Unlock instant, AI-driven research and patent intelligence for your innovation.

Program monitoring method and apparatus

A technology of program and object program, applied in the computer field

Active Publication Date: 2015-12-23
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a problem that malicious programs and their deformed programs (such as computer virus variants) evade the scanning and detection of malicious program scanning and killing engines based on signatures through technical means such as packing and anti-killing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program monitoring method and apparatus
  • Program monitoring method and apparatus
  • Program monitoring method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0028] figure 1 An exemplary system architecture 100 to which embodiments of the program monitoring method or program monitoring device of the present application can be applied is shown.

[0029] Such as figure 1 As shown, the system architecture 100 may include terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a program monitoring method and apparatus. A specific implementation manner of the method comprises: extracting at least one operating feature of a running target program, wherein the operating feature comprises an operating type and an operational object of an operation performed by the target program; matching each extracted operating feature with each operating feature in an operating feature template of a malicious program, wherein the operating feature template of the malicious program comprises a set of operating features of the malicious program; based on the matching result, determining whether the target program is the malicious program or a deformation program of the malicious program; and if yes, performing processing on the target program. The implementation manner implements effective monitoring of the malicious program and the deformation program of the malicious program.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to the field of computer security technology, especially to a program monitoring method and device. Background technique [0002] With the development of computer technology, especially Internet technology, malicious programs (Malware) are also increasingly rampant, becoming a major threat to computer hardware or user data. For example, Internet malicious programs can spread through the network and run on electronic devices connected to the network, thereby stealing user information, destroying user data, pushing advertisements or fraudulent information, and may also affect the operation of electronic devices and endanger electronic devices. The software and hardware security of the device. [0003] Existing monitoring technologies for malicious programs are usually based on signatures of malicious programs (such as computer viruses) to detect and kill malicious program...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/563G06F21/568G06F2221/033
Inventor 易鸿斌陈唐晖杨景杰
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD