Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malware protection method and device

A malware and protection device technology, applied in the field of information security, can solve problems such as low efficiency, no protection function, and inability to detect malware, etc., and achieve the effect of small size

Inactive Publication Date: 2019-06-25
BANK OF SHANGHAI
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires a large amount of analysis work on massive network data, and its efficiency is very low, and the input-output ratio is not high; limited by the deployment position of the probes that collect network traffic, it is easy to cause the loss of network data and prevent malware from being found; Traffic to analyze malicious domain names can only realize the detection function, but cannot block the bad behavior of malware in real time, and has no protection function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malware protection method and device
  • Malware protection method and device
  • Malware protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0044] Terms used in the embodiments of the present disclosure are for the purpose of describing specific embodiments only, and are not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious software protection method and device. The malicious software protection method is based on a security analysis technology driven by DNS analysis log machine data and internal and external information data. A large number of latest technologies such as data acquisition, data merging, data association, machine learning and the like are comprehensively and crosslyapplied to finish automatic and cross confidence verification of domain name access behavior analysis, detect blacklist domain names accessed by the malicious software, finish DNS analysis linkage ina software definition security mode, and point the blacklist domain names accessed by the malicious software to a self-set IP address, thereby realizing a DNS black hole function. The use of the malicious software protection method is irrelevant to the terminal type and the application, known and unknown malicious software can be detected, definition of a protection strategy can be completed in anautomatic and real-time mode, an attack chain is blocked, protection is achieved, and meanwhile various security value-added services can be provided.

Description

technical field [0001] The present disclosure relates to the technical field of information security, in particular to a malicious software protection method and device. Background technique [0002] With the rapid development of computer technology and Internet applications, information security has become more and more important, and information security has also become an important research field that has attracted much attention. In the face of endless security problems and explosive growth of malware and its variants, it is necessary to continuously improve and improve the automatic discovery, detection and protection capabilities of malware so that malware cannot produce adverse consequences. [0003] Malicious software is a piece of computer instruction, which is implanted by the attacker into the attacked computer through system security holes or other methods, so that the attacked computer can perform tasks according to the attacker's wishes. Any computer that can p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 罗喆帅曹广智许思中吕卿潘卫灵
Owner BANK OF SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products