Method for judging whether a know program has been attacked by employing program behavior knowledge base
A knowledge base and attacked technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as ports and protocols cannot be set, virus or hacker intrusion, affecting the normal operation of the network, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The method for judging that a known program is attacked by using the program behavior knowledge base of the present invention will be described in detail below in conjunction with an example.
[0038] The program behavior knowledge base is a database that uses automatic tools to analyze and list the actions and behaviors that may affect computer security executed by legal known programs one by one, and stores the analysis list.
[0039] In the method of using the program behavior knowledge base of the present invention to judge that a known program is attacked, the action behavior is divided into: monitoring action, which means that the action may affect computer security and needs to be monitored in real time; dangerous action, the action is first A monitoring action that may threaten computer security while the program is running. In addition, non-monitoring actions that do not affect computer security and do not need to be monitored will not be monitored and recorded...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 