Disclosure of Invention
In view of the above, the present invention provides a behavior-based service identification method, apparatus, device and readable storage medium, and mainly aims to solve the problems that an attacker can easily perform malicious operation on an operating system by using a service behavior, and further, the operating system is seriously damaged, and the security of the operating system is poor.
According to a first aspect of the present invention, there is provided a behavior-based service identification method, the method comprising:
when receiving a service behavior to be executed, determining an authority set and a flow set of a target behavior main body requesting to execute the service behavior to be executed, wherein the authority set comprises at least one service behavior allowed to be executed by the target behavior main body, and the flow set comprises a flow of the target behavior main body executing the service behavior;
if at least one service behavior of the permission set does not comprise the service behavior to be executed, determining a behavior flow of the service behavior to be executed;
and if the behavior flow of the service behavior to be executed is consistent with the flow shown by the flow set, allowing the service behavior to be executed.
In another embodiment, when receiving a service behavior to be executed, determining that a set of permissions and a set of flows of a target behavior body requesting execution of the service behavior to be executed are before, includes:
starting the target behavior main body, monitoring the service behavior of the target behavior main body, and acquiring the at least one service behavior;
generating the permission set comprising the at least one service behavior, extracting a subject identification of the target behavior subject, and correspondingly storing the subject identification and the permission set;
monitoring the process of executing the service behaviors by the target behavior main body, and collecting the running state and running environment of the target behavior main body;
and sorting the running state and the running environment according to a time sequence to generate a flow of the target behavior main body, taking the flow as the flow set, and correspondingly storing the flow set and the main body identification.
In another embodiment, the starting the target behavior entity, monitoring the service behavior of the target behavior entity, and acquiring the at least one service behavior includes:
receiving a starting instruction, and determining the target behavior subject according to a subject mark to be started carried by the starting instruction;
starting the target behavior main body and starting a behavior acquisition program, wherein the behavior acquisition program is at least a Hook program;
and monitoring the service behavior of the target behavior main body after starting based on the behavior acquisition program, and acquiring the at least one service behavior of the target behavior main body.
In another embodiment, the determining, when the service behavior to be executed is received, a set of permissions and a set of flows of a target behavior body requesting execution of the service behavior to be executed includes:
when the service behavior to be executed is received, taking a behavior main body requesting to execute the service behavior to be executed as the target behavior main body;
and acquiring a main body identifier of the target behavior main body, and determining an authority set and a flow set indicated by the main body identifier.
In another embodiment, the determining, when the service behavior to be executed is received, after the determining the authority set and the flow set of the target behavior body requesting to execute the service behavior to be executed includes:
and if at least one service behavior of the permission set comprises the service behavior to be executed, allowing the service behavior to be executed.
In another embodiment, the method further comprises:
and if the behavior flow of the service behavior to be executed is not consistent with the flow shown by the flow set, prohibiting the service behavior to be executed from being executed.
According to a second aspect of the present invention, there is provided a behavior-based service identification apparatus, the apparatus comprising:
the system comprises a first determination module, a second determination module and a third determination module, wherein the first determination module is used for determining an authority set and a flow set of a target behavior main body requesting to execute a service behavior to be executed when the service behavior to be executed is received, the authority set comprises at least one service behavior allowing the target behavior main body to execute, and the flow set comprises a flow of the target behavior main body executing the service behavior;
a second determining module, configured to determine a behavior flow of the service behavior to be executed if at least one service behavior of the permission set does not include the service behavior to be executed;
and the execution module is used for allowing the service behavior to be executed if the behavior flow of the service behavior to be executed is consistent with the flow shown by the flow set.
In another embodiment, the apparatus further comprises:
the monitoring module is used for starting the target behavior main body, monitoring the service behaviors of the target behavior main body and acquiring the at least one service behavior;
the generation module is used for generating the permission set comprising the at least one service behavior, extracting a main body identifier of the target behavior main body, and correspondingly storing the main body identifier and the permission set;
the acquisition module is used for monitoring the process of executing the service behaviors by the target behavior main body and acquiring the running state and running environment of the target behavior main body;
and the storage module is used for sorting the running state and the running environment according to a time sequence to generate a flow of the target behavior main body, taking the flow as the flow set, and correspondingly storing the flow set and the main body identification.
In another embodiment, the monitoring module includes:
the monitoring module comprises:
the determining submodule is used for receiving a starting instruction and determining the target behavior main body according to a main body mark to be started carried by the starting instruction;
the starting submodule is used for starting the target behavior main body and starting a behavior acquisition program, and the behavior acquisition program is at least a Hook program;
and the monitoring submodule is used for monitoring the service behavior of the target behavior main body after the target behavior main body is started based on the behavior acquisition program and acquiring the at least one service behavior of the target behavior main body.
In another embodiment, the determining module includes:
the first determining module includes:
the first determining submodule is used for taking a behavior main body requesting to execute the service behavior to be executed as the target behavior main body when the service behavior to be executed is received;
and the second determining submodule is used for acquiring a main body identifier of the target behavior main body and determining the authority set and the flow set indicated by the main body identifier.
In another embodiment, the executing module is further configured to allow the service action to be executed if the service action to be executed is included in the at least one service action of the permission set.
In another embodiment, the apparatus further comprises:
and the forbidding module is used for forbidding to execute the service behavior to be executed if the behavior flow of the service behavior to be executed is inconsistent with the flow shown by the flow set.
According to a third aspect of the present invention, there is provided an apparatus comprising a memory storing a computer program and a processor implementing the steps of the method of the first aspect when the processor executes the computer program.
According to a fourth aspect of the present invention, there is provided a readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of the first aspect described above.
By the technical scheme, the invention provides a service identification method, a device, equipment and a readable storage medium based on behaviors, compared with the current mode of identifying the service behaviors by adopting the white feature library, the invention can realize that when the service behaviors to be executed are received, determining a set of permissions and a set of flows of a target behavior principal requesting execution of a service behavior to be executed, if at least one service behavior of the permission set does not comprise the service behavior to be executed, determining the behavior flow of the service behavior to be executed, and if the action flow of the service action to be executed is consistent with the flow shown by the flow set, the service action to be executed is allowed to be executed, therefore, the service behavior which is the main body is restricted by the permission set and the flow set, so that the malicious behavior of the attacker is easily identified, the severe damage to the operating system caused by the malicious operation of the attacker is avoided, and the safety of the operating system is better.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The embodiment of the invention provides a behavior-based service identification method, which can determine an authority set and a flow set of a target behavior main body requesting to execute a service behavior to be executed when receiving the service behavior to be executed, determine a behavior flow of the service behavior to be executed if at least one service behavior of the authority set does not include the service behavior to be executed, and allow the service behavior to be executed if the behavior flow of the service behavior to be executed is consistent with a flow shown by the flow set, so that the service behavior taking the authority set and the flow set as the main body is limited, malicious behaviors of an attacker are easily identified, and the aims of avoiding the malicious operations of the attacker from causing serious damage to an operating system and ensuring better safety of the operating system are fulfilled, as shown in fig. 1, and the method comprises the following steps:
101. when the service behaviors to be executed are received, a permission set and a flow set of a target behavior main body requesting to execute the service behaviors to be executed are determined, the permission set comprises at least one service behavior allowing the target behavior main body to execute, and the flow set comprises flows of the target behavior main body executing the service behaviors.
In the embodiment of the present invention, when receiving a service behavior to be executed, since each service behavior is requested to be executed by a behavior principal, a behavior principal that issues the service behavior to be executed may be determined, and the behavior principal may be used as a target behavior principal. And the operating system sets a corresponding authority set and flow set for each behavior main body, wherein the authority set and the flow set comprise at least one service behavior which is allowed to be executed by the behavior main body, so that after the target behavior main body is determined, the authority set and the flow set corresponding to the target behavior main body can be acquired, the service behavior to be executed of the target behavior main body is identified based on the authority set and the flow set in the follow-up process, and whether the target behavior main body can execute the service behavior to be executed is determined.
102. And if at least one service behavior of the permission set does not comprise the service behavior to be executed, determining a behavior flow of the service behavior to be executed.
In the embodiment of the present invention, after the authority set of the target behavior body is determined, since the authority set includes at least one service behavior that is allowed to be executed, at least one service behavior may be compared with the service to be executed, and whether the service behavior to be executed can be executed is determined by querying whether the authority set includes the service behavior to be executed.
103. And if the action flow of the service action to be executed is consistent with the flow shown by the flow set, allowing the service action to be executed.
In the embodiment of the present invention, if the to-be-executed service behavior is not included in the permission set, it indicates that the to-be-executed service behavior is not within the range specified by the permission set. In order to avoid interception of normal service behaviors caused by the fact that the related range of the authority set is not wide enough, when the service behavior to be executed is determined not to belong to the authority set, the behavior flow of the service behavior to be executed is obtained, when the behavior flow of the service behavior to be executed is consistent with the flow shown by the flow set, the service behavior to be executed is determined to be the normal behavior of the target behavior main body, and the service behavior to be executed is allowed to be executed.
According to the method provided by the embodiment of the invention, when the service behaviors to be executed are received, the authority set and the flow set of the target behavior main body which requests to execute the service behaviors to be executed are determined, if at least one service behavior of the authority set does not include the service behaviors to be executed, the behavior flow of the service behaviors to be executed is determined, and if the behavior flow of the service behaviors to be executed is consistent with the flow shown by the flow set, the service behaviors to be executed are allowed to be executed, so that the service behaviors which are the main body are limited through the authority set and the flow set, the malicious behaviors of an attacker are easy to identify, the malicious operations of the attacker are prevented from causing great damage to an operating system, and the safety of the operating system is better.
The embodiment of the invention provides a behavior-based service identification method, which can determine an authority set and a flow set of a target behavior main body requesting to execute a service behavior to be executed when receiving the service behavior to be executed, determine a behavior flow of the service behavior to be executed if at least one service behavior of the authority set does not include the service behavior to be executed, and allow the service behavior to be executed if the behavior flow of the service behavior to be executed is consistent with a flow shown by the flow set, so that the service behavior taking the authority set and the flow set as the main body is limited, malicious behaviors of an attacker are easily identified, and the aims of avoiding the malicious operations of the attacker from causing serious damage to an operating system and ensuring better safety of the operating system are fulfilled, as shown in fig. 2A, and the method comprises the following steps:
201. and receiving a starting instruction, and determining a target behavior main body according to a main body mark to be started carried by the starting instruction.
The inventor realizes that the behavior action executed by a behavior body after being started is usually fixed, that is, the behavior action relied on by the behavior body when providing service for a user is fixed, and a behavior body does not request to execute the behavior action which is never executed before in normal operation, so that in order to limit the behavior action of the behavior body, avoid the behavior body from executing the behavior action which is not executed, and realize the identification of malicious behavior of an attacker, the embodiment of the invention sets a permission set and a flow set for each behavior body, and defines the behavior action executable by the behavior body based on the permission set and the flow set, thereby restricting the operation of the behavior body. It should be noted that, because there are many behavior bodies in the system, it is impossible to set an authority set and a flow set for all behavior bodies at the same time, in the embodiment of the present invention, a "minimum authority set" common to all behavior bodies may also be set, and the behavior body without the authority set and the flow set is identified based on the "minimum authority set".
Since the authority set and the flow set are generated according to the behavior operation executed by the behavior agent in the actual running process, the behavior operation executed by the behavior agent in the actual running process needs to be collected. Considering that there are too many behavior bodies to be existed in the operating system, in order to specify which behavior body generates the behavior library, the program start instruction needs to carry the identification of the behavior body to be started. Thus, when a program starting instruction is received, firstly, the main body identifier to be started is extracted from the program starting instruction; and then, searching the behavior body indicated by the body identifier to be started in the operating system, and taking the behavior body as a target behavior body so as to generate an authority set and a flow set for the target behavior body subsequently. It should be noted that, in order to set a corresponding authority set and a flow set for each behavior body in the operating system, as long as there is no behavior body with the corresponding authority set and flow set, the behavior body may be a target behavior body. Specifically, the to-be-started subject identifier may be a program name or a program number of the target program, and the content of the to-be-started subject identifier is not specifically limited in the embodiment of the present invention.
202. Starting a target behavior body and starting a behavior acquisition program, wherein the behavior acquisition program is at least a Hook program, and monitoring the service behavior of the target behavior body after starting based on the behavior acquisition program.
In the embodiment of the invention, after the target behavior body is determined, the target behavior body can be started so as to obtain at least one service behavior of the target behavior body, and further, an authority set is generated for the target program based on the at least one service behavior. In order to collect the service behavior of the target behavior body, the collection may be based on a collection behavior program. In this way, when the target behavior body is started, the behavior collection program is also started, so that the behavior collection program monitors and collects all service behaviors after the target behavior body is started, and the behavior collection program can be a Hook program.
In the actual application process, in order to make the collected service behaviors meaningful and not to make the quantity too large to cause the overload of the operating system, a collection period may be set, only the service behaviors executed by the target behavior main body in the collection period are collected, and an authority set is subsequently generated for the target behavior main body according to the service behaviors collected in the collection period. For example, the collection period may be 7 days, so that the service behavior of the target service period within 7 days may be collected.
203. And generating an authority set comprising at least one service behavior, extracting a main body identifier of a target behavior main body, and correspondingly storing the main body identifier and the authority set.
In the embodiment of the invention, after at least one service behavior of the target behavior main body is collected, the at least one service behavior can be stored, so that the permission set is generated. When the authority set is generated, in order to ensure that the format of the authority set of each behavior main body is consistent, the authority set is convenient to manage, a preset template can be set, and at least one service behavior is arranged according to the preset template, so that the authority set which comprises at least one service behavior and meets the requirement of the preset template in format is generated.
In the permission set in which the target behavior body is generated, each behavior body in the operating system has a corresponding permission set, so that a large number of permission sets exist. In order to manage the authority set and avoid confusion of the corresponding relation between the behavior main body and the authority set, so that errors occur in subsequent identification of service behaviors, after the authority set is generated, the main body identification of the target behavior main body can be extracted and stored correspondingly with the authority set, so that the corresponding relation between each behavior main body and the corresponding authority set is clear. In the process of practical application, after the authority set is generated, the authority set can be marked by adopting the subject identifier, so that the target behavior subject corresponds to the authority set.
204. Monitoring the process of executing the service behaviors by the target behavior main body, collecting the running state and the running environment of the target behavior main body, sorting the running state and the running environment according to the time sequence to generate the flow of the target behavior main body, taking the flow as a flow set, and correspondingly storing the flow set and the main body identification.
In the embodiment of the present invention, when a behavior entity executes a service behavior in a system, the execution of a legal service behavior corresponds to a legal flow, and the execution of an illegal service behavior also corresponds to an obviously different illegal flow, so that a flow set corresponding to the target behavior entity can be generated for the target behavior entity, so as to identify the flow of the target behavior entity executing the service behavior based on the flow set, thereby determining whether the flow executed by the target behavior entity is legal. For example, the spools · exe is a service process of Print spooller for managing all local and network Print queues and controlling all Print jobs, and there is no reason why the spools · exe starts Shell programs, and even the spools · exe should not have the capability of starting any program, so as long as the start program is involved in the flow of the spools · exe, the flow is illegal.
When a flow set is set for a target behavior main body, firstly, the process of executing a service behavior by the target behavior main body can be monitored, and the running state and the running environment of the target behavior main body are collected; and then, sorting the running state and the running environment according to the time sequence to generate a flow of the target behavior main body, taking the flow as a flow set, and correspondingly storing the flow set and the main body identification.
By executing the processes in step 201 to step 204, a set of rights and a set of processes related to the service behavior actually executed by the target behavior principal can be generated. It should be noted that, because the operating system is updated, the service behaviors that can be executed by each behavior principal in the updated operating system may change, for example, the behavior principal may add some new executable service behaviors, so as to ensure that the authority set and the flow set of the behavior principal can meet the requirements of the behavior principal at the present stage, an update cycle may be set in the operating system, and the processes in the above step 201 to step 203 are repeatedly executed every update cycle, the authority set and the flow set are newly generated for each behavior principal, and the newly generated authority set and the flow set are used to replace the previous authority set and flow set, thereby ensuring the normal operation of the behavior principal.
After the authority set and the flow set of the target behavior body are generated, and when a request for execution of the target behavior body is subsequently received, the behavior action of the target behavior body can be identified based on the authority set and the flow set, so as to determine whether the behavior action of the target behavior body is allowed to be executed, referring to fig. 2B, the method includes:
205. when the service behavior to be executed is received, the authority set and the flow set of the target behavior main body requesting to execute the service behavior to be executed are determined.
In the embodiment of the present invention, when receiving a service behavior to be executed, since the service behavior to be executed is usually requested to be executed by a behavior principal, an object requesting to execute the service behavior to be executed is determined, and the object is taken as a target behavior principal, that is, the behavior principal requesting to execute the service behavior to be executed is taken as a target behavior principal. When the operating system stores the authority sets and the process sets, the authority sets and the process sets are stored according to the main body identifications, each main body identification corresponds to one authority set and one process set, and inquiry of the authority sets and the process sets can be achieved based on the main body identifications.
It should be noted that, if obtaining the authority set and the flow set of the target behavior main body of the service behavior to be executed fails, it indicates that the authority set and the flow set may not be set for the target behavior main body at this time, and at this time, the "minimum authority set" may be obtained, and the service behavior to be executed is identified based on the "minimum authority set" in the following.
206. Comparing the service behaviors to be executed with the authority set, inquiring whether the authority set comprises the service behaviors to be executed, and if the authority set does not comprise the service behaviors to be executed, executing the following step 207; if the rights set includes the service action to be performed, step 208 described below is performed.
In the embodiment of the present invention, after the authority set of the target behavior body is determined, since the authority set of the target behavior body specifies the service behaviors that the target behavior body can execute, and the service behaviors that exceed the authority set, that is, the service behaviors that are not included in the authority set are not allowed to be executed by the target behavior body, the service behaviors to be executed are compared with at least one service behavior in the authority set, so as to determine whether the service behaviors to be executed are allowed to be executed. Specifically, when the service behavior to be executed is compared with at least one service behavior and whether the authority set comprises the service behavior to be executed is inquired, firstly, a behavior identifier to be executed of the service behavior to be executed is extracted, and at least one service behavior identifier of the at least one service behavior is extracted; and then, comparing the to-be-executed behavior identifier with the at least one service behavior identifier, and inquiring whether the service behavior identifier consistent with the to-be-executed behavior identifier exists in the at least one service behavior identifier, so that the to-be-executed service behavior is identified.
If the right set does not include the service behavior to be executed, it indicates that the service behavior to be executed is not allowed to be executed, and at this time, a further determination needs to be performed based on the flow set, so as to avoid a false determination caused by the fact that the right set does not include the service behavior, and therefore, the following steps 207 to 209 are performed; if the authority set includes the service behavior to be executed, it indicates that the service behavior to be executed is the service behavior that can be executed by the target behavior body, and the service behavior to be executed is allowed to be executed by the target behavior body, does not belong to the unauthorized operation, and meets the requirement of the authority set on the target behavior body, that is, the following step 210 is executed.
207. If the authority set does not include the service behavior to be executed, determining the behavior flow of the service behavior to be executed, and if the behavior flow of the service behavior to be executed is consistent with the flow shown in the flow set, executing the following step 208; if the flow of the action of the service action to be performed does not coincide with the flow shown in the flow set, the following step 209 is performed.
208. And if the action flow of the service action to be executed is consistent with the flow shown by the flow set, allowing the service action to be executed.
In the embodiment of the present invention, if the behavior flow of the service behavior to be executed is consistent with the flow shown in the flow set, it indicates that the behavior flow of the service behavior to be executed satisfies the limitation of the flow set, and the target behavior entity requests that the service behavior to be executed is executed without being an unauthorized behavior, and allows the target behavior entity to execute the service behavior to be executed, so that the target behavior entity is allowed to execute the service behavior to be executed.
209. And if the behavior flow of the service behavior to be executed is inconsistent with the flow shown by the flow set, prohibiting the execution of the service behavior to be executed.
In the embodiment of the present invention, if the behavior flow of the service behavior to be executed is not consistent with the flow shown in the flow set, it indicates that the behavior flow of the service behavior to be executed does not satisfy the limitation of the flow set, and the target behavior entity requests that the service behavior to be executed belongs to an override behavior, and does not allow the target behavior entity to execute the service behavior to be executed, so that the target behavior entity is prohibited from executing the service behavior to be executed.
210. And if the service behaviors to be executed are included in the permission set, allowing the target behavior body to execute the service behaviors to be executed.
In the embodiment of the present invention, if the to-be-executed service behavior is included in the permission set, it indicates that the to-be-executed service behavior is within the range specified by the permission set, and the target behavior entity requests that the to-be-executed service behavior is executed, but the target behavior entity does not belong to an unauthorized behavior, and is allowed to execute the to-be-executed service behavior, so the target behavior entity is allowed to execute the to-be-executed service behavior.
According to the method provided by the embodiment of the invention, when the service behaviors to be executed are received, the authority set and the flow set of the target behavior main body requesting to execute the service behaviors to be executed are determined, if at least one service behavior of the authority set does not include the service behaviors to be executed, the behavior flow of the service behaviors to be executed is determined, and if the behavior flow of the service behaviors to be executed is consistent with the flow shown by the flow set, the service behaviors to be executed are allowed to be executed, so that the service behaviors which are the main body are limited by the authority set and the flow set, the malicious behaviors of an attacker are easy to identify, the malicious operations of the attacker are prevented from causing great damage to an operating system, and the safety of the operating system is better.
Further, as a specific implementation of the method shown in fig. 1, an embodiment of the present invention provides a device for identifying a service based on a behavior, where as shown in fig. 3A, the device includes: a first determining module 301, a second determining module 302 and an executing module 303.
The first determining module 301 is configured to determine, when receiving a service behavior to be executed, a permission set and a flow set of a target behavior main body that requests execution of the service behavior to be executed, where the permission set includes at least one service behavior that the target behavior main body is allowed to execute, and the flow set includes a flow in which the target behavior main body executes the service behavior;
the second determining module 302 is configured to determine a behavior flow of the service behavior to be executed if at least one service behavior of the permission set does not include the service behavior to be executed;
the executing module 303 is configured to allow the service behavior to be executed if the behavior flow of the service behavior to be executed is consistent with the flow shown in the flow set.
In a specific application scenario, as shown in fig. 3B, the apparatus further includes a monitoring module 304, a generating module 305, an acquiring module 306, and a storing module 307.
The monitoring module 304 is configured to start a target behavior body, monitor a service behavior of the target behavior body, and obtain at least one service behavior;
the generating module 305 is configured to generate a permission set including at least one service behavior, extract a subject identifier of a subject of a target behavior, and store the subject identifier in correspondence with the permission set;
the acquisition module 306 is configured to monitor a process of executing a service behavior by a target behavior body, and acquire an operating state and an operating environment of the target behavior body;
the storage module 307 is configured to sort the operation states and the operation environments according to a time sequence, generate a flow of the target behavior body, use the flow as a flow set, and store the flow set and the body identifier correspondingly.
In a specific application scenario, as shown in fig. 3C, the monitoring module 304 includes a determining submodule 3041, an initiating submodule 3042 and a monitoring submodule 3043.
The determining submodule 3041 is configured to receive a starting instruction, and determine a target behavior body according to a to-be-started body identifier carried by the starting instruction;
the promoter module 3042 is used to start the target behavior body and start the behavior collection program, and the behavior collection program is at least Hook program;
the monitoring submodule 3043 is configured to monitor a service behavior of the target behavior main body after being started based on the behavior collection program, and obtain at least one service behavior of the target behavior main body.
In a specific application scenario, as shown in fig. 3D, the first determining module 301 includes a first determining sub-module 3011 and a second determining sub-module 3012.
The first determining submodule 3011 is configured to, when receiving a service behavior to be executed, use a behavior body that requests execution of the service behavior to be executed as a target behavior body;
the second determining submodule 3012 is configured to obtain a subject identifier of the target behavior subject, and determine an authority set and a flow set indicated by the subject identifier.
In a specific application scenario, the executing module 303 is further configured to allow the service behavior to be executed if at least one service behavior of the permission set includes the service behavior to be executed.
In a specific application scenario, as shown in fig. 3E, the apparatus further includes a disabling module 308.
The prohibiting module 308 is configured to prohibit the service behavior to be executed from being executed if the behavior flow of the service behavior to be executed is inconsistent with the flow shown in the flow set.
The device provided by the embodiment of the invention can determine the authority set and the flow set of the target behavior main body requesting to execute the service behavior to be executed when receiving the service behavior to be executed, if at least one service behavior in the authority set does not include the service behavior to be executed, the behavior flow of the service behavior to be executed is determined, and if the behavior flow of the service behavior to be executed is consistent with the flow shown by the flow set, the service behavior to be executed is allowed to be executed, so that the malicious behavior of an attacker is easily identified by limiting the service behavior of the main body through the authority set and the flow set, the malicious operation of the attacker is prevented from causing great damage to an operating system, and the safety of the operating system is better.
It should be noted that other corresponding descriptions of the functional units related to the behavior-based service identification apparatus provided in the embodiment of the present invention may refer to the corresponding descriptions in fig. 1 and fig. 2A to fig. 2B, and are not described herein again.
In an exemplary embodiment, referring to fig. 4, there is further provided a device, where the device 400 includes a communication bus, a processor, a memory, and a communication interface, and may further include an input/output interface and a display device, where the functional units may communicate with each other through the bus. The memory stores a computer program and the processor executes the program stored in the memory to perform the … method of the above embodiments.
A readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the behavior based service identification method.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present application can be implemented by hardware, and also by software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the implementation scenarios of the present application.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present application.
Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above application serial numbers are for description purposes only and do not represent the superiority or inferiority of the implementation scenarios.
The above disclosure is only a few specific implementation scenarios of the present application, but the present application is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present application.