Malicious mining program active defense method and device

A technology of active defense and program, applied in the field of network security, can solve the problem of active defense against malicious mining programs, and achieve the effect of ensuring network security

Inactive Publication Date: 2019-12-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method and device for active defense of malicious mining programs, so as to alleviate the technical problem that the prior art cannot actively defend against malicious mining programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious mining program active defense method and device
  • Malicious mining program active defense method and device
  • Malicious mining program active defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present invention, an embodiment of a method for actively defending malicious mining programs is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0028]Now that the digital currency market is booming, the prices of various virtual currencies continue to rise, and they are being targeted by many black production gangs. Black industry gangs invade victims' machines through illegal methods such as illegal intrusion and system loopholes, and maliciously deploy mining programs to make profits. Malicious mining programs will occupy valuable resources such as the hardware and network of the victim's machine, and some malicious minin...

Embodiment 2

[0086] The present invention also provides an active defense device for malicious mining programs, which is used to implement the active defense method for malicious mining programs provided by the above-mentioned content of the embodiments of the present invention. The following is the malicious mining program provided by the embodiments of the present invention Specific introduction of the device for program active defense.

[0087] Such as image 3 As shown, the above-mentioned active defense device for malicious mining programs includes: an acquisition unit 10 , an analysis unit 20 , a judgment unit 30 and an execution unit 40 .

[0088] The obtaining unit 10 is used to obtain the target process of the device to be protected;

[0089] The parsing unit 20 is configured to parse the target process to obtain attribute data of the target process;

[0090] The judging unit 30 is configured to judge whether the target process is a process executed by a malicious mining program...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious mining program active defense method and device, and relates to the technical field of network security, and the method comprises the following steps: obtaining a target process of to-be-protected equipment; analyzing the target process to obtain attribute data of the target process; judging whether the target process is a process executed by a malicious mining program or not based on the attribute data; and if the judgment result is yes, blocking the target process, thereby solving the technical problem that the malicious mining program cannot be actively defended in the prior art.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for actively defending malicious mining programs. Background technique [0002] For enterprises and Internet users, in addition to the threat of ransomware, another broad type of network threat they often face is the infection of malicious mining programs. Malicious mining is to occupy the system resources and network resources of the user's terminal equipment for mining without the user's knowledge or permission, so as to obtain virtual currency for profit. It usually occurs on the user's personal computer, corporate website or server, personal mobile phone, and network router. With the development of the virtual currency trading market in recent years and the monetary value of virtual currency, malicious mining attacks have become the most widely affected type of threat attack, and affect corporate organizations and the vast number of individual In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 胡冬范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products