CN103902894B - 基于用户行为差异化的病毒防御方法及系统 - Google Patents
基于用户行为差异化的病毒防御方法及系统 Download PDFInfo
- Publication number
- CN103902894B CN103902894B CN201210568110.9A CN201210568110A CN103902894B CN 103902894 B CN103902894 B CN 103902894B CN 201210568110 A CN201210568110 A CN 201210568110A CN 103902894 B CN103902894 B CN 103902894B
- Authority
- CN
- China
- Prior art keywords
- ratio
- default
- file
- grey file
- hazard index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210568110.9A CN103902894B (zh) | 2012-12-24 | 2012-12-24 | 基于用户行为差异化的病毒防御方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210568110.9A CN103902894B (zh) | 2012-12-24 | 2012-12-24 | 基于用户行为差异化的病毒防御方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103902894A CN103902894A (zh) | 2014-07-02 |
CN103902894B true CN103902894B (zh) | 2017-12-22 |
Family
ID=50994206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210568110.9A Active CN103902894B (zh) | 2012-12-24 | 2012-12-24 | 基于用户行为差异化的病毒防御方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103902894B (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105430001A (zh) * | 2015-12-18 | 2016-03-23 | 北京奇虎科技有限公司 | Apt攻击的检测方法、终端设备、服务器及系统 |
CN105915556B (zh) * | 2016-06-29 | 2019-02-12 | 北京奇虎科技有限公司 | 一种终端的攻击面的确定方法及设备 |
CN106778136B (zh) * | 2016-12-19 | 2018-09-04 | 广州市申迪计算机系统有限公司 | 一种甄别绕行登录事件的审计方法 |
CN112181908A (zh) * | 2020-09-04 | 2021-01-05 | 北京灵汇数融科技有限公司 | 基于统计的电子文件鉴定方法及系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102034044A (zh) * | 2010-12-14 | 2011-04-27 | 华中科技大学 | 计算机病毒的毒性暨危害性分析系统 |
CN101587527B (zh) * | 2009-07-08 | 2011-12-28 | 北京东方微点信息技术有限责任公司 | 病毒程序扫描方法及装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645125B (zh) * | 2008-08-05 | 2011-07-20 | 珠海金山软件有限公司 | 过滤以及监控程序的行为的方法 |
-
2012
- 2012-12-24 CN CN201210568110.9A patent/CN103902894B/zh active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101587527B (zh) * | 2009-07-08 | 2011-12-28 | 北京东方微点信息技术有限责任公司 | 病毒程序扫描方法及装置 |
CN102034044A (zh) * | 2010-12-14 | 2011-04-27 | 华中科技大学 | 计算机病毒的毒性暨危害性分析系统 |
Also Published As
Publication number | Publication date |
---|---|
CN103902894A (zh) | 2014-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Susilo et al. | Intrusion detection in IoT networks using deep learning algorithm | |
CN107395590B (zh) | 一种基于pca和随机森林分类的入侵检测方法 | |
Pacheco et al. | Uncovering coordinated networks on social media | |
Chan et al. | Spam filtering for short messages in adversarial environment | |
Zhang et al. | HHT–SVM: An online method for detecting profile injection attacks in collaborative recommender systems | |
CN104866763B (zh) | 基于权限的Android恶意软件混合检测方法 | |
CN107888571A (zh) | 一种基于HTTP日志的多维度webshell入侵检测方法及检测系统 | |
CN107368856B (zh) | 恶意软件的聚类方法及装置、计算机装置及可读存储介质 | |
CN103902894B (zh) | 基于用户行为差异化的病毒防御方法及系统 | |
Ahmed et al. | A weighted minimum redundancy maximum relevance technique for ransomware early detection in industrial IoT | |
CN105488406B (zh) | 一种基于特征向量的相似恶意样本匹配方法及系统 | |
CN104504334B (zh) | 用于评估分类规则选择性的系统及方法 | |
CN108197474A (zh) | 移动终端应用的分类和检测方法 | |
Čeponis et al. | Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow CNN models for the host-based intrusion and malware detection task on univariate times series data | |
CN110020532B (zh) | 一种信息过滤方法、系统、设备及计算机可读存储介质 | |
CN112347474A (zh) | 一种安全威胁情报的构建方法、装置、设备和存储介质 | |
Wu et al. | MinerGuard: A solution to detect browser-based cryptocurrency mining through machine learning | |
Wijayanto | Fighting cyber crime in email spamming: An evaluation of fuzzy clustering approach to classify spam messages | |
Agghey et al. | Detection of username enumeration attack on ssh protocol: Machine learning approach | |
Kozik et al. | Packets tokenization methods for web layer cyber security | |
CN101950334A (zh) | 基于计算机免疫的信息系统危险感知方法及系统 | |
Zhang et al. | A Network Intrusion Detection Model Based on BiLSTM with Multi-Head Attention Mechanism | |
Kumar et al. | Detection of malware using deep learning techniques | |
Zwang et al. | Detecting bot activity in the Ethereum blockchain network | |
Kaur et al. | Spam detection in online social networks using feed forward neural network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 519015 8 Lanshan lane, Jida Jingshan Hill Road, Zhuhai, Guangdong Co-patentee after: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee after: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Co-patentee after: Beijing Cheetah Mobile Technology Co.,Ltd. Co-patentee after: Beijing Cheetah Network Technology Co.,Ltd. Address before: 519015 8 Lanshan lane, Jida Jingshan Hill Road, Zhuhai, Guangdong Co-patentee before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee before: Zhuhai Juntian Electronic Technology Co.,Ltd. Co-patentee before: SHELL INTERNET (BEIJING) SECURITY TECHNOLOGY Co.,Ltd. Co-patentee before: BEIJING KINGSOFT NETWORK TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191202 Address after: 519031 Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province Patentee after: Zhuhai Leopard Technology Co.,Ltd. Address before: Jingshan Hill Road, Lane 519015 Lianshan Jida Guangdong province Zhuhai City No. 8 Co-patentee before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee before: Zhuhai Juntian Electronic Technology Co.,Ltd. Co-patentee before: Beijing Cheetah Mobile Technology Co.,Ltd. Co-patentee before: Beijing Cheetah Network Technology Co.,Ltd. |