WO2023124041A1 - Ransomware detection method and related system - Google Patents

Ransomware detection method and related system Download PDF

Info

Publication number
WO2023124041A1
WO2023124041A1 PCT/CN2022/107828 CN2022107828W WO2023124041A1 WO 2023124041 A1 WO2023124041 A1 WO 2023124041A1 CN 2022107828 W CN2022107828 W CN 2022107828W WO 2023124041 A1 WO2023124041 A1 WO 2023124041A1
Authority
WO
WIPO (PCT)
Prior art keywords
decoy
file
directory
ransomware
application
Prior art date
Application number
PCT/CN2022/107828
Other languages
French (fr)
Chinese (zh)
Inventor
刘剑波
Original Assignee
华为云计算技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为云计算技术有限公司 filed Critical 华为云计算技术有限公司
Publication of WO2023124041A1 publication Critical patent/WO2023124041A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Definitions

  • the present application relates to the technical field of network security, and in particular to a ransomware virus detection method, system, computer cluster, computer-readable storage medium, and computer program product.
  • Ransomware generally traverses all directories of the client host through deep traversal, and encrypts key business/data files (such as database files, office documents, compressed files, videos, pictures, and source codes). Some ransomware will encrypt specified types of files exceeding a fixed size in a specific directory, making the encrypted files unable to be read normally and affecting the normal operation of the business. At the same time, the ransomware virus generates a ransom note file in the directory where the encrypted file is located. The customer can only obtain the decryption password/tool or the method to restore the normal operation of the system after paying the ransom based on the ransom note file.
  • key business/data files such as database files, office documents, compressed files, videos, pictures, and source codes.
  • the detection system generates a decoy file according to the application or system directory, and then the detection system can detect the access behavior to the decoy file, obtain the attribute change of the decoy file before and after the access behavior, and then the detection system can Variation identified ransomware.
  • the exclusion directory can be used to exclude unnecessary directories, so as to avoid resource waste caused by deploying decoy files in the directory.
  • the target keyword can be used to provide a reference for the name of the generated lure file, thereby further improving the deception of the lure file.
  • the security response module is configured to stop the ransomware process and block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus.
  • the detection parameters further include at least one of an exclusion directory and a target keyword
  • the exclusion directory is a directory in the system directory that does not need to deploy the decoy file
  • the target keyword is used to generate the name of the decoy file.
  • FIG. 7 is a schematic structural diagram of a computer cluster provided by an embodiment of the present application.
  • tenants such as individuals, enterprises or other group organizations
  • tenant applications can lease or purchase one or more cloud servers in the cloud computing cluster 10 , to deploy tenant applications, for example, to deploy application 1 to application N, where N is a positive integer.
  • FIG. 1 illustrates by deploying multiple applications.
  • a tenant may also deploy one application.
  • a ransomware detection system 100 is also deployed in the cloud computing cluster 10 , which is referred to as the detection system 100 hereinafter for convenience of description.
  • the detection system 100 may generate warning information according to the detected ransomware virus, and send the warning information to the terminal 20, so that the terminal presents the warning information to the user.
  • the warning information includes the identification of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the access path of the ransomware process, and the access path of the ransomware process. one or more of the behaviors.
  • the ransomware process is a process corresponding to the ransomware virus.
  • the method includes:
  • S202 The detection system 100 presents a configuration interface to the user.
  • the configuration interface 300 includes a plurality of parameter configuration controls, and the plurality of parameter configuration controls are respectively used to configure different detection parameters.
  • the detection mode configuration control 302 in the configuration interface 300 is used to configure the detection mode of the ransomware virus.
  • the detection mode configuration control 302 may include two selection controls. If the user selects the selection control corresponding to "Yes", it means that the bait-based For the detection method of the file (specifically, the decoy file generated according to the application or system directory), if the user selects the selection control corresponding to "No", it means that the detection method based on the decoy file is not enabled.
  • the detection system 100 receives the detection parameters configured by the user through the configuration interface.
  • the user can trigger a submission operation, and the terminal 20 can respond to the user's submission operation, and send the detection parameters to the detection system 100.
  • the detection system 100 can receive the detection parameters sent by the terminal. parameter.
  • the user may click the OK control 307 to trigger the submission operation.
  • the detection system 100 receives the detection parameters submitted by the terminal 20 in response to the submission operation triggered by the user.
  • the user may also toggle the cancel control 309, thereby canceling configuration detection parameters.
  • the detection system 100 can monitor the running process, specifically monitor the access behavior of the process, so as to obtain the access information of the application.
  • An access action may include an action of reading data and/or writing data.
  • the detection system 100 can traverse the running process, identify the application according to the command line of the process, the path of the file corresponding to the process, and the configuration file related to the process, and then check the file directory, file type, file size, file name, etc. accessed by the process. Monitor and obtain application access information.
  • the access information of the application may include attributes of files accessed by the application, for example, the access information of the application may include one or more of file directories, file types, file sizes and file names accessed by the application.
  • the execution of the ransomware detection method of the embodiment of the present application may not execute S208, that is, the detection system 100 may not additionally generate a decoy directory to store decoy files.
  • the detection system 100 may use an existing directory to store decoy files.
  • the detection system 100 generates a decoy file according to the access information of the application.
  • the access information of the application includes the types of files accessed by the application.
  • the detection system 100 can generate a decoy file according to the file type accessed by the application. Wherein, the detection system 100 may respectively generate multiple decoy files according to multiple file types accessed by the application.
  • the file type of the decoy file is the same as the file type accessed by the application. In this way, ransomware can be prevented from bypassing decoy files of fixed file types.
  • the detection system 100 when it generates a decoy file, it may generate multiple decoy files with different file sizes. For example, the detection system 100 may randomly generate multiple decoy files with different file sizes, or the detection system 100 may generate multiple decoy files with different file sizes according to the file size accessed by the application. In this way, it is possible to prevent ransomware from bypassing decoy files with a fixed file size.
  • the detection system 100 may also determine the file name keywords commonly used by the application according to the file name accessed by the application, and then generate the name of the decoy file according to the file name keywords commonly used by the application. Further, when the detection parameter includes the target keyword, the detection system 100 may also determine the name of the decoy file in combination with the target keyword. Similarly, when the detection parameter includes the type of the target file, the detection system 100 may combine the type of the target file to generate a decoy file. For example, the detection system 100 may randomly select several file types from the intersection of file types accessed by applications and target file types, and generate corresponding types of decoy files.
  • the application is a MySQL application
  • the detection system 100 can generate decoy files related to the MySQL application with file extensions such as log, frm, myd, myi, ibd, etc., and the decoy files of these file types
  • file extensions such as log, frm, myd, myi, ibd, etc.
  • the detection system 100 can generate decoy files with a file size of 1MB and 5MB, and for other types of files, the detection system 100 can generate decoy files with a file size of 64KB and 128KB .
  • the detection system 100 can also name the above-mentioned decoy files according to the commonly used file name keywords of applications.
  • the detection system 100 can also generate a decoy file according to the content of the file accessed by the application, so as to prevent the ransomware from bypassing the decoy file according to the specific content, and first encrypt the business/data file of the application to affect the business operation.
  • a system directory refers to a directory of the file system.
  • System catalogs can be represented in a tree structure. Different computing devices may adopt different file systems, and correspondingly, system directories may be different.
  • a Linux system directory is used as an example for description.
  • each user has its own directory.
  • the directory is named after the user's account, such as alice, bob, and eve in the above figure.
  • root is the user home directory of the system administrator (also known as a super-authorized person)
  • sbin is the abbreviation of Superuser Binaries (superuser binary files), which is used to store the system management program used by the system administrator.
  • tmp is the abbreviation of temporary (temporary), this directory is used to store some temporary files.
  • usr is the abbreviation of unix shared resources, which is used to store applications and files, similar to the program files directory under windows. Among them, the usr directory specifically includes bin, sbin, and src directories.
  • bin stores applications used by ordinary users
  • sbin stores relatively advanced management programs and system daemons used by super users
  • src stores kernel source codes.
  • var is the abbreviation of variable variable
  • this directory stores things that are constantly expanding, such as various log files.
  • run is a temporary file system that stores information since the system was started. When the system restarts, the files in this directory should be deleted or cleared.
  • S212 The detection system 100 generates a decoy list according to the system list.
  • the lure directory is a directory for storing lure files.
  • the detection system 100 can generate a decoy directory under the system directory.
  • At least one lure list may be generated, for example, the detection system 100 may generate at least one of the first lure list, the second lure list and the third lure list.
  • the name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal.
  • the name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order.
  • the name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
  • the first prefix can be the character at the top of the printable characters, such as "!, so that the first decoy directory can be accessed preferentially when traversing in the forward order;
  • the second prefix can be the printable character The lower-ordered characters in , such as " ⁇ ”, can make the second decoy directory preferentially accessed when traversing in reverse order;
  • the third prefix can be a character indicating a hidden directory, such as ".”, so that the third bait Directories are accessed first when traversing system disks by default.
  • the detection system 100 may execute S208 and/or S212 to generate at least one of the first decoy category, the second decoy category and the third decoy category.
  • the detection system 100 may generate the first decoy directory by executing S208 and/or S212.
  • the detection system 100 may generate the second decoy directory by executing S208 and/or S212.
  • the detection system 100 may generate a third decoy directory by executing S208 and/or S212.
  • S214 The detection system 100 generates multiple decoy files under the system directory according to the detection parameters.
  • the detection parameters include the target file type
  • the detection system 100 can randomly select several file types from the target file types to generate multiple decoy files in the system directory, and the file type of the decoy files is consistent with the selected file type.
  • the detection system 100 may randomly generate decoy files of different file sizes according to the file size range.
  • the detection system 100 may also randomly select multiple file types directly from common file types that may be encrypted by ransomware. Specifically, when selecting a file type, as shown in Table 1, the detection system 100 can Randomly select some types from the file categories (including database, text/document, compressed file, video, picture, code source file, virtualization/container file, backup file, etc.) as the extension of the decoy file, and then randomly generate different The file size of the decoy file. Among them, the name of the decoy file can be randomly generated.
  • the file categories including database, text/document, compressed file, video, picture, code source file, virtualization/container file, backup file, etc.
  • the detection system 100 may randomly select several file types from target file types to generate some decoy files, and randomly select several file types from common file types to generate another part of decoy files.
  • the names of some decoy files can be randomly generated, and the names of the rest of the decoy files can be selected from target keywords.
  • the behavior of accessing the decoy file includes the behavior of reading data and/or writing data.
  • the detection system 100 detects the read behavior and/or write behavior of the decoy file by the process, it can obtain the attribute changes of the decoy file before and after the access behavior.
  • the update interface 500 presents change information detected by the detection system 100 , such as a change of an application or a change of a system directory.
  • This embodiment is described by taking an example of updating a decoy file based on application changes.
  • the update interface 500 shown in FIG. 5A shows the relevant information of the new application presented when the detection system 100 detects the new application, for example, the access information 502 of the new application;
  • FIG. 5B is used for the update interface 500 shown in FIG.
  • the relevant information 504 of the uninstalled application presented when the detection system 100 detects that the application is uninstalled is shown, including, for example, the name of the uninstalled application.
  • the update interface 500 also includes a cancel control 509, and when the cancel control 509 is triggered, the detection system 100 can cancel updating the decoy file.
  • the embodiment of the present application provides a ransomware detection method.
  • the detection system 100 generates decoy files with a high degree of similarity with real business/data files according to the application or system directory, so as to prevent the ransomware from jumping according to the fixed file size, file type, file name or deployment location.
  • the abnormal behavior of the ransomware encrypted file can be found effectively and more timely, so as to block the ransomware in time and reduce the damage caused by the ransomware.
  • the system 100 includes:
  • a decoy file management module 102 configured to generate a decoy file according to an application or a system directory
  • system 100 further includes:
  • system 100 further includes:
  • the decoy file management module 102 is also used for:
  • the system 100 may further include an application monitoring module 103, and the application monitoring module 103 is used for monitoring changes of applications.
  • the application monitoring module 103 detects an application change, such as detecting a new application or an application being uninstalled, it can report the change information to the decoy file management module 102, so that the decoy file management module 102 can update the decoy file according to the change information.
  • the decoy file is updated according to an update operation triggered by the user through the update interface.
  • the decoy file is generated according to the access information of the application.
  • the access information of the application includes a file directory accessed by the application
  • the decoy file management module 102 is specifically configured to:
  • system 100 further includes:
  • a decoy detection configuration module 108 configured to present a configuration interface to the user, and receive detection parameters configured by the user through the configuration interface, the detection parameters including the target file type;
  • a plurality of decoy files under the system directory are generated according to a file type randomly selected from the target file types.
  • a decoy directory is generated according to the system directory, and the decoy directory is a directory where the decoy file is located.
  • the lure list includes at least one of a first lure list, a second lure list, and a third lure list;
  • the name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal;

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

Provided in the present application is a ransomware detection method, comprising: generating a bait file according to an application or a system directory, detecting an access behavior to the bait file, acquiring an attribute change of the bait file before and after the access behavior, and determining ransomware according to the attribute change. In the method, a bait file with relatively high similarity in a real service/data file is generated according to an application or a system directory, and the file type, file size, file name and deployment location of the bait file are not fixed, such that ransomware is prevented from skipping the bait file according to a fixed file size, file type, file name or deployment location, and an abnormal behavior of a ransomware encrypted file can be found effectively and in a more timely manner, thereby blocking the ransomware in a timely manner, and reducing damage caused by the ransomware.

Description

一种勒索病毒检测方法以及相关系统A kind of blackmail virus detection method and related system
本申请要求于2021年12月31日提交中国国家知识产权局、申请号为202111679456.1、发明名称为“一种勒索病毒检测方法以及相关系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the State Intellectual Property Office of China on December 31, 2021, with application number 202111679456.1, and the title of the invention is "A Ransomware Detection Method and Related System", the entire contents of which are incorporated by reference in this application.
技术领域technical field
本申请涉及网络安全技术领域,尤其涉及一种勒索病毒检测方法、系统以及计算机集群、计算机可读存储介质、计算机程序产品。The present application relates to the technical field of network security, and in particular to a ransomware virus detection method, system, computer cluster, computer-readable storage medium, and computer program product.
背景技术Background technique
随着互联网的发展,尤其是移动互联网的发展,恶意代码如漏洞扫描、病毒等攻击代码能够在网络中广泛传播,并对网络中的设备进行攻击或感染,导致网络安全受到严重挑战。目前,勒索病毒攻击已成为最严峻的网络安全威胁之一,并且勒索病毒攻击还在持续增长,对客户造成巨大的影响。With the development of the Internet, especially the development of the mobile Internet, malicious codes such as vulnerability scanning, virus and other attack codes can be widely spread in the network, and attack or infect the devices in the network, causing serious challenges to network security. At present, ransomware attacks have become one of the most serious network security threats, and ransomware attacks continue to grow, causing a huge impact on customers.
勒索病毒一般会通过深度遍历的方式遍历客户主机的所有目录,并对关键的业务/数据文件(如数据库文件、办公文档、压缩文件、视频、图片和源代码)进行加密。部分勒索病毒会加密特定目录下超过固定大小的指定类型文件,使加密后的文件无法正常读取,影响业务正常运行。同时勒索病毒在加密文件所在目录下生成勒索说明文件,客户基于勒索说明文件缴纳赎金后才可获取解密口令/工具或获得恢复系统正常工作的方法。Ransomware generally traverses all directories of the client host through deep traversal, and encrypts key business/data files (such as database files, office documents, compressed files, videos, pictures, and source codes). Some ransomware will encrypt specified types of files exceeding a fixed size in a specific directory, making the encrypted files unable to be read normally and affecting the normal operation of the business. At the same time, the ransomware virus generates a ransom note file in the directory where the encrypted file is located. The customer can only obtain the decryption password/tool or the method to restore the normal operation of the system after paying the ransom based on the ransom note file.
如何快速、有效地检测到勒索病毒,进而降低勒索病毒造成的影响已成为网络安全领域的关键技术及挑战。How to quickly and effectively detect ransomware, and then reduce the impact of ransomware has become a key technology and challenge in the field of network security.
发明内容Contents of the invention
本申请提供了一种勒索病毒检测方法,该方法通过根据应用或系统目录生成与真实的业务/数据文件具有较高相似度的诱饵文件,该诱饵文件的文件类型、文件大小、文件名称、部署位置不固定,由此避免勒索病毒根据固定的文件大小、文件类型、文件名称或者部署位置跳过诱饵文件,能够有效地、更及时地发现勒索病毒加密文件的异常行为,从而及时阻断勒索病毒,降低勒索病毒造成的损害。本申请还提供了上述方法对应的系统、计算机集群、计算机可读存储介质以及计算机程序产品。This application provides a method for detecting ransomware, which generates a decoy file with a high degree of similarity to a real business/data file based on an application or system directory. The location is not fixed, thereby preventing the ransomware from skipping the bait file according to the fixed file size, file type, file name or deployment location, and can effectively and more timely discover the abnormal behavior of the ransomware encrypted files, thereby blocking the ransomware in time , to reduce the damage caused by ransomware. The present application also provides a system, a computer cluster, a computer-readable storage medium, and a computer program product corresponding to the above method.
第一方面,本申请提供了一种勒索病毒检测方法。该方法可以由勒索病毒检测系统执行。为了便于描述,本申请实施例也可以将勒索病毒检测系统简称为检测系统。在一些实施例中,检测系统可以是软件系统,软件系统可以部署在计算机集群中,计算机集群通过运行该软件系统的程序代码,以执行勒索病毒检测方法。在另一些实施例中,该检测系统也可以是用于检测勒索病毒的硬件系统。本申请实施例以勒索病毒检测系统为软件系统进行示例说明。In the first aspect, the present application provides a method for detecting ransomware. The method can be executed by a ransomware detection system. For ease of description, the embodiment of the present application may also simply refer to the ransomware detection system as the detection system. In some embodiments, the detection system may be a software system, and the software system may be deployed in a computer cluster, and the computer cluster executes the ransomware detection method by running the program code of the software system. In other embodiments, the detection system may also be a hardware system for detecting ransomware. The embodiment of this application uses the ransomware detection system as an example for illustration.
具体地,检测系统根据应用或系统目录生成诱饵文件,然后检测系统可以检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化,接着检测系统 根据所述属性变化确定勒索病毒。Specifically, the detection system generates a decoy file according to the application or system directory, and then the detection system can detect the access behavior to the decoy file, obtain the attribute change of the decoy file before and after the access behavior, and then the detection system can Variation identified ransomware.
在该方法中,检测系统通过根据应用或系统目录生成与真实的业务/数据文件具有较高相似度的诱饵文件,该诱饵文件的文件类型、文件大小、文件名称、部署位置不固定,如此可以避免勒索病毒根据固定的文件大小、文件类型、文件名称或者部署位置跳过诱饵文件,对应用的业务/数据文件进行加密,因而能够有效地、更及时地发现勒索病毒加密文件的异常行为,从而及时阻断勒索病毒,降低勒索病毒造成的损害。In this method, the detection system generates a decoy file with a high degree of similarity with the real business/data file according to the application or system directory. The file type, file size, file name, and deployment location of the decoy file are not fixed, so it can Prevent ransomware from skipping decoy files based on fixed file size, file type, file name, or deployment location, and encrypt application business/data files, so that abnormal behaviors of ransomware encrypted files can be found effectively and in a timely manner, thereby Block the ransomware in time to reduce the damage caused by the ransomware.
在一些可能的实现方式中,检测系统还可以向所述用户呈现告警信息。所述告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。In some possible implementation manners, the detection system may also present warning information to the user. The alarm information includes the identifier of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the access path of the ransomware process, and the access behavior of the ransomware process One or more, the ransomware process is a process corresponding to the ransomware virus.
如此实现可以对用户进行告警提示,以便用户及时采取相应的措施保障设备或数据的安全性,保障业务的正常运行。In this way, an alarm can be given to the user, so that the user can take corresponding measures in time to ensure the security of the equipment or data, and ensure the normal operation of the business.
在一些可能的实现方式中,检测系统还可以停止勒索进程,阻断所述勒索病毒,所述勒索进程为所述勒索病毒对应的进程。其中,检测系统可以是在识别到勒索病毒后,自动停止勒索进程,阻断勒索病毒,或者是在向用户呈现告警信息,由用户对告警信息进行确认,然后在获得用户的授权或许可后,停止勒索进程,阻断勒索病毒。In some possible implementation manners, the detection system may also stop the ransomware process and block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus. Among them, the detection system can automatically stop the ransomware process after identifying the ransomware virus, block the ransomware virus, or present the warning information to the user, and the user confirms the warning information, and then after obtaining the authorization or permission of the user, Stop the ransomware process and block the ransomware.
在该方法中,检测系统通过停止勒索进程,阻断勒索病毒,降低了勒索病毒造成的损害,保障了数据安全。In this method, the detection system blocks the ransomware by stopping the ransomware process, thereby reducing the damage caused by the ransomware and ensuring data security.
在一些可能的实现方式中,检测系统还可以根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。具体地,检测系统检测到新增应用时,可以根据新增应用的访问信息生成新的诱饵文件;检测系统检测到已有应用被卸载时,可以根据被卸载的应用的相关信息删除对应的诱饵文件。In some possible implementation manners, the detection system may also update the decoy file according to a change of the application or a change of the system directory. Specifically, when the detection system detects a new application, it can generate a new decoy file according to the access information of the new application; when the detection system detects that an existing application has been uninstalled, it can delete the corresponding decoy file according to the relevant information of the uninstalled application. document.
该方法中,检测系统通过动态更新诱饵文件,避免勒索病毒绕过固定的诱饵文件,对业务/数据文件加密,防止检测方法失效。In this method, the detection system dynamically updates the bait file to prevent the ransomware from bypassing the fixed bait file, encrypts the business/data file, and prevents the detection method from failing.
在一些可能的实现方式中,检测系统可以根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面,然后根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。In some possible implementations, the detection system may present an update interface to the user according to the change of the application or the change of the system directory, and then update the decoy according to the update operation triggered by the user through the update interface. document.
如此,可以实现根据用户的个性化需求,选择性地更新诱饵文件,减少更新的频次,提升用户体验。In this way, the decoy file can be selectively updated according to the individual needs of the user, the frequency of updating can be reduced, and the user experience can be improved.
在一些可能的实现方式中,检测系统可以根据所述应用的访问信息生成所述诱饵文件。如此,可以实现生成与应用真实的业务/数据文件具有较高相似度的诱饵文件,提高诱饵文件的欺骗性,使得勒索病毒难以绕开该诱饵文件,从而保障检测方法的有效性。In some possible implementation manners, the detection system may generate the decoy file according to the access information of the application. In this way, it is possible to generate a decoy file with a high degree of similarity with the real business/data file of the application, improve the deception of the decoy file, and make it difficult for the ransomware virus to bypass the decoy file, thereby ensuring the effectiveness of the detection method.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件类型。检测系统可以根据所述应用访问的文件类型,生成所述诱饵文件。其中,所述诱饵文件的文件类型与所述应用访问的文件类型相同。例如,应用访问的文件类型包括多个,检测系统可以生成多个诱饵文件,这多个诱饵文件的文件类型与应用访问的文件类型一致。In some possible implementation manners, the access information of the application includes a file type accessed by the application. The detection system may generate the decoy file according to the file type accessed by the application. Wherein, the file type of the decoy file is the same as the file type accessed by the application. For example, there are multiple types of files accessed by the application, and the detection system may generate multiple decoy files, and the file types of the multiple decoy files are consistent with the file types accessed by the application.
如此可以避免勒索病毒检测特定的文件类型,从而绕开该文件类型的诱饵文件,导致基于该诱饵文件的检测方法失效。This can prevent the ransomware from detecting a specific file type, thereby bypassing the decoy file of this file type, and causing the detection method based on the decoy file to fail.
在一些可能的实现方式中,所述诱饵文件包括多个文件,并且所述多个文件的文件大小不同。如此可以避免勒索病毒检测特定的文件大小,从而绕开相同大小的诱饵文件,导致基于该诱饵文件的检测方法失效。In some possible implementation manners, the decoy file includes multiple files, and the file sizes of the multiple files are different. This can prevent the ransomware virus from detecting a specific file size, thereby bypassing the decoy file of the same size, and causing the detection method based on the decoy file to fail.
在一些可能的实现方式中,检测系统还可以根据所述应用的访问信息,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。如此可以避免勒索病毒绕开特定的部署位置,直接对业务/数据文件加密,导致基于诱饵文件的检测方法失效。In some possible implementation manners, the detection system may also generate a decoy directory according to the access information of the application, where the decoy directory is a directory where the decoy file is located. This can prevent ransomware from bypassing specific deployment locations and directly encrypting business/data files, resulting in the failure of detection methods based on decoy files.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件目录。检测系统可以根据所述应用访问的文件目录,生成诱饵目录。该诱饵目录可以为应用访问的文件目录下的目标,从勒索病毒视角来看,该诱饵目录如同应用真实访问的业务文件目录、数据文件目录,具有较强欺骗性,能够避免勒索病毒绕开该目录,直接对业务/数据文件加密,导致基于诱饵文件的检测方法失效。In some possible implementation manners, the access information of the application includes a file directory accessed by the application. The detection system may generate a decoy directory according to the file directory accessed by the application. The decoy directory can be the target under the file directory accessed by the application. From the perspective of the ransomware virus, the decoy directory is like the business file directory and data file directory actually accessed by the application. It is highly deceptive and can prevent the ransomware virus from bypassing this Directory, directly encrypts business/data files, resulting in the failure of detection methods based on decoy files.
在一些可能的实现方式中,检测系统可以根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,多个所述诱饵文件的文件大小不同。如此,可以避免勒索病毒检测特定的文件类型和文件大小,以绕开诱饵文件,导致基于诱饵文件的检测方法失效。In some possible implementation manners, the detection system may generate multiple decoy files under the system directory according to randomly selected file types, and the multiple decoy files have different file sizes. In this way, it is possible to prevent the ransomware from detecting specific file types and file sizes so as to bypass the decoy file and cause the detection method based on the decoy file to fail.
在一些可能的实现方式中,检测系统还可以向所述用户呈现配置界面,然后接收所述用户通过所述配置界面配置的检测参数。所述检测参数包括目标文件类型。检测系统可以根据从所述目标文件类型中随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件。In some possible implementation manners, the detection system may also present a configuration interface to the user, and then receive detection parameters configured by the user through the configuration interface. The detection parameters include the target file type. The detection system may generate multiple decoy files under the system directory according to a file type randomly selected from the target file types.
如此,检测系统可以结合用户配置的检测参数,生成更精准、更具有欺骗性的诱饵文件,保障诱饵文件能够优先被勒索病毒访问,避免勒索病毒绕开该诱饵文件,导致基于诱饵文件的检测方法失效。In this way, the detection system can combine the detection parameters configured by the user to generate a more accurate and deceptive bait file, ensuring that the bait file can be accessed by the ransomware first, and preventing the ransomware from bypassing the bait file, resulting in a detection method based on the bait file invalidated.
在一些可能的实现方式中,所述检测参数还包括排除目录、目标关键字中的至少一个,所述排除目录为所述系统目录中无需部署所述诱饵文件的目录,所述目标关键字用于生成所述诱饵文件的名称。In some possible implementations, the detection parameters further include at least one of an exclusion directory and a target keyword, the exclusion directory is a directory in the system directory that does not need to deploy the decoy file, and the target keyword is used to generate the name of the decoy file.
其中,排除目录可以用于排除不必要的目录,避免在该目录部署诱饵文件导致资源浪费。目标关键字可以用于为生成诱饵文件的名称提供参考,由此可以进一步提高诱饵文件的欺骗性。Among them, the exclusion directory can be used to exclude unnecessary directories, so as to avoid resource waste caused by deploying decoy files in the directory. The target keyword can be used to provide a reference for the name of the generated lure file, thereby further improving the deception of the lure file.
在一些可能的实现方式中,检测系统还可以根据所述系统目录,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。相对于固定的部署位置,该方法可以避免勒索病毒绕开诱饵目录对业务/数据文件进行加密,导致基于诱饵文件的检测方法失效。In some possible implementation manners, the detection system may also generate a decoy directory according to the system directory, where the decoy directory is a directory where the decoy file is located. Compared with the fixed deployment location, this method can prevent the ransomware virus from bypassing the decoy directory to encrypt business/data files, resulting in the failure of the detection method based on the decoy file.
在一些可能的实现方式中,所述诱饵目录包括第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一个。所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问;所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问;所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。In some possible implementation manners, the lure catalog includes at least one of a first lure catalog, a second lure catalog and a third lure catalog. The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal; the name of the second decoy directory includes a second prefix, so that the second decoy directory is accessed in the It is accessed preferentially when traversing in reverse order; the name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
该方法通过生成特定前缀的诱饵目录,使得诱饵目录以及诱饵目录中的诱饵文件在不同遍历场景均可以优先访问,避免了勒索病毒先访问业务/数据文件导致勒索病毒检测方法失效。The method generates a bait directory with a specific prefix, so that the bait directory and the bait files in the bait directory can be accessed preferentially in different traversal scenarios, avoiding the failure of the ransomware detection method caused by the ransomware virus first accessing the business/data files.
在一些可能的实现方式中,检测系统还可以监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。如此可以避免诱饵文件被误删除或误修改时,勒索病毒直接加密业务/数据文件,导致基于诱饵文件的检测方法失效。In some possible implementation manners, the detection system may also monitor the decoy file, and restore the decoy file when the decoy file is mistakenly modified or deleted. In this way, when the decoy file is mistakenly deleted or modified, the ransomware virus directly encrypts the business/data file, resulting in the failure of the detection method based on the decoy file.
第二方面,本申请提供了一种勒索病毒检测系统。所述系统包括:In the second aspect, the present application provides a ransomware detection system. The system includes:
诱饵文件管理模块,用于根据应用或系统目录生成诱饵文件;A decoy file management module, configured to generate a decoy file according to an application or system directory;
诱饵访问行为检测模块,用于检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化;A decoy access behavior detection module, configured to detect an access behavior to the decoy file, and acquire attribute changes of the decoy file before and after the access behavior;
所述诱饵行为访问检测模块,还用于根据所述属性变化确定勒索病毒。The decoy behavior access detection module is also used to determine the ransomware according to the attribute change.
在一些可能的实现方式中,所述系统还包括:In some possible implementations, the system also includes:
安全响应模块,用于向所述用户呈现告警信息,所述告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。A security response module, configured to present warning information to the user, the warning information including the identity of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the ransomware virus One or more of the access path of the process and the access behavior of the ransomware process, where the ransomware process is a process corresponding to the ransomware virus.
在一些可能的实现方式中,所述系统还包括:In some possible implementations, the system also includes:
安全响应模块,用于停止勒索进程,阻断所述勒索病毒,所述勒索进程为所述勒索病毒对应的进程。The security response module is configured to stop the ransomware process and block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus.
在一些可能的实现方式中,所述诱饵文件管理模块还用于:In some possible implementations, the decoy file management module is also used for:
根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。The decoy file is updated according to the change of the application or the change of the system directory.
在一些可能的实现方式中,所述诱饵文件管理模块具体用于:In some possible implementation manners, the decoy file management module is specifically configured to:
根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面;Presenting an update interface to the user according to changes in the application or changes in the system catalog;
根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。The decoy file is updated according to an update operation triggered by the user through the update interface.
在一些可能的实现方式中,所述诱饵文件管理模块具体用于:In some possible implementation manners, the decoy file management module is specifically configured to:
根据所述应用的访问信息生成所述诱饵文件。The decoy file is generated according to the access information of the application.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件类型;In some possible implementation manners, the access information of the application includes the file type accessed by the application;
所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
根据所述应用访问的文件类型,生成所述诱饵文件,所述诱饵文件的文件类型与所述应用访问的文件类型相同。The decoy file is generated according to the file type accessed by the application, and the file type of the decoy file is the same as the file type accessed by the application.
在一些可能的实现方式中,所述诱饵文件包括多个文件,并且所述多个文件的文件大小不同。In some possible implementation manners, the decoy file includes multiple files, and the file sizes of the multiple files are different.
在一些可能的实现方式中,所述诱饵文件管理模块还用于:In some possible implementations, the decoy file management module is also used for:
根据所述应用的访问信息,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the access information of the application, and the decoy directory is a directory where the decoy file is located.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件目录;In some possible implementation manners, the access information of the application includes a file directory accessed by the application;
所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
根据所述应用访问的文件目录,生成诱饵目录。According to the file directory accessed by the application, a decoy directory is generated.
在一些可能的实现方式中,所述诱饵文件管理模块具体用于:In some possible implementation manners, the decoy file management module is specifically configured to:
根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,多个所述诱饵文件的文件大小不同。Multiple decoy files under the system directory are generated according to a randomly selected file type, and the multiple decoy files have different file sizes.
在一些可能的实现方式中,所述系统还包括:In some possible implementations, the system also includes:
诱饵检测配置模块,用于向所述用户呈现配置界面,接收所述用户通过所述配置界面配置的检测参数,所述检测参数包括目标文件类型;A decoy detection configuration module, configured to present a configuration interface to the user, and receive detection parameters configured by the user through the configuration interface, where the detection parameters include the target file type;
所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
根据从所述目标文件类型中随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件。A plurality of decoy files under the system directory are generated according to a file type randomly selected from the target file types.
在一些可能的实现方式中,所述检测参数还包括排除目录、目标关键字中的至少一个,所述排除目录为所述系统目录中无需部署所述诱饵文件的目录,所述目标关键字用于生成所述诱饵文件的名称。In some possible implementations, the detection parameters further include at least one of an exclusion directory and a target keyword, the exclusion directory is a directory in the system directory that does not need to deploy the decoy file, and the target keyword is used to generate the name of the decoy file.
在一些可能的实现方式中,所述诱饵文件管理模块还用于:In some possible implementations, the decoy file management module is also used for:
根据所述系统目录,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the system directory, and the decoy directory is a directory where the decoy file is located.
在一些可能的实现方式中,所述诱饵目录包括第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一个;In some possible implementations, the lure list includes at least one of a first lure list, a second lure list, and a third lure list;
所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问;The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal;
所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问;The name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order;
所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。The name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
在一些可能的实现方式中,所述诱饵访问行为检测模块还用于:In some possible implementation manners, the decoy access behavior detection module is also used for:
监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。The decoy file is monitored, and when the decoy file is mistakenly modified or deleted, the decoy file is restored.
第三方面,本申请提供一种计算机集群。所述计算机集群包括至少一台计算机,所述至少一台计算机包括处理器和存储器。所述处理器、所述存储器进行相互的通信。所述处理器用于执行所述存储器中存储的指令,以使得计算机集群执行如第一方面或第一方面的任一种实现方式中的勒索病毒检测方法。In a third aspect, the present application provides a computer cluster. The computer cluster includes at least one computer, and the at least one computer includes a processor and a memory. The processor and the memory communicate with each other. The processor is configured to execute instructions stored in the memory, so that the computer cluster executes the ransomware detection method in the first aspect or any implementation manner of the first aspect.
第四方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,所述指令指示计算机集群执行上述第一方面或第一方面的任一种实现方式所述的勒索病毒检测方法。In a fourth aspect, the present application provides a computer-readable storage medium, where an instruction is stored in the computer-readable storage medium, and the instruction instructs the computer cluster to execute the above-mentioned first aspect or any implementation manner of the first aspect. ransomware detection method.
第五方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机集群上运行时,使得计算机集群执行上述第一方面或第一方面的任一种实现方式所述的勒索病毒检测方法。In the fifth aspect, the present application provides a computer program product containing instructions, which, when run on a computer cluster, causes the computer cluster to perform the ransomware detection described in the first aspect or any implementation of the first aspect method.
本申请在上述各方面提供的实现方式的基础上,还可以进行进一步组合以提供更多实现方式。On the basis of the implementation manners provided in the foregoing aspects, the present application may further be combined to provide more implementation manners.
附图说明Description of drawings
为了更清楚地说明本申请实施例的技术方法,下面将对实施例中所需使用的附图作以简单地介绍。In order to more clearly illustrate the technical methods of the embodiments of the present application, the following will briefly introduce the drawings required in the embodiments.
图1为本申请实施例提供的一种勒索病毒检测系统的系统架构图;Fig. 1 is a system architecture diagram of a ransomware detection system provided in the embodiment of the present application;
图2为本申请实施例提供的一种勒索病毒检测方法的流程图;Fig. 2 is the flowchart of a kind of blackmail virus detection method that the embodiment of the present application provides;
图3为本申请实施例提供的一种配置界面的界面示意图;FIG. 3 is an interface schematic diagram of a configuration interface provided by an embodiment of the present application;
图4为本申请实施例提供的一种系统目录的结构示意图;FIG. 4 is a schematic structural diagram of a system directory provided by an embodiment of the present application;
图5A为本申请实施例提供的一种更新界面的示意图;FIG. 5A is a schematic diagram of an update interface provided by an embodiment of the present application;
图5B为本申请实施例提供的一种更新界面的示意图;FIG. 5B is a schematic diagram of an update interface provided by the embodiment of the present application;
图6为本申请实施例提供的一种勒索病毒检测系统的结构示意图;FIG. 6 is a schematic structural diagram of a ransomware detection system provided in an embodiment of the present application;
图7为本申请实施例提供的一种计算机集群的结构示意图。FIG. 7 is a schematic structural diagram of a computer cluster provided by an embodiment of the present application.
具体实施方式Detailed ways
本申请实施例中的术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。The terms "first" and "second" in the embodiments of the present application are used for description purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features.
首先对本申请实施例中所涉及到的一些技术术语进行介绍。First, some technical terms involved in the embodiments of the present application are introduced.
勒索病毒,也称作勒索软件、勒索软体,是一种特殊的恶意软件,通常被归类为“阻断访问式攻击”(denial-of-access attack)。勒索病毒与其他病毒最大的不同在于手法以及中毒方式。其中,一种典型的勒索病毒是系统性地加密计算设备存储的文件,例如是加密关键的业务/数据文件,该业务/数据文件可以是数据库文件、办公文档、压缩文件、视频、图片和源代码中的一种或多种,然后要求受害者缴纳赎金以取回受害者根本无从自行获取的解密口令/工具以便解密文件。Ransomware, also known as ransomware or ransomware, is a special type of malware that is usually classified as a denial-of-access attack. The biggest difference between ransomware and other viruses lies in the method and poisoning method. Among them, a typical ransomware is to systematically encrypt files stored in computing devices, such as encrypting key business/data files, which can be database files, office documents, compressed files, videos, pictures and source files. One or more of the codes, and then ask the victim to pay a ransom to get back the decryption password/tool that the victim has no way of obtaining by himself in order to decrypt the file.
勒索病毒通常透过木马病毒的形式传播。具体地,勒索病毒将自身为掩盖为看似无害的文件。例如,勒索病毒可以通过假冒成普通的电子邮件等社会工程学方法欺骗受害者点击链接下载,或者是与许多其他蠕虫病毒一样利用软件的漏洞在联网的计算设备间传播。Ransomware usually spreads in the form of Trojan horse viruses. Specifically, ransomware disguises itself as seemingly harmless files. For example, ransomware can trick victims into clicking links to download through social engineering methods such as pretending to be ordinary emails, or, like many other worms, exploit software vulnerabilities to spread among networked computing devices.
为了降低勒索病毒的损害,业界提供了一些勒索病毒的检测方案,以提前检测出勒索病毒,进而对勒索病毒进行阻断。主流的检测方案包括基于诱饵文件的勒索病毒检测方法。具体地,在指定的目录部署固定类型、固定大小的诱饵文件,通过监控进程对诱饵文件的访问操作,从而识别已知或未知的勒索病毒。In order to reduce the damage of ransomware, the industry provides some ransomware detection schemes to detect ransomware in advance, and then block the ransomware. The mainstream detection schemes include ransomware detection methods based on decoy files. Specifically, deploy a decoy file of a fixed type and size in a specified directory, and identify known or unknown ransomware by monitoring the access operation of the process to the decoy file.
然而,上述方案需要指定诱饵文件的部署位置,并且诱饵文件的文件大小、文件类型、文件内容、文件名称都是相对固定的。勒索病毒可以基于上述固定的文件大小、文件类型、文件名称或者指定的部署位置绕过该诱饵文件,对应用的业务/数据文件进行加密,从而导致基于诱饵文件的勒索病毒检测方法失效。However, the above solution needs to specify the deployment location of the decoy file, and the file size, file type, file content, and file name of the decoy file are relatively fixed. The ransomware can bypass the decoy file based on the above-mentioned fixed file size, file type, file name or specified deployment location, and encrypt the business/data files of the application, thus making the ransomware detection method based on the decoy file invalid.
有鉴于此,本申请实施例提供了一种勒索病毒检测方法。该方法可以由勒索病毒检测系统执行。为了便于描述,本申请实施例也可以将勒索病毒检测系统简称为检测系统。在一些实施例中,检测系统可以是软件系统,软件系统可以部署在计算机集群中,计算机集群通过运行该软件系统的程序代码,以执行勒索病毒检测方法。在另一些实施例中,该检测系统也可以是用于检测勒索病毒的硬件系统。本申请实施例以勒索病毒检测系统为软件系统进行示例说明。In view of this, the embodiment of the present application provides a ransomware detection method. The method can be executed by a ransomware detection system. For ease of description, the embodiment of the present application may also simply refer to the ransomware detection system as the detection system. In some embodiments, the detection system may be a software system, and the software system may be deployed in a computer cluster, and the computer cluster executes the ransomware detection method by running the program code of the software system. In other embodiments, the detection system may also be a hardware system for detecting ransomware. The embodiment of this application uses the ransomware detection system as an example for illustration.
具体地,检测系统根据应用或系统目录生成诱饵文件,然后检测系统可以检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化,接着检测系统根据所述属性变化确定勒索病毒。Specifically, the detection system generates a decoy file according to the application or system directory, and then the detection system can detect the access behavior to the decoy file, obtain the attribute change of the decoy file before and after the access behavior, and then the detection system can Variation identified ransomware.
在该方法中,检测系统通过根据应用或系统目录生成与真实的业务/数据文件具有较高相似度的诱饵文件,该诱饵文件的文件类型、文件大小、文件名称、部署位置不固定,如此可以避免勒索病毒根据固定的文件大小、文件类型、文件名称或者部署位置跳过诱饵文件,对应用的业务/数据文件进行加密,因而能够有效地、更及时地发现勒索病毒加密文件的异常行为,从而及时阻断勒索病毒,降低勒索病毒造成的损害。In this method, the detection system generates a decoy file with a high degree of similarity with the real business/data file according to the application or system directory. The file type, file size, file name, and deployment location of the decoy file are not fixed, so it can Prevent ransomware from skipping decoy files based on fixed file size, file type, file name, or deployment location, and encrypt application business/data files, so that abnormal behaviors of ransomware encrypted files can be found effectively and in a timely manner, thereby Block the ransomware in time to reduce the damage caused by the ransomware.
需要说明的是,本申请实施例的勒索病毒检测方法可适用于在终端(例如是主机)/服务器上快速检测已知/未知勒索病毒的场景。尤其是在“云”场景下,租户所租赁或购买的云服务器上运行大量的业务并保存关键的业务/数据文件时,本申请实施例的勒索病毒检测方法能够基于轻量级的资源占用快速检测出勒索病毒,从而满足对于检测的时效性和轻量级资源占用的需求。It should be noted that the ransomware detection method of the embodiment of the present application is applicable to the scenario of quickly detecting known/unknown ransomware on a terminal (for example, a host)/server. Especially in the "cloud" scenario, when a large amount of business is run on the cloud server leased or purchased by the tenant and key business/data files are saved, the ransomware detection method in the embodiment of the present application can quickly occupy light-weight resources. Detect ransomware, so as to meet the timeliness of detection and light-weight resource consumption requirements.
为了使得本申请的技术方案更加清楚、易于理解,下面结合附图对本申请实施例的系统架构进行介绍。In order to make the technical solution of the present application clearer and easier to understand, the system architecture of the embodiment of the present application will be introduced below with reference to the accompanying drawings.
参见图1所述的勒索病毒检测系统的系统架构图,在该示例中,租户(例如可以是个人、企业或其他团体组织)可以租赁或购买云计算集群10中的一台或多台云服务器,以部署租户的应用,例如是部署应用1至应用N,N为正整数。图1以部署多个应用进行示例说明,在一些实施例中,租户也可以部署一个应用。云计算集群10中还部署有勒索病毒检测系统100,为了描述方便,下文简称为检测系统100。Referring to the system architecture diagram of the ransomware detection system described in Fig. 1, in this example, tenants (such as individuals, enterprises or other group organizations) can lease or purchase one or more cloud servers in the cloud computing cluster 10 , to deploy tenant applications, for example, to deploy application 1 to application N, where N is a positive integer. FIG. 1 illustrates by deploying multiple applications. In some embodiments, a tenant may also deploy one application. A ransomware detection system 100 is also deployed in the cloud computing cluster 10 , which is referred to as the detection system 100 hereinafter for convenience of description.
云计算集群10与终端20建立有通信连接。终端20安装有客户端,该客户端例如可以是浏览器等通用客户端,或者是专用于勒索病毒检测的检测客户端。云计算集群10中的检测系统100可以根据应用或系统目录生成诱饵文件,该诱饵文件具有欺骗性,检测系统100可以检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化,然后根据所述属性变化确定勒索病毒。The cloud computing cluster 10 establishes a communication connection with the terminal 20 . The terminal 20 is installed with a client, which may be, for example, a general client such as a browser, or a detection client specially used for ransomware detection. The detection system 100 in the cloud computing cluster 10 can generate a decoy file according to the application or system directory, and the decoy file is deceptive. The detection system 100 can detect the access behavior to the decoy file, and obtain the Before and after attribute changes, and then determine the ransomware virus according to the attribute changes.
进一步地,检测系统100可以根据检测的勒索病毒生成告警信息,并向所述终端20发送告警信息,从而使得终端向用户呈现告警信息。其中,告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希(hash)、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种。在该实施例中,勒索进程为所述勒索病毒对应的进程。Further, the detection system 100 may generate warning information according to the detected ransomware virus, and send the warning information to the terminal 20, so that the terminal presents the warning information to the user. Wherein, the warning information includes the identification of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the access path of the ransomware process, and the access path of the ransomware process. one or more of the behaviors. In this embodiment, the ransomware process is a process corresponding to the ransomware virus.
需要说明的是,当检测到勒索病毒时,检测系统100还可以停止勒索进程,并阻隔勒索病毒,也即对勒索病毒这一可执行文件进行隔离。如此,可以避免勒索进程对应用的业务/数据文件进行加密,从而导致用户利益受到侵害。It should be noted that when a ransomware is detected, the detection system 100 can also stop the ransomware process and block the ransomware, that is, isolate the executable file of the ransomware. In this way, it is possible to prevent the ransomware process from encrypting the business/data files of the application, thereby causing the user's interests to be infringed.
图1所示实施例是以检测系统100部署在云计算集群,并检测该云计算集群中部署的应用是否包括勒索病毒进行示例说明,在一些可能的实现方式中,检测系统100也可以部署在本地计算设备,例如是台式机、笔记本电脑等终端20中,以用于对终端20中部署的应用进行勒索病毒检测。The embodiment shown in FIG. 1 is an example of deploying the detection system 100 in a cloud computing cluster and detecting whether the application deployed in the cloud computing cluster includes a ransomware virus. In some possible implementations, the detection system 100 can also be deployed in A local computing device, such as a desktop computer or a notebook computer, is used to detect ransomware on the applications deployed in the terminal 20 .
接下来,将从检测系统100的角度,对本申请实施例提供的勒索病毒检测方法进行详细说明。Next, from the perspective of the detection system 100, the ransomware detection method provided in the embodiment of the present application will be described in detail.
参见图2所示的勒索病毒检测方法的流程图,该方法包括:Referring to the flowchart of the ransomware detection method shown in Figure 2, the method includes:
S202:检测系统100向所述用户呈现配置界面。S202: The detection system 100 presents a configuration interface to the user.
配置界面可以用于配置检测勒索病毒的检测参数。该检测参数可以包括检测方式。当检测方式为基于诱饵文件的检测方式时,检测参数还可以包括目标文件类型、排除目录和目标关键字中的一种或多种。其中,目标文件类型用于为生成诱饵文件的文件类型提供参考,目标关键字用于为诱饵文件的命名提供参考。排除目录是指无需部署诱饵文件的目录。例如,排除目录可以是对业务不产生影响的目录。The configuration interface can be used to configure detection parameters for ransomware detection. The detection parameter may include a detection method. When the detection method is based on a decoy file, the detection parameters may also include one or more of target file type, excluded directory and target keyword. Among them, the target file type is used to provide a reference for the file type that generates the decoy file, and the target keyword is used to provide a reference for the naming of the decoy file. Excluded directories are directories that do not need to deploy decoy files. For example, an excluded directory may be a directory that does not affect services.
参见图3所示的配置界面的示意图,该配置界面300包括多个参数配置控件,多个参数配置控件分别用于配置不同的检测参数。具体地,配置界面300中的检测方式配置控件302用于配置勒索病毒的检测方式,该检测方式配置控件302可以包括两个选择控件,用户选中“是”对应的选择控件,则表示启用基于诱饵文件(具体是根据应用或系统目录生成的诱饵文件)的检测方式,用户选中“否”对应的选择控件,则表示不启用基于诱饵文件的检测方式。Referring to the schematic diagram of the configuration interface shown in FIG. 3 , the configuration interface 300 includes a plurality of parameter configuration controls, and the plurality of parameter configuration controls are respectively used to configure different detection parameters. Specifically, the detection mode configuration control 302 in the configuration interface 300 is used to configure the detection mode of the ransomware virus. The detection mode configuration control 302 may include two selection controls. If the user selects the selection control corresponding to "Yes", it means that the bait-based For the detection method of the file (specifically, the decoy file generated according to the application or system directory), if the user selects the selection control corresponding to "No", it means that the detection method based on the decoy file is not enabled.
配置界面300中的排除目录配置控件304用于配置排除目录。具体地,排除目录配置控件304可以是文本框,用户可以直接在文本框中输入排除目录,从而实现排除目录的配置。配置界面300中的文件类型配置控件306用于配置生成诱饵文件的目标文件类型,关键字配置控件308用于配置生成诱饵文件的目标关键字。其中,目标关键字可以包括日期,或者包括表示功能的关键字,例如为报表、报告等。与排除目录配置控件304类似,文件类型配置控件306和关键字配置控件308也可以是文本框,用户可以通过在文本框输入目标文件类型、目标关键字,从而实现相应的检测参数配置。The exclusion directory configuration control 304 in the configuration interface 300 is used to configure the exclusion directory. Specifically, the exclusion directory configuration control 304 may be a text box, and the user may directly input the exclusion directory in the text box, thereby realizing the configuration of the exclusion directory. The file type configuration control 306 in the configuration interface 300 is used to configure the target file type for generating the decoy file, and the keyword configuration control 308 is used for configuring the target keyword for generating the decoy file. Wherein, the target keyword may include a date, or include a keyword representing a function, for example, a report, a report, and the like. Similar to the exclusion directory configuration control 304, the file type configuration control 306 and the keyword configuration control 308 can also be text boxes, and the user can enter the target file type and target keyword in the text boxes to realize the corresponding detection parameter configuration.
S204:检测系统100接收所述用户通过所述配置界面配置的检测参数。S204: The detection system 100 receives the detection parameters configured by the user through the configuration interface.
具体地,用户在通过配置界面配置完检测参数后,可以触发提交操作,终端20可以响应于用户的提交操作,向检测系统100发生上述检测参数,如此,检测系统100可以接收终端发送的上述检测参数。Specifically, after the user configures the detection parameters through the configuration interface, the user can trigger a submission operation, and the terminal 20 can respond to the user's submission operation, and send the detection parameters to the detection system 100. In this way, the detection system 100 can receive the detection parameters sent by the terminal. parameter.
仍以图3进行示例说明,用户可以通过点击确定控件307,从而触发提交操作。相应地,检测系统100接收终端20响应于用户触发的提交操作所提交的检测参数。在一些实施例中,用户也可以触发取消控件309,从而取消配置检测参数。Still using FIG. 3 as an example, the user may click the OK control 307 to trigger the submission operation. Correspondingly, the detection system 100 receives the detection parameters submitted by the terminal 20 in response to the submission operation triggered by the user. In some embodiments, the user may also toggle the cancel control 309, thereby canceling configuration detection parameters.
进一步地,检测系统100可以基于接收的检测参数,启动诱饵检测任务。例如,检测参数包括启动基于诱饵的检测方式时,检测系统100可以启动诱饵检测任务,然后执行S206和/或S212,以便根据应用或系统目录生成诱饵文件,进而根据该诱饵文件进行勒索病毒检测。Further, the detection system 100 may start a decoy detection task based on the received detection parameters. For example, when the detection parameters include starting a decoy-based detection method, the detection system 100 can start a decoy detection task, and then perform S206 and/or S212, so as to generate a decoy file according to the application or system directory, and then perform ransomware detection according to the decoy file.
需要说明的是,上述S202至S204为本申请实施例的可选步骤,执行本申请实施例的勒索病毒检测方法也可以不执行上述步骤,例如检测系统100也可以直接根据应用的访问信息和/或系统目录生成诱饵文件。It should be noted that the above steps from S202 to S204 are optional steps in the embodiment of the present application, and the above steps may not be executed when performing the ransomware detection method in the embodiment of the present application. Or a system directory to generate a decoy file.
S206:检测系统100获取应用的访问信息。S206: The detection system 100 acquires the access information of the application.
应用在运行时,可以产生至少一个进程。检测系统100可以监测运行的进程,具体是对进程的访问行为进行监测,从而获得应用的访问信息。访问行为可以包括读数据和/或写数据的行为。When the application is running, at least one process can be generated. The detection system 100 can monitor the running process, specifically monitor the access behavior of the process, so as to obtain the access information of the application. An access action may include an action of reading data and/or writing data.
其中,检测系统100可以遍历运行的进程,根据进程的命令行、进程对应的文件的路径以及进程相关的配置文件识别应用,然后对进程访问的文件目录、文件类型、文件大小、文件名称等进行监测,获得应用的访问信息。应用的访问信息可以包括应用访问的文件的属性,例如应用的访问信息可以包括应用访问的文件目录、文件类型、文件大小和文件名称中的一种或多种。Among them, the detection system 100 can traverse the running process, identify the application according to the command line of the process, the path of the file corresponding to the process, and the configuration file related to the process, and then check the file directory, file type, file size, file name, etc. accessed by the process. Monitor and obtain application access information. The access information of the application may include attributes of files accessed by the application, for example, the access information of the application may include one or more of file directories, file types, file sizes and file names accessed by the application.
S208:检测系统100根据所述应用的访问信息生成诱饵目录。S208: The detection system 100 generates a decoy directory according to the access information of the application.
应用的访问信息包括应用访问的文件目录,该文件目录例如可以是业务文件目录和/或数据文件目录,检测系统100可以根据应用访问的文件目录生成诱饵目录。例如,该诱饵目录可以是应用访问的文件目录下的至少一个目录。该诱饵目录用于存放诱饵文件。The access information of the application includes a file directory accessed by the application. The file directory may be, for example, a business file directory and/or a data file directory. The detection system 100 may generate a decoy directory according to the file directory accessed by the application. For example, the decoy directory may be at least one directory under the file directory accessed by the application. The bait directory is used to store bait files.
由于诱饵目录在应用访问的文件目录下,从勒索病毒角度看,该诱饵目录如同应用访问的业务文件目录或者数据文件目录,具有较高的迷惑性,可以避免勒索病毒绕过该诱饵目录或诱饵目录存放的诱饵文件,对真实的业务/数据文件进行加密。Since the decoy directory is under the file directory accessed by the application, from the perspective of the ransomware virus, the decoy directory is like the business file directory or data file directory accessed by the application, which is highly confusing and can prevent the ransomware from bypassing the decoy directory or decoy The decoy files stored in the directory encrypt real business/data files.
需要说明的是,执行本申请实施例的勒索病毒检测方法也可以不执行S208,也即检测系统100也可以不额外生成诱饵目录,以存放诱饵文件。例如,检测系统100可以将已有目录用于存放诱饵文件。It should be noted that the execution of the ransomware detection method of the embodiment of the present application may not execute S208, that is, the detection system 100 may not additionally generate a decoy directory to store decoy files. For example, the detection system 100 may use an existing directory to store decoy files.
S208:检测系统100根据所述应用的访问信息生成诱饵文件。S208: The detection system 100 generates a decoy file according to the access information of the application.
应用的访问信息包括应用访问的文件类型。检测系统100可以根据应用访问的文件类型,生成诱饵文件。其中,检测系统100可以根据应用访问的多个文件类型,分别生成多个诱饵文件。所述诱饵文件的文件类型与所述应用访问的文件类型相同。如此,可以避免勒索病毒绕过固定文件类型的诱饵文件。The access information of the application includes the types of files accessed by the application. The detection system 100 can generate a decoy file according to the file type accessed by the application. Wherein, the detection system 100 may respectively generate multiple decoy files according to multiple file types accessed by the application. The file type of the decoy file is the same as the file type accessed by the application. In this way, ransomware can be prevented from bypassing decoy files of fixed file types.
进一步地,检测系统100在生成诱饵文件时,可以生成多个不同文件大小的诱饵文件。例如检测系统100可以随机生成多个不同文件大小的诱饵文件,或者检测系统100可以根据应用访问的文件大小生成多个不同文件大小的诱饵文件。如此,可以避免勒索病毒绕过固定文件大小的诱饵文件。Further, when the detection system 100 generates a decoy file, it may generate multiple decoy files with different file sizes. For example, the detection system 100 may randomly generate multiple decoy files with different file sizes, or the detection system 100 may generate multiple decoy files with different file sizes according to the file size accessed by the application. In this way, it is possible to prevent ransomware from bypassing decoy files with a fixed file size.
在一些可能的实现方式中,检测系统100还可以根据应用访问的文件名称确定应用常用的文件名关键字,然后根据应用常用的文件名关键字生成诱饵文件的名称。进一步地,检测参数包括目标关键字时,检测系统100还可以结合目标关键字确定诱饵文件的名称。类似地,检测参数包括目标文件类型时,检测系统100可以结合目标文件类型,生成诱饵文件。例如,检测系统100可以从应用访问的文件类型以及目标文件类型的交集中,随机选择若干文件类型,生成相应类型的诱饵文件。In some possible implementation manners, the detection system 100 may also determine the file name keywords commonly used by the application according to the file name accessed by the application, and then generate the name of the decoy file according to the file name keywords commonly used by the application. Further, when the detection parameter includes the target keyword, the detection system 100 may also determine the name of the decoy file in combination with the target keyword. Similarly, when the detection parameter includes the type of the target file, the detection system 100 may combine the type of the target file to generate a decoy file. For example, the detection system 100 may randomly select several file types from the intersection of file types accessed by applications and target file types, and generate corresponding types of decoy files.
下面结合一具体示例进行说明。在该示例中,应用为MySQL应用,检测系统100可以生成和MySQL应用相关的、扩展名分别为log、frm、myd、myi、ibd等文件类型的诱饵文件,并且这几种文件类型的诱饵文件的文件大小不同。对于数据文件(如扩展名为myd和ibd的文件),检测系统100可以生成文件大小为1MB、5MB的诱饵文件,对于其它类型文件,检测系统100可以生成文件大小为64KB、128KB的的诱饵文件。检测系统100还可以根据应用常用的文件名关键字为上述诱饵文件命名。The following will describe with a specific example. In this example, the application is a MySQL application, and the detection system 100 can generate decoy files related to the MySQL application with file extensions such as log, frm, myd, myi, ibd, etc., and the decoy files of these file types The file sizes are different. For data files (such as files with extensions myd and ibd), the detection system 100 can generate decoy files with a file size of 1MB and 5MB, and for other types of files, the detection system 100 can generate decoy files with a file size of 64KB and 128KB . The detection system 100 can also name the above-mentioned decoy files according to the commonly used file name keywords of applications.
在该实施例中,检测系统100通过生成上述诱饵文件,可以防止勒索病毒根据特定应用、特定文件类型、特定文件大小、特定文件名称绕过诱饵文件,而先加密应用的业务/数 据文件,影响业务运行。In this embodiment, the detection system 100 can prevent the ransomware from bypassing the decoy file according to the specific application, specific file type, specific file size, and specific file name by generating the above-mentioned decoy file, and first encrypt the business/data file of the application, affecting business run.
在一些可能的实现方式中,检测系统100还可以根据应用访问的文件内容生成诱饵文件,从而防止勒索病毒根据特定内容绕过诱饵文件,而先加密应用的业务/数据文件,影响业务运行。In some possible implementations, the detection system 100 can also generate a decoy file according to the content of the file accessed by the application, so as to prevent the ransomware from bypassing the decoy file according to the specific content, and first encrypt the business/data file of the application to affect the business operation.
S210:检测系统100获取系统目录。S210: The detection system 100 acquires a system directory.
系统目录是指文件系统的目录。系统目录可以采用树状结构表示。不同计算设备可以采用不同的文件系统,相应地,系统目录可以是不同的。本实施例以Linux系统目录进行示例说明。A system directory refers to a directory of the file system. System catalogs can be represented in a tree structure. Different computing devices may adopt different file systems, and correspondingly, system directories may be different. In this embodiment, a Linux system directory is used as an example for description.
参见图4所示的系统目录的结构示意图,该系统目录包括bin、boot、dev、etc、home、root、run、sbin、tmp、usr、var等目录。其中,bin是二进制文件Binaries的缩写,该目录存放着最经常使用的命令。boot存放的是启动Linux时使用的一些核心文件,包括一些连接文件以及镜像文件。dev是设备Device的缩写,该目录下存放的是Linux的外部设备,在Linux中访问外部设备的方式和访问文件的方式是相同的。etc是Etcetera的缩写,这个目录用来存放所有的系统管理所需要的配置文件和子目录。home为用户的主目录,在Linux中,每个用户都有一个自己的目录,一般该目录是以用户的账号命名的,如上图中的alice、bob和eve。root为系统管理员(也称作超级权限者)的用户主目录,sbin是Superuser Binaries(超级用户的二进制文件)的缩写,该目录用于存放系统管理员使用的系统管理程序。tmp是temporary(临时)的缩写,该目录是用于存放一些临时文件。usr是共享资源unix shared resources的缩写,该目录用于存放应用程序和文件,类似于windows下的program files目录。其中,usr目录下具体包括bin、sbin、src目录,其中,bin存放普通用户使用的应用程序,sbin存放超级用户使用的比较高级的管理程序和系统守护程序,src存放内核源代码。var是变量variable的缩写,该目录中存放着在不断扩充的东西,如各种日志文件。run是一个临时文件系统,存储系统启动以来的信息。当系统重启时,该目录下的文件应该被删掉或清除。Referring to the structural diagram of the system directory shown in FIG. 4 , the system directory includes directories such as bin, boot, dev, etc, home, root, run, sbin, tmp, usr, and var. Among them, bin is the abbreviation of the binary file Binaries, and this directory stores the most frequently used commands. Boot stores some core files used when starting Linux, including some connection files and image files. dev is the abbreviation of Device, and the external devices of Linux are stored in this directory. The way of accessing external devices in Linux is the same as the way of accessing files. etc is the abbreviation of Etcetera. This directory is used to store all configuration files and subdirectories required for system management. home is the user's home directory. In Linux, each user has its own directory. Generally, the directory is named after the user's account, such as alice, bob, and eve in the above figure. root is the user home directory of the system administrator (also known as a super-authorized person), and sbin is the abbreviation of Superuser Binaries (superuser binary files), which is used to store the system management program used by the system administrator. tmp is the abbreviation of temporary (temporary), this directory is used to store some temporary files. usr is the abbreviation of unix shared resources, which is used to store applications and files, similar to the program files directory under windows. Among them, the usr directory specifically includes bin, sbin, and src directories. Among them, bin stores applications used by ordinary users, sbin stores relatively advanced management programs and system daemons used by super users, and src stores kernel source codes. var is the abbreviation of variable variable, and this directory stores things that are constantly expanding, such as various log files. run is a temporary file system that stores information since the system was started. When the system restarts, the files in this directory should be deleted or cleared.
检测系统100可以通过遍历文件系统,从而获得系统目录。在一些可能的实现方式中,文件系统可以支持不同的遍历方式,例如可以支持正序遍历方式、逆序遍历方式或者系统磁盘默认遍历方式中的一种或多种。检测系统100可以采用上述遍历方式中的一种或多种,遍历文件系统,从而获得系统目录。The detection system 100 can obtain the system directory by traversing the file system. In some possible implementation manners, the file system may support different traversal manners, for example, may support one or more of forward-order traversal manners, reverse-order traversal manners, or system disk default traversal manners. The detection system 100 may use one or more of the above traversal methods to traverse the file system to obtain the system directory.
S212:检测系统100根据所述系统目录生成诱饵目录。S212: The detection system 100 generates a decoy list according to the system list.
诱饵目录为用于存放诱饵文件的目录。检测系统100可以在系统目录下生成诱饵目录。The lure directory is a directory for storing lure files. The detection system 100 can generate a decoy directory under the system directory.
需要说明的是,执行本申请实施例的勒索病毒检测方法也可以不执行S212,也即检测系统100也可以不额外生成诱饵目录,以存放诱饵文件。例如,检测系统100可以将已有目录用于存放诱饵文件。It should be noted that the execution of the ransomware detection method of the embodiment of the present application may not execute S212, that is, the detection system 100 may not additionally generate a decoy directory to store decoy files. For example, the detection system 100 may use an existing directory to store decoy files.
当检测系统100生成诱饵目录时,可以生成至少一个诱饵目录,例如检测系统100可以生成第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一种。所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问。所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问。所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。When the detection system 100 generates the lure list, at least one lure list may be generated, for example, the detection system 100 may generate at least one of the first lure list, the second lure list and the third lure list. The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal. The name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order. The name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
在一些实施例中,第一前缀可以是可打印字符中排序靠前的字符,例如为“!”,如此可以使得第一诱饵目录在正序遍历时优先访问;第二前缀可以是可打印字符中排序靠后的字符,例如为“~”,如此可以使得第二诱饵目录在逆序遍历时优先访问;第三前缀可以是表示隐藏目录的字符,例如为“.”,如此可以使得第三诱饵目录在系统磁盘默认遍历时被优先访问。In some embodiments, the first prefix can be the character at the top of the printable characters, such as "!", so that the first decoy directory can be accessed preferentially when traversing in the forward order; the second prefix can be the printable character The lower-ordered characters in , such as "~", can make the second decoy directory preferentially accessed when traversing in reverse order; the third prefix can be a character indicating a hidden directory, such as ".", so that the third bait Directories are accessed first when traversing system disks by default.
其中,检测系统100可以通过执行S208和/或S212,以生成第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一种。当文件系统支持正序遍历时,检测系统100可以通过执行S208和/或S212生成第一诱饵目录。类似地,当文件系统支持逆序遍历时,检测系统100可以通过执行S208和/或S212生成第二诱饵目录。文件系统支持系统磁盘默认遍历方式时,检测系统100可以通过执行S208和/或S212生成第三诱饵目录。Wherein, the detection system 100 may execute S208 and/or S212 to generate at least one of the first decoy category, the second decoy category and the third decoy category. When the file system supports forward order traversal, the detection system 100 may generate the first decoy directory by executing S208 and/or S212. Similarly, when the file system supports reverse order traversal, the detection system 100 may generate the second decoy directory by executing S208 and/or S212. When the file system supports the default traversal mode of the system disk, the detection system 100 may generate a third decoy directory by executing S208 and/or S212.
S214:检测系统100根据所述检测参数生成所述系统目录下的多个诱饵文件。S214: The detection system 100 generates multiple decoy files under the system directory according to the detection parameters.
具体地,检测参数包括目标文件类型,检测系统100可以在目标文件类型中随机选择若干文件类型,生成系统目录下的多个诱饵文件,诱饵文件的文件类型与选择的文件类型一致。其中,检测参数包括文件大小范围时,检测系统100可以根据文件大小范围,随机生成不同文件大小的诱饵文件。Specifically, the detection parameters include the target file type, and the detection system 100 can randomly select several file types from the target file types to generate multiple decoy files in the system directory, and the file type of the decoy files is consistent with the selected file type. Wherein, when the detection parameter includes a file size range, the detection system 100 may randomly generate decoy files of different file sizes according to the file size range.
在一些可能的实现方式中,检测系统100也可以直接从可能被勒索加密的常用文件类型中随机选择多个文件类型,具体地,在选择文件类型时,如表1所示,检测系统100可以从文件大类(包括数据库、文本/文档、压缩文件、视频、图片、代码源文件、虚拟化/容器文件、备份文件等)中各自随机选择部分类型作为诱饵文件的扩展名,然后随机生成不同文件大小的诱饵文件。其中,诱饵文件的名称可以随机生成。In some possible implementations, the detection system 100 may also randomly select multiple file types directly from common file types that may be encrypted by ransomware. Specifically, when selecting a file type, as shown in Table 1, the detection system 100 can Randomly select some types from the file categories (including database, text/document, compressed file, video, picture, code source file, virtualization/container file, backup file, etc.) as the extension of the decoy file, and then randomly generate different The file size of the decoy file. Among them, the name of the decoy file can be randomly generated.
表1 常用文件类型Table 1 Common file types
Figure PCTCN2022107828-appb-000001
Figure PCTCN2022107828-appb-000001
在另一些可能的实现方式中,检测系统100可以从目标文件类型中随机选择若干文件类型,生成部分诱饵文件,从常用文件类型中随机选择若干文件类型,生成另一部分诱饵文件。部分诱饵文件的名称可以随机生成,剩余诱饵文件的名称可以从目标关键字中选择生成。In other possible implementation manners, the detection system 100 may randomly select several file types from target file types to generate some decoy files, and randomly select several file types from common file types to generate another part of decoy files. The names of some decoy files can be randomly generated, and the names of the rest of the decoy files can be selected from target keywords.
该方式可以防止勒索病毒全盘遍历时只针对特定的文件类型或检查文件大小,从而绕过对动诱饵文件的加密,如此可以保证诱饵文件优先被勒索病毒加密,进而提前检测出勒 索病毒。This method can prevent the ransomware from only targeting specific file types or checking the file size when traversing the entire disk, thereby bypassing the encryption of the dynamic bait file, so as to ensure that the bait file is first encrypted by the ransomware, and then the ransomware can be detected in advance.
S216:检测系统100检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化。S216: The detection system 100 detects the access behavior to the decoy file, and acquires the attribute change of the decoy file before and after the access behavior.
其中,对所述诱饵文件的访问行为包括读数据和/或写数据的行为。当检测系统100检测到进程对诱饵文件的读行为和/或写行为后,可以获取诱饵文件在所述访问行为前后的属性变化。Wherein, the behavior of accessing the decoy file includes the behavior of reading data and/or writing data. After the detection system 100 detects the read behavior and/or write behavior of the decoy file by the process, it can obtain the attribute changes of the decoy file before and after the access behavior.
其中,诱饵文件的属性包括诱饵文件的哈希、文件大小、熵值、文件类型中的一种或多种。检测系统100可以获取诱饵文件在访问动作前和访问动作后的哈希、文件大小、熵值、文件类型中的一种或多种。然后检测系统100可以根据诱饵文件在访问行为前和访问行为后的哈希,确定诱饵文件在访问行为前后的哈希变化。类似地,检测系统100可以根据诱饵文件在访问行为前和访问行为后的文件大小、文件类型、熵值,确定文件大小变化、熵值变化、文件类型变化。Wherein, the attributes of the lure file include one or more of the hash of the lure file, the file size, the entropy value, and the file type. The detection system 100 may acquire one or more of the hash, file size, entropy value, and file type of the decoy file before and after the access action. Then the detection system 100 can determine the hash changes of the decoy file before and after the access behavior according to the hashes of the decoy file before and after the access behavior. Similarly, the detection system 100 can determine the file size change, entropy value change, and file type change according to the file size, file type, and entropy value of the decoy file before and after the access behavior.
S218:检测系统100根据属性变化确定勒索病毒。S218: The detection system 100 determines the ransomware virus according to the attribute change.
检测系统100可以将上述属性变化和预设条件进行比较,当属性变化满足预设条件时,则检测系统100可以确定存在可疑的勒索加密行为,检测系统100可以将实施上述访问行为的进程识别为勒索进程,将进程对应的文件(具体是指被执行时产生该进程的文件)确定为勒索病毒。The detection system 100 can compare the above-mentioned attribute change with the preset condition, and when the attribute change meets the preset condition, the detection system 100 can determine that there is a suspicious ransomware encryption behavior, and the detection system 100 can identify the process that implements the above-mentioned access behavior as The ransomware process determines the file corresponding to the process (specifically, the file that generates the process when it is executed) as a ransomware virus.
其中,预设条件可以根据经验值设置。针对可以量化的属性,如文件大小、熵值,属性变化可以通过差值或者变化比例进行比较,相应地,预设条件可以设置为差值达到预设值,或者变化比例达到预设比例。例如,预设条件可以设置为文件大小变化达到5MB。针对不可以量化的属性,如文件类型,预设条件可以为该属性由一种属性值变为另一种属性值。例如,预设条件可以是文件类型由doc变为exe。Wherein, the preset condition can be set according to experience value. For quantifiable attributes, such as file size and entropy, attribute changes can be compared by difference or change ratio. Correspondingly, the preset condition can be set so that the difference reaches the preset value, or the change ratio reaches the preset ratio. For example, a preset condition can be set such that the file size varies up to 5MB. For an attribute that cannot be quantified, such as a file type, the preset condition can be that the attribute changes from one attribute value to another attribute value. For example, the preset condition may be that the file type is changed from doc to exe.
在一些可能的实现方式中,检测系统100还可以在识别到勒索病毒后,向所述用户呈现告警信息。其中,告警信息可以包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问动作中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。In some possible implementation manners, the detection system 100 may also present warning information to the user after identifying the ransomware virus. Wherein, the warning information may include the identification of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the access path of the ransomware process, and the access action of the ransomware process One or more, the ransomware process is the process corresponding to the ransomware virus.
进一步地,检测系统100还可以在识别到勒索病毒后,停止勒索进程,阻断所述勒索病毒。其中,检测系统100可以是在识别到勒索病毒后,自动停止勒索进程,阻断勒索病毒,或者是在向用户呈现告警信息,由用户对告警信息进行确认,然后在获得用户的授权或许可后,停止勒索进程,阻断勒索病毒。Further, the detection system 100 can also stop the ransomware process and block the ransomware after identifying the ransomware. Among them, the detection system 100 may automatically stop the ransomware process after identifying the ransomware virus, block the ransomware virus, or present the warning information to the user, and the user confirms the warning information, and then obtains the authorization or permission of the user. , stop the ransomware process and block the ransomware virus.
考虑到诱饵目录、诱饵文件可能存在被用户误删除的情况,例如用户在清理业务/数据文件时,误删除上述诱饵文件,检测系统100还可以监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。其中,检测系统100可以周期性地监控诱饵文件,当诱饵文件被修改或被删除,但对应的应用并未被卸载时,则表明该诱饵文件可能是被误修改,或者误删除,检测系统100可以从内存中恢复该诱饵文件。在一些实施例中,当诱饵文件被修改或删除,但是检测系统100并未生成相应的告警信息时,则该诱饵文件也有较高概率被误修改或误删除,检测系统100可以从内存中恢复被误删除或误修改的诱饵文件。Considering that the bait directory and bait files may be accidentally deleted by the user, for example, when the user deletes the above-mentioned bait files by mistake when cleaning up business/data files, the detection system 100 can also monitor the bait files, and when the bait files are mistakenly deleted When modifying or accidentally deleting, restore the decoy file. Wherein, the detection system 100 can periodically monitor the decoy file. When the decoy file is modified or deleted, but the corresponding application is not uninstalled, it indicates that the decoy file may be modified or deleted by mistake. The detection system 100 The decoy file can be recovered from memory. In some embodiments, when the decoy file is modified or deleted, but the detection system 100 does not generate corresponding alarm information, then the decoy file also has a high probability of being modified or deleted by mistake, and the detection system 100 can restore it from the memory. Decoy files that have been deleted or modified by mistake.
在一些可能的实现方式中,检测系统100还可以监控应用的变化或者系统目录的变化,然后根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。具体地,检测系统100可以周期性地监控运行的进程,并识别进程,如果发现新的应用,则检测系统100可以根据该新的应用的访问信息创建新的诱饵文件,可选地,检测系统100还可以根据该新的应用的访问信息创建新的诱饵目录。如果发现应用被卸载,并且对应的诱饵文件还存在,则检测系统100可以删除相应的诱饵文件。可选地,应用被卸载的情况下,诱饵目录还存在,则检测系统100还可以删除相应的诱饵目录。类似地,检测系统100也可以根据系统目录变化,创建新的诱饵目录/诱饵文件,或者删除已有的诱饵目录/诱饵文件。In some possible implementation manners, the detection system 100 may also monitor application changes or system directory changes, and then update the decoy file according to the application changes or system directory changes. Specifically, the detection system 100 can periodically monitor the running process and identify the process. If a new application is found, the detection system 100 can create a new decoy file according to the access information of the new application. Optionally, the detection system 100 can also create a new bait directory according to the access information of the new application. If it is found that the application is uninstalled and the corresponding decoy file still exists, the detection system 100 may delete the corresponding decoy file. Optionally, when the application is uninstalled and the decoy directory still exists, the detection system 100 may also delete the corresponding decoy directory. Similarly, the detection system 100 may also create a new decoy directory/decoy file or delete an existing decoy directory/decoy file according to changes in the system directory.
进一步地,检测系统100还可以在检测到应用的变化或者系统目录的变化时,根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面。然后根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。Further, when the detection system 100 detects the change of the application or the change of the system directory, according to the change of the application or the change of the system directory, an update interface can be presented to the user. Then update the decoy file according to the update operation triggered by the user through the update interface.
参见图5A、图5B所示的更新界面的示意图,该更新界面500中呈现有检测系统100检测到的变化信息,例如是应用的变化或系统目录的变化。本实施例以基于应用的变化更新诱饵文件示例说明。其中,图5A所示的更新界面500展示了检测系统100检测到新增应用时呈现的新增应用的相关信息,例如是新增应用的访问信息502;图5B用于所示的更新界面500展示了检测系统100检测到应用被卸载时呈现的被卸载的应用的相关信息504,例如包括被卸载的应用的名称。Referring to the schematic diagrams of the update interface shown in FIG. 5A and FIG. 5B , the update interface 500 presents change information detected by the detection system 100 , such as a change of an application or a change of a system directory. This embodiment is described by taking an example of updating a decoy file based on application changes. Among them, the update interface 500 shown in FIG. 5A shows the relevant information of the new application presented when the detection system 100 detects the new application, for example, the access information 502 of the new application; FIG. 5B is used for the update interface 500 shown in FIG. The relevant information 504 of the uninstalled application presented when the detection system 100 detects that the application is uninstalled is shown, including, for example, the name of the uninstalled application.
更新界面500中还展示有提示信息506,用于提示新增应用或者应用被卸载,用户可以触发更新控件508,以触发更新诱饵文件的操作。其中,在图5A所示的更新界面500中触发更新控件508时,检测系统100可以生成新的诱饵文件,在图5B所示的更新界面500中触发更新控件508时,检测系统100可以删除被卸载的应用对应的诱饵文件。The update interface 500 also displays prompt information 506 for prompting that an application has been added or that the application has been uninstalled. The user can trigger the update control 508 to trigger the operation of updating the decoy file. Wherein, when the update control 508 is triggered in the update interface 500 shown in FIG. 5A, the detection system 100 can generate a new decoy file, and when the update control 508 is triggered in the update interface 500 shown in FIG. 5B, the detection system 100 can delete the The decoy file corresponding to the uninstalled application.
进一步地,更新界面500还包括取消控件509,当取消控件509被触发时,检测系统100可以取消更新诱饵文件。Further, the update interface 500 also includes a cancel control 509, and when the cancel control 509 is triggered, the detection system 100 can cancel updating the decoy file.
基于上述内容描述,本申请实施例提供了一种勒索病毒检测方法。在该方法中,检测系统100通过根据应用或系统目录生成与真实的业务/数据文件具有较高相似度的诱饵文件,避免了勒索病毒根据固定的文件大小、文件类型、文件名称或者部署位置跳过诱饵文件,对应用的业务/数据文件进行加密,能够有效地、更及时地发现勒索病毒加密文件的异常行为,从而及时阻断勒索病毒,降低勒索病毒造成的损害。Based on the above description, the embodiment of the present application provides a ransomware detection method. In this method, the detection system 100 generates decoy files with a high degree of similarity with real business/data files according to the application or system directory, so as to prevent the ransomware from jumping according to the fixed file size, file type, file name or deployment location. By encrypting the business/data files of the application through the bait file, the abnormal behavior of the ransomware encrypted file can be found effectively and more timely, so as to block the ransomware in time and reduce the damage caused by the ransomware.
而且,该方法通过生成特定前缀的诱饵目录,使得诱饵目录以及诱饵目录中的诱饵文件在不同遍历场景均可以优先访问,避免了勒索病毒先访问业务/数据文件导致勒索病毒检测方法失效。Moreover, the method generates a decoy directory with a specific prefix, so that the decoy directory and the decoy files in the decoy directory can be accessed preferentially in different traversal scenarios, avoiding the failure of the ransomware detection method caused by the ransomware virus first accessing the business/data files.
上文结合图1至图5B对本申请实施例提供的勒索病毒检测方法进行了详细介绍,下面将结合附图对本申请实施例提供的系统100进行介绍。The ransomware detection method provided by the embodiment of the present application is described in detail above with reference to FIG. 1 to FIG. 5B , and the system 100 provided by the embodiment of the present application will be introduced below in conjunction with the accompanying drawings.
参见图6所示的勒索病毒检测系统100的结构示意图,该系统100包括:Referring to the schematic structural diagram of the ransomware detection system 100 shown in FIG. 6, the system 100 includes:
诱饵文件管理模块102,用于根据应用或系统目录生成诱饵文件;A decoy file management module 102, configured to generate a decoy file according to an application or a system directory;
诱饵访问行为检测模块104,用于检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化;A decoy access behavior detection module 104, configured to detect an access behavior to the decoy file, and acquire attribute changes of the decoy file before and after the access behavior;
所述诱饵行为访问检测模块104,还用于根据所述属性变化确定勒索病毒。The decoy behavior access detection module 104 is also used to determine the ransomware according to the attribute change.
在一些可能的实现方式中,所述系统100还包括:In some possible implementations, the system 100 further includes:
安全响应模块106,用于向所述用户呈现告警信息,所述告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。The security response module 106 is configured to present warning information to the user, and the warning information includes the identification of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the One or more of the access path of the ransomware process and the access behavior of the ransomware process, where the ransomware process is a process corresponding to the ransomware virus.
在一些可能的实现方式中,所述系统100还包括:In some possible implementations, the system 100 further includes:
安全响应模块106,用于停止勒索进程,阻断所述勒索病毒,所述勒索进程为所述勒索病毒对应的进程。The security response module 106 is configured to stop the ransomware process and block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus.
在一些可能的实现方式中,所述诱饵文件管理模块102还用于:In some possible implementations, the decoy file management module 102 is also used for:
根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。The decoy file is updated according to the change of the application or the change of the system directory.
其中,所述系统100还可以包括应用监控模块103,该应用监控模块103用于监控应用的变化。当应用监控模块103检测到应用变化时,如检测到新增应用或应用被卸载时,可以上报变化信息至诱饵文件管理模块102,以便于诱饵文件管理模块102根据变化信息更新诱饵文件。Wherein, the system 100 may further include an application monitoring module 103, and the application monitoring module 103 is used for monitoring changes of applications. When the application monitoring module 103 detects an application change, such as detecting a new application or an application being uninstalled, it can report the change information to the decoy file management module 102, so that the decoy file management module 102 can update the decoy file according to the change information.
在一些可能的实现方式中,所述诱饵文件管理模块102具体用于:In some possible implementations, the decoy file management module 102 is specifically configured to:
根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面;Presenting an update interface to the user according to changes in the application or changes in the system catalog;
根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。The decoy file is updated according to an update operation triggered by the user through the update interface.
在一些可能的实现方式中,所述诱饵文件管理模块102具体用于:In some possible implementations, the decoy file management module 102 is specifically configured to:
根据所述应用的访问信息生成所述诱饵文件。The decoy file is generated according to the access information of the application.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件类型;In some possible implementation manners, the access information of the application includes the file type accessed by the application;
所述诱饵文件管理模块102具体用于:The decoy file management module 102 is specifically used for:
根据所述应用访问的文件类型,生成所述诱饵文件,所述诱饵文件的文件类型与所述应用访问的文件类型相同。The decoy file is generated according to the file type accessed by the application, and the file type of the decoy file is the same as the file type accessed by the application.
在一些可能的实现方式中,所述诱饵文件包括多个文件,并且所述多个文件的文件大小不同。In some possible implementation manners, the decoy file includes multiple files, and the file sizes of the multiple files are different.
在一些可能的实现方式中,所述诱饵文件管理模块102还用于:In some possible implementations, the decoy file management module 102 is also used for:
根据所述应用的访问信息,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the access information of the application, and the decoy directory is a directory where the decoy file is located.
在一些可能的实现方式中,所述应用的访问信息包括所述应用访问的文件目录;In some possible implementation manners, the access information of the application includes a file directory accessed by the application;
所述诱饵文件管理模块102具体用于:The decoy file management module 102 is specifically used for:
根据所述应用访问的文件目录,生成诱饵目录。According to the file directory accessed by the application, a decoy directory is generated.
在一些可能的实现方式中,所述诱饵文件管理模块102具体用于:In some possible implementations, the decoy file management module 102 is specifically configured to:
根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,多个所述诱饵文件的文件大小不同。Multiple decoy files under the system directory are generated according to a randomly selected file type, and the multiple decoy files have different file sizes.
在一些可能的实现方式中,所述系统100还包括:In some possible implementations, the system 100 further includes:
诱饵检测配置模块108,用于向所述用户呈现配置界面,接收所述用户通过所述配置界面配置的检测参数,所述检测参数包括目标文件类型;A decoy detection configuration module 108, configured to present a configuration interface to the user, and receive detection parameters configured by the user through the configuration interface, the detection parameters including the target file type;
所述诱饵文件管理模块102具体用于:The decoy file management module 102 is specifically used for:
根据从所述目标文件类型中随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件。A plurality of decoy files under the system directory are generated according to a file type randomly selected from the target file types.
在一些可能的实现方式中,所述检测参数还包括排除目录、目标关键字中的至少一个,所述排除目录为所述系统目录中无需部署所述诱饵文件的目录,所述目标关键字用于生成所述诱饵文件的名称。In some possible implementations, the detection parameters further include at least one of an exclusion directory and a target keyword, the exclusion directory is a directory in the system directory that does not need to deploy the decoy file, and the target keyword is used to generate the name of the decoy file.
在一些可能的实现方式中,所述诱饵文件管理模块102还用于:In some possible implementations, the decoy file management module 102 is also used for:
根据所述系统目录,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the system directory, and the decoy directory is a directory where the decoy file is located.
在一些可能的实现方式中,所述诱饵目录包括第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一个;In some possible implementations, the lure list includes at least one of a first lure list, a second lure list, and a third lure list;
所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问;The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal;
所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问;The name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order;
所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。The name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
在一些可能的实现方式中,所述诱饵访问行为检测模块104还用于:In some possible implementations, the decoy access behavior detection module 104 is also used to:
监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。The decoy file is monitored, and when the decoy file is mistakenly modified or deleted, the decoy file is restored.
根据本申请实施例的勒索病毒检测系统100可对应于执行本申请实施例中描述的方法,并且勒索病毒检测系统100的各个模块/单元的上述和其它操作和/或功能分别为了实现图2所示实施例中的各个方法的相应流程,为了简洁,在此不再赘述。The ransomware detection system 100 according to the embodiment of the present application may correspond to the implementation of the method described in the embodiment of the present application, and the above-mentioned and other operations and/or functions of the various modules/units of the ransomware detection system 100 are respectively in order to realize the The corresponding flow of each method in the embodiment is shown, and for the sake of brevity, details are not repeated here.
本申请实施例还提供一种计算机集群。该计算机集群包括至少一台计算机,该计算机例如可以是服务器。该计算机集群具体用于实现如图6所示实施例中勒索病毒检测系统100的功能。The embodiment of the present application also provides a computer cluster. The computer cluster includes at least one computer, which may be a server, for example. The computer cluster is specifically used to implement the functions of the ransomware detection system 100 in the embodiment shown in FIG. 6 .
图7提供了一种计算机集群的结构示意图,如图7所示,计算机集群70包括多台计算机700,计算机700包括总线701、处理器702、通信接口703和存储器704。处理器702、存储器704和通信接口703之间通过总线701通信。FIG. 7 provides a schematic structural diagram of a computer cluster. As shown in FIG. 7 , the computer cluster 70 includes multiple computers 700 , and the computers 700 include a bus 701 , a processor 702 , a communication interface 703 and a memory 704 . The processor 702 , the memory 704 and the communication interface 703 communicate through the bus 701 .
总线701可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 701 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 7 , but it does not mean that there is only one bus or one type of bus.
处理器702可以为中央处理器(central processing unit,CPU)、图形处理器(graphics processing unit,GPU)、微处理器(micro processor,MP)或者数字信号处理器(digital signal processor,DSP)等处理器中的任意一种或多种。The processor 702 may be a central processing unit (central processing unit, CPU), a graphics processing unit (graphics processing unit, GPU), a microprocessor (micro processor, MP) or a digital signal processor (digital signal processor, DSP) etc. Any one or more of them.
通信接口703用于与外部通信。例如,通信接口703用于接收用户通过配置界面配置的检测参数,向用户呈现告警信息等等。The communication interface 703 is used for communicating with the outside. For example, the communication interface 703 is used to receive detection parameters configured by the user through the configuration interface, and present warning information to the user, and so on.
存储器704可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM)。存储器704还可以包括非易失性存储器(non-volatile memory),例 如只读存储器(read-only memory,ROM),快闪存储器,硬盘驱动器(hard disk drive,HDD)或固态驱动器(solid state drive,SSD)。The memory 704 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM). Memory 704 can also include non-volatile memory (non-volatile memory), such as read-only memory (read-only memory, ROM), flash memory, hard disk drive (hard disk drive, HDD) or solid state drive (solid state drive) , SSD).
存储器704中存储有计算机可读指令,处理器702执行该计算机可读指令,以使得计算机集群70执行前述勒索病毒检测方法(或实现前述勒索病毒检测系统100的功能)。Computer-readable instructions are stored in the memory 704 , and the processor 702 executes the computer-readable instructions, so that the computer cluster 70 executes the aforementioned ransomware detection method (or realizes the functions of the aforementioned ransomware detection system 100 ).
具体地,在实现图6所示系统的实施例的情况下,且图6中所描述的勒索病毒检测系统100的模块或单元的功能为通过软件实现的情况下,执行图6中各模块或单元的功能所需的软件或程序代码可以存储在计算机集群70中的至少一个存储器704中。至少一个处理器702执行存储器704中存储的程序代码,以使得计算机集群70执行前述勒索病毒检测方法。Specifically, in the case of implementing the embodiment of the system shown in FIG. 6, and the functions of the modules or units of the ransomware detection system 100 described in FIG. 6 are implemented by software, each module or unit in FIG. 6 is executed Software or program codes required for the functioning of the units may be stored in at least one memory 704 in the computer cluster 70 . At least one processor 702 executes the program code stored in the memory 704, so that the computer cluster 70 executes the aforementioned ransomware detection method.
本申请实施例还提供了一种计算机可读存储介质。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质的数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘)等。该计算机可读存储介质包括指令,所述指令指示计算机或计算机集群执行上述勒索病毒检测方法。The embodiment of the present application also provides a computer-readable storage medium. The computer-readable storage medium may be any available medium that can be stored by a computer, or a data storage device such as a data center including one or more available media. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state hard disk), etc. The computer-readable storage medium includes instructions, and the instructions instruct a computer or a computer cluster to execute the above ransomware detection method.
本申请实施例还提供了一种计算机程序产品。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机或数据中心进行传输。所述计算机程序产品可以为一个软件安装包,在需要使用前述勒索病毒检测方法的任一方法的情况下,可以下载该计算机程序产品并在计算机或计算机集群上执行该计算机程序产品。The embodiment of the present application also provides a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g. (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wirelessly (such as infrared, wireless, microwave, etc.) to another website site, computer or data center. The computer program product may be a software installation package, and if any method of the aforementioned ransomware detection method needs to be used, the computer program product may be downloaded and executed on a computer or a computer cluster.
上述各个附图对应的流程或结构的描述各有侧重,某个流程或结构中没有详述的部分,可以参见其他流程或结构的相关描述。The description of the process or structure corresponding to each of the above drawings has its own emphasis. For the part that is not described in detail in a certain process or structure, you can refer to the relevant description of other processes or structures.

Claims (35)

  1. 一种勒索病毒检测方法,其特征在于,所述方法包括:A method for detecting ransomware, characterized in that the method comprises:
    根据应用或系统目录生成诱饵文件;Generate decoy files based on application or system directories;
    检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化;Detecting the access behavior to the decoy file, and obtaining the attribute change of the decoy file before and after the access behavior;
    根据所述属性变化确定勒索病毒。Determine the ransomware according to the property change.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, further comprising:
    向所述用户呈现告警信息,所述告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。Presenting warning information to the user, the warning information including the identity of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the access path of the ransomware process, the One or more of the access behaviors of the ransomware process, where the ransomware process is a process corresponding to the ransomware virus.
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法:The method according to claim 1 or 2, characterized in that, the method:
    停止勒索进程,阻断所述勒索病毒,所述勒索进程为所述勒索病毒对应的进程。Stop the ransomware process, block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus.
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, wherein the method further comprises:
    根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。The decoy file is updated according to the change of the application or the change of the system directory.
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件,包括:The method according to claim 4, wherein updating the decoy file according to the change of the application or the change of the system directory includes:
    根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面;Presenting an update interface to the user according to changes in the application or changes in the system catalog;
    根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。The decoy file is updated according to an update operation triggered by the user through the update interface.
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述根据应用生成诱饵文件,包括:The method according to any one of claims 1 to 5, wherein the generating the decoy file according to the application includes:
    根据所述应用的访问信息生成所述诱饵文件。The decoy file is generated according to the access information of the application.
  7. 根据权利要求6所述的方法,其特征在于,所述应用的访问信息包括所述应用访问的文件类型;The method according to claim 6, wherein the access information of the application includes the file type accessed by the application;
    所述根据所述应用的访问信息生成所述诱饵文件,包括:The generating the decoy file according to the access information of the application includes:
    根据所述应用访问的文件类型,生成所述诱饵文件,所述诱饵文件的文件类型与所述应用访问的文件类型相同。The decoy file is generated according to the file type accessed by the application, and the file type of the decoy file is the same as the file type accessed by the application.
  8. 根据权利要求7所述的方法,其特征在于,所述诱饵文件包括多个文件,并且所述多个文件的文件大小不同。The method according to claim 7, wherein the decoy file includes multiple files, and the file sizes of the multiple files are different.
  9. 根据权利要求1至8任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 8, further comprising:
    根据所述应用的访问信息,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the access information of the application, and the decoy directory is a directory where the decoy file is located.
  10. 根据权利要求9所述的方法,其特征在于,所述应用的访问信息包括所述应用访问的文件目录;The method according to claim 9, wherein the access information of the application includes the file directory accessed by the application;
    所述根据所述应用的访问信息,生成诱饵目录,包括:The decoy directory is generated according to the access information of the application, including:
    根据所述应用访问的文件目录,生成诱饵目录。According to the file directory accessed by the application, a decoy directory is generated.
  11. 根据权利要求1至5任一项所述的方法,其特征在于,所述根据系统目录生成诱饵文件,包括:The method according to any one of claims 1 to 5, wherein the generating the decoy file according to the system directory includes:
    根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,多个所述诱饵文件的文件大小不同。Multiple decoy files under the system directory are generated according to a randomly selected file type, and the multiple decoy files have different file sizes.
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:The method according to claim 11, characterized in that the method further comprises:
    向所述用户呈现配置界面;presenting a configuration interface to the user;
    接收所述用户通过所述配置界面配置的检测参数,所述检测参数包括目标文件类型;receiving detection parameters configured by the user through the configuration interface, where the detection parameters include target file types;
    所述根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,包括:According to the randomly selected file type, generating a plurality of decoy files under the system directory, including:
    根据从所述目标文件类型中随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件。A plurality of decoy files under the system directory are generated according to a file type randomly selected from the target file types.
  13. 根据权利要求12所述的方法,其特征在于,所述检测参数还包括排除目录、目标关键字中的至少一个,所述排除目录为所述系统目录中无需部署所述诱饵文件的目录,所述目标关键字用于生成所述诱饵文件的名称。The method according to claim 12, wherein the detection parameters further include at least one of an exclusion directory and a target keyword, the exclusion directory is a directory in the system directory that does not need to deploy the decoy file, so The target keyword is used to generate the name of the decoy file.
  14. 根据权利要求11至13任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 11 to 13, further comprising:
    根据所述系统目录,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the system directory, and the decoy directory is a directory where the decoy file is located.
  15. 根据权利要求9、10或14所述的方法,其特征在于,所述诱饵目录包括第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一个;The method according to claim 9, 10 or 14, wherein the bait list includes at least one of a first bait list, a second bait list and a third bait list;
    所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问;The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal;
    所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问;The name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order;
    所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。The name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
  16. 根据权利要求1至15任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 15, further comprising:
    监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。The decoy file is monitored, and when the decoy file is mistakenly modified or deleted, the decoy file is restored.
  17. 一种勒索病毒检测系统,其特征在于,所述系统包括:A ransomware detection system, characterized in that the system includes:
    诱饵文件管理模块,用于根据应用或系统目录生成诱饵文件;A decoy file management module, configured to generate a decoy file according to an application or system directory;
    诱饵访问行为检测模块,用于检测对所述诱饵文件的访问行为,获取所述诱饵文件在所述访问行为前后的属性变化;A decoy access behavior detection module, configured to detect an access behavior to the decoy file, and acquire attribute changes of the decoy file before and after the access behavior;
    所述诱饵行为访问检测模块,还用于根据所述属性变化确定勒索病毒。The decoy behavior access detection module is also used to determine the ransomware according to the attribute change.
  18. 根据权利要求17所述的系统,其特征在于,所述系统还包括:The system according to claim 17, further comprising:
    安全响应模块,用于向所述用户呈现告警信息,所述告警信息包括勒索进程的标识、所述勒索病毒的路径、所述勒索病毒的哈希、所述勒索病毒的命令行、所述勒索进程的访问路径、所述勒索进程的访问行为中的一种或多种,所述勒索进程为所述勒索病毒对应的进程。A security response module, configured to present warning information to the user, the warning information including the identity of the ransomware process, the path of the ransomware virus, the hash of the ransomware virus, the command line of the ransomware virus, the ransomware virus One or more of the access path of the process and the access behavior of the ransomware process, where the ransomware process is a process corresponding to the ransomware virus.
  19. 根据权利要求17或18所述的系统,其特征在于,所述系统还包括:The system according to claim 17 or 18, wherein the system further comprises:
    安全响应模块,用于停止勒索进程,阻断所述勒索病毒,所述勒索进程为所述勒索病毒对应的进程。The security response module is configured to stop the ransomware process and block the ransomware virus, and the ransomware process is a process corresponding to the ransomware virus.
  20. 根据权利要求17至19任一项所述的系统,其特征在于,所述诱饵文件管理模块还用于:The system according to any one of claims 17 to 19, wherein the decoy file management module is also used for:
    根据所述应用的变化或者所述系统目录的变化,更新所述诱饵文件。The decoy file is updated according to the change of the application or the change of the system directory.
  21. 根据权利要求20所述的系统,其特征在于,所述诱饵文件管理模块具体用于:The system according to claim 20, wherein the decoy file management module is specifically used for:
    根据所述应用的变化或者所述系统目录的变化,向用户呈现更新界面;Presenting an update interface to the user according to changes in the application or changes in the system catalog;
    根据所述用户通过所述更新界面触发的更新操作,更新所述诱饵文件。The decoy file is updated according to an update operation triggered by the user through the update interface.
  22. 根据权利要求17至21任一项所述的系统,其特征在于,所述诱饵文件管理模块具体用于:The system according to any one of claims 17 to 21, wherein the decoy file management module is specifically used for:
    根据所述应用的访问信息生成所述诱饵文件。The decoy file is generated according to the access information of the application.
  23. 根据权利要求22所述的系统,其特征在于,所述应用的访问信息包括所述应用访问的文件类型;The system according to claim 22, wherein the access information of the application includes the file type accessed by the application;
    所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
    根据所述应用访问的文件类型,生成所述诱饵文件,所述诱饵文件的文件类型与所述应用访问的文件类型相同。The decoy file is generated according to the file type accessed by the application, and the file type of the decoy file is the same as the file type accessed by the application.
  24. 根据权利要求23所述的系统,其特征在于,所述诱饵文件包括多个文件,并且所述多个文件的文件大小不同。The system according to claim 23, wherein the decoy file includes multiple files, and the file sizes of the multiple files are different.
  25. 根据权利要求17至24任一项所述的系统,其特征在于,所述诱饵文件管理模块还用于:The system according to any one of claims 17 to 24, wherein the decoy file management module is also used for:
    根据所述应用的访问信息,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the access information of the application, and the decoy directory is a directory where the decoy file is located.
  26. 根据权利要求25所述的系统,其特征在于,所述应用的访问信息包括所述应用访问的文件目录;The system according to claim 25, wherein the application access information includes the file directory accessed by the application;
    所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
    根据所述应用访问的文件目录,生成诱饵目录。According to the file directory accessed by the application, a decoy directory is generated.
  27. 根据权利要求17至21任一项所述的系统,其特征在于,所述诱饵文件管理模块具体用于:The system according to any one of claims 17 to 21, wherein the decoy file management module is specifically used for:
    根据随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件,多个所述诱饵文件的文件大小不同。Multiple decoy files under the system directory are generated according to a randomly selected file type, and the multiple decoy files have different file sizes.
  28. 根据权利要求27所述的系统,其特征在于,所述系统还包括:The system according to claim 27, further comprising:
    诱饵检测配置模块,用于向所述用户呈现配置界面,接收所述用户通过所述配置界面配置的检测参数,所述检测参数包括目标文件类型;A decoy detection configuration module, configured to present a configuration interface to the user, and receive detection parameters configured by the user through the configuration interface, where the detection parameters include the target file type;
    所述诱饵文件管理模块具体用于:The decoy file management module is specifically used for:
    根据从所述目标文件类型中随机选择的文件类型,生成所述系统目录下的多个所述诱饵文件。A plurality of decoy files under the system directory are generated according to a file type randomly selected from the target file types.
  29. 根据权利要求28所述的系统,其特征在于,所述检测参数还包括排除目录、目标关键字中的至少一个,所述排除目录为所述系统目录中无需部署所述诱饵文件的目录,所述目标关键字用于生成所述诱饵文件的名称。The system according to claim 28, wherein the detection parameters further include at least one of an exclusion directory and a target keyword, the exclusion directory is a directory in the system directory that does not need to deploy the decoy file, so The target keyword is used to generate the name of the decoy file.
  30. 根据权利要求27至29任一项所述的系统,其特征在于,所述诱饵文件管理模块还用于:The system according to any one of claims 27 to 29, wherein the decoy file management module is also used for:
    根据所述系统目录,生成诱饵目录,所述诱饵目录为所述诱饵文件所在目录。A decoy directory is generated according to the system directory, and the decoy directory is a directory where the decoy file is located.
  31. 根据权利要求25、26或30所述的系统,其特征在于,所述诱饵目录包括第一诱饵目录、第二诱饵目录和第三诱饵目录中的至少一个;The system according to claim 25, 26 or 30, wherein the bait list includes at least one of a first bait list, a second bait list and a third bait list;
    所述第一诱饵目录的名称包括第一前缀,使得所述第一诱饵目录在正序遍历时被优先访问;The name of the first decoy directory includes a first prefix, so that the first decoy directory is preferentially accessed during forward order traversal;
    所述第二诱饵目录的名称包括第二前缀,使得所述第二诱饵目录在逆序遍历时被优先访问;The name of the second decoy directory includes a second prefix, so that the second decoy directory is preferentially accessed when traversing in reverse order;
    所述第三诱饵目录的名称包括第三前缀,使得所述第三诱饵目录在系统磁盘默认遍历时被优先访问。The name of the third decoy directory includes a third prefix, so that the third decoy directory is preferentially accessed when the system disk is traversed by default.
  32. 根据权利要求17至31任一项所述的系统,其特征在于,所述诱饵访问行为检测模块还用于:The system according to any one of claims 17 to 31, wherein the decoy access behavior detection module is also used for:
    监控所述诱饵文件,当所述诱饵文件被误修改或误删除时,恢复所述诱饵文件。The decoy file is monitored, and when the decoy file is mistakenly modified or deleted, the decoy file is restored.
  33. 一种计算机集群,其特征在于,包括至少一台计算机,所述计算机包括处理器和存储器,所述存储器存储有计算机可读指令,所述处理器执行所述计算机可读指令,以使所述计算机集群执行权利要求1至16中任一项所述的方法。A computer cluster, characterized in that it includes at least one computer, the computer includes a processor and a memory, the memory stores computer-readable instructions, the processor executes the computer-readable instructions, so that the A cluster of computers executing the method of any one of claims 1-16.
  34. 一种计算机可读存储介质,其特征在于,包括计算机可读指令,当所述计算机可读指令在计算机集群上运行时,使得所述计算机集群执行如权利要求1至16任一项所述的方法。A computer-readable storage medium, characterized in that it includes computer-readable instructions, and when the computer-readable instructions are run on a computer cluster, the computer cluster executes the method according to any one of claims 1 to 16. method.
  35. 一种计算机程序产品,其特征在于,包括计算机可读指令,当所述计算机可读指令在计算机集群上运行时,使得所述计算机集群执行如权利要求1至16任一项所述的方法。A computer program product, characterized by comprising computer readable instructions, when the computer readable instructions are run on a computer cluster, the computer cluster is made to execute the method according to any one of claims 1 to 16.
PCT/CN2022/107828 2021-12-31 2022-07-26 Ransomware detection method and related system WO2023124041A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111679456.1A CN116415240A (en) 2021-12-31 2021-12-31 Lexovirus detection method and related system
CN202111679456.1 2021-12-31

Publications (1)

Publication Number Publication Date
WO2023124041A1 true WO2023124041A1 (en) 2023-07-06

Family

ID=86997357

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107828 WO2023124041A1 (en) 2021-12-31 2022-07-26 Ransomware detection method and related system

Country Status (2)

Country Link
CN (1) CN116415240A (en)
WO (1) WO2023124041A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116663005B (en) * 2023-08-01 2023-10-13 长扬科技(北京)股份有限公司 Method, device, equipment and storage medium for defending composite Lesu virus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616510A (en) * 2018-03-24 2018-10-02 张瑜 It is a kind of that virus detection techniques are extorted based on digital immune reclusion
CN109413048A (en) * 2018-09-30 2019-03-01 上海观安信息技术股份有限公司 Software approach, electronic equipment and program product are extorted based on the detection of file type honey jar
CN110851833A (en) * 2019-11-18 2020-02-28 深信服科技股份有限公司 Lesovirus detection method, device and related equipment
CN113360909A (en) * 2021-06-17 2021-09-07 深圳融安网络科技有限公司 Lesovirus defense method, Lesovirus defense apparatus, and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616510A (en) * 2018-03-24 2018-10-02 张瑜 It is a kind of that virus detection techniques are extorted based on digital immune reclusion
CN109413048A (en) * 2018-09-30 2019-03-01 上海观安信息技术股份有限公司 Software approach, electronic equipment and program product are extorted based on the detection of file type honey jar
CN110851833A (en) * 2019-11-18 2020-02-28 深信服科技股份有限公司 Lesovirus detection method, device and related equipment
CN113360909A (en) * 2021-06-17 2021-09-07 深圳融安网络科技有限公司 Lesovirus defense method, Lesovirus defense apparatus, and readable storage medium

Also Published As

Publication number Publication date
CN116415240A (en) 2023-07-11

Similar Documents

Publication Publication Date Title
US11343280B2 (en) System and method for identifying and controlling polymorphic malware
JP7084778B2 (en) Systems and methods for cloud-based detection, exploration and elimination of targeted attacks
US11055411B2 (en) System and method for protection against ransomware attacks
US9846776B1 (en) System and method for detecting file altering behaviors pertaining to a malicious attack
US9888032B2 (en) Method and system for mitigating the effects of ransomware
JP6352332B2 (en) System and method for restoring changed data
EP3430559B1 (en) Systems and methods for generating tripwire files
US9065826B2 (en) Identifying application reputation based on resource accesses
US9147073B2 (en) System and method for automatic generation of heuristic algorithms for malicious object identification
US9767280B2 (en) Information processing apparatus, method of controlling the same, information processing system, and information processing method
US20160180087A1 (en) Systems and methods for malware detection and remediation
EP2920737B1 (en) Dynamic selection and loading of anti-malware signatures
WO2023124041A1 (en) Ransomware detection method and related system
US10262131B2 (en) Systems and methods for obtaining information about security threats on endpoint devices
WO2019123757A1 (en) Classification device, classification method, and classification program
WO2023151238A1 (en) Ransomware detection method and related system
JP6253333B2 (en) Information processing apparatus, information processing system, and information processing method
Hovmark et al. Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS
US10572663B1 (en) Systems and methods for identifying malicious file droppers
Ahl The Relevance of Endpoint Security in Enterprise Networks
Boyton et al. Forensic Investigation of Ransomware Activities—Part 2
Stephen Investigation of Ransomware in Digital Forensic tools

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22913330

Country of ref document: EP

Kind code of ref document: A1