{"title":"监控操作系统作为信息保护的手段","authors":"Alexander Labinsky","doi":"10.61260/2307-7476-2024-1-16-23","DOIUrl":null,"url":null,"abstract":"The article considers one of the methods of information protection on the computer – monitoring of the operating system. \nMalicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware. \nThe solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer. \nThe article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.","PeriodicalId":477082,"journal":{"name":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","volume":"129 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE MONITORING OF OPERATING SYSTEM AS THE MEANS OF THE INFORMATION PROTECTION\",\"authors\":\"Alexander Labinsky\",\"doi\":\"10.61260/2307-7476-2024-1-16-23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article considers one of the methods of information protection on the computer – monitoring of the operating system. \\nMalicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware. \\nThe solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer. \\nThe article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.\",\"PeriodicalId\":477082,\"journal\":{\"name\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"volume\":\"129 2\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.61260/2307-7476-2024-1-16-23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.61260/2307-7476-2024-1-16-23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
本文探讨了计算机信息保护的方法之一--监控操作系统。计算机上的恶意软件数量众多,它们不断更新,并出现了具有新恶意工作原理的新程序。因此,使用杀毒软件和反间谍软件往往效果不佳,因为它们的工作原理是特征搜索(样本搜索),因此无法检测到新的恶意软件。解决这一问题的办法是使用各种实用程序(服务程序)来监控(研究)计算机上安装的操作系统。本文将详细介绍用于监控电脑上安装的操作系统的实用程序。这是操作系统的监控实用程序:文件监控器(监控文件操作),可实时监控所有文件操作;注册表监控器(监控注册表操作);TCP 视图(监控网络活动),其特点是将监听端口或打开的连接与使用它的进程绑定;自动运行应用程序控制实用程序 Auto Runs,可分析数十种不同的自动运行方法,包括经典自动运行方法、不同类型资源管理器的扩展、调度程序作业、服务和驱动程序、打印库和提供程序;进程资源管理器实用程序,可更改进程的优先级、停止进程及其所有线程、强制结束进程。
THE MONITORING OF OPERATING SYSTEM AS THE MEANS OF THE INFORMATION PROTECTION
The article considers one of the methods of information protection on the computer – monitoring of the operating system.
Malicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware.
The solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer.
The article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.