Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious program detection method and device, electronic equipment and storage medium

A malicious program and detection method technology, applied in computer security devices, electrical digital data processing, instruments, etc., to achieve the effect of improving flexibility and reliability and avoiding adaptation work

Inactive Publication Date: 2021-09-07
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, Linux IoT devices usually intercept malicious programs by system call table (sys_call_table) or LMD (Linux Module Debugger) kernel module. Devices will use different kernel versions, which leads to the need to adjust the interception driver according to the different kernel versions, which brings a lot of extra adaptation work for developers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program detection method and device, electronic equipment and storage medium
  • Malicious program detection method and device, electronic equipment and storage medium
  • Malicious program detection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] In related technologies, Linux IoT devices usually use the system call table (sys_call_table) or LMD (Linux Module Debugger) kernel module to intercept malicious programs. Networked devices will use different kernel versions, which requires interception drivers to be adjusted according to different kernel versions, bringing a lot of ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious program detection method and device, electronic equipment and a storage medium, and the method comprises the steps of obtaining a process identifier corresponding to a process creation event when the process creation event is monitored; searching an application program corresponding to the process identifier, and extracting feature information of the application program, wherein the feature information comprises an encryption value or an absolute path of the program file; and verifying the feature information by using a preset feature library, and determining that the application program is a malicious program when verification succeeds. According to the invention, the process creation event can be obtained by utilizing the process monitoring service provided by the operating system, the running application program is determined by utilizing the event, and then whether the program is a malicious program or not is determined by utilizing the file characteristics of the application program without using an interception driver, so that the adaptation work caused by the interception driver can be effectively avoided; and the malicious program can be detected in an efficient, simple and convenient manner, so that the flexibility and reliability of detecting the malicious program by the Internet of Things equipment are improved.

Description

technical field [0001] The present invention relates to the field of Internet of Things equipment, in particular to a malicious program detection method, device, electronic equipment and storage medium. Background technique [0002] With the continuous development and popularization of the Internet of Things, the number of Internet of Things devices is gradually increasing, which also puts forward new requirements for the security protection capabilities of Internet of Things devices. In related technologies, Linux IoT devices usually intercept malicious programs by system call table (sys_call_table) or LMD (Linux Module Debugger) kernel module. Devices will use different kernel versions, which requires interception drivers to be adjusted according to different kernel versions, which brings a lot of extra adaptation work for developers. Contents of the invention [0003] The purpose of the present invention is to provide a malicious program detection method, device, elect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 王建安范渊黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More