CN104966018A - Windows system-based software program abnormal behavior analysis method - Google Patents
Windows system-based software program abnormal behavior analysis method Download PDFInfo
- Publication number
- CN104966018A CN104966018A CN201510340007.2A CN201510340007A CN104966018A CN 104966018 A CN104966018 A CN 104966018A CN 201510340007 A CN201510340007 A CN 201510340007A CN 104966018 A CN104966018 A CN 104966018A
- Authority
- CN
- China
- Prior art keywords
- behavior
- software
- software program
- program
- windows system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/12—Computing arrangements based on biological models using genetic models
- G06N3/126—Evolutionary algorithms, e.g. genetic algorithms or genetic programming
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Biophysics (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Physics & Mathematics (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Engineering & Computer Science (AREA)
- Biomedical Technology (AREA)
- Physiology (AREA)
- Genetics & Genomics (AREA)
- Artificial Intelligence (AREA)
- Computer Hardware Design (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
Abstract
本发明提供一种基于Windows系统的软件程序异常行为分析方法,用户选定一软件程序,对该软件程序的软件行为信息进行捕获;建立白名单库、黑名单库及危险行为库;根据白名单库、黑名单库及危险行为库,将捕获到的软件行为信息通过遗传算法进行分析,得到分析结果;将分析结果进行显示,大大降低了由于内部引起的网络安全隐患。
The invention provides a method for analyzing abnormal behavior of software programs based on Windows system. The user selects a software program, and captures the software behavior information of the software program; establishes a white list library, a black list library and a dangerous behavior library; according to the white list Library, blacklist library and dangerous behavior library, analyze the captured software behavior information through genetic algorithm, and get the analysis results; display the analysis results, which greatly reduces the hidden dangers of network security caused by internal.
Description
技术领域technical field
本发明涉及一种基于Windows系统的软件程序异常行为分析方法。The invention relates to a method for analyzing abnormal behavior of software programs based on Windows system.
背景技术Background technique
随着网络安全风险的日益增长,安全问题的复杂性日益加大,经过综合FBI和CSI对484家企业的调查及中国国家计算机网络应急协调中心CNCERT/CC的调查结果显示:大约76%的网络安全威胁来自于内部,由此可知其危害程度是远远超过黑客攻击及病毒造成的损失,而这些威胁绝大部分与内部各种网络访问行为有关;因此,迫切需要一种安全手段对上述问题进行有效的监控和管理。系统程序行为监测正是在这样的背景下产生的,系统异常行为分析程序可通过分析系统中各进程的行为,智能判定是否有病毒、木马异常或者危险操作。计算机信息系统安全需求和体系结构的共性,其构成要素是安全手段、系统单元及国际标准化组织(ISO)制定的开放系统互连参考模型(OSI)。本地系统对网络系统中的安全设备和网络设备、应用系统和运行状况进行全面的监测、分析、评估是保障网络安全的重要手段。目前,国内企业的信息系统大多还是Windows系统,包括一些IDC企业的很大一部分服务器系统也是Windows Server,所以对于Windows系统下的监测更是重中之重。With the increasing network security risks, the complexity of security issues is increasing. After a comprehensive survey of 484 companies by the FBI and CSI and the survey results of CNCERT/CC, the National Computer Network Emergency Coordination Center of China, it is shown that about 76% of the network Security threats come from inside, so it can be seen that the degree of harm far exceeds the losses caused by hacker attacks and viruses, and most of these threats are related to various internal network access behaviors; therefore, there is an urgent need for a security method to solve the above problems Effective monitoring and management. System program behavior monitoring is generated under such a background. The system abnormal behavior analysis program can intelligently determine whether there are viruses, Trojan horse abnormalities or dangerous operations by analyzing the behavior of each process in the system. The commonality of computer information system security requirements and architecture, its constituent elements are security means, system units and the Open System Interconnection Reference Model (OSI) formulated by the International Organization for Standardization (ISO). It is an important means to ensure network security that the local system conducts a comprehensive monitoring, analysis, and evaluation of security devices, network devices, application systems, and operating conditions in the network system. At present, most of the information systems of domestic enterprises are still Windows systems, including a large part of the server systems of some IDC enterprises are also Windows Server, so the monitoring under the Windows system is the most important thing.
发明内容Contents of the invention
本发明要解决的技术问题,在于提供一种基于Windows系统的软件程序异常行为分析方法。The technical problem to be solved by the present invention is to provide a method for analyzing abnormal behavior of software programs based on Windows system.
本发明是这样实现的:一种基于Windows系统的软件程序异常行为分析方法,包括如下步骤:The present invention is realized like this: a kind of software program abnormal behavior analysis method based on Windows system comprises the following steps:
步骤1、用户选定一软件程序,对该软件程序的软件行为信息进行捕获;Step 1, the user selects a software program, and captures the software behavior information of the software program;
步骤2、建立白名单库、黑名单库及危险行为库;Step 2, establishing a whitelist library, a blacklist library and a dangerous behavior library;
步骤3、根据白名单库、黑名单库及危险行为库,将捕获到的软件行为信息通过遗传算法进行分析,得到分析结果;Step 3. According to the whitelist database, blacklist database and dangerous behavior database, the captured software behavior information is analyzed by genetic algorithm to obtain the analysis result;
步骤4、将分析结果进行显示。Step 4, display the analysis result.
进一步地,所述步骤1进一步具体为:用户选定一软件程序,在Windows系统中建立钩子程序,通过钩子程序对该软件程序的软件行为信息进行捕获。Further, the step 1 is further specifically: the user selects a software program, establishes a hook program in the Windows system, and captures the software behavior information of the software program through the hook program.
进一步地,所述步骤1中,将捕获的软件行为信息进行存储。Further, in the step 1, the captured software behavior information is stored.
进一步地,所述软件行为信息包括进线程行为、注册表行为、文件行为、网络行为和驱动行为。Further, the software behavior information includes thread behavior, registry behavior, file behavior, network behavior and driver behavior.
进一步地,所述步骤4进一步具体为:将分析结果进行显示,并将分析结果存储至对应的库中。Further, the step 4 is further specifically: displaying the analysis result, and storing the analysis result in a corresponding library.
本发明具有如下优点:本发明一种基于Windows系统的软件程序异常行为分析方法,大大降低了由于内部引起的网络安全隐患。The present invention has the following advantages: the present invention is a method for analyzing abnormal behavior of software programs based on the Windows system, which greatly reduces hidden dangers of network security caused by the inside.
附图说明Description of drawings
下面参照附图结合实施例对本发明作进一步的说明。The present invention will be further described below in conjunction with the embodiments with reference to the accompanying drawings.
图1为本发明方法执行流程图。Fig. 1 is a flow chart of the execution of the method of the present invention.
具体实施方式Detailed ways
本发明基于Windows系统的软件程序异常行为分析方法,包括如下步骤:The present invention is based on the software program abnormal behavior analysis method of Windows system, comprises the following steps:
步骤1、用户选定一软件程序,在Windows系统中建立钩子程序,通过钩子程序对该软件程序的软件行为信息进行捕获,将捕获的软件行为信息进行存储,所述软件行为信息包括进线程行为、注册表行为、文件行为、网络行为和驱动行为;Step 1, the user selects a software program, establishes a hook program in the Windows system, captures the software behavior information of the software program through the hook program, and stores the captured software behavior information, and the software behavior information includes thread behavior , registry behavior, file behavior, network behavior and driver behavior;
步骤2、建立白名单库、黑名单库及危险行为库;Step 2, establishing a whitelist library, a blacklist library and a dangerous behavior library;
步骤3、根据白名单库、黑名单库及危险行为库,将捕获到的软件行为信息通过遗传算法进行分析,得到分析结果;Step 3. According to the whitelist database, blacklist database and dangerous behavior database, the captured software behavior information is analyzed by genetic algorithm to obtain the analysis results;
步骤4、将分析结果进行显示,并将分析结果存储至对应的库中。Step 4. Display the analysis results, and store the analysis results in a corresponding library.
本发明一种具体实施方式如下:A kind of specific implementation mode of the present invention is as follows:
一、系统构架:系统由一个可执行程序、规则库(本地或云端)、日志文件、被分析软件等组成。1. System architecture: The system consists of an executable program, rule base (local or cloud), log files, analyzed software, etc.
系统组成功能:System components and functions:
1、整体系统的构建:1. Construction of the overall system:
(1)、驱动监测模块;(1), drive monitoring module;
a.在SSDT表中,HOOK要用到的函数;a. In the SSDT table, the function to be used by HOOK;
b.与控制层的数据实现交换。b. Data exchange with the control layer.
(2)、数据传输控制模块(DLL)(2), data transmission control module (DLL)
a.在ring3HOOK网络功能函数;a. In the ring3HOOK network function;
b.与驱动层交互;b. Interact with the driver layer;
c.接收用户界面层的输入数据信息,并发送数据返回界面层。c. Receive the input data information of the user interface layer, and send the data back to the interface layer.
(3)、用户功能模块(3), user function module
a.监测程序行为;a. Monitor program behavior;
b.显示被监测程序的行为过程;b. Display the behavior process of the monitored program;
c.生成日志,并记录到access数据库;c. Generate a log and record it to the access database;
d.产生报告(报告经过筛选和判断);d. Generate reports (reports are screened and judged);
e.自定义程序安全行为(黑白名单的维护)。e. Customize program security behavior (maintenance of black and white lists).
(4)、使用遗传算法来学习和定义规则模块。(4) Use genetic algorithm to learn and define rule modules.
程序可以自行总结一些规则,并根据这些规则自动判断软件行为是否危险。The program can summarize some rules by itself, and automatically judge whether the software behavior is dangerous or not according to these rules.
二、驱动监测2. Drive monitoring
驱动程序负责监测系统程序的行为。具体实现流程如下:Drivers are responsible for monitoring the behavior of system programs. The specific implementation process is as follows:
驱动层(ring0):驱动安装后,会执行InitData(),此函数功能就是获取该程序需要hook的系统服务函数(即存放于SSDT的函数)的地址,使用自定义的函数替换。Driver layer (ring0): After the driver is installed, InitData() will be executed. The function of this function is to obtain the address of the system service function (that is, the function stored in SSDT) that the program needs to hook, and replace it with a custom function.
在驱动控制函数包含了两个控制码:The drive control function contains two control codes:
OCTRL_PROCESS_MONITOR_ON和IOCTRL_PROCESS_MONITOR_OFF,分别用来实现开启hook和关闭hook。同时为了实现和ring3层程序的数据和控制交互,ring3层程序在发送开启hook控制码是同时发送了在该层申请的缓冲区,ring0程序通过映射OCTRL_PROCESS_MONITOR_ON and IOCTRL_PROCESS_MONITOR_OFF are used to enable and disable hook respectively. At the same time, in order to realize the data and control interaction with the ring3 layer program, the ring3 layer program sends the buffer area applied for at this layer while sending the hook control code, and the ring0 program passes the mapping
//获取用户层传送过来的缓冲区地址//Get the buffer address sent by the user layer
dwBuffAddress=*(DWORD*)pIoBuffer;dwBuffAddress=*(DWORD*)pIoBuffer;
//根据虚拟地址获取物理地址//Get the physical address according to the virtual address
pPhysicalAddr=MmGetPhysicalAddress((PVOID)dwBuffAddress);pPhysicalAddr = MmGetPhysicalAddress((PVOID)dwBuffAddress);
//把物理地址映射到虚拟地址//Map physical address to virtual address
g_pMyBuff=(PMY_BUFF)MmMapIoSpaceg_pMyBuff=(PMY_BUFF)MmMapIoSpace
(pPhysicalAddr,sizeof(MY_BUFF),(MEMORY_CACHING_TYPE)0);(pPhysicalAddr, sizeof(MY_BUFF),(MEMORY_CACHING_TYPE)0);
然后在ring0层可以“直接”访问该缓冲区,从而实现了ring0和ring3的交互。本程序采用内核层HOOK技术。Then the buffer can be accessed "directly" at the ring0 layer, thus realizing the interaction between ring0 and ring3. This program uses kernel layer HOOK technology.
三、数据传输控制3. Data transmission control
DLL(控制)层:该层首先以服务的形式安装驱动程序,加载驱动,建立设备连接然后开启网络功能HOOK(使用的是消息HOOK中的全局HOOK,基于一个hook模板库)DLL (control) layer: This layer first installs the driver program in the form of a service, loads the driver, establishes a device connection and then enables the network function HOOK (using the global HOOK in the message HOOK, based on a hook template library)
a、打开服务控制管理器;a. Open the Service Control Manager;
b、创建驱动所对应的服务;b. Create the service corresponding to the driver;
c、建立设备连接。c. Establish a device connection.
该层导出了monitor和unmonitor两个函数,分别用来启动监测和停止监测。Monitor实现:This layer exports two functions, monitor and unmonitor, which are used to start monitoring and stop monitoring respectively. Monitor implementation:
(1)打开驱动程序的符号链接,发送启动控制码,通知驱动程序开启hook;(1) Open the symbolic link of the driver, send the start control code, and notify the driver to open the hook;
(2)Monitor在发送启动控制码后,还创建了一个接受内核信息的线程MonitorThreadProc。(2) After the Monitor sends the startup control code, it also creates a thread MonitorThreadProc that accepts kernel information.
(3)线程MonitorThreadProc循环接受驱动程序发送的信息,进行适当处理(转换盘符等)后以消息的形式发送至用户界面层程序。(3) The thread MonitorThreadProc receives the information sent by the driver in a loop, and sends it to the user interface layer program in the form of a message after appropriate processing (converting the drive letter, etc.).
(4)关键数据结构m_MyBuff.m_dwKenelReturn(检查驱动程序是否发送来新的信息),在信息处理后,dll层将其置为false,m_MyBuff.m_dwUserReturn(使用者是否同意程序通过),始终置为true(因为该程序还不是主动防御型的,只做行为分析)。(4) The key data structure m_MyBuff.m_dwKenelReturn (check whether the driver sends new information), after the information is processed, the dll layer sets it to false, m_MyBuff.m_dwUserReturn (whether the user agrees to the program), always set to true (Because the program is not active defense type, only behavioral analysis).
(5)相对应的,在驱动程序中也要控制一下if(!g_pMyBuff->m_dwKenelReturn)break,如果ring3层程序没有把消息处理完就等下去,一直到消息处理完复制消息的函数才返回,进行下一次消息复制。(5) Correspondingly, the if(!g_pMyBuff->m_dwKenelReturn) break should also be controlled in the driver program. If the ring3 layer program does not finish processing the message, it will wait until the message is processed and the function of copying the message returns. Proceed to the next message copy.
四、用户应用4. User application
用户应用模块的功能是满足用户简单操作并分析所需监测程序的监测行为过程。具体实现流程如下:The function of the user application module is to satisfy the user's simple operation and analyze the monitoring behavior process of the required monitoring program. The specific implementation process is as follows:
在程序初始化时,加载控制层的dll文件,同时打开access数据库的连接。When the program is initialized, the dll file of the control layer is loaded, and the connection of the access database is opened at the same time.
出现操作界面后,打开需要监测的程序可执行文件。After the operation interface appears, open the executable file of the program to be monitored.
点击“开始鉴定”,会把该可执行文件打开。在此过程中,驱动程序已经开始监测该可执行文件的各种行为,并动态地把监测到的行为发送到控制层,控制层以消息的形式发送给界面,界面接收并显示。Clicking "Start Authentication" will open the executable file. During this process, the driver has started to monitor various behaviors of the executable file, and dynamically sends the monitored behaviors to the control layer, and the control layer sends them to the interface in the form of messages, and the interface receives and displays them.
点击“停止鉴定”后,驱动程序监控停止。此过程中的所有监测到的行为已被保存,会在生成日志过程中记录到数据库中。After clicking "Stop Authentication", the driver monitoring stops. All monitored behaviors during this process have been saved and will be recorded in the database during the log generation process.
“生成日志”:会产生txt格式的记录,并同时记录的数据库中,供分析。"Generate log": A record in txt format will be generated and recorded in the database for analysis.
“生成报告”:会在doc目录下生成一个以系统时间命名的html文件,而且自动打开,把经过优化的记录显示出来,并分析了比较可疑的行为,供用户参考分析。"Generate report": An html file named after the system time will be generated in the doc directory, and it will be opened automatically, and the optimized records will be displayed, and suspicious behaviors will be analyzed for users' reference and analysis.
“添加规则”:可以方便用户添加允许通过的行为,同时也可以删除一些过时的行为。"Add rule": It is convenient for users to add behaviors that are allowed to pass, and it can also delete some outdated behaviors.
五、应用遗传算法5. Application of Genetic Algorithm
本系统采用了遗传算法来实现规则的自动生成,该算法主要采纳了生物学物种进化的原理模型,借助于选择、交叉、变异等生物学遗传操作。This system uses genetic algorithm to realize the automatic generation of rules. This algorithm mainly adopts the principle model of biological species evolution, and uses biological genetic operations such as selection, crossover, and mutation.
遗传算法的一般步骤:先随机初始化一个种群,然后利用适应度计算函数计算该种群中的每一个个体的适应度,之后,根据制定的规则计算个体是否满足优化准则的判定标准。如果满足,那么算法停止,当前的种群就是最优个体。The general steps of the genetic algorithm: first randomly initialize a population, then use the fitness calculation function to calculate the fitness of each individual in the population, and then calculate whether the individual meets the criteria for optimization according to the established rules. If it is satisfied, then the algorithm stops, and the current population is the optimal individual.
如果不满足准则,那么算法将选取适应度高的个体,对这个种群的个体进行生物学的遗传操作,比如选择、交叉、变异等,遗传操作的目的就是要进化得到更优秀的子代种群,经过演化之后的子代种群,需要利用已有的规则,重新判定优化准则的满足程度,进而进化生成新的种群。If the criteria are not met, the algorithm will select individuals with high fitness, and carry out biological genetic operations on individuals in this population, such as selection, crossover, mutation, etc. The purpose of genetic operations is to evolve a better offspring population. After evolution, the offspring population needs to use the existing rules to re-determine the degree of satisfaction of the optimization criteria, and then evolve to generate a new population.
通过遗传算法,把以往监测到的一些被定义为危险的行为,自行添加到规则文件,并根据这些行为作为判定的依据。同时,还能根据以往的经验,设定一些行为序列或集合为某种危险操作。Through the genetic algorithm, some previously monitored behaviors defined as dangerous are added to the rule file, and these behaviors are used as the basis for judgment. At the same time, based on past experience, some behavior sequences or collections can be set as certain dangerous operations.
在本程序中,若所分析的软件的行为存在于白名单中,则该软件行为被认为是安全的,否则被认为是危险的,借鉴遗传算法的思想,将白名单的控制权交给用户,由用户添加白名单,随着用户不断丰富白名单,本软件的识别能力变得越完善。白名单随着样本数量的增加而逐步完善,说白了就是,用户所添加的白名单越多,白名单越丰富,软件的识别行为越完善。In this program, if the behavior of the analyzed software exists in the white list, the software behavior is considered safe, otherwise it is considered dangerous. Drawing on the idea of genetic algorithm, the control of the white list is given to the user , the white list is added by the user. As the user continues to enrich the white list, the recognition ability of this software becomes more perfect. The white list is gradually improved as the number of samples increases. To put it bluntly, the more white lists added by users, the richer the white list and the more perfect the software's identification behavior.
基于遗传算法的系统异常行为分析程序的一般结构如下所示:The general structure of the system abnormal behavior analysis program based on genetic algorithm is as follows:
1、量化异常行为规则,适时调整算法的设计;1. Quantify abnormal behavior rules and adjust the algorithm design in a timely manner;
2、把编码规则记录问题,用数据结构表示基因,染色体的方式表示行为规则记忆空间;2. Record the coding rules, use the data structure to represent genes, and use chromosomes to represent the memory space of behavior rules;
3、设计、复制、交叉和变异操作算子;3. Design, copy, crossover and mutation operators;
4、适应度函数及成本函数的设计;4. Design of fitness function and cost function;
5、规则记忆记录处理(如:设置白名单、拉入黑名单以及自动识别黑白名单上的行为等)5. Rule memory record processing (such as: setting whitelist, pulling into blacklist, and automatically identifying behaviors on the blacklist and whitelist, etc.)
虽然以上描述了本发明的具体实施方式,但是熟悉本技术领域的技术人员应当理解,我们所描述的具体的实施例只是说明性的,而不是用于对本发明的范围的限定,熟悉本领域的技术人员在依照本发明的精神所作的等效的修饰以及变化,都应当涵盖在本发明的权利要求所保护的范围内。Although the specific embodiments of the present invention have been described above, those skilled in the art should understand that the specific embodiments we have described are only illustrative, rather than used to limit the scope of the present invention. Equivalent modifications and changes made by skilled personnel in accordance with the spirit of the present invention shall fall within the protection scope of the claims of the present invention.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510340007.2A CN104966018A (en) | 2015-06-18 | 2015-06-18 | Windows system-based software program abnormal behavior analysis method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510340007.2A CN104966018A (en) | 2015-06-18 | 2015-06-18 | Windows system-based software program abnormal behavior analysis method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104966018A true CN104966018A (en) | 2015-10-07 |
Family
ID=54220056
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510340007.2A Pending CN104966018A (en) | 2015-06-18 | 2015-06-18 | Windows system-based software program abnormal behavior analysis method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104966018A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020215567A1 (en) * | 2019-04-26 | 2020-10-29 | 平安科技(深圳)有限公司 | Global hook automatic repair method, apparatus, device, and storage medium |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101183414A (en) * | 2007-12-07 | 2008-05-21 | 白杰 | Program detection method, device and program analyzing method |
| CN101373501A (en) * | 2008-05-12 | 2009-02-25 | 公安部第三研究所 | Dynamic Behavior Capturing Method for Computer Viruses |
| CN101924762A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Active defense method based on cloud security |
| CN103106366A (en) * | 2010-08-18 | 2013-05-15 | 北京奇虎科技有限公司 | Dynamic maintenance method of sample database based on cloud |
| CN103500305A (en) * | 2013-09-04 | 2014-01-08 | 中国航天科工集团第二研究院七〇六所 | System and method for malicious code analysis based on cloud computing |
| CN103942493A (en) * | 2014-03-28 | 2014-07-23 | 北京工业大学 | Intelligent active defensive system and method under Window |
-
2015
- 2015-06-18 CN CN201510340007.2A patent/CN104966018A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101183414A (en) * | 2007-12-07 | 2008-05-21 | 白杰 | Program detection method, device and program analyzing method |
| CN101373501A (en) * | 2008-05-12 | 2009-02-25 | 公安部第三研究所 | Dynamic Behavior Capturing Method for Computer Viruses |
| CN101924762A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Active defense method based on cloud security |
| CN103106366A (en) * | 2010-08-18 | 2013-05-15 | 北京奇虎科技有限公司 | Dynamic maintenance method of sample database based on cloud |
| CN103500305A (en) * | 2013-09-04 | 2014-01-08 | 中国航天科工集团第二研究院七〇六所 | System and method for malicious code analysis based on cloud computing |
| CN103942493A (en) * | 2014-03-28 | 2014-07-23 | 北京工业大学 | Intelligent active defensive system and method under Window |
Non-Patent Citations (1)
| Title |
|---|
| 王成: "《信息对抗理论与技术》", 31 January 2011 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020215567A1 (en) * | 2019-04-26 | 2020-10-29 | 平安科技(深圳)有限公司 | Global hook automatic repair method, apparatus, device, and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220345476A1 (en) | Threat mitigation system and method | |
| US20220224723A1 (en) | Ai-driven defensive cybersecurity strategy analysis and recommendation system | |
| CN102638617B (en) | Active response system based on intrusion detection for Android mobile phones | |
| US9912691B2 (en) | Fuzzy hash of behavioral results | |
| JP6100898B2 (en) | Method and device for processing messages | |
| EP2447877B1 (en) | System and method for detection of malware and management of malware-related information | |
| CN102508768B (en) | Monitoring method and monitoring device | |
| CN108009424A (en) | Virus behavior detection method, apparatus and system | |
| US11297092B2 (en) | Threat mitigation system and method | |
| US20200065482A1 (en) | Evaluation method, information processing apparatus, and storage medium | |
| CN111563015A (en) | Data monitoring method and device, computer readable medium and terminal equipment | |
| WO2021021737A1 (en) | Threat mitigation system and method | |
| IL254869A (en) | Message report processing and threat prioritization | |
| CN114662111A (en) | Malicious code software gene homology analysis method | |
| CN113918534B (en) | Policy processing system and method | |
| CN116595523A (en) | Multi-engine file detection method, system, equipment and medium based on dynamic arrangement | |
| CN104966018A (en) | Windows system-based software program abnormal behavior analysis method | |
| CN114844691A (en) | Data processing method and device, electronic equipment and storage medium | |
| CN104243604A (en) | File disabling method and device | |
| CN102571785B (en) | Method and device for solving security problems of terminals | |
| CN113420302A (en) | Host vulnerability detection method and device | |
| KR101942442B1 (en) | System and method for inspecting malicious code | |
| Lukavsky | Visualizing the malicious threat landscape |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151007 |
|
| RJ01 | Rejection of invention patent application after publication |