Unlock instant, AI-driven research and patent intelligence for your innovation.

A malicious program identification method and electronic device

A malicious program and identification method technology, applied in the computer field, can solve the problems of resource consumption, identification errors, and inability to detect malicious programs in time, and achieve the effect of improving accuracy and reducing resource consumption

Active Publication Date: 2020-11-10
北斗智谷(北京)安全技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, it has brought great convenience to users' lives, but due to the emergence of malicious programs, it has also brought troubles and infringements to users, for example, the recently popular ransomware, Internet worms, and malicious mining programs, resulting in loss of user property
[0003] The malicious program detection engine identifies malicious programs to protect the security of users, but malicious programs have appeared endlessly, and the malicious program detection engine cannot detect the latest malicious programs in time, and the malicious program detection engine can identify and compare the families (organizations) of malicious programs Difficulties, especially when malicious program source files are frequently traded underground, it will be difficult for associated organizations and difficult to monitor. In the event of an Advanced Persistent Threat (APT) attack, the similarity of the organization is of great importance to Malicious program traceability plays a very important role
In the prior art, the most widely spread malicious program for the Internet is the Portable Executable (PE) / Executable and Linking Format (ELF) file format. The program performs similarity clustering to detect malicious programs and at the same time organizes and classifies them. However, in the face of massive data, similarity clustering consumes a lot of resources, and when malicious program source files are traded underground, they will be identified incorrectly and cannot be accurately determined. Organizations that write malicious programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious program identification method and electronic device
  • A malicious program identification method and electronic device
  • A malicious program identification method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention is described below based on examples, but the present invention is not limited to these examples. In the following detailed description of the invention, some specific details are set forth in detail. The present application can be fully understood by those skilled in the art without the description of these detailed parts. In addition, those of ordinary skill in the art should understand that the drawings provided herein are for illustration purposes only.

[0032] Unless the context clearly requires, throughout the specification and claims, "comprises", "comprises" and similar words should be interpreted in an inclusive sense rather than an exclusive or exhaustive meaning; that is, "including but not limited to" meaning.

[0033] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative impor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious program identification method and an electronic device, which are used for solving the problems in the prior art of how to realize malicious program detection underthe condition of reducing resource consumption, improving the detection efficiency of the malicious program, and improving the accuracy of identifying an organization that writes the malicious program. The method includes parsing the received first program to determine the first compiled path information, wherein the first compiled path information comprises a directory string; determining a firsteigenvalue of the first program according to the first compiled path information; matching the first eigenvalue with an eigenvalue in a feature library; in response to a successful match, determiningthe first program to be a malicious program.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a malicious program identification method and electronic equipment. Background technique [0002] With the development of Internet technology, it has brought great convenience to users' lives, but due to the emergence of malicious programs, it has also brought troubles and infringements to users, for example, the recently popular ransomware, Internet worms, And malicious mining programs, resulting in loss of user property. [0003] The malicious program detection engine identifies malicious programs to protect the security of users, but malicious programs have appeared endlessly, and the malicious program detection engine cannot detect the latest malicious programs in time, and the malicious program detection engine can identify and compare the families (organizations) of malicious programs Difficulties, especially when malicious program source files are frequently traded unde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F2221/033
Inventor 秦梦姣
Owner 北斗智谷(北京)安全技术有限公司