Method and apparatus for scanning virus program

A virus program and scanning method technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve problems such as property infringement of network users, increase in data volume, and prolonging the time for virus program detection.

Active Publication Date: 2009-11-25
北京东方微点信息技术有限责任公司
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, as Trojan horse virus programs and backdoor virus programs have become a flood trend at this stage, they have caused great damage to the property of network users. and other processing methods to evade the detection and killing of anti-virus software, and in the existing virus program industry chain, the source code exchange method can also be used to avoid killing and thoroughly fight against anti-virus software
Therefore, the above-mentioned unfavorable factors cause anti-virus software to constantly analyze and summarize new features of v

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for scanning virus program
  • Method and apparatus for scanning virus program
  • Method and apparatus for scanning virus program

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] figure 1 It is a flow chart of the virus program scanning method according to an embodiment of the present invention. As shown in the figure, the method may include the following steps:

[0022] Step 101, acquiring file information of a file to be scanned.

[0023] Step 102, according to the file information, judge whether the file to be scanned is an executable file that only uses the standard dynamic library of the Windows operating system, if so, continue to execute the virus program scanning method described in this embodiment, otherwise obtain the next file to be scanned file, and re-execute the virus program scanning method described in this embodiment.

[0024] Since Microsoft's Windows (Windows TM ) The penetration rate of the operating system is very high. Therefore, in order to increase its own infection rate, most of the existing virus programs usually use the standard dynamic library of Microsoft's Windows operating system. If it is determined that an exec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and apparatus for scanning virus program, wherein, the method comprises: acquiring file information of the file to be scanned; judging whether the file to be scanned is an executable file only using a standard dynamic database of a viewfinder operating system or not, if yes, the executable file can be performed for enlightened scanning. The apparatus comprises an acquiring module, a first judging module and a scanning module. The invention can greatly reduce the numbers of the files which need to be performed for matched scanning, thereby improving the matching lookup efficiency, increasing the scanning speed and reducing the misinformation ratios greatly.

Description

technical field [0001] The invention relates to a virus program scanning method and device, belonging to computer virus program scanning technology. Background technique [0002] The heuristic scanning technology based on behavior analysis is a commonly used technology in the existing virus program scanning technology. It forms a behavior heuristic feature library by analyzing and summarizing the characteristics of most known computer Trojan horse virus programs or backdoor virus programs. , the behavior heuristic library has features and feature groups based on program behavior types, and the purpose of virus detection and killing is achieved by matching virus programs according to these features and feature groups. [0003] However, as Trojan horse virus programs and backdoor virus programs have become a flood trend at this stage, they have caused great damage to the property of network users. and other processing methods to evade the detection and killing of anti-virus s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/56
Inventor 郭明强司彦胜
Owner 北京东方微点信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products