监控操作系统作为信息保护的手段

Alexander Labinsky
{"title":"监控操作系统作为信息保护的手段","authors":"Alexander Labinsky","doi":"10.61260/2307-7476-2024-1-16-23","DOIUrl":null,"url":null,"abstract":"The article considers one of the methods of information protection on the computer – monitoring of the operating system. \nMalicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware. \nThe solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer. \nThe article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.","PeriodicalId":477082,"journal":{"name":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","volume":"129 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE MONITORING OF OPERATING SYSTEM AS THE MEANS OF THE INFORMATION PROTECTION\",\"authors\":\"Alexander Labinsky\",\"doi\":\"10.61260/2307-7476-2024-1-16-23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article considers one of the methods of information protection on the computer – monitoring of the operating system. \\nMalicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware. \\nThe solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer. \\nThe article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.\",\"PeriodicalId\":477082,\"journal\":{\"name\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"volume\":\"129 2\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.61260/2307-7476-2024-1-16-23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.61260/2307-7476-2024-1-16-23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文探讨了计算机信息保护的方法之一--监控操作系统。计算机上的恶意软件数量众多,它们不断更新,并出现了具有新恶意工作原理的新程序。因此,使用杀毒软件和反间谍软件往往效果不佳,因为它们的工作原理是特征搜索(样本搜索),因此无法检测到新的恶意软件。解决这一问题的办法是使用各种实用程序(服务程序)来监控(研究)计算机上安装的操作系统。本文将详细介绍用于监控电脑上安装的操作系统的实用程序。这是操作系统的监控实用程序:文件监控器(监控文件操作),可实时监控所有文件操作;注册表监控器(监控注册表操作);TCP 视图(监控网络活动),其特点是将监听端口或打开的连接与使用它的进程绑定;自动运行应用程序控制实用程序 Auto Runs,可分析数十种不同的自动运行方法,包括经典自动运行方法、不同类型资源管理器的扩展、调度程序作业、服务和驱动程序、打印库和提供程序;进程资源管理器实用程序,可更改进程的优先级、停止进程及其所有线程、强制结束进程。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
THE MONITORING OF OPERATING SYSTEM AS THE MEANS OF THE INFORMATION PROTECTION
The article considers one of the methods of information protection on the computer – monitoring of the operating system. Malicious software for computers are numerous, they are constantly updated and new programs with new principles of malicious work appear. Therefore, the use of antivirus and anti-spyware is often ineffective, as they work on the principle of signature search (sample search) and therefore cannot detect new varieties of malware. The solution to this problem is the use of various utilities (service programs) for monitoring (research) of the operating system installed on the computer. The article describes in detail the utilities for monitoring the operating system installed on the PC. This is a monitoring utility of the operating system: File Monitor (monitoring file operations), which allows you to monitor all file operations in real time; Registry Monitor (monitoring registry operations); TCP View (monitoring network activity)a feature of which is the binding of the listening port or open connection to the process that uses it; the auto run application control utility Auto Runs, which analyzes dozens of different autorun methods, including classic autorun methods, extensions of different types of explorer, scheduler jobs, services and drivers, print library and providers; Process Explorer utility, which allows you to change the priority of the process, stop the process and all its threads, force the process to end.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信