Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for automatically dispose malicious code

A disposal method and malicious code technology, applied in the field of automatic disposal methods and systems for malicious code, can solve problems such as low efficiency, dependence, and difficulty in large-scale promotion, and achieve the effects of reducing disposal time, improving disposal efficiency, and reducing data redundancy.

Inactive Publication Date: 2019-03-15
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each link is independent of each other, communication and connection currently rely on manual operation, the efficiency is low, and it depends on the experience of the staff, it is difficult to promote on a large scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for automatically dispose malicious code
  • A method and system for automatically dispose malicious code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0028] The present invention provides an embodiment of a method for automatic processing of malicious codes, such as figure 1 shown, including:

[0029] S101: Capture the network data packet, and restore the entity file according to the content of the message;

[0030] S102: Scan the restored physical file to determine whether there is a malicious sample;

[0031] S103: If there is a malicious sample, determine the harm level and propagation mode of the malicious sample;

[0032] S104: According to the hazard level and transmission mode, select the response method from the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious code automatic disposal method and system, which comprises the following steps: a network data packet is captured and entity files are restored according to messagecontents; Scanning the restored entity file to determine whether there is a malicious sample; If there is a malicious sample, the hazard level and transmission mode of the malicious sample are determined. According to the hazard level and propagation mode, a response method is selected from the disposal scheme database by a predetermined algorithm, and the response method is transmitted to the network side and the terminal side equipment. Each link of the invention is connected with each other to form a closed-loop control flow, the next operation is automatically determined according to the algorithm, and the manual interference and the processing time are reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for automatically handling malicious codes. Background technique [0002] In the existing malicious code disposal process, the required data comes from different devices, and the disposal process needs to be executed manually, and the disposal plan is modified according to the effect, and then the second disposal is carried out, and the purpose of basically terminating the spread of malicious code is finally achieved. In this process, the source and dissemination of malicious code samples are provided by the file restoration device, the judgment and dissemination mode analysis are comprehensively judged by the detection equipment and manual, and the dissemination is blocked by the network device or manually executed at each terminal. Each link is independent of each other, and the communication connection currently relies on manual operation, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 王沛然韩文奇王小丰肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products