A method and device for identifying offline malware logs
A malware and log technology, applied in the field of offline malware log identification, can solve the problems of fast update, low efficiency, misidentification, etc., and achieve the effect of improving accuracy and efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] figure 1 It is a schematic flow diagram of an implementation process of a method for identifying offline malware logs according to an embodiment of the present invention, the method comprising:
[0076] Step 101: Based on the first destination IP and destination port contained in the obtained multiple network logs, a matching search is performed in the IP and port reverse matching rule set to obtain a candidate network log set and a suspicious malware hash value set;
[0077] Specifically, the following processing is performed on each of the obtained multiple network logs, that is: based on the first destination IP and destination port contained in each network log, the IP and port reverse matching rule set is used to perform the following processing: The network log is matched and searched; when the first purpose IP and the destination port included in the network log are matched with the IP and port reverse matching rules in the IP and port reverse matching rule set, ...
Embodiment 2
[0153] Embodiment 1 of the present invention will be further described below through a specific example, image 3 It is a schematic diagram of the implementation flow of the malware matching rule generation method based on threat intelligence context information in Embodiment 2 of the present invention, and the method includes:
[0154] Step 201: collecting malware threat intelligence and storing it in a threat intelligence library;
[0155] Specifically, based on the threat intelligence of malware collected through the network and the threat intelligence generated by the malware in the local sandbox operation process, the threat intelligence is stored in the threat intelligence library to build a local massive threat intelligence library, and The threat intelligence of malicious software collected through the network or the local sandbox is also stored in the threat intelligence library.
[0156] In this embodiment, the threat intelligence generated by the malware during loc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


