Supercharge Your Innovation With Domain-Expert AI Agents!

Security detection method and device for data files

A data file and security detection technology, which is applied in the field of network security, can solve the problems of undetectable data files and low accuracy of data file security detection, and achieve the effect of improving the accuracy of security detection

Inactive Publication Date: 2017-02-15
BEIJING QIHOO TECH CO LTD +1
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the attacker does not tamper with the download address of the data file, but tampers with the content of the data file, it is impossible to detect whether the downloaded data file contains attack data through the download address comparison method, so that the existing The security detection accuracy of data files is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and device for data files
  • Security detection method and device for data files
  • Security detection method and device for data files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0022] In order to make the advantages of the technical solution of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] The embodiment of the present invention provides a security detection method for data files, such as figure 1 As shown, the method includes:

[0024] 101. Obtain download information of a data file.

[0025...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security detection method and device for data files, relates to the technical field of network security, and is used for solving the problem that the existing data file security detection precision is relatively low. The main technical scheme of the invention is as follows: downloading requests of the data files are received; whether downloaded contents of the data files are data contents in a pre-set white list or not can be judged; data contents corresponding to multiple legal data files are stored in the pre-set white list; and, if not, alarm information is output. The security detection method and device disclosed by the invention are mainly used for detecting whether the downloaded data files are safe or not.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for security detection of data files. Background technique [0002] With the rapid development of network communication technology, network attack and defense will never end. The development of technology has made the form of network attacks constantly changing, and many new attack methods have been derived, and watering hole attacks are one of them. The so-called "watering hole attack" means that the hacker finds the weakness of the website frequently visited by the victim by analyzing the network activity pattern of the victim, first captures the website and implants the attack code, and waits for the victim to visit to carry out the attack. The attacker of the watering hole attack achieves his attack purpose by tampering with the data in the attacked website, such as modifying the data download address in the attacked website to a download address...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/123
Inventor 田阗边亮
Owner BEIJING QIHOO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More