File security detection method and device and electronic equipment

A security detection and detection method technology, applied in the computer field, can solve the problem of inability to detect file security in batches and quickly

Pending Publication Date: 2020-11-10
新浪技术(中国)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of the present application is to provide a file security detection method, device and electronic equipment, which can solve the problem that the security of files cannot be detected in batches and quickly in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security detection method and device and electronic equipment
  • File security detection method and device and electronic equipment
  • File security detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application can be practiced in sequences other than those illustrated or described herein. In addition, "and / or" in the specific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file security detection method and device and electronic equipment, and is used for solving the problem that the security of files cannot be rapidly detected in batches in the prior art. The method comprises the steps that a security detection server acquires multiple groups of log data and multiple groups of rule data from a log acquisition database; the security detection server associates the multiple groups of log data with the multiple groups of rule data to obtain multiple groups of to-be-detected data, and one group of to-be-detected data comprises one group oflog data and one group of rule data; and the security detection server performs security detection operation on multiple groups of log data in the multiple groups of to-be-detected data based on multiple groups of rule data in the multiple groups of to-be-detected data, so as to determine the security of multiple files corresponding to the multiple groups of log data.

Description

technical field [0001] The application belongs to the field of computer technology, and in particular relates to a method, device and electronic equipment for detecting file security. Background technique [0002] With the rapid development of computer technology, the data storage capacity of the database system has been greatly improved, and the Simple Storage Service (Simple Storage Service, S3) server has also emerged as the times require. [0003] In order to achieve the purpose of attacking the S3 server, the attacker of the S3 server often disguises the file containing the threatening attack content as a regular file type that the S3 server allows to upload, uploads the file containing the threatening attack content to the S3 server, and waits for the file to be uploaded. An attack event is triggered when a file containing threat attack content is invoked. [0004] In the prior art, the files of multiple S3 servers are stored in their corresponding S3 servers. This di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 盛洋康宇
Owner 新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products