CN108287779B - Windows startup item monitoring method and system - Google Patents

Windows startup item monitoring method and system Download PDF

Info

Publication number
CN108287779B
CN108287779B CN201810068132.6A CN201810068132A CN108287779B CN 108287779 B CN108287779 B CN 108287779B CN 201810068132 A CN201810068132 A CN 201810068132A CN 108287779 B CN108287779 B CN 108287779B
Authority
CN
China
Prior art keywords
monitoring
kernel
item
windows
registry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810068132.6A
Other languages
Chinese (zh)
Other versions
CN108287779A (en
Inventor
吴振刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810068132.6A priority Critical patent/CN108287779B/en
Publication of CN108287779A publication Critical patent/CN108287779A/en
Application granted granted Critical
Publication of CN108287779B publication Critical patent/CN108287779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a Windows startup item monitoring method and a system, which pull up a resident process X in a Windows service form and protect the process X from being terminated; under different monitoring strategies, process X monitors the registry directory of startup entries in real time. The service pull-up process is not dependent on user login any more, and abnormal change of the starting item can be still protected under the condition that the user does not log in. The starting items of all users can be managed, and the starting item operation of all users is achieved. The three monitoring modes are more humanized, different application scenes can be met, for example, the normal operation stage of the calculator can be kept, and the normal mode can be kept; the computer can be installed and maintained in a monitoring mode in a maintenance stage; the computer permits disks and temporarily checks problems, and can keep a stop mode.

Description

Windows startup item monitoring method and system
Technical Field
The invention relates to the technical field of startup item monitoring, in particular to a method and a system for monitoring a Windows startup item.
Background
When the operating system is started, many programs are automatically loaded, namely, so-called starting items. The self-starting of many programs brings great convenience to us, which is a fact that it is not contended, but not every self-starting program is useful to us; further, there may be viruses or trojans in the self-priming row. For this reason, monitoring the startup item, and specifying the authority for the operation of the startup item is an important function of the security software. Currently, the security methods that can be used to perform operations on the boot item include:
MSConfig tool, task manager, a start item maintenance tool provided by Microsoft, which can support user to inquire, start and pause the information of specified start items. The interception of the startup items cannot be realized, and the operation of all the startup items is released, which is just a monitoring tool.
The current general safety software, such as 360, safety dog, supports the inquiry, start and pause of the starting item and appoints the information of the starting item. The interception of the startup items can be realized, but the interception strategy is single, and the interception cannot be directed at various application scenes. When the system works in a user mode, the system cannot operate for all users.
Disclosure of Invention
The embodiment of the invention provides a method and a system for monitoring Windows startup items, which aim to solve the problem that the interception of the startup items cannot be realized or the interception strategy of the startup items is single in the prior art.
In order to solve the technical problem, the embodiment of the invention discloses the following technical scheme:
the invention provides a Windows startup item monitoring method in a first aspect, which comprises the following steps:
in the form of Windows service, a resident process X is pulled up and protected from being terminated;
under different monitoring strategies, process X monitors the registry directory of startup entries in real time.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the method for protecting the process X from being terminated specifically includes: the Windows kernel uses SSDT HOOK technology to protect the daemon, and ensures that the process is not terminated; if the process terminates abnormally, it can be pulled up again by the Windows service.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the monitoring policy includes a normal mode, a monitoring mode, and a stop mode.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the method for monitoring, by the process X, the registry directory of the startup item in real time includes:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel stops the relevant operations and records the violation log.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, in the monitoring mode, the method for monitoring, by the process X, the registry directory of the startup item in real time includes:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel preferentially stops the relevant operations.
With reference to the first aspect, in a fifth possible implementation manner of the first aspect, the preferentially preventing, by the kernel, the relevant operations is specifically:
if no user logs in, the kernel keeps preventing operation; after the user logs in, the kernel gives a blocking record, and the user can select whether to recover or not;
and if the user logs in, the kernel prompts the user whether to pass or not, gives the degree of harm of the passing, and after the user selects the passing, the kernel passes the related operation.
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, in the stop mode, the method for monitoring, by the process X, the registry directory of the start item in real time includes:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel releases the relevant operations and does not record the violation log.
The second aspect of the invention provides a Windows startup item monitoring system, which comprises a monitoring module, a display module and a display module, wherein the monitoring module is used for monitoring all startup item information; and the combination of (a) and (b),
the management module is used for managing the monitoring strategy and modifying the monitoring strategy of the starting item; and the combination of (a) and (b),
the public query module is used for viewing the public startup items of the system and the startup item information of all users; and the combination of (a) and (b),
and the database is used for storing the log of the monitoring starting item.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the management module needs to log in the system and verify the system with a password for managing the monitoring policy.
The Windows startup item monitoring system of the second aspect of the present invention can implement the methods of the first aspect and the implementation manners of the first aspect, and achieve the same effect.
According to the technical scheme, the resident process X is pulled up in the form of Windows service. The kernel conserves the process to ensure that the process is not terminated. The process terminates abnormally and may be pulled up again by the service. The process of service pull-up is not dependent on user login any more, and the abnormal change of the starting item can still be protected under the condition that the user does not log in. The starting items of all users can be managed, and the starting item operation of all users is achieved.
The three monitoring modes are more humanized, different application scenes can be met, for example, the normal operation stage of the calculator can be kept, and the normal mode can be kept; the computer can be installed and maintained in a monitoring mode in a maintenance stage; the computer permits disks and temporarily checks problems, and can keep a stop mode.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a Windows booting item monitoring method;
fig. 2 is a schematic structural diagram of a Windows boot entry monitoring system applied in the embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a Windows boot item monitoring method includes the following steps:
s1, in the form of Windows service, pulling up a resident process X and protecting the process X from being terminated;
s2, under different monitoring strategies, the process X monitors the registry directory of the startup items in real time.
The method for protecting the process X from being terminated specifically includes: the Windows kernel uses SSDT HOOK technology to protect the daemon, and ensures that the process is not terminated; if the process terminates abnormally, it can be pulled up again by the Windows service.
The monitoring strategy comprises a normal mode, a monitoring mode and a stop mode.
In the normal mode, the method for monitoring the registry directory of the starting item in real time by the process X comprises the following steps:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel stops the relevant operations and records the violation log.
In the monitoring mode, the method for monitoring the registry directory of the starting item in real time by the process X comprises the following steps:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel preferentially stops the relevant operations.
The kernel-first-blocking related operations are specifically:
if no user logs in, the kernel keeps preventing operation; after the user logs in, the kernel gives a blocking record, and the user can select whether to recover or not;
and if the user logs in, the kernel prompts the user whether to pass or not, gives the degree of harm of the passing, and after the user selects the passing, the kernel passes the related operation.
In the stop mode, the method for monitoring the registry directory of the start item in real time by the process X comprises the following steps:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel releases the relevant operations and does not record the violation log.
As shown in fig. 2, a Windows startup item monitoring system includes a monitoring module for monitoring all startup item information; the management module is used for managing the monitoring strategy and modifying the monitoring strategy of the starting item; the public query module is used for viewing the public startup items of the system and the startup item information of all users; and the database is used for storing the log of the monitoring starting item.
The management module manages the monitoring strategy and needs a password to log in the system and pass the verification.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. A Windows startup item monitoring method is characterized by comprising the following steps:
in the form of Windows service, a resident process X is pulled up and protected from being terminated;
under three monitoring strategies of a normal mode, a monitoring mode and a stopping mode, a process X monitors a registry directory of starting items in real time;
in the normal mode, the method for monitoring the registry directory of the startup item in real time by the process X includes:
when the system monitors that the newly adding, modifying and deleting operations exist in the relevant registry, the kernel stops the relevant operations and records the violation log;
in the monitoring mode, the method for monitoring the registry directory of the starting item in real time by the process X comprises the following steps:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel preferentially stops the relevant operations;
in the stop mode, the method for monitoring the registry directory of the start item in real time by the process X comprises the following steps:
when the system monitors that the operations of adding, modifying and deleting are carried out under the relevant registry, the kernel releases the relevant operations and does not record the violation log.
2. The method of claim 1, wherein the method of protecting process X from termination comprises: the Windows kernel uses SSDT HOOK technology to protect the daemon, and ensures that the process is not terminated; if the process terminates abnormally, it can be pulled up again by the Windows service.
3. The method according to claim 1, wherein in the monitoring mode, the kernel-first blocking of the associated operation is specifically:
if no user logs in, the kernel keeps preventing operation; after the user logs in, the kernel gives a blocking record, and the user can select whether to recover or not;
and if the user logs in, the kernel prompts the user whether to pass or not, gives the degree of harm of the passing, and after the user selects the passing, the kernel passes the related operation.
4. A Windows startup item monitoring system using the method of any one of claims 1 to 3, comprising a monitoring module for monitoring all startup item information; and the combination of (a) and (b),
the management module is used for managing the monitoring strategy and modifying the monitoring strategy of the starting item; and the combination of (a) and (b),
the public query module is used for viewing the public startup items of the system and the startup item information of all users; and the combination of (a) and (b),
and the database is used for storing the log of the monitoring starting item.
5. The system of claim 4, wherein the administration module is configured to administer the monitoring policy by requiring a password to log into the system and be authenticated.
CN201810068132.6A 2018-01-24 2018-01-24 Windows startup item monitoring method and system Active CN108287779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810068132.6A CN108287779B (en) 2018-01-24 2018-01-24 Windows startup item monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810068132.6A CN108287779B (en) 2018-01-24 2018-01-24 Windows startup item monitoring method and system

Publications (2)

Publication Number Publication Date
CN108287779A CN108287779A (en) 2018-07-17
CN108287779B true CN108287779B (en) 2021-07-27

Family

ID=62835682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810068132.6A Active CN108287779B (en) 2018-01-24 2018-01-24 Windows startup item monitoring method and system

Country Status (1)

Country Link
CN (1) CN108287779B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109032895A (en) * 2018-07-26 2018-12-18 郑州云海信息技术有限公司 A kind of detection method, device, equipment and storage medium monitoring fuse process
CN109491715B (en) * 2018-11-06 2021-10-22 深圳市风云实业有限公司 Application management method, device and terminal based on Windows NT
CN110119622A (en) * 2019-05-15 2019-08-13 苏州浪潮智能科技有限公司 A kind of registration table Integrity Management method, system and equipment
CN110688274B (en) * 2019-08-30 2022-04-12 平安科技(深圳)有限公司 Active directory monitoring method based on Windows Server operating system and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314577A (en) * 2011-09-23 2012-01-11 深圳市万兴软件有限公司 Method for real-time monitoring and protecting boot-starting items of registry
CN102542182A (en) * 2010-12-15 2012-07-04 苏州凌霄科技有限公司 Device and method for controlling mandatory access based on Windows platform
US9239922B1 (en) * 2013-03-11 2016-01-19 Trend Micro Inc. Document exploit detection using baseline comparison
CN105354498A (en) * 2015-10-30 2016-02-24 珠海市君天电子科技有限公司 Operation method of registry, related device and equipment
CN106980564A (en) * 2017-03-16 2017-07-25 北京科皓世纪科技有限公司 Process behavior monitoring method based on kernel hook

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7593936B2 (en) * 2003-08-11 2009-09-22 Triumfant, Inc. Systems and methods for automated computer support
KR100678974B1 (en) * 2004-06-25 2007-02-07 삼성전자주식회사 Apparatus and method for security and user comfortability in rebooting computer system
CN104503807B (en) * 2014-12-31 2018-05-25 北京奇虎科技有限公司 The management method and device of startup item
CN107463839A (en) * 2017-08-16 2017-12-12 郑州云海信息技术有限公司 A kind of system and method for managing application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542182A (en) * 2010-12-15 2012-07-04 苏州凌霄科技有限公司 Device and method for controlling mandatory access based on Windows platform
CN102314577A (en) * 2011-09-23 2012-01-11 深圳市万兴软件有限公司 Method for real-time monitoring and protecting boot-starting items of registry
US9239922B1 (en) * 2013-03-11 2016-01-19 Trend Micro Inc. Document exploit detection using baseline comparison
CN105354498A (en) * 2015-10-30 2016-02-24 珠海市君天电子科技有限公司 Operation method of registry, related device and equipment
CN106980564A (en) * 2017-03-16 2017-07-25 北京科皓世纪科技有限公司 Process behavior monitoring method based on kernel hook

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
恶意脚本程序研究以及基于API HOOK的注册表监控技术;李珂泂 等;《计算机应用》;20091201;第29卷(第12期);3197-3200 *

Also Published As

Publication number Publication date
CN108287779A (en) 2018-07-17

Similar Documents

Publication Publication Date Title
CN108287779B (en) Windows startup item monitoring method and system
US9798879B2 (en) Apparatus, system, and method for protecting against keylogging malware
US8316445B2 (en) System and method for protecting against malware utilizing key loggers
US8650578B1 (en) System and method for intercepting process creation events
EP2681689B1 (en) Protecting operating system configuration values
US7975302B2 (en) System for real-time detection of computer system files intrusion
US9015829B2 (en) Preventing and responding to disabling of malware protection software
CN100504899C (en) Software watchdog system and method
US9129114B2 (en) Preboot environment with system security check
US11468181B2 (en) Secure access to accessory device resources
CN103530559A (en) Integrity protection system of Android system
KR101308703B1 (en) Security system for electronic commerce and method thereof
WO2021227524A1 (en) Network edge storage apparatus having security feature
US20070005668A1 (en) System for security management of a server
US20130145459A1 (en) Information Processing Device, Control Method and Program
CN109583206B (en) Method, device, equipment and storage medium for monitoring access process of application program
CN113127823B (en) Method, system and medium for managing local serial port login and authority
CN114861160A (en) Method, device, equipment and storage medium for improving non-administrator account authority
US20230418933A1 (en) Systems and methods for folder and file sequestration
US20240272996A1 (en) Computer-implemented system and method for recovering data in case of a computer network failure
JP2012078979A (en) Uninstallation execution propriety control method of information leakage prevention program and information leakage prevention system
CN114117417A (en) Program protection method and system
CN117235818A (en) Encryption authentication method and device based on solid state disk, computer equipment and medium
CN117240449A (en) Cloud host starting method and device based on cloud host password protection
CN114880655A (en) High-performance computation-oriented content-based safety protection method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant