Summary of the invention
In view of the above problems, the present invention is proposed to provide a kind of overcoming the problems referred to above or a kind of method for supervising of computer virus solved the problem at least in part and the supervising device of corresponding a kind of computer virus.
According to one aspect of the present invention, provide a kind of method for supervising of computer virus, comprising:
When monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file;
If so, obtain the characteristic information of described threat file and be sent to control process;
Control process receives the characteristic information of described threat file, extracts the scanning strategy mated with the characteristic information of described threat file from the scanning strategy preset;
Control process returns the scanning strategy of described coupling.
Alternatively, described scanning strategy comprises scanning position, and described method also comprises:
When receiving the scanning strategy that user triggers, in described scanning position, perform corresponding scan operation.
Alternatively, described when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten the step of file to comprise:
The described hazardous act based on file of bottom layer driving interception;
Bottom layer driving obtains the progress information of described initiation hazardous act, and described progress information is sent to monitoring process;
Monitoring process obtains the file type of file corresponding to described hazardous act;
Monitoring process judges whether described file type is default file type; If so, then the progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If not, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine;
The progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Alternatively, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that described multiple threat file is corresponding is same progress information, vectoring computer equipment performs park scan strategy;
The process of described initiation hazardous act is stoped to continue to perform corresponding hazardous act;
Vectoring computer equipment performs scan full hard disk strategy.
Alternatively, described default scanning strategy comprises rapid scanning strategy, and described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
If the progress information of the hazardous act that described multiple threat file is corresponding is different multiple progress informations, vectoring computer equipment performs rapid scanning strategy.
Alternatively, described default scanning strategy comprises external drive scanning strategy, described control process receives the characteristic information of described threat file, and the step extracting the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset comprises:
Control process receives the characteristic information of described threat file, and the characteristic information of described threat file comprises the path threatening file;
If the path of described threat file is all external drive path, vectoring computer equipment performs external drive scanning strategy.
Alternatively, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
According to a further aspect in the invention, provide a kind of supervising device of computer virus, comprising:
Threatening file judge module, being suitable for when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file, if so, then calls and controls process triggers module;
Control process triggers module, be suitable for obtaining the characteristic information of described threat file and be sent to control process;
Be positioned at the scanning strategy extraction module of control process, be suitable for the characteristic information receiving described threat file, from the scanning strategy preset, extract the scanning strategy mated with the characteristic information of described threat file;
The scanning strategy being positioned at control process returns module, is suitable for the scanning strategy returning described coupling.
Alternatively, described scanning strategy comprises scanning position, and described device also comprises:
Execution module, is suitable for, when receiving the scanning strategy that user triggers, in described scanning position, performing corresponding scan operation.
Alternatively, described threat file judge module comprises:
Be positioned at the interception submodule of bottom layer driving, be suitable for tackling the described hazardous act based on file;
The progress information being positioned at bottom layer driving sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and described progress information is sent to monitoring process;
The file type being positioned at monitoring process obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Be positioned at the judgement submodule of monitoring process, be suitable for judging whether described file type is default file type; If so, the first matched sub-block being positioned at monitoring process is then called; If not, then the second matched sub-block being positioned at monitoring process is called;
Be positioned at the first matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then call the second matched sub-block being positioned at monitoring process;
Be positioned at the second matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Alternatively, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described in be positioned at control process scanning strategy extraction module comprise:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, and vectoring computer equipment performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for vectoring computer equipment and performs scan full hard disk strategy.
Alternatively, described default scanning strategy comprises rapid scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, and vectoring computer equipment performs rapid scanning strategy.
Alternatively, described default scanning strategy comprises external drive scanning strategy, described in be positioned at control process scanning strategy extraction module comprise:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, and vectoring computer equipment performs external drive scanning strategy.
Alternatively, the described hazardous act based on file comprises the behavior creating file, file rewriting, running paper, written document.
Can be monitored and catch the hazardous act of process to computing machine by operating system bottom layer driving according to the method for supervising of a kind of computer virus of the present invention and device, judge whether the file that described hazardous act is corresponding is threaten file, according to the progress information of described threat file or fileinfo for user guides execution scanning strategy, solve antivirus engine thus the problem of the propagation of user and the type virus that can not prevent infections in time to be pointed out during computer virus infection to achieve from source at file to nip off virus infections source, the beneficial effect of the propagation of the type that prevents infections in time virus.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
One of core idea of the embodiment of the present invention is, bottom layer driving is by the monitoring to file, catch the hazardous act of process to file in time, by judging whether the file that the hazardous act of described generation is corresponding is threaten file, and then carry out vectoring computer equipment by the progress information of hazardous act corresponding to described threat file and fileinfo and perform scanning strategy, thus the propagation of the type virus that prevents infections in time.
With reference to Fig. 1, show a kind of according to an embodiment of the invention flow chart of steps of method for supervising embodiment of computer virus, specifically can comprise the following steps:
Step 101: when monitoring the hazardous act based on file occurred in computer equipment, judges whether the file that described hazardous act is corresponding is threaten file; If so, then step 102 is performed;
In one preferred embodiment of the invention, described step 101 can comprise following sub-step:
Sub-step S11: the described hazardous act based on file of bottom layer driving interception;
In specific implementation, cpu instruction is divided into 4 level of privilege from RING0 to RING3, but Windows operating system only uses two rank RING0 wherein and RING3, RING3 and user model, RING0 and kernel mode.In fact, if the power function that the function that program will realize himself just must be provided by interface interchange operating system, generally pass through DLL(DynamicLinkLibrary in WINDOWS, dynamic link library) inner API(ApplicationProgrammingInterface, application programming interface) provide, therefore a process has what kind of behavior (operation), just general clear by checking which type of API it have invoked, such as a process wants reading and writing of files can call CreateFile (), OpenFile (), NtOpenFile (), the functions such as ZwOpenFile (), want accesses network just must use Socket function etc.
Therefore, as a kind of preferred exemplary of the present embodiment, system API (the API of mounting RING0 layer as far as possible can be mounted by disposing hook (HOOK) at operating system RING0 layer or RING3 layer, if the API of mounting RING3 layer will likely be bypassed), just can know the operation of a process, and then whether the operation judging described process is hazardous act, if so, just tackles described hazardous act.In specific implementation, the bottom layer driving (as filter Driver on FSD) that also can directly utilize operating system to carry monitor and tackle as described in hazardous act.
Sub-step S12: bottom layer driving obtains the progress information of described initiation hazardous act, and described progress information is sent to monitoring process;
Specifically, the progress information of described initiation hazardous act can comprise process path and process ID etc.; Process ID and the process path of described initiation hazardous act can be recorded by the filter Driver on FSD (bottom layer driving) in system.
In specific implementation, because RING0 layer or operating system bottom layer driving can only monitor and catch (interception) to all hazardous acts, whether hazardous act described in None-identified is harmful or there is virus, by just distinguishing that whether described hazardous act is harmful or there is virus with coordinating of RING3 layer (client layer) process.Monitoring process is the real-time monitoring process on backstage, be present in client layer, therefore, the progress informations such as described process path and process ID are first supplied to client layer by bottom layer driving, client layer is supplied to described progress information the monitoring process of client layer again, judges whether described hazardous act be whether the file that harmful act or described hazardous act are corresponding is threaten file by monitoring process.
Sub-step S13: monitoring process obtains the file type of file corresponding to described hazardous act;
In specific implementation, monitoring process can be undertaken by the file corresponding to described hazardous act scanning the file type obtaining described file, generally speaking, the file type of behavior of easily causing danger can comprise EXE class file, office document class file, web page files type etc.
Sub-step S14: monitoring process judges whether described file type is default file type; If so, then sub-step S15 is performed; If not, then sub-step S16 is performed;
In practice, the file type preset can be PE(PortableExecute, portable perform bulk) file type, PE file type is often referred to the program file in Windows operating system, and common PE file type comprises the file types such as EXE, DLL, OCX, SYS, COM.
It should be noted that, a kind of example of above-mentioned default file type to be PE file type be the only embodiment of the present invention, those skilled in the art adopt other types to be all fine, and this is not restricted in the present invention.
Sub-step S15: the progress information of described initiation hazardous act is mated with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then perform sub-step S16;
Specifically, threat file can for the file be infected by the virus, wherein said virus can comprise infection type virus, infection type virus self is added in other program or dynamic library file (one of DLL) in, thus the function that realization runs with infected Program Synchronization, and then infection computer is destroyed and own propagation.Infection type virus is attached on other host programs and runs, and in order to hide the killing of antivirus applet, after self all can split, is out of shape or encrypts by usual infection type virus, then self part or all is attached on host program.Once a virus document performs, the most program files in system are probably just all added viral code by it, and then propagate to other computer.And antivirus engine is exactly a set ofly judge that whether specific program behavior is the technology mechanism of Virus or suspect program.
In embodiments of the present invention, can arrange antivirus engine, multi engine as shown in Figure 2 arranges schematic diagram, and the first antivirus engine can be cloud killing engine, and/or QVM(QihooVirtualMachine, artificial intelligence engine) inspire engine.Wherein, cloud killing engine is the cloud security product of complete interconnected networking, not only faster than traditional antivirus engine more than 10 times of sweep velocity, and no longer needs wooden horse storehouse of frequently upgrading.As long as user surfs the Net, with regard to energy, real-time and cloud security data center slitless connection, utilizes the up-to-date wooden horse storehouse of server end to scan and killing oneself computer.
In specific implementation, first monitoring process judges the type of the file of the hazardous act of interception, if PE file type, then by the progress information of described initiation hazardous act and cloud killing engine, and/or QVM inspires the blacklist of the process of preserving in advance in engine and white list to mate, contain the malice PE file type confirmed in blacklist, in white list, contain the non-malicious PE file type confirmed.If the progress information of described initiation hazardous act is present in blacklist, then the process of described initiation hazardous act is viral progression, and the file that described hazardous act is corresponding is threat file.
Generally speaking, described hazardous act appears at the key position of system usually, such as registration table, system directory etc.Described hazardous act can be written document, creates file, and file is rewritten, and the behavior such as the operation of file (transferring the PE file on disk).
In fact, the process matched by the feature database (virus base) of the progress information of described initiation hazardous act and antivirus engine is exactly the process utilizing antivirus engine Scan for Viruses file and it is carried out to killing, if discovery hazardous act, antivirus engine can eject window to show scanning result to file and result, carrys out reminding user with this.
Wherein said scanning result can illustrate for threatening file name (occurring process title or the Virus Name of hazardous act), threat file path, Virus Type and virus to describe, as a kind of example, described Virus Type can comprise: system virus, worm-type virus, trojan horse, hacker's virus, script virus, destructive program virus etc.
Described result can process for the processing rule that antivirus engine is corresponding according to process corresponding to described hazardous act in rule base, such as, repair and threaten file (virus document), delete the operation etc. threatening file, forbid threatening file.
In addition, the source document of described threat file, when processing threat file, can backup in the isolated area of antivirus engine by antivirus engine.
It should be noted that, when threatening the path of file in description scanning result, for common document location, it can be an icon on each band of position, part icon need show according to operating system of user difference the icon style (icon under such as Win7 and the icon part under XP are different) conformed to it, or give user's more intuitive title, contribute to user so very clear to viral position, such as: the intuitive names of CD drive can be CD (X :); The intuitive names of the external drive such as USB flash disk, portable hard drive, SD card can be external drive (X :); The intuitive names of the fdisk in the machine can be local disk (X :); Path initial is that the intuitive names of " " can be shared etc. for network.
On the other hand, if be difficult to the blacklist by preserving, and/or white list determines whether this file is threaten file, then the progress information of described initiation hazardous act is inputted the second antivirus engine and detect.Or, if described default file type is not PE file type, then the progress information of described initiation hazardous act is inputted the second antivirus engine and detects.
Sub-step S16: the progress information of described initiation hazardous act is mated with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
In specific implementation, arrange schematic diagram with reference to the multi engine shown in figure 2, described second antivirus engine can be BitDefender antivirus engine, and/or little red umbrella antivirus engine, and/or other existing already present antivirus engine etc.Each engine can be independently module or assembly, the mode can called according to serial in virus scan and monitor procedure, promotes sweep velocity and the efficiency of virus.
Be the file threatening file for the file that described hazardous act is corresponding, first according to the preset rules in the rule base of corresponding killing engine, described threat file processed, and perform step 102; Be not threaten the file of file for the file that described hazardous act is corresponding, monitoring process to be let pass this file by client layer notice bottom layer driving.
Step 102: obtain the characteristic information of described threat file and be sent to control process;
Specifically, the characteristic information of described threat file can comprise the information such as progress information, Virus Name threatening the path of file, title, dangerous play that threat file is corresponding.
In addition, described control process is arranged in client layer, is interface management process, for managing the interface information of antivirus applet.
Step 103: control process receives the characteristic information of described threat file, extracts the virus scan strategy mated with the characteristic information of described threat file from the scanning strategy preset;
For the antivirus software of security firm, antivirus engine generally can comprise three kinds of scan patterns: scan full hard disk pattern, fast scan mode and assigned address scan pattern.Wherein, scan full hard disk pattern scans for program each in subscriber equipment and file; Fast scan mode scans for the software of some keys in system and important catalogue, such as internal memory, IE, plug-in unit, registration table, important catalogue as c: windows system32 etc.; Assigned address scan pattern is the directory tree demonstrating system file to user, comprises file catalogue in layer, successively selects for user.But, often need user manually to select scan pattern in existing antivirus engine, when user does not understand the computer equipment of oneself, often do not know which kind of scan pattern is only most suitable equipment.In embodiments of the present invention, receive the information such as the file path of monitoring process and Virus Name when interface management process after, corresponding scanning strategy is selected to guide user to scan according to the preset rules in rule base.
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, and described step 103 can comprise following sub-step:
Sub-step S21: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Sub-step S22: if the progress information of hazardous act corresponding to described multiple threat file is same progress information, vectoring computer equipment performs park scan strategy;
Sub-step S23: stop the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Specifically, if the process of the hazardous act that multiple threat file is corresponding is same process, when performing park scan, first lock the process of described initiation hazardous act, stop this process to continue to perform corresponding hazardous act, make it not perform and rewrite other file, then the process of locking is scanned, repair described threat file, the propagation of virus can be stoped so in time, nip off virus infections source from root.
Sub-step S24: vectoring computer equipment performs scan full hard disk strategy.
In specific implementation, owing to threatening file to have multiple, park scan differs to scan completely surely and threatens file, therefore uses scan full hard disk strategy thoroughly to scan threat file, can remove on disk all by the file of virus infections like this.
Such as: a compressed package, user is decompressed by a certain compressed software, if the multiple threat file of process continuous release that this corresponding to compressed package files title is independent, user is then guided to carry out park scan, lock the process that described release threatens, it can not be gone to perform other file of rewriting, then performs scan full hard disk.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, and described step 103 can comprise following sub-step:
Sub-step S31: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Sub-step S32: if the progress information of hazardous act corresponding to described multiple threat file is different multiple progress informations, vectoring computer equipment performs rapid scanning strategy.
Wherein, the sweep object of described rapid scanning can be current active process, startup item, third-party popular software, system core position as the root directory of each drive, system directory, English-language catalogue, the position that desktop etc. are important to systematic comparison.
Such as: find that three different process titles create different threat continuously, guide and carry out rapid scanning.
It should be noted that, the application principle of rapid scanning can be the user side for being in more than some levels, if when the user side more than this order of magnitude all scans the file with same feature (such as comprising filename, file size, filemodetime, file content descriptor, content information etc.), if this kind of file is safe, so other users are using the file with same feature to be also safe substantially, if carry out complete scan to this kind of characteristic, meeting consuming time is long.Therefore the characteristic information of described safe file can be generated, then packet (upgrade patch etc.) to be matched is generated based on described characteristic information, user is after the described packet of use, can the characteristic information of scanning document mate with the characteristic information in described packet, if matched, so namely, can skip these normal scan times long file, thus the object of saving sweep time can be reached.
In order to make those skilled in the art understand rapid scanning better, be illustrated below by an example:
If the position that described threat file exists is the position of three drives in computer, then illustrate that three drives all detect virus in computer, the rapid scanning ejected as shown in Figure 3 reminds bullet window to guide execution user to carry out rapid scanning.Play in window in the rapid scanning prompting shown in Fig. 3, playing the top state district of window is to the result of virus document according to the feature database of antivirus engine, text description part is the scanning result that virus treated illustrates description and virus, scanning strategy part gives the rapid scanning Generalization bounds performed according to the Virus Info vectoring computer equipment existed in file, and related description.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, and described step 103 can comprise following sub-step:
Sub-step S41: control process receives the characteristic information of described threat file, the characteristic information of described threat file comprises the path threatening file;
Sub-step S42: if the path of described threat file is all external drive path, vectoring computer equipment performs external drive scanning strategy.
Specifically, if external drive finds one or more threat file, guide the scanning carrying out external drive, all external drive are scanned.
Such as: remind with reference to the external drive scanning strategy shown in Fig. 4 and play window schematic diagram, if find one or more virus continuously in external drive, can advise that user is scanned to get rid of potential viral hidden danger to external drive immediately.
Step 104: control process returns described scanning strategy.
Specifically, the scanning strategy that antivirus applet performs according to the Virus Info vectoring computer equipment of virus document is illustrated in the bullet window as Fig. 3 or Fig. 4.
As the expansion aspect of the embodiment of the present invention, for the user being unfamiliar with antivirus applet operation, antivirus applet also can not eject scanning strategy bullet window to user, but automatically utilizes scan mode to perform scanning strategy in the position of scanning.
Alternatively, described scanning strategy comprises scanning position, and described method also comprises:
Step 105: when receiving the scanning strategy that user triggers, perform corresponding scan operation in described scanning position.
Specifically, after the control knob of user's click scan strategy, trigger sweep strategy, antivirus applet reads the corresponding scanning position described in scanning strategy and carries out scan operation, in addition, if user wants to close play window, " closedown " instruction can be used to carry out indication mechanism and to close bullet window.
It should be noted that, for embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the present invention is necessary.
With reference to Fig. 5, show a kind of according to an embodiment of the invention structured flowchart of supervising device embodiment of computer virus, can comprise:
Threatening file judge module 501, being suitable for when monitoring the hazardous act based on file occurred in computer equipment, judge whether the file that described hazardous act is corresponding is threaten file, if so, then calls and controls process triggers module;
In one preferred embodiment of the invention, described threat file judge module 501 can comprise following submodule:
Be positioned at the interception submodule of bottom layer driving, be suitable for tackling the described hazardous act based on file;
Wherein, the described hazardous act based on file can comprise behaviors such as creating file, file rewriting, running paper, written document.
The progress information being positioned at bottom layer driving sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and described progress information is sent to monitoring process;
The file type being positioned at monitoring process obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Be positioned at the judgement submodule of monitoring process, be suitable for judging whether described file type is default file type; If so, the first matched sub-block being positioned at monitoring process is then called; If not, then the second matched sub-block being positioned at monitoring process is called;
Be positioned at the first matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then call the second matched sub-block being positioned at monitoring process;
Be positioned at the second matched sub-block of monitoring process, be suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Control process triggers module 502, be suitable for obtaining the characteristic information of described threat file and trigging control process;
Be positioned at the scanning strategy extraction module 503 of control process, be suitable for the characteristic information receiving described threat file, from the scanning strategy preset, extract the scanning strategy mated with the characteristic information of described threat file;
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, guides and performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for guiding performing scan full hard disk strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, guides and performs rapid scanning strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, described in be positioned at control process scanning strategy extraction module 503 can comprise following submodule:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, guides and performs external drive scanning strategy.
The scanning strategy being positioned at control process returns module 504, is suitable for the scanning strategy returning described coupling.
Alternatively, described scanning strategy comprises scanning position, and described device can also comprise:
Execution module 505, is suitable for, when receiving the scanning strategy that user triggers, in described scanning position, performing corresponding scan operation.
For the device embodiment shown in Fig. 5, due to itself and Fig. 1 embodiment of the method basic simlarity, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
With reference to Fig. 6, show a kind of according to an embodiment of the invention structured flowchart of supervisory system embodiment, can comprise:
Monitoring module 601, is suitable for the hazardous act based on file occurred in monitoring calculation machine equipment, when there is hazardous act, calls one or more antivirus engine 602;
In one preferred embodiment of the invention, described monitoring module 601 can comprise following submodule:
Interception submodule, is suitable for tackling the described hazardous act based on file;
Progress information sends submodule, is suitable for the progress information obtaining described initiation hazardous act, and one or more antivirus engine.
Antivirus engine 602, is suitable for judging whether the file that described hazardous act is corresponding is threaten file; When the file that described hazardous act is corresponding is threat file, obtains the characteristic information of described threat file, and call control module 603;
In one preferred embodiment of the invention, described antivirus engine 602 can comprise:
File type obtains submodule, is suitable for the file type obtaining file corresponding to described hazardous act;
Specifically, described antivirus engine is by scanning the file type of the file that hazardous act is corresponding described in file acquisition corresponding to described hazardous act.
Judge submodule, be suitable for judging whether described file type is default file type; If so, the first matched sub-block is then called; If not, then the second matched sub-block;
First matched sub-block, is suitable for the progress information of described initiation hazardous act to mate with the feature database of the first antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, then the second matched sub-block;
Second matched sub-block, is suitable for the progress information of described initiation hazardous act to mate with the feature database of the second antivirus engine; If there is occurrence, be judged as that the file that described hazardous act is corresponding is threat file; If there is not occurrence, be judged as that the file that described hazardous act is corresponding is not threat file.
Control module 603, is suitable for the characteristic information receiving described threat file, extracts the scanning strategy mated with the characteristic information of described threat file and return from rule base 604.
In one preferred embodiment of the invention, described default scanning strategy comprises park scan strategy and scan full hard disk strategy, and described control module 603 can comprise following submodule:
First receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Park scan guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is same progress information, guides and performs park scan strategy;
Hazardous act stops submodule, is suitable for stoping the process of described initiation hazardous act to continue to perform corresponding hazardous act;
Scan full hard disk strategy guides implementation sub-module, is suitable for guiding performing scan full hard disk strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises rapid scanning strategy, and described control module 603 can comprise following submodule:
Second receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the progress information of hazardous act corresponding to threat file;
Rapid scanning strategy guides implementation sub-module, is suitable for when the progress information of hazardous act corresponding to described multiple threat file is different multiple progress information, guides and performs rapid scanning strategy.
In another preferred embodiment of the invention, described default scanning strategy comprises external drive scanning strategy, and described control module 603 can comprise following submodule:
3rd receives submodule, is suitable for the characteristic information receiving described threat file, and the characteristic information of described threat file comprises the path threatening file;
External drive scanning guides implementation sub-module, is suitable for when the path of described threat file is all external drive path, guides and performs external drive scanning strategy.
Rule base 604: be suitable for memory scanning strategy.
For the system embodiment shown in Fig. 6, due to itself and Fig. 1 embodiment of the method basic simlarity, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the equipment in embodiment and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that a kind of some or all functions to the some or all parts in the supervising device of computer virus that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.