How to tell if a program is malicious
A program and malicious technology, applied in the field of network security, can solve problems such as the difficulty of determination, the difficulty of killing or cleaning malicious programs, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The following describes the implementation of the present invention in detail with the drawings and embodiments, so as to fully understand and implement the implementation process of how the present invention uses technical means to solve technical problems and achieve technical effects.
[0029] The core idea of the present invention is: the database on the server side establishes a whitelist of legal programs and collects and updates them; the client terminal collects the program characteristics and / or program behavior of a program and sends them to the server side for query, and the server side according to the program The characteristics and / or program behaviors are analyzed and compared in the white list, and the program is determined according to the comparison result and fed back to the client.
[0030] The method for detecting malicious programs in the whitelist in the cloud security mode formed by a large number of client computers 102-server 104 is described below...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


