信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 61-66.doi: 10.3969/j.issn.1671-1122.2014.08.011

• Orginal Article • Previous Articles     Next Articles

The Analysis of the Security Strategy based on Process Management

YANG Chun-hui, YAN Cheng-hua   

  1. Dept. of Security, Naval University of Engineering, Wuhan Hubei 430033, china
  • Received:2014-06-10 Online:2014-08-01

Abstract: The strategy of the process managements' security and analyses based on hook technology was put forward against the security problems of process management, which analyzing the types and characters of recent vicious process. And under the help of message processing mechanism of Windows, API functions' invocation technologies, database technologies, the rules of black and white list and so on to achieve the modularity of the collection of process, the analysis of process, the responses, the rules of black and white list, the database’s adding and the like to monitor and manage system process from the aspects of security, low power, self-protection and the like. To analyze the malicious process of suspicious, illegal and high memory consumption, this could make the process management operating safely. The results of the experiment validate that under the VC language platform and aiming at LAN environment to achieve the functions’ modularity respectively above mentioned and finally experimenting from two aspects: the test of function (commonly-used process, the collection of process, the analysis of process and so on) as well as the test of operational efficiency (the memory usage of the system itself and the usage of CPU) the project can achieve security management of the system process safely, quickly and accurately, monitoring and force close the vicious process, realize the function of self-protection for system process and lighten the monitoring burdens of the safety regulators, thus improving the efficiency in the work of network security.

Key words: process management, HOOK technology, API function, security, self-protection

CLC Number: