Malicious code identification method based on cloud computing
A malicious code and malicious code detection technology, applied in the field of virus detection and protection, can solve problems such as accuracy decline, and achieve the effects of accurate judgment results, high recognition rate, and low false positive rate
Inactive Publication Date: 2012-09-12
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 32 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
As a result, the accuracy of traditional signature
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
![Examples No Example](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noExample.69c053e2.png)
PUM
![No PUM](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
The invention relates to a malicious code identification method based on cloud computing. The technical problems needing to be solved are that: 1, current malicious codes accelerate for variation and enable generated code bodies to have extremely low similarity by relying on a self encryption mechanism by constantly changing encryption keys, however, the conventional engine based on characteristic code detection has no way for identification, thereby causing constant reduction of searching and killing rate; and 2, with the development of the technology, malicious codes are added with more self-protection technologies which especially withstand a currently popular virtual machine searching and killing mechanism, so that a code which is very simple in real environment has an unusually complex analysis process in a virtual machine of a virus killing engine and finally can not be identified. Apparently, a new feasible scheme is needed to solve the identification on the malicious code at current environment, so as to realize effective defense.
Description
technical field [0001] The present invention is a solution for identifying malicious codes based on a cloud computing platform, which mainly solves the problems that current malicious codes mutate more and more quickly, and traditional virus database updates cannot achieve timely detection and killing, and belongs to the field of virus detection and protection. Background technique [0002] With the development of computer technology, especially the rapid development of computer networks, the number of malicious codes has an exponential growth trend. Early malicious codes did not adopt too many self-protection mechanisms, and all had fixed signatures. Therefore, anti-virus software can easily detect virus programs hidden in the system by using virus signature matching. However, with the development of technology, malicious codes have adopted self-protection techniques against anti-virus detection engines. As a result, the accuracy of traditional signature-based antivirus e...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
![application no application](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/application.06fe782c.png)
IPC IPC(8): G06F21/00G06F21/56
Inventor 王汝传雷迟骏韩志杰付雄季一木戴华孙力娟
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
- R&D Engineer
- R&D Manager
- IP Professional
Why Patsnap Eureka
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com