CN106203102A - A kind of checking and killing virus method and device of the whole network terminal - Google Patents

A kind of checking and killing virus method and device of the whole network terminal Download PDF

Info

Publication number
CN106203102A
CN106203102A CN201510226429.7A CN201510226429A CN106203102A CN 106203102 A CN106203102 A CN 106203102A CN 201510226429 A CN201510226429 A CN 201510226429A CN 106203102 A CN106203102 A CN 106203102A
Authority
CN
China
Prior art keywords
virus
file
score value
doubtful
killing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510226429.7A
Other languages
Chinese (zh)
Other versions
CN106203102B (en
Inventor
杨锐
关成雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Falcon Safety Technology Co., Ltd
Original Assignee
Beijing Kingsoft Security Management System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Security Management System Technology Co Ltd filed Critical Beijing Kingsoft Security Management System Technology Co Ltd
Priority to CN201510226429.7A priority Critical patent/CN106203102B/en
Publication of CN106203102A publication Critical patent/CN106203102A/en
Application granted granted Critical
Publication of CN106203102B publication Critical patent/CN106203102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A kind of checking and killing virus method and device of the whole network terminal.Method is used for the Cloud Server of network side, including: call cloud killing engine end of scan equipment based on anti-virus signature database;If scanning doubtful file, then it is identified, and according to qualification result, it is judged that whether described doubtful file is virus document;The most then result of determination is sent to described terminal unit, and the virus characteristic of described virus document is published in described anti-virus signature database.In the present invention, end side no longer needs with setting up virus base, utilizes the cloud killing engine on network side to carry out the killing of virus, saves the waste of space resources;And utilize the virus base of virus characteristic real-time update, the safety of the equipment being further ensured that.

Description

A kind of checking and killing virus method and device of the whole network terminal
Technical field
The invention belongs to technical field of network security, especially relate to the checking and killing virus side of a kind of the whole network terminal Method and device.
Background technology
Along with the development of computer technology, computer virus is also in the data day by day affecting computer user Safety or experience.For these a lot of computers be mounted with antivirus software (or claim antivirus software, fire wall Deng) to resist computer virus.Antivirus software many employings condition code knowledge at present detects virus otherwise, Confirmed by the condition code of detection virus the file of Current Scan comprises virus.Therefore some computers The virus document that the author of virus writes in order to avoid oneself is detected by antivirus software, it will usually by one The most invalid instruction addition virus document is to hide the signature detection of antivirus software, thus have impact on gas defence The effect of software defense computer virus.
Current detection method, is the virus base being updated self by terminal from network side, utilizes the disease of self Poison storehouse carries out scanning and the killing of data, and it is big that this mode exists the resource that takes up room, and virus base updates not Problem timely.
Summary of the invention
An object of the present invention is to provide a kind of checking and killing virus method of the whole network terminal, to solve existing skill The resource that takes up room in art is big, and virus base updates problem not in time.
In some illustrative embodiment, the checking and killing virus method of described the whole network terminal, for network side Cloud Server, including: call cloud killing engine based on anti-virus signature database and scan this terminal unit; If scanning doubtful file, then identify described doubtful file, and according to qualification result, it is judged that described doubtful Whether file is virus document;The most then result of determination is sent to described terminal unit, and by described The virus characteristic of virus document is published in described anti-virus signature database.
Preferably, the described doubtful file of described qualification, according to qualification result, it is judged that described doubtful file is No for virus document, specifically include: described doubtful file is carried out following qualification successively, according to described mirror Determine result and determine the final score value of described doubtful file;Auxiliary is identified, multi engine is identified, static identify and Dynamically identify;Described final score value is compared with virus threshold value set in advance, according to comparative result, Judge that described doubtful file is as virus document or non-viral file.
Preferably, described auxiliary is identified, specifically includes: identify the type of described doubtful file, and foundation The type of described doubtful file carries out pretreatment to it, it is determined that the digital signature of file after pretreatment is No effectively, and/or, if containing infection type code;If it is determined that result to be digital signature invalid or containing thoughts Dye type code, then be judged to described virus document by described doubtful file;Otherwise, to described doubtful file Carry out follow-up qualification.
Preferably, in the type of the described doubtful file of described identification, and according to the type of described doubtful file It is carried out pretreatment, including: if compressed file, decompress the most successively, obtain all sons after decompression File;If adding shelf document, shelling the most successively, obtaining the original document after shelling.
Preferably, described multi engine is identified, specifically includes: disposes and overlaps document engine more, for auxiliary mirror File after fixed filtration is scanned, and is allocated the first sub-score value according to scanning result;In conjunction with obtaining Described first sub-score value static identify and the qualification result of dynamically qualification with described, determine described final point Value.
Preferably, described static qualification, specifically include: extraction document attribute material, in self-teaching type Material database carries out material coupling, it is determined that material is the most abnormal, determines the second sub-score value according to result of determination; Identify and the qualification result of dynamically qualification with described multi engine in conjunction with the described second sub-score value obtained, determine Described final score value.
Preferably, described self-teaching type material database includes standard material at least one: system API, import and export table, key compositional character string, file icon, fileversion number, file compiler Type, PE file section table, binary system piecemeal, instruction redirect block, job sequence.
Preferably, described dynamic qualification, specifically include: by file doubtful described in virtual machine monitoring whether Dangerous behavior, then determine the 3rd sub-score value according to the kind of hazardous act;Described aggressive behavior and institute State infection risk, including: all kinds of injections, mutexes, inline hook, startup host process, mirror image are robbed Hold, add delay renaming item, input method mechanism, amendment command register and remote thread context, Global message hook, common leak flooding are set;In conjunction with the described 3rd sub-score value obtained and institute State multi engine to identify and the static qualification result identified, determine described final score value.
Preferably, call cloud killing engine based on anti-virus signature database scan this terminal unit described Afterwards, also include: if scanning virus document, then utilize described cloud killing engine to remove from described terminal This virus document is removed on equipment.
Further object is that the checking and killing virus device that a kind of the whole network terminal is provided.
In some illustrative embodiment, the checking and killing virus device of described the whole network terminal, including: call mould Block, scans this terminal unit for calling cloud killing engine based on anti-virus signature database;Parsing module, If for scanning doubtful file, then identify described doubtful file, and according to qualification result, it is judged that described Whether doubtful file is virus document;Sending module, for result of determination is sent to described terminal unit, And the virus characteristic of described virus document is published in described anti-virus signature database.
Compared with prior art, the illustrative embodiment of the present invention includes advantages below:
End side no longer needs with setting up virus base, utilizes the cloud killing engine on network side to carry out looking into of virus Kill, save the waste of space resources;And utilize the virus base of virus characteristic real-time update, protect further The safety of the equipment of card.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the application Point, the schematic description and description of the present invention is used for explaining the present invention, is not intended that the present invention's Improper restriction.In the accompanying drawings:
Fig. 1 is the flow chart of the illustrative embodiment according to the present invention;
Fig. 2 is the structured flowchart of the illustrative embodiment according to the present invention.
Detailed description of the invention
In the following detailed description, a large amount of specific detail is proposed, in order to provide the thorough reason to the present invention Solve.However it will be understood by those of ordinary skill in the art that, even if not having these specific detail can implement this yet Bright.In other cases, it is not described in well-known method, process, assembly and circuit, with Exempt to affect the understanding of the present invention.
As it is shown in figure 1, disclose a kind of checking and killing virus method of the whole network terminal, the cloud for network side takes Business device, including:
S11, call cloud killing engine based on anti-virus signature database and scan this terminal unit;
If S12 scans doubtful file, then it is identified, and according to qualification result, it is judged that institute State whether doubtful file is virus document;
S13, the most then result of determination is sent to described terminal unit, and by described virus document Virus characteristic is published in described anti-virus signature database.
Terminal is called cloud killing engine and is scanned this terminal document, if there is doubtful file, then obtains this doubtful File, carries out putting in data to be tested storehouse, after identifying that this doubtful file is virus document, by this disease The virus characteristic of poison file is put in anti-virus signature database.
In the present invention, end side no longer needs with setting up virus base, utilizes the cloud killing engine on network side to carry out The killing of virus, saves the waste of space resources;And utilize the virus base of virus characteristic real-time update, The safety of the equipment being further ensured that.
In some illustrative embodiment, the described doubtful file of described qualification, according to qualification result, it is judged that Whether described doubtful file is virus document, specifically includes: described doubtful file is carried out following mirror successively Fixed, the final score value of described doubtful file is determined according to described qualification result;Auxiliary is identified, multi engine mirror Fixed, static state is identified and dynamically identifies;Described final score value is compared with virus threshold value set in advance, According to comparative result, it is determined that described doubtful file is virus document or non-viral file.
In some illustrative embodiment, described auxiliary is identified, specifically includes: identify described doubtful file Type, and according to the type of described doubtful file, it is carried out pretreatment;Judge file after pretreatment Digital signature whether effective, and/or, it is determined that whether file contains infection type code after pretreatment;If Result of determination is that digital signature is invalid or containing infection type file, then be judged to by described doubtful file described Virus document;Otherwise, described doubtful file is carried out follow-up qualification.
In some illustrative embodiment, in the type of the described doubtful file of described identification, and according to described The type of doubtful file carries out pretreatment to it, including: (1), if compressed file, decompresses the most successively, Obtain all subfiles after decompression;(2) if adding shelf document, shell the most successively, after obtaining shelling Original document.
In some illustrative embodiment, described multi engine is identified, specifically includes: disposes many set files and draws Hold up, identify that the file after filtering is scanned for auxiliary, and be allocated the first son according to scanning result Score value;In conjunction with the described first sub-score value obtained and the described static qualification result identified and dynamically identify, Determine described final score value.
In some illustrative embodiment, described static qualification, specifically include: extraction document attribute material, Material coupling is carried out, it is determined that material is the most abnormal, true according to result of determination in self-teaching type material database Fixed second sub-score value;Identify in conjunction with the described second sub-score value obtained and described multi engine and dynamically identify Qualification result, determines described final score value.
In some illustrative embodiment, described self-teaching type material database includes at least one Standard material: system API, import and export table, key compositional character string, file icon, FileVersion Number, file compiler type, PE file section table, binary system piecemeal, instruction redirect block, job sequence.
In some illustrative embodiment, described dynamic qualification, specifically include: by virtual machine monitoring institute State the most dangerous behavior of doubtful file, then determine the 3rd sub-score value according to the kind of hazardous act;Institute State aggressive behavior and described infection risk, including: all kinds of injections, mutexes, inline hook, startup place Host process, mirror image are kidnapped, interpolation postpones renaming item, input method is machine-processed, revise command register and remote Journey thread context, global message hook, common leak flooding are set;Described in conjunction with obtain 3rd sub-score value is identified with described multi engine and the static qualification result identified, determines described final score value.
In some illustrative embodiment, call cloud killing engine based on anti-virus signature database described After scanning this terminal unit, also include: if scanning virus document, then utilize described cloud killing engine Remove from described terminal unit, remove this virus document.
In some illustrative embodiment, described multi engine is identified, static state is identified and dynamically identifies The first sub-score value, the second sub-score value and the 3rd sub-score value carry out result by the weighted value that pre-sets In conjunction with.
Such as:
I=aX+bY+cZ
Wherein, I is final score value, and X, Y, Z are respectively the first sub-score value, the second sub-score value and the 3rd Sub-score value, a, b, c be respectively the first sub-score value, the second sub-score value and the weight coefficient of the 3rd sub-score value,
A+b+c=1.
In some illustrative embodiment, qualification can also include:
Special qualification δ: refer in particular to a class code of points, this rule relies on a collection of special external factor auxiliary meter Point counting value, such as file size, file range, file path, scanning channel etc..
Such as:
I=aX+bY+cZ+ δ
Wherein, I is final score value, and X, Y, Z are respectively the first sub-score value, the second sub-score value and the 3rd Sub-score value, a, b, c be respectively the first sub-score value, the second sub-score value and the weight coefficient of the 3rd sub-score value, A+b+c=1.
As in figure 2 it is shown, disclose the checking and killing virus device 100 of a kind of the whole network terminal, including: call base Cloud killing engine in anti-virus signature database scans the calling module 101 of this terminal unit;If scanning Doubtful file, then identify described doubtful file, and according to qualification result, it is judged that whether described doubtful file Parsing module 102 for virus document;Result of determination is sent to described terminal unit, and by described disease The sending module 103 that the virus characteristic of poison file is published in described anti-virus signature database.
In some illustrative embodiment, described parsing module 102 includes: depend on described doubtful file The secondary qualification module 1021 carrying out following qualification: assist qualification, multi engine to identify, static state is identified and dynamic Identify;The analyzing sub-module 1022 of the final score value of described doubtful file is determined according to described qualification result; Described final score value is compared, according to comparative result with virus threshold value set in advance, it is determined that described Doubtful file is the judge module 1023 of virus document or non-viral file.
In some illustrative embodiment, described qualification module 1021 includes: first identifies submodule 10211, for identifying the type of described doubtful file, and according to the type of described doubtful file, it is entered Row pretreatment, it is determined that the digital signature of file after pretreatment is the most effective, and/or, if containing thoughts Dye type code;If it is determined that result to be digital signature invalid or containing infection type code, then by described doubtful literary composition Part is judged to described virus document;Otherwise, described doubtful file is carried out follow-up qualification.
In some illustrative embodiment, in the type of the described doubtful file of described identification, and according to described The type of doubtful file carries out pretreatment to it, including: if compressed file, decompress the most successively, obtain All subfiles after decompression;If adding shelf document, shelling the most successively, obtaining the original document after shelling.
In some illustrative embodiment, described qualification module 1022 includes: second identifies submodule 10212, it is used for disposing and overlaps document engine more, identify that the file after filtering is scanned for auxiliary, and It is allocated the first sub-score value according to scanning result;In conjunction with the described first sub-score value obtained and described static state The qualification result identified and dynamically identify, determines described final score value.
In some illustrative embodiment, described qualification module 1022 includes: the 3rd identifies submodule 10213, for extraction document attribute material, in self-teaching type material database, carry out material coupling, sentence Determine material the most abnormal, determine the second sub-score value according to result of determination;In conjunction with described second son point obtained The qualification result that value is identified with described multi engine and dynamically identified, determines described final score value.
Preferably, described self-teaching type material database includes standard material at least one: system API, import and export table, key compositional character string, file icon, fileversion number, file compiler Type, PE file section table, binary system piecemeal, instruction redirect block, job sequence.
In some illustrative embodiment, described qualification module 1022 includes: the 4th identifies submodule 10214, for by the most dangerous behavior of file doubtful described in virtual machine monitoring, then according to danger The kind of behavior determines the 3rd sub-score value;Described aggressive behavior and described infection risk, including: all kinds of notes Enter, mutexes, inline hook, start host process, mirror image is kidnapped, add and postpone renaming item, defeated Enter method mechanism, amendment command register and remote thread context, global message hook, common is set Leak flooding;Identify in conjunction with the described 3rd sub-score value obtained and the qualification of described multi engine and static state Qualification result, determines described final score value.
In some illustrative embodiment, described checking and killing virus module also includes: killing module, if for Scan virus document, then utilize described cloud killing engine to remove from described terminal unit, remove this virus File.
The explanation of above example is only intended to help to understand method and the core concept thereof of the present invention;Meanwhile, For one of ordinary skill in the art, according to the thought of the present invention, at detailed description of the invention and application model Placing and all will change, in sum, this specification content should not be construed as limitation of the present invention.

Claims (10)

1. the checking and killing virus method of the whole network terminal, it is characterised in that for the cloud service of network side Device, including:
Call cloud killing engine end of scan equipment based on anti-virus signature database;
If scanning doubtful file, then it is identified, and according to qualification result, it is judged that described doubtful Whether file is virus document;
The most then result of determination is sent to described terminal unit, and by special for the virus of described virus document Levy and be published in described anti-virus signature database.
Checking and killing virus method the most according to claim 1, it is characterised in that described it is carried out Identify, and according to qualification result, it is judged that whether described doubtful file is virus document, specifically includes:
Described doubtful file is carried out following qualification successively, determines described doubtful literary composition according to described qualification result The final score value of part;Auxiliary is identified, multi engine is identified, static state is identified and dynamically identifies;
Described final score value is compared, according to comparative result with virus threshold value set in advance, it is determined that Described doubtful file is virus document or non-viral file.
Checking and killing virus method the most according to claim 2, it is characterised in that described auxiliary is identified, Specifically include:
Identify the type of described doubtful file, and according to the type of described doubtful file, it is carried out pretreatment;
Judge that the digital signature of file after pretreatment is the most effective, and/or, if containing infection type generation Code;
If it is determined that result to be digital signature invalid or containing infection type code, then will the judgement of described doubtful file For described virus document;
Otherwise, described doubtful file is carried out follow-up qualification.
Checking and killing virus method the most according to claim 3, it is characterised in that in described identification institute State the type of doubtful file, and according to the type of described doubtful file, it is carried out pretreatment, including:
If compressed file, decompress the most successively, obtain all subfiles after decompression;
If adding shelf document, shelling the most successively, obtaining the original document after shelling.
Checking and killing virus method the most according to claim 3, it is characterised in that described multi engine reflects Fixed, specifically include:
Dispose and overlap document engine more, identify that the file after filtering is scanned for auxiliary, and according to scanning Result is allocated the first sub-score value;
In conjunction with the described first sub-score value obtained and the described static qualification result identified and dynamically identify, really Fixed described final score value.
Checking and killing virus method the most according to claim 3, it is characterised in that described static qualification, Specifically include:
Extraction document attribute material, carries out material coupling, it is determined that material is in self-teaching type material database No exception, determines the second sub-score value according to result of determination;
Identify and the qualification result of dynamically qualification with described multi engine in conjunction with the described second sub-score value obtained, Determine described final score value.
Checking and killing virus method the most according to claim 6, it is characterised in that described self-teaching Type material database includes standard material at least one:
System API, import and export table, key compositional character string, file icon, fileversion number, literary composition Part compiler type, PE file section table, binary system piecemeal, instruction redirect block, job sequence.
Checking and killing virus method the most according to claim 3, it is characterised in that described dynamic qualification, Specifically include:
By the most dangerous behavior of file doubtful described in virtual machine monitoring, then according to the kind of hazardous act Class determines the 3rd sub-score value;
Described aggressive behavior and described infection risk, including:
All kinds of injections, mutexes, inline hook, startup host process, mirror image are kidnapped, are added delay weight Name item, input method are machine-processed, revise command register and remote thread context, arrange global message hook Sub, common leak flooding;
Identify and the static qualification result identified with described multi engine in conjunction with the described 3rd sub-score value obtained, Determine described final score value.
Checking and killing virus method the most according to claim 1, it is characterised in that call base described After the cloud killing engine of anti-virus signature database scans this terminal unit, also include:
If scanning virus document, then utilize described cloud killing engine to remove and remove from described terminal unit This virus document.
10. the checking and killing virus device of the whole network terminal, it is characterised in that including:
Calling module, for calling cloud killing engine end of scan equipment based on anti-virus signature database;
Parsing module, if for scanning doubtful file, then it being identified, and according to qualification result, Judge whether described doubtful file is virus document;
Sending module, for sending result of determination to described terminal unit, and by described virus document Virus characteristic is published in described anti-virus signature database.
CN201510226429.7A 2015-05-06 2015-05-06 A kind of checking and killing virus method and device of the whole network terminal Active CN106203102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510226429.7A CN106203102B (en) 2015-05-06 2015-05-06 A kind of checking and killing virus method and device of the whole network terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510226429.7A CN106203102B (en) 2015-05-06 2015-05-06 A kind of checking and killing virus method and device of the whole network terminal

Publications (2)

Publication Number Publication Date
CN106203102A true CN106203102A (en) 2016-12-07
CN106203102B CN106203102B (en) 2019-10-11

Family

ID=57459111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510226429.7A Active CN106203102B (en) 2015-05-06 2015-05-06 A kind of checking and killing virus method and device of the whole network terminal

Country Status (1)

Country Link
CN (1) CN106203102B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106993042A (en) * 2017-04-05 2017-07-28 河南工程学院 A kind of network real-time monitoring method based on cloud computing
CN107358102A (en) * 2017-07-14 2017-11-17 合肥执念网络科技有限公司 A kind of computer based checking and killing virus system
CN108171058A (en) * 2017-12-26 2018-06-15 中国联合网络通信集团有限公司 Multi engine virus scan system and multi engine virus scan method based on Serverless frames
CN108667771A (en) * 2017-03-29 2018-10-16 北京宸信征信有限公司 A kind of data processing system and processing method for handling distrust data
CN108898019A (en) * 2018-08-17 2018-11-27 广州瀚华建筑设计有限公司 CAD checking and killing virus method, system, computer equipment and readable storage medium storing program for executing
CN109918173A (en) * 2019-03-06 2019-06-21 苏州浪潮智能科技有限公司 Virtual machine health examination method and system based on openstack
CN112149115A (en) * 2020-08-28 2020-12-29 杭州安恒信息技术股份有限公司 Method and device for updating virus library, electronic device and storage medium
CN112214765A (en) * 2020-09-29 2021-01-12 珠海豹好玩科技有限公司 Virus checking and killing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039177A (en) * 2007-04-27 2007-09-19 珠海金山软件股份有限公司 Apparatus and method for on-line searching virus
US20070240217A1 (en) * 2006-04-06 2007-10-11 George Tuvell Malware Modeling Detection System And Method for Mobile Platforms
CN101621511A (en) * 2009-06-09 2010-01-06 北京安天电子设备有限公司 Multilayer detecting method without local virus library and multilayer detecting system
CN102279917A (en) * 2011-09-19 2011-12-14 奇智软件(北京)有限公司 Multi-antivirus engine parallel antivirus method and system
CN102799804A (en) * 2012-04-30 2012-11-28 珠海市君天电子科技有限公司 Comprehensive identification method and system for security of unknown file

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070240217A1 (en) * 2006-04-06 2007-10-11 George Tuvell Malware Modeling Detection System And Method for Mobile Platforms
CN101039177A (en) * 2007-04-27 2007-09-19 珠海金山软件股份有限公司 Apparatus and method for on-line searching virus
CN101621511A (en) * 2009-06-09 2010-01-06 北京安天电子设备有限公司 Multilayer detecting method without local virus library and multilayer detecting system
CN102279917A (en) * 2011-09-19 2011-12-14 奇智软件(北京)有限公司 Multi-antivirus engine parallel antivirus method and system
CN102799804A (en) * 2012-04-30 2012-11-28 珠海市君天电子科技有限公司 Comprehensive identification method and system for security of unknown file

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108667771A (en) * 2017-03-29 2018-10-16 北京宸信征信有限公司 A kind of data processing system and processing method for handling distrust data
CN106993042A (en) * 2017-04-05 2017-07-28 河南工程学院 A kind of network real-time monitoring method based on cloud computing
CN107358102A (en) * 2017-07-14 2017-11-17 合肥执念网络科技有限公司 A kind of computer based checking and killing virus system
CN108171058A (en) * 2017-12-26 2018-06-15 中国联合网络通信集团有限公司 Multi engine virus scan system and multi engine virus scan method based on Serverless frames
CN108898019A (en) * 2018-08-17 2018-11-27 广州瀚华建筑设计有限公司 CAD checking and killing virus method, system, computer equipment and readable storage medium storing program for executing
CN109918173A (en) * 2019-03-06 2019-06-21 苏州浪潮智能科技有限公司 Virtual machine health examination method and system based on openstack
CN112149115A (en) * 2020-08-28 2020-12-29 杭州安恒信息技术股份有限公司 Method and device for updating virus library, electronic device and storage medium
CN112214765A (en) * 2020-09-29 2021-01-12 珠海豹好玩科技有限公司 Virus checking and killing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN106203102B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN106203102A (en) A kind of checking and killing virus method and device of the whole network terminal
US11431676B2 (en) Method, apparatus, and system for detecting terminal security status
US10657251B1 (en) Multistage system and method for analyzing obfuscated content for malware
CN102254111B (en) Malicious site detection method and device
US11188650B2 (en) Detection of malware using feature hashing
CN106295333B (en) method and system for detecting malicious code
RU2726032C2 (en) Systems and methods for detecting malicious programs with a domain generation algorithm (dga)
US20060015940A1 (en) Method for detecting unwanted executables
CN111460445A (en) Method and device for automatically identifying malicious degree of sample program
US8332941B2 (en) Exploit nonspecific host intrusion prevention/detection methods and systems and smart filters therefor
CN106250761B (en) Equipment, device and method for identifying web automation tool
US10262136B1 (en) Cloud-based malware detection
CN103679016A (en) Method and system for processing malicious programs of mobile phone
EP3745292A1 (en) Hidden link detection method and apparatus for website
CN102984134A (en) Safe defense system
CN105631332B (en) A kind of method and device of processing rogue program
CN111966630B (en) File type detection method, device, equipment and medium
CN110417746A (en) Cross-site scripting attack defence method, device, equipment and storage medium
CN105844161A (en) Security defense method, device and system
EP4137976A1 (en) Learning device, detection device, learning method, detection method, learning program, and detection program
CN104506529A (en) Website protection method and device
US9881155B2 (en) System and method for automatic use-after-free exploit detection
CN105787359A (en) Course guarding method and device
CN112351008B (en) Network attack analysis method and device, readable storage medium and computer equipment
CN114417349A (en) Attack result determination method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing,

Patentee after: Beijing Falcon Safety Technology Co., Ltd

Address before: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing,

Patentee before: BEIJING KINGSOFT SECURITY MANAGEMENT SYSTEM TECHNOLOGY Co.,Ltd.