Method and device for detecting malicious software

A malicious software and detection method technology, applied in the field of information security, can solve problems such as inability to clear, incapable of comprehensive killing, eradication of viruses, and inability to meet the needs of user information security, etc., to achieve the effect of information security protection

Inactive Publication Date: 2009-12-16
BEIJING QIHOO TECH CO LTD
View PDF1 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This existing killing method can be easily avoided for cleverly disguised malicious software, and it is impossible to remove it.
In addition, after the existing anti-virus tools or software identify a certain virus file, when faced with the deformation of malware or the attack form of multi-module and multi-component, they can only find and solve the superficial problems. It cannot play the role of comprehensively killing and eradicating viruses
This obviously cannot meet the needs of users for information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious software
  • Method and device for detecting malicious software
  • Method and device for detecting malicious software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solution and advantages of the present invention clearer, the malicious software detection mechanism of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific implementations described here are only used to explain the inventive concept of the malicious software detection mechanism of the present invention, and are not intended to limit the present invention.

[0022] figure 1 Schematic diagram of malware evolution. Such as figure 1 As shown, the malware initially appears as the original root carrier M, which has a strong camouflage ability, and can be generated or released by running in the user system (but not limited to these two relationships, which will be described in detail later) At least one or more subcarriers C 11 ...C 1n , at least one subcarrier C produced or released ij They can also be used as root vectors ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for detecting malicious software, which are used for detecting the malicious software. The invention can monitor and record the development change of the malicious software, can traced back the root of the virus, and can correspondingly detect the distortion relative to the malicious software or all the components when the problem occurs. The invention can emphasize internal change and relation when concerning the fake surface of the malicious software, thereby providing full guarantee for information safety of a user system.

Description

technical field [0001] The invention relates to the field of information security, in particular to the detection of malicious software. Background technique [0002] Nowadays, with the improvement of informatization and the continuous introduction of various applicable technologies, it is more convenient for users to carry out various activities related to digital information, and it is undeniable that users are more closely related to informatization and digitization . Along with this, however, digital information crimes such as attacks (especially via the Internet) on personal computers, servers, or other computerized devices occur frequently. Obviously, the current underground digital economy has become increasingly industrialized and large-scale, and its corresponding criminal activities are becoming more and more hidden, and the attack methods of malware have been greatly developed. For example, the previous single file has developed into a multi-module and multi-com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56
CPCG06F21/552G06F21/562G06F2221/033
Inventor 陆剑锋曹家鑫李子拓邹贵强潘剑锋武健袁翔
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products