Detection method and system of Internet information system malicious codes

A malicious code and detection method technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as insufficient detection methods and inaccurate malicious code positioning, and achieve the effects of improving performance, improving accuracy, and improving integrity

Active Publication Date: 2013-09-04
深圳市易聆科网络安全有限公司
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It aims to solve the problems of insufficient detection methods and inaccurate location of malicious codes existing in the existing malicious code detection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and system of Internet information system malicious codes
  • Detection method and system of Internet information system malicious codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Because website malicious code is generally nested in page elements, page JS code, and page content, in order to detect whether there is malicious code on the website, first determine whether the page is a new page or the content of the page has changed, and on this basis determine whether the page is Malicious code is present. Based on the above ideas, the present invention provides a method and system for detecting malicious codes in Internet information systems. In order to make the purpose, technical solutions and effects of the present invention clearer and clearer, the present invention will be further described in detail below. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] see figure 1 , which is a flow chart of the method for detecting malicious codes in the Internet information system of the present invention. As shown in the figure, the detecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method and system of Internet information system malicious codes. According to the method, detection is carried out on a website needed to be detected every scheduled time, contents of a home page and contents of a first layer and a second layer which are linked with the home page of the detected website are grasped; an obtained page is compared with a page obtained earlier to find out the difference between the two pages, and whether the malicious codes exist or not is determined according to the difference; then the page where the malicious codes exist is outputted, and existing malicious code snippets are labeled; at last, manual secondary identification is carried out on the malicious codes of the detected page, and a result after identification is recorded. Therefore, multiple detection of the contents of the page is achieved, omnibearing step-by-step multistage content detection is supported, the integrity of the content detection is perfected, and detection accuracy is improved; detection performance, detection efficiency and requirements for software and hardware environments are improved.

Description

technical field [0001] The invention relates to the technical field of malicious code detection, in particular to a method and system for detecting malicious codes in an Internet information system. Background technique [0002] Malicious code (Unwanted Code) refers to code that has no effect but brings danger. One of the safest definitions is to regard all unnecessary code as malicious. [0003] There are many types of malicious code analysis methods. Generally, traditional malicious code analysis methods are divided into three types: analysis methods based on code characteristics, analysis methods based on semantics, and analysis methods based on code behavior. These methods have certain limitations: [0004] Manual detection: Open the webpage, right-click to view the source file, and check whether it contains malicious code according to the type of malicious code on the webpage, but this method has great limitations. [0005] Signature-based detection method: This is the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 杨永滨陈剑锋
Owner 深圳市易聆科网络安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products