CN101477604A - Layered self-destruction method oriented to distributed system - Google Patents
Layered self-destruction method oriented to distributed system Download PDFInfo
- Publication number
- CN101477604A CN101477604A CN 200910071281 CN200910071281A CN101477604A CN 101477604 A CN101477604 A CN 101477604A CN 200910071281 CN200910071281 CN 200910071281 CN 200910071281 A CN200910071281 A CN 200910071281A CN 101477604 A CN101477604 A CN 101477604A
- Authority
- CN
- China
- Prior art keywords
- destruction
- self
- event
- program
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a hierarchical self-destruction method oriented to a distributed system. A processor endued with a capability for monitoring the whole distributed system in the distributed system serves as an event monitor M; a certain region divided for storing event information serves as an event storage bank Sto; a processor endued with a capability for analyzing event information serves as an event analyzer A; a processor endued with a capability for destroying files serves as a self-destructor D; and the event monitor M comprises an event collecting module C, an event monitoring strategy Str and an event treatment module T. The invention ensures that the self-destruction of a distributed key task system is accomplished, and a certain depth of exploration in the direction of self-destruction on the field of computers is performed. The invention has the advantages of low cost, wide application range and obvious self-destruction effect. The invention is mainly applied to the distributed key task systems, such as military, medical treatment and banks, and provides guarantee for data security and software security.
Description
(1) technical field
What the present invention relates to is a kind of information security technology, specifically a kind of self-destruction technical method that is applied to have the distributed distributed key task systems of high safety standard.
(2) background technology
Distributed, networking has been the certainty of computer system development, and the good result of its superiority and widespread usage also is a undisputable fact.Yet, in the distributed real-time system of mission critical and since system out of control, attacked and artificial illegal operation, cause a large amount of loss of vital data of message area, destruction, caused the massive losses that is difficult to retrieve for country and enterprises and institutions.At this problem, people's notice concentrates on aspects such as the use, configuration, installation, enforcement of computing machine and the defence instrument relevant with its technology usually, in case and the defense system of framework is broken, these instruments are with powerless.Therefore, when system is in the hazardous environment, how to make system's self-destruction, and then, caused people's attention minimization of loss.Technical method for system's self-destruction yet there are no all newspapers at present.
What the correlative study of computer system self-destruction occurred the earliest is the data self-destructions.2003 06 month, the So-net company of ISP under the Sony sold a kind of movie file that can download from the internet that can destroy voluntarily at the appointed time, has at first proposed " self-destruction " at the computing machine commercial field.Patent publication No. CN101216872 has provided the method for database self-destruction, but is not suitable for system's self-destruction.The hardware self-destruction mainly is about hard disk and movable storage device.For example, in July, 2005, a kind of " suicide " hard disk has been invented by U.S. hiding data technology company (Ensconce), can mainly stop burglar's abuse sensitive data wherein by physical means in stolen back by Global Positioning System (GPS) sensor self-destruction data as requested.
(3) summary of the invention
The object of the present invention is to provide a kind of self-destruction of finishing distributed distributed key task systems, and cost is low, applied widely, a kind of layered self-destruction method towards distributed system of self-destruction outstanding effect.
The object of the present invention is achieved like this:
In distributed system in the imparting system certain processor monitor the ability of whole distributed system, as event monitor M, divide certain zone be used for storing event information, as incident thesaurus Sto, give certain processor analyze the ability of event information, as event analysis device A, give certain processor destroy the ability of file, as destructor D; Event monitor M is divided into incident acquisition module C, event-monitoring strategy Str and event processing module T, according to the event-monitoring strategy, carries out
Obtain event information collection U; Contain event handling collection P among the event processing module T, for the event information u of captured in real time, carry out u ∈ U, p ∈ P, u * p → message obtain having the event information message message of certain format; This message is real-time transmitted among the incident thesaurus Sto stores; Event analysis device A is by carrying out extraction and analysis in real time to the message among the Sto, by
Signal singal in getting everywhere; Destructor is incited somebody to action destruction database Dd, destruction kernel Di, deletion destruction program Dp successively after receiving signal, and then finishes the self-destruction of system.
The present invention is based on distributed real-time system towards mission critical, proposed a kind of method of system level self-destruction, this method realizes that by event monitor, incident thesaurus, event analysis device, destructor system itself reaches the irrecoverable property self-destruction of relevant significant data.This method can formally be expressed as a four-tuple Ds=(M, Sto, A, D), wherein M is that event monitor, Sto are that incident thesaurus, A are that event analysis device, D are destructor.(Str, C T) are divided into incident acquisition module C, event-monitoring strategy Str and event processing module T to event monitor M=, according to the event-monitoring strategy, carry out
Obtain event information collection U.Contain event handling collection P among the event processing module T, for the event information u of captured in real time, carry out u ∈ U, p ∈ P, u * p → message obtain having the event information message message of certain format; This message is real-time transmitted among the incident thesaurus Sto stores; Event analysis device A is by carrying out extraction and analysis in real time to the message among the Sto, by
Signal singal in getting everywhere; D:M * Sto * A → D, D={Dd, Di, Dp}, destructor incite somebody to action destruction database Dd, destruction kernel Di, deletion destruction program Dp successively after receiving signal, and then finish the self-destruction of system.
The present invention can finish the self-destruction of distributed distributed key task systems, has carried out the exploration of certain depth in the self-destruction direction of computer realm.And it is low, applied widely to have a cost, advantage such as the self-destruction effect is obvious.Be mainly used in military affairs, medical treatment, bank's distributed distributed key task systems, for its data security, software security provide safeguard.
(4) description of drawings
Fig. 1 is a realization schematic diagram of the present invention;
Fig. 2 is that file is destroyed algorithm flow chart;
Fig. 3 is a destroying system kernel process flow diagram;
Fig. 4 is that program flow diagram is destroyed in deletion;
Fig. 5 is system's irrecoverable property self-destruction process flow diagram.
(5) embodiment
For example the present invention is done description in more detail below in conjunction with accompanying drawing:
Fig. 1 has illustrated realization principle of the present invention: at first, interior certain processor of distributed system imparting system monitors the ability of whole distributed system, is referred to as event monitor M; Secondly, the zone that system divides is certain is used for storing event information, is referred to as incident thesaurus Sto; Once more, system gives the ability that certain processor is analyzed event information, is referred to as event analysis device A; At last, system gives the ability that certain processor is destroyed file, is referred to as destructor D.
Step 1: monitoring strategies initialization event watch-dog, incident acquisition module C obtain the variety of event information in the distributed system, and these event informations are processed into the message message with certain format by the function among the event handling collection P.
Step 2: this message is real-time transmitted among the incident thesaurus Sto of appointment in the system and stores.
Step 3: the real-time message in the incident thesaurus of event analysis device A extracts, detects, if this message is a gained under the situation of watch-dog operate as normal, then this event information message and default message are mated, analyze the back through test and appraisal and send self damaging order to destructor.Otherwise, send signal to the message processing module of event monitor, inform and make a mistake that event monitor will be adjusted monitoring according to its monitoring strategies, execution in step one.
Step 4: destructor is finished the self-destruction of corresponding system in the system after obtaining order according to the self-destruction step.
1, event monitor
Event monitor is finished the initialization of self according to monitoring strategies Str.Str={stac, co, N, rep}, but it mainly comprises startup incident acquisition module stac, monitoring coefficient co, the collection event set of types N of system, initialization information processing collection rep.Wherein N mainly comprises application program, the read-write situation of disk that keyboard input, transient copy, the system of system opened, network sends with the reception packet and be connected event information such as foundation, co is used for the type scope of incident acquisition module incident collection is limited U:co * N.After carrying out rep,
Message0, message0 ∈ P makes message0=1111111111111111, and wherein the heading mh0=1111 of message0, data field are complete 1.
The incident acquisition module collects incident u in real time to the system event collection, carries out u ∈ U, p ∈ P, and u * p → message, obtaining heading is the event information message of the message of mh=1111.Carry out
Obtain new message message1, the form of this message with daily record data is real-time transmitted among the incident thesaurus Sto by the Socket communication mechanism.
2, incident thesaurus
The incident thesaurus is when providing the incident infomational message for the event analysis device, and under fire situation and system's self-destruction degree provide original foundation to its independence for later analysis system performance, system.The incident thesaurus is a storing daily record database of information.This database can be the database of any kind, and such as Oracle, Access etc., database file is storage medium with the disk, for the security of guarantee information storage, adopt the database file of storage and a series of safeguard measures such as encrypt, hide.
3, event analysis device
Event analysis is partly set user interface, and being used for according to the different incident of different requirements set is the self-destruction trigger event.Event information message in the event memory is analyzed by real-time being transferred in the event analysis device, and for guaranteeing the timely, complete of primitive event information, the event information message of handling the processor of this incident will copy extraction from metadata cache.
The event analysis device uses standard SQL statement accessing database, at first extracts the head mh1 of event information message message1 in the database, if mh1!=1111, then the message processing module to event monitor sends signal signal0, informs to it and make a mistake that message processing module is then adjusted event monitor by monitoring strategies.If mh1=1111, then the key-strings to this event information message data part extracts, and adopts the method for canonical coupling that this character string and the self-destruction event information of having set are compared, and carries out the information test and appraisal, if the two unanimity is then sent self damaging order singal1 to destructor.Otherwise, wait for that new event information message arrives.
4, destructor
Destructor is according to the irrecoverable property self-destruction of self-destruction algorithm (soft_del) realization system, and its algorithm is as follows: (false code of available formization)
Algorithm: system's self-destruction algorithm (soft_del)
Input: do not have
Output: do not have
{
/ * destroying system database */
Stop all to access of database;
Disconnection is connected with database;
Crashfile (database file name);
/ * destroying system core */
System kernel is set up command file; / * system kernel generation self-destruction controller */
Input of control commands and desired parameters in file;
The fill order file; / * operation self-destruction controller */
Kernel stops self process; / * termination kernel kernel program operation */
Self-destruction controller calling system is destroyed program;
The operation * of while (system is not destroyed)/* monitoring destruction program/
If (system's destruction program stops operation)
Start-up system is destroyed program;
System's destruction program withdraws from; / * destroy finish */
/ * deletion destruction program */
Destroy controller deletion system and destroy program Delete;
Destroy controller and delete itself.
}
The step that realizes system's irrecoverable property self-destruction according to this algorithm destructor is:
(1) destroying system database
A, stop all to access of database;
B, disconnection are connected with database;
C, call DeleteDirectory () algorithm, destruction database file.
(2) destroying system kernel
A, system kernel generate the self-destruction controller, and the self-destruction controller is responsible for calling of the program of destroying, and to destroying the monitoring of program execution state;
B, execution self-destruction controller;
C, termination operational system kernel self process;
D, self-destruction controller calling system are destroyed program, destroying system;
Whether e, self-destruction control program check system are destroyed fully, if system's program of destroying withdrawed from when not finishing the destruction task, the self-destruction controller will be restarted system's destruction program;
System's destruction program withdrawed from after f, destruction were finished.
(3) deletion destruction program
Program Delete.exe destroys in a, destruction controller deletion system;
B, the deletion of destruction controller itself.
As shown in Figure 2, destructor is at first finished the destruction of the operated database file of system, the current in fact all operations of at first ending database, and all connections in turn-off data storehouse then are at last by Crashfile () algorithm destruction database.Then, destructor is realized the destruction of system kernel part.As shown in Figure 3, system kernel at first generates the self-destruction controller, and the self-destruction controller has comprised the command set of control system self-destruction.The self-destruction controller is finished the destruction of system kernel part by calling the control of various system commands and executable program on the one hand; When calling system is destroyed program, system's destruction program is monitored on the other hand, if system kernel is not thoroughly destroyed, the self-destruction control program then makes system's destruction program restart operation, until finishing the destruction task.At last, as shown in Figure 4, after system's self-destruction EOP (end of program) operation, the self-destruction controller realizes that program is destroyed by system and himself is destroyed.
The destruction of system is based on the irrecoverable property deletion of file, finds All Files under the target directory by the traversal successively to system's place installation directory, and it is destroyed one by one, and the destruction algorithm of file is as follows:
Algorithm: Crashfile:
Input: file or folder absolute path name
Output: do not have
{
// inspection pathname type
If (being file)
{
Obtain the length of file;
Generate degree of covering t1 (7<t<10) at random;
Length according to file is provided with a Scope constant;
// preliminary the destruction destroyed the integrality of file
Use file size as random seed, generate one section overlay length length;
for(inti=0;i<t1;i++){
if(i%2==0)
Generating length is the random binary string String of length;
else
With String step-by-step negate;
// file pointer is pointed to file header, begin to fill out from file header to some position of file
Fill String
While (file pointer does not arrive end-of-file)
{
To the position of the pointed of the file string String that fills character;
Generate one 0 to the interior random number of Scope scope;
The pointer of file is added this random number;
}
}
// destroy fully, all data of file can not be recovered again
Generate degree of covering t2 (10<t<50) at random;
for(inti=0;i<t2;i++){
Begin to fill the random binary string isometric from the reference position of file with file size;
}
Deleted file;
}
Else/* be catalogue */
{
For (traveling through the subprime directory and the file of this catalogue)
Recursive call file delete function; // transmission parameter is the absolute path of subprime directory and file
Deltree;
}
}
As shown in Figure 5, file destruction program adopts recursive algorithm traversal target directory.Program is at first judged the current path name, if current path is a catalogue, then travels through all the subordinate's pathnames under this catalogue, and is parameter recursive call file delete program with subordinate's pathname; If current directory is a filename, then destroy the destruction that realizes file by preliminary data destruction and complete data successively.At first choose a constant, behind zone of every covering, make the pointer of file add the random number that this constant scope is interior, when tentatively covering to change the position of file pointer, to the quick destruction of the file section of striding according to the length of file; Then, in covering domain, repeatedly fill the random binary character string identical and finish the complete data destruction with file size.
Claims (2)
1, a kind of layered self-destruction method towards distributed system, it is characterized in that: in distributed system in the imparting system certain processor monitor the ability of whole distributed system, as event monitor M, divide certain zone be used for storing event information, as incident thesaurus Sto, give certain processor analyze the ability of event information, as event analysis device A, give certain processor destroy the ability of file, as destructor D; Event monitor M is divided into incident acquisition module C, event-monitoring strategy Str and event processing module T, according to the event-monitoring strategy, carries out
Obtain event information collection U; Contain event handling collection P among the event processing module T, for the event information u of captured in real time, carry out u ∈ U, p ∈ P, u * p → message obtain having the event information message message of certain format; This message is real-time transmitted among the incident thesaurus Sto stores; Event analysis device A is by carrying out extraction and analysis in real time to the message among the Sto, by
Signal singal in getting everywhere; Destructor is after receiving signal, and destruction database Dd, destruction kernel Di, deletion destruction program Dp finish the self-destruction of system successively.
2, a kind of layered self-destruction method towards distributed system according to claim 1 is characterized in that: the described self-destruction of finishing system is the irrecoverable property self-destruction of destructor according to self-destruction algorithm realization system, and its concrete steps are:
(1) destroying system database
A, stop all to access of database;
B, disconnection are connected with database;
C, call DeleteDirectory () algorithm, destruction database file;
(2) destroying system kernel
A, system kernel generate the self-destruction controller, and the self-destruction controller is responsible for calling of the program of destroying, and to destroying the monitoring of program execution state;
B, execution self-destruction controller;
C, termination operational system kernel self process;
D, self-destruction controller calling system are destroyed program, destroying system;
Whether e, self-destruction control program check system are destroyed fully, if system's program of destroying withdrawed from when not finishing the destruction task, the self-destruction controller will be restarted system's destruction program;
System's destruction program withdrawed from after f, destruction were finished;
(3) deletion destruction program
Program Delete.exe destroys in a, destruction controller deletion system;
B, the deletion of destruction controller itself.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910071281 CN101477604B (en) | 2009-01-16 | 2009-01-16 | Layered self-destruction method oriented to distributed system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910071281 CN101477604B (en) | 2009-01-16 | 2009-01-16 | Layered self-destruction method oriented to distributed system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101477604A true CN101477604A (en) | 2009-07-08 |
CN101477604B CN101477604B (en) | 2010-07-07 |
Family
ID=40838315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910071281 Expired - Fee Related CN101477604B (en) | 2009-01-16 | 2009-01-16 | Layered self-destruction method oriented to distributed system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101477604B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460452A (en) * | 2018-03-20 | 2018-08-28 | 广州大学 | A kind of self-desttruction equipment and method of artificial intelligence behavior body |
CN116756785A (en) * | 2023-08-16 | 2023-09-15 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and system of intelligent terminal system |
CN118395439A (en) * | 2024-06-28 | 2024-07-26 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and device for distributed cloud system |
-
2009
- 2009-01-16 CN CN 200910071281 patent/CN101477604B/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460452A (en) * | 2018-03-20 | 2018-08-28 | 广州大学 | A kind of self-desttruction equipment and method of artificial intelligence behavior body |
CN116756785A (en) * | 2023-08-16 | 2023-09-15 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and system of intelligent terminal system |
CN116756785B (en) * | 2023-08-16 | 2023-11-10 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and system of intelligent terminal system |
CN118395439A (en) * | 2024-06-28 | 2024-07-26 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and device for distributed cloud system |
CN118395439B (en) * | 2024-06-28 | 2024-10-01 | 中国兵器装备集团兵器装备研究所 | Self-destruction method and device for distributed cloud system |
Also Published As
Publication number | Publication date |
---|---|
CN101477604B (en) | 2010-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Raghavan | Digital forensic research: current state of the art | |
Reedy | Interpol review of digital evidence 2016-2019 | |
Mohay | Computer and intrusion forensics | |
Ghazinour et al. | A study on digital forensic tools | |
Damshenas et al. | A survey on digital forensics trends | |
CN107004086A (en) | Security information and incident management | |
CN106874778A (en) | Intelligent terminal file acquisition and data recovery system and method based on android system | |
Khan et al. | Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction | |
Actoriano et al. | Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2 | |
CN101477604B (en) | Layered self-destruction method oriented to distributed system | |
Lee et al. | A proposal for automating investigations in live forensics | |
Iqbal et al. | Forensic investigation of small-scale digital devices: a futuristic view | |
Lee et al. | Discovering methodology and scenario to detect covert database system | |
CN113688357A (en) | Method, device, system, equipment and storage medium for protecting network picture copyright | |
Lee et al. | Windows pagefile collection and analysis for a live forensics context | |
CN109753813A (en) | A kind of secure file processing method | |
Mazumder et al. | PATIENT CARE AND FINANCIAL INTEGRITY IN HEALTHCARE BILLING THROUGH ADVANCED FRAUD DETECTION SYSTEMS | |
Bhraguram et al. | Effectiveness of digital forensic investigation through excavation methods of various Linux based tools | |
Rani et al. | Examining Digital Forensics Models and Exploring for Design of Digital Forensic Framework for IoT Enabled Smart Environment | |
CN114357249B (en) | Data processing method and device, storage medium and electronic equipment | |
US11989266B2 (en) | Method for authenticating digital content items with blockchain and writing digital content items data to blockchain | |
Kumari | An overview on advanced multimedia forensic techniques and future direction | |
Svenblad | An Analysis of Using Blockchains for Processing and Storing Digital Evidence | |
Zeng et al. | Intramural Network Intrusion Detection by Monitoring User Behavior | |
Pillai et al. | Digital Forensics Cryptography with Smart Intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100707 Termination date: 20170116 |