Malicious code detection method and device and computer readable medium

A technology of malicious codes and detection methods, applied in computer security devices, calculations, instruments, etc.

Pending Publication Date: 2021-05-07
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The problem to be solved by the present invention is that when malicious code programs are bundled in normal files in the NTFS system as data stream files, tools such as task managers and process managers cannot detect well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method and device and computer readable medium
  • Malicious code detection method and device and computer readable medium
  • Malicious code detection method and device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0055] Such as figure 1 As shown, the embodiment of the present invention provides a detection method of malicious code, and the method is applied to the new technology file system NTFS, and may include the following steps:

[0056] Step 101: Scanning the system for files to obtain suspicious files;

[0057] Step 102: Analyzing the suspicio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious code detection method and device and a computer readable medium, and the method is applied to a new technology file system NTFS and comprises the steps of: performing file scanning on the system, and obtaining suspicious files; analyzing the suspicious file, and judging whether the suspicious file contains a hidden file or not according to analyzed data; if the suspicious file contains a hidden file, recording alarm information related to the hidden file, and carrying out visual output, so that a user determines whether the code is a malicious code or not; and if the suspicious file does not contain the hidden file, determining that the suspicious file does not contain the malicious code corresponding to the hidden file, and performing visual output. According to the scheme, malicious codes hidden in the NTFS system can be effectively detected.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a malicious code detection method, device and computer-readable medium. Background technique [0002] With the rapid development of the Internet and the rapid popularization of computers, it is convenient for people, but it also brings security risks. The influence and harm brought by malicious codes to individuals, society and the country are also increasing. In many scenarios, it is unrealistic to use humans to deal with malicious codes. A tool that can automatically and quickly detect malicious codes is needed to deal with large-scale Scale infection scenarios with malicious code. [0003] Currently, the New Technology File System (NTFS) has become a more superior file system because of its stability and powerful functions, as well as the security it provides. The NTFS exchange data stream is a part of the NTFS disk format. According to this feature, an ordi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/56
CPCG06F21/6218G06F21/56
Inventor 郭洪亮张慧云曹鑫磊肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products