CN113065157A - Bastion file security protection method based on file stream - Google Patents

Bastion file security protection method based on file stream Download PDF

Info

Publication number
CN113065157A
CN113065157A CN202110373355.5A CN202110373355A CN113065157A CN 113065157 A CN113065157 A CN 113065157A CN 202110373355 A CN202110373355 A CN 202110373355A CN 113065157 A CN113065157 A CN 113065157A
Authority
CN
China
Prior art keywords
file
fortress
stream
bastion
protection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110373355.5A
Other languages
Chinese (zh)
Inventor
郭康荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110373355.5A priority Critical patent/CN113065157A/en
Publication of CN113065157A publication Critical patent/CN113065157A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file stream-based security protection method for fortress files, which realizes the protection of files by writing the files into fortress file streams and comprises the following steps: s1, creating a fortress file; s2, writing the file needing to be protected into the file stream of the fortress file by using the given program; s3, after the written file is confirmed to be correct, the fortress file is promoted to the required authority; s4, reading the file through the given program, wherein the file reading needs to be carried out after all protections are removed; and S5, if the file is too large and cannot be written, the file can be divided and a plurality of bastion files or a plurality of file streams can be created and stored. The file is enabled to realize the security guarantee requirements of hiding, reading, being incapable of being tampered and the like through the technical means, the file to be protected is stored in the file stream of the fortress file, then the protection measures are set for the fortress file to realize the simultaneous protection of the file stream and the fortress file, and the file security is ensured.

Description

Bastion file security protection method based on file stream
Technical Field
The invention belongs to the technical field of computer file protection, and particularly relates to a bastion file security protection method based on a file stream.
Background
With the increasing demand for network security, file protection has become an immense security solution. Aiming at the habit that modern hackers like copying important files when attacking, file backups are the first downloading and tampering targets when being attacked by a network, conventional backup files can be copied and transmitted by the network, can be visible to all logged-in users, can be damaged in a simple mode and can be tampered to cause great loss, file streams belong to a local file storage mode and cannot be transmitted by the network, the file streams can be deleted by cleaning a disk, the stability of the files cannot be realized, and host files can be changed or deleted by other people with a mind to destroy the file streams.
Disclosure of Invention
The invention aims to protect the defects in the prior art, solve the problems of file tampering and network transmission, and hide the backup of confidential information, thereby avoiding the expansion of an attack chain and the file security caused by network attack.
In order to achieve the purpose, the invention provides the following technical scheme:
a file stream-based fortress file security protection method, the file protection technology realizes the protection of files by writing the files into the fortress file stream, including the following steps:
s1, creating a fortress file;
s2, writing the file needing to be protected into the file stream of the fortress file by using the given program;
s3, after the written file is confirmed to be correct, the fortress file is promoted to the required authority;
s4, reading the file through the given program, wherein the file reading needs to be carried out after all protections are removed;
and S5, if the file is too large and cannot be written, the file can be divided and a plurality of bastion files or a plurality of file streams can be created and stored.
Preferably, S6 is further included, and if it is necessary to add a protected file, S1 to S3 are repeated.
Preferably, the bastion file in S1 is a file owned by the system.
Preferably, in S2, when writing the file into the fortress file, the following command is executed by using the compiled software ntfs.exe of ntfs.cpp, using the already given source code:
a. exe create { absolute path of fortress file } { file stream name to be created };
b. exe appended { absolute path of fortress file } { fortress file stream name } { absolute path of file that needs to be written into fortress stream };
c. and writing the file into the bastion file stream after the command is executed.
Preferably, in S4, the file stream name and file size of the write bastion file are checked using the following commands when reading the file:
a. exe enum { fort filename or absolute path }.
Preferably, in S4, the data stored in the fortress file stream is acquired by using the following command when reading the file;
a. exe dump { fort file filename or absolute path } { file stream name to view } { file size of file stream to view }.
Preferably, in S3, the authority level is a file authority that cannot be changed by a general user.
The invention has the technical effects and advantages that:
1. the file is enabled to realize the security guarantee requirements of hiding, reading, being incapable of being tampered and the like through the technical means, the file to be protected is stored in the file stream of the fortress file, then the protection measures are set for the fortress file to realize the simultaneous protection of the file stream and the fortress file, and the file security is ensured.
2. The principle is that the file protection is carried out by utilizing the characteristics of the file stream, and the file protection method is based on the characteristics that an ntfs file stream has readability, writeability, non-falsification, network transmission incapability and remote copying capacity, so as to prevent hackers or viruses from attacking and copying the file, and sensitive or confidential data is stored in the file stream through the characteristics of the ntfs file stream in windows, so that the purpose of protecting the file is achieved.
Drawings
FIG. 1 is a schematic flow chart of the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
The file protection technology based on the file flow realizes the hiding and protection of the server or important network facilities to important files under the condition of being attacked by hackers, the method gives up the original idea of independent defense line, and realizes the deep defense of network security, namely the security of confidential information can be guaranteed after the server or the important network facilities are attacked by the network.
Ntfs (new Technology File system), a disk format specifically designed for network and disk quotas, File encryption, etc. to manage security features, provide long filenames, data protection and recovery, enable security through directory and File permissions, and support across partitions. The Window ntfs file stream technology is a very hidden technology and can play an unexpected role in hiding important files;
the NTFS file stream is originally designed for the HFS file system compatibility of Macintosh, and the related data can be written in a file resource (not written in the file) by using the technology, and the written data can be extracted to be read as an independent file, so that the following advantages are achieved:
1. the size and file content of Ntfs are not visible to the user; 2. the Ntfs file stream cannot be transmitted over a network and copied remotely; 3. the Ntfs can play a good defense effect on the encryption of the encrypted virus.
An Ntfs file stream is hosted, which is a modification made using an Ntfs file stream such that the file is hosted by other files. The aim is to avoid security scanning or for the authoring of file viruses. The Ntfs file stream encryption technology uses a file stream to store encryption information of encryption levels so as to realize non-inductive encryption and does not need a new local database.
The characteristics that the ntfs file stream cannot be packaged, transmitted by a network and copied remotely are utilized to realize the safety of the files in the ntfs file stream, and the method specifically comprises the following steps:
referring to fig. 1, the file protection technology realizes file protection by writing a file into a bastion file stream, and includes the following steps:
s1, creating a fortress file (a file carried by the system is adopted);
s2, writing the file to be protected into the file stream of the fortress file by using the given program,
with the source code already given, the following commands are executed using the compiled software ntfs.exe of ntfs.cpp:
a. exe create { absolute path of fortress file } { file stream name to be created };
b. exe appended { absolute path of fortress file } { fortress file stream name } { absolute path of file that needs to be written into fortress stream };
c. and writing the file into the bastion file stream after the command is executed.
S3, after confirming that the written file is correct, the fortress file is promoted to the required authority (preferably the authority of the file which can not be changed by a common user), or the fortress file is defended by other methods;
s4, reading the file through the given program, wherein the file reading needs to be carried out after all protections are removed;
the file stream name and file size of the written fortress file are viewed using the following commands when reading the file: a. exe enum { fort filename or absolute path }.
Acquiring data stored in the fortress file stream by using the following commands when reading the file; a. exes dump { fort file name or absolute path } { file stream name to view } { file size of file stream to view };
and S5, if the file is too large and cannot be written, the file can be divided and a plurality of bastion files or a plurality of file streams can be created and stored.
S6, if the protected file needs to be added, repeating S1 to S3.
In summary, the following steps: the file protection method is similar to the original technical implementation method, but the requirements on the concealment and the reducibility of the file are met, the file is enabled to be concealed, readable and incapable of being tampered, and other safety guarantee requirements are met through technical means.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (7)

1. A file stream-based fortress file security protection method is characterized in that a file is written into a fortress file stream to realize the protection of the file, and the file protection technology comprises the following steps: the method comprises the following steps:
s1, creating a fortress file;
s2, writing the file needing to be protected into the file stream of the fortress file by using the given program;
s3, after the written file is confirmed to be correct, the fortress file is promoted to the required authority;
s4, reading the file through the given program, wherein the file reading needs to be carried out after all protections are removed;
and S5, if the file is too large and cannot be written, the file can be divided and a plurality of bastion files or a plurality of file streams can be created and stored.
2. The file flow-based bastion file security protection method according to claim 1, characterized in that: s6 is also included, and if the protected file needs to be added, S1 through S3 are repeated.
3. The file flow-based bastion file security protection method according to claim 1, characterized in that: and the bastion file in the S1 adopts a file carried by the system.
4. The file flow-based bastion file security protection method according to claim 1, characterized in that: in S2, when writing the file into the bastion file, the following command is executed using the compiled software ntfs.exe of ntfs.cpp, using the already given source code:
a. exe create { absolute path of fortress file } { file stream name to be created };
b. exe appended { absolute path of fortress file } { fortress file stream name } { absolute path of file that needs to be written into fortress stream };
c. and writing the file into the bastion file stream after the command is executed.
5. The file flow-based bastion file security protection method according to claim 1, characterized in that: in S4, the file stream name and file size of the fortress file are checked using the following commands when reading the file:
a. exe enum { fort filename or absolute path }.
6. The file flow-based bastion file security protection method according to claim 1, characterized in that: in S4, the data stored in the fortress file stream is acquired using the following command when reading the file;
a. exe dump { fort file filename or absolute path } { file stream name to view } { file size of file stream to view }.
7. The file flow-based bastion file security protection method according to claim 1, characterized in that: in S3, the authority level is a file authority that cannot be changed by a general user.
CN202110373355.5A 2021-04-07 2021-04-07 Bastion file security protection method based on file stream Pending CN113065157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110373355.5A CN113065157A (en) 2021-04-07 2021-04-07 Bastion file security protection method based on file stream

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110373355.5A CN113065157A (en) 2021-04-07 2021-04-07 Bastion file security protection method based on file stream

Publications (1)

Publication Number Publication Date
CN113065157A true CN113065157A (en) 2021-07-02

Family

ID=76566072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110373355.5A Pending CN113065157A (en) 2021-04-07 2021-04-07 Bastion file security protection method based on file stream

Country Status (1)

Country Link
CN (1) CN113065157A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657677A (en) * 2015-03-05 2015-05-27 北京安普诺信息技术有限公司 File encryption method based on alternate data streams
CN108763245A (en) * 2018-03-28 2018-11-06 北京明朝万达科技股份有限公司 A kind of document management method and system based on NTFS system file labels
CN110673911A (en) * 2019-09-17 2020-01-10 张维加 Cross-equipment editing system for digital files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657677A (en) * 2015-03-05 2015-05-27 北京安普诺信息技术有限公司 File encryption method based on alternate data streams
CN108763245A (en) * 2018-03-28 2018-11-06 北京明朝万达科技股份有限公司 A kind of document management method and system based on NTFS system file labels
CN110673911A (en) * 2019-09-17 2020-01-10 张维加 Cross-equipment editing system for digital files

Similar Documents

Publication Publication Date Title
US11372994B2 (en) Security application for data security formatting, tagging and control
US7376947B2 (en) Computer system and method for secure installation and operation of software
AU2008203454B2 (en) Systems & Methods for Preventing Unauthorized Use of Digital Content
US7606795B2 (en) System and method for verifying the integrity and completeness of records
US8234496B1 (en) Image leak prevention using digital watermark
US20100138619A1 (en) Secure Erasure of Digital Files
KR101424973B1 (en) Method, recording medium and apparatus for updating revocation list and reproducing encrypted contents
Steel Windows forensics: The field guide for conducting corporate computer investigations
US8311978B2 (en) Computer enabled methods to inhibit file and volume name copying and to circumvent same
US20150213286A1 (en) Virtual file-based tamper resistant repository
EP2341458B1 (en) Method and device for detecting if a computer file has been copied
CN113065157A (en) Bastion file security protection method based on file stream
Srinivasan et al. Steganographic information hiding that exploits a novel file system vulnerability
Kohlbrenner et al. Poster: Hidden in plain sight: A filesystem for data integrity and confidentiality
Paik et al. Data protection based on hidden space in windows against ransomware
CN100428260C (en) Minimum invading data hidding method of computer network
TWI646425B (en) Virtual disk protection system
KR100948386B1 (en) Apparatus and method for saving original data in computer system
US20110083188A1 (en) Virus, trojan, worm and copy protection of audio, video, digital and multimedia, executable files and such installable programs
Hsu et al. WORM storage is not enough [Technical Forum]
CN100561496C (en) A kind of method that guarantees file security in the embedded system
Chang A Secure Erasure Method for Fragmented JPEG Images
RO137262A2 (en) Data protection system by access control of direct operations of data modification
Li Security and Management of Local Computer Data.
CN117896075A (en) Data operation behavior auditing system and method based on blockchain and digital watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination