[go: up one dir, main page]

CN114244631A - Computer network security protection method and system - Google Patents

Computer network security protection method and system Download PDF

Info

Publication number
CN114244631A
CN114244631A CN202210164970.XA CN202210164970A CN114244631A CN 114244631 A CN114244631 A CN 114244631A CN 202210164970 A CN202210164970 A CN 202210164970A CN 114244631 A CN114244631 A CN 114244631A
Authority
CN
China
Prior art keywords
list
white list
temporary
computer network
process management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210164970.XA
Other languages
Chinese (zh)
Inventor
周磊
姜双林
饶志波
赵时晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Andi Technology Co ltd
Original Assignee
Beijing Andi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Andi Technology Co ltd filed Critical Beijing Andi Technology Co ltd
Priority to CN202210164970.XA priority Critical patent/CN114244631A/en
Publication of CN114244631A publication Critical patent/CN114244631A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention provides a computer network safety protection method and a system, wherein the method comprises the following steps: generating a process management list; the process management list comprises a white list and a black list; and uploading the process management list to a linkage center so that the linkage center broadcasts the process management list to all registered host terminals. According to the computer network safety protection method and system provided by the embodiment of the invention, the process management list is generated and uploaded to the linkage center so that the linkage center broadcasts the process management list to all registered host terminals, the linkage protection of the host terminals of dangerous processes can be realized, and the safety of a computer network is improved.

Description

Computer network security protection method and system
Technical Field
The embodiment of the invention relates to a computer network security protection method and a computer network security protection system.
Background
The rapid development of computer networks brings great convenience to the production and life of people. Computer networks also present unavoidable security risks while providing open and shared resources. Computer network security issues, and in particular local area network security issues, have become the focus of current network technology research. In the problem of computer network security, software irrelevant to service operation or malicious software is privately deployed in a host terminal, so that not only is hardware resource waste and equipment operation efficiency influenced, but also important data can be leaked due to data stealing. Therefore, it is important to implement computer network security protection.
Disclosure of Invention
The embodiment of the invention provides a computer network safety protection method, which comprises the following steps: generating a process management list; the process management list comprises a white list and a black list; and uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals.
According to the computer network security protection method provided by the embodiment of the invention, the process management list further comprises a temporary list, and the temporary list comprises a temporary authorized white list and a temporary forbidden black list; the process in the temporary authorization white list is a process which is allowed to be started by an administrator user at least with a first permission; and the process in the temporary forbidden blacklist is a process which is forbidden to be started by an administrator user at least having the first permission.
According to the computer network security protection method provided by the embodiment of the invention, the generating of the process management list comprises the following steps: an initialized white list is generated by scanning the system process.
According to the computer network security protection method provided by the embodiment of the invention, the generating of the process management list further comprises: accumulating the allowed starting times of the processes in the temporary authorization white list, if the allowed starting times reach a first threshold value, adding the processes into the white list, and deleting the processes from the temporary authorization white list; accumulating the starting prohibition times of the processes in the temporary prohibition blacklist, adding the processes into the blacklist and deleting the processes from the temporary prohibition blacklist if the starting prohibition times reach a second threshold value; changing the white list according to a white list changing instruction of an administrator user at least with a second authority; changing the blacklist according to a blacklist changing instruction of an administrator user at least having the second authority; and/or directly adding the dangerous process acquired from the third-party antivirus software into the blacklist.
According to the computer network security protection method provided by the embodiment of the invention, the method further comprises the following steps: acquiring a current running process information set at fixed time; traversing the current running process information set, verifying the process in the current running process information set according to a first verification rule, allowing the process to run normally if the verification is passed, and checking and killing the process if the verification is not passed; wherein the first check rule comprises: if the process is in the white list and not in the black list, the verification is passed; if the process is in the blacklist, the verification is not passed; if the process is not in the white list and the black list but in the temporary authorized white list, the verification is passed; and if the process is not in the white list, the black list and the temporary authorized white list, the verification is not passed.
According to the computer network security protection method provided by the embodiment of the invention, the method further comprises the following steps: checking the new starting process according to a second checking rule, if the checking is passed, allowing the process to be normally started, and if the checking is not passed, not allowing the process to be normally started; wherein the second check-up rule comprises: if the newly started process is in the white list and not in the black list, the verification is passed; if the newly started process is in the blacklist, the verification is not passed; if the new starting process is not in the white list and the black list and if an allowable starting instruction of an administrator user at least with a first permission is received, the verification is passed; and if the process is not in the white list and the black list and a starting prohibition instruction of an administrator user at least with a first permission is received, the verification is failed.
The embodiment of the invention also provides another computer network security protection method, which comprises the following steps: receiving a process management list sent by any host terminal; and broadcasting the process management list to all registered host terminals.
An embodiment of the present invention further provides a computer network security protection system, including: the system comprises a linkage center and at least one host terminal registered to the linkage center; wherein: the host terminal is used for: generating a process management list and uploading the process management list to a linkage center; the process management list comprises a white list and a black list; the linkage center is used for: receiving a process management list sent by any host terminal, and broadcasting the process management list to all registered host terminals.
The embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor executes the computer program to implement any of the steps of the computer network security protection method described above.
Embodiments of the present invention further provide a non-transitory computer readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the computer network security protection method as described in any one of the above.
An embodiment of the present invention further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the steps of any of the computer network security protection methods described above.
According to the computer network safety protection method and system provided by the embodiment of the invention, the process management list is generated and uploaded to the linkage center so that the linkage center broadcasts the process management list to all registered host terminals, the linkage protection of the host terminals of dangerous processes can be realized, and the safety of a computer network is improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flow chart of a computer network security protection method according to an embodiment of the present invention;
FIG. 2 is a second flowchart of a computer network security protection method according to an embodiment of the present invention;
FIG. 3 is a third schematic flowchart of a computer network security protection method according to an embodiment of the present invention;
FIG. 4 is a fourth flowchart illustrating a computer network security protection method according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a computer network security system according to an embodiment of the present invention;
FIG. 6 is a second schematic structural diagram of a computer network security system according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a computer network security protection method according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step 101, generating a process management list; wherein the process management list comprises a white list and a black list.
The method provided by the embodiment of the invention is applied to the host terminal. At least one host terminal is registered with the linkage center. The registration information includes an IP address, a port number, and a host identity. The host identifier is used for distinguishing the host terminal, and even if the host terminal changes the IP address and the port number, the linkage center can still uniquely identify the host terminal.
The host terminal locally generates a process management list. The process management list can comprise a white list and a black list, processes in the white list are allowed to run, and processes in the black list are checked and killed.
And 102, uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals.
And after the process management list is generated, uploading the process management list to a linkage center so that the linkage center broadcasts the process management list to all registered host terminals. For example, after a certain host terminal identifies a dangerous process, the dangerous process is added to a blacklist, and a linkage center broadcasts a message, so that all host terminals registered to the linkage center have the capability of protecting the dangerous process. The processes in the process management list may be identified using the MD5 values or core code fragments of the processes to uniquely distinguish and identify the processes.
The safety protection mode is a host machine linkage protection mode, and is suitable for, but not limited to, scenes with high safety requirements, such as a large intranet. For the scenes with single environment and low safety, a single machine protection mode can be adopted. Under the single machine protection mode, after the host terminal generates the process management list, the process management list is not broadcasted to all registered hosts through the linkage center, but the process management list is utilized to realize local safety protection.
According to the computer network safety protection method provided by the embodiment of the invention, the process management list is generated and uploaded to the linkage center so that the linkage center broadcasts the process management list to all registered host terminals, the linkage protection of the host terminals of dangerous processes can be realized, and the safety of the computer network is improved.
According to the computer network security protection method provided by the embodiment of the invention, the process management list further comprises a temporary list, and the temporary list comprises a temporary authorized white list and a temporary forbidden black list; the process in the temporary authorization white list is a process which is allowed to be started by an administrator user at least with a first permission; and the process in the temporary forbidden blacklist is a process which is forbidden to be started by an administrator user at least having the first permission.
In addition to whitelists and blacklists, process management lists may also include temporary lists. The temporary list includes a temporary authorized white list and a temporary forbidden black list.
The process in the temporary authorization white list is a process which is allowed to be started by an administrator user with at least a first authority. And for the process which is not in the white list or the black list, if the starting is allowed by at least an administrator user with the first authority, adding the process into the temporary authorized white list. The allowed number of starts of a process in the temporary process white list characterizes the trustworthiness of the process as a secure process.
The process in the temporary forbidden blacklist is a process which is forbidden to be started by an administrator user with at least a first right. And for the process which is not in the white list or the black list, if the starting of the process is forbidden by the administrator user with at least the first authority, adding the process into the temporary forbidden black list. The number of times of start inhibition of a process in the temporary inhibition blacklist characterizes the credibility of the process as a dangerous process.
The administrator users having at least the first authority include administrator users having the first authority and higher authorities. The administrator user of the first privilege may be a general administrator user.
The process management list can be stored in the memory in real time and permanently stored at regular time so as to deal with abnormal scenes such as power failure and the like. After the system is powered on, the stored process management list can be read from the database to the memory, so that the reading speed is improved.
The computer network security protection method provided by the embodiment of the invention is favorable for improving the identification capability of the security of the process by setting the temporary list comprising the temporary authorized white list and the temporary forbidden black list.
According to the computer network security protection method provided by the embodiment of the invention, the generating of the process management list comprises the following steps: an initialized white list is generated by scanning the system process.
After the host terminal is registered in the linkage center, an initialized white list can be generated through a scanning system process, namely, the white list initialization is carried out. System processes such as those necessary for the normal operation of an operating system. The hypervisor user may be given the right to perform white list initialization. And, manual intervention may be supported in generating the initialized white list by scanning the system process. For example, a process that is added to the initialized white list is deleted, or a process that is not added to the initialized white list is added.
The computer network security protection method provided by the embodiment of the invention ensures the normal operation of the system by scanning the system process to generate the initialized white list.
According to the computer network security protection method provided by the embodiment of the invention, the generating of the process management list further comprises: accumulating the allowed starting times of the processes in the temporary authorization white list, if the allowed starting times reach a first threshold value, adding the processes into the white list, and deleting the processes from the temporary authorization white list; accumulating the starting prohibition times of the processes in the temporary prohibition blacklist, adding the processes into the blacklist and deleting the processes from the temporary prohibition blacklist if the starting prohibition times reach a second threshold value; changing the white list according to a white list changing instruction of an administrator user at least with a second authority; changing the blacklist according to a blacklist changing instruction of an administrator user at least having the second authority; and/or directly adding the dangerous process acquired from the third-party antivirus software into the blacklist.
The process of generating the process management list may further include:
and accumulating the allowed starting times of the processes in the temporary authorization white list, and adding the processes into the white list and deleting the processes from the temporary authorization white list if the allowed starting times reach a first threshold value. And accumulating the starting prohibition times of the processes in the temporary prohibition blacklist, adding the processes into the blacklist and deleting the processes from the temporary prohibition blacklist if the starting prohibition times reach a second threshold value. Wherein, the administrator user with at least the first authority has the authority of allowing the process to be started or prohibited. The administrator user of the first privilege may be a general administrator user. The first and second thresholds may be the same or different.
And changing the white list according to the white list changing instruction of the administrator user with at least the second authority. And changing the blacklist according to the blacklist changing instruction of the administrator user at least with the second authority. The administrator user of the second privilege may be a super administrator user.
In addition, the dangerous processes obtained from the third-party antivirus software can be directly added into the blacklist.
The computer network safety protection method provided by the embodiment of the invention accumulates the allowed starting times of the processes in the temporary authorized white list, adds the processes into the white list and deletes the processes from the temporary authorized white list if the allowed starting times reach a first threshold value, accumulates the prohibited starting times of the processes in the temporary prohibited black list, adds the processes into the black list and deletes the processes from the temporary prohibited black list if the prohibited starting times reach a second threshold value, changes the white list according to the white list change instruction of the administrator user at least with a second authority, changes the black list according to the black list change instruction of the administrator user at least with the second authority, and/or directly adds the dangerous processes obtained from third-party antivirus software into the black list, thereby improving the rationality of process management generation.
According to the computer network security protection method provided by the embodiment of the invention, the method further comprises the following steps: acquiring a current running process information set at fixed time; traversing the current running process information set, verifying the process in the current running process information set according to a first verification rule, allowing the process to run normally if the verification is passed, and checking and killing the process if the verification is not passed; wherein the first check rule comprises: if the process is in the white list and not in the black list, the verification is passed; if the process is in the blacklist, the verification is not passed; if the process is not in the white list and the black list but in the temporary authorized white list, the verification is passed; and if the process is not in the white list, the black list and the temporary authorized white list, the verification is not passed.
The timing protection mode can be set to carry out safety protection on the host terminal. The host terminal acquires a current running process information set at regular time, wherein the current running process information set comprises all processes running on the host terminal at present. And traversing each process, checking by adopting a white list, a black list and a temporary list to obtain whether the process is allowed to run, and forcibly checking and killing the process which is not allowed to run so as to ensure the safety of the system.
The detailed check rule is as follows:
1) and the process is in a white list and not in a black list, and the process is allowed to normally run after passing the check.
2) And the process is not in the white list, and the process is checked and killed if the process is not checked in the black list.
3) And the process is simultaneously in a white list and a black list, the principle of higher safety is obeyed, the verification is not passed, and the process is checked and killed.
4) The process is not in the white list and the black list at the same time, whether the process is in the temporary authorized white list or not is further checked, if the process is in the temporary authorized white list, the process passes the verification, and the process is allowed to run; if not, the check is failed, and the process is checked and killed.
According to the computer network safety protection method provided by the embodiment of the invention, the processes in the current running process information set are checked regularly according to the first check rule, if the processes pass the check, the processes are allowed to run normally, and if the processes do not pass the check, the processes are checked and killed, so that the safety of the computer network is further improved.
According to the computer network security protection method provided by the embodiment of the invention, the method further comprises the following steps: checking the new starting process according to a second checking rule, if the checking is passed, allowing the process to be normally started, and if the checking is not passed, not allowing the process to be normally started; wherein the second check-up rule comprises: if the newly started process is in the white list and not in the black list, the verification is passed; if the newly started process is in the blacklist, the verification is not passed; if the new starting process is not in the white list and the black list and if an allowable starting instruction of an administrator user at least with a first permission is received, the verification is passed; and if the process is not in the white list and the black list and a starting prohibition instruction of an administrator user at least with a first permission is received, the verification is failed.
The host terminal can check the new starting process, and the process is not passed by the check, and the starting is not allowed. The verification rule is as follows:
1) and the process is in a white list and not in a black list, and the process is allowed to be normally started after passing the check.
2) The process is not in the white list, and in the black list, the verification is not passed, and the process is not allowed to be started normally.
3) The process is simultaneously in a white list and a black list, the principle of higher safety is obeyed, the verification is not passed, and the process is not allowed to be normally started.
4) And simultaneously, the process is not in a white list and a black list, an authorization interface is popped up, and after the authorization information (used for verifying the authority) filled by the user with the authority of the common administrator and above is passed, operation permission and operation non-permission are executed. If the operation of 'running permission' is executed, the process is allowed to be started normally, and is added into a temporary authorization white list, and the starting times are allowed to be accumulated by 1; and if the operation of 'not allowing running' is executed, the process is not allowed to be normally started, meanwhile, the process is added into a temporary forbidden blacklist, and the number of starting times is forbidden to be accumulated by 1. And when the allowed starting times of the processes in the temporary authorization white list reach a first threshold value, immediately filling the processes into the white list, and deleting the process information from the temporary authorization white list. And when the starting prohibition times of the processes in the temporary prohibition blacklist reach a second threshold value, immediately filling the processes into the blacklist, and deleting the process information from the temporary prohibition blacklist.
Non-administrator users may directly skip the authorization interface and not allow the process to start normally.
According to the computer network safety protection method provided by the embodiment of the invention, the newly started process is verified through the second verification rule, if the verification is passed, the process is allowed to be normally started, and if the verification is not passed, the process is not allowed to be normally started, so that the safety of the computer network is further improved.
Fig. 2 is a second flowchart of a computer network security protection method according to an embodiment of the present invention. As shown in fig. 2, the security mode in the method belongs to a host linkage protection mode, and the method includes:
1) the host terminal of the host system is registered to the linkage center, and the registration information comprises an IP address, a port number and a host identifier.
2) The super administrator authorizes the host terminal to initialize the white list, the authorized host terminal scans and deploys the process information of the host system, and the process is added into the process running white list. The super administrator has the right to change the white list and black list data.
3) The host terminal further generates data information of a white list, a black list and a temporary list according to rules.
4) After the data of the white list, the black list and the temporary list in the host terminal are updated, the latest data are actively uploaded to a linkage center (host linkage center), and the linkage center broadcasts the latest data to all host terminals registered to the linkage center.
5) The host terminal scans the host process information at regular time, and forcibly checks and kills the processes which are not verified according to the first verification rule so as to ensure the system safety.
6) And the host terminal manages the starting process in real time according to the second check rule. The white list process is allowed to be started; the blacklist process is not allowed to be started; unauthorized processes (not on the white list and the black list) require a general administrator to authorize the start or the prohibition of the start and update process information and operator information into a temporary authorized white list or a temporary prohibited black list.
Fig. 3 is a third schematic flowchart of a computer network security protection method according to an embodiment of the present invention. As shown in fig. 3, the security protection mode in the method belongs to a standalone deployment protection mode, and the method includes:
1) the super administrator authorizes the host terminal to initialize the white list, the authorized host terminal scans and deploys the process information of the host system, and the process is added into the process running white list. The super administrator has the right to change the white list and black list data.
2) The host terminal further generates data information of a white list, a black list and a temporary list according to rules.
3) The host terminal scans the host process information at regular time, and forcibly checks and kills the processes which are not verified according to the first verification rule so as to ensure the system safety.
4) And the host terminal manages the starting process in real time according to the second check rule. The white list process is allowed to be started; the blacklist process is not allowed to be started; unauthorized processes (not on the white list and the black list) require a general administrator to authorize the start or the prohibition of the start and update process information and operator information into a temporary authorized white list or a temporary prohibited black list.
According to the computer network safety protection method provided by the embodiment of the invention, after a certain host identifies a dangerous process, message broadcasting is carried out through the linkage center, so that all registered hosts of the computer network have the capacity of defending the dangerous process at the same time; and can avoid the same host computer from being invaded repeatedly by the same dangerous course; the two working modes of single machine deployment and host linkage deployment are supported, the single machine working mode is applied to the scene with single environment and low safety requirement, the host linkage working mode is applied to the scene with large intranet and high safety requirement, and the application of the two modes effectively enhances the system practicability and expands the application scene.
In the protection mode: the safety verification is carried out according to the process management list of software operation by regularly scanning the process information of the host terminal, and the forced checking and killing is carried out on the high-risk processes which do not pass the verification so as to ensure the safety of the host terminal system. The protection mode starts a mode of combining white list verification, black list verification and temporary list verification, and further improves the capability of guaranteeing the safety of the deployment host system. And carrying out safety verification on the newly started process in real time, wherein the process passing the verification is allowed to be started.
Fig. 4 is a fourth flowchart of a computer network security protection method according to an embodiment of the present invention. As shown in fig. 4, the method is applied to a linkage center, and includes:
and step S1, receiving a process management list sent by any host terminal.
And step S2, broadcasting the process management list to all registered host terminals.
At least one host terminal is registered with the linkage center. And after any host terminal generates a process management list (including an updated process management list), sending the process management list to the linkage center. After receiving the process management list sent by any host terminal, the linkage center broadcasts the received process management list to all host terminals registered in the linkage center, so that after any host terminal identifies a dangerous process, the rest host terminals have the capacity of defending the dangerous process.
According to the computer network safety protection method provided by the embodiment of the invention, the process management list sent by any host terminal is received, and the process management list is broadcasted to all registered host terminals, so that the linkage protection of the host terminals of dangerous processes can be realized, and the safety of the computer network is improved.
The computer network security protection system provided by the embodiment of the invention is described below, and the computer network security protection system described below and the computer network security protection method described above can be referred to correspondingly.
Fig. 5 is a schematic structural diagram of a computer network security system according to an embodiment of the present invention. As shown in fig. 5, the system includes a linkage center 1 and at least one host terminal 2 registered with the linkage center 1; wherein: the host terminal 2 is configured to: generating a process management list and uploading the process management list to a linkage center 1; the process management list comprises a white list and a black list; the linkage center 1 is used for: and receiving a process management list sent by any host terminal 2, and broadcasting the process management list to all registered host terminals 2.
The computer network security protection system provided by the embodiment of the invention comprises a linkage center 1 and at least one host terminal 2 registered to the linkage center 1. The host terminal 2 is used for generating a process management list and uploading the process management list to the linkage center 1. The process management list comprises a white list and a black list, wherein the processes in the white list are allowed to normally run, and the processes in the black list are checked and killed. The linkage center 1 is used for: receiving a process management list sent by any host terminal 2, and broadcasting the process management list to all registered host terminals 2, so that after any host terminal 2 identifies a dangerous process, the rest host terminals 2 have the capability of defending the dangerous process.
According to the computer network safety protection system, the process management list is generated by the host terminals, uploaded to the linkage center, received by the linkage center and broadcast to all registered host terminals, linkage protection of the host terminals in dangerous processes can be achieved, and safety of a computer network is improved.
Fig. 6 is a second schematic structural diagram of a computer network security system according to an embodiment of the present invention. As shown in fig. 6, the system includes a linkage center and at least one host terminal registered with the linkage center.
The host terminal comprises a data acquisition module, a data analysis module, a DC module, a database module, a protection module, a system configuration module and a user management module.
The data acquisition module is used for: and scanning the detailed information of the current running process of the host terminal at regular time.
The data analysis module is used for: analyzing the data, processing the data and identifying a dangerous process; and fills the analysis results into a white list, a black list or a temporary list.
A DC (Dual Channel, Dual Channel memory) module is used to: and storing the white list, the black list and the temporary list in real time. And after the software is powered on, the data is automatically synchronized from the database. The method has the characteristics of rapidly storing the query data and shortening the response time of the server.
A database module: and the DC data is put into a warehouse at regular time, the data is permanently stored, abnormal scenes such as system power failure are responded, and the reliability of software is improved.
A protection module: and carrying out timing inspection and killing on the program in the host terminal. And checking the new process after the new process is started, and allowing the new process to be started after the check is passed.
A system configuration module: and (4) carrying out authority verification on the login user, wherein the user with super administrator authority supports manual configuration of white list and black list data.
A user management module: and managing the user information and the user authority.
The linkage center comprises a message forwarding module. The message forwarding module is used for: and receiving the process management list of the registered host terminal, and broadcasting the process management list to all host terminals in the registered host list.
The linkage center is used as a TCP server side, the host terminal is used as a TCP client side, a traditional C/S framework mode is adopted, network communication is carried out based on TCP/IP, and a computer network safety protection system is constructed. The host terminal collects data of the process, analyzes and processes the data in real time to generate protection list strategies (white lists, black lists and temporary lists), stores the result data in a DC (temporary memory) and a storage library (permanent memory), starts a protection function according to the list data, and ensures the safety of the host system deployment. The host terminal uploads the protection list data (process management list) to the linkage center, and the linkage center broadcasts the protection list data to all registered host terminals, so that the linkage protection function of the host terminal is realized, and the capability of ensuring the safety of a computer network system is further improved.
The system has the advantages that: 1) one host terminal in a computer network identifies a dangerous process, and other host terminals synchronously have the linkage capacity of defending the dangerous process; 2) two modes of host single machine deployment and host linkage deployment are supported to be flexibly selected; 3) the host terminal stores the data in the memory, can quickly respond to the processing of dangerous processes, has a library storage function, and can process abnormal scenes such as power failure and the like; 4) the protection mode starts a mode of combining white list inspection, black list verification and temporary list verification, and further improves the safety guarantee capability of the deployed host terminal.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 7, the electronic device may include: a processor (processor)710, a communication Interface (Communications Interface)720, a memory (memory)730, and a communication bus 740, wherein the processor 710, the communication Interface 720, and the memory 730 communicate with each other via the communication bus 740. Processor 710 may invoke logic instructions in memory 730 to perform a computer network security method comprising: generating a process management list; the process management list comprises a white list and a black list; uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals; or comprises the following steps: receiving a process management list sent by any host terminal; and broadcasting the process management list to all registered host terminals.
In addition, the logic instructions in the memory 730 can be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, an embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, the computer program may be stored on a non-transitory computer-readable storage medium, and when the computer program is executed by a processor, a computer is capable of executing a computer network security protection method provided by the above methods, where the method includes: generating a process management list; the process management list comprises a white list and a black list; uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals; or comprises the following steps: receiving a process management list sent by any host terminal; and broadcasting the process management list to all registered host terminals.
In yet another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform a computer network security protection method provided by the above methods when executed by a processor, where the method includes: generating a process management list; the process management list comprises a white list and a black list; uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals; or comprises the following steps: receiving a process management list sent by any host terminal; and broadcasting the process management list to all registered host terminals.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A computer network security protection method, comprising:
generating a process management list; the process management list comprises a white list and a black list;
and uploading the process management list to a linkage center, so that the linkage center broadcasts the process management list to all registered host terminals.
2. The computer network security protection method of claim 1, wherein the process management list further comprises a temporary list, the temporary list comprising a temporary authorized white list and a temporary forbidden black list; the process in the temporary authorization white list is a process which is allowed to be started by an administrator user at least with a first permission; and the process in the temporary forbidden blacklist is a process which is forbidden to be started by an administrator user at least having the first permission.
3. The computer network security protection method of claim 2, wherein the generating a process management list comprises:
an initialized white list is generated by scanning the system process.
4. The method of claim 3, wherein the generating a process management list further comprises:
accumulating the allowed starting times of the processes in the temporary authorization white list, and adding the processes into the white list and deleting the processes from the temporary authorization white list if the allowed starting times reach a first threshold;
accumulating the starting prohibition times of the processes in the temporary prohibition blacklist, adding the processes into the blacklist and deleting the processes from the temporary prohibition blacklist if the starting prohibition times reach a second threshold value;
changing the white list according to a white list changing instruction of an administrator user at least with a second authority;
changing the blacklist according to a blacklist changing instruction of an administrator user at least having the second authority;
and/or directly adding the dangerous process acquired from the third-party antivirus software into the blacklist.
5. The computer network security method of claim 2, further comprising:
acquiring a current running process information set at fixed time;
traversing the current running process information set, verifying the process in the current running process information set according to a first verification rule, allowing the process to run normally if the verification is passed, and checking and killing the process if the verification is not passed; wherein the first check rule comprises:
if the process is in the white list and not in the black list, the verification is passed;
if the process is in the blacklist, the verification is not passed;
if the process is not in the white list and the black list but in the temporary authorized white list, the verification is passed;
and if the process is not in the white list, the black list and the temporary authorized white list, the verification is not passed.
6. The computer network security method of claim 2, further comprising:
checking the new starting process according to a second checking rule, if the checking is passed, allowing the process to be normally started, and if the checking is not passed, not allowing the process to be normally started; wherein the second check-up rule comprises:
if the newly started process is in the white list and not in the black list, the verification is passed;
if the newly started process is in the blacklist, the verification is not passed;
if the new starting process is not in the white list and the black list and if an allowable starting instruction of an administrator user at least with a first permission is received, the verification is passed;
and if the process is not in the white list and the black list and a starting prohibition instruction of an administrator user at least with a first permission is received, the verification is failed.
7. A computer network security protection method, comprising:
receiving a process management list sent by any host terminal;
and broadcasting the process management list to all registered host terminals.
8. A computer network safety protection system is characterized by comprising a linkage center and at least one host terminal registered to the linkage center; wherein:
the host terminal is used for: generating a process management list and uploading the process management list to a linkage center; the process management list comprises a white list and a black list;
the linkage center is used for: receiving a process management list sent by any host terminal, and broadcasting the process management list to all registered host terminals.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the computer network security method according to any of claims 1 to 7 are implemented when the processor executes the program.
10. A non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the steps of the computer network security protection method according to any one of claims 1 to 7.
CN202210164970.XA 2022-02-23 2022-02-23 Computer network security protection method and system Pending CN114244631A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210164970.XA CN114244631A (en) 2022-02-23 2022-02-23 Computer network security protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210164970.XA CN114244631A (en) 2022-02-23 2022-02-23 Computer network security protection method and system

Publications (1)

Publication Number Publication Date
CN114244631A true CN114244631A (en) 2022-03-25

Family

ID=80747827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210164970.XA Pending CN114244631A (en) 2022-02-23 2022-02-23 Computer network security protection method and system

Country Status (1)

Country Link
CN (1) CN114244631A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884993A (en) * 2022-05-07 2022-08-09 杭州天宽科技有限公司 Virtual android system for enhancing data security
CN117857223A (en) * 2024-03-07 2024-04-09 四川天邑康和通信股份有限公司 Black-white list realization method, device, equipment and medium based on FTTR master-slave management

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8112485B1 (en) * 2006-11-22 2012-02-07 Symantec Corporation Time and threshold based whitelisting
CN105183504A (en) * 2015-08-12 2015-12-23 北京威努特技术有限公司 Software server based process white-list updating method
CN105631319A (en) * 2014-11-01 2016-06-01 江苏威盾网络科技有限公司 Computer terminal control system and method based on network protection
CN110691083A (en) * 2019-09-26 2020-01-14 杭州安恒信息技术股份有限公司 A Process-Based Outreach Blocking Method
US20200026846A1 (en) * 2017-03-29 2020-01-23 Seung Hwan Choi System and method for authenticating safe software

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8112485B1 (en) * 2006-11-22 2012-02-07 Symantec Corporation Time and threshold based whitelisting
CN105631319A (en) * 2014-11-01 2016-06-01 江苏威盾网络科技有限公司 Computer terminal control system and method based on network protection
CN105183504A (en) * 2015-08-12 2015-12-23 北京威努特技术有限公司 Software server based process white-list updating method
US20200026846A1 (en) * 2017-03-29 2020-01-23 Seung Hwan Choi System and method for authenticating safe software
CN110691083A (en) * 2019-09-26 2020-01-14 杭州安恒信息技术股份有限公司 A Process-Based Outreach Blocking Method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884993A (en) * 2022-05-07 2022-08-09 杭州天宽科技有限公司 Virtual android system for enhancing data security
CN114884993B (en) * 2022-05-07 2023-12-22 杭州天宽科技有限公司 Virtualized android system for enhancing data security
CN117857223A (en) * 2024-03-07 2024-04-09 四川天邑康和通信股份有限公司 Black-white list realization method, device, equipment and medium based on FTTR master-slave management
CN117857223B (en) * 2024-03-07 2024-05-28 四川天邑康和通信股份有限公司 Method, device, equipment and medium for realizing black-and-white list based on FTTR master-slave management

Similar Documents

Publication Publication Date Title
US11604861B2 (en) Systems and methods for providing real time security and access monitoring of a removable media device
CN107888607B (en) Network threat detection method and device and network management equipment
CN112653655B (en) Automobile safety communication control method and device, computer equipment and storage medium
CN110677381B (en) Penetration testing method and device, storage medium, electronic device
US10033745B2 (en) Method and system for virtual security isolation
US10341350B2 (en) Actively identifying and neutralizing network hot spots
CN114244631A (en) Computer network security protection method and system
CN114257407B (en) Equipment connection control method and device based on white list and computer equipment
US11539741B2 (en) Systems and methods for preventing, through machine learning and access filtering, distributed denial of service (“DDoS”) attacks originating from IoT devices
CN111314384A (en) Terminal authentication method, device and equipment
CN107330331B (en) Method, device and system for identifying system with vulnerability
CN112583841B (en) Virtual machine safety protection method and system, electronic equipment and storage medium
US12373605B2 (en) Secure hashing of large data files to verify file identity
CN112491897A (en) Remote anti-brute force cracking method based on database security
CN113504971B (en) Security interception method and system based on container
CN108965251A (en) A kind of safe mobile phone guard system that cloud combines
CN112104618A (en) Information determination method, information determination device and computer readable storage medium
CN100592688C (en) A system and method for security authentication of a client accessing a network
CN109214182B (en) Method for processing Lesox software in running of virtual machine under cloud platform
CN111835782A (en) Login protection method and device for network equipment, storage medium and processor
CN115879106A (en) Method and device for managing and controlling mobile storage equipment
CN115935356A (en) Software security testing method, system and application
CN113569242A (en) Illegal software identification method
CN113965343A (en) Terminal equipment isolation method and device based on local area network
CN107124390B (en) Security defense and implementation method, device and system of computing equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220325