Method for interfering malicious program
A malicious program and process technology, applied in the field of network security, can solve problems such as inability to resist malicious programs, and achieve the effect of increasing confusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] like figure 1 As shown, a method for interfering with malicious programs includes the following steps: obtaining malicious program heap information according to the CS malicious program process, and performing feature analysis to obtain malicious program memory features, and writing malicious program memory features as detection rules; traversing the host runtime Heap information of each process memory, and scan the memory malicious program process according to the detection rules. When the CS malicious program is delivered to the host, it will be stored in the process memory. Therefore, it needs to carry the CS malicious program when the host is running. Identify the malicious program process in the memory of the program, and then carry out interference and countermeasures against the malicious program.
[0043] Obtain the malicious program heap information according to the CS malicious program process, and perform feature analysis to obtain the memory characteristics ...
Embodiment 2
[0083] A computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, any one of the interference methods mentioned above is realized.
[0084]More specific examples of computer-readable storage media may include, but are not limited to, electrical connections with one or more wire segments, portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
[0085] In the present application, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device. In this application, however, a computer-readable signal medium may include a data signal propagat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
