System and method for malicious code analysis based on cloud computing

A malicious code and malicious code detection technology, applied in computing, transmission systems, computer security devices, etc., can solve the problems of large host resource consumption, weak rapid response ability, and lagging recognition ability, so as to reduce security risks, quickly analyze and Fast processing, the effect of fast discovery

Inactive Publication Date: 2014-01-08
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
View PDF3 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a malicious code analysis system and method based on cloud computing, which solves the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for malicious code analysis based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] A malicious code analysis system based on cloud computing includes a malicious code detection agent 1 and a malicious code cloud analysis system 2 . In order to reduce the impact of new security threats and host performance due to its own complexity, and improve the rapid discovery, analysis and processing capabilities of intrusion threats, the host malicious code analysis system separates the core detection and analysis engine from the host. The host-side malicious code detection agent 1 only retains the functions of state detection, behavior monitoring, and killing, and the required complex detection and analysis functions are provided by the malicious code cloud analysis system in the form of network services on the server side. Among them, the malicious code detection agent 1 includes a security monitoring engine 3, an killing engine 4, a local black / white list 5, a behavior pattern library 6, and a virus signature library 7; the malicious code cloud analysis system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious code analysis method, in particular to a system and method for malicious code analysis based on cloud computing. The system for malicious code analysis based on cloud computing comprises a malicious code analysis proxy and a malicious code could analysis system. The malicious code analysis proxy comprises a safety monitoring engine, a searching and killing engine, a local black list, a local white list, a behavior pattern bank and a virus characteristic bank. The malicious code could analysis system comprises a characteristic judging and searching engine, a sample storage center, multiple analysis engines, a global black list, a global white list, a global malicious behavior characteristic bank and a global virus characteristic bank. According to the system and method for malicious code analysis based on cloud computing, safety servitization is achieved based on the cloud computing technology, compatibility and cooperation of the multiple searching, killing and analysis engines are achieved, the threat analysis and response ability of the whole network is improved through the strong data processing and analysis ability of a cloud terminal, rapid discovery, rapid analysis and rapid processing of host threats are achieved, the safety of the host operation environment is guaranteed powerfully, and the self-protection ability of a host intrusion detection protective system can also be improved.

Description

technical field [0001] The invention relates to a malicious code analysis method, in particular to a cloud computing-based malicious code analysis system and method. Background technique [0002] As the carrier of the information system, the terminal is the initiator of actual operations and network behaviors, as well as the storage body of sensitive information such as key files and data, and often becomes the primary target of attackers to attack or hijack. With the rapid development of information technology and the continuous expansion of network scale, the use of malicious codes to target malicious attacks and sabotages on terminals is becoming more and more frequent, and the attack intensity is increasing. By monitoring the status and behavior of terminal computing resources in real time, timely detection of malicious code is of great significance to ensure the normal operation of computers and networks. [0003] At present, the malicious code analysis system for the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/55H04L29/06
CPCG06F21/566H04L63/1441
Inventor 段翼真王晓程刘忠王斌毛俐旻陈志浩
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products