Uploaded file threat detection method and device, and computer readable storage medium

A threat detection and file technology, applied in the field of vehicle security, can solve problems such as Web website threat attacks, and achieve the effect of reducing subsequent attack events

Active Publication Date: 2021-11-02
新浪技术(中国)有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present application is to provide a method and device for uploading file threat detection, and a computer-readable storage medium to solve the problem that a potential malicious uploaded file causes a Web site to be threatened and attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uploaded file threat detection method and device, and computer readable storage medium
  • Uploaded file threat detection method and device, and computer readable storage medium
  • Uploaded file threat detection method and device, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application. The drawing numbers in this application are only used to distinguish each step in the solution, and are not used to limit the execution order of each step. The specific execution order is subject to the description in the specification.

[0024] In order to solve the problems existing in the prior art, an embodiment of the present application provides a method for threat detection of uploaded files, figure 1 It is a schematic flowchart of a method for detecting uploaded file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an uploaded file threat detection method and device, and a computer readable storage medium, wherein the scheme provided by the invention comprises the steps of obtaining uploading log data corresponding to an uploaded file, wherein the uploading log data comprises a multi-purpose Internet mail extension MINE type and a file extension name of the uploaded file; performing consistency detection on the MINE type and the file extension name of the uploaded file according to the uploaded log data; performing anomaly detection on the content of a suspicious uploading file of which the MINE type is inconsistent with the file extension detection in the uploading file; detecting whether a target upload file with abnormal content detection in the suspicious upload file is an executable program or not; and determining the target uploaded file which is detected as the executable program as a threat file. According to the method and the device, malicious files in the uploaded files can be effectively detected, and the risk that a Web website is threatened and attacked is reduced.

Description

technical field [0001] The present application relates to the technical field of vehicle security, in particular to a method and device for detecting threat of uploaded files, and a computer-readable storage medium. Background technique [0002] Various threats and attacks that may exist in the files uploaded by users in the process of using the Web site. In order to reduce the risk of malicious attacks on the site, the file types allowed by the system are usually limited to a certain range, such as image files, or a text file. [0003] However, illegal users will circumvent this restriction by tampering with the uploaded file type and other means. As a result, the uploaded file is actually a malicious file, which will cause more security problems in the later stage of file use, thus posing a security threat to the network environment and hardware assets. . [0004] How to effectively detect malicious files in uploaded files, reduce the risk of web sites being threatened a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F16/903
CPCH04L63/1425H04L67/06G06F16/90344
Inventor 盛洋
Owner 新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products