Cloud platform malicious behavior detecting system and method

A detection method and cloud platform technology, applied in transmission systems, electrical components, etc., can solve the problems of false positives and false negatives of detection systems or methods, the ability to limit malicious behavior identification, and the limited computing power and storage capacity of client systems. , to achieve the effect of reliable identification

Inactive Publication Date: 2017-05-24
WUHAN HONGXU INFORMATION TECH
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, the computing power and storage capacity of the client system are limited, which limits the ability to identify malicious behaviors to a certain extent; moreover, due to the com...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud platform malicious behavior detecting system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0058] 1. System

[0059] 1. Overall

[0060] Such as figure 1 , the system includes a cloud 10 and a target client 20; wherein the cloud 10 includes a first behavior detector 11, a first network detector 12, a scanner 13, a pattern filter 14, a first malicious program library 15, a first trusted Program library 16 and the first network attack mode library 17; Wherein target client 20 comprises the 2nd behavior detector 21, the 2nd network detector 22, behavior probe 23, network probe 24, the 2nd malicious program library 25, the 2nd 2 trusted program library 26 and the second network attack pattern library 27;

[0061] Its interaction relationship is:

[0062] The second behavior detector 21 interacts with the behavior probe 23, the second malicious program library 25, the second trusted program library 26 and the first behavior detector 11 respectively, so as to realize the extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud platform malicious behavior detecting system and method, and relates to the field of malicious behavior detection. The cloud platform malicious behavior detecting system comprises a cloud end (10) and a target client (20); the cloud end (10) comprises a first behavior detector (11), a first network detector (12), a scanner (13), a mode sieving device (14), a first malicious program library (15), a first trusted program library (16) and a first network attack mode library (17); the target client (20) comprises a second behavior detector (21), a second network detector (22), a behavior probe (23), a network probe (24), a second malicious program library (25), a second trusted program library (26) and a second network attack mode library (27). The cloud platform malicious behavior detecting system and method has advantages of high efficiency, accuracy, rapidity, expandability and wide adaptability.

Description

technical field [0001] The invention relates to the field of malicious behavior detection, in particular to a cloud platform malicious behavior detection system and method thereof, which have the advantages of high efficiency and scalability. Background technique [0002] Malicious behavior refers to the behavior that the hardware, software and data in the computer system are damaged, changed and leaked by malicious code attacks. With the rapid development of the Internet, various computer malicious programs are constantly appearing while facilitating the society. Various malicious network attacks such as Trojan horses, worms, server vulnerability attacks, remote overflow and Web vulnerability attacks continue to emerge, posing a great threat to users. How to detect these malicious behaviors is a major issue in information security and has very important significance. [0003] Traditional malicious behavior detection technology is based on malicious code features, that is,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1441H04L63/20H04L67/10
Inventor 罗蛟保永武叶猛
Owner WUHAN HONGXU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products