Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious code detection system

A malicious code detection and malicious code technology, which is applied in the fields of instruments, electronic digital data processing, platform integrity maintenance, etc. Detection accuracy, wide application range, and automatic update effect

Inactive Publication Date: 2018-07-20
HEBEI NORMAL UNIV
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this method has the following disadvantages: the marking of malicious codes requires manual extraction by domain experts; a new malicious code may not include any known features, and can only detect existing malicious codes, but cannot detect new types malicious code for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] like figure 1 As shown, the embodiment of the present invention provides a malicious code detection system, including:

[0030] The code format recognition module is used to identify and analyze the code format to be detected;

[0031] The code decryption module is used to open and close according to the recognition results of the code format recognition module. Once the recognized code data has garbled characters or other encryption behaviors, the code decryption module is started to decrypt the code; after the decryption is completed, static , Dynamic behavior analysis;

[0032] The static analysis module is used to obtain the API fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious code detection system. The malicious code detection system comprises a code format recognition module, a static analysis module, a dynamic behavior analysis moduleand a code behavior monitoring module, and further comprises a code behavior predicting module, a code recognition and judgment module and a record extracting module, wherein the code format recognition module is used for recognizing and analyzing a format of a to-be-detected code, the static analysis module is used for obtaining an API function calling sequence, elements and resources of the to-be-detected code to construct feature vectors of the to-be-tested code, the dynamic behavior analysis module is used for analyzing the behaviors of the code through a built multistate response code behavior analysis model, and the code behavior monitoring module is used for transcribing code behavior data in the mode of script transcribing. By means of the malicious code detection system, maliciouscodes are detected based on the static mode and the dynamic mode, the malicious codes of new types can also be monitored, and a malicious code feature database and a malicious behavior feature database are automatically updated.

Description

technical field [0001] The invention relates to the field of data security, in particular to a malicious code detection system. Background technique [0002] With the explosive growth of malicious code, malicious code has become the biggest cause of personal and corporate information leakage, so it is necessary to detect malicious code before it runs. At present, there are relatively mature malicious code detection technologies, mainly based on signatures, signatures, and heuristics. [0003] The signature-based malicious detection method generates a mark for various malicious codes, and uses these marks to construct a malicious code database. This method can quickly detect whether a piece of code is malicious code, and has a high accuracy rate for the types of samples already in the database. It is the main method adopted by many commercial antivirus software. [0004] However, this method has the following disadvantages: the marking of malicious codes requires manual ext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 王方伟王长广张运凯赵冬梅张林伟侯卫红李青茹曾水光赵琛
Owner HEBEI NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More