Method and device for monitoring change situation of malicious codes and computer equipment
A malicious code and situation technology, applied in computer security devices, computing, instruments, etc., can solve the problem of inability to accurately monitor the changing situation of malicious code, and achieve the effect of accurately monitoring the changing situation, improving the monitoring strength, and accurately spreading the method.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0084] In order to make the technical solutions and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below.
[0085] The terms used in the embodiments of the present application are explained below:
[0086] Malicious code: the code inserted into the program by the programmer to destroy terminal functions or data, that is, a virus.
[0087] Virus family: A general term for viruses and their variants. There is a relationship or similarity between files and related information of the same virus family.
[0088] Breadth of distribution: The number of users for which a particular message exists. For example, if file A appears on terminals of N users, then the distribution breadth of file A is N.
[0089]The embodiment of the present application provides an application scenario for monitoring changes in malicious codes. The application scenario is mainly applied to security software for check...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


