Computer Science,2010,6452:334-354.
  • 6Gerald G Koch,Boris Koldehofe,Kurt Rothermel.Cordies:expressiveevent correlateion in distributed systems [C] //DEBS 10 Proceedingsof the Fourth ACM International Conference on Distributed Event-Based Systems ACM New York,NY,USA,2010.
  • 7吉根林,孙志挥.分布式数据库关联规则挖掘与更新研究[D].东南大学,2011.
  • 8Akdere M,Cetintemel U,Tatbul N.plan-based Complex Event Detec-tion Across Distributed Sources [C]//Proceedings of the VLDB En-dowment.August 2008:66-77.
  • 9Pietzuch P R,Shand B,Bacon J.Composite event detection as a genericmiddleware extension[J].Network,IEEE,2004,18(1):44-45.
  • 10Blott S,Korth HF.An almost-serial protocol for transaction executionin main-memory database systems. Proceedings of the 28th Inter-national Conference on Very Large Databases(VLDB’’02) . 2002

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部