Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for actively defending against Trojan horse based on virtual environments

A virtual environment, active defense technology, applied in the field of network security, to achieve the effect of strengthening security and changing the operating environment

Inactive Publication Date: 2016-08-10
ZHEJIANG UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Do not download and run software from untrusted websites;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for actively defending against Trojan horse based on virtual environments
  • Method for actively defending against Trojan horse based on virtual environments
  • Method for actively defending against Trojan horse based on virtual environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] According to the attached figure 1 and 2 , describe in detail the specific implementation process of the present invention.

[0042] The present invention is based on the method for the active defense Trojan of virtual environment, comprises the following steps:

[0043] 1. During system initialization or operation, a virtual environment is automatically built; this step is realized through the following sub-steps:

[0044] (1.1) Build a virtual environment V={v i |i=1,2,···,n}, where n is the number of virtual systems built, v i is the i-th virtual environment;

[0045] (1.2) Use different operating systems Sys={sys in each virtual environment i |i=1,2,···,n}, where, sys i is the operating system of the i-th virtual environment;

[0046] (1.3) Use different configuration environments Ev={ev in each virtual environment i |i=1,2,···,n}, where, ev i is the configuration parameter of the i-th virtual environment;

[0047] (1.4) In the virtual environment v i Deplo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for actively defending against Trojan horses based on a virtual environment. For the first time, the invention deploys a protected network server in a virtual heterogeneous system in a dynamically changing heterogeneous configuration environment. When an access request is generated, it is randomly mapped to different virtual systems, so that the environment of each access is different. Encapsulating multiple virtual systems into one network server node increases the difficulty for attackers to exploit environmental vulnerabilities. At the same time, by changing the system and configuration structure, the Trojan horse loses its living environment, so as to achieve the purpose of active Trojan horse defense.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for actively defending against Trojan horses in network security based on a virtual environment. Background technique [0002] With the close integration and application of Internet technology and various industries in society, network security has become an important factor affecting the Internetization of various industries. As a common technical method used by network attackers, Trojan horse has the characteristics of small size, strong concealment, and great harm, so it is difficult to effectively prevent it. Applications based on network servers, such as the server side in the B / S architecture and the server side in the C / S architecture, once the attacker implants a Trojan horse, the attacker will remotely control, modify files, and steal various important files. Data and even illegal security behaviors such as controlling remote hardware devices. Therefo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/56G06F21/53
CPCH04L63/145G06F21/53G06F21/566
Inventor 吴春明陈双喜
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products