Detecting method and device of bat loopholes

A detection method and vulnerability technology, which is applied in the field of information security, can solve the problems of endangering the security of computer systems and the inability to quickly and accurately detect bat vulnerabilities, etc.

Inactive Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the commonly used technical solutions are: relying on human experience to make judgments, this judgment method cannot quickly and accurately detect bat vulnerabilities, thus endangering the security of the computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting method and device of bat loopholes
  • Detecting method and device of bat loopholes
  • Detecting method and device of bat loopholes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] A kind of bat loophole detection method that the embodiment of the present invention provides, such as figure 1 As shown, the method includes:

[0028] 101. Construct a bat virtual machine for running a bat script.

[0029] When setting up the detection method, it is generally not possible to use a bat script that is normally running as a test case. It is necessary to build an operating environment that is the same as a bat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detecting method and device of bat loopholes and relates to the field of information safety. The bat loopholes in a bat script can be detected quickly and accurately so that the safety of a computer system can be protected. According to the main technical scheme, a bat virtual machine for bat script operation is established; the bat script operates on the bat virtual machine, and the process behavior of the bat script during operation is recorded; the process behavior and a preset malicious behavior base are matched, and the preset malicious behavior base comprises the judging rules of a know malicious behavior script; and if matching is successful, the fact that the bat script is the bat loopholes is determined. The detecting method and device are mainly used in the processing of bat loophole detecting.

Description

technical field [0001] The invention relates to the field of information security, in particular to a bat loophole detection method and device. Background technique [0002] With the continuous development of computer technology, the degree of informatization of human society is getting higher and higher, and the whole society is more and more dependent on computer information. At the same time, loopholes in computer files are also increasing, and bat loopholes have become one of the most serious threats in the field of information security. BAT vulnerabilities exist in batch files. Batch files are also called scripts, which are unformatted text files. If there are bat vulnerabilities in batch files, it will threaten the security of the computer system. [0003] In order to be able to detect the hidden loopholes in the bat for timely repair, people have come up with various schemes. At present, the commonly used technical solution is: rely on human experience to judge, thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/566
Inventor 唐海陈卓邢超杨康
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products