Font Size: a A A

Research On Invasion Guard Technology Based On Behaviors

Posted on:2008-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:B M YuFull Text:PDF
GTID:2178360245494037Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The network security has become a challenge to all human beings in the information age.The technology of using computer malicious code is deepening, some malicious codes can even terminate, alter and hang the process of the antivirus software, firewall and invalidate its guard mechanism. So how to prevent the operation of virus and Trojan horse, and how to detect the system process and reliability process free from the invasion of other processes is an important research subject.In this paper, we have done some research about the following subjects: First, we discussed the present situation of invasion detection both home and abroad, then we analyzed the operation mechanism of some typical viruses and Trojan horse programs deeply and raised a behavior-based invasion guard system model. This model coheres with the dynamic security guard demands of PPDR. We described the model's structure and its working principles of strategy, detection, reaction and guard, then we analyzed the model's advantages and disadvantages; meanwhile, in the paper we studied the key technology of realizing the invasion guard system deeply based on the analysis of invasion behaviors. We accomplished the connection between our system and the operating system, and we also accomplished the interception of invasion behaviors. The invasion guard system underook the creation of control process and the mission of guard process and reliability process free from the invasion of other processes. We have also done some research on the invasion guard system's self security.
Keywords/Search Tags:Invasion Guard, Process Protection, Malicious Codes, Virus
PDF Full Text Request
Related items