METHOD OF INTRUSION DETECTION IN TERMINAL DEVICE AND INTRUSION DETECTING APPARATUS
First Claim
1. A method of intrusion detection with respect to each of a plurality of operating systems in a terminal device that supports driving of the plurality of operating systems, the method comprising:
- collecting, at a first operating system of the plurality of operating systems in the terminal device, intrusion detection data from at least a second operating system of the plurality of operating systems in the terminal device;
performing, at the first operating system in the terminal device, an intrusion detection with respect to the at least a second operating system in the terminal device using the collected intrusion detection data; and
performing a selective approach control with respect to the at least a second operating system of the plurality of operating systems based on a result of the performing the intrusion detection,wherein the performing the intrusion detection comprises analyzing the collected intrusion data and determining whether there is an intrusion in the at least a second operating system, andwherein the performing the selective approach control comprises controlling of a ratio of using a central processing unit or memory of the terminal device, by the at least a second operating system into which intrusion is determined to have occurred among the plurality of operating systems.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of intrusion detection in a terminal device that supports driving of a plurality of operating systems, is provided. The method includes collecting at a first operating system of the plurality of operating systems intrusion detection data for analyzing whether there is an intrusion in at least a second operating system of the plurality of operating systems; and performing at the first operating system an intrusion detection with respect to the at least a second operating system using the collected intrusion detection data.
-
Citations
16 Claims
-
1. A method of intrusion detection with respect to each of a plurality of operating systems in a terminal device that supports driving of the plurality of operating systems, the method comprising:
-
collecting, at a first operating system of the plurality of operating systems in the terminal device, intrusion detection data from at least a second operating system of the plurality of operating systems in the terminal device; performing, at the first operating system in the terminal device, an intrusion detection with respect to the at least a second operating system in the terminal device using the collected intrusion detection data; and performing a selective approach control with respect to the at least a second operating system of the plurality of operating systems based on a result of the performing the intrusion detection, wherein the performing the intrusion detection comprises analyzing the collected intrusion data and determining whether there is an intrusion in the at least a second operating system, and wherein the performing the selective approach control comprises controlling of a ratio of using a central processing unit or memory of the terminal device, by the at least a second operating system into which intrusion is determined to have occurred among the plurality of operating systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 16)
-
-
9. An intrusion detecting apparatus that is installed in a first operating system of a plurality of operating systems and performs intrusion detection with respect to each of the plurality of operating systems in a terminal device comprising a memory that stores the plurality of operating systems and a central processing unit that supports driving of the plurality of operating systems, the intrusion detecting apparatus comprising:
-
a data collecting unit that collects intrusion detection data from at least a second operating system of a plurality of operating systems in the terminal device; and an intrusion detecting unit performs intrusion detection with respect to the at least a second operating system in the terminal device using the intrusion detection data collected by the data collecting unit; and a virtualization unit that collects the intrusion detection data from the at least a second operating system of the plurality of operating systems, and transmits the intrusion detection data to the data collecting unit if the operating systems are separated so as to not mutually approach each other, wherein the intrusion detection performed by the intrusion detecting unit comprises analyzing the collected intrusion data and determining whether there is an intrusion in the at least a second operating system, and wherein the virtualization unit performs selective approach control with respect to the at least a second operating system based on the intrusion detection performance result of the intrusion detecting unit, and controls a ratio of using a central processing unit or memory of the terminal device by the at least a second operating system, which is determined as intruded into, among the plurality of operating systems. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification