A method and system for automatically dispose malicious code
A disposal method and malicious code technology, applied in the field of automatic disposal methods and systems for malicious code, can solve problems such as low efficiency, dependence, and difficulty in large-scale promotion, and achieve the effects of reducing disposal time, improving disposal efficiency, and reducing data redundancy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.
[0028] The present invention provides an embodiment of a method for automatic processing of malicious codes, such as figure 1 shown, including:
[0029] S101: Capture the network data packet, and restore the entity file according to the content of the message;
[0030] S102: Scan the restored physical file to determine whether there is a malicious sample;
[0031] S103: If there is a malicious sample, determine the harm level and propagation mode of the malicious sample;
[0032] S104: According to the hazard level and transmission mode, select the response method from the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com