Security audit method and system for kernel

A security auditing and kernel technology, applied in the computer field, can solve problems such as the inability of kernel security auditing, and achieve the effect of improving security and reliability

Active Publication Date: 2010-07-14
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The embodiment of the present invention provides a method and system for security auditing of the kernel, so as to solve the problem that the security audit of the kernel of the device cannot be performed in the existing host security audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security audit method and system for kernel
  • Security audit method and system for kernel
  • Security audit method and system for kernel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment 1 of the present invention applies the kernel anti-hook technology to the host security audit technology, and proposes a new kernel security audit method, such as figure 1 As shown, the method includes the following steps:

[0030] Step 101: Scan each kernel module in the device, and determine the kernel hooks installed in each kernel module.

[0031] The devices involved in this step may be terminal devices such as computers, or other terminals that need to perform a security audit on the kernel state of the device.

[0032] The device to be processed has a kernel system, and at least one software is installed in the kernel system, and each software can correspond to a kernel module, where the kernel module refers to a driver file (equivalent to an exe file in the application layer), in each Kernel hooks may in turn be installed in kernel modules.

[0033] In order to conduct a security audit of the software behavior of the kernel state of the device, it i...

Embodiment 2

[0051] Embodiments of the present invention also provide a security audit system for the kernel under the same inventive concept as Embodiment 1, such as figure 2 As shown, the system includes the following components: a kernel scanning module 11, a kernel audit module 12 and an audit execution module 13, wherein: the kernel scanning module 11 is used to scan each kernel module in the device to determine the Installed kernel hooks; the kernel audit module 12 is used to compare the kernel hooks in each kernel module with a plurality of preset behavior information groups, and determine that the installed kernel hooks are consistent with the kernel in the at least one behavior information group A kernel module that matches the hook identifier, wherein each behavior information group contains at least one kernel hook identifier; the audit execution module 13 is used to unload the kernel module determined by the kernel audit module.

[0052] The kernel security audit system in thi...

Embodiment 3

[0058] The schemes of Embodiment 1 and Embodiment 2 of the present invention will be described in detail below through a specific example.

[0059] Assume that two behavior information groups are preset in the third embodiment, wherein: the kernel hook identifier contained in behavior information group 1 is IDT keyboard hook identifier+TDI network communication hook identifier; the kernel hook identifier contained in behavior information group 2 IDT keyboard hook identifier + NDIS network communication hook identifier.

[0060] Kernel scanning module 11 scans each kernel module of computer, obtains the behavior of installing hooks in 3 kernel modules respectively, and sends the identification of these 3 kernel modules to legal determination module 14; Legal determination module 14 according to preset Kernel whitelist information, determine that kernel module 3 is a legal kernel module; Legal determination module 14 sends the scan result of kernel module 1 and kernel module 2 t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security audit method and system for a kernel, which is mainly comprises: integrating the kernel inverted hook technology into a host security system, organically combining the host security audit technology and the kernel inverted hook technology, scanning each kernel module in equipment and determining kernel hooks installed in each kernel module, the kernel module provided with illegal software is determined, and the determined kernel module is unloaded, thereby improving the security and the reliability of a kernel system.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and a system for performing security audits on computer kernels using security audit technologies. Background technique [0002] There are many kinds of computer security auditing techniques, such as host computer security auditing techniques. The purpose of host security audit technology is to improve the security of the system host, and to achieve the purpose of protecting the computer host through the control and audit of computer peripherals. Control and audit of computer peripherals includes control of computer interfaces and control of computer equipment classes. Specifically, the host security audit technology includes the following technical content: [0003] Dial-up behavior control: allow / prohibit internal network users to dial into the external network through MODEM or ADSL; [0004] Network communication control: allow / record / prohibit communication between intrane...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/57
Inventor 柯宗贵柯宗庆
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products