Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and server for identifying application malicious attribute

A discrimination method and server technology, applied in the field of Internet communication, can solve the problems of not being able to obtain black, white and gray attributes, and can not obtain black, white and gray attributes, and achieve the effect of improving the efficiency of virus detection

Active Publication Date: 2013-03-06
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the disadvantage of this method is that if there is no corresponding sample of the reported file in the background, when the user performs cloud search, the black, white and gray attributes cannot be obtained; in addition, there are some pe files, although these pe files exist in the background, but through the current Some scanned models cannot get its black, white and gray attributes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and server for identifying application malicious attribute
  • Method and server for identifying application malicious attribute
  • Method and server for identifying application malicious attribute

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] In the embodiment of the present invention, the behavior data of the program on the client is obtained, and at the same time, various malicious behaviors and malicious behavior values ​​are defined according to the existing samples in the existing program samples in the antivirus background After receiving the behavior data of the program, it can be judged whether there is malicious behavior in the program and the malicious behavior value of the malicious beh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a method and a server for identifying application malicious attribute. The method includes: acquiring behavior data of an application in a client; acquiring malicious behavior and malicious behavior value of the application according to the behavior data of the application and sample data locally stored; and judging malicious attribute of the application according to the malicious behavior or / and the malicious behavior value of the application. The sample data include a set of malicious program samples and a set of non-malicious application samples, and the malicious behavior value indicates malicious degrees of the malicious behavior.

Description

technical field [0001] The invention relates to the field of Internet communication, in particular to a method and server for discriminating malicious attributes of programs. Background technique [0002] In the existing anti-virus programs, such as the computer housekeeper’s Trojan horse cloud inspection function, only about 20% of the independently reported files (independently reported files refer to different files reported by the client to be checked and killed) can be determined black and white attributes. Of the remaining 80% of the independently reported files, 50% are gray independently reported files, that is, the same samples of these files are stored in the antivirus background, but the attribute is not determined to be black or white through the scanning of the antivirus software set ( That is, whether the file is poisonous); the remaining 30% of the independently reported files do not have the same sample file at all in the anti-virus background, and cannot sc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N20/00
CPCG06F21/00G06F21/50G06F21/552G06F21/566G06N20/00
Inventor 王洪彬
Owner TENCENT TECH (SHENZHEN) CO LTD