CN103618626A - Method and system for generating safety analysis report on basis of logs - Google Patents

Method and system for generating safety analysis report on basis of logs Download PDF

Info

Publication number
CN103618626A
CN103618626A CN201310625938.8A CN201310625938A CN103618626A CN 103618626 A CN103618626 A CN 103618626A CN 201310625938 A CN201310625938 A CN 201310625938A CN 103618626 A CN103618626 A CN 103618626A
Authority
CN
China
Prior art keywords
client
file
files
analysis report
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310625938.8A
Other languages
Chinese (zh)
Inventor
魏志江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310625938.8A priority Critical patent/CN103618626A/en
Publication of CN103618626A publication Critical patent/CN103618626A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种基于日志的安全分析报告生成的方法和系统,该方法包括:实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告。本发明能够详细记录用户在一段时间内具体操作,可以针对具有安全风险的操作进行警告和提示,解决了针对用户忽略风险预警等危险操作,安全软件不进行记录并重复警告提示的问题;同时通过云安全技术,将安全分析报告记录传给云安全中心对其安全做出判定,可以快速地识别安全分析报告中的危险进程或文件,并对在一段时间内的操作给出相应的评价分值。

Figure 201310625938

The invention discloses a method and system for generating a log-based security analysis report. The method includes: monitoring and recording the running process of the client and the files involved in the running or downloading of the client in real time; After comparing the above process and files with the preset black and white list, record the same or similar content as the preset black and white list, and make statistics to generate a security analysis report. The invention can record the user's specific operations in a period of time in detail, and can warn and prompt for operations with safety risks, which solves the problem that the security software does not record and repeatedly warns and prompts for dangerous operations such as users ignoring risk warnings; at the same time, through Cloud security technology, which transmits the security analysis report records to the cloud security center to make a judgment on its security, can quickly identify dangerous processes or files in the security analysis report, and give corresponding evaluation scores for operations within a period of time .

Figure 201310625938

Description

一种基于日志的安全分析报告生成的方法和系统A method and system for generating a log-based security analysis report

技术领域technical field

本发明涉及系统安全分析报告领域,尤其涉及一种基于日志的安全分析报告生成的方法和系统。The invention relates to the field of system safety analysis reports, in particular to a log-based method and system for generating safety analysis reports.

背景技术Background technique

随着网络技术的快速发展,人们获取信息的方式已经发生改变:从传统的书籍、报纸、电视、广播等方式,继而变成通过互联网获取。尤其是互联网将购物、娱乐、新闻、广告、聊天等等丰富的综合性信息进行传输共享,即使人们足不出户,也可以了解世界。从而互联网已经成为人们学习、社交以及休闲娱乐而不可替代的重要方式。With the rapid development of network technology, the way people obtain information has changed: from traditional books, newspapers, TV, radio, etc., to Internet access. In particular, the Internet transmits and shares rich and comprehensive information such as shopping, entertainment, news, advertisements, chats, etc. Even if people stay at home, they can also learn about the world. As a result, the Internet has become an irreplaceable and important way for people to learn, socialize, and entertain.

目前,由于互联网提供了一个自由开放的平台,再加上与互联网相关的应用(软件)和网站的制作成本低廉,使得各种网站层出不穷,应用也越来越多,各种软件及网站鱼目混杂。特别是现在网络购物日趋流行,人们在互联网上越来越频繁地使用自己的各类银行卡信息,导致不法分子使用网购木马盗取用户的银行卡信息,而且网购木马的更新越来越快,钓鱼网站也越来越多,诈骗手段层出不穷。At present, because the Internet provides a free and open platform, coupled with the low production cost of Internet-related applications (software) and websites, various websites emerge in an endless stream, and more and more applications are available. mixed. Especially now that online shopping is becoming more and more popular, people use their various bank card information more and more frequently on the Internet, leading criminals to use online shopping Trojans to steal users' bank card information, and online shopping Trojans are updated faster and faster, phishing There are more and more websites, and scams are emerging in an endless stream.

现有技术中,用户极有可能因为操作不当,点击进入了可疑网站或下载了可疑文件,可能导致客户端被网购木马等恶意软件感染,造成用户的个人信息和财产安全受到威胁。此时,安全软件会提示用户风险警告,但如果用户忽略对安全软件给出的风险预警,安全软件便不再进行提示,不能对用户的安全操作进行记录,也不能根据用户安全操作的严重程度生成不同级别的安全行为警告。如此一来,用户长期忽略安全软件的风险预警,而且安全软件不针对用户的危险操作进行重复警告,那么,用户受到恶意软件感染的可能性会越来越高,进而造成个人信息的泄露和财产的损失。In the prior art, the user is very likely to click into a suspicious website or download a suspicious file due to improper operation, which may cause the client to be infected by malicious software such as an online shopping Trojan horse, causing the user's personal information and property safety to be threatened. At this time, the security software will prompt the user with a risk warning, but if the user ignores the risk warning given to the security software, the security software will no longer prompt, and cannot record the user's security operations, nor can it be based on the severity of the user's security operations. Generate different levels of security behavior warnings. As a result, users ignore the risk warnings of security software for a long time, and security software does not repeatedly warn users of dangerous operations, then the possibility of users being infected by malware will become higher and higher, resulting in the leakage of personal information and property. Loss.

发明内容Contents of the invention

为此,本发明提出了一种可以解决上述问题的至少一部分的新的基于日志的安全分析报告生成的方法和系统。To this end, the present invention proposes a new method and system for generating a log-based security analysis report that can solve at least part of the above-mentioned problems.

依据本发明的一个方面,提供了一种基于日志的安全分析报告生成的方法,一种基于日志的安全分析报告生成的方法,包括:According to one aspect of the present invention, a method for generating a log-based security analysis report is provided, a method for generating a log-based security analysis report, including:

实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;Real-time monitoring and recording of the process running on the client and the files involved in running or downloading on the client;

对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告。After comparing the processes and files recorded above with the preset black and white lists, record the same or similar content as those in the preset black and white lists, and make statistics to generate a security analysis report.

优选地,对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告,进一步为:Preferably, after comparing the above-mentioned recorded process and files with the preset black and white list, record the same or similar content as the preset black and white list, and perform statistics to generate a security analysis report, further as follows:

对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。After synchronizing the process and files recorded above to the cloud service, after comparing with the black and white list preset on the cloud service, record the same or similar content as the black and white list preset on the cloud service, and Perform statistics to generate a security analysis report to feed back to the client.

优选地,进行统计生成安全分析报告,进一步为:Preferably, performing statistics to generate a security analysis report, further:

进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;Make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules;

所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client.

优选地,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。Preferably, the process further includes: a service operation process, a start-up process, and a creation process.

优选地,在该客户端正在运行或下载所涉及的文件,进一步包括:Preferably, the client is running or downloading the files involved, further comprising:

在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; ,

所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .

优选地,其特征在于,预置的黑白名单,进一步包括:黑名单和白名单,其中,Preferably, it is characterized in that the preset black and white lists further include: a black list and a white list, wherein,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库级别、以及访问网址中含有的统一资源定位符的级别或特征信息。The blacklist and the whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library executed when the process is loaded, and the level of the uniform resource locator contained in the access URL or characteristic information.

依据本发明的一个方面,还提供了一种基于日志的安全分析报告生成的系统,包括:监测单元、分析单元和报告单元,其中,According to an aspect of the present invention, a system for generating a log-based security analysis report is also provided, including: a monitoring unit, an analysis unit, and a reporting unit, wherein,

所述监测单元,用于实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;The monitoring unit is used to monitor and record the running process of the client and the files involved in running or downloading on the client in real time;

所述分析单元,用于对所述监测单元记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容;The analysis unit is configured to compare the process and files recorded by the monitoring unit with the preset black and white lists, and record the same or similar content as those in the preset black and white lists;

所述报告单元,用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计生成安全分析报告。The reporting unit is configured to generate a security analysis report by making statistics on the same or similar content recorded by the analysis unit as in the preset black and white list.

优选地,所述分析单元,进一步用于对所述监测单元记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。Preferably, the analysis unit is further configured to synchronize the process and files recorded by the monitoring unit to the cloud service, and after comparing with the preset black and white lists on the cloud service, the records are compared with those on the cloud service. The same or similar content in the preset black and white lists, and make statistics to generate a security analysis report to feed back to the client.

优选地,所述报告单元,进一步用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;其中,Preferably, the reporting unit is further configured to perform statistics on the contents recorded by the analysis unit that are the same as or similar to those in the preset black and white lists, and perform safety ratings on the statistics according to the preset safety factor rules Then generate a security analysis report; among them,

所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client.

优选地,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。Preferably, the process further includes: a service operation process, a start-up process, and a creation process.

优选地,所述监测单元中在该客户端正在运行或下载所涉及的文件,进一步包括:Preferably, the client is running or downloading the files involved in the monitoring unit, further comprising:

在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; ,

所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .

优选地,其特征在于,预置的黑白名单,进一步包括:黑名单和白名单,其中,Preferably, it is characterized in that the preset black and white lists further include: a black list and a white list, wherein,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库级别、以及访问网址中含有的统一资源定位符的级别或特征信息。The blacklist and the whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library executed when the process is loaded, and the level of the uniform resource locator contained in the access URL or characteristic information.

与现有技术相比,本发明所述的一种基于日志的安全分析报告生成的方法和系统,达到了如下效果:Compared with the prior art, a method and system for generating a log-based security analysis report according to the present invention achieves the following effects:

1)本发明采用生成安全分析报告的方式,能够详细记录用户在一段时间内具体的安全操作,并可以针对用户具有安全风险的操作进行警告和提示,有效解决了针对用户忽略风险预警等危险操作,安全软件不进行记录并重复警告提示的问题;1) The present invention adopts the method of generating a security analysis report, which can record in detail the specific security operations of the user within a period of time, and can warn and prompt the user for operations with security risks, effectively solving the problem of dangerous operations such as users ignoring risk warnings , the security software does not record and repeats the warning prompts;

2)本发明通过云安全技术,将安全分析报告记录的内容传给相应的云安全中心的服务器,由云安全中心对其安全做出判定,可以快速地识别安全分析报告中的危险进程或文件,并根据识别结果,对用户在一段时间内的操作给出相应的评价分值,使用户可以直观清晰地了解到其是否具有危险操作以及危险操作的多少,从而增加了用户的使用体验。2) The present invention transmits the content recorded in the security analysis report to the server of the corresponding cloud security center through the cloud security technology, and the cloud security center makes a judgment on its security, which can quickly identify dangerous processes or files in the security analysis report , and according to the recognition results, give corresponding evaluation scores to the user's operations within a period of time, so that users can intuitively and clearly understand whether they have dangerous operations and how many dangerous operations, thereby increasing the user experience.

附图说明Description of drawings

此处所说明的附图用来提供对本发明的进一步理解,构成本发明的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention, and constitute a part of the present invention. The schematic embodiments of the present invention and their descriptions are used to explain the present invention, and do not constitute improper limitations to the present invention. In the attached picture:

图1是本发明实施例一所述基于日志的安全分析报告生成的方法的流程图。FIG. 1 is a flowchart of a method for generating a log-based security analysis report according to Embodiment 1 of the present invention.

图2是本发明实施例二所述基于日志的安全分析报告生成的方法的流程图。FIG. 2 is a flowchart of a method for generating a log-based security analysis report according to Embodiment 2 of the present invention.

图3是本发明实施例四所述基于日志的安全分析报告生成的系统的结构框图。FIG. 3 is a structural block diagram of a system for generating a log-based security analysis report according to Embodiment 4 of the present invention.

具体实施方式Detailed ways

下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整地传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure, and to fully convey the scope of the present disclosure to those skilled in the art.

本发明实施例可以应用于计算机系统/服务器,其可与众多其它通用或专用计算系统环境或配置一起操作。适于与计算机系统/服务器一起使用的众所周知的计算系统、环境和/或配置的例子包括但不限于:个人计算机系统、服务器计算机系统、瘦客户机、厚客户机、手持或膝上设备、基于微处理器的系统、机顶盒、可编程消费电子产品、网络个人电脑、小型计算机系统﹑大型计算机系统和包括上述系统的分布式云计算技术环境,等等。Embodiments of the invention may be applied to computer systems/servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and/or configurations suitable for use with computer systems/servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, Microprocessor systems, set-top boxes, programmable consumer electronics, network personal computers, small computer systems, large computer systems, and distributed cloud computing technology environments including the above systems, etc.

计算机系统/服务器可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。Computer systems/servers may be described in the general context of computer system-executable instructions, such as program modules, being executed by the computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc., that perform particular tasks or implement particular abstract data types. The computer system/server can be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computing system storage media including storage devices.

为了适应恶意程序的更新速度,快速地识别和查杀恶意程序,目前的安全防护软件越来越多地使用云安全技术对恶意程序进行拦截。所谓云安全技术,就是把客户端的可疑文件的特征传给云安全中心的服务器,由云安全中心对其安全做出判定,然后客户端安全软件根据云安全中心传回的信息对木马进行报告和处理。云结构就是一个大型的客户端/服务器(CS)架构。本发明的核心思想在于通过大量客户端计算机收集各种程序的行为(可以是单一行为,也可以是一组行为的组合),特别是可疑程序的行为,并将程序行为关联到该程序的特征,而在服务器端的数据库中则可以记录一个程序的特征及其对应的行为记录。这样,在服务器端,即可依据程序行为或程序特征或一组程序行为和程序特征,在数据库中进行归纳和分析,从而有助于对软件或程序进行黑白的分类判别。进一步的,还可以针对黑名单中的恶意软件制定相应的清除或恢复措施。程序行为,可以是例如驱动加载行为,文件生成行为,程序或代码的加载行为,添加系统启动项行为,或文件或程序的修改行为等,或者是一系列行为的组合。程序特征可以是经由MD5(Message-Digest Algorithm5,信息-摘要算法)运算得出的MD5验证码,或SHA1码,或CRC(Cyclic Redundancy Check,循环冗余校验)码等可唯一标识原程序的特征码,等等。In order to adapt to the update speed of malicious programs and quickly identify and kill malicious programs, current security protection software increasingly uses cloud security technology to intercept malicious programs. The so-called cloud security technology is to transmit the characteristics of suspicious files on the client side to the server of the cloud security center, and the cloud security center makes a judgment on its security, and then the client security software reports and monitors the Trojan horse according to the information sent back by the cloud security center. deal with. A cloud fabric is a large client/server (CS) architecture. The core idea of the present invention is to collect the behaviors of various programs (it can be a single behavior or a combination of a group of behaviors) through a large number of client computers, especially the behaviors of suspicious programs, and associate the behaviors of the programs with the characteristics of the programs , while the characteristics of a program and its corresponding behavior records can be recorded in the server-side database. In this way, on the server side, it can be summarized and analyzed in the database according to the program behavior or program characteristics or a group of program behavior and program characteristics, thus helping to classify software or programs into black and white. Further, it is also possible to formulate corresponding removal or recovery measures for the malicious software in the blacklist. The program behavior may be, for example, a driver loading behavior, a file generation behavior, a program or code loading behavior, a system startup item addition behavior, or a file or program modification behavior, etc., or a combination of a series of behaviors. The program feature can be MD5 verification code obtained through MD5 (Message-Digest Algorithm5, information-digest algorithm), or SHA1 code, or CRC (Cyclic Redundancy Check, cyclic redundancy check) code, etc., which can uniquely identify the original program Signature codes, etc.

以下结合附图对本发明作进一步详细说明,但不作为对本发明的限定。The present invention will be described in further detail below in conjunction with the accompanying drawings, but it is not intended to limit the present invention.

实施例一Embodiment one

如图1所示,是本发明实施例一所述的一种基于日志的安全分析报告生成的方法流程,包括:As shown in FIG. 1 , it is a method flow for generating a log-based security analysis report according to Embodiment 1 of the present invention, including:

步骤101,实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件。Step 101 , monitor and record the running process of the client and the files involved in running or downloading on the client in real time.

步骤102,对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告。Step 102, after comparing the above recorded process and files with the preset black and white lists, record the same or similar content as those in the preset black and white lists, and make statistics to generate a security analysis report.

其中,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。Wherein, the process further includes: a service operation process, a start-up process, and a creation process.

这里服务操作进程,可以是用户通过显示器界面看到的如:桌面信息、“我的文档”信息等内容所对应的后台的操作进程信息。Here, the service operation process may be background operation process information corresponding to content such as desktop information and “My Documents” information seen by the user through the display interface.

这里启动运行进程,可以是客户端启动后运行的程序或模块所执行的代码或脚本对应组合而成的进程信息。Here, the starting and running process may be the process information formed by the corresponding combination of codes or scripts executed by programs or modules executed after the client is started.

这里创建进程,可以是客户端启动后运行的第三方装置在本地客户端上所驻留创建的进程信息。The process created here may be process information created by a third-party device that runs after the client starts and resides on the local client.

其中,在该客户端正在运行或下载所涉及的文件,进一步包括:Where the client is running or downloading the files involved, further includes:

在该客户端的传输文件(IM(Instant Messenger,及时通讯)文件)、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client (IM (Instant Messenger, instant messaging) files), files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files on the client The file downloaded by the client through the download tool; among them,

所述文件的类型包括:可执行文件(PE,Portable Execute)和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件等文件(如:office文档),这里还可以包括其他类型文件,不作具体限定。The type of the file includes: an executable file (PE, Portable Execute) and a non-executable file, and the executable file includes: a file with a file extension of exe, a script file, a batch file and a link file; the non-executable file Executable files are files such as office files (such as: office files), and other types of files may also be included here, which is not specifically limited.

在步骤102中,对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告,进一步为:In step 102, after comparing the process and files of the above-mentioned records with the preset black and white lists, record the same or similar content as the preset black and white lists, and perform statistics to generate a security analysis report, further as follows:

对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并定期(时间期限可以由用户自己设置,如一周,一月或具体时间间隔进行操作,这里不作具体限定)进行统计生成安全分析报告反馈到所述客户端。After synchronizing the process and files recorded above to the cloud service, after comparing with the black and white list preset on the cloud service, record the same or similar content as the black and white list preset on the cloud service, and Regularly (the time period can be set by the user, such as one week, one month or a specific time interval, which is not specifically limited here), statistics are generated to generate a security analysis report and fed back to the client.

另外,在步骤102中预置的黑白名单,进一步包括:黑名单和白名单,其中,In addition, the blacklist and whitelist preset in step 102 further include: blacklist and whitelist, wherein,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库(DLL,Dynamic LinkLibrary)级别、以及访问网址中含有的统一资源定位符(Uniform ResourceLocator,URL)的级别或特征信息。The blacklist and whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library (DLL, Dynamic LinkLibrary) executed when the process is loaded, and the URL contained in the access URL. Uniform Resource Locator (Uniform ResourceLocator, URL) level or characteristic information.

除此之外,所述预置的黑白名单中还可以包括:可疑文件或进程、未知文件或进程。In addition, the preset black and white list may also include: suspicious files or processes, unknown files or processes.

其中,在该客户端外接存储设备上的文件,为通过外接存储设备中文件的位置信息,由操作系统的应用程序接口API函数发起与当前设备相连的查询操作从而获得。Wherein, the file on the external storage device of the client is obtained by initiating a query operation connected to the current device through the application program interface API function of the operating system through the location information of the file in the external storage device.

对于本发明技术方案来说,在实际情况中,一些恶意程序通过把CMD之类的文件,或者bat的文件,或者快捷方式打包在一个压缩包里,或者传递其中的单个文件(pif),图标,可能是应用程序的文件,或者VBS(一种脚本文件),建立一个文件夹并放置一个文件夹配置文件(desktop.ini),使用计划任务,或者,使用模拟鼠标点击等,甚至网购木马等会传送一个压缩包,后续解压缩到客户端桌面上,如果用户主动点击或者不小心双击启动,压缩包所包含的文件会产生危险。因此,本发明所述方案中需要设置如上述所述的黑白名单对客户端监测记录的内容进行筛查,从而发现如上这些危险,才能有效避免问题发生。For the technical solution of the present invention, in actual situations, some malicious programs package files such as CMD, or bat files, or shortcuts in a compressed package, or transfer a single file (pif), icon , may be an application file, or VBS (a script file), create a folder and place a folder configuration file (desktop.ini), use scheduled tasks, or use simulated mouse clicks, etc., or even online shopping Trojans, etc. A compressed package will be sent, and then decompressed to the client desktop. If the user actively clicks or accidentally double-clicks to start, the files contained in the compressed package will be dangerous. Therefore, in the solution of the present invention, it is necessary to set up a black and white list as described above to screen the contents of the monitoring records of the client, so as to discover the above dangers and effectively avoid problems.

当用户通过客户端进行网站访问、点击链接地址以及在网站上输入信息等互联网操作行为时,都会涉及所述客户端中相应的服务操作进程、用户启动的进程以及第三方程序创建的进程等。因此,通过对所述客户端进行的实时监测,就可以进一步对用户的操作进行监测,如果用户所进行的互联网操作行为具有风险,则可以快速准确地通过相应进程获知。When a user accesses a website, clicks on a link address, or enters information on a website through the client, the corresponding service operation process in the client, the process initiated by the user, and the process created by the third-party program will all be involved. Therefore, through the real-time monitoring of the client, the user's operation can be further monitored, and if the user's Internet operation behavior is risky, it can be quickly and accurately known through the corresponding process.

除了上述的记录外,在本实施例中,步骤101还包括对压缩包文件(包括该压缩包的下载来源、压缩包的存放路径、压缩包的特征标识等)进行实时监测并记录,这是因为:一些恶意软件将带有木马(或恶意程序)的CMD文件(命令提示符文件)、批处理文件、快捷方式文件、程序信息文件、图标、应用程序文件、VBS(一种脚本文件)或快捷方式进行压缩生成压缩文件(也可以生成文件夹并放置名为“desktop.ini”的文件夹配置文件),传送并后续解压缩到用户端上,从而感染用户端。In addition to the above-mentioned records, in this embodiment, step 101 also includes real-time monitoring and recording of the compressed package file (including the download source of the compressed package, the storage path of the compressed package, the characteristic identification of the compressed package, etc.), which is Because: some malicious software will have a Trojan horse (or malicious program) CMD file (command prompt file), batch file, shortcut file, program information file, icon, application file, VBS (a script file) or The shortcut is compressed to generate a compressed file (a folder can also be generated and a folder configuration file named "desktop.ini" is placed), which is transmitted and subsequently decompressed to the client, thereby infecting the client.

另外,步骤102中定期进行统计生成安全分析报告,进一步为:In addition, in step 102, statistics are regularly performed to generate a security analysis report, which is further:

定期进行统计,并按照预置的安全系数规则(后续实施例三会进一步说明安全系数规则)对所述统计进行安全评级后生成安全分析报告。Statistics are carried out regularly, and a safety analysis report is generated after performing safety ratings on the statistics according to the preset safety factor rules (the safety factor rules will be further explained in the following embodiment three).

其中,在实际应用中,进行记录的进程或文件存储于本地的数据库中(可以是内存数据库、缓存数据库等,在此不作出限定),对于文件:所述数据库中除了记录所有待保护设备(如:客户端)中下载的文件外,还记录某些特殊文件(如:压缩包中包含的文件),对压缩包解压时,记录该压缩包的解压路径和临时解压路径。对于进程:所述数据库中除了记录服务操作进程、用户启动的进程以及第三方程序创建的进程外,还记录有表示进程间父子关系的进程树。或是,直接将记录的进程或文件直接按照前述方式上传到云服务(云端)。Among them, in practical applications, the process or file for recording is stored in a local database (it can be an in-memory database, a cache database, etc., which is not limited here), and for files: in addition to recording all devices to be protected in the database ( For example: In addition to the files downloaded in the client), some special files (such as: files contained in the compressed package) are also recorded. When the compressed package is decompressed, the decompression path and temporary decompression path of the compressed package are recorded. For the process: in addition to recording the service operation process, the process started by the user and the process created by the third-party program, the database also records a process tree representing the parent-child relationship between the processes. Or, directly upload the recorded process or file to the cloud service (cloud) according to the aforementioned method.

实施例二Embodiment two

如图2所示,是本发明实施例二所述的一种基于日志的安全分析报告生成的方法流程,包括:As shown in FIG. 2 , it is a method flow for generating a log-based security analysis report according to Embodiment 2 of the present invention, including:

步骤201,实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件。Step 201 , monitor and record the running process of the client and the files involved in running or downloading on the client in real time.

步骤202,对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并定期进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告。Step 202: Synchronize the process and files recorded above to the cloud service, and after comparing with the black and white lists preset on the cloud service, record the same or similar content, and regularly make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules.

其中,步骤202中对比的具体方式可以是通过本地的安全规则进行黑白名单方式的检测对比:Wherein, the specific way of comparing in step 202 can be to carry out the detection and comparison of the black and white list mode through the local security rules:

如果用户A下载的未知程序特征与现有黑/白名单中的已知程序特征相同或相近似,则将该未知程序特征及其程序行为都列入黑/白名单。If the signature of the unknown program downloaded by user A is the same as or similar to the signature of the known program in the existing black/white list, the unknown program signature and its program behavior are both included in the black/white list.

当然,作为一种优选方式,所述预置的黑白名单也可以存储于云服务服务器中,将记录的所述客户端运行的进程以及在下载操作过程所涉及的文件发送至云服务进行对比,即云查询,如步骤202所述。Of course, as a preferred method, the preset black and white list can also be stored in the cloud service server, and the recorded process of the client running and the files involved in the download operation process are sent to the cloud service for comparison, That is, cloud query, as described in step 202.

预置的黑白名单,进一步包括:黑名单和白名单,其中,The preset black and white lists further include: black list and white list, among which,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库级别、以及访问网址中含有的统一资源定位符的级别或特征信息。还可以包括:可疑文件或进程、未知文件或进程。The blacklist and the whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library executed when the process is loaded, and the level of the uniform resource locator contained in the access URL or characteristic information. Can also include: Suspicious files or processes, Unknown files or processes.

需要说明的是,在进行与服务(也可称为云查询)时,需要根据相应的云规则进行操作(具体可为查询),所述云规则针对所述文件和进程,包括:文件名称、文件大小、文件特征信息、文件图标信息、产品名称、内部名称、原始文件名、进程命令行、进程路径以及父进程路径等与预置的内容相对比进行查找。当然,还可以采用其他方式对其他的进程或文件进行对比,并不构成对本申请的限定。It should be noted that when performing a service (also called a cloud query), it is necessary to perform an operation (specifically, a query) according to the corresponding cloud rules. The cloud rules are aimed at the files and processes, including: file names, File size, file feature information, file icon information, product name, internal name, original file name, process command line, process path, parent process path, etc. are compared with the preset content to search. Of course, other processes or files can also be compared in other ways, which does not constitute a limitation to the present application.

例如:当某进程执行危险操作时,将记录的该进程对应的DLL(DynamicLink Library,动态链接库)文件通过安全引擎和/或云安全引擎进行检测。检测的操作具体包括可有:For example: when a process performs a dangerous operation, the DLL (DynamicLink Library, dynamic link library) file corresponding to the recorded process will be detected by the security engine and/or the cloud security engine. The detection operations specifically include:

1、检测是否写入注册表进行自动加载以及修改注册表,危险进程通过改变注册表进一步造成注册表的损坏,因此,在本实施例中,对所有的可能自动启动的DLL文件进行监控,并且对特定注册表进行监控,由此实现对注册表的保护;1, detect whether to write into the registry and carry out automatic loading and modify the registry, the dangerous process further causes the damage of the registry by changing the registry, therefore, in the present embodiment, all DLL files that may start automatically are monitored, and To monitor a specific registry, thereby realizing the protection of the registry;

2、检测是否修改系统文件以及修改指定的应用文件,保证待保护的设备的操作系统相关的文件不被篡改,以及一些装载量比较大的应用文件不被篡改;2. Detect whether to modify the system files and modify the specified application files to ensure that the operating system-related files of the device to be protected are not tampered with, and some application files with relatively large loads are not tampered with;

3、检测是否执行进程注入,所述进程注入,是指危险进程在另一个进程中插入并执行特定代码,通过将进程注入操作列为危险操作,对安全进程进行保护;3. Detect whether process injection is performed. Said process injection means that a dangerous process inserts and executes specific code in another process, and protects the safe process by listing the process injection operation as a dangerous operation;

4、检测是否结束进程,危险进程通常会结束即时通讯进程,通过重新登录来截取用户信息,因此通过将该操作列为危险操作,防止危险进程获取用户信息;4. Check whether the process is terminated. Dangerous processes usually end the instant messaging process and intercept user information by re-login. Therefore, by listing this operation as a dangerous operation, the dangerous process is prevented from obtaining user information;

5、检测是否修改浏览器中网页内容,危险进程通过修改网页将网页中链接指向钓鱼网站,或者将病毒文件加载至浏览器中,通过将该操作列为危险操作,对浏览器进行保护;以及记录键盘操作。5. Detect whether to modify the content of the webpage in the browser. The dangerous process will point the link in the webpage to the phishing website by modifying the webpage, or load the virus file into the browser, and protect the browser by listing this operation as a dangerous operation; and Record keystrokes.

其中,检测是否修改系统文件以及修改指定的应用文件,主要是通过检测文件的特征级别进行判断。这里的特征级别具体是按照:文件的MD5(Message Digest Algorithm5,消息摘要算法第五版)和qvm(Qihoo SupportVector Machine,奇虎支持向量机)特征级别来划分。Among them, the detection of whether to modify the system file and the modification of the specified application file is mainly judged by detecting the characteristic level of the file. The feature levels here are specifically divided according to: MD5 (Message Digest Algorithm5, the fifth edition of the message digest algorithm) and qvm (Qihoo Support Vector Machine, Qihoo Support Vector Machine) feature levels of the file.

所述进程的启动方式路径信息,具体通过所述进程的调用关系获取,即通过对所述进程间的父子关系进行记录,形成进程树(所述进程树中记录各个进程的信息),从而获取不同进程的启动方式路径信息。例如:通过进程的创建时间、进程名称、进程的家族关系信息等进程加载级别,确定该进程的启动方式路径信息。The starting mode path information of the process is specifically obtained through the call relationship of the process, that is, by recording the parent-child relationship between the processes to form a process tree (the information of each process is recorded in the process tree), thereby obtaining The path information of the startup method of different processes. For example, the startup mode path information of the process is determined through the process loading level such as the creation time of the process, the process name, and the process family relationship information.

进一步地在步骤202中,记录与该云服务上预置的黑白名单中相同或相近似的内容,具体为,记录与该云服务上预置的黑白名单中相同的网页特征、相近似的网页特征、相同的文件、相近似的文件或文件特征、以及检测结果为未知的文件。Further in step 202, record the same or similar content as in the blacklist and blacklist preset on the cloud service, specifically, record the same webpage features and similar webpages as those in the blacklist and whitelist preset on the cloud service signatures, identical files, similar files or file characteristics, and files whose detection results are unknown.

同时,步骤202中,所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。通过所述安全系数规则进行安全评级后,将以数值和/或百分比的形式输出,其输出可以采用在客户端界面进行提示、显示和/或弹出对话框的方式。At the same time, in step 202, the safety factor rule is to set the corresponding level reference score and the corresponding operation reference score according to the monitoring and recording of the client running process and the files involved in the client running or downloading . After the safety rating is performed through the safety factor rules, it will be output in the form of numerical value and/or percentage, and the output can be in the form of prompting, displaying and/or popping up a dialog box on the client interface.

实施例三Embodiment Three

下面对所述基于日志的安全分析报告生成的方法的具体应用进行详细说明:The specific application of the method for generating the log-based security analysis report is described in detail below:

设定:用户A通过访问网址http://xxx(可疑网站)、http://yyy(安全网站)以及http://zzz(安全网站)分别下载文件a(恶意文件)、b(安全文件)及c(未知文件),需要说明的是,用户A并不知道上述网站和文件的安全性。Setting: User A downloads file a (malicious file) and file b (safe file) by visiting URLs http://xxx (suspicious website), http://yyy (safe website) and http://zzz (safe website) respectively. ) and c (unknown file), it should be noted that user A does not know the security of the above-mentioned website and file.

首先,实时监测并记录用户A的客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;First, real-time monitoring and recording of the running process of user A's client and the files involved in running or downloading on the client;

之后,对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并定期进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告。Afterwards, the above-mentioned recorded process and files are synchronized to the cloud service, and after comparing with the preset black and white list on the cloud service, record the same or similar content as the preset black and white list on the cloud service , and make statistics on a regular basis, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules.

具体为:Specifically:

当用户A通过客户端访问网址http://xxx去下载文件a时,实时监测并记录用户A的客户端运行的浏览器进程,用户A进行访问时,触发相应的浏览器进程,将网址http://xxx进行记录。When user A visits the URL http://xxx to download file a through the client, the browser process running on user A's client is monitored and recorded in real time. When user A visits, the corresponding browser process is triggered, and the URL http://xxx is downloaded. ://xxx for recording.

然后,对记录的用户A的客户端中的浏览器进程与预置的黑白名单进行对比。当识别出记录的内容为用户A的客户端的浏览器进程时,将该浏览器进程(即网址http://xxx)对应的该进程的启动方式路径信息、该进程加载时对应的文件级别、该进程加载的链接代码级别或该链接代码对应的网页特征发送给云服务服务器,与该云服务服务器存储的危险进程进行查询对比,并返回查询结果:网址http://xxx被检测出为可疑网站,则生成安全分析报告,将该网址写入该安全分析报告。并在浏览器界面上生成相应的提示窗口,提示用户A该网站为可疑网站,继续访问有风险。Then, compare the recorded browser process in the client of user A with the preset black and white lists. When it is identified that the recorded content is the browser process of user A's client, the browser process (ie URL http://xxx) corresponds to the starting method path information of the process, the corresponding file level when the process is loaded, The link code level loaded by the process or the web page feature corresponding to the link code is sent to the cloud service server, compared with the dangerous process stored in the cloud service server, and the query result is returned: URL http://xxx is detected as suspicious website, a security analysis report is generated, and the URL is written into the security analysis report. And a corresponding prompt window is generated on the browser interface, prompting user A that the website is a suspicious website, and it is risky to continue to visit.

此时,通过监测用户A客户端的浏览器进程中的下载进程,发现用户A选择继续访问网址http://xxx,并下载了文件a,则进行记录,将记录的文件a对应的特征级别(MD5值)发送至云服务服务器与危险文件的MD5值进行对比后,发现文件a的所述后缀名为“Trojan”且文件a的程序代码符合恶意软件代码,即该文件a为恶意文件,直接通过安全软件进行删除,并将文件a写入安全分析报告。在浏览器界面上生成相应的提示窗口,提示用户A该文件a为恶意文件。At this time, by monitoring the download process in the browser process of the user A client, it is found that user A chooses to continue to visit the website http://xxx, and downloads file a, then records it, and records the feature level corresponding to file a ( MD5 value) sent to the cloud service server and compared with the MD5 value of the dangerous file, it is found that the suffix of file a is "Trojan" and the program code of file a is consistent with malware code, that is, file a is a malicious file. Delete through security software, and write file a into the security analysis report. A corresponding prompt window is generated on the browser interface to prompt user A that the file a is a malicious file.

同样,实时监测并记录用户A的客户端运行的浏览器进程,用户A对网址http://yyy进行访问时,触发相应的浏览器进程,将网址http://yyy进行记录。再将用户A的客户端中的浏览器进程的进程启动方式、该进程加载时对应的文件级别、该进程加载的链接代码级别或该链接代码对应的网页特征与预置的危险进程进行查询对比,查询出该网址http://yyy为安全网站,则用户A可以自由访问该网址。对这样的安全操作进行记录但并不写入安全分析报告。Similarly, the browser process run by the client of user A is monitored and recorded in real time. When user A visits the website http://yyy, a corresponding browser process is triggered to record the website http://yyy. Then query and compare the process startup mode of the browser process in user A's client, the corresponding file level when the process is loaded, the link code level loaded by the process, or the web page features corresponding to the link code with the preset dangerous process , it is found that the URL http://yyy is a secure website, and user A can freely access the URL. Such security operations are recorded but not written into the security analysis report.

此时,通过监测用户A客户端的浏览器进程中的下载进程,发现用户A在网址http://yyy中下载了文件b,进行记录,将记录的文件b发送至云服务服务器与危险文件进行对比后,发现文件b为安全文件,从而只对该文件b进行记录,但不写入安全分析报告。At this time, by monitoring the download process in the browser process of user A's client, it is found that user A has downloaded file b from the website http://yyy, records it, and sends the recorded file b to the cloud service server to compare with the dangerous file. After comparison, it is found that file b is a safe file, so only the file b is recorded, but the safety analysis report is not written.

实时监测并记录用户A的客户端运行的浏览器进程,用户A对网址http://zzz进行访问时,触发相应的浏览器进程,将网址http://zzz进行记录。再将用户A的客户端中的浏览器进程的进程启动方式、该进程加载时对应的文件级别、该进程加载的链接代码级别或该链接代码对应的网页特征与预置的危险进程进行查询对比,查询出该网址http://zzz为安全网站,则用户A可以自由访问该网址。对这样的安全操作进行记录但并不写入安全分析报告。Monitor and record the browser process running on user A's client in real time. When user A visits the website http://zzz, the corresponding browser process is triggered and the website http://zzz is recorded. Then query and compare the process startup mode of the browser process in user A's client, the corresponding file level when the process is loaded, the link code level loaded by the process, or the web page features corresponding to the link code with the preset dangerous process , it is found that the website http://zzz is a secure website, and user A can freely access the website. Such security operations are recorded but not written into the security analysis report.

此时,通过监测用户A客户端的浏览器进程中的下载进程,发现用户A在网址http://zzz中下载了文件c,进行记录,将记录的文件c发送至云服务服务器与危险文件进行对比后,文件c为未知文件,难以判断该文件c的安全性,从而将该文件c写入安全分析报告。并在浏览器界面上生成相应的提示窗口,提醒用户A所述文件c的安全性未知。同时,在后台对文件c所在子目录进行扫描,检测到危险文件通过安全软件进行删除。At this time, by monitoring the download process in the browser process of user A's client, it is found that user A has downloaded file c from the website http://zzz, records it, and sends the recorded file c to the cloud service server to compare with the dangerous file. After the comparison, the file c is an unknown file, and it is difficult to judge the security of the file c, so the file c is written into the security analysis report. And a corresponding prompt window is generated on the browser interface to remind the user A that the security of the file c is unknown. At the same time, the subdirectory where the file c is located is scanned in the background, and dangerous files are detected to be deleted through security software.

从而,通过以上步骤,所述安全分析报告记录了用户A的客户端中在一段时间内的危险进程数量和危险文件(包括安全性未知文件)的数量,进一步反应出用户A的操作习惯是否安全。Therefore, through the above steps, the security analysis report records the number of dangerous processes and dangerous files (including files with unknown security) in user A's client within a period of time, further reflecting whether user A's operating habits are safe .

另外,在本实施例中,根据所述安全分析报告中记录的与预置的所述危险进程或文件相同或相近似的文件的数量统计,并按照安全系数规则对所述统计进行安全评级后输出。In addition, in this embodiment, according to the statistics of the number of files that are the same as or similar to the preset dangerous processes or files recorded in the safety analysis report, and after the safety rating is performed on the statistics according to the safety factor rule output.

所述安全系数规则,是预先设置并根据历史统计的所述安全分析报告中与危险进程或文件相同、相近似的文件数量与客户端受到感染损害的比率对应关系。The safety factor rule is a relationship between the number of files that are the same as or similar to dangerous processes or files in the security analysis report that is preset and based on historical statistics, and the ratio of the infection damage to the client.

通过所述安全系数规则进行安全评级后,将以数值和/或百分比的形式输出,其输出可以采用在客户端界面进行提示、显示和/或弹出对话框的方式。After the safety rating is performed through the safety factor rules, it will be output in the form of numerical value and/or percentage, and the output can be in the form of prompting, displaying and/or popping up a dialog box on the client interface.

例如:在本实施例中,对于所述安全系数规则:For example: in this embodiment, for the safety factor rule:

所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。具体为:The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client. Specifically:

设定总体分值区间为0-10分(安全文件不在分数计算之列);Set the overall score range as 0-10 points (security documents are not included in the score calculation);

设定文件级别检测基准分数:对于文件、进程以及URL,含有木马为-10分,(安全性)未知为5分,风险为-8分;Set the file level detection benchmark score: for files, processes and URLs, -10 points for Trojan horses, 5 points for unknown (security), and -8 points for risk;

设定用户行为操作基准分数:删除行为的分数为1.5分;忽略行为的分数具体为:涉及木马为-1.5分,涉及(安全性)未知为1分,涉及风险为1分。Set benchmark scores for user behavior operations: the score for deleting behavior is 1.5 points; the score for ignoring behaviors is: -1.5 points for Trojan horses, 1 point for unknown (safety) and 1 point for risks.

从而,根据所述安全系数规则,可以进行安全评级:Thus, according to the safety factor rules, a safety rating can be performed:

涉及木马的删除操作可获得10*1.5分,若忽略则为10*(-1.5)分;涉及(安全性)未知的删除操作可获得5*1.5分,若忽略则为5*1分;涉及风险的删除操作可获得8*1.5分,若忽略则为-8×1分。Deletion operations involving Trojan horses can get 10*1.5 points, if ignored, 10*(-1.5) points; deletion operations involving (security) unknowns can get 5*1.5 points, if ignored, 5*1 points; 8*1.5 points will be awarded for the deletion operation of the risk, and -8*1 points if ignored.

当然,还可以通过计算一段时间内的总分数f(x)=ax+f(x-1),进一步获得每一次操作的分数,即f(x)/(操作次数)=分值。Of course, it is also possible to further obtain the score of each operation by calculating the total score f(x)=ax+f(x-1) within a period of time, that is, f(x)/(number of operations)=score.

需要说明的是,对于分值超过10分的记为10分,分值低于0分的记为0分。It should be noted that, those whose scores exceed 10 points are recorded as 10 points, and those whose points are lower than 0 points are recorded as 0 points.

实施例四Embodiment four

如图3所示,为本发明实施例四所述的一种基于日志的安全分析报告生成的系统,与客户端相耦接,包括:监测单元301、分析单元302和报告单元303,其中,As shown in FIG. 3 , it is a system for generating a log-based security analysis report according to Embodiment 4 of the present invention, which is coupled with a client and includes: a monitoring unit 301, an analysis unit 302, and a reporting unit 303, wherein,

所述监测单元301,与所述客户端和分析单元302相耦接,用于实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,将监测结果发送至所述分析单元302。The monitoring unit 301, coupled with the client and the analysis unit 302, is used for real-time monitoring and recording of the running process of the client and the files involved in running or downloading at the client, and sending the monitoring results to the The above analysis unit 302.

所述客户端运行的进程具体为与互联网操作有关的进程(如:浏览器进程及下载进程等),从而,不同的进程就会对应于不同的互联网地址。从而,只需记录相应进程对应的互联网地址以及下载的文件路径,就可以获知相应的进程和文件。The processes run by the client are specifically processes related to Internet operations (such as browser processes and download processes, etc.), so that different processes correspond to different Internet addresses. Therefore, only need to record the Internet address corresponding to the corresponding process and the path of the downloaded file, the corresponding process and file can be obtained.

当用户通过客户端进行网站访问、点击链接地址以及在网站上输入信息等互联网操作行为时,都会启动所述客户端中相应的进程,因此,所述监测单元301对所述客户端进行的实时监测,就可以进一步对用户的操作进行监测,如果用户所进行的互联网操作行为具有风险,则可以快速准确地通过相应进程获知。相应地,当有下载进程被触发时,则对下载操作过程所涉及的文件进行监测并记录。When the user performs Internet operations such as website access, clicking on link addresses, and inputting information on the website through the client, the corresponding process in the client will be started. Therefore, the monitoring unit 301 performs real-time monitoring of the client. Monitoring can further monitor the user's operations. If the user's Internet operation behavior is risky, it can be quickly and accurately known through the corresponding process. Correspondingly, when a download process is triggered, the files involved in the download operation process are monitored and recorded.

所述分析单元302,与所述监测单元301和报告单元303相耦接,用于对所述监测单元301记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并发送给所述报告单元303;The analysis unit 302 is coupled with the monitoring unit 301 and the reporting unit 303, and is used to compare the process and files recorded by the monitoring unit 301 with the preset black and white lists, and record and preset The same or similar content in the black and white list, and send it to the reporting unit 303;

所述报告单元303,与所述分析单元302相耦接,用于对所述分析单元302记录的与预置的黑白名单中相同或相近似的内容,定期进行统计生成安全分析报告。具体为:定期进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告。The reporting unit 303 is coupled with the analyzing unit 302, and is used for periodically making statistics on the contents recorded by the analyzing unit 302 that are the same as or similar to those in the preset blacklist and whitelist, and generating a security analysis report. The specific steps are: to conduct statistics regularly, and to generate a safety analysis report after performing safety rating on the statistics according to the preset safety factor rules.

其中所述分析单元302,进一步用于对所述监测单元301记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并定期进行统计生成安全分析报告反馈到所述客户端。Wherein the analysis unit 302 is further used to synchronize the process and files recorded by the monitoring unit 301 to the cloud service, and after comparing with the preset black and white lists on the cloud service, the records are compared with those on the cloud service. The same or similar content in the pre-set black and white lists, and regularly conduct statistics to generate security analysis reports to feed back to the client.

其中所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。The process further includes: a service operation process, a start-up process, and a creation process.

其中,所述监测单元301中在该客户端正在运行或下载所涉及的文件,进一步包括:Wherein, in the monitoring unit 301, the client is running or downloading the involved files, further comprising:

在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; ,

所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .

本实施例中,所述预置的黑白名单可以存储于本地(客户端),也可以存储于云服务服务器中,从而,对所述客户端运行的进程以及该客户端的下载操作过程所涉及的文件可以通过本地对比,也可以发送至云服务进行对比。当然,本领域技术人员可以理解,所述预置的黑白名单的存储位置和对比方式并不构成对本发明的限定。In this embodiment, the preset black and white lists can be stored locally (client) or in a cloud service server, so that the process running on the client and the download operation process of the client are involved Files can be compared locally or sent to cloud services for comparison. Of course, those skilled in the art can understand that the storage location and comparison method of the preset blacklist and whitelist do not constitute a limitation of the present invention.

其中,所述文件的特征级别具体包括:文件的MD5(Message DigestAlgorithm5,消息摘要算法第五版)和qvm(Qihoo Support Vector Machine,奇虎支持向量机)特征级别。Wherein, the feature level of the file specifically includes: MD5 (Message Digest Algorithm5, message digest algorithm fifth edition) and qvm (Qihoo Support Vector Machine, Qihoo Support Vector Machine) feature level of the file.

所述进程的启动方式路径信息,具体通过所述进程的调用关系获取,即通过对所述进程间的父子关系进行记录,形成进程树(所述进程树中记录各个进程的信息),从而获取不同进程的启动方式路径信息。例如:通过进程的创建时间、进程名称、进程的家族关系信息等进程加载级别,确定该进程的启动方式路径信息。The starting mode path information of the process is specifically obtained through the call relationship of the process, that is, by recording the parent-child relationship between the processes to form a process tree (the information of each process is recorded in the process tree), thereby obtaining The path information of the startup method of different processes. For example, the startup mode path information of the process is determined through the process loading level such as the creation time of the process, the process name, and the process family relationship information.

进一步地,所述报告单元303通过所述安全系数规则进行安全评级后,将以数值和/或百分比的形式输出,其输出可以采用在客户端界面进行提示、显示和/或弹出对话框的方式。Further, the reporting unit 303 will output the safety rating in the form of numerical values and/or percentages after passing the safety factor rules, and the output can be in the form of prompting, displaying and/or popping up dialog boxes on the client interface .

与现有技术相比,本发明所述的一种基于日志的安全分析报告生成的方法和系统,达到了如下效果:Compared with the prior art, a method and system for generating a log-based security analysis report according to the present invention achieves the following effects:

1)本发明采用生成安全分析报告的方式,能够详细记录用户在一段时间内具体的安全操作,并可以针对用户具有安全风险的操作进行警告和提示,有效解决了针对用户忽略风险预警等危险操作,安全软件不进行记录并重复警告提示的问题;1) The present invention adopts the method of generating a security analysis report, which can record in detail the specific security operations of the user within a period of time, and can warn and prompt the user for operations with security risks, effectively solving the problem of dangerous operations such as users ignoring risk warnings , the security software does not record and repeats the warning prompts;

2)本发明通过云安全技术,将安全分析报告记录的内容传给相应的云安全中心的服务器,由云安全中心对其安全做出判定,可以快速地识别安全分析报告中的危险进程或文件,并根据识别结果,对用户在一段时间内的操作给出相应的评价分值,使用户可以直观清晰地了解到其是否具有危险操作以及危险操作的多少,从而增加了用户的使用体验。2) The present invention transmits the content recorded in the security analysis report to the server of the corresponding cloud security center through the cloud security technology, and the cloud security center makes a judgment on its security, which can quickly identify dangerous processes or files in the security analysis report , and according to the recognition results, give corresponding evaluation scores to the user's operations within a period of time, so that users can intuitively and clearly understand whether they have dangerous operations and how many dangerous operations, thereby increasing the user experience.

当注意的是,在本发明的系统的各个部件中,根据其要实现的功能而对其中的部件进行了逻辑划分,但是,本发明不受限于此,可以根据需要对各个部件进行重新划分或者组合,例如,可以将一些部件组合为单个部件,或者可以将一些部件进一步分解为更多的子部件。It should be noted that among the various components of the system of the present invention, the components are logically divided according to the functions to be realized, but the present invention is not limited thereto, and each component can be re-divided as required Or combined, for example, some components can be combined into a single component, or some components can be further broken down into more subcomponents.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的系统中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in the system according to the embodiments of the present invention. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or otherwise provided.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate an order. These words can be interpreted as names.

本发明公开了A1一种基于日志的安全分析报告生成的方法,包括:The invention discloses A1 a method for generating a log-based security analysis report, comprising:

实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;Real-time monitoring and recording of the process running on the client and the files involved in running or downloading on the client;

对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告。After comparing the processes and files recorded above with the preset black and white lists, record the same or similar content as those in the preset black and white lists, and make statistics to generate a security analysis report.

A2、如权利要求A1所述的基于日志的安全分析报告生成的方法,其特征在于,对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告,进一步为:A2. The method for generating a log-based security analysis report as claimed in claim A1, wherein, after comparing the processes and files of the above-mentioned records with the preset black and white lists, the records are compared with the preset black and white lists. The same or similar content, and make statistics to generate a safety analysis report, further:

对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。After synchronizing the process and files recorded above to the cloud service, after comparing with the black and white list preset on the cloud service, record the same or similar content as the black and white list preset on the cloud service, and Perform statistics to generate a security analysis report to feed back to the client.

A3、如权利要求A1所述的基于日志的安全分析报告生成的方法,其特征在于,进行统计生成安全分析报告,进一步为:A3, the method that the security analysis report based on log as claimed in claim A1 generates, is characterized in that, performing statistics to generate security analysis report, further is:

进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;Make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules;

所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client.

A4、如权利要求A1所述的基于日志的安全分析报告生成的方法,其特征在于,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。A4. The method for generating a log-based security analysis report according to claim A1, wherein the process further comprises: a service operation process, a start-up process, and a creation process.

A5、如权利要求A1所述的基于日志的安全分析报告生成的方法,其特征在于,在该客户端正在运行或下载所涉及的文件,进一步包括:A5, the method that the security analysis report based on log as claimed in claim A1 generates, is characterized in that, in this client is running or downloads involved file, further comprises:

在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; ,

所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .

A6、如权利要求A1或A2中任一所述的基于日志的安全分析报告生成的方法,其特征在于,预置的黑白名单,进一步包括:黑名单和白名单,其中,A6. The method for generating a log-based security analysis report according to any one of claims A1 or A2, wherein the preset black and white lists further include: a black list and a white list, wherein,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库级别、以及访问网址中含有的统一资源定位符的级别或特征信息。The blacklist and the whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library executed when the process is loaded, and the level of the uniform resource locator contained in the access URL or feature information.

本发明还公开了A7一种基于日志的安全分析报告生成的系统,包括:监测单元、分析单元和报告单元,其中,The present invention also discloses A7 a system for generating safety analysis reports based on logs, including: a monitoring unit, an analysis unit and a reporting unit, wherein,

所述监测单元,用于实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;The monitoring unit is used to monitor and record the running process of the client and the files involved in running or downloading on the client in real time;

所述分析单元,用于对所述监测单元记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容;The analysis unit is configured to compare the process and files recorded by the monitoring unit with the preset black and white lists, and record the same or similar content as those in the preset black and white lists;

所述报告单元,用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计生成安全分析报告。The reporting unit is configured to generate a security analysis report by making statistics on the same or similar content recorded by the analysis unit as in the preset black and white list.

A8、如权利要求A7所述的基于日志的安全分析报告生成的系统,其特征在于,所述分析单元,进一步用于对所述监测单元记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。A8. The system for generating a log-based security analysis report as claimed in claim A7, wherein the analysis unit is further configured to synchronize the process and files recorded by the monitoring unit to cloud services, by communicating with After comparing the black and white lists preset on the cloud service, record the same or similar content as the black and white lists preset on the cloud service, and make statistics to generate a security analysis report to feed back to the client.

A9、如权利要求A7所述的基于日志的安全分析报告生成的系统,其特征在于,所述报告单元,进一步用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;其中,A9. The system for generating a log-based security analysis report according to claim A7, wherein the report unit is further used to record the same or similar items in the preset black and white lists recorded by the analysis unit. Content, make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules; among them,

所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client.

A10、如权利要求A7所述的基于日志的安全分析报告生成的系统,其特征在于,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。A10. The system for generating a log-based security analysis report according to claim A7, wherein the process further includes: a service operation process, a start-up operation process, and a creation process.

A11、如权利要求A7所述的基于日志的安全分析报告生成的系统,其特征在于,所述监测单元中在该客户端正在运行或下载所涉及的文件,进一步包括:A11, the system that the safety analysis report based on log as claimed in claim A7 generates, is characterized in that, in described monitoring unit, the file involved in this client is running or downloading, further comprises:

在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; ,

所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .

A12、如权利要求A7或A8中任一所述的基于日志的安全分析报告生成的系统,其特征在于,预置的黑白名单,进一步包括:黑名单和白名单,其中,A12. The system for generating a log-based security analysis report as claimed in any one of claims A7 or A8, wherein the preset black and white lists further include: a black list and a white list, wherein,

所述黑名单和白名单分别均包括有:进程中的特征代码或特征脚本、进程的启动方式路径信息、进程加载时执行的动态链接库级别、以及访问网址中含有的统一资源定位符的级别或特征信息。The blacklist and the whitelist respectively include: characteristic codes or characteristic scripts in the process, path information of the starting method of the process, the level of the dynamic link library executed when the process is loaded, and the level of the uniform resource locator contained in the access URL or characteristic information.

Claims (10)

1.一种基于日志的安全分析报告生成的方法,包括:1. A method for generating a log-based security analysis report, comprising: 实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;Real-time monitoring and recording of the process running on the client and the files involved in running or downloading on the client; 对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告。After comparing the processes and files recorded above with the preset black and white lists, record the same or similar content as those in the preset black and white lists, and make statistics to generate a security analysis report. 2.如权利要求1所述的基于日志的安全分析报告生成的方法,其特征在于,对上述记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告,进一步为:2. the method for generating based on the security analysis report of log as claimed in claim 1, is characterized in that, after the described process of above-mentioned record and file and preset black and white list are compared, record and preset black and white list The same or similar content, and make statistics to generate a safety analysis report, further: 对上述记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。After synchronizing the process and files recorded above to the cloud service, after comparing with the black and white list preset on the cloud service, record the same or similar content as the black and white list preset on the cloud service, and Perform statistics to generate a security analysis report to feed back to the client. 3.如权利要求1所述的基于日志的安全分析报告生成的方法,其特征在于,进行统计生成安全分析报告,进一步为:3. the method that the security analysis report based on log as claimed in claim 1 generates, is characterized in that, carries out statistical generation security analysis report, is further: 进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;Make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules; 所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client. 4.如权利要求1所述的基于日志的安全分析报告生成的方法,其特征在于,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。4. The method for generating a log-based security analysis report according to claim 1, wherein the process further comprises: a service operation process, a start-up process, and a creation process. 5.如权利要求1所述的基于日志的安全分析报告生成的方法,其特征在于,在该客户端正在运行或下载所涉及的文件,进一步包括:5. the method that the safety analysis report based on log as claimed in claim 1 generates, is characterized in that, in this client is running or downloads involved file, further comprises: 在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; , 所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file . 6.一种基于日志的安全分析报告生成的系统,包括:监测单元、分析单元和报告单元,其中,6. A system for generating a log-based security analysis report, comprising: a monitoring unit, an analysis unit, and a reporting unit, wherein, 所述监测单元,用于实时监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件;The monitoring unit is used to monitor and record the running process of the client and the files involved in running or downloading on the client in real time; 所述分析单元,用于对所述监测单元记录的所述进程以及文件与预置的黑白名单进行对比后,记录与预置的黑白名单中相同或相近似的内容;The analysis unit is configured to compare the process and files recorded by the monitoring unit with the preset black and white lists, and record the same or similar content as those in the preset black and white lists; 所述报告单元,用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计生成安全分析报告。The reporting unit is configured to generate a security analysis report by making statistics on the same or similar content recorded by the analysis unit as in the preset black and white list. 7.如权利要求6所述的基于日志的安全分析报告生成的系统,其特征在于,所述分析单元,进一步用于对所述监测单元记录的所述进程以及文件同步至云服务,通过与所述云服务上预置的黑白名单进行对比后,记录与该云服务上预置的黑白名单中相同或相近似的内容,并进行统计生成安全分析报告反馈到所述客户端。7. The system for generating a log-based security analysis report as claimed in claim 6, wherein the analysis unit is further configured to synchronize the process and files recorded by the monitoring unit to cloud services, by communicating with After comparing the black and white lists preset on the cloud service, record the same or similar content as the black and white lists preset on the cloud service, and make statistics to generate a security analysis report to feed back to the client. 8.如权利要求6所述的基于日志的安全分析报告生成的系统,其特征在于,所述报告单元,进一步用于对所述分析单元记录的与预置的黑白名单中相同或相近似的内容,进行统计,并按照预置的安全系数规则对所述统计进行安全评级后生成安全分析报告;其中,8. The system for generating a log-based security analysis report as claimed in claim 6, wherein the report unit is further used to record the same or similar items in the preset black and white lists recorded by the analysis unit. Content, make statistics, and generate a safety analysis report after performing safety ratings on the statistics according to the preset safety factor rules; among them, 所述安全系数规则,为根据所述监测并记录客户端运行的进程以及在该客户端正在运行或下载所涉及的文件,设置对应的级别基准分数和对应的操作基准分数。The safety factor rule is to set a corresponding level benchmark score and a corresponding operation benchmark score according to the monitoring and recording of the process running on the client and the files involved in running or downloading on the client. 9.如权利要求6所述的基于日志的安全分析报告生成的系统,其特征在于,所述进程,进一步包括:服务操作进程、启动运行进程以及创建进程。9. The system for generating a log-based security analysis report according to claim 6, wherein the process further comprises: a service operation process, a start-up process and a creation process. 10.如权利要求6所述的基于日志的安全分析报告生成的系统,其特征在于,所述监测单元中在该客户端正在运行或下载所涉及的文件,进一步包括:10. the system that the safety analysis report based on log as claimed in claim 6 generates, is characterized in that, in described monitoring unit, is running or downloads involved file in this client, further comprises: 在该客户端的传输文件、在该客户端外接存储设备上的文件、在该客户端上基于即时通新工具和/或电子邮件接收的文件、以及在该客户端通过下载工具下载的文件;其中,Transmission files on the client, files on the client’s external storage device, files received on the client based on instant messaging tools and/or emails, and files downloaded on the client through downloading tools; , 所述文件的类型包括:可执行文件和非可执行文件,所述可执行文件包括:文件后缀名为exe的文件、脚本文件、批处理文件以及链接文件;所述非可执行文件为办公文件。The type of described file comprises: executable file and non-executable file, and described executable file comprises: file suffix is called the file of exe, script file, batch processing file and link file; Described non-executable file is office file .
CN201310625938.8A 2013-11-28 2013-11-28 Method and system for generating safety analysis report on basis of logs Pending CN103618626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310625938.8A CN103618626A (en) 2013-11-28 2013-11-28 Method and system for generating safety analysis report on basis of logs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310625938.8A CN103618626A (en) 2013-11-28 2013-11-28 Method and system for generating safety analysis report on basis of logs

Publications (1)

Publication Number Publication Date
CN103618626A true CN103618626A (en) 2014-03-05

Family

ID=50169330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310625938.8A Pending CN103618626A (en) 2013-11-28 2013-11-28 Method and system for generating safety analysis report on basis of logs

Country Status (1)

Country Link
CN (1) CN103618626A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005735A (en) * 2015-08-25 2015-10-28 广东欧珀移动通信有限公司 Download management method and download management device
CN105096096A (en) * 2014-04-29 2015-11-25 阿里巴巴集团控股有限公司 Task performance evaluation method and system
CN105653947A (en) * 2014-11-11 2016-06-08 中国移动通信集团公司 Method and device for assessing application data security risk
TWI560569B (en) * 2015-07-23 2016-12-01 Chunghwa Telecom Co Ltd
CN106446685A (en) * 2016-09-30 2017-02-22 北京奇虎科技有限公司 Methods and devices for detecting malicious documents
CN106547581A (en) * 2015-09-22 2017-03-29 中国移动通信集团公司 Control method, device, terminal and platform that a kind of application is installed
CN106657102A (en) * 2016-12-29 2017-05-10 北京奇虎科技有限公司 LAN based threat processing method and device
CN106856477A (en) * 2016-12-29 2017-06-16 北京奇虎科技有限公司 A kind of threat treating method and apparatus based on LAN
CN110659491A (en) * 2019-09-23 2020-01-07 深信服科技股份有限公司 Computer system recovery method, device, equipment and readable storage medium
CN110826068A (en) * 2019-11-01 2020-02-21 海南车智易通信息技术有限公司 Safety detection method and safety detection system
CN114282194A (en) * 2021-12-23 2022-04-05 中国建设银行股份有限公司大连市分行 IT risk monitoring method and device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1737722A (en) * 2005-08-03 2006-02-22 珠海金山软件股份有限公司 System and method for detecting and defending computer worm
CN101059829A (en) * 2007-05-16 2007-10-24 珠海金山软件股份有限公司 Device and method for automatically analyzing course risk grade
US20100180344A1 (en) * 2009-01-10 2010-07-15 Kaspersky Labs ZAO Systems and Methods For Malware Classification
CN101924762A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 A proactive defense method based on cloud security
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method
CN102222192A (en) * 2010-12-24 2011-10-19 卡巴斯基实验室封闭式股份公司 Optimizing anti-malicious software treatment by automatically correcting detection rules
CN102982284A (en) * 2012-11-30 2013-03-20 北京奇虎科技有限公司 Scanning equipment, cloud management equipment and method and system used for malicious program checking and killing
CN103034808A (en) * 2012-11-30 2013-04-10 北京奇虎科技有限公司 Scanning method, equipment and system and cloud management method and equipment
US20130097701A1 (en) * 2011-10-18 2013-04-18 Mcafee, Inc. User behavioral risk assessment
CN103384240A (en) * 2012-12-21 2013-11-06 北京安天电子设备有限公司 P2P active defense method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1737722A (en) * 2005-08-03 2006-02-22 珠海金山软件股份有限公司 System and method for detecting and defending computer worm
CN101059829A (en) * 2007-05-16 2007-10-24 珠海金山软件股份有限公司 Device and method for automatically analyzing course risk grade
US20100180344A1 (en) * 2009-01-10 2010-07-15 Kaspersky Labs ZAO Systems and Methods For Malware Classification
CN101924762A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 A proactive defense method based on cloud security
CN102222192A (en) * 2010-12-24 2011-10-19 卡巴斯基实验室封闭式股份公司 Optimizing anti-malicious software treatment by automatically correcting detection rules
CN102082802A (en) * 2011-03-01 2011-06-01 陈彪 Behavior-based mobile terminal security protection system and method
US20130097701A1 (en) * 2011-10-18 2013-04-18 Mcafee, Inc. User behavioral risk assessment
CN102982284A (en) * 2012-11-30 2013-03-20 北京奇虎科技有限公司 Scanning equipment, cloud management equipment and method and system used for malicious program checking and killing
CN103034808A (en) * 2012-11-30 2013-04-10 北京奇虎科技有限公司 Scanning method, equipment and system and cloud management method and equipment
CN103384240A (en) * 2012-12-21 2013-11-06 北京安天电子设备有限公司 P2P active defense method and system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096096A (en) * 2014-04-29 2015-11-25 阿里巴巴集团控股有限公司 Task performance evaluation method and system
CN105653947A (en) * 2014-11-11 2016-06-08 中国移动通信集团公司 Method and device for assessing application data security risk
TWI560569B (en) * 2015-07-23 2016-12-01 Chunghwa Telecom Co Ltd
CN105005735B (en) * 2015-08-25 2018-01-16 广东欧珀移动通信有限公司 Download management method and download management device
CN105005735A (en) * 2015-08-25 2015-10-28 广东欧珀移动通信有限公司 Download management method and download management device
CN106547581A (en) * 2015-09-22 2017-03-29 中国移动通信集团公司 Control method, device, terminal and platform that a kind of application is installed
CN106446685A (en) * 2016-09-30 2017-02-22 北京奇虎科技有限公司 Methods and devices for detecting malicious documents
CN106657102A (en) * 2016-12-29 2017-05-10 北京奇虎科技有限公司 LAN based threat processing method and device
CN106856477A (en) * 2016-12-29 2017-06-16 北京奇虎科技有限公司 A kind of threat treating method and apparatus based on LAN
CN106856477B (en) * 2016-12-29 2020-05-19 北京奇虎科技有限公司 Threat processing method and device based on local area network
CN110659491A (en) * 2019-09-23 2020-01-07 深信服科技股份有限公司 Computer system recovery method, device, equipment and readable storage medium
CN110826068A (en) * 2019-11-01 2020-02-21 海南车智易通信息技术有限公司 Safety detection method and safety detection system
CN114282194A (en) * 2021-12-23 2022-04-05 中国建设银行股份有限公司大连市分行 IT risk monitoring method and device and storage medium

Similar Documents

Publication Publication Date Title
CN103618626A (en) Method and system for generating safety analysis report on basis of logs
US12019734B2 (en) Methods and apparatus for control and detection of malicious content using a sandbox environment
US11570211B1 (en) Detection of phishing attacks using similarity analysis
US8726387B2 (en) Detecting a trojan horse
US9268946B2 (en) Quantifying the risks of applications for mobile devices
CN103617395B (en) Method, device and system for intercepting advertisement programs based on cloud security
CN102982284B (en) For the scanning device of rogue program killing, cloud management equipment and method and system
US8595840B1 (en) Detection of computer network data streams from a malware and its variants
JP5599892B2 (en) Malware detection and response to malware using link files
CN103473501B (en) A malware tracking method based on cloud security
CN103034808B (en) Scan method, equipment and system and cloud management and equipment
CN103117893B (en) A kind of monitoring method of network access behavior, device and a kind of client device
CN104239577A (en) Method and device for detecting authenticity of webpage data
CN102819713A (en) Method and system for detecting security of popup window
CN103595774A (en) System application uninstalling method and device with terminal based on server side
WO2012065551A1 (en) Method for cloud security download
CN107171894A (en) The method of terminal device, distributed high in the clouds detecting system and pattern detection
CN103279707A (en) Method, device and system for actively defending against malicious programs
US20140373137A1 (en) Modification of application store output
CN103793649A (en) Method and device for cloud-based safety scanning of files
CN108768934B (en) Malicious program release detection method, device and medium
WO2012094965A1 (en) Method, terminal and server for presenting prompt message
WO2015109912A1 (en) Buffer overflow attack detection device and method and security protection system
CN104239798B (en) Mobile terminal, server end in mobile office system and its virus method and system
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140305