CN102263773B - Real-time protection method and apparatus thereof - Google Patents

Real-time protection method and apparatus thereof Download PDF

Info

Publication number
CN102263773B
CN102263773B CN201010186404.6A CN201010186404A CN102263773B CN 102263773 B CN102263773 B CN 102263773B CN 201010186404 A CN201010186404 A CN 201010186404A CN 102263773 B CN102263773 B CN 102263773B
Authority
CN
China
Prior art keywords
real
application filters
control point
time
filters rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010186404.6A
Other languages
Chinese (zh)
Other versions
CN102263773A (en
Inventor
王宇
孟齐源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201010186404.6A priority Critical patent/CN102263773B/en
Priority to BR112012028244-1A priority patent/BR112012028244B1/en
Priority to CA2797880A priority patent/CA2797880C/en
Priority to PCT/CN2011/074575 priority patent/WO2011147306A1/en
Publication of CN102263773A publication Critical patent/CN102263773A/en
Application granted granted Critical
Publication of CN102263773B publication Critical patent/CN102263773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention discloses a real-time protection method and an apparatus thereof, and belongs to the safety field. The method comprises the following steps: acquiring an application level filtering rule from a server and updating the application level filtering rule in real time; determining whether a real-time protection event matches the application level filtering rule or not; if so, executing a corresponding operation on the real-time protection event according to the application level filtering rule. The apparatus comprises an obtaining module, a determining module and an executing module. According to the invention, through acquiring the application level filtering rule from the server and updating the application level filtering rule in real time, whether the real-time protection event matches the application level filtering rule or not is determined, if so, the corresponding operation on the real-time protection event is executed according to the application level filtering rule without user intervention, thus protection accuracy and user operation efficiency are raised.

Description

The method and apparatus of real-time protection
Technical field
The present invention relates to security fields, particularly a kind of method and apparatus of real-time protection.
Background technology
Network security situation is increasingly serious, and each viroid also serious threat our handling safety.In order to tackle various rogue programs, need to possess powerful protective capacities.
Current all kinds of real-time protection software is as EQSecure, System Safety Monitor, 360 security guards etc., in the first configuration file of installing of software, all define the control point that some may have influence on system safety behavior, in order to all kinds of events such as system startup item, Image File Execution Options, amendment system file, installation system service are caught.No matter these events are normal runnings of security procedure, or the malicious operation of suspicious program or rogue program, all submit to user and go to judge that this class behavior is to let pass or to forbid.For example, user has selected " all operations of this program of later letting pass " or " forbidding all operations of this program " later, so after this program not again pop-up window allow user select, but automatically let pass or forbid associative operation.
Comprehensively above-mentioned, at least there is following problem in prior art:
By user, all monitor events are selected, for some very safe system operation itself, can be affected user's operation, reduce user's operating efficiency; And in the time that user is not high for computer literacy Grasping level, user is difficult to make selecting properly, if forbidden fail-safe software or the Malware of having let pass, may cause safe running software undesired, or allow the software of malice have an opportunity to do what one wishes without restraint in system.
Summary of the invention
In order to improve user's operating efficiency, and help user to differentiate the software of safe software and malice, the embodiment of the present invention provides a kind of method and apparatus of real-time protection.Described technical scheme is as follows:
A method for real-time protection, described method comprises:
Obtain and real-time update application filters rule from server, described application filters rule comprises: the application filters rule of general policies control point and the application filters rule of self-shield control point;
Judge whether real-time protection event mates described application filters rule;
If coupling, carries out corresponding operation according to described application filters rule to described real-time protection event;
Described from server obtain and real-time update application filters rule before, described method also comprises:
Judge the type of the affiliated control point of described real-time protection event;
Describedly obtain and real-time update application filters rule from server, comprising:
In the time that the type of described control point is self-shield control point, from described server obtain and real-time update described in the application filters rule of self-shield control point;
In the time that the type of described control point is universal monitor vertex type, from described server obtain and real-time update described in the application filters rule of general policies control point.
Wherein, when described application filters rule has when multiple, described from server obtain and real-time update application filters rule after comprise:
From described server obtain and real-time update described in the execution sequence of application filters rule;
Describedly judge whether real-time protection event is mated described application filters rule and comprised:
According to described execution sequence, in the time that described real-time protection event is not mated with the previous application filters rule of described application filters rule, then judge whether described real-time protection event mates described application filters rule.
Wherein, described method also comprises:
If do not mated, described real-time protection event is sent to user's decision-making.
Wherein, described described real-time protection event sent to before user's decision-making and also comprised:
Determine the risk class of described real-time protection event;
Describedly send to user's decision-making also to comprise described real-time protection event:
The risk class of described real-time protection event is sent to described user, make described user carry out decision-making according to described risk class to described real-time protection event.
Wherein, describedly judge whether real-time protection event is mated described application filters rule and comprised:
In the time that the type of described control point is general policies control point, judge whether described real-time protection event mates the application filters rule of described general policies control point;
In the time that the type of described control point is self-shield control point, judge whether described real-time protection event mates the application filters rule of described self-shield control point.
Wherein, the application filters rule of described self-shield control point comprises: at least one in the black and white lists application filters rule of the first file signature application filters rule, process;
The application filters rule of described general policies control point comprises: at least one in the second file signature application filters rule, message digest algorithm MD5 application filters rule.
A device for real-time protection, described device comprises:
Acquisition module, for obtaining from server and real-time update application filters rule, described application filters rule comprises: the application filters rule of general policies control point and the application filters rule of self-shield control point;
Judge module, for judging whether real-time protection event mates the application filters rule that described acquisition module obtains;
Executive Module, if the result judging for described judge module is coupling, the application filters rule of obtaining according to described acquisition module is carried out corresponding operation to described real-time protection event;
Described device, also for judging the type of control point under described real-time protection event;
Describedly obtain and real-time update application filters rule from server, comprising:
In the time that the type of described control point is self-shield control point, from described server obtain and real-time update described in the application filters rule of self-shield control point;
In the time that the type of described control point is universal monitor vertex type, from described server obtain and real-time update described in the application filters rule of general policies control point.
Wherein, described acquisition module, also for having when described application filters rule when multiple, from described server obtain and real-time update described in the execution sequence of application filters rule;
Described judge module, the also execution sequence for obtaining according to described acquisition module, in the time that described real-time protection event is not mated with the previous application filters rule of described application filters rule, then judge whether described real-time protection event mates described application filters rule.
Wherein, described device also comprises:
Sending module, if the result judging for described judge module, for not mating, sends to user's decision-making by described real-time protection event.
Wherein, described device also comprises:
Determination module, before described real-time protection event is sent to user's decision-making, determines the risk class of described real-time protection event;
Described sending module, also for the risk class of described real-time protection event is sent to described user, makes described user carry out decision-making according to described risk class to described real-time protection event.
Wherein, described judge module comprises:
The first judging unit, in the time that the type of described control point is general policies control point, judges whether described real-time protection event mates the application filters rule of described general policies control point;
The second judging unit, in the time that the type of described control point is self-shield control point, judges whether described real-time protection event mates the application filters rule of described self-shield control point.
The application filters rule of the self-shield control point that wherein, described acquisition module obtains comprises: at least one in the black and white lists application filters rule of the first file signature application filters rule, process;
The application filters rule of the general policies control point that described acquisition module obtains comprises: at least one in the second file signature application filters rule, message digest algorithm MD5 application filters rule.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By obtaining from server and real-time update application filters rule, judge whether real-time protection event mates application filters rule, if coupling, according to application filters rule, real-time protection event is carried out to corresponding operation, do not need user intervention, improved the accuracy of protection and the efficiency of user's operation; Accordingly, if do not mate application filters rule, then issue user's decision-making, with respect to user, all monitor events are carried out to decision-making, be also conducive to improve the efficiency of user's operation.In addition, the risk class by assessment real-time protection event, with assisted user decision-making, can help user to differentiate the software of safe software and malice, makes correct selection.
Brief description of the drawings
Fig. 1 is the method flow diagram of the real-time protection that provides in the embodiment of the present invention 1;
Fig. 2 is another flow chart of method of the real-time protection that provides in the embodiment of the present invention 1;
Fig. 3 is the apparatus structure schematic diagram of the real-time protection that provides in the embodiment of the present invention 2;
Fig. 4 is another structural representation of device of the real-time protection that provides in the embodiment of the present invention 2.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Embodiment 1
Referring to Fig. 1, the present embodiment provides a kind of method of real-time protection, comprising:
101: obtain and real-time update application filters rule from server;
Wherein, application filters rule can be set for all control points are unified, also can set respectively for different control points, for example: the application filters rule of general policies control point and the application filters rule of self-shield control point.The application filters rule of self-shield control point can comprise: at least one in the black and white lists application filters rule of the first file signature application filters rule, process.The application filters rule of general policies control point can comprise the second file signature application filters rule, MD5(Message Digest Algorithm5, message digest algorithm 5) at least one in application filters rule.
Further, when application filters rule has when multiple, also need to obtain and the execution sequence of real-time update application filters rule from server.If be divided into the application filters rule of general policies control point and the application filters rule of self-shield control point, also need to obtain respectively its execution sequence.
102: judge whether real-time protection event mates application filters rule;
Concrete, when application filters rule has multiple and gets its execution sequence, according to execution sequence, in the time that real-time protection event is not mated with the previous application filters rule of application filters rule, then judge whether real-time protection event mates application filters rule.
103: if coupling is carried out corresponding operation according to application filters rule to real-time protection event.
Concrete, the clearance this real-time protection event specify according to the application filters rule of coupling or forbid the operation that this real-time protection event is carried out clearance or forbidden.
Further, if do not mated, real-time protection event is sent to user's decision-making.Before sending, can also determine the risk class of real-time protection event; Then real-time protection event and risk class thereof are sent to user, so that user carries out decision-making according to risk class to real-time protection event.
The method that the present embodiment provides, by obtaining from server and real-time update application filters rule, judge whether real-time protection event mates application filters rule, if coupling, according to application filters rule, real-time protection event is carried out to corresponding operation, do not need user intervention, improved the accuracy of protection and the efficiency of user's operation; Accordingly, if do not mate application filters rule, then issue user's decision-making, with respect to user, all monitor events are carried out to decision-making, be also conducive to improve the efficiency of user's operation.In addition, the risk class by assessment real-time protection event, with assisted user decision-making, can help user to differentiate the software of safe software and malice, makes correct selection.
Referring to Fig. 2, introduce the method for real-time protection below in conjunction with instantiation.
201: catch real-time protection event;
Wherein, real-time protection event can be the events such as amendment, deleted file or registration table, program upgrade.In the time that driving detects that a certain real-time protection event wish is carried out the operations such as amendment, deleted file or registration table, program upgrade, catch this real-time protection event by driving, the present embodiment does not limit concrete catching method.
202: the type that judges the affiliated control point of real-time protection event;
Concrete, according to the application layer message of control point association, judge the type of control point.If the application layer message of control point association is real-time protection software self, the type of this control point is self-shield control point; If the application layer message of control point association is other softwares except real-time protection software, the type of this control point is general policies control point.
If self-shield control point, execution step 203, if general policies control point, execution step 204.
In addition, this step is optional.This is because application filters rule can be set respectively for different control points, also can set for all control points are unified.In the time that the control point for different is set respectively, need to judge the type of control point, in the time of the unified setting in the control point for all, do not need to judge the type of control point.
203: obtain also application filters rule and the execution sequence thereof of real-time update self-shield control point from server, and filter;
Wherein, the present embodiment does not limit particular content, the number of the application filters rule of self-shield control point.Regular as example taking the black and white lists application filters of (first) file signature application filters rule and process below, the filtering rule of self-shield control point is described.
203a: real-time protection event is filtered according to (first) file signature application filters rule;
Wherein, file digital signature (abbreviation file signature) is protected file, prevents a kind of mode that file is tampered, and file digital signature comprises the information such as the publisher of file.
In the present embodiment, according to (first) file signature application filters rule, real-time protection event is filtered specifically and is comprised:
Obtain and real-time update (first) file signature application filters rule from server, every rule can filter the parameter configuration of verifying by appended document signature, then the first corresponding with parameter configuration file signature corresponding real-time protection event file signature is mated, if coupling, carry out the operation of letting pass accordingly or forbidding according to file signature application filters rule, then perform step 207, if do not mated, carry out next application filters rule.In the present embodiment, next application filters rule is the black and white lists application filters rule of step 203b process.
In above-mentioned filter process, the first file signature corresponding to parameter configuration can be blacklist or the white list of file signature, and blacklist is for forbidding the operation of real-time protection event, and white list is for the operation of the real-time protection event of letting pass.In addition, according to the difference of system monitoring point, black and white lists directly can be attached in parameter configuration, also the information such as version, path of black and white lists can be attached in parameter configuration.
For example, wish realizes the software with our company signature just can revise the associated documents resource of this software, can define a file signature application filters rule, additional parameter configuration is our company's signature, coupling is let pass, other signature directly forbids, by this application filters rule association to the control point of this software installation directory file modification.Again for example, define another file signature application filters rule, the additional parameter configuration of application filters rule be can be from server the software signature black and white lists of auto-update, this application filters rule is appended on the common monitoring points such as starting up's item, Image File Execution Options, system global hook.In the time monitoring these system events, will utilize the black and white lists defining in configuration to filter, legal software (software in white list) will be let pass automatically, illegal software (software in blacklist) will be prohibited, and the software in list can not be submitted to user and selected by user.
203b: real-time protection event is filtered according to the black and white lists application filters rule of process;
In the present embodiment, according to the black and white lists application filters rule of process, real-time protection event is filtered specifically and is comprised:
Obtain the also black and white lists application filters rule of real-time update process from server, every rule can additional process filter the parameter configuration of verifying, the process process corresponding with parameter configuration that real-time protection event is initiated mated, if coupling, carry out corresponding clearance or quiescing, then perform step 207, otherwise, if do not mated, transfer to user's decision-making.
In above-mentioned filter process, blacklist or white list that process corresponding to parameter configuration can process.According to the difference of system monitoring point, black and white lists directly can be attached in parameter configuration, also the information such as version, path of black and white lists can be attached in parameter configuration.In addition, because process title often changes and easily imitated, therefore white list is only set conventionally, some definite programs of letting pass.It can be used as supplementary that file signature filters and file MD5 filters, and some self-shield rules of General Definition, as clearance ROMPaq, amendment to the file under software installation directory etc.
204: obtain also application filters rule and the execution sequence thereof of real-time update general policies control point from server, and filter;
Wherein, the present embodiment does not limit particular content, the number of the application filters rule of self-shield control point.Regular as example taking the black and white lists application filters of (first) file signature application filters rule and process below, the filtering rule of self-shield control point is described.
Wherein, the present embodiment does not limit particular content, the number of the application filters rule of general policies control point.Regular as example taking (second) file signature application filters rule and MD5 application filters below, the application filters rule of general policies control point is described.Before carrying out the application filters rule of general policies control point, optional, also can first filter according to User Defined application filters rule, to improve filter efficiency.
204a: real-time protection event is filtered according to User Defined application filters rule;
Concrete, if the access of the former program that requires clearance always or forbid of real-time protection event matches user is directly let pass or forbids according to operation before always.The not operation in User Defined rule, continues to carry out next application filters rule.In the present embodiment, next application filters rule is (second) file signature application filters rule in step 204b.
For example, user's definition: the ROMPaq of certain software is carried out to " all operations of this process of later letting pass ", and the ROMPaq of follow-up this software can be let pass automatically.
204b: real-time protection event is filtered according to (second) file signature application filters rule;
Concrete, obtain and real-time update (second) file signature application filters rule from server, every rule can filter the parameter configuration of verifying by appended document signature, then the second corresponding with parameter configuration file signature corresponding real-time protection event file signature is mated, if coupling, carries out the operation of letting pass accordingly or forbidding according to file signature application filters rule, then perform step 207, if do not mated, carry out next application filters rule.In the present embodiment, next application filters rule is the MD5 application filters rule in step 204c.
Wherein,, repeat no more here referring to step 203a about the definition of file signature application filters rule.It should be noted that this step is identical with step 203a filter type, but the particular content of rule can be identical, also can be different, the first file signature and the second file signature and corresponding operation can be identical or different.
204c: real-time protection event is filtered according to MD5 application filters rule;
Concrete, obtain and real-time update MD5 application filters rule from server, every rule can add MD5 and filter the parameter configuration of verifying, then the MD5 corresponding real-time protection event MD5 corresponding with parameter configuration mated, if coupling, carries out the operation of letting pass accordingly or forbidding according to MD5 application filters rule, then perform step 207, if do not mated, carry out next application filters rule.
In above-mentioned filter process, MD5 corresponding to parameter configuration can be blacklist or the white list of MD5, and blacklist is for forbidding the operation of real-time protection event, and white list is for the operation of the real-time protection event of letting pass.In addition, according to the difference of system monitoring point, black and white lists directly can be attached in parameter configuration, also the information such as version, path of black and white lists can be attached in parameter configuration.
205: determine the risk class of real-time protection event, real-time protection event and risk class thereof are sent to user;
Concrete, the executable file of event is scanned, judge risk class, and risk class is appended in event context, as user's decision references.
In addition, this step is optional, also can only real-time protection event be sent to user.
206: user carries out decision-making according to risk class to real-time protection event;
Concrete, according to event context information, organize window to eject according to monitoring resource type, the details of event and the risk class of executable program in window, are comprised, determined let pass or forbid that this operates by user, if user has selected " all operations of this process of letting pass " or " forbidding all operations of this process " later later, be increased in User Defined application filters rule.
In addition, user also can be to the direct decision-making of real-time protection event, and the method is applicable to the user of familiar with computers safety.
207: drive according to the result of user's the result of decision or application filters rule, real-time protection event is carried out to the operation of letting pass or forbidding.
The method that the present embodiment provides, by obtaining from server and real-time update application filters rule, judge whether real-time protection event mates application filters rule, if coupling, according to application filters rule, real-time protection event is carried out to corresponding operation, do not need user intervention, improved the accuracy of protection and the efficiency of user's operation; Accordingly, if do not mate application filters rule, then issue user's decision-making, with respect to user, all monitor events are carried out to decision-making, be also conducive to improve the efficiency of user's operation.In addition, the risk class by assessment real-time protection event, with assisted user decision-making, can help user to differentiate the software of safe software and malice, makes correct selection.
Embodiment 2
Referring to Fig. 3, the present embodiment provides a kind of device of real-time protection, and this device comprises:
Acquisition module 301, for obtaining from server and real-time update application filters rule;
Judge module 302, for judging whether real-time protection event mates the application filters rule that acquisition module 301 obtains;
Executive Module 303, if the result judging for judge module 302 is coupling, the application filters rule of obtaining according to acquisition module 301 is carried out corresponding operation to real-time protection event.
Further, acquisition module 301, also for having when application filters rule when multiple, obtains and the execution sequence of real-time update application filters rule from server;
Accordingly, judge module 302, the also execution sequence for obtaining according to acquisition module 301, in the time that real-time protection event is not mated with the previous application filters rule of application filters rule, then judges whether real-time protection event mates application filters rule.
Further, referring to Fig. 4, this device also comprises:
Sending module 304, if the result judging for judge module 302, for not mating, sends to user's decision-making by real-time protection event.
Further, this device also comprises:
Determination module 305, before real-time protection event is sent to user's decision-making, determines the risk class of real-time protection event;
Sending module 304, also for the risk class of real-time protection event is sent to user, makes user carry out decision-making according to risk class to real-time protection event.
Wherein, the application filters rule that acquisition module 301 obtains comprises: the application filters rule of general policies control point and the application filters rule of self-shield control point;
Judge module 302 comprises:
Determining unit 302a, for the type of control point under definite real-time protection event;
The first judging unit 302b, in the time that the definite type of determining unit 302a is general policies control point, judges whether real-time protection event mates the application filters rule of general policies control point;
The second judging unit 302c, in the time that the definite type of determining unit 302a is self-shield control point, judges whether real-time protection event mates the application filters rule of self-shield control point.
The application filters rule of the self-shield control point that wherein, acquisition module 301 obtains comprises: at least one in the black and white lists application filters rule of the first file signature application filters rule, process;
The application filters rule of the general policies control point that acquisition module 301 obtains comprises: at least one in the second file signature application filters rule, message digest algorithm MD5 application filters rule.
The device that the present embodiment provides, belongs to same design with embodiment of the method, and its specific implementation process refers to embodiment of the method, repeats no more here.
The device that the present embodiment provides, by obtaining from server and real-time update application filters rule, judge whether real-time protection event mates application filters rule, if coupling, according to application filters rule, real-time protection event is carried out to corresponding operation, do not need user intervention, improved the accuracy of protection and the efficiency of user's operation; Accordingly, if do not mate application filters rule, then issue user's decision-making, with respect to user, all monitor events are carried out to decision-making, be also conducive to improve the efficiency of user's operation.In addition, the risk class by assessment real-time protection event, with assisted user decision-making, can help user to differentiate the software of safe software and malice, makes correct selection.
All or part of content in the technical scheme that above embodiment provides can realize by software programming, and its software program is stored in the storage medium can read, storage medium for example: hard disk, CD or floppy disk in computer.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (12)

1. a method for real-time protection, is characterized in that, described method comprises:
Obtain and real-time update application filters rule from server, described application filters rule comprises: the application filters rule of general policies control point and the application filters rule of self-shield control point;
Judge whether real-time protection event mates described application filters rule;
If coupling, carries out corresponding operation according to described application filters rule to described real-time protection event;
Described from server obtain and real-time update application filters rule before, described method also comprises:
Judge the type of the affiliated control point of described real-time protection event;
Describedly obtain and real-time update application filters rule from server, comprising:
In the time that the type of described control point is self-shield control point, from described server obtain and real-time update described in the application filters rule of self-shield control point;
In the time that the type of described control point is universal monitor vertex type, from described server obtain and real-time update described in the application filters rule of general policies control point.
2. the method for claim 1, is characterized in that, when described application filters rule has when multiple, described from server obtain and real-time update application filters rule after comprise:
From described server obtain and real-time update described in the execution sequence of application filters rule;
Describedly judge whether real-time protection event is mated described application filters rule and comprised:
According to described execution sequence, in the time that described real-time protection event is not mated with the previous application filters rule of described application filters rule, then judge whether described real-time protection event mates described application filters rule.
3. the method for claim 1, is characterized in that, described method also comprises:
If do not mated, described real-time protection event is sent to user's decision-making.
4. method as claimed in claim 3, is characterized in that, described described real-time protection event is sent to before user's decision-making and also comprised:
Determine the risk class of described real-time protection event;
Describedly send to user's decision-making also to comprise described real-time protection event:
The risk class of described real-time protection event is sent to described user, make described user carry out decision-making according to described risk class to described real-time protection event.
5. the method as described in claim as arbitrary in claim 1-4, is characterized in that, describedly judges whether real-time protection event is mated described application filters rule and comprised:
In the time that the type of described control point is general policies control point, judge whether described real-time protection event mates the application filters rule of described general policies control point;
In the time that the type of described control point is self-shield control point, judge whether described real-time protection event mates the application filters rule of described self-shield control point.
6. method as claimed in claim 5, is characterized in that, the application filters rule of described self-shield control point comprises: at least one in the black and white lists application filters rule of the first file signature application filters rule, process;
The application filters rule of described general policies control point comprises: at least one in the second file signature application filters rule, message digest algorithm MD5 application filters rule.
7. a device for real-time protection, is characterized in that, described device comprises:
Acquisition module, for obtaining from server and real-time update application filters rule, described application filters rule comprises: the application filters rule of general policies control point and the application filters rule of self-shield control point;
Judge module, for judging whether real-time protection event mates the application filters rule that described acquisition module obtains;
Executive Module, if the result judging for described judge module is coupling, the application filters rule of obtaining according to described acquisition module is carried out corresponding operation to described real-time protection event;
Described device, also for judging the type of control point under described real-time protection event;
Describedly obtain and real-time update application filters rule from server, comprising: in the time that the type of described control point is self-shield control point, from described server obtain and real-time update described in the application filters rule of self-shield control point;
In the time that the type of described control point is universal monitor vertex type, from described server obtain and real-time update described in the application filters rule of general policies control point.
8. device as claimed in claim 7, is characterized in that, described acquisition module, also for having when described application filters rule when multiple, from described server obtain and real-time update described in the execution sequence of application filters rule;
Described judge module, the also execution sequence for obtaining according to described acquisition module, in the time that described real-time protection event is not mated with the previous application filters rule of described application filters rule, then judge whether described real-time protection event mates described application filters rule.
9. device as claimed in claim 7, is characterized in that, described device also comprises:
Sending module, if the result judging for described judge module, for not mating, sends to user's decision-making by described real-time protection event.
10. device as claimed in claim 9, is characterized in that, described device also comprises:
Determination module, before described real-time protection event is sent to user's decision-making, determines the risk class of described real-time protection event;
Described sending module, also for the risk class of described real-time protection event is sent to described user, makes described user carry out decision-making according to described risk class to described real-time protection event.
Device as described in 11. claims as arbitrary in claim 7-10, is characterized in that, described judge module comprises:
The first judging unit, in the time that the type of described control point is general policies control point, judges whether described real-time protection event mates the application filters rule of described general policies control point;
The second judging unit, in the time that the type of described control point is self-shield control point, judges whether described real-time protection event mates the application filters rule of described self-shield control point.
12. devices as claimed in claim 11, is characterized in that,
The application filters rule of the self-shield control point that described acquisition module obtains comprises: at least one in the black and white lists application filters rule of the first file signature application filters rule, process;
The application filters rule of the general policies control point that described acquisition module obtains comprises: at least one in the second file signature application filters rule, message digest algorithm MD5 application filters rule.
CN201010186404.6A 2010-05-25 2010-05-25 Real-time protection method and apparatus thereof Active CN102263773B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201010186404.6A CN102263773B (en) 2010-05-25 2010-05-25 Real-time protection method and apparatus thereof
BR112012028244-1A BR112012028244B1 (en) 2010-05-25 2011-05-24 Method and equipment to implement real-time protection
CA2797880A CA2797880C (en) 2010-05-25 2011-05-24 Method and apparatus for implementing real-time protection
PCT/CN2011/074575 WO2011147306A1 (en) 2010-05-25 2011-05-24 Real-time protection method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010186404.6A CN102263773B (en) 2010-05-25 2010-05-25 Real-time protection method and apparatus thereof

Publications (2)

Publication Number Publication Date
CN102263773A CN102263773A (en) 2011-11-30
CN102263773B true CN102263773B (en) 2014-06-11

Family

ID=45003317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010186404.6A Active CN102263773B (en) 2010-05-25 2010-05-25 Real-time protection method and apparatus thereof

Country Status (4)

Country Link
CN (1) CN102263773B (en)
BR (1) BR112012028244B1 (en)
CA (1) CA2797880C (en)
WO (1) WO2011147306A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646173A (en) * 2012-02-29 2012-08-22 成都新云软件有限公司 Safety protection control method and system based on white and black lists
CN102880817A (en) * 2012-08-20 2013-01-16 福建升腾资讯有限公司 Running protection method for computer software product
CN103634272B (en) * 2012-08-21 2018-09-04 腾讯科技(深圳)有限公司 File scanning method, client device and server
CN108292342B (en) * 2016-01-25 2022-09-06 惠普发展公司,有限责任合伙企业 Notification of intrusions into firmware
CN107104944A (en) * 2017-03-10 2017-08-29 林榆坚 A kind of detection method and device of network intrusions
CN107360148A (en) * 2017-07-05 2017-11-17 深圳市卓讯信息技术有限公司 Core design method and its system based on real time monitoring network safety
CN109241734A (en) * 2018-08-10 2019-01-18 航天信息股份有限公司 A kind of securing software operational efficiency optimization method and system
CN111931066B (en) * 2020-09-11 2021-09-07 四川新网银行股份有限公司 Real-time recommendation system design method
CN112069505B (en) * 2020-09-15 2021-11-23 北京微步在线科技有限公司 Audit information processing method and electronic equipment
CN113282458A (en) * 2021-05-25 2021-08-20 挂号网(杭州)科技有限公司 Anti-flash-back method and device for application program, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340275A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Data card, data processing and transmitting method
CN101414996A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Firewall and method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100374972C (en) * 2005-08-03 2008-03-12 珠海金山软件股份有限公司 System and method for detecting and defending computer worm
CN101567888B (en) * 2008-12-29 2011-12-21 郭世泽 Safety protection method of network feedback host computer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414996A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Firewall and method thereof
CN101340275A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Data card, data processing and transmitting method

Also Published As

Publication number Publication date
WO2011147306A1 (en) 2011-12-01
CA2797880A1 (en) 2011-12-01
CN102263773A (en) 2011-11-30
BR112012028244A2 (en) 2016-08-02
BR112012028244B1 (en) 2022-03-29
CA2797880C (en) 2015-12-08

Similar Documents

Publication Publication Date Title
CN102263773B (en) Real-time protection method and apparatus thereof
US11611586B2 (en) Systems and methods for detecting a suspicious process in an operating system environment using a file honeypots
EP2667314B1 (en) System and method for detection and treatment of malware on data storage devices
EP2839406B1 (en) Detection and prevention of installation of malicious mobile applications
US8578345B1 (en) Malware detection efficacy by identifying installation and uninstallation scenarios
EP3493090B1 (en) Control method and unit of mobile storage devices, and storage medium
US20130067577A1 (en) Malware scanning
EP3113059B1 (en) System and method of preventing installation and execution of undesirable programs
US8667593B1 (en) Methods and apparatuses for protecting against malicious software
US8640233B2 (en) Environmental imaging
CN102508768B (en) Monitoring method and monitoring device
US9740865B2 (en) System and method for configuring antivirus scans
CN105335197A (en) Starting control method and device for application program in terminal
CN105550573A (en) Bundled software interception method and apparatus
EP3831031B1 (en) Listen mode for application operation whitelisting mechanisms
CN114417326A (en) Abnormality detection method, abnormality detection device, electronic apparatus, and storage medium
CN114722386A (en) U disk transmission monitoring method based on Fanotify mechanism
US9231969B1 (en) Determining file risk based on security reputation of associated objects
CN101114322A (en) Application program filtering method and apparatus for
EP2645293A2 (en) Method and apparatus for controlling operations performed by a mobile computing device
KR20110032449A (en) Apparatus and method for behavior-based detection
CN114969672A (en) Safety protection method, device and system for industrial control host and storage medium
CN117714098A (en) Method, device, router and storage medium for monitoring illegal files
CN116975857A (en) Lesu software detection method, system, equipment and storage medium
CN115168908A (en) File protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20151222

Address after: The South Road in Guangdong province Shenzhen city Fiyta building 518057 floor 5-10 Nanshan District high tech Zone

Patentee after: Shenzhen Tencent Computer System Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.