Method and device for detecting malicious file

A malicious file and file technology, applied in the field of computer and network information security, can solve the problems of low identification efficiency and inability to determine whether it is a malicious file, and achieve the effect of improving identification efficiency

Active Publication Date: 2015-09-23
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods need to obtain the relevant characteristics of the file first, and for files that do not contain obvious characteri

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious file
  • Method and device for detecting malicious file
  • Method and device for detecting malicious file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0029] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0030] Please refer to figure 1 , which shows a flow 100 of an embodiment of a method for detecting malicious files. This embodiment is mainly applied to various electronic devices that support downloading applications and / or browser applications installed thereon, includin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for detecting a malicious file. One specific embodiment of the method comprises the following steps of obtaining a URL (Uniform Resource Locator) for downloading a to-be-detected file; matching character strings included in the URL of the to-be-detected file and character strings in a preset model; and determining whether the to-be-detected file is the malicious file based on a longest character string matched in a preset model by the URL of the to-be-detected file. According to the embodiment, the efficiency for detecting the malicious file can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to the field of network information security technology, and in particular to a method and device for detecting malicious files. Background technique [0002] When downloading files on the Internet, some download links are often disguised as pointing to malicious files. These malicious files (such as files containing viruses, worms or Trojan horse programs that can perform malicious tasks on the computer system) are downloaded to the user's computer, which may threaten the information security of the network user. [0003] At present, in the static detection method used by most antivirus applications, the attribute information or the contained content of the file to be downloaded is usually extracted first, and then these features are matched according to the pre-trained model to determine whether the file is a malicious file. These methods need to obtain the relevant c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/562
Inventor 熊蜀光冯侦探曹德强周晓波耿志峰白军辉
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products