Defence method and system of unknown computer viruses

A technology of unknown virus and defense system, which is applied in the field of defense methods and systems of unknown computer viruses, and can solve problems such as the failure of the operating system to operate normally.

Inactive Publication Date: 2018-02-23
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a defense method for unknown computer viruses, aiming to solve the problem in the prior art that the operating system still cannot run normally after the white list is manually configured and deployed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defence method and system of unknown computer viruses
  • Defence method and system of unknown computer viruses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] figure 1 The realization flowchart of the defense method of unknown computer virus provided by the present invention is shown, which specifically includes the following steps:

[0040] In step S101, the operation behavior of the application program running inside the computer operating system is dynamically monitored, and the application program behavior includes application program installation, update, uninstallation and file reading, writing and execution operations.

[0041] In step S102, when the operation behavior of the application program is monitored, an application program analysi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computer safety, and provides a defence method and system of unknown computer viruses. The method includes the steps of conducting dynamic monitoring onan operation behavior of an application running in a computer operating system; when the operation behavior of the application is monitored, generating an application analysis and comparison instruction; conducting an intelligent analysis on the application executing the operation behavior, and judging whether or not the application executing the operation behavior comes from an application basegenerated in advance; if yes, determining that the application executing the operation behavior as a whitelist application, and controlling the application to continue to run; if not, determining theapplication executing the operation behavior as a malicious program, and controlling the application to stop running. In this mode, intelligent deployment of a whitelist and effective blockage of theunknown viruses are achieved, and the quality of a computer is improved.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a defense method and system for unknown computer viruses. Background technique [0002] At present, in the field of computer security technology, whitelist technology refers to placing different applications in a specified structure. The applications in the structure are trusted, while the applications outside the structure are untrustworthy. Execution and other permissions, so that the root cause of virus attacks is eliminated, and many attacks cannot be executed. [0003] However, there are thousands of applications in a computer system, and all of them need to be executed. If the necessary programs are not executed, the operating system itself will not be able to run normally. To solve the problem, at present, the whitelist deployment is generally done manually, and the manual configuration is mainly based on conventional experience and real-world scenar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 路廷文
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products