Malicious software detection method and apparatus

A malware and detection method technology, applied in the field of information security, can solve problems such as inability to remove, incapable of comprehensively killing, eradicating viruses, and inability to meet the needs of user information security, etc., to achieve the effect of information security assurance

Inactive Publication Date: 2016-12-07
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This existing killing method can be easily avoided for cleverly disguised malicious software, and it is impossible to remove it.
In addition, after the existing anti-virus tools or software identify a certain virus file, when faced with the deformation of malware or the attack form of multi-module and multi-component, they can only find and solve the superficial problems. It cannot play the role of comprehensively killing and eradicating viruses
This obviously cannot meet the needs of users for information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection method and apparatus
  • Malicious software detection method and apparatus
  • Malicious software detection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present invention clearer, the malicious software detection mechanism of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific implementations described here are only used to explain the inventive concept of the malicious software detection mechanism of the present invention, and are not intended to limit the present invention.

[0023] figure 1 Schematic diagram of malware evolution. Such as figure 1 As shown, the malware initially appears as the original root carrier M, which has a strong camouflage ability, and can be generated or released by running in the user system (but not limited to these two relationships, which will be described in detail later) At least one or more sub-carriers C11...C1n, and at least one sub-carrier Cij generated or released can serve as a root carrier to generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious software detection method and apparatus, which is used for detecting malicious software. By utilizing the method and the apparatus, the development change of the malicious software can be monitored and recorded, and when a problem occurs, sources of viruses can be traced and deformations or all components associated with the malicious software can be correspondingly detected. While the disguised appearance of the malicious software is concerned, the internal change and relation of the malicious software are more concerned, so that full guarantee is provided for information security of a user system.

Description

[0001] The patent application of the present invention is a divisional application of the Chinese invention patent application with the filing date of June 11, 2008, the application number of 200810114709.9, and the title of "A Malware Detection Method and Device". technical field [0002] The invention relates to the field of information security, in particular to a method and device for detecting malicious software. Background technique [0003] Nowadays, with the improvement of informatization and the continuous introduction of various applicable technologies, it is more convenient for users to carry out various activities related to digital information, and it is undeniable that users are more closely related to informatization and digitization . Along with this, however, digital information crimes such as attacks (especially via the Internet) on personal computers, servers, or other computerized devices occur frequently. Obviously, the current underground digital econo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/552G06F21/562G06F2221/033
Inventor 陆剑锋曹家鑫李子拓邹贵强潘剑锋武健袁翔
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products