Malicious code identification method based on cloud computing

A malicious code and malicious code detection technology, applied in the field of virus detection and protection, can solve problems such as accuracy decline, and achieve the effects of accurate judgment results, high recognition rate, and low false positive rate

Inactive Publication Date: 2012-09-12
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the accuracy of traditional signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code identification method based on cloud computing
  • Malicious code identification method based on cloud computing
  • Malicious code identification method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test
No Example Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious code identification method based on cloud computing. The technical problems needing to be solved are that: 1, current malicious codes accelerate for variation and enable generated code bodies to have extremely low similarity by relying on a self encryption mechanism by constantly changing encryption keys, however, the conventional engine based on characteristic code detection has no way for identification, thereby causing constant reduction of searching and killing rate; and 2, with the development of the technology, malicious codes are added with more self-protection technologies which especially withstand a currently popular virtual machine searching and killing mechanism, so that a code which is very simple in real environment has an unusually complex analysis process in a virtual machine of a virus killing engine and finally can not be identified. Apparently, a new feasible scheme is needed to solve the identification on the malicious code at current environment, so as to realize effective defense.

Description

technical field [0001] The present invention is a solution for identifying malicious codes based on a cloud computing platform, which mainly solves the problems that current malicious codes mutate more and more quickly, and traditional virus database updates cannot achieve timely detection and killing, and belongs to the field of virus detection and protection. Background technique [0002] With the development of computer technology, especially the rapid development of computer networks, the number of malicious codes has an exponential growth trend. Early malicious codes did not adopt too many self-protection mechanisms, and all had fixed signatures. Therefore, anti-virus software can easily detect virus programs hidden in the system by using virus signature matching. However, with the development of technology, malicious codes have adopted self-protection techniques against anti-virus detection engines. As a result, the accuracy of traditional signature-based antivirus e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
Inventor 王汝传雷迟骏韩志杰付雄季一木戴华孙力娟
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products