Suspicious process processing method and device, storage medium and electronic equipment

A process processing and process technology, applied in the field of data security, can solve problems such as leakage of sensitive files, and achieve the effect of improving security

Pending Publication Date: 2022-01-21
HARBIN ANTIY TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For victims, the file backup strategy usually developed to deal with ransomware attacks is no longer able to fully comb

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious process processing method and device, storage medium and electronic equipment
  • Suspicious process processing method and device, storage medium and electronic equipment
  • Suspicious process processing method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] figure 1 is a flowchart of a suspicious process processing method shown according to one or more embodiments of the present invention, the method can be applied to a terminal, for example, can be executed by a terminal, such as figure 1 As shown, the method includes:

[0037] Step 101: Monitor the processes running in the terminal system;

[0038] For example, it is possible to periodically detect whether the processes running in the terminal system meet the preset conditions at preset time intervals.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a suspicious process processing method and device, a storage medium and electronic equipment, relates to the technical field of data security, and aims to effectively detect attack behaviors of ransomware. The suspicious process processing method comprises the following steps: monitoring processes running in a terminal system; in response to monitoring that the operation corresponding to the process meets the preset condition, determining that the process is a suspicious process, and suspending the suspicious process; sending the information of the suspicious process to a server to request the server to judge whether the suspicious process has a secret stealing behavior or not, and obtaining a judgment result; obtaining the judgment result sent by the server; and processing the suspicious process according to the judgment result. The method provided by the embodiment of the invention are suitable for detecting the attack behavior of the ransomware.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a suspicious process processing method, device, storage medium and electronic equipment. Background technique [0002] In recent years, in the ransomware attacks disclosed by relevant security vendors for many times, it was found that the attackers were not limited to encrypting files during the extortion process, but adopted the form of extortion with secret stealing and encryption, which has a higher threat and further Increases the chances of the victim paying the ransom after the extortion. For victims, the file backup strategy usually formulated to deal with ransomware attacks is no longer able to fully combat this form of extortion. When facing this form of extortion, they also face the threat of sensitive files being leaked. Contents of the invention [0003] In view of this, one or more embodiments of the present invention provide a suspicious process processing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/566G06F21/552
Inventor 黄伟强曹鑫磊张慧云肖新光
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products