Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious file processing method, device and system, electronic equipment and storage medium

A malicious file and processing method technology, applied in the field of network security, can solve the problem of low accuracy of malicious file processing

Active Publication Date: 2021-08-20
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a malicious file processing method, device, system, electronic device and storage medium, to at least solve the problem of accurate processing of malicious files in the related art low sex problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file processing method, device and system, electronic equipment and storage medium
  • Malicious file processing method, device and system, electronic equipment and storage medium
  • Malicious file processing method, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be described and explained below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ordinary skill in the art relevant to the content disclosed in this application, the technology disclosed in this application Some design, manufacturing or production changes based on the content are just conventional technical means, and sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious file processing method, a device, a system, electronic equipment and a storage medium. The processing method comprises the steps: obtaining a newly added unknown file, and generating a classifier based on a preset feature database; under the condition that the running time of the newly-added unknown file is greater than or equal to preset time, inputting behavior characteristic information of the newly-added unknown file and the characteristic database into the classifier, and outputting a first classification result; detecting whether the newly added unknown file belongs to a malicious file or not based on the first classification result; and when the detection result is that the newly-added unknown file belongs to the malicious file, sending alarm information to terminal equipment to give an alarm, and updating the feature database based on the newly-added unknown file. Through the invention, the problem of low processing accuracy of the malicious file is solved, and the malicious file processing method based on the behavior characteristic information is realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a processing method, device, system, electronic device and storage medium of malicious files. Background technique [0002] Since the popularization and development of the Internet, computer malicious programs that destroy the system, tamper with files, affect system stability and execution efficiency, and steal information have always been important problems in computer use. These malicious programs include Trojan horse programs, ransomware, spy programs, etc., which may cause great harm or great property loss to enterprises or users. Therefore, using effective means to accurately identify and block malicious files has become a key point of computer security defense. [0003] In related technologies, the uploaded and downloaded file hash value is generally compared with the existing malicious file hash information in the database, and then the malicious file ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F11/14G06F16/906G06K9/62
CPCG06F21/562G06F21/566G06F11/1448G06F16/906G06F18/24G06F18/214
Inventor 金经南范渊杨勃
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD