Summary of the invention
The embodiment of the invention provides a kind of computer network security detection methods, can solve existing in the prior art
Problem.
The present invention provides a kind of computer network security detection methods, method includes the following steps:
Step 1, a safe space is established on the computer's hard;
Step 2, after computer receives or downloads file, first file is run in safe space, and after parsing operation
File, if parsing result shows in file there are malicious code, direct deletion file;
Step 3, behind each computer booting connection internet, it whether there is security breaches in inspection system, if there is
It then inquires with the presence or absence of A level security loophole in these security breaches, and if so, directly downloading simultaneously patching bugs;
Step 4, in computer use process real-time monitoring system resource service condition, if system resource occupy it is super
Cross it is a certain amount of, then inquiry system resource occupation be more than a certain amount of process, according to process list judge these processes whether be by
The process of trust directly closes not trusted process if there are not trusted processes in these processes.
Preferably, in step 1 after establishing the safe space pop-up notification dialog box on a display screen.
Preferably, safe space is being established if being equipped with two or more independent hard disks on computer in step 1
When inquire user, then establish safe space in the hard disk of selection.
Preferably, file pops up prompted dialog frame on a display screen in step 2 after deleting, and user's file is reminded to be deleted
It removes.
Preferably, then remind user that there are security breaches, user's choosings if there is no A level security loophole in step 3
Start to download and repair these security breaches after selecting reparation.
Preferably, ignore in step 4 if it is trusted process that system resource, which occupies over a certain amount of process all,
This system resource occupies over a certain amount of event.
One of embodiment of the present invention computer network security detection method, establishes one on the computer's hard first
Safe space is first run in downloaded or after receiving file in this safe space, if there are malice generations in file
Code then directly deletes file, and also inquiry whether there is security breaches in computer use, very big if there is threat degree
A level security loophole then directly download and repair, while the occupancy of real-time monitoring system resource is gone back, when occupancy is more than certain
Judge when value the high process of occupancy whether be it is trusted, directly terminate process if not trusted.Method of the invention
It is analyzed from network of computer to the access itself, in security breaches, the downloading many aspects such as safety and resource occupation
Detection management is carried out, computer is measured in real time and is protected, is suitable for home computer and uses.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig.1, the embodiment of the invention provides a kind of computer network security detection method, this method includes following step
It is rapid:
Step 1, a safe space is established on the computer's hard, and the safe space is invisible to user, and cannot
It is deleted or modified by user.The size of the safe space is generally advisable within 10G, avoids occupying the excessive of hard disc of computer
Space impacts routine use.Certainly, there is event in order to avoid user is mistakenly considered computer without knowing it
Barrier, needs pop-up notification dialog box on a display screen after establishing the safe space, so that user understands.
In the present embodiment, due to hard disc of computer generally all can subregion, and computer operating system is all mounted on C disk
In, then safe space is also advisable on C disk with establishing.If being equipped with two or more independent hard disks on computer,
User can be inquired when establishing safe space, establish safe space in the hard disk of selection after user's selection.
Step 2, after computer receives or downloads file, first file is run in safe space, and after parsing operation
File, if parsing result shows in file there are any malicious code, direct deletion file, and after file deletion
Prompted dialog frame is popped up on display screen, reminding file is deleted.
Step 3, behind each computer booting connection internet, it whether there is security breaches in inspection system, if there is
It then inquires with the presence or absence of A level security loophole in these security breaches, and if so, directly downloading simultaneously patching bugs, and is repairing
User is reminded after the completion;Then remind user there are security breaches if there is no A level security loophole, user selects to repair
After start to download and repair these security breaches.
Loophole is generally divided into three-level to the degree of danger of destination host by it:
(1) A level vulnerability
It is the loophole for allowing malice invader to access and may destroying entire goal systems, e.g., allows remote user
The loophole of unauthorized access.A level vulnerability is to threaten a kind of maximum loophole, and most of A level vulnerabilities are due to poor system
Manage or configure it is wrong caused by.Meanwhile all can almost may be used in any type of remote access software in different places
To find such loophole.Such as: some network programs such as FTP, GOPHER, TELNET, SENDMAIL, FINGER are commonly present
Serious A level vulnerability.
(2) B level vulnerability
It is the loophole for allowing local user to improve access authority, and its acquisition system may being allowed to control.For example, allowing
Local user (local user is all users for possessing account on target machine or network, has no the meaning on geographical location)
The loophole of unauthorized access.Most of B level vulnerabilities are as caused by some defects or code error in application program on network.
SENDMAIL and TELNET is typical example.Delay caused by because of the problem of programming defect or programming language
Rushing area's overflow problem is a typical B level security loophole.According to statistics, attack is carried out using buffer overflow to account for all systems and attack
80% or more hit.
(3) C level vulnerability
It is any permission user interruption, the loophole for reducing or hindering system operatio.Such as, refusal service loophole.Refusal clothes
The danger that business attack does not destroy destination host, attack are intended merely to reach certain purpose, carry out event to destination host
Meaning is disturbed.A kind of most typical Denial of Service attack is SYN-Flooder, i.e., a large amount of connection request is sent to target by invader
Server, destination host are had to the SYN for handling these " half-open ", however can not obtain ACK answer, and server will be used quickly
Complete all memories and hang up, any user cannot be serviced from server again.
Step 4, in computer use process real-time monitoring system resource service condition, if system resource occupy it is super
Cross a certain amount of, such as more than 90%, then inquiry system resource occupation is more than a certain amount of process, is arranged according to the process of pre-production
Table judges whether these processes are trusted processes, if it is ignores this event;If in these processes exist not by
The process of trust then directly closes not trusted process, and the process for avoiding these not trusted influences computer normal use.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.