Risk identification method and equipment, storage medium and electronic equipment

A risk identification and risk technology, applied in the Internet field, can solve problems such as the inability to fundamentally guarantee the security of terminal applications, and achieve the effect of avoiding losses and ensuring security of use

Pending Publication Date: 2018-06-19
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some viruses will not trigger malicious attacks in the antivirus engine env

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and equipment, storage medium and electronic equipment
  • Risk identification method and equipment, storage medium and electronic equipment
  • Risk identification method and equipment, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The risk identification method provided by the embodiment of the present invention can be applied to the identification scenario of malicious attack behavior, for example, the attack perception and identification scenario of the terminal application program at runtime, when the terminal receives the trigger command input for the installed application program , start to collect multiple running behaviors of the application and send them to the server. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a risk identification method and equipment, a storage medium and electronic equipment. The method includes the following steps that an operation behavior chain triggered aiming at a terminal application is acquired, wherein the operation behavior chain comprises multiple operation behaviors arranged according to the operation time sequence; a target operation behavior set matched with all risk behaviors in a risk behavior set is acquired from the operation behaviors; a target operation behavior chain corresponding to the target operation behavior set is acquired, when a target risk behavior chain matched with the target operation behavior chain exists in the risk behavior chain set, it is determined that an attack risk exists in the terminal application, and risk attack prompt information aiming at the terminal application is output. By the adoption of the risk identification method and equipment, the storage medium and the electronic equipment, hostile attack behaviors aiming at the terminal application can be accurately sensed and identified without being limited by detection environments, and the use security of the terminal applicationis fundamentally guaranteed.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a risk identification method and its equipment, storage medium, and electronic equipment. Background technique [0002] As the scale of the network expands, the functions of the network system comprehensively cover all aspects of life, such as social interaction, communication and entertainment, etc., and the complexity of the network structure increases significantly. While the complex network structure and rich functions provide users with better services, it also expands the attack surface of terminals using the network, making terminals more vulnerable to attacks. [0003] In the face of various attack behaviors of terminal applications, antivirus engines are generally used to detect malicious attacks, and terminal applications are protected by building security boundaries. However, some viruses will not trigger malicious attacks in the antivirus engine environm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 沈江波程虎徐超
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products