Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting and processing malicious codes in big data

A malicious code detection and processing method technology, applied in the field of malicious code detection and processing methods and systems in big data, can solve the problems of inability to meet network high performance, high reliability, high capacity, poor mobile communication service experience, etc. Fast scanning and comparison speed, improving efficiency and reducing user losses

Inactive Publication Date: 2021-08-10
北京国联天成信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unable to meet users' requirements for high performance, high reliability, and high capacity of the network, and users' mobile communication service experience is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting and processing malicious codes in big data
  • Method and system for detecting and processing malicious codes in big data
  • Method and system for detecting and processing malicious codes in big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but should not be used to limit the scope of the present invention.

[0041] figure 2 It is a system structure diagram of the present invention, which discloses a malicious code detection and processing system in big data, including:

[0042] MVDS monitoring probe, deployed between PCF and PSDN, obtains real-time traffic data, performs protocol analysis and judgment on vicious events, records and uploads running information, detection log information and session restoration information in real time;

[0043] The MVDS management platform is responsible for the collection, collation, storage, display, management and processing of the entire system data;

[0044] Dispose of the interface system and execute the command tasks of the MVDS management platform to assist ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for detecting and processing malicious codes in big data. The method comprises the following steps: capturing network data, converging and analyzing the data, extracting feature data, scanning and comparing the feature data with a virus feature library, and processing malicious events and suspicious data samples. The system comprises an MVDS monitoring probe, an MVDS management platform, a processing interface system and a research and judgment system, and the MVDS monitoring probe comprises a capture layer, a protocol analysis layer, a preprocessing layer, an anti-virus engine layer and a data layer; and the MVDS management platform comprises an authentication and topology management layer, a data, log and display management layer, an equipment, performance and basic management layer and a virus feature library management and disposal strategy management layer.

Description

technical field [0001] The invention relates to the field of detection and processing of malicious codes in mobile terminals, in particular to a method and system for detecting and processing malicious codes in big data. Background technique [0002] Generally speaking, malicious code in big data mainly achieves its malicious purpose through two stages. The first stage is the stage of propagation and infection, which is built into copycat clients and uploaded to download sites and third-party forums. , spreading the program implanted with malicious codes to the client for latent operation; the second stage is the onset stage, where the client infected with malicious code actively connects to the malicious control server, obtains instructions and executes malicious behaviors according to the instructions. [0003] Although there are relatively few download events in the infection stage and will not cause much impact on the network, it has two main hazards. On the one hand, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/56
CPCH04L63/1408H04L63/1416G06F21/563H04L63/1441H04L69/22
Inventor 门嘉平
Owner 北京国联天成信息技术有限公司