Means of defence and device, system, storage medium, the electronic device of system file
Technical field
The present invention relates to computer fields, means of defence and device, system in particular to a kind of system file,
Storage medium, electronic device.
Background technique
System file is the basic of the normal operation of system, once controlled by viral malice, caused by influence and lose non-
Chang great.
In the related technology, because system file is the file below system, and system itself is usually safety, so being
System file is all not required to be protected, and default is considered as safe.In this way it is easy to cause to run the leakage of the security protection of the system
Hole.
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Summary of the invention
The embodiment of the invention provides a kind of means of defence of system file and device, system, storage medium, electronics dresses
It sets.
According to one embodiment of present invention, a kind of means of defence of system file is provided, comprising: in identification equipment
The type of file destination;When the type of the file destination is system file, the operation row that the file destination is initiated is detected
For;Judge whether the operation behavior is legal according to the default access range of the system file, wherein the default access model
Corresponding permissions list is enclosed to be arranged in server local.
Optionally, according to the default access range of the system file judge the operation behavior it is whether legal include: true
Predetermined registration operation behavior set corresponding to the fixed default access range;Judge whether the predetermined registration operation behavior set includes institute
State operation behavior;When the predetermined registration operation behavior set includes the operation behavior, determine that the operation behavior is legal;Institute
When to state predetermined registration operation behavior set do not include the operation behavior, determine that the operation behavior is illegal.
Optionally, before the default access range according to the system file judges whether the operation behavior is legal,
The method also includes: all valid operation behaviors of the system file are collected by big data platform, by all conjunctions
Method operation behavior is set as the default access range, wherein the big data platform is runs institute under multiple security contexts
State the platform of system file.
Optionally, the system file includes system program or system process, identifies the type of the file destination in equipment
It include: the system that identification runs the file destination;When the system is operating system, the mesh is identified by file suffixes
Mark the type of file, wherein the file destination includes following one: program, process, the type includes following one: being
System file, user file.
Optionally, after the default access range according to the system file judges whether the operation behavior is legal,
The method also includes: when the operation behavior is legal, the operation behavior of letting pass;When the operation behavior is illegal,
Intercept the operation behavior.
According to another embodiment of the invention, a kind of protective device of system file is provided, comprising: identification module,
The type of file destination in equipment for identification;Detection module, for the type in the file destination be system file when,
Detect the operation behavior that the file destination is initiated;Judgment module, for being sentenced according to the default access range of the system file
Whether the operation behavior of breaking is legal, wherein the corresponding permissions list of the default access range is arranged in server local.
Optionally, the judgment module includes: the first determination unit, for determining corresponding to the default access range
Predetermined registration operation behavior set;Judging unit, for judging whether the predetermined registration operation behavior set includes the operation behavior;The
Two determination units, for determining that the operation behavior is legal when the predetermined registration operation behavior set includes the operation behavior;
When the predetermined registration operation behavior set does not include the operation behavior, determine that the operation behavior is illegal.
Optionally, described device further include: setup module, in the judgment module according to the pre- of the system file
If before extent of competence judges whether the operation behavior is legal, all conjunctions of the system file are collected by big data platform
All valid operation behaviors are set the default access range by method operation behavior, wherein the big data platform is
The platform of the system file is run under multiple security contexts.
Optionally, the system file includes system program or system process, and the identification module includes: the first identification list
Member runs the system of the file destination for identification;Second recognition unit, for leading to when the system is operating system
Cross the type that file suffixes identifies the file destination, wherein the file destination includes following one: program, process, it is described
Type includes following one: system file, user file.
Optionally, described device further include: management module, for sentencing according to the default access range of the system file
After whether the operation behavior of breaking is legal, when the operation behavior is legal, the operation behavior of letting pass;It goes in the operation
When being illegal, the operation behavior is intercepted.
The present embodiment additionally provides a kind of guard system of system file, including server and client side, the server
It include: identification module, the type of the file destination in equipment for identification;Detection module, for the class in the file destination
When type is system file, the operation behavior that the file destination is initiated is detected;Judgment module, for according to the system file
Default access range judges whether the operation behavior is legal, wherein the corresponding permissions list setting of the default access range
In server local;The client is connect with the server, is used for the system file described in local runtime.
According to still another embodiment of the invention, a kind of storage medium is additionally provided, meter is stored in the storage medium
Calculation machine program, wherein the computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
According to still another embodiment of the invention, a kind of electronic device, including memory and processor are additionally provided, it is described
Computer program is stored in memory, the processor is arranged to run the computer program to execute any of the above-described
Step in embodiment of the method.
Through the invention, the operation behavior initiated by detection system file, and according to the default power of the system file
Limit range judges whether the operation behavior of system file is legal, and then whether decision-making system file is utilized by rogue program, can be with
Loss caused by system file is utilized by rogue program is prevented or reduced, solves the permission in the related technology due to system file
It is excessive and cause to be easy the technical issues of being attacked.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of hardware block diagram of the protection server of system file of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of the means of defence of system file according to an embodiment of the present invention;
Fig. 3 is the application scenario diagram of the embodiment of the present invention;
Fig. 4 is the structural block diagram of the protective device of file according to the system in the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can be mutual group
It closes.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Embodiment 1
Embodiment of the method provided by the embodiment of the present application one can mobile terminal, terminal, server or
It is executed in similar arithmetic unit.For running on the server, Fig. 1 is a kind of the anti-of system file of the embodiment of the present invention
Protect the hardware block diagram of server.As shown in Figure 1, server 10 may include one or more (only showing one in Fig. 1)
(processor 102 can include but is not limited to the processing dress of Micro-processor MCV or programmable logic device FPGA etc. to processor 102
Set) and memory 104 for storing data, optionally, above-mentioned server can also include setting for the transmission of communication function
Standby 106 and input-output equipment 108.It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate,
The structure of above-mentioned server is not caused to limit.For example, server 10 may also include it is more or less than shown in Fig. 1
Component, or with the configuration different from shown in Fig. 1.
Memory 104 can be used for storing computer program, for example, the software program and module of application software, such as this hair
The corresponding computer program of means of defence of one of bright embodiment system file, processor 102 are stored in by operation
Computer program in reservoir 104 realizes above-mentioned method thereby executing various function application and data processing.Storage
Device 104 may include high speed random access memory, may also include nonvolatile memory, as one or more magnetic storage device,
Flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise relative to processing
The remotely located memory of device 102, these remote memories can pass through network connection to server 10.The example of above-mentioned network
Including but not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include
The wireless network that the communication providers of server 10 provide.In an example, transmitting device 106 includes a network adapter
(Network Interface Controller, referred to as NIC), can be connected by base station with other network equipments so as to
It is communicated with internet.In an example, transmitting device 106 can be radio frequency (Radio Frequency, referred to as RF)
Module is used to wirelessly be communicated with internet.
A kind of means of defence of system file is provided in the present embodiment, and Fig. 2 is one kind according to an embodiment of the present invention
The flow chart of the means of defence of system file, as shown in Fig. 2, the process includes the following steps:
Step S202 identifies the type of the file destination in equipment;
The equipment of the present embodiment can be computer, notebook, printer, camera, and USB flash disk etc. can access network either
The electronic equipment that can be controlled.
Step S204 detects the operation that the file destination is initiated when the type of the file destination is system file
Behavior;
The scheme of the present embodiment further includes determining default access range corresponding with the system file.
Step S206 judges whether the operation behavior is legal according to the default access range of the system file, wherein
The corresponding permissions list of the default access range is arranged in server local.
Through the above steps, the operation behavior initiated by detection system file, and according to the default of the system file
Extent of competence judges whether the operation behavior of system file is legal, and then whether decision-making system file is utilized by rogue program, can
To prevent or reduce loss caused by system file is utilized by rogue program, solves the power in the related technology due to system file
It limits excessive and causes to be easy the technical issues of being attacked.
Optionally, judging whether the operation behavior is legal according to the default access range of the system file includes:
S11 determines predetermined registration operation behavior set corresponding to the default access range;
Default access range is the extent of competence that system file can execute, including the first predetermined registration operation row that can be executed
For set, it can such as network, can control printer, user software etc. can be opened, and execute the (cannot be forbidden)
Two predetermined registration operation behavior set, can such as open other systems file, it is not possible to modify system file etc..
S12 judges whether the predetermined registration operation behavior set includes the operation behavior;
S13 determines that the operation behavior is legal when the predetermined registration operation behavior set includes the operation behavior;?
When the predetermined registration operation behavior set does not include the operation behavior, determine that the operation behavior is illegal.Such as current operation
Behavior is networking operation, then when can be determined as legal, current operation behavior to modify system file, is determined as illegal.
In the present embodiment, judge whether the operation behavior is legal in the default access range according to the system file
Before, scheme further include: all valid operation behaviors that the system file is collected by big data platform, by all conjunctions
Method operation behavior is set as the default access range, wherein the big data platform is runs institute under multiple security contexts
State the platform of system file.The system file can will be run in multiple application environments, such as in server-side in multiple equipment
Detect multiple equipment for being mounted with the system file, the operation behavior that collecting device generates after running the system file, then into
Row selection selects valid operation behavior therein, the toggle rate of operation behavior is such as determined as legal behaviour greater than preset threshold
Make behavior, the toggle rate of operation behavior is determined as valid operation behavior less than or equal to preset threshold;On the other hand, may be used
To judge to operate whether collected operation behavior is valid operation behavior according to operating result, operation behavior is generated default
The operation behavior of operating result is determined as valid operation behavior, and operation behavior is not generated to being determined as illegally for predetermined registration operation result
Operation behavior, wherein each operation behavior is corresponding with operating result.
Optionally, the system file includes system program or system process, identifies the type of the file destination in equipment
Include:
S21, the system that identification runs the file destination;The system of operating file can be operating system, operation system
Deng the permission of operating system is relatively high.
S22 identifies the type of the file destination by file suffixes, wherein institute when the system is operating system
Stating file destination includes following one: program, process, the type includes following one: system file, user file.System
There are many suffix of file, such as exe, com, bin: executable file;C, cc, cpp, java, pas: program source code;bat,
Sh: command file;Txt, doc: text data, text document;Lib, dll: library file;Zip, rar: compressed file;mpeg,
Mov, rm: multimedia file.It on the other hand, can be (publicly-owned, private by data type classifications to the file below operating system
Have), privately owned file is system file, and publicly-owned file is then user file or alternative document, and then determines that privately owned file is to need
The file type of protection, publicly-owned file are to be not required to file type to be protected.The present embodiment is except through suffix identification target text
Except the type of part, the label information (being such as user file with user name label) of file destination, liveness can also be passed through
(it is system file that liveness, which is greater than threshold value), the father file or storage location of the file destination (trigger system text to identify
The father file of part is centainly also a system file, is stored in system disk).
In the present embodiment, judge whether the operation behavior is legal in the default access range according to the system file
Later, further includes: when the operation behavior is legal, the operation behavior of letting pass;When the operation behavior is illegal, intercept
The operation behavior.
Optionally, the executing subject of above-mentioned steps can be the server etc. of the one or more clients of connection, client
Can be mobile terminal, PC etc., server can be SOCKS server, security server etc., but not limited to this.It is applying
When server end, server arrives multiple client by network connection, and priority assignation and security protection are carried out to it, and Fig. 3 is this
The application scenario diagram of inventive embodiments, server connect multiple client, the target text that server-side identification is run on the client
The operation behavior that part and the file destination are initiated intercepts the operation row in server-side when operation behavior is illegal
For.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of protective device of system file is additionally provided in the present embodiment, can be terminal or server, the device
For realizing above-described embodiment and preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term
The combination of the software and/or hardware of predetermined function may be implemented in " module ".Although device is preferably described in following embodiment
It is realized with software, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.
Fig. 4 is the structural block diagram of the protective device of file according to the system in the embodiment of the present invention, can be applied in client
Or in server, as shown in figure 4, the device includes: identification module 40, detection module 42, judgment module 44, wherein
Identification module 40, for identification type of the file destination in equipment;
When detection module 42 for the type in the file destination is system file, detects the file destination and initiate
Operation behavior;
Judgment module 44, for judging whether the operation behavior closes according to the default access range of the system file
Method, wherein the corresponding permissions list of the default access range is arranged in server local.
Optionally, the judgment module includes: the first determination unit, for determining corresponding to the default access range
Predetermined registration operation behavior set;Judging unit, for judging whether the predetermined registration operation behavior set includes the operation behavior;The
Two determination units, for determining that the operation behavior is legal when the predetermined registration operation behavior set includes the operation behavior;
When the predetermined registration operation behavior set does not include the operation behavior, determine that the operation behavior is illegal.
Optionally, described device further include: setup module, in the judgment module according to the pre- of the system file
If before extent of competence judges whether the operation behavior is legal, all conjunctions of the system file are collected by big data platform
All valid operation behaviors are set the default access range by method operation behavior, wherein the big data platform is
The platform of the system file is run under multiple security contexts.
Optionally, the system file includes system program or system process, and the identification module includes: the first identification list
Member runs the system of the file destination for identification;Second recognition unit, for leading to when the system is operating system
Cross the type that file suffixes identifies the file destination, wherein the file destination includes following one: program, process, it is described
Type includes following one: system file, user file.
Optionally, described device further include: management module, for sentencing according to the default access range of the system file
After whether the operation behavior of breaking is legal, when the operation behavior is legal, the operation behavior of letting pass;It goes in the operation
When being illegal, the operation behavior is intercepted.
Embodiment additionally provides a kind of guard system of system file, including server and client side, the server packet
It includes: identification module, for identification type of the file destination in equipment;Detection module, for the type in the file destination
When for system file, the operation behavior that the file destination is initiated is detected;Judgment module, for according to the pre- of the system file
If extent of competence judges whether the operation behavior is legal, wherein the corresponding permissions list setting of the default access range exists
Server local;The client is connect with the server, is used for the system file described in local runtime.
It should be noted that terminal and server is only difference of the scheme in executing subject, in above-mentioned protective device
Each example and optinal plan equally adapt in the server, and generate identical technical effect.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong
Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any
Combined form is located in different processors.
Embodiment 3
The embodiments of the present invention also provide a kind of storage medium, computer program is stored in the storage medium, wherein
The computer program is arranged to execute the step in any of the above-described embodiment of the method when operation.
Optionally, in the present embodiment, above-mentioned storage medium can be set to store by executing based on following steps
Calculation machine program:
S1 identifies the type of the file destination in equipment;
S2 detects the operation behavior that the file destination is initiated when the type of the file destination is system file;
S3 judges whether the operation behavior is legal according to the default access range of the system file, wherein described pre-
If the corresponding permissions list of extent of competence is arranged in server local.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read-
Only Memory, referred to as ROM), it is random access memory (Random Access Memory, referred to as RAM), mobile hard
The various media that can store computer program such as disk, magnetic or disk.
The embodiments of the present invention also provide a kind of electronic device, including memory and processor, stored in the memory
There is computer program, which is arranged to run computer program to execute the step in any of the above-described embodiment of the method
Suddenly.
Optionally, above-mentioned electronic device can also include transmission device and input-output equipment, wherein the transmission device
It is connected with above-mentioned processor, which connects with above-mentioned processor.
Optionally, in the present embodiment, above-mentioned processor can be set to execute following steps by computer program:
S1 identifies the type of the file destination in equipment;
S2 detects the operation behavior that the file destination is initiated when the type of the file destination is system file;
S3 judges whether the operation behavior is legal according to the default access range of the system file, wherein described pre-
If the corresponding permissions list of extent of competence is arranged in server local.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment
Example, details are not described herein for the present embodiment.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
In above-described embodiment of the application, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the application whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered
It is considered as the protection scope of the application.