{"title":"Linux进程实时监控技术的研究与实现","authors":"Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong","doi":"10.1109/ICCIS.2012.342","DOIUrl":null,"url":null,"abstract":"With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"The Research and Implementation of the Linux Process Real-Time Monitoring Technology\",\"authors\":\"Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong\",\"doi\":\"10.1109/ICCIS.2012.342\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.\",\"PeriodicalId\":269967,\"journal\":{\"name\":\"2012 Fourth International Conference on Computational and Information Sciences\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Computational and Information Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIS.2012.342\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Computational and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIS.2012.342","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Research and Implementation of the Linux Process Real-Time Monitoring Technology
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.