Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File detection method, device and system and data processing method

A file detection and file technology, applied in the Internet field, can solve the problems of low detection efficiency of malicious files, achieve the effects of improving intuitive perception and interpretability, solving low detection efficiency, and improving detection efficiency

Active Publication Date: 2020-04-03
ALIBABA GRP HLDG LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a file detection method, device, system, and data processing method to at least solve the technical problem of low malicious file detection efficiency in the process of cloud scanning and killing detection images in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File detection method, device and system and data processing method
  • File detection method, device and system and data processing method
  • File detection method, device and system and data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] According to an aspect of an embodiment of the present invention, a file detection system is provided, figure 1It is a structural diagram of a file detection system according to Embodiment 1 of the present invention. Such as figure 1 As shown, the system includes: cloud killing platform 12 and client 14, wherein,

[0043] The client 14 uploads the file to be detected to the cloud killing platform 12;

[0044] The cloud killing platform 12 obtains the file to be detected, compares the file to be detected with the malicious file sample in the historical file storehouse, and obtains detection information; when the detection information indicates that the file to be detected is a malicious file, it determines that the file to be detected is Alert the file, and convert the file type of the file to be detected from a binary file to an image; return the detection information and image to the user;

[0045] The client 14 receives the detection result and the image returned b...

Embodiment 2

[0064] According to an embodiment of the present invention, an embodiment of a method for file detection is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0065] The method embodiment provided in Embodiment 2 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, image 3 It is a block diagram of the hardware structure of a computer terminal according to a file detection method in an embodiment of the present invention. Such as image 3 As shown, the computer terminal 30 may include one or more (only one is shown in the figure) processor 302 (the p...

Embodiment 3

[0106] According to another aspect of the embodiments of the present invention, a method for file detection is also provided, Figure 5 It is a flow chart of the method for file detection according to Embodiment 3 of the present invention. On the client side, such as Figure 5 As shown, the file detection method provided in the embodiment of the present application is as follows:

[0107] Step S502, uploading the file to be detected to the cloud scanning and killing platform;

[0108] Step S504, receiving detection information and images returned by the cloud scanning and killing platform;

[0109] Step S506, determine whether the file to be detected is a malicious file according to the image and detection information.

[0110] Specifically, in conjunction with steps S502 to S506, corresponding to the client 14 in the file detection system in Embodiment 1, if the client uploads the file to be detected, if it directly uploads the image to the cloud scanning and killing platf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file detection method, device and system and a data processing method. The file detection method comprises: acquiring a to-be-detected file, wherein the to-be-detected file is a binary file; comparing the to-be-detected file with a malicious file sample in a historical file library to obtain detection information; under the condition that the detection information indicates that the to-be-detected file is a malicious file, determining that the to-be-detected file is an alarm file, and converting the file type of the to-be-detected file into an image from a binary file; and returning the detection information and the image to the user. The technical problem of low malicious file detection efficiency in the image cloud searching and killing detection process in theprior art is solved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a file detection method, device, system and data processing method. Background technique [0002] At present, cloud scanning and killing uses some rules and models to analyze the content of binary files, looking for payloads (code segments that cause malicious behavior in binary files, which can be scattered in various places in binary files); Manually confirm the classification, and finally alert the customer. [0003] However, this kind of static detection scheme requires operators to have certain security background knowledge and file analysis capabilities. Even if cloud scanning and killing can provide customers with samples and then customers can confirm them, or customers can report files by themselves, but for users, operators and / Or operating software still needs to have very professional security operation capabilities. [0004] For the above-mentioned p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/565G06F21/577
Inventor 何炜
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products