CN105740705A - LXC container-based host defense method and system - Google Patents

LXC container-based host defense method and system Download PDF

Info

Publication number
CN105740705A
CN105740705A CN201510999175.2A CN201510999175A CN105740705A CN 105740705 A CN105740705 A CN 105740705A CN 201510999175 A CN201510999175 A CN 201510999175A CN 105740705 A CN105740705 A CN 105740705A
Authority
CN
China
Prior art keywords
main frame
user
virtual
machine environment
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510999175.2A
Other languages
Chinese (zh)
Inventor
孙洪伟
徐翰隆
肖新光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201510999175.2A priority Critical patent/CN105740705A/en
Publication of CN105740705A publication Critical patent/CN105740705A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an LXC container-based host defense method and system. The accuracy of operating data in each using process by a user can be ensured by creating an LXC container as a virtual fortress machine environment and replacing a host environment; and the condition that a host does not infect user data or threat data during next execution is ensured. According to the LXC container-based host defense method and system, the shortage that information residue removal and tampered document recovery after the host environment runs an application program or is maliciously attacked cannot be effectively implemented in the prior art is compensated; data residues and infection to the host environment when the user utilizes the host environment can be effectively eliminated; and malicious program, command, file and the like can be effectively prevented from being deposited in the host.

Description

A kind of main frame defence method based on LXC container and system
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of main frame defence method based on LXC container and system.
Background technology
Existing hosted environment, run application program or by malicious attack after, hosted environment can cause information residual, file distort, and situation about cannot recover, and have a lot of malicious operation and file to adopt the state hidden and hide to be present in main frame at present, this equipment for being in long-time use, especially that security level required is higher equipment, beyond doubt a kind of serious potential safety hazard;Mostly traditional system environments method of reducing, be to utilize Recovery card that system environments is reduced, and this method is not largely effective, still can remain use vestige and some obstinate data, be unfavorable for maintenance host safety after system reducing.
Summary of the invention
For the defect existed in above-mentioned prior art, the present invention proposes a kind of main frame defence method based on LXC container and system, by creating LXC(LinuxContainer) container is as virtual fort machine environment, and substitute hosted environment, can ensure user service data accurate in each use procedure, and guarantee that main frame does not infect user data or threat data when performing next time.
Concrete summary of the invention includes:
A kind of main frame defence method based on LXC container, including:
Main frame is set up at least one LXC container, and creates main frame defence rule;
When user logs in main frame, distribute at random or selected a LXC container as virtual fort machine environment by user;Described user logs in main frame and includes: local log-on, Telnet;
User's operation in virtual fort machine environment is monitored, and defends dummy rules fort machine environment to detect in real time by main frame;
The data of user's operation information in virtual fort machine environment and generation outputting log file is extracted by regulation;
When user publishes main frame, reduce virtual fort machine environment, go back original host initial environment.
Further, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
Further, described dummy rules fort machine environment is defendd to detect in real time by main frame, particularly as follows: user's operation behavior in virtual fort machine environment is mated with the data in main frame defence rule, and the interception operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
Further, the described data extracting user's operation information in virtual fort machine environment and generation by regulation, and outputting log file, particularly as follows: defend that rule is set up user data information at described main frame to extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
Further, also include utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilize described initial snapshot reduction data in magnetic disk.
A kind of main frame system of defense based on LXC container, including:
Main machine frame modeling block, for setting up at least one LXC container in main frame, and creates main frame defence rule;
Environment distribution module, for when user logs in main frame, distributing at random or selected a LXC container as virtual fort machine environment by user;Described user logs in main frame and includes: local log-on, Telnet;
Monitor and detection module, for user's operation in virtual fort machine environment is monitored, and is detected in real time by main frame defence dummy rules fort machine environment;
Daily record generation module, for extracting the data of user's operation information in virtual fort machine environment and generation by regulation, and outputting log file;
Main frame recovery module, when publishing main frame for user, reduces virtual fort machine environment, goes back original host initial environment.
Further, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
Further, described dummy rules fort machine environment is defendd to detect in real time by main frame, particularly as follows: user's operation behavior in virtual fort machine environment is mated with the data in main frame defence rule, and the interception operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
Further, described daily record generation module, specifically for: defending to set up user data information in rule at described main frame and extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
Further, also include reducing disk module, be used for utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilize described initial snapshot reduction data in magnetic disk.
The invention has the beneficial effects as follows:
The present invention can effectively remove user and use the data remanence and infection that in hosted environment process, hosted environment are caused;
The present invention can effectively prevent rogue program, order, file etc. to be deposited with in main frame;
Further, the present invention extracts and preserves the data of user's operation information in virtual fort machine environment and generation, can be easy to later analysis and review;
Further, present invention achieves host disk reduction, on the basis that system environments is reduced, do and further reduce, it is possible to more effective removing user's residual data, infection data, and malicious data.
Accompanying drawing explanation
In order to be illustrated more clearly that the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of main frame defence method flow chart based on LXC container of the present invention;
Fig. 2 is a kind of main frame system of defense structure chart based on LXC container of the present invention.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the technical scheme in the embodiment of the present invention, and it is understandable to enable the above-mentioned purpose of the present invention, feature and advantage to become apparent from, and below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail.
The present invention gives a kind of main frame defence method embodiment based on LXC container, as it is shown in figure 1, include:
S101: set up at least one LXC container in main frame, and create main frame defence rule;
Such as: in main frame, set up WINDOWS7sp2 Ultimate and the LXC container of two kinds of operating systems of winxpsp3 version;Or in main frame, set up the LXC container of two WINDOWS7sp2 Ultimate operating systems;
S102: when user logs in main frame, distributes at random or is selected a LXC container as virtual fort machine environment by user;Described user logs in main frame and includes: local log-on, Telnet;
S103: user's operation in virtual fort machine environment is monitored, and defend dummy rules fort machine environment to detect in real time by main frame;
S104: extract the data of user's operation information in virtual fort machine environment and generation outputting log file by regulation;
S105: when user publishes main frame, reduces virtual fort machine environment, goes back original host initial environment.
Further, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
Further, described dummy rules fort machine environment is defendd to detect in real time by main frame, particularly as follows: user's operation behavior in virtual fort machine environment is mated with the data in main frame defence rule, and the interception operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
Further, the described data extracting user's operation information in virtual fort machine environment and generation by regulation, and outputting log file, particularly as follows: defend that rule is set up user data information at described main frame to extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
Further, also include utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilize described initial snapshot reduction data in magnetic disk.
The present invention gives a kind of main frame system of defense embodiment based on LXC container, as in figure 2 it is shown, include:
Main machine frame modeling block 201, for setting up at least one LXC container in main frame, and creates main frame defence rule;
Environment distribution module 202, for when user logs in main frame, distributing at random or selected a LXC container as virtual fort machine environment by user;Described user logs in main frame and includes: local log-on, Telnet;
Monitor and detection module 203, for user's operation in virtual fort machine environment is monitored, and is detected in real time by main frame defence dummy rules fort machine environment;
Daily record generation module 204, for extracting the data of user's operation information in virtual fort machine environment and generation by regulation, and outputting log file;
Main frame recovery module 205, when publishing main frame for user, reduces virtual fort machine environment, goes back original host initial environment.
Further, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
Further, described dummy rules fort machine environment is defendd to detect in real time by main frame, particularly as follows: user's operation behavior in virtual fort machine environment is mated with the data in main frame defence rule, and the interception operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
Further, described daily record generation module 204, specifically for: defend that rule is set up user data information at described main frame and extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
Further, also include reducing disk module, be used for utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilize described initial snapshot reduction data in magnetic disk.
In this specification, the embodiment of method adopts the mode gone forward one by one to describe, and for the embodiment of system, owing to it is substantially similar to embodiment of the method, so what describe is fairly simple, relevant part illustrates referring to the part of embodiment of the method.For prior art can not effectively solve hosted environment run application program or by malicious attack after, the deficiency that cleaning information residual, recovery file are distorted, the present invention proposes a kind of main frame defence method based on LXC container and system, and the present invention can effectively remove user and use the data remanence and infection that in hosted environment process, hosted environment are caused;The present invention can effectively prevent rogue program, order, file etc. to be deposited with in main frame;Further, the present invention extracts and preserves the data of user's operation information in virtual fort machine environment and generation, can be easy to later analysis and review;Further, present invention achieves host disk reduction, on the basis that system environments is reduced, do and further reduce, it is possible to more effective removing user's residual data, infection data, and malicious data.
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention has many deformation and is varied without departing from the spirit of the present invention, it is desirable to appended claim includes these deformation and is varied without departing from the spirit of the present invention.

Claims (10)

1. the main frame defence method based on LXC container, it is characterised in that including:
Main frame is set up at least one LXC container, and creates main frame defence rule;
When user logs in main frame, distribute at random or selected a LXC container as virtual fort machine environment by user;
User's operation in virtual fort machine environment is monitored, and defends dummy rules fort machine environment to detect in real time by main frame;
The data of user's operation information in virtual fort machine environment and generation outputting log file is extracted by regulation;
When user publishes main frame, reduce virtual fort machine environment, go back original host initial environment.
2. the method for claim 1, it is characterized in that, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
3. method as claimed in claim 2, it is characterized in that, described by main frame defend dummy rules fort machine environment detect in real time, particularly as follows: defend the data in rule to mate with main frame user's operation behavior in virtual fort machine environment, and intercept the operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
4. the method as described in claim 1 or 2 or 3, it is characterized in that, the described data extracting user's operation information in virtual fort machine environment and generation by regulation, and outputting log file, particularly as follows: defend that rule is set up user data information at described main frame to extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
5. the method as described in claim 1 or 2 or 3, it is characterised in that also include utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilizes described initial snapshot reduction data in magnetic disk.
6. the main frame system of defense based on LXC container, it is characterised in that including:
Main machine frame modeling block, for setting up at least one LXC container in main frame, and creates main frame defence rule;
Environment distribution module, for when user logs in main frame, distributing at random or selected a LXC container as virtual fort machine environment by user;
Monitor and detection module, for user's operation in virtual fort machine environment is monitored, and is detected in real time by main frame defence dummy rules fort machine environment;
Daily record generation module, for extracting the data of user's operation information in virtual fort machine environment and generation by regulation, and outputting log file;
Main frame recovery module, when publishing main frame for user, reduces virtual fort machine environment, goes back original host initial environment.
7. system as claimed in claim 6, it is characterized in that, described main frame defence rule includes: sensitive information, malicious file batch program, batch processing list, and wherein said sensitive information includes: sensitive order, sensitive program, sensitive data, sensitive trigger operation.
8. system as claimed in claim 7, it is characterized in that, described by main frame defend dummy rules fort machine environment detect in real time, particularly as follows: defend the data in rule to mate with main frame user's operation behavior in virtual fort machine environment, and intercept the operation behavior that the match is successful;When detect there is malicious file in virtual fort machine environment time, malicious file is put into batch processing list, and starts malicious file batch program, malicious file is processed.
9. the system as described in claim 6 or 7 or 8, it is characterized in that, described daily record generation module, specifically for: defend that rule is set up user data information at described main frame and extract catalogue, extract the data of catalog extraction user operation information in virtual fort machine environment and generation according to described user data information, outputting log file also preserves.
10. the system as described in claim 6 or 7 or 8, it is characterised in that also include reducing disk module, is used for utilizing disk file snapshot tool that overall disk is done initial snapshot, when user publishes main frame, utilizes described initial snapshot reduction data in magnetic disk.
CN201510999175.2A 2015-12-28 2015-12-28 LXC container-based host defense method and system Pending CN105740705A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510999175.2A CN105740705A (en) 2015-12-28 2015-12-28 LXC container-based host defense method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510999175.2A CN105740705A (en) 2015-12-28 2015-12-28 LXC container-based host defense method and system

Publications (1)

Publication Number Publication Date
CN105740705A true CN105740705A (en) 2016-07-06

Family

ID=56296111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510999175.2A Pending CN105740705A (en) 2015-12-28 2015-12-28 LXC container-based host defense method and system

Country Status (1)

Country Link
CN (1) CN105740705A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804202A (en) * 2020-12-30 2021-05-14 平安证券股份有限公司 Multi-internetwork data security interaction method and device, server and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102682229A (en) * 2011-03-11 2012-09-19 北京市国路安信息技术有限公司 Malicious code behavior detection method based on virtualization technology
CN102821161A (en) * 2012-08-24 2012-12-12 北京神州绿盟信息安全科技股份有限公司 Method, device and system for network security auditing
CN103186740A (en) * 2011-12-27 2013-07-03 北京大学 Automatic detection method for Android malicious software
CN103377120A (en) * 2012-04-24 2013-10-30 深圳市财付通科技有限公司 Test method and device for application programs
CN103747089A (en) * 2014-01-14 2014-04-23 浪潮电子信息产业股份有限公司 File transfer auditing system and method based on bastion machine
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102682229A (en) * 2011-03-11 2012-09-19 北京市国路安信息技术有限公司 Malicious code behavior detection method based on virtualization technology
CN103186740A (en) * 2011-12-27 2013-07-03 北京大学 Automatic detection method for Android malicious software
CN103377120A (en) * 2012-04-24 2013-10-30 深圳市财付通科技有限公司 Test method and device for application programs
CN102821161A (en) * 2012-08-24 2012-12-12 北京神州绿盟信息安全科技股份有限公司 Method, device and system for network security auditing
CN103747089A (en) * 2014-01-14 2014-04-23 浪潮电子信息产业股份有限公司 File transfer auditing system and method based on bastion machine
CN104766011A (en) * 2015-03-26 2015-07-08 国家电网公司 Sandbox detection alarming method and system based on main engine characteristic
CN104765682A (en) * 2015-03-30 2015-07-08 微梦创科网络科技(中国)有限公司 Offline detection method and system for cross-site scripting vulnerability

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804202A (en) * 2020-12-30 2021-05-14 平安证券股份有限公司 Multi-internetwork data security interaction method and device, server and storage medium
CN112804202B (en) * 2020-12-30 2023-04-11 平安证券股份有限公司 Multi-internetwork data security interaction method and device, server and storage medium

Similar Documents

Publication Publication Date Title
KR102047782B1 (en) Method and apparatus for recognizing cyber threats using correlational analytics
EP3411825B1 (en) Systems and methods for modifying file backups in response to detecting potential ransomware
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
JP6432210B2 (en) Security system, security method, security device, and program
Hemsley et al. A history of cyber incidents and threats involving industrial control systems
WO2009093226A3 (en) A method and apparatus for fingerprinting systems and operating systems in a network
CN104778423B (en) The webpage integrity assurance of watermark contrast based on file driving
WO2007002398A3 (en) System and method for virtualizing backup images
CN109376537B (en) Asset scoring method and system based on multi-factor fusion
EP3430558B1 (en) Detecting a deviation of a security state of a computing device from a desired security state
TWI760655B (en) data scanning system
CN103559251B (en) Data security protection method based on Information hiding
CN105740705A (en) LXC container-based host defense method and system
CN104735069A (en) High-availability computer cluster based on safety and reliability
CN111083307A (en) File detection and cracking method based on steganography
CN102592078A (en) Method for identifying self-propagation of malicious software by extracting function call sequence chacteristics
CN111061593B (en) Electronic evidence obtaining system and method
CN111563256A (en) Safe big data collection and storage method
CN104850781A (en) Method and system for dynamic multilevel behavioral analysis of malicious code
CN109472139B (en) Method and system for preventing Lesox virus from secondarily encrypting host document
CN101415000B (en) Method for preventing Dos aggression of business support system
KR101725670B1 (en) System and method for malware detection and prevention by checking a web server
CN104809801A (en) Processing method for image of paper money
CN112565246A (en) Network anti-attack system and method based on artificial intelligence
CN106572083A (en) Log processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160706

RJ01 Rejection of invention patent application after publication