CN110502930A - A kind of monitoring guard method of system core file integrality and device - Google Patents

A kind of monitoring guard method of system core file integrality and device Download PDF

Info

Publication number
CN110502930A
CN110502930A CN201910683279.0A CN201910683279A CN110502930A CN 110502930 A CN110502930 A CN 110502930A CN 201910683279 A CN201910683279 A CN 201910683279A CN 110502930 A CN110502930 A CN 110502930A
Authority
CN
China
Prior art keywords
file
monitoring
integrality
application layer
inner nuclear
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910683279.0A
Other languages
Chinese (zh)
Inventor
邢希双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910683279.0A priority Critical patent/CN110502930A/en
Publication of CN110502930A publication Critical patent/CN110502930A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Monitoring And Testing Of Nuclear Reactors (AREA)

Abstract

The invention discloses a kind of monitoring guard methods of system core file integrality, comprising the following steps: application layer updates monitoring rules when starting;Inner nuclear layer changes according to the integrality of monitoring rules real-time monitoring system critical file;Application layer collects inner nuclear layer monitoring protection output;The integrality baseline of application layer update critical file.The invention also discloses a kind of monitoring and protecting devices of system core file integrality.This method is to increase kernel-driven module and scan script on an operating system; scan script generates kernel rule file, installation kernel-driven, monitoring and protection result and presents, updates critical file baseline; the destructive movement of kernel-driven module real-time blocking critical file judges whether movement allows, record monitoring and protects result according to regular; the two combines and has both played the light and flexible of script; the real-time, hidden of kernel-driven has been played again and do not can bypass, and the integrality of critical system file is effectively guaranteed.

Description

A kind of monitoring guard method of system core file integrality and device
Technical field
The present invention relates to safety of computer operating system field, the monitoring of especially a kind of system core file integrality is protected Maintaining method and device.
Background technique
With the development of the new techniques such as cloud computing, big data, the security requirement of cloud host, server and terminal is got over Come higher.Integrality is one of safe three elements, is the important component of safety.Critical file in sorts of systems is frequent By the destruction of virus and other rogue programs, system dysfunction and stability is caused not to can guarantee, so how to have in time The integrality variation of critical file in effect ground discovery system, and be tampered in critical file and unintentional damage in the case where carries out Protection, it is very important.
For the integrality of system core file, currently a popular way be write integrity detection application program, such as: The famous Tripwire integrality software of Unix system.Integrity detection application program collection system critical file on startup Baseline includes the cryptographic Hash of each critical file in baseline, using timer timing scan or manually scans each key Whether the cryptographic Hash of file changes, and such as changes record log and notifies system manager, while being updated pair with new cryptographic Hash Answer the base-line data of critical file.Integrity detection application program can play certain monitoring system critical file integrality Effect, but it also has the disadvantage that.One, integrity detection application program can not be in critical file by being protected when destroying; Two, the real-time of integrity detection application program is low, only timing cycle to or when manually executing, could find key File has variation;Three, integrity detection application program occupying system resources are larger, influence the operation of other programs in system; Four, integrity detection application program causes the maintenance load of system manager, if because of some reasons, integrity detection application Program is not activated, then the integrality of critical file is not just known where to begin;Five, the modification, upgrading of integrity detection application program It is relatively slow, using compiled language (such as: integrity detection application modification C++) write, upgrading generally require modification generation Code, compiling pass through, issue again, could come into force in system.
Summary of the invention
The object of the present invention is to provide a kind of monitoring guard method of system core file integrality and devices, solve current Integrity detection application program can not provide that protection, real-time are low, it is big to occupy resource, increase maintenance load, the disadvantage that upgrading is slow, It provides monitoring and protection two kinds of mechanism simultaneously, has fundamentally ensured the integrality and safe enough of system core file.
To achieve the above object, the present invention adopts the following technical solutions:
First aspect present invention provides a kind of monitoring guard method of system core file integrality, including following step It is rapid:
Application layer updates monitoring rules when starting;
Inner nuclear layer changes according to the integrality of monitoring rules real-time monitoring system critical file;
Application layer collects inner nuclear layer monitoring protection output;
The integrality baseline of application layer update critical file.
With reference to first aspect, in a first possible implementation of that first aspect, prison is updated when the application layer starts Regulatory control then, specifically includes:
When application layer starts, according to current preset configuration file, the rule file that inner nuclear layer needs is formed.
With reference to first aspect, in a second possible implementation of that first aspect, the inner nuclear layer is according to monitoring rules The integrality of real-time monitoring system critical file changes, and specifically includes:
Inner nuclear layer judges whether accessed file belongs to monitoring rules list, if not, executing file operation;If so, Judge whether accessed file allows destructive movement, if not, refusal executes file operation;If so, executing file operation.
With reference to first aspect, in first aspect in the third possible implementation, the inner nuclear layer is according to monitoring rules The integrality of real-time monitoring system critical file changes, further includes:
Generate protection log and monitoring log, journal queue of throwing to;
Inner nuclear layer monitors journal queue, and log information is written in file system.
With reference to first aspect, in the 4th kind of possible implementation of first aspect, the application layer collects inner nuclear layer prison Control protection output, specifically includes:
Application layer timing scans the protection log and monitoring log output of inner nuclear layer under specified directory;
Application layer will protect log and monitoring log outputting standard, and show in Command Line Interface.
With reference to first aspect, in the 5th kind of possible implementation of first aspect, the application layer updates critical file Integrality baseline, specifically include:
Application layer judges that critical file integrality changes according to inner nuclear layer output journal information, and application layer recalculates Critical file cryptographic Hash updates critical file integrality baseline.
With reference to first aspect, in the 6th kind of possible implementation of first aspect, the application layer updates critical file Integrality baseline step after, further includes:
When application layer judges that system does not need integrality monitoring and protection, inner nuclear layer respective file is unloaded.
Second aspect of the present invention provides a kind of monitoring and protecting device of system core file integrality, comprising:
Monitoring rules update module, application layer update monitoring rules when starting;
Integrality judgment module, inner nuclear layer change according to the integrality of monitoring rules real-time monitoring system critical file;
Journal output module, application layer collect inner nuclear layer monitoring protection output;
Update module, application layer update the integrality baseline of critical file.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned A technical solution in technical solution have the following advantages that or the utility model has the advantages that
The present invention operating system kernel layer increase drive module, the destructive behavior of intercepting system critical file, according to The rule that scan script generates, is monitored and protects.Drive module is integrated in operating system nucleus, starts shipment with operating system one Row, upper application software perception less than.The prison of the scan script timed collection of application layer and standardization kernel-driven module simultaneously Control and protection output, safeguard kernel rule file and critical file integrality baseline.It saves after scan script modification and comes into force, foot This is easy to maintain, and occupying system resources are few.This method has the characteristics that real-time is high, noiseless, easy to maintain.This method is to grasp Make to increase kernel-driven module and scan script in system, scan script generates kernel rule file, installation kernel-driven, monitoring It presented with protection result, update critical file baseline, the destructive movement of kernel-driven module real-time blocking critical file, basis It is regular to judge whether movement allows, record monitoring and protection as a result, the two combination has not only played the light and flexible of script, but also hair It has waved the real-time, hidden of kernel-driven and not can bypass, the integrality of critical system file is effectively guaranteed.
Detailed description of the invention
Fig. 1 is one flow chart of embodiment of the present invention method;
Fig. 2 is two flow chart of embodiment of the present invention method;
Fig. 3 is apparatus of the present invention embodiment schematic diagram.
Specific embodiment
In order to clarify the technical characteristics of the invention, below by specific embodiment, and its attached drawing is combined, to this hair It is bright to be described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
As shown in Figure 1, a kind of monitoring guard method of system core file integrality, comprising the following steps:
Monitoring rules are updated when S1, application layer starting;
S2, inner nuclear layer change according to the integrality of monitoring rules real-time monitoring system critical file;
S3, application layer collect inner nuclear layer monitoring protection output;
S4, application layer update the integrality baseline of critical file.
As shown in Fig. 2, a kind of monitoring guard method of system core file integrality, comprising the following steps:
When S1, application layer starting, according to current preset configuration file, the rule file that inner nuclear layer needs is formed.
S2, inner nuclear layer judge whether accessed file belongs to monitoring rules list, if not, executing file operation;If It is to judge whether accessed file allows destructive movement, if not, refusal executes file operation;If so, executing file behaviour Make.
S3, protection log and monitoring log, journal queue of throwing to are generated;
S4, inner nuclear layer monitor journal queue, and log information is written in file system.
S5, application layer timing scan the protection log and monitoring log output of inner nuclear layer under specified directory;
S6, application layer will protect log and monitoring log outputting standard, and show in Command Line Interface.
S7, application layer judge that critical file integrality changes according to inner nuclear layer output journal information, and application layer is again Critical file cryptographic Hash is calculated, critical file integrality baseline is updated.
When S8, application layer judge that system does not need integrality monitoring and protection, inner nuclear layer respective file is unloaded.
As shown in figure 3, a kind of monitoring and protecting device of system core file integrality, comprising:
Monitoring rules update module 101, application layer update monitoring rules when starting;
Integrality judgment module 102, inner nuclear layer change according to the integrality of monitoring rules real-time monitoring system critical file;
Journal output module 103, application layer collect inner nuclear layer monitoring protection output;
Update module 104, application layer update the integrality baseline of critical file.
Scan script module application layer realize, using lightweight, explanation type scripting language (such as: Python, Perl, Ruby, bash, cmd etc.) it writes, plan target timing can be set by operating system and called, scripting language can also be passed through Internal timer mechanism realizes that timing executes.Kernel-driven module is realized in operating system kernel layer, by scan script module Installation.The rule file that scan script module generates is read when the module initialization, when operation, which intercepts all pairs of files, destruction Property behavior (such as: modification, delete, renaming).Kernel-driven module is once installed, both made scan script be not intended to or Malice is deleted, and still can enable monitoring and protective effect to system core file.
The task that scan script module is mainly completed is as follows:
1) when scan script starts, according to current preset configuration file, the rule that kernel module needs is formed File.
2) when scan script starts, judge whether kernel-driven module has been installed, if be fitted without, install Kernel-driven module.
3) scan script timing scans the monitoring and protection output of kernel-driven module under specified directory.
4) scan script is shown by the outputting standard of kernel module, and in Command Line Interface.Scan script is to send postal The modes such as part, instant message notify the variation of system administrator critical file integrality.
5) it changes if any critical file integrality, scan script recalculates file cryptographic Hash, updates critical file Integrality baseline.
6) when not needing integrality monitoring with protection, kernel-driven module is unloaded by scan script.
After kernel-driven block intercepts to file destroyed behavior, perform the following operation:
1) whether the accessed file of judgement is in list of rules, if (not being not belonging to system core in list of rules File), then ignore this behavior, then this operation behavior normally executes.
2) if accessed file judges whether this file allows destructive movement, if do not permitted in list of rules Perhaps destructive movement, then refuse this behavior, this operation behavior executes failure, and system core file is protected.After refusal, generate Protect log, journal queue of throwing to.It throws to and needs to return immediately after journal queue, do not carry out log I/O operation herein.
If 3) accessed file allows destructive movement, after this movement runs succeeded, monitoring log is generated, is thrown to Journal queue.It throws to and needs to return immediately after journal queue, do not carry out log I/O operation herein.
4) the low level IO thread of kernel-driven module monitors journal queue, log information is written to file system in time Under the specified directory of system.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.

Claims (8)

1. a kind of monitoring guard method of system core file integrality, characterized in that the following steps are included:
Application layer updates monitoring rules when starting;
Inner nuclear layer changes according to the integrality of monitoring rules real-time monitoring system critical file;
Application layer collects inner nuclear layer monitoring protection output;
The integrality baseline of application layer update critical file.
2. the monitoring guard method of the system as claimed in claim 1 critical file integrality, characterized in that the application layer opens Monitoring rules are updated when dynamic, are specifically included:
When application layer starts, according to current preset configuration file, the rule file that inner nuclear layer needs is formed.
3. the monitoring guard method of system core file integrality as claimed in claim 2, characterized in that the inner nuclear layer root Change according to the integrality of monitoring rules real-time monitoring system critical file, specifically include:
Inner nuclear layer judges whether accessed file belongs to monitoring rules list, if not, executing file operation;If so, judgement Whether accessed file allows destructive movement, if not, refusal executes file operation;If so, executing file operation.
4. the monitoring guard method of system core file integrality as claimed in claim 3, characterized in that the inner nuclear layer root Change according to the integrality of monitoring rules real-time monitoring system critical file, further includes:
Generate protection log and monitoring log, journal queue of throwing to;
Inner nuclear layer monitors journal queue, and log information is written in file system.
5. the monitoring guard method of system core file integrality as claimed in claim 4, characterized in that the application layer is received Collect inner nuclear layer monitoring protection output, specifically include:
Application layer timing scans the protection log and monitoring log output of inner nuclear layer under specified directory;
Application layer will protect log and monitoring log outputting standard, and show in Command Line Interface.
6. the monitoring guard method of system core file integrality as claimed in claim 5, characterized in that the application layer is more The integrality baseline of new critical file, specifically includes:
Application layer judges that critical file integrality changes according to inner nuclear layer output journal information, and application layer recalculates key File cryptographic Hash updates critical file integrality baseline.
7. the monitoring guard method of system core file integrality as claimed in claim 6, characterized in that the application layer is more After the integrality baseline step of new critical file, further includes:
When application layer judges that system does not need integrality monitoring and protection, inner nuclear layer respective file is unloaded.
8. a kind of monitoring and protecting device of system core file integrality, characterized in that include:
Monitoring rules update module, application layer update monitoring rules when starting;
Integrality judgment module, inner nuclear layer change according to the integrality of monitoring rules real-time monitoring system critical file;
Journal output module, application layer collect inner nuclear layer monitoring protection output;
Update module, application layer update the integrality baseline of critical file.
CN201910683279.0A 2019-07-26 2019-07-26 A kind of monitoring guard method of system core file integrality and device Pending CN110502930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910683279.0A CN110502930A (en) 2019-07-26 2019-07-26 A kind of monitoring guard method of system core file integrality and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910683279.0A CN110502930A (en) 2019-07-26 2019-07-26 A kind of monitoring guard method of system core file integrality and device

Publications (1)

Publication Number Publication Date
CN110502930A true CN110502930A (en) 2019-11-26

Family

ID=68587326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910683279.0A Pending CN110502930A (en) 2019-07-26 2019-07-26 A kind of monitoring guard method of system core file integrality and device

Country Status (1)

Country Link
CN (1) CN110502930A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827311A (en) * 2023-02-13 2023-03-21 北京天维信通科技有限公司 Method for protecting core file in common file system by using error correction coding

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102878A (en) * 2013-04-10 2014-10-15 中国科学院计算技术研究所 Malicious code analysis method and system under Linux platform
CN105740729A (en) * 2016-01-29 2016-07-06 浪潮电子信息产业股份有限公司 Method for checking credibility of system service program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102878A (en) * 2013-04-10 2014-10-15 中国科学院计算技术研究所 Malicious code analysis method and system under Linux platform
CN105740729A (en) * 2016-01-29 2016-07-06 浪潮电子信息产业股份有限公司 Method for checking credibility of system service program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827311A (en) * 2023-02-13 2023-03-21 北京天维信通科技有限公司 Method for protecting core file in common file system by using error correction coding

Similar Documents

Publication Publication Date Title
Hossain et al. Combating dependence explosion in forensic analysis using alternative tag propagation semantics
US10977370B2 (en) Method of remediating operations performed by a program and system thereof
US11507663B2 (en) Method of remediating operations performed by a program and system thereof
Joshi et al. Detecting past and present intrusions through vulnerability-specific predicates
Pohly et al. Hi-fi: collecting high-fidelity whole-system provenance
Krishnan et al. Trail of bytes: efficient support for forensic analysis
Ho et al. PREC: practical root exploit containment for android devices
Tucek et al. Sweeper: A lightweight end-to-end system for defending against fast worms
EP4095724B1 (en) Method of remediating operations performed by a program and system thereof
US20130111462A1 (en) Reactive anti-tampering system
Pennington et al. Storage-based intrusion detection
Shieh A pattern-oriented intrusion-detection model and its applications
CN103218561A (en) Tamper-proof method and device for protecting browser
CN108388793A (en) A kind of virtual machine escape means of defence based on Initiative Defense
Webster et al. Fast and Service-preserving Recovery from Malware Infections Using {CRIU}
CN110502930A (en) A kind of monitoring guard method of system core file integrality and device
CN109376530A (en) Process coercive action control method and system based on label
Jiang et al. Auditing frameworks need resource isolation: A systematic study on the super producer threat to system auditing and its mitigation
US12039037B2 (en) Online command injection attacks identification
Herder et al. A lightweight method for building reliable operating systems despite unreliable device drivers
CN109902490B (en) Linux kernel level file system tamper-proof application method
CN112187787A (en) Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
Krishnan et al. Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches
Zhang et al. Cross-layer comprehensive intrusion harm analysis for production workload server systems
CN113076542A (en) Test management system for trusted computing in artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126