CN103049695B - A kind of method for supervising of computer virus and device - Google Patents

A kind of method for supervising of computer virus and device Download PDF

Info

Publication number
CN103049695B
CN103049695B CN201210533789.8A CN201210533789A CN103049695B CN 103049695 B CN103049695 B CN 103049695B CN 201210533789 A CN201210533789 A CN 201210533789A CN 103049695 B CN103049695 B CN 103049695B
Authority
CN
China
Prior art keywords
file
hazardous act
threat
strategy
scanning strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210533789.8A
Other languages
Chinese (zh)
Other versions
CN103049695A (en
Inventor
付旻
高祎玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qizhi Business Consulting Co ltd
Beijing Qihoo Technology Co Ltd
360 Digital Security Technology Group Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210533789.8A priority Critical patent/CN103049695B/en
Publication of CN103049695A publication Critical patent/CN103049695A/en
Application granted granted Critical
Publication of CN103049695B publication Critical patent/CN103049695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of method for supervising and device of computer virus, wherein said method comprises when monitoring the hazardous act based on file occurred in computer equipment, judges whether the file that described hazardous act is corresponding is threaten file; If so, obtain the characteristic information of described threat file and be sent to control process; Control process receives the characteristic information of described threat file, extracts the scanning strategy mated with the characteristic information of described threat file from the scanning strategy preset; Control process returns the scanning strategy of described coupling.The present invention can nip off virus infections source from source, the propagation of the type that prevents infections in time virus.

Description

A kind of method for supervising of computer virus and device
Technical field
The present invention relates to computer security technique field, be specifically related to a kind of method for supervising of computer virus and a kind of supervising device of computer virus.
Background technology
Along with the development of informationized society, the threat of computer virus is day by day serious, and anti-microbial task is also more arduous.
Computer virus refers to the destruction computer function that organizer inserts in computer program or destroys data, affect computing machine to use and can one group of computer instruction of self-replacation or program code, computer virus has destructiveness, the feature such as replicability and infectiousness.Computing machine is once catch virus, the file being usually expressed as computing machine is increased, delete, change title or attribute, move to other catalogue under, virus, to these operations of computer documents, may cause a series of problems such as normal program cannot be run, computer operating system collapse, computing machine is remotely controlled, user profile is stolen.
In order to ensure the safe operation of computing machine, the file to infecting virus in computing machine is needed to carry out checking and killing virus, to prevent and to remove the destruction of virus.Antivirus engine is exactly a set ofly judge that whether specific program behavior is the technology mechanism of Virus (comprising suspect program), generally speaking, antivirus engine is according to the current selected scan pattern of user, scanning is initiated to all or part program in subscriber equipment or file, go to contrast corresponding program or file by the feature in its virus base (characteristic set of virus), for the program or the file that meet virus characteristic, be judged to be virus.
Antivirus engine is detecting concrete infected file and is pointing out user when infecting and occurring, the scan pattern that user can provide according to antivirus engine manually selects scan pattern, file is scanned, easily the generation file of computer virus infection or the position of catalogue but user does not often know for sure, thus do not know to select which kind of scan pattern state that more according calculation machine is current, the propagation of the type virus that causes preventing infections in time.
Therefore, those skilled in the art's technical matters in the urgent need to address is: the monitoring mechanism providing a kind of computer virus, thus can the infection of supervisory control comuter virus to file in time, nip off computer virus infection source from source, stop the propagation of computer virus.
Summary of the invention
In view of the above problems, the present invention is proposed to provide a kind of overcoming the problems referred to above or a kind of method for supervising of computer virus solved the problem at least in part and the supervising device of corresponding a kind of computer virus.
According to one aspect of the present invention, provide a kind of method for supervising of computer virus, comprising:
When monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file;
If so, obtain the characteristic information of described threat file and be sent to control process;
Control process receives the characteristic information of described threat file, extracts the scanning strategy mated with the characteristic information of described threat file from the scanning strategy preset;
Control process returns the scanning strategy of described coupling.
Alternatively, described scanning strategy comprises scanning position, and described method also comprises:
When receiving the scanning strategy that user triggers, in described scanning position, perform corresponding scan operation.
Alternatively, described when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten the step of file to comprise:
The described hazardous act based on file of bottom layer driving interception;
Bottom layer driving obtains the progress information of described initiation hazardous act, and described progress information is sent to monitoring process;
Monitoring process obtains the file type of file corresponding to described hazardous act;
Monitoring process judges whether described file type is default file type; If so, then the progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If not, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Alternatively, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that described multiple threat file is corresponding is same progress information, vectoring computer equipment performs park scan strategy;
The process of described initiation hazardous act is stoped to continue to perform corresponding hazardous act;
Vectoring computer equipment performs scan full hard disk strategy.
Alternatively, described default scanning strategy comprises rapid scanning strategy, and described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that described multiple threat file is corresponding is different multiple progress informations, vectoring computer equipment performs rapid scanning strategy.
Alternatively, described default scanning strategy comprises external drive scanning strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the path threatening file;
If the path of described threat file is all external drive path, vectoring computer equipment performs external drive scanning strategy.
Alternatively, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
According to a further aspect in the invention, provide a kind of supervising device of computer virus, comprising:
Threatening file judge module, being suitable for when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file, if so, then calls and controls process triggers module;
Control process triggers module, be suitable for obtaining the characteristic information of described threat file and be sent to control process;
Be positioned at the scanning strategy extraction module of control process, be suitable for the characteristic information receiving described threat file, from the scanning strategy preset, extract the scanning strategy mated with the characteristic information of described threat file;
The scanning strategy being positioned at control process returns module, is suitable for the scanning strategy returning described coupling.
Alternatively, described scanning strategy comprises scanning position, and described device also comprises:
Execution module, is suitable for, when receiving the scanning strategy that user triggers, in described scanning position, performing corresponding scan operation.
Alternatively, described threat file judge module comprises:
Be positioned at the interception submodule of bottom layer driving, be suitable for tackling the described hazardous act based on file;
The progress information being positioned at bottom layer driving sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and described progress information is sent to monitoring process;
The file type being positioned at monitoring process obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Be positioned at the judgement submodule of monitoring process, be suitable for judging whether described file type is default file type; If so, the first matched sub-block being positioned at monitoring process is then called; If not, then the second matched sub-block being positioned at monitoring process is called;
Be positioned at the first matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then call the second matched sub-block being positioned at monitoring process;
Be positioned at the second matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Alternatively, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described in be positioned at control process scanning strategy extraction module comprise:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, and vectoring computer equipment performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for vectoring computer equipment and performs scan full hard disk strategy.
Alternatively, described default scanning strategy comprises rapid scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, and vectoring computer equipment performs rapid scanning strategy.
Alternatively, described default scanning strategy comprises external drive scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, and vectoring computer equipment performs external drive scanning strategy.
Alternatively, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
Can be monitored and catch the hazardous act of process to computing machine by operating system bottom layer driving according to the method for supervising of a kind of computer virus of the present invention and device, judge whether the file that described hazardous act is corresponding is threaten file, according to the progress information of described threat file or fileinfo for user guides execution scanning strategy, solve antivirus engine thus the problem of the propagation of user and the type virus that can not prevent infections in time to be pointed out during computer virus infection to achieve from source at file to nip off virus infections source, the beneficial effect of the propagation of the type that prevents infections in time virus.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows a kind of according to an embodiment of the invention flow chart of steps of computer virus method for supervising embodiment;
The multi engine that Fig. 2 shows a kind of according to an embodiment of the invention method for supervising embodiment of computer virus arranges schematic diagram;
The rapid scanning that Fig. 3 shows a kind of according to an embodiment of the invention method for supervising embodiment of computer virus reminds bullet window schematic diagram;
The external drive scanning strategy that Fig. 4 shows a kind of according to an embodiment of the invention method for supervising embodiment of computer virus reminds bullet window schematic diagram;
Fig. 5 shows a kind of according to an embodiment of the invention structured flowchart of supervising device embodiment of computer virus;
Fig. 6 shows a kind of according to an embodiment of the invention structured flowchart of supervisory system embodiment of computer virus.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
One of core idea of the embodiment of the present invention is, bottom layer driving is by the monitoring to file, catch the hazardous act of process to file in time, by judging whether the file that the hazardous act of described generation is corresponding is threaten file, and then carry out vectoring computer equipment by the progress information of hazardous act corresponding to described threat file and fileinfo and perform scanning strategy, thus the propagation of the type virus that prevents infections in time.
With reference to Fig. 1, show a kind of according to an embodiment of the invention flow chart of steps of method for supervising embodiment of computer virus, specifically can comprise the following steps:
Step 101: when monitoring the hazardous act based on file occurred in computer equipment, judges whether the file that described hazardous act is corresponding is threaten file; If so, then step 102 is performed;
In one preferred embodiment of the invention, described step 101 can comprise following sub-step:
Sub-step S11: the described hazardous act based on file of bottom layer driving interception;
In specific implementation, cpu instruction is divided into 4 level of privilege from RING0 to RING3, but Windows operating system only uses two rank RING0 wherein and RING3, RING3 and user model, RING0 and kernel mode.In fact, if the power function that the function that program will realize himself just must be provided by interface interchange operating system, generally pass through DLL(DynamicLinkLibrary in WINDOWS, dynamic link library) inner API(ApplicationProgrammingInterface, application programming interface) provide, therefore a process has what kind of behavior (operation), just general clear by checking which type of API it have invoked, such as a process wants reading and writing of files can call CreateFile (), OpenFile (), NtOpenFile (), the functions such as ZwOpenFile (), want accesses network just must use Socket function etc.
Therefore, as a kind of preferred exemplary of the present embodiment, system API (the API of mounting RING0 layer as far as possible can be mounted by disposing hook (HOOK) at operating system RING0 layer or RING3 layer, if the API of mounting RING3 layer will likely be bypassed), just can know the operation of a process, and then whether the operation judging described process is hazardous act, if so, just tackles described hazardous act.In specific implementation, the bottom layer driving (as filter Driver on FSD) that also can directly utilize operating system to carry monitor and tackle as described in hazardous act.
Sub-step S12: bottom layer driving obtains the progress information of described initiation hazardous act, and described progress information is sent to monitoring process;
Specifically, the progress information of described initiation hazardous act can comprise process path and process ID etc.; Process ID and the process path of described initiation hazardous act can be recorded by the filter Driver on FSD (bottom layer driving) in system.
In specific implementation, because RING0 layer or operating system bottom layer driving can only monitor and catch (interception) to all hazardous acts, whether hazardous act described in None-identified is harmful or there is virus, by just distinguishing that whether described hazardous act is harmful or there is virus with coordinating of RING3 layer (client layer) process.Monitoring process is the real-time monitoring process on backstage, be present in client layer, therefore, the progress informations such as described process path and process ID are first supplied to client layer by bottom layer driving, client layer is supplied to described progress information the monitoring process of client layer again, judges whether described hazardous act be whether the file that harmful act or described hazardous act are corresponding is threaten file by monitoring process.
Sub-step S13: monitoring process obtains the file type of file corresponding to described hazardous act;
In specific implementation, monitoring process can be undertaken by the file corresponding to described hazardous act scanning the file type obtaining described file, generally speaking, the file type of behavior of easily causing danger can comprise EXE class file, office document class file, web page files type etc.
Sub-step S14: monitoring process judges whether described file type is default file type; If so, then sub-step S15 is performed; If not, then sub-step S16 is performed;
In practice, the file type preset can be PE(PortableExecute, portable perform bulk) file type, PE file type is often referred to the program file in Windows operating system, and common PE file type comprises the file types such as EXE, DLL, OCX, SYS, COM.
It should be noted that, a kind of example of above-mentioned default file type to be PE file type be the only embodiment of the present invention, those skilled in the art adopt other types to be all fine, and this is not restricted in the present invention.
Sub-step S15: the progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then perform sub-step S16;
Specifically, threat file can for the file be infected by the virus, wherein said virus can comprise infection type virus, infection type virus self is added in other program or dynamic library file (one of DLL) in, thus the function that realization runs with infected Program Synchronization, and then infection computer is destroyed and own propagation.Infection type virus is attached on other host programs and runs, and in order to hide the killing of antivirus applet, after self all can split, is out of shape or encrypts by usual infection type virus, then self part or all is attached on host program.Once a virus document performs, the most program files in system are probably just all added viral code by it, and then propagate to other computer.And antivirus engine is exactly a set ofly judge that whether specific program behavior is the technology mechanism of Virus or suspect program.
In embodiments of the present invention, can arrange antivirus engine, multi engine as shown in Figure 2 arranges schematic diagram, and the first antivirus engine can be cloud killing engine, and/or QVM(QihooVirtualMachine, artificial intelligence engine) inspire engine.Wherein, cloud killing engine is the cloud security product of complete interconnected networking, not only faster than traditional antivirus engine more than 10 times of sweep velocity, and no longer needs wooden horse storehouse of frequently upgrading.As long as user surfs the Net, with regard to energy, real-time and cloud security data center slitless connection, utilizes the up-to-date wooden horse storehouse of server end to scan and killing oneself computer.
In specific implementation, first monitoring process judges the type of the file of the hazardous act of interception, if PE file type, then by the progress information of described initiation hazardous act and cloud killing engine, and/or QVM inspires the blacklist of the process of preserving in advance in engine and white list to mate, contain the malice PE file type confirmed in blacklist, in white list, contain the non-malicious PE file type confirmed.If the progress information of described initiation hazardous act is present in blacklist, then the process of described initiation hazardous act is viral progression, and the file that described hazardous act is corresponding is threat file.
Generally speaking, described hazardous act appears at the key position of system usually, such as registration table, system directory etc.Described hazardous act can be written document, creates file, and file is rewritten, and the behavior such as the operation of file (transferring the PE file on disk).
In fact, the process matched by the feature database (virus base) of the progress information of described initiation hazardous act and antivirus engine is exactly the process utilizing antivirus engine Scan for Viruses file and it is carried out to killing, if discovery hazardous act, antivirus engine can eject window to show scanning result to file and result, carrys out reminding user with this.
Wherein said scanning result can illustrate for threatening file name (occurring process title or the Virus Name of hazardous act), threat file path, Virus Type and virus to describe, as a kind of example, described Virus Type can comprise: system virus, worm-type virus, trojan horse, hacker's virus, script virus, destructive program virus etc.
Described result can process for the processing rule that antivirus engine is corresponding according to process corresponding to described hazardous act in rule base, such as, repair and threaten file (virus document), delete the operation etc. threatening file, forbid threatening file.
In addition, the source document of described threat file, when processing threat file, can backup in the isolated area of antivirus engine by antivirus engine.
It should be noted that, when threatening the path of file in description scanning result, for common document location, it can be an icon on each band of position, part icon need show according to operating system of user difference the icon style (icon under such as Win7 and the icon part under XP are different) conformed to it, or give user's more intuitive title, contribute to user so very clear to viral position, such as: the intuitive names of CD drive can be CD (X :); The intuitive names of the external drive such as USB flash disk, portable hard drive, SD card can be external drive (X :); The intuitive names of the fdisk in the machine can be local disk (X :); Path initial is that the intuitive names of " " can be shared etc. for network.
On the other hand, if be difficult to the blacklist by preserving, and/or white list determines whether this file is threaten file, then the progress information of described initiation hazardous act is inputted the second antivirus engine and detect.Or, if described default file type is not PE file type, then the progress information of described initiation hazardous act is inputted the second antivirus engine and detects.
Sub-step S16: the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
In specific implementation, arrange schematic diagram with reference to the multi engine shown in figure 2, described second antivirus engine can be BitDefender antivirus engine, and/or little red umbrella antivirus engine, and/or other existing already present antivirus engine etc.Each engine can be independently module or assembly, the mode can called according to serial in virus scan and monitor procedure, promotes sweep velocity and the efficiency of virus.
Be the file threatening file for the file that described hazardous act is corresponding, first according to the preset rules in the rule base of corresponding killing engine, described threat file processed, and perform step 102; Be not threaten the file of file for the file that described hazardous act is corresponding, monitoring process to be let pass this file by client layer notice bottom layer driving.
Step 102: obtain the characteristic information of described threat file and be sent to control process;
Specifically, the characteristic information of described threat file can comprise the information such as progress information, Virus Name threatening the path of file, title, dangerous play that threat file is corresponding.
In addition, described control process is arranged in client layer, is interface management process, for managing the interface information of antivirus applet.
Step 103: control process receives the characteristic information of described threat file, extracts the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset;
For the antivirus software of security firm, antivirus engine generally can comprise three kinds of scan patterns: scan full hard disk pattern, fast scan mode and assigned address scan pattern.Wherein, scan full hard disk pattern scans for program each in subscriber equipment and file; Fast scan mode scans for the software of some keys in system and important catalogue, such as internal memory, IE, plug-in unit, registration table, important catalogue as c: windows system32 etc.; Assigned address scan pattern is the directory tree demonstrating system file to user, comprises file catalogue in layer, successively selects for user.But, often need user manually to select scan pattern in existing antivirus engine, when user does not understand the computer equipment of oneself, often do not know which kind of scan pattern is only most suitable equipment.In embodiments of the present invention, receive the information such as the file path of monitoring process and Virus Name when interface management process after, corresponding scanning strategy is selected to guide user to scan according to the preset rules in rule base.
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, and described step 103 can comprise following sub-step:
Sub-step S21: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Sub-step S22: if the progress information of hazardous act corresponding to described multiple threat file is same progress information, vectoring computer equipment performs park scan strategy;
Sub-step S23: stop the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Specifically, if the process of the hazardous act that multiple threat file is corresponding is same process, when performing park scan, first lock the process of described initiation hazardous act, stop this process to continue to perform corresponding hazardous act, make it not perform and rewrite other file, then the process of locking is scanned, repair described threat file, the propagation of virus can be stoped so in time, nip off virus infections source from root.
Sub-step S24: vectoring computer equipment performs scan full hard disk strategy.
In specific implementation, owing to threatening file to have multiple, park scan differs to scan completely surely and threatens file, therefore uses scan full hard disk strategy thoroughly to scan threat file, can remove on disk all by the file of virus infections like this.
Such as: a compressed package, user is decompressed by a certain compressed software, if the multiple threat file of process continuous release that this corresponding to compressed package files title is independent, user is then guided to carry out park scan, lock the process that described release threatens, it can not be gone to perform other file of rewriting, then performs scan full hard disk.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, and described step 103 can comprise following sub-step:
Sub-step S31: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Sub-step S32: if the progress information of hazardous act corresponding to described multiple threat file is different multiple progress informations, vectoring computer equipment performs rapid scanning strategy.
Wherein, the sweep object of described rapid scanning can be current active process, startup item, third-party popular software, system core position as the root directory of each drive, system directory, English-language catalogue, the position that desktop etc. are important to systematic comparison.
Such as: find that three different process titles create different threat continuously, guide and carry out rapid scanning.
It should be noted that, the application principle of rapid scanning can be the user side for being in more than some levels, if when the user side more than this order of magnitude all scans the file with same feature (such as comprising filename, file size, filemodetime, file content descriptor, content information etc.), if this kind of file is safe, so other users are using the file with same feature to be also safe substantially, if carry out complete scan to this kind of characteristic, meeting consuming time is long.Therefore the characteristic information of described safe file can be generated, then packet (upgrade patch etc.) to be matched is generated based on described characteristic information, user is after the described packet of use, can the characteristic information of scanning document mate with the characteristic information in described packet, if matched, so namely, can skip these normal scan times long file, thus the object of saving sweep time can be reached.
In order to make those skilled in the art understand rapid scanning better, be illustrated below by an example:
If the position that described threat file exists is the position of three drives in computer, then illustrate that three drives all detect virus in computer, the rapid scanning ejected as shown in Figure 3 reminds bullet window to guide execution user to carry out rapid scanning.Play in window in the rapid scanning prompting shown in Fig. 3, playing the top state district of window is to the result of virus document according to the feature database of antivirus engine, text description part is the scanning result that virus treated illustrates description and virus, scanning strategy part gives the rapid scanning Generalization bounds performed according to the Virus Info vectoring computer equipment existed in file, and related description.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, and described step 103 can comprise following sub-step:
Sub-step S41: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the path threatening file;
Sub-step S42: if the path of described threat file is all external drive path, vectoring computer equipment performs external drive scanning strategy.
Specifically, if external drive finds one or more threat file, guide the scanning carrying out external drive, all external drive are scanned.
Such as: remind with reference to the external drive scanning strategy shown in Fig. 4 and play window schematic diagram, if find one or more virus continuously in external drive, can advise that user is scanned to get rid of potential viral hidden danger to external drive immediately.
Step 104: control process returns described scanning strategy.
Specifically, the scanning strategy that antivirus applet performs according to the Virus Info vectoring computer equipment of virus document is illustrated in the bullet window as Fig. 3 or Fig. 4.
As the expansion aspect of the embodiment of the present invention, for the user being unfamiliar with antivirus applet operation, antivirus applet also can not eject scanning strategy bullet window to user, but automatically utilizes scan mode to perform scanning strategy in the position of scanning.
Alternatively, described scanning strategy comprises scanning position, and described method also comprises:
Step 105: when receiving the scanning strategy that user triggers, perform corresponding scan operation in described scanning position.
Specifically, after the control knob of user's click scan strategy, trigger sweep strategy, antivirus applet reads the corresponding scanning position described in scanning strategy and carries out scan operation, in addition, if user wants to close play window, " closedown " instruction can be used to carry out indication mechanism and to close bullet window.
It should be noted that, for embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
With reference to Fig. 5, show a kind of according to an embodiment of the invention structured flowchart of supervising device embodiment of computer virus, can comprise:
Threatening file judge module 501, being suitable for when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file, if so, then calls and controls process triggers module;
In one preferred embodiment of the invention, described threat file judge module 501 can comprise following submodule:
Be positioned at the interception submodule of bottom layer driving, be suitable for tackling the described hazardous act based on file;
Wherein, the described hazardous act based on file can comprise behaviors such as creating file, file rewriting, running paper, written document.
The progress information being positioned at bottom layer driving sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and described progress information is sent to monitoring process;
The file type being positioned at monitoring process obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Be positioned at the judgement submodule of monitoring process, be suitable for judging whether described file type is default file type; If so, the first matched sub-block being positioned at monitoring process is then called; If not, then the second matched sub-block being positioned at monitoring process is called;
Be positioned at the first matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then call the second matched sub-block being positioned at monitoring process;
Be positioned at the second matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Control process triggers module 502, be suitable for obtaining the characteristic information of described threat file and trigging control process;
Be positioned at the scanning strategy extraction module 503 of control process, be suitable for the characteristic information receiving described threat file, from the scanning strategy preset, extract the scanning strategy mated with the characteristic information of described threat file;
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, guides and performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for guiding performing scan full hard disk strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, guides and performs rapid scanning strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, guides and performs external drive scanning strategy.
The scanning strategy being positioned at control process returns module 504, is suitable for the scanning strategy returning described coupling.
Alternatively, described scanning strategy comprises scanning position, and described device can also comprise:
Execution module 505, is suitable for, when receiving the scanning strategy that user triggers, in described scanning position, performing corresponding scan operation.
For the device embodiment shown in Fig. 5, due to itself and Fig. 1 embodiment of the method basic simlarity, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
With reference to Fig. 6, show a kind of according to an embodiment of the invention structured flowchart of supervisory system embodiment, can comprise:
Monitoring module 601, is suitable for the hazardous act based on file occurred in monitoring calculation machine equipment, when there is hazardous act, calls one or more antivirus engine 602;
In one preferred embodiment of the invention, described monitoring module 601 can comprise following submodule:
Interception submodule, is suitable for tackling the described hazardous act based on file;
Progress information sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and one or more antivirus engine.
Antivirus engine 602, is suitable for judging whether the file that described hazardous act is corresponding is threaten file; When the file that described hazardous act is corresponding is threat file, obtains the characteristic information of described threat file, and call control module 603;
In one preferred embodiment of the invention, described antivirus engine 602 can comprise:
File type obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Specifically, described antivirus engine is by scanning the file type of the file that hazardous act is corresponding described in file acquisition corresponding to described hazardous act.
Judge submodule, be suitable for judging whether described file type is default file type; If so, the first matched sub-block is then called; If not, then the second matched sub-block;
First matched sub-block, is suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then the second matched sub-block;
Second matched sub-block, is suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Control module 603, is suitable for the characteristic information receiving described threat file, extracts the scanning strategy mated with the characteristic information of described threat file and return from rule base 604.
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, and described control module 603 can comprise following submodule:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, guides and performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for guiding performing scan full hard disk strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, and described control module 603 can comprise following submodule:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, guides and performs rapid scanning strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, and described control module 603 can comprise following submodule:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, guides and performs external drive scanning strategy.
Rule base 604: be suitable for memory scanning strategy.
For the system embodiment shown in Fig. 6, due to itself and Fig. 1 embodiment of the method basic simlarity, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the equipment in embodiment and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that a kind of some or all functions to the some or all parts in the supervising device of computer virus that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.

Claims (12)

1. a method for supervising for computer virus, comprising:
When monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file;
If so, obtain the characteristic information of described threat file and be sent to control process;
Control process receives the characteristic information of described threat file, extracts the scanning strategy mated with the characteristic information of described threat file from the scanning strategy preset;
Control process returns the scanning strategy of described coupling;
Described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that multiple threat file is corresponding is same progress information, vectoring computer equipment performs park scan strategy;
The process initiating hazardous act is stoped to continue to perform corresponding hazardous act;
Vectoring computer equipment performs scan full hard disk strategy.
2. the method for claim 1, described scanning strategy comprises scanning position, and described method also comprises:
When receiving the scanning strategy that user triggers, perform corresponding scan operation at described scanning position.
3. the method for claim 1, described when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten the step of file to comprise:
The described hazardous act based on file of bottom layer driving interception;
Bottom layer driving obtains the progress information of described initiation hazardous act, and described progress information is sent to monitoring process;
Monitoring process obtains the file type of file corresponding to described hazardous act;
Monitoring process judges whether described file type is default file type; If so, then the progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If not, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
4. the method for claim 1, described default scanning strategy comprises rapid scanning strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that described multiple threat file is corresponding is different multiple progress informations, vectoring computer equipment performs rapid scanning strategy.
5. the method for claim 1, described default scanning strategy comprises external drive scanning strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the path threatening file;
If the path of described threat file is all external drive path, vectoring computer equipment performs external drive scanning strategy.
6. the method as described in claim as arbitrary in claim 1-5, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
7. a supervising device for computer virus, comprising:
Threatening file judge module, being suitable for when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file, if so, then calls and controls process triggers module;
Control process triggers module, be suitable for obtaining the characteristic information of described threat file and be sent to control process;
Be positioned at the scanning strategy extraction module of control process, be suitable for the characteristic information receiving described threat file, from the scanning strategy preset, extract the scanning strategy mated with the characteristic information of described threat file;
The scanning strategy being positioned at control process returns module, is suitable for the scanning strategy returning described coupling;
Described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described in be positioned at control process scanning strategy extraction module comprise:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to multiple threat file is same progress information, and vectoring computer equipment performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process initiating hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for vectoring computer equipment and performs scan full hard disk strategy.
8. device as claimed in claim 7, described scanning strategy comprises scanning position, and described device also comprises:
Execution module, is suitable for, when receiving the scanning strategy that user triggers, in described scanning position, performing corresponding scan operation.
9. device as claimed in claim 7, described threat file judge module comprises:
Be positioned at the interception submodule of bottom layer driving, be suitable for tackling the described hazardous act based on file;
The progress information being positioned at bottom layer driving sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and described progress information is sent to monitoring process;
The file type being positioned at monitoring process obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Be positioned at the judgement submodule of monitoring process, be suitable for judging whether described file type is default file type; If so, the first matched sub-block being positioned at monitoring process is then called; If not, then the second matched sub-block being positioned at monitoring process is called;
Be positioned at the first matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then call the second matched sub-block being positioned at monitoring process;
Be positioned at the second matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
10. device as claimed in claim 7, described default scanning strategy comprises rapid scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, and vectoring computer equipment performs rapid scanning strategy.
11. devices as claimed in claim 7, described default scanning strategy comprises external drive scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, and vectoring computer equipment performs external drive scanning strategy.
Device as described in 12. claims as arbitrary in claim 7-11, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
CN201210533789.8A 2012-12-11 2012-12-11 A kind of method for supervising of computer virus and device Active CN103049695B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210533789.8A CN103049695B (en) 2012-12-11 2012-12-11 A kind of method for supervising of computer virus and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210533789.8A CN103049695B (en) 2012-12-11 2012-12-11 A kind of method for supervising of computer virus and device

Publications (2)

Publication Number Publication Date
CN103049695A CN103049695A (en) 2013-04-17
CN103049695B true CN103049695B (en) 2015-12-09

Family

ID=48062328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210533789.8A Active CN103049695B (en) 2012-12-11 2012-12-11 A kind of method for supervising of computer virus and device

Country Status (1)

Country Link
CN (1) CN103049695B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700030B (en) * 2013-12-04 2017-12-01 腾讯科技(深圳)有限公司 A kind of viral data search method, device and server
CN104317955B (en) * 2014-11-13 2017-10-13 北京奇虎科技有限公司 File scanning method and device in a kind of mobile terminal memory space
CN105184162B (en) * 2015-08-18 2019-01-04 安一恒通(北京)科技有限公司 program monitoring method and device
CN105631329B (en) * 2015-12-21 2019-05-10 北京金山安全管理系统技术有限公司 Virut infection type virus immunity method and device thereof
CN106682505B (en) * 2016-05-04 2020-06-12 腾讯科技(深圳)有限公司 Virus detection method, terminal, server and system
CN108346047A (en) * 2018-02-12 2018-07-31 北京金山安全软件有限公司 Private key protection method and device for digital wallet, electronic equipment and storage medium
CN108320154A (en) * 2018-02-12 2018-07-24 北京金山安全软件有限公司 Digital wallet asset protection method and device, electronic equipment and storage medium
CN108920956B (en) * 2018-07-03 2021-05-14 亚信科技(成都)有限公司 Machine learning method and system based on context awareness
CN111399927B (en) * 2018-12-14 2024-06-18 北京奇虎科技有限公司 Method and device for sharing Class files by application and computing equipment
CN110096877B (en) * 2019-04-24 2021-06-04 厦门网宿有限公司 File processing method and device
CN110826069B (en) * 2019-11-05 2022-09-30 深信服科技股份有限公司 Virus processing method, device, equipment and storage medium
CN118432918A (en) * 2024-05-24 2024-08-02 广州博睿达科技有限公司 Network security intelligent vulnerability scanning method and system thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013461A (en) * 2007-02-14 2007-08-08 白杰 Method of computer protection based on program behavior analysis
CN101350052A (en) * 2007-10-15 2009-01-21 北京瑞星国际软件有限公司 Method and apparatus for discovering malignancy of computer program
US8001603B1 (en) * 2006-07-24 2011-08-16 Symantec Corporation Variable scan of files based on file context
CN102194072A (en) * 2011-06-03 2011-09-21 奇智软件(北京)有限公司 Method, device and system used for handling computer virus
CN102346827A (en) * 2011-09-19 2012-02-08 奇智软件(北京)有限公司 Method and device for handling computer viruses

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8001603B1 (en) * 2006-07-24 2011-08-16 Symantec Corporation Variable scan of files based on file context
CN101013461A (en) * 2007-02-14 2007-08-08 白杰 Method of computer protection based on program behavior analysis
CN101350052A (en) * 2007-10-15 2009-01-21 北京瑞星国际软件有限公司 Method and apparatus for discovering malignancy of computer program
CN102194072A (en) * 2011-06-03 2011-09-21 奇智软件(北京)有限公司 Method, device and system used for handling computer virus
CN102346827A (en) * 2011-09-19 2012-02-08 奇智软件(北京)有限公司 Method and device for handling computer viruses

Also Published As

Publication number Publication date
CN103049695A (en) 2013-04-17

Similar Documents

Publication Publication Date Title
CN103020524B (en) Computer virus supervisory system
CN103049695B (en) A kind of method for supervising of computer virus and device
Hossain et al. Combating dependence explosion in forensic analysis using alternative tag propagation semantics
US8661541B2 (en) Detecting user-mode rootkits
CN102902919B (en) A kind of identifying processing methods, devices and systems of suspicious operation
Wang et al. Detecting stealth software with strider ghostbuster
JP4629796B2 (en) File conversion in a limited process
US6907396B1 (en) Detecting computer viruses or malicious software by patching instructions into an emulator
AU2008203454B2 (en) Systems & Methods for Preventing Unauthorized Use of Digital Content
CN103001947B (en) A kind of program processing method and system
Mercaldo et al. Download malware? no, thanks: how formal methods can block update attacks
US9135443B2 (en) Identifying malicious threads
CN103077353B (en) The method and apparatus of Initiative Defense rogue program
US20220371621A1 (en) Stateful rule generation for behavior based threat detection
CN102999720B (en) Program identification method and system
CN101901321A (en) Method, device and system for defending malicious program for terminal
JP2003196112A (en) Virus check method for virus check software
CN102867147B (en) A kind of method and apparatus of file scan
CN103473501A (en) Malware tracking method based on cloud safety
CN112106047A (en) Anti-lux software system and method using countersinks at electronic devices
CN104811453A (en) Active defense method and device
CN102982281A (en) Program condition detecting method and system
CN102999721B (en) A kind of program processing method and system
CN102857519A (en) Active defensive system
CN102855436B (en) File unlocking method and file unlocking device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220329

Address after: 100016 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.