Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for sorting network virus reports

A sorting method and network virus technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve problems such as large-scale spread, confidential information theft, wide coverage, etc., to achieve comprehensive sorting, easy implementation, simple and clear Effect

Inactive Publication Date: 2010-09-15
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network viruses spread through the network, especially the Internet and its application systems, have a wide range of influence and coverage, and can cause network congestion or even paralysis, loss of shared resources, and theft of confidential information in a short period of time, resulting in huge losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for sorting network virus reports
  • Method for sorting network virus reports
  • Method for sorting network virus reports

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] 1. Virus report submission and processing process

[0017] When the user terminal finds that its computer is running abnormally, such as the central processing unit works at a peak when not performing heavy work, the memory is heavily occupied, the hard disk is constantly working, or the free space is shrinking abnormally, etc., or a suspected malicious computer is found in the computer memory. process, or when a suspected malicious file is found on the auxiliary storage of the computer, or when the local anti-virus software finds that a certain software is very suspicious, but it is not enough to determine that it is a malicious software containing a network virus program, the system can follow the following procedures Work:

[0018] ① The user terminal sends a report and related virus samples to the portal node.

[0019] ② After the system server receives the report, it first compares it with the report in the virus report database.

[0020] There are two types of r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a current anti-virus system, a server can receive virus reports from each user terminal node; when the server receives a large quantity of virus reports from different user terminals, the strategy for evaluating and preferably sorting the virus reports becomes a key point of impacting an entire system to improve the network virus resistance. The invention relates to a method for sorting network virus reports, which is used for anti-virus software capable of being adopted in an Internet or Intranet-based network computing environment. In the method, the virus reports submitted by users are sorted comprehensively according to the number of the virus reports and the confidence level of the users; and units who are used for solving virus problems are allowed to utilize sorted network virus report lists, so that the most valuable virus reports can be preferably processed.

Description

technical field [0001] The invention is a method for sorting network virus reports that can be used for anti-virus software in a network computing environment based on the Internet or an intranet. The technology belongs to the cross-technical application field of distributed computing, information security, computer network and computer software. Background technique [0002] Network viruses include computer viruses, network worms, backdoor Trojan horses, spyware, etc. The excellent resource sharing and communication functions of the network provide a natural breeding ground for the spread, infection and destruction of network viruses. Network viruses spread through the network, especially the Internet and its application systems, have a wide range and coverage, and can cause network congestion or even paralysis, loss of shared resources, and theft of confidential information in a short period of time, resulting in huge losses. [0003] The main means of defending against n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/00G06F21/50
Inventor 徐小龙程春玲熊婧夷赵昌耀柴倩杨宝春钱建屹
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products