Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A malicious program intelligent defense system and defense method in cloud computing environment

An intelligent defense system, cloud computing environment technology, applied in computing, computer security devices, instruments, etc., can solve the problems of limitations, lag, limited number of samples, etc., achieve low computing resource consumption, high-performance computing power, reduce The effect of threat likelihood

Active Publication Date: 2016-11-16
XIDIAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, most anti-virus solutions face the problems of lag and limitation, as follows: (1) Under the trend of exponentially growing viruses, there is a significant lag in the update and upgrade of traditional anti-virus software;
[0003] (2) Users often only install a set of anti-virus software in a stand-alone application environment, which has the limitation of single-point defense;
[0004] (3) Without upgrading the anti-virus software, it is impossible to detect and kill newly written viruses, and it is impossible to detect and kill old viruses that have been processed without anti-virus;
[0005] (4) When collecting data, honeypot technology, user reporting, and self-established laboratory research and development are used to collect data. The cost is high and the number of samples collected is limited;
[0006] (5) Some existing cloud scanning and killing engines simply put the server in the cloud, and still use the traditional mode of signature comparison, which cannot detect unknown viruses;
[0007] (6) The parallel work of multiple engines on the cloud server is just a combination of engines from different manufacturers, which is limited by the technical level and product targeting of different manufacturers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious program intelligent defense system and defense method in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to describe the technical content of the present invention in detail, the following examples are given and described in detail with accompanying drawings.

[0032] see figure 1 . A malicious program intelligent defense system in a cloud computing environment that fully guarantees the update of the anti-virus engine knowledge base and improves the ability to detect unknown viruses, including:

[0033] A cloud computing platform, the cloud computing platform is provided with a plurality of different anti-virus engines in parallel, and the different anti-virus engines scan for different types of viruses;

[0034] A sample collection subsystem, the sample collection subsystem collects data related to security vulnerability attacks;

[0035] An isolation analysis subsystem, the isolation analysis subsystem is a collection of multiple malicious program behavior analysis engines, and the isolation analysis subsystem analyzes and obtains behavior monitoring results w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An intelligent defense system against malicious programs in a cloud computing environment comprises a cloud computing platform, a sample collection subsystem, an isolation analysis subsystem and a computing server. A plurality of different anti-virus engines are arranged on the cloud computing platform in parallel, and the different anti-virus engines can perform scanning oriented to different types of viruses. The sample collection subsystem is used for collecting data relevant to security vulnerability attacks. The isolation analysis subsystem is a set of multiple malicious program behavior analysis engines, and behavior monitoring results different in emphasis are obtained through analysis by the isolation analysis subsystem. The computing server is used for collecting data of the sample collection subsystem and data of the isolation analysis subsystem, and behavior data are analyzed by the computing server to generate a behavior characteristic knowledge base.

Description

technical field [0001] The invention is an intelligent defense method for malicious programs in a cloud computing environment. It is a method for designing and implementing a virus defense mechanism for detecting malicious code (including unknown viruses) in a cloud computing environment by combining honeypot technology with intelligent program behavior analysis technology. Background technique [0002] With the development of computer viruses in combination with hacker technology, more destructive, more transmission channels, faster transmission speed, more variants, and encryption of original programs, traditional virus detection and killing technologies have become more difficult to implement in application Defense against viruses. With the emergence of new computing models such as distributed computing, grid computing, and cloud computing, new malicious program detection applications have also begun to appear, such as the "cloud scanning and killing" that people are gra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 陈晓峰张振宇马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products