Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for preventing and removing mining viruses under Linux platform and storage equipment

A virus and platform technology, applied in the field of network transmission security, can solve the problems of mining virus protection without a mature mechanism and difficult to protect

Pending Publication Date: 2020-04-17
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a mining virus protection and removal method, device and storage device under the Linux platform, through mining feature extraction, behavior information comparison, threat determination, process association removal, to solve the current problems Mining removal methods are based on the analysis of known events and special killings are carried out through corresponding mining behaviors. There is no mature mechanism for the protection of known mining events and unknown mining viruses, and it is difficult to achieve common use under Linux systems. Types of Mining for Defense Issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing and removing mining viruses under Linux platform and storage equipment
  • Method and device for preventing and removing mining viruses under Linux platform and storage equipment
  • Method and device for preventing and removing mining viruses under Linux platform and storage equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0050] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] In order to state specific embodiments of the present invention more clearly, the following nouns are explained:

[0052] Use init for process hosting: when the system starts, the init program starts system services and getty logs in to the terminal according to the configuration of the / etc / inittab file, and the customized process can also be managed by the init program.

[0053] Obtain process information through / proc / pid / : The / proc file system is the image of the system kernel. The files in this directory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for preventing and removing mining viruses under a Linux platform and storage equipment, relates to the technical field of network security, and provides a method for preventing and removing general mining viruses under a Linux system. The method comprises the following steps: extracting universal behavior characteristics of mining viruses to form a basic characteristic library, and extracting special behaviors of the mining viruses to form an enhanced characteristic library; forming a mining virus detection knowledge base accordingto the basic feature library and the enhanced characteristic library; monitoring a program which is being started and parent and child processes thereof, extracting behavior information, and comparing the behavior information with characteristic s in the mining virus detection knowledge base; carrying out mining virus threat judgment through a basic characteristic scoring and enhanced characteristic scoring mixed scoring mechanism; and intercepting the process which is judged to be the mining virus, and carrying out relevance clearing on the started mining virus process.

Description

technical field [0001] The invention relates to the technical field of network transmission security, in particular to a mining virus protection and removal method, device and storage device under a Linux platform. Background technique [0002] The huge profits in the virtual currency market have attracted more and more attackers to use various malicious codes to attack the computers of ordinary users. There are not many popular types of attacks under the Linux platform, and mining incidents have accounted for a relatively high proportion in recent years. , the attacker hangs malicious scripts on their own or intruded websites. As long as ordinary users click to visit these websites with malicious scripts, they will become virtual currency miners such as Romoncoin. The attackers will directly use the malicious code implanted The user's computer resources are used for mining. [0003] The current mining removal methods are based on the analysis of known events, and special k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/561G06F21/568
Inventor 王辛宇徐翰隆肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products