Malicious software detection method and device

A malware and detection method technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of insufficient scalability of dynamic detection methods, inaccurate detection results, etc.

Active Publication Date: 2015-06-17
BEIJING VENUS INFORMATION SECURITY TECH +1
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a malware detection method and device, which solves the problems of insufficient scalability of the dynamic detection method and inaccurate detection results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection method and device
  • Malicious software detection method and device
  • Malicious software detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Dynamic detection methods are not scalable enough. Moreover, because the excitation conditions cannot be satisfied, some malicious software behaviors cannot be displayed, and the malicious software cannot be detected in time, and the detection results are not accurate.

[0065] In order to solve the above problems, an embodiment of the present invention provides a malware detection method. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments and the features in the embodiments of the present invention can be combined arbitrarily with each other.

[0066] First, Embodiment 1 of the present invention will be described with reference to the accompanying drawings.

[0067] like figure 1 As shown, the embodiment of the present invention provides a malware detection system, which includes the following:

[0068] Upload servers, malware data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious software detection method and device, relates to the field of computer system security and solves the problems that a dynamic detecting method is insufficient in expandability, and the detection result is short of accuracy. The method comprises the steps of calculating a unique digital signature of malicious software to be detected; calculating a target content fingerprint vector quantity of the malicious software to be detected; constituting a nearest neighbor set of the target content fingerprint vector quantity and generating a query set of the content fingerprint vector quantity; getting access to a preset location-sensitive hash table data structure according to the query set of the content fingerprint vector quantity and obtaining a candidate result set; selecting variant software of the malicious software to be detected in the candidate result set. According to the technical scheme of the malicious software detection method and device, the method and device are applicable to protection against variants of the malicious software, and the malicious software detection based on a location-sensitive hash table is achieved.

Description

technical field [0001] The invention relates to the field of computer system security, in particular to a malware detection method and device capable of detecting malware variants. Background technique [0002] With the rapid development of computer technology and Internet applications, information security has become more and more important, and information security has also become an important research field that has attracted much attention. In the face of endless security problems and explosive growth of malware and its variants, it is necessary to continuously improve and improve the detection technology to achieve timely and accurate detection and killing. [0003] Malicious software is a piece of computer instruction, which is implanted by the attacker into the attacked computer through system security holes or other methods, so that the attacked computer performs tasks according to the attacker's wishes, and any threat to the information security of the computer syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 曲武周涛叶润国王君鹤
Owner BEIJING VENUS INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products