信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 61-66.doi: 10.3969/j.issn.1671-1122.2014.08.011

• 技术研究 • 上一篇    下一篇

基于进程管理的安全策略分析

杨春晖, 严承华   

  1. 海军工程大学信息安全系,湖北武汉 430033
  • 收稿日期:2014-06-10 出版日期:2014-08-01
  • 作者简介:杨春晖(1990-),男,河北,硕士研究生,主要研究方向:信息安全;严承华(1967-),男,湖北,副教授,博士,主要研究方向:信息安全与数字图像水印。
  • 基金资助:
    湖北省自然科学基金[2010CDB01501]

The Analysis of the Security Strategy based on Process Management

YANG Chun-hui, YAN Cheng-hua   

  1. Dept. of Security, Naval University of Engineering, Wuhan Hubei 430033, china
  • Received:2014-06-10 Online:2014-08-01

摘要: 文章针对进程管理的安全性问题,分析了目前进程的类型和特点,并对几种常见恶意进程进行介绍。结合主动查找和监控的思想,提出了一种基于HOOK技术的进程管理安全分析策略。该策略借助Windows消息处理机制、API函数调用技术、数据库技术以及黑白名单规则等,将进程采集、进程分析、响应、黑白名单规则以及数据库添加等功能模块化,从安全性、低耗能、自我保护等方面对计算机系统进程进行监控和管理。系统能够分析出可疑、非法、高内存消耗的恶意进程,实现进程管理的安全运行。文章方案在VC语言平台下,针对局域网环境,分别对上述功能模块进行代码实现,最后从功能性测试(常用进程、进程采集、进程分析等),运行效率测试(系统自身的内存占用、CPU占用等)两个方面进行实验。实验结果表明,该方案可以安全、快速、准确地实现对系统进程的安全管理、对恶意进程的监控和强制关闭、对系统进程的自我保护功能,减轻安全管理人员监控的负担,从而提高其在网络安全工作中的效率。

关键词: 进程管理, HOOK技术, API函数, 安全性, 自我保护

Abstract: The strategy of the process managements' security and analyses based on hook technology was put forward against the security problems of process management, which analyzing the types and characters of recent vicious process. And under the help of message processing mechanism of Windows, API functions' invocation technologies, database technologies, the rules of black and white list and so on to achieve the modularity of the collection of process, the analysis of process, the responses, the rules of black and white list, the database’s adding and the like to monitor and manage system process from the aspects of security, low power, self-protection and the like. To analyze the malicious process of suspicious, illegal and high memory consumption, this could make the process management operating safely. The results of the experiment validate that under the VC language platform and aiming at LAN environment to achieve the functions’ modularity respectively above mentioned and finally experimenting from two aspects: the test of function (commonly-used process, the collection of process, the analysis of process and so on) as well as the test of operational efficiency (the memory usage of the system itself and the usage of CPU) the project can achieve security management of the system process safely, quickly and accurately, monitoring and force close the vicious process, realize the function of self-protection for system process and lighten the monitoring burdens of the safety regulators, thus improving the efficiency in the work of network security.

Key words: process management, HOOK technology, API function, security, self-protection

中图分类号: