Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Analysis method for newly appearing malicious codes

A malicious code and analysis method technology, applied in the direction of instruments, computing, electrical digital data processing, etc., can solve the problems of fuzzy distinction, inability to use anti-virus, reduce the effect of malicious code analysis and processing, and achieve the effect of easy detection

Inactive Publication Date: 2022-05-13
南京伟跃网络科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned existing technical solutions have the following defects: as the times change, the spread of malicious codes does not rely solely on software vulnerabilities or social engineering, but may be a mixture of them, such as worms that produce parasitic file viruses, Trojan programs, password stealing programs, and backdoor programs further blur the distinction between worms, viruses, and Trojans, but existing detection methods can only detect a single virus program, resulting in the inability to use a matching method for antivirus after detection, reducing The overall analysis and processing effect of malicious code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The method of the present invention will be further described in detail below.

[0023] A method for analyzing new malicious codes, the steps are as follows:

[0024] S1: Configure the simulated running parameters, set a set of running data, ensure that the software in the storage hardware can be tested and verified during the data running process, and set a set of detection data at the same time to detect the number of files inside the storage hardware and increase Detect the operating parameters of the corresponding malicious program, and then set the text parameters. When the malicious program is detected as a whole, open the text program, and the text program records the solutions to various malicious programs. The operating data and guaranteed data include detectable operating status and hardware. There are at least two sets of programming codes for the number of internal software, operating data and guaranteed data. The content recorded in the text program is comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an analysis method for newly appearing malicious codes, relates to the field of malicious code analysis, and aims to solve the problem that the whole malicious code analysis and processing effect is reduced due to the fact that a matched method cannot be used for virus killing after malicious code detection. According to the technical scheme, the method is characterized by comprising the following steps of S1, configuring simulation running parameters, S2, running a test, loading the configured running parameters and detection data into storage hardware to be detected, S3, analyzing malicious codes, setting a malicious code analysis program to analyze the types of the generated malicious codes, S4, processing mixed codes, and S5, analyzing the malicious codes. And S5, recording and prevention: recording the malicious code type and condition of the last malicious code analysis by the setting program. And the effects of detecting multiple types of malicious codes, correspondingly solving the problem of inputting the malicious codes and new malicious codes and facilitating detection are achieved.

Description

technical field [0001] The invention relates to the technical field of malicious code analysis, in particular to an analysis method for emerging malicious codes. Background technique [0002] Malicious code is also known as malicious software. These software can also be called adware, spyware, and malicious shareware. Different from viruses or worms, software that is legitimate rights and interests of users is not secretly written and disseminated by small groups or individuals. On the contrary, many well-known companies and groups are involved in such software, sometimes called rogue software. [0003] Existing malicious code detection is to detect the software inside the hard disk through test data. After two detections, the first detection result is compared with the second detection result. The software inside has malware inside. [0004] The above-mentioned existing technical solutions have the following defects: as the times change, the spread of malicious codes does...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/563
Inventor 纪佳佳
Owner 南京伟跃网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products