Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for preventing vicious code attach

A malicious code and operating system technology, applied in the field of systems that prevent malicious code intrusion, can solve problems such as the inability to prevent attacks, and achieve the effect of defending attacks

Inactive Publication Date: 2007-07-25
KEBO TECH
View PDF0 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem to be solved by the embodiments of the present invention is to provide a system and method for preventing malicious code intrusion in view of the above-mentioned defects that the existing malicious program intrusion prevention system cannot prevent new attack forms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for preventing vicious code attach
  • System and method for preventing vicious code attach
  • System and method for preventing vicious code attach

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Generally, malicious code intrusion is mainly divided into two stages: the stage of obtaining the execution capability (AttackVector) and the stage of executing the attack (Exploit payload). After the malicious code obtains execution permission through methods such as dynamic link library (DLL) injection or buffer overflow, it must go through the execution attack stage to complete the attack. Existing ways to prevent malicious code intrusion start from preventing malicious code from obtaining execution capability, while the present invention starts from the execution attack stage to prevent malicious code from intruding.

[0039] In common intrusion attack methods, whether it is simply generating a super user or generating a remote user interface (Shell), whether it is a primary remote shell using passive mode, or a reverse remote shell for the purpose of bypassing the firewall, etc., The intrusion code must finally use system resources to complete its attack goal, that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The system comprises: a function calling module for calling API function of operation system; an initiation module for taking over the key API function; a feature extracting module for generating the corresponding feature code according to the key API function and adding said feature code into the checking feature information table; a memory module for saving the checking feature information table; a call monitoring module for looking up the feature code corresponding to the current key API function in the checking feature information table before executing the calling operation of key API function; if finding the corresponding feature code, the function calling module calls the current API function. The invention also reveals a method thereof.

Description

technical field [0001] The present invention relates to the field of computer technology, more specifically, to a system and method for preventing malicious code from invading. Background technique [0002] With the development of computer networks, the number of Internet users has increased dramatically. At present, the number of Internet users in China alone has exceeded 100 million. The application of the network has increasingly penetrated into the daily life of ordinary people, but while the network brings convenience to work, study and life, it also brings a lot of troubles, such as various Trojan horses, viruses, worms, Spyware frequently appears to destroy or steal confidential information. In addition, increasingly rampant rogue software and hacker attacks not only threaten ordinary computers, but also threaten the security of major website servers and P2P network systems. [0003] There are many ways to intrude and attack networks and systems, the more important ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/00
CPCH04L63/145
Inventor 尹国利
Owner KEBO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products