Computer safety monitoring system, comprehensive deciding device and method thereof
A computer security and monitoring system technology, applied in computer security devices, computing, instruments, etc., can solve problems such as different, real-time monitoring decisions and handling conflicts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0087] In the first embodiment of the present invention, the different decision-making modules in the computer security monitoring system obtain the data required for decision-making through their corresponding behavior collection modules.
[0088] Such as figure 1 As shown, the computer security monitoring system of the first embodiment of the present invention includes:
[0089] At least two independent decision-making subsystems corresponding to different malicious behavior knowledge bases, the malicious behavior knowledge base is used to store the second characteristic information of known malicious behaviors;
[0090] The first monitoring modules respectively corresponding to the different malicious behavior knowledge bases are used to obtain the first characteristic information of the first operation behavior whose operation object is the monitoring object, and send it to the corresponding independent decision-making subsystem, the first The structure of the feature inf...
no. 2 example
[0163] In the first embodiment of the present invention, different decision-making modules in the computer security monitoring system obtain the data required for decision-making through their corresponding behavior collection modules, and at the same time, each different decision-making module obtains data through their respective monitoring units The operation object is the first characteristic information of the first operation behavior of the monitoring object, and makes decisions independently.
[0164] In the first embodiment of the present invention, different decision-making modules in the computer security monitoring system use a unified monitoring module, and the monitored characteristic information is converted into characteristic information matching the malicious behavior knowledge base of each decision-making module through the conversion module , which are described in detail below.
[0165] Such as Figure 4 As shown, the computer security monitoring system of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 