Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus propagation behavior detection method and device

A detection method and virus technology, applied in the field of Internet security, can solve problems such as irretrievable losses and achieve the effect of curbing losses

Active Publication Date: 2020-04-28
HANGZHOU DPTECH TECH
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Take the WannaCry ransomware virus as an example. It uses the Eternal Blue vulnerability to install the backdoor. After the virus breaks out on a large scale and the virus samples are obtained, the precious documents and files have already been encrypted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus propagation behavior detection method and device
  • Virus propagation behavior detection method and device
  • Virus propagation behavior detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the following will describe the technical solutions in one or more embodiments of this specification in conjunction with the drawings in one or more embodiments of this specification The technical solution is clearly and completely described. Apparently, the described embodiments are only some of the embodiments, not all of them. Based on one or more embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0022] When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virus propagation behavior detection method and device, and the method comprises: obtaining version information of a server message block SMB in a to-be-detected message, andenabling the version information to be matched with a target SMB version corresponding to a to-be-detected virus, wherein the to-be-detected message is a request message for SMB version negotiation;if the version information is matched with the target SMB version, further obtaining a source IP address of the to-be-detected message, and determining an operating system of a terminal correspondingto the source IP address; acquiring an SMB version supported by the operating system, and determining whether the SMB version supported by the operating system comprises an SMB version different fromthe preset target SMB version; and if so, determining that the to-be-detected message has a virus propagation behavior. By applying the scheme, the virus propagation behavior can be found as soon as possible, so as to timely give an alarm and restrain loss.

Description

technical field [0001] The present application relates to the field of Internet security, in particular to a method and device for detecting virus propagation behavior. Background technique [0002] In the field of Internet security, computer viruses have always been the focus of prevention and control. Due to the rapid replacement of computer viruses, the traditional virus signature database-based detection and killing is often relatively passive. Generally, the corresponding virus signatures can only be extracted after a large-scale virus outbreak and researchers obtain virus samples. [0003] Take the WannaCry ransomware virus as an example. It uses the Eternal Blue vulnerability to install the back door. After the virus breaks out on a large scale and the virus samples are obtained, the precious documents and files have already been encrypted. . Contents of the invention [0004] In view of this, the present application discloses a method and device for detecting vir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 尚奔奔
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products