A Virus Detection System Based on Virtual Execution
A virus detection and virtual execution technology, applied in the field of computer systems, which can solve the problems of virus detection and killing lag, virus detection speed slowdown, polymorphic blurring, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0036] figure 1 It is a structural schematic diagram of the virus detection system according to the first embodiment of the present invention, refer to below figure 1 To describe in detail the various components and functions of the system.
[0037] Such as figure 1 As shown, the system includes a virus sample collector 10 , a virtual machine 20 and a behavior analyzer 30 . Among them, the function of the virus sample collector 10 is to collect virus samples (including training samples and test samples, i.e. known viruses and unknown viruses); the function of the virtual machine 20 is to perform virtual execution on the collected virus samples, obtain and execute the Execution behavior information at the time of the sample, and generate execution behavior reports. The function of the behavior analyzer 30 includes two aspects, one is to analyze the report generated after the virtual execution of the training sample to generate a classifier, and the other is to analyze the re...
no. 2 example
[0077] Figure 5 It is a schematic structural diagram of a virus detection system according to the second embodiment of the present invention, refer to below Figure 5 To illustrate the various components and functions of the system.
[0078] For ease of description, the same parts as those of the foregoing embodiments will not be described in detail, but only the differences from the foregoing embodiments will be highlighted. exist figure 1 with 5 In the same or similar steps as those in the foregoing embodiments, the same reference numerals are used.
[0079]According to the long-term experience in the anti-virus industry, we know that there is a common pattern in the execution behavior of malicious programs of the same family, which is called Behavior Pattern. For example, all variants of the Allaple worm acquire and lock specific semaphores on the infected system. In fact, the process of constructing a classifier with feature vectors is the process of mining this beha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 