Method and device for extracting message format

A message format and message technology, applied in the field of information security, can solve the problems of lack of analysis comprehensiveness, a large number of human resources, and low analysis efficiency, so as to reduce the dependence on human experience and labor costs, improve extraction efficiency, and improve the degree of automation Effect

Active Publication Date: 2014-10-15
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two methods have the following technical problems: a large amount of human resources are required; the analysis efficiency is low and the analysis time is long; because of the lack of comprehensiveness of the analysis, the false negative rate is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for extracting message format
  • Method and device for extracting message format
  • Method and device for extracting message format

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] The embodiment of the present invention provides a method for extracting a message format, such as figure 1 shown, including:

[0026] 101: Capture the execution track of the malicious program client;

[0027] Optionally, capturing the execution track of the malicious program client includes: monitoring the execution process of the malicious program in real time through a binary code analysis platform, and capturing its execution t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for extracting a message format. The method is characterized by comprising the following steps of capturing an execution trace of a rogue program client; analyzing the input message processing process in the execution trace, and extracting the input message format of the rogue program communication protocol. According to the method, the execution trace of the rogue program client is analyzed, the automatic extraction of the input message format of the rogue program communication protocol can be realized without depending on the manual operation of people, the automation degree can be improved, the dependence on the human experience can be reduced, the manpower cost is reduced, and the extraction efficiency can be improved; the semantic information of the system level can be provided by analyzing the execution trace of the rogue program client, analysis on the fine-grained rogue code can be realized, the accuracy in analysis and location can be achieved, and the false alarm rate can be reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for extracting message formats. Background technique [0002] The malicious program referred to in the embodiment of the present invention refers to a malicious program implanted into a device (for example, a computer) so that the device can be controlled by a remote input message. Such malicious programs usually define a communication protocol, and when the malicious program client receives a message from the control terminal, it will respond accordingly. Its typical representative is the client program of the botnet. A botnet refers to a network composed of user computers controlled by attackers through bot programs, and its basic feature is to use a one-to-many command and control mechanism. Since IRC (Internet Relay Chat Protocol, Internet Relay Chat Protocol) provides a simple, low-latency, anonymous real-time communication method, and is a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L9/36
CPCG06F21/566H04L9/36G06F21/56H04L63/145G06F21/567G06F2221/033
Inventor 邹赞张晓康王志贾春福刘露
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products