Computer protecting method based on programm behaviour analysis

A behavior analysis, computer technology, applied in computing, program control devices, instruments, etc., can solve the problems of anti-virus software, complicated use of firewalls, and the inability of anti-virus software to protect against unknown viruses and Trojans.

Active Publication Date: 2006-08-16
北京东方微点信息技术有限责任公司
View PDF0 Cites 81 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention is produced to solve the shortcomings of the prior art, solves the problem that existing antivirus software and firewalls cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer protecting method based on programm behaviour analysis
  • Computer protecting method based on programm behaviour analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Referring to the accompanying drawings, and in conjunction with the most commonly used Microsoft Windows operating system, the computer protection method based on program behavior analysis of the present invention is applied to the Microsoft Windows operating system, and the embodiments of the present invention are described in detail.

[0080] Such as figure 1 Shown is a flow chart of the computer protection method based on program behavior analysis of the present invention.

[0081] The computer protection method based on program behavior analysis of the present invention is characterized in that:

[0082] For a known program, monitor its behavior and compare it with the legal behavior of the known program recorded in the program behavior knowledge base to determine whether the known program has been illegally attacked;

[0083] For unknown programs, monitor their actions and compare them with the attack identification rules recorded in the attack identification rule...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer protection method based on program behavior analysis includes monitoring its actuation behavior and comparing it with its legal actuation behavior stored in program behavior knowledge bank then judging whether known program is attacked illegally or not for known program; monitoring its actuation behavior and comparing it with attack identification rule stored in attack identification rule bank then judging whether it is harmful program or not for unknown program.

Description

technical field [0001] The invention relates to a computer protection method, which is different from the prior art in that it does not use virus feature codes for comparison, but uses program action behavior as a feature, and is a computer protection method based on program behavior analysis. Background technique [0002] For a long time, the struggle against computer virus invasion and anti-invasion has been going on fiercely. With the use of computers more and more widely, the intensity of this struggle has also risen to a new height. After long-term struggle and practice, people have summed up many specific methods to prevent the invasion of computer viruses, and developed many corresponding prevention products. These products can be roughly divided into two categories. One is to isolate intruding viruses, such as firewalls, which prevent the entry of intruding viruses by restricting communication ports and protocols; the other is to isolate virus-infected files that may...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F9/44H04L29/06
Inventor 刘旭
Owner 北京东方微点信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products