Method for processing extortion software in operation of virtual machine under cloud platform
A processing method and virtual machine technology, applied in the field of network security, can solve problems such as lag and low processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] According to the embodiment of the present application, an embodiment of a method for processing ransomware when a virtual machine is running on a cloud platform is provided. Instructions are executed in a computer system and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0033] figure 1 It is a flow chart of a method for processing ransomware when a virtual machine is running on a cloud platform according to an embodiment of the present application, as shown in figure 1 As shown, the method for processing ransomware during the operation of the virtual machine under the cloud platform includes the following steps:
[0034] In step S102, the first client acquires a process running in the virtual machine to be started and first process information corresponding to the process.
[0035] Specifically, the above-mentioned first client may be a cli...
Embodiment 2
[0083] According to the embodiment of the present application, an embodiment of a process startup processing system is also provided, such as figure 2 As shown, the system includes:
[0084] The first client 202 is configured to acquire a process to be started and first process information corresponding to the process.
[0085] Specifically, the above-mentioned first client may be a client that requires ransomware defense, such as a computer terminal or a computer terminal with a virtual machine installed, or a smart phone (including: Android phone and IOS phone), tablet Computers, notebook computers, handheld computers and other mobile terminals; the above-mentioned first process information may include: the file information and attribute information of the binary file corresponding to the process, the file information may be information such as the name and content of the binary file, and the attribute information may be binary Information such as the storage location of t...
Embodiment 3
[0116] According to an embodiment of the present application, an embodiment of a processing method for process startup is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0117] The embodiment of the method for killing ransomware provided by the present application can be applied to public clouds in the Internet field (for example, Baidu Cloud, Tencent Cloud, Alibaba Cloud, etc.), and some relatively large network sites (for example, commercial companies, search engines, or government departments, etc.) to defend against ransomware.
[0118] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a compute...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


