Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting malicious remote procedure tracing calling behaviors

A technology of remote procedure call and detection method, applied in the direction of multi-program device, inter-program communication, program control design, etc., can solve problems such as interference detection of malicious behavior, false alarm, etc., to ensure accuracy, speed up processing flow, save money The effect of system resources

Active Publication Date: 2021-04-30
成都安思科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, on the latest version of the Windows operating system, there are a large number of system processes, which are created or terminated all the time. If a large number of system behaviors cannot be strictly distinguished, a large number of false positives will be generated. ; Especially in the sandbox system, the behavior of the system seriously interferes with the detection of malicious behavior; the traditional process chain based on the association of malicious programs is not enough to deal with the release behavior through RPC; and if the entire system process relationship chain Based on this, many system behaviors emerge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious remote procedure tracing calling behaviors
  • Method and device for detecting malicious remote procedure tracing calling behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0031] Such as figure 1 and figure 2 As shown, the present invention relates to a detection method of a malicious remote procedure traceability call behavior. By intercepting the remote procedure call, the call interface GUID, ProcNum, call parameters, client process ID and thread ID can be obtained, and the current process will obtain the The information sent to the server module, the service module will judge the obtained information, and mainly judge whether it is a malicious call through the process ID and thread ID of the client. If it is a malicious remote procedure call, it will record the complete remote procedure call; and for non-malicious calls, use the traceability method to find the real request initiator, and further obtain a call chain of the current remote p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and device for detecting malicious remote procedure tracing calling behaviors. The method comprises the steps of: initilizing a set E0, intercepting all RPC calling requests, obtaining an interface identifier to be called, an API number, a specific function needing to call an interface and calling request parameter information, and establishing inter-procedure calling relation information called by each remote procedure; judging whether the interface identifier called by the remote procedure exists in a pre-configured list L0 or not, continuously judging whether the requested interface identifier exists in a pre-configured list L1 or not according to a judgment result, and implementing corresponding operation according to two judgment results; and if the client process ID does not exist in the set E0, searching a corresponding calling relationship information relationship I by taking T (P, T) as a retrieval condition, judging whether I exists in the set E0 or not, and implementing corresponding operation according to a judgment result. System resources can be saved, and the processing flow of the system is accelerated; and meanwhile, the accuracy of RPC detection is also ensured.

Description

technical field [0001] The invention relates to the technical field of network monitoring, in particular to a detection method and device for traceability and invocation behavior of malicious remote procedures. Background technique [0002] With the rapid development of the Internet, malicious programs are more easily spread, and the attack techniques used by malicious programs are also continuously upgraded. They are not limited to behavioral confrontation within the process of malicious programs, but use RPC (Remote Procedure Call) calls, using The existing rpc components of the system release malicious behaviors; to bypass the sandbox, main defense and other security monitoring systems. At the same time, on the Windows operating system, there are not only directly connected rpc servers, but also multi-level proxy rpc servers. This request will jump multiple times, and finally the request will reach the process where the service is located. When using a level proxy, it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F9/54
CPCH04L63/1441H04L63/101G06F9/547
Inventor 王宗才胡周毛春森张洁赵键俞祥基邓金祥胡勇王炜
Owner 成都安思科技有限公司