Method of detecting viral sources in cloud storage environment

A detection method and virus source technology, applied in the information field, can solve problems such as incomplete reliability, long log analysis time-consuming, affecting system stability, etc., to achieve accurate detection, reduce time, and realize the effect of automation

Inactive Publication Date: 2015-04-01
央视国际网络无锡有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the following disadvantages: interrupting online business, enabling the DEBUG function affects system stability, and log analysis takes a long time and is not completely reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of detecting viral sources in cloud storage environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0026] Such as figure 1 Shown, a kind of cloud storage environment virus source detection method comprises the following steps:

[0027] Step 1. Collect infected file types;

[0028] Step 2, locally create a file of the same type as the infected file in the above step 1, and calculate the HASH value of the file at the same time;

[0029] Step 3. Copy the file created in the above step 2 to the storage as a decoy file;

[0030] Step 4, traversing the files being accessed by all processes on the storage access node;

[0031] Step 5. If the decoy file is found to be opened by a process, immediately record the IP of the accessed host, and display the IP on the termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of detecting viral sources in a cloud storage environment. The method includes: acquiring the type of a file contaminated; creating a file of the same type in a locale, and calculating a HASH value of the file; copying the created file to a storage, as a lure file; traversing files visited by all processes on a storage access node; if the lure file is opened by the processes, immediately recording an IP (internal protocol) address of a visiting host, and displaying the IP address on a terminal; calculating the HASH value of the lure file, and if the HASH value changes, writing the IP address of the host to a specified text file; isolating the host with the IP address; restoring the original lure file, and continuing to collecting other viral source hosts. The method has the advantages of detection accurateness and high efficiency.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method for detecting virus sources in a cloud storage environment. Background technique [0002] When the company adopts the CIFS protocol to use private cloud storage, when one of the hosts is infected with a virus with infectious characteristics, it will infect and destroy specific files in the cloud storage for spreading. Infected hosts need to be located. The existing positioning methods are: turn off the storage system; turn on the debug function of the storage system log; start the storage system; record the log for 30-60 minutes; turn off the storage system and turn off the log debug function; copy the log file; start the storage system; check the log information Perform analysis to locate suspicious read / write; if it cannot be located, shut down the storage system again; isolate the host for suspicious read / write; observe whether any files are infected aga...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 徐帆熊智辉
Owner 央视国际网络无锡有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products