CN107171894A - The method of terminal device, distributed high in the clouds detecting system and pattern detection - Google Patents

The method of terminal device, distributed high in the clouds detecting system and pattern detection Download PDF

Info

Publication number
CN107171894A
CN107171894A CN201710453830.3A CN201710453830A CN107171894A CN 107171894 A CN107171894 A CN 107171894A CN 201710453830 A CN201710453830 A CN 201710453830A CN 107171894 A CN107171894 A CN 107171894A
Authority
CN
China
Prior art keywords
task
data
mission bit
bit stream
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710453830.3A
Other languages
Chinese (zh)
Inventor
赵征
王磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710453830.3A priority Critical patent/CN107171894A/en
Publication of CN107171894A publication Critical patent/CN107171894A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The embodiments of the invention provide a kind of method of terminal device, distributed high in the clouds detecting system and pattern detection, wherein distributed high in the clouds detecting system includes:Multiple single node sandboxs;Including:Multiple pending mission bit streams are determined according to the first preset rules, and send multiple pending mission bit streams to shared queue, after at least one request message is received, its each self-corresponding mission bit stream is obtained from shared queue according to each request message, and being distributed for it for task is performed respectively by multiple single node sandboxs, the data produced during tasks carrying are obtained, then send the data produced during tasks carrying to corresponding database.The embodiment of the present invention can be detected to the sample of magnanimity, improve the efficiency to pattern detection.

Description

The method of terminal device, distributed high in the clouds detecting system and pattern detection
Technical field
The present invention relates to Internet technical field, specifically, the present invention relates to terminal device, distributed high in the clouds detection system The method of system and pattern detection.
Background technology
With the development of information technology, internet and terminal also develop therewith, thus will produce substantial amounts of data, and By analyzing these data produced, to realize the detection to internet and terminal, it is ensured that internet and terminal Information security.
At present, a kind of method of pattern detection, researcher obtains substantial amounts of sample, and is the detection such as dynamic by static state Method, is researched and analysed to the great amount of samples got, but when the method by prior art, sample is detected When, it due to manually being tested and analyzed to great amount of samples, will cause costly, and and consume the substantial amounts of time, and then cause It is relatively low to the detection efficiency of sample.
The content of the invention
To overcome above-mentioned technical problem or solving above-mentioned technical problem at least in part, spy proposes following technical scheme:
Embodiments of the invention according to one side there is provided a kind of method of pattern detection, applied to distributed high in the clouds Detecting system, distributed high in the clouds detecting system includes:Multiple single node sandboxs;Method includes:
Multiple pending mission bit streams are determined according to the first preset rules, and multiple pending mission bit streams are sent To shared queue;
After at least one request message is received, its each correspondence is obtained from shared queue according to each request message Mission bit stream, and perform being distributed for it for task respectively by multiple single node sandboxs, obtain generation during tasks carrying Data;
The data produced during tasks carrying are sent to corresponding database.
Specifically, the mode of single node sandbox execution task includes:
Read the mission bit stream of highest priority;
Determine whether include specific sample in the mission bit stream of highest priority;
If comprising specific sample, being modified to specific parametric environmental;
After amendment is finished, the parameter configuration in the service condition and mission bit stream of Current resource is true Surely the task is performed;
After the tasks carrying is finished, corresponding task status is changed.
Alternatively, the parameter configuration in the service condition and mission bit stream of Current resource is determined to perform and is somebody's turn to do After the step of task, in addition to:
If it is determined that performing the task, then the task is run in virtual machine, and by the data storage produced in operation extremely Local disk.
Optionally it is determined that after the step of whether including specific sample in the mission bit stream of highest priority, in addition to:
If not including specific sample in the mission bit stream of highest priority, only comprising md5 identifiers, then marked according to md5 Know symbol and download corresponding sample;
According to the task number being currently executing, it is determined whether perform the including the download sample of the task;
If it is determined that performing the including the download sample of the task, then according to the download sample, json files, json files are generated In include the specifying information of task;
According to the specifying information of task, the report of specified format is generated, and changes corresponding task status.
Alternatively, in the use state information and/or local data base of local resource task overstocks status information, Task requests are sent to server, task requests are used for server request task information;
The mission bit stream that the reception server is returned, and mission bit stream is stored to local data base.
Specifically, task data is included in mission bit stream;
The step of mission bit stream is stored to local data base, including:
Compression duty data, and the task data after compression is stored to local data base.
Specifically, the step of data produced during tasks carrying being sent to corresponding database, including:
By the second preset rules, the data of black data are belonged in the data produced during screening tasks carrying, and will Belong to the data of black data to black data storehouse.
Alternatively, every preset time, Clean Up Database.
Embodiments of the invention additionally provide a kind of distributed high in the clouds detecting system according on the other hand, including:
Sandbox cluster inlet module, for determining multiple pending mission bit streams according to the first preset rules;Will be multiple Pending mission bit stream is sent to shared queue;After at least one request message is received, according to each request message from Its each self-corresponding mission bit stream is obtained in shared queue;
Single node sandbox module, for performing being distributed for it for task respectively by multiple single node sandboxs, obtains task The data produced in implementation procedure;
The distributed storage cluster module of expansible type, is additionally operable to produce in single node sandbox module design task implementation procedure Data send to corresponding database.
Specifically, single node sandbox module, the mission bit stream specifically for reading highest priority;Determine highest priority Mission bit stream in whether include specific sample;When comprising specific sample, specific parametric environmental is modified;When After amendment is finished, the parameter configuration in the service condition and mission bit stream of Current resource determines to perform this Business;After the tasks carrying is finished, corresponding task status is changed.
Alternatively, single node sandbox module, is specifically additionally operable to if it is determined that performing the task, then by the task in virtual machine Operation, and by the data storage produced in operation to local disk.
Alternatively, single node sandbox module, is specifically additionally operable to specific when not included in the mission bit stream of highest priority Sample, when only comprising md5 identifiers, corresponding sample is downloaded according to md5 identifiers;According to being currently executing for task Number, it is determined whether perform the task for the download sample downloaded comprising download module;When it is determined that performing comprising the download sample During task, the download sample downloaded according to download module generates the specific letter for including task in json files, json files Breath;According to the specifying information of task, the report of specified format is generated;Change corresponding task status.
Alternatively, distributed high in the clouds detecting system also includes:Single node sandbox request of data and resource cleaning modul;
Single node sandbox request of data and resource cleaning modul, for the use state information according to local resource and/ Or the task in local data base overstocks status information, task requests are sent to server, task requests are used for please to server Seek mission bit stream;The mission bit stream that the reception server is returned;Mission bit stream is stored to local data base.
Specifically, the distributed storage cluster module of expansible type, specifically for by the second preset rules, screening task Belong to the data of black data in the data produced in implementation procedure, and the data of black data will be belonged to black data storehouse.
Alternatively, single node sandbox request of data and resource cleaning modul, are additionally operable to, every preset time, clear up data Storehouse.
Alternatively, distributed high in the clouds detecting system also includes:Distributed high in the clouds detecting system monitoring module;
Distributed high in the clouds detecting system monitoring modular, for monitor sandbox cluster inlet module, single node sandbox module, can The distributed storage cluster module and single node sandbox request of data and resource cleaning modul of expansion type.
Embodiments of the invention are additionally provided in a kind of terminal device, the structure of terminal device and wrapped according to another aspect Processor and memory are included, memory is used to store the program for supporting R-T unit to perform the above method, and processor is configured as The program stored for performing in memory.
Embodiments of the invention additionally provide a kind of computer-readable storage medium according to another aspect, above-mentioned for saving as Computer software instructions used in terminal device, it, which is included, is used to perform program of the above-mentioned aspect designed by terminal device.
It is and existing the invention provides a kind of method of distributed high in the clouds detecting system, terminal device and pattern detection The method of pattern detection compare, the present invention is applied to distributed high in the clouds detecting system, and distributed high in the clouds detecting system includes:It is many Individual single node sandbox;Multiple pending mission bit streams are determined according to the first preset rules, and multiple pending tasks are believed Breath is sent to shared queue, then after at least one request message is received, according to each request message from shared queue Obtain its each self-corresponding task, and performed respectively as its distribution task by multiple single node sandboxs, obtain tasks carrying mistake The data produced in journey, then send the data produced during tasks carrying to corresponding database, i.e., distributed high in the clouds Multiple single node sandboxs are provided with detecting system, and can simultaneously be performed by multiple single node sandboxs as appointing that it is distributed Business, and the data that are produced during tasks carrying are obtained, and the data of generation can be sent to corresponding database, with reality Now to the detection of sample, due to being detected by multiple single node sandboxs to sample, without manually to substantial amounts of sample Detected one by one, so as to reduce the cost of pattern detection, and due to performing difference simultaneously by multiple single node sandboxs Task, so as to reduce the time loss of pattern detection, and then the detection efficiency to sample can be improved.
The additional aspect of the present invention and advantage will be set forth in part in the description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and be readily appreciated that, wherein:
Fig. 1 is a kind of method flow diagram of pattern detection of the embodiment of the present invention;
Fig. 2 is the distributed high in the clouds detecting system schematic diagram of the embodiment of the present invention;
Fig. 3 is the structural representation of terminal device in the embodiment of the present invention.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to there is the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange Taking leave "and/or" includes one or more associated wholes or any cell for listing item and all combines.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, it only possesses the equipment of the wireless signal receiver of non-emissive ability, includes receiving again and transmitting hardware Equipment, its have can on bidirectional communication link, carry out two-way communication reception and launch hardware equipment.This equipment It can include:Honeycomb or other communication equipments, it has single line display or multi-line display or shown without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can With combine voice, data processing, fax and/or its communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day Go through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, its have and/or conventional laptop and/or palmtop computer including radio frequency receiver or its His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, installed in the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or the equipment such as mobile phone or intelligent television with music/video playing function, set top box.
Embodiment one
The embodiments of the invention provide a kind of method of pattern detection, as shown in figure 1, applied to distributed high in the clouds detection system System, distributed high in the clouds detecting system includes:Multiple single node sandboxs;Including:
Step 101, determine multiple pending mission bit streams according to the first preset rules, and by multiple pending tasks Information is sent to shared queue.
For the embodiment of the present invention, the first preset rules can include the priority and other composite factors of task.
For the embodiment of the present invention, before step 101, collect in initial data, the initial data and include for various types of The analysis result of the network malicious act of type, such as comprising the URL about malicious web pages and relevant various leaks, virus, wood Horse, the sample object of attack.
In the present embodiment, collected initial data includes the analysis result for various types of network malicious acts, For example comprising the URL about malicious web pages and about various leaks, virus, wooden horse, the sample object attacked.In addition, Sample object also includes:0Day, NDay, exposure period 0Day, position extension horse information, the follow-up of important website and position extension horse etc. Deng.Wherein, 0Day is has been found to and (is possible to not be disclosed), and official's also leak without associated patch.These leaks , for example can be with edit the registry, download file, runtime file using 0Day immediately by malicious exploitation after being found.Sample The form of target can be file, executable program etc..Do not limit in embodiments of the present invention.
For the embodiment of the present invention, collected original threat data can be the data that client is uploaded, visitor here Family end can be the user terminal for detecting various network malicious acts.In actual applications, client can be by default Process list is monitored to the dangerous process in login process or payment process;Or pass through default safe listed files The file transmitted in login process or payment process is monitored;Or the browser in login process or payment process is adjusted It is monitored with behavior;Or the calling for input through keyboard content in login process or payment process is monitored;Or it is right The data object of client transmissions is monitored in login process or payment process.
Client is monitored to the object transfer unrelated with login process or payment process with logging in or paying phase for example, working as During the data of pass, then transmitted data object should be intercepted;Or the webpage to being opened in login process or payment process It is monitored, for example, in login process or payment process, it is what malicious third parties were forged that what user may open, which pays webpage, With webpage as true payment web page class, it is therefore desirable to which the webpage opened is monitored.
Wherein, when monitoring the file such as executable file, the real-time download situation of file can be not only monitored, can be with Real time execution situation of monitoring file when being activated and after being activated.Client is obtained in detection after threat data, generation Daily record is temporarily stored into log buffer inventory.The log recording thread poll log buffer inventory of client and according to first in first out Mode handles daily record successively, and log content is added in write-in log record file, is obtained by outside related scheduler module process And handle the journal file and uploaded.Asked for example, message can be sent by client and obtained, obtained and asked according to message In request push time and message received list, the new information not being transmitted across to the client is obtained from message queue, And to client feedback response message, the response message includes the second push time and new information list, in new information list Include the message id and message content of this all new information issued to client, second pushes the push that the time is new information Time.Wherein, the threat data uploaded can include environment and document base information, detection function point trigger data etc..Its Middle environment and document base information are exported in forms such as flowing water daily records, and detection function point trigger data is with user behaviors log Actions.log form output.By taking sample as an example, environment and document base information are specially sample process file MD5, sample Process file path, major system modules title and FileVersion etc.;Detection function point trigger data is specially involved to enter Journey ID and/or Thread Id, are tampered the title of function, the pointer value after distorting, Hooked API etc. where during detection.
For the embodiment of the present invention, the source-information based on sample and/or the sample reliability through being determined to screening sample, To set up Detection task, and detection priority is determined for above-mentioned Detection task.If the sample reliability determined through screening is higher, Determine that the Detection task has higher detection priority;If the sample reliability determined through screening is relatively low, it is determined that the detection Task has relatively low detection priority.Wherein, the reliability is with belonging to the possibility of black data and being associated with important website Property is relevant.
Step 102, after at least one request message is received, it is obtained from shared queue according to each request message Each self-corresponding mission bit stream, and being distributed for it for task is performed by multiple single node sandboxs, during obtaining tasks carrying The data of generation.
For the embodiment of the present invention, after at least one request message is received, according to each request message from shared team Its each self-corresponding task is obtained in row.In embodiments of the present invention, scheduling node can distribute to Detection task each list Node sandbox, each single node sandbox performs the task for its distribution respectively, obtains task testing result.
For the embodiment of the present invention, Detection task is distributed to point by scheduling node after the Detection task issued is received Cloth high in the clouds detecting system.In order to further lift distributed high in the clouds detection system in the security of threat data detection, the present invention System can be specially distributed sandbox group system, and distributed sandbox group system is tested and analyzed using sandbox technology, sandbox The running environment of a closing is provided for suspicious sample daily record, so, even if the corresponding sample of suspicious sample daily record is deposited really In leak, server side will not also be caused damage.
For the embodiment of the present invention, static engine and dynamic engine are deployed with distributed cluster system respectively to threatening Detection task carries out static analysis and dynamic is analyzed.Wherein, static engine can extract URL information and/or sample format information is entered Row static analysis, the URL information extracted including but not limited to:IP, domain name, URL MD5 values etc., sample format packet Contain but be not limited to:Leak/Virus Name, URL information, similarity of character string of PE samples etc.;Dynamic engine mainly captures behaviour Make system action data, leak corelation behaviour data and/or network corelation behaviour data and enter Mobile state analysis.
For the embodiment of the present invention, by taking kernel leak as an example, dynamic engine is to critical behavior or the related API of function tune With hook is carried out, whether the title or attribute than pair correlation function are tampered or replace, so as to obtain the identification day of kernel leak Will.
For the embodiment of the present invention, complete analysis again is carried out using sandbox detection mode by the PE files of cloud killing and examined Survey.For non-PE files, such as rich text format (Rich Text Format, hereinafter referred to as rich text format), PDF format, Doc A kind of (file extension) form, docx (a kind of file extension) form and excel forms etc., if file is can be after The document of continuous decompression, then return and proceed decompression operation, if file is detectable metadata, carries out QEX static Analysis, filling data (shellcode) half dynamic detection and lightVM light weights are dynamically analyzed.Afterwards, sandbox detection pair is utilized The metadata detected by three of the above is detected again.When whether there is the detection of malicious act to file, it is preferable that In the embodiment of the present invention, the danger classes of malicious act can be divided into Three Estate.First, it is high-risk, that is, it is able to confirm that first number According to wooden horse sample, obvious malicious act or the vulnerability exploit that can be triggered for malicious code, such as determination.Second, in , that is, there is doubtful malicious act in danger, but can not determine, or doubtful vulnerability exploit, but the malicious act not determined still, example Such as find that sample can access following sensitive position, or sample causes program crashing, but performed without triggering.3rd, low danger, The i.e. non-file that means no harm by confirming, may endanger system safety, it can be understood as there is the file of risk.
In the present embodiment, distributed cluster system can also obtain third party in addition to being analyzed using the engine of oneself The authentication information that platform or third party's engine are provided, so that abundant qualification result.
In addition, distributed cluster system can be also associated between analysis, concrete analysis URL, whether have between sample Relevance, by analyzing the relevance between black data, as data are more and more, the black data of accumulation is also more and more.
For the embodiment of the present invention, the mode that single node sandbox performs task includes step a-e as shown below (in figure not Mark), wherein,
Step a, the mission bit stream for reading highest priority.
For the embodiment of the present invention, scheduling node reads current priority highest mission bit stream from shared queue, and The mission bit stream of the current highest priority is distributed into a certain single node sandbox, to cause the single node sandbox to perform this Business.
For example, there is currently three mission bit streams in shared queue, the respectively mission bit stream of task 1, the task of task 2 The mission bit stream of information and task 3, and the priority orders of above three mission bit stream are followed successively by task 1 from high to low The mission bit stream of mission bit stream, the mission bit stream of task 3 and task 2, then after request message is received, scheduling node is first The mission bit stream of task 1 is distributed into the single node sandbox, to cause the single node sandbox to perform the task 1.
Step b, determine whether include specific sample in the mission bit stream of highest priority.
For the embodiment of the present invention, after step b, in addition to:If not comprising specific in the mission bit stream of highest priority Sample, only comprising md5 identifiers, then corresponding sample is downloaded according to md5 identifiers;According to being currently executing for task Number, it is determined whether perform the including the download sample of the task;If it is determined that performing the including the download sample of the task, then according under this Load sample sheet, generates the specifying information for including task in json files, json files;According to the specifying information of task, generation is specified The report of form, and change corresponding task status.
For the embodiment of the present invention, if not including specific sample in the mission bit stream of the highest priority, only comprising md5 Value, then download the corresponding specific sample of the md5 values from database, then according to appointing that the single node sandbox is currently executing Business number, it is determined whether perform the including the download sample of the task.
For the embodiment of the present invention, the task number being currently executing according to the single node sandbox and the pass of preset threshold value System, it is determined whether perform the including the download sample of the task;Further, when the task that the single node sandbox is currently executing When number is not more than preset threshold value, it is determined that performing the task of the download sample;If what the single node sandbox was currently executing appoints Number of being engaged in is more than preset threshold value, and the single node sandbox does not perform the including the download sample of the task.
For the embodiment of the present invention, however, it is determined that perform the including the download sample of the task, then daily record sample is handled The json files of specifying information of the generation comprising task, rule match is carried out to all log informations, generation specified format Report, and store into specified storage assembly, for example, mongoDB, ceph etc..
If step c, comprising specific sample, specific parametric environmental is modified.
Wherein, specific sample can include agreement (the English full name interconnected between network:Internet Protocol, English abbreviation:IP), domain name etc..
For the embodiment of the present invention, server side sets up cloud security query interface, and browser can be inquired about by the cloud security The IP address of website is reported server by interface.
For the embodiment of the present invention, for the characteristics of overseas the risk factor of IP address is higher than domestic IP address in internet, If IP address is IP address overseas, the ratio of the quantity of fishing website and the quantity of non-fishing website is higher than under the IP address In the case of first given threshold, by IP address storage into dangerous IP databases.In embodiments of the present invention, can also be straight Connect according to the quantity of fishing website under domain name to determine whether the domain name is dangerous domain name, the quantity of fishing website under such as certain domain name If above setting quantity (such as 1000), then it is dangerous domain name that can determine the domain name;In addition, if confirming that some domain names are true For the domain name of highly dangerous, it can also be stored to by being manually entered in dangerous dns database.
Alternatively, dangerous dns database not only can store domain name in itself, can also store the risk factor rank of domain name. In embodiments of the present invention, the risk factor rank can be by the ratio of fishing website quantity under domain name and the quantity of non-fishing website Example determines that ratio is higher, risk factor rank is higher;Conversely, risk factor rank is lower.
Step d, after amendment is finished, according to the parameter configuration in the service condition and mission bit stream of Current resource Information determines to perform the task.
For the embodiment of the present invention, after being modified to specific parametric environmental, the use feelings of Current resource are determined Whether condition is less than resources left threshold value, and/or parameter configuration in current task information determines whether to perform this Business.In embodiments of the present invention, when the service condition of Current resource is not less than resources left threshold value, and/or current task information In parameter configuration support perform the task, it is determined that perform the task.
For the embodiment of the present invention, however, it is determined that perform the task, then return to 200, however, it is determined that do not perform the task, then return 500.Do not limit in embodiments of the present invention.
For the embodiment of the present invention, also include after step d:If it is determined that performing the task, then by the task in virtual machine Middle operation, and by the data storage produced in operation to local disk.
For the embodiment of the present invention, after the task is run in virtual machine, operation result is stored to local disk In.
Step e, after the tasks carrying is finished, change corresponding task status.
For the embodiment of the present invention, if the task is not carried out, or the task is carrying out, but is not carried out finishing, then should Task status is unfinished state;If being that unfinished state is revised as having completed by task status after the tasks carrying is finished State.In embodiments of the present invention, if the task is not carried out, the state of the task is is not carried out state, if working as task Perform, but be not carried out finishing, be then revised as being carrying out state by the task status;If the tasks carrying is finished, by this Business status modifier is completion status.Do not limit in embodiments of the present invention.
Step 103, the data produced during tasks carrying are sent to corresponding database.
For the embodiment of the present invention, the database can include black list database.Wherein, the black list database bag Include:URL black list databases, IP black list databases and/or domain name black list database.
For the embodiment of the present invention, the danger classes of sample can be determined according to the data produced during tasks carrying, The danger classes of sample can be for example divided into Three Estate, respectively the first estate, high-risk grade;Second grade, middle danger etc. Level;The tertiary gradient, high-risk grade.
For the embodiment of the present invention, high-risk grade sample characterizes the original code for malicious code, such as wooden horse sample of determination, Sample with obvious malicious act or sample of leak etc. can be triggered;Middle danger grade sample is the presence of doubtful malice Behavior, but the sample that can not be determined, or doubtful vulnerability exploit but the malicious act that does not determine still, for example, find that sample can be visited Ask that following sensitive position, or sample cause program crashing, but performed without triggering.Low danger grade sample is non-by confirming The file that means no harm, may endanger system safety, it can be understood as there is the file of risk.
Alternatively, first by client computer collection procedure feature and its corresponding program behavior, and it is sent to service Device end;Then different performance of program and its corresponding program behavior, and black/white name are recorded in server-side database It is single;With reference to the performance of program and its corresponding program behavior in existing known black/white list, to unknown program feature and program line To be analyzed, to update black/white list.
For the embodiment of the present invention, due to have recorded performance of program and the corresponding behavior record of this feature in database, Therefore known black/white name single pair of unknown program can be combined to be analyzed.
If for example, unknown program feature is identical with the known procedure feature in existing black/white list, by the unknown journey Sequence characteristics and its program behavior are all included in black/white list;If unknown program behavior and the known procedure in existing black/white list Behavior is identical or approximate, then the unknown program behavior and its performance of program is all included in into black/white list.
For the embodiment of the present invention, because some viruses by technologies such as mutation or shell addings can change condition code, but its Behavior is without there is very big change, and therefore, the comparative analysis recorded by program behavior more can easily determine some not Whether be rogue program, this comparative analysis sometimes does follow-up analysis in itself even without the behavior to program if knowing program, Only need to it is simple with existing black/white list in known procedure behavior compare and can determine that the property of unknown program.At this In inventive embodiments, pass through the record analysis in database, it is known that have the behavior of some programs identical or approximate, but performance of program Difference, at this moment, as long as we set up the incidence relation of behavior and feature, and root between the program with identical or approximate behavior According to this incidence relation, it is possible to more easily unknown program feature and program behavior are analyzed, to update black/white name It is single.
The embodiments of the invention provide a kind of method of pattern detection, compared with the method for existing pattern detection, this hair Bright embodiment is applied to distributed high in the clouds detecting system, and distributed high in the clouds detecting system includes:Multiple single node sandboxs;According to One preset rules determine multiple pending mission bit streams, and multiple pending mission bit streams are sent to shared queue, so Afterwards after at least one request message is received, its each self-corresponding is obtained from shared queue according to each request message Business, and performed respectively as its distribution task by multiple single node sandboxs, the data produced during tasks carrying are obtained, then The data produced during tasks carrying are sent to corresponding database, i.e., are provided with distributed high in the clouds detecting system multiple Single node sandbox, and being distributed for it for task can be performed simultaneously by multiple single node sandboxs, and obtain tasks carrying During the data that produce, and the data of generation can be sent to corresponding database, to realize the detection to sample, due to Sample is detected by multiple single node sandboxs, without manually being detected one by one to substantial amounts of sample, so as to To reduce the cost of pattern detection, and due to performing different tasks simultaneously by multiple single node sandboxs, so as to reduce The time loss of pattern detection, and then the detection efficiency to sample can be improved.
Embodiment two
The alternatively possible implementation of the embodiment of the present invention, on the basis of embodiment one, in addition to embodiment two Performed by shown step 201-202 (not marked in figure), the wherein operation performed by step 203-205 and step 101-103 Operation it is similar, will not be repeated here.
Step 201, state letter is overstock according to the task in the use state information and/or local data base of local resource Breath, task requests are sent to server.
Wherein, task requests are used for server request task information.
For the embodiment of the present invention, Recv process initiations determine the use state information and/or local data of local resource Task in storehouse overstocks status information.In embodiments of the present invention, when the use state information of local resource meets local resource Default use state information, and/or task in local data base overstocks status information and meets default in local data base Task overstocks state, then sends task requests message to server, with to server request task information.
The mission bit stream that step 202, the reception server are returned, and mission bit stream is stored to local data base.
Wherein, if including task data in the mission bit stream, the step of mission bit stream is stored to local data base, tool Body includes:Compression duty data, and the task data after compression is stored to local data base.
For the embodiment of the present invention, Callback process initiations compress all task datas by zip, and by after compression Task data store to local data base.
For the embodiment of the present invention, compress all task datas by zip, and by the task data after compression store to Local data base, i.e., by the way that the data to be stored into local data base are compressed, can save in local data base Memory space.
For the embodiment of the present invention, every preset time Clean Up Database.
, can be every preset time Clean Up Database for the embodiment of the present invention, the database not only includes local data Storehouse, can also be including black list database etc..In embodiments of the present invention, after local data base receives request requests, Return data, and after returning successfully, clean out the data stored in local data base.
, can be expired by what is stored in database by every preset time Clean Up Database for the embodiment of the present invention Data scrubbing is fallen or useless data scrubbing is fallen, so as to avoid data out of date or useless data from taking data The memory space in storehouse, causes data to be stored not store to database, and then can avoid the memory space of database not Sufficient the problem of.
Embodiment three
The alternatively possible implementation of the embodiment of the present invention, on the basis of shown in embodiment one, step 103, general The data produced during tasks carrying are sent to corresponding database, including the step 303-304 shown in embodiment three is (in figure Do not mark), wherein,
Step 303, by the second preset rules, the number of black data is belonged in the data produced during screening tasks carrying According to.
Step 304, the data of black data will be belonged to black data storehouse.
For the embodiment of the present invention, the data produced during tasks carrying be properly termed as identify daily record, scheduling node from Identification daily record is extracted in caching, corresponding module is tasked into identification daily record classification and does parsing and rule judgement, wherein in module Portion is previously provided with various rules.In embodiments of the present invention, specific rule and regular quantity are not limited, normal conditions Lower set rule can reach hundreds of.
For example, when user opens include SWF files on webpage, webpage in a browser, client is automatically waken up to this SWF files are detected, if detecting the SWF files there may be leak, just make a call to a suspicious sample on the SWF files This daily record, includes the signing messages of the SWF files, the source information of the SWF files, the SWF files in the suspicious sample daily record URL addresses, IP address of client etc., and by the suspicious sample daily record upload onto the server end further detected.
Wherein, the corresponding sample of suspicious sample daily record is SWF (English full name:Shock Wave Flash) file is The animation software Flash of Adobe companies professional format, is widely used in the fields such as cartoon making, webpage design;Each Browser application in client can carry out Preliminary detection when running SWF files during opening webpage to the SWF files, When detecting that SWF files there may be security risk, it is uploaded to the relevant information of the SWF files as suspicious sample daily record The suspicious sample daily record of each SWF files includes in server end, this example:The signing messages of the SWF files, the SWF files URL addresses, IP address, uplink time, the source information of the SWF files of client etc. that upload the suspicious sample daily record.Clothes Business device is first passed through in each suspicious sample daily record of comparison after the suspicious sample daily record for the SWF files that each client is uploaded is got SWF files signing messages come to corresponding to identical SWF files suspicious sample daily record carry out duplicate removal;For being remained after duplicate removal Under every suspicious sample daily record, the URL addresses of the SWF files in the suspicious sample daily record are input in sandbox, in sandbox Middle startup browser application, the network request on the corresponding SWF files of the suspicious sample daily record is sent according to the URL addresses, The SWF files are rendered, until rendering completion, middle behavior of the SWF files in render process is recorded, obtained Scan daily record;Judge that the SWF files whether there is leak according to the scanning daily record;It is that then, will indicate that the SWF files have leak Warning message send into the client of the suspicious sample daily records of all upload SWF files, can be with the warning message Comprising upload the SWF files suspicious sample daily record client quantity, upload the suspicious sample daily record of the SWF files most Early uplink time, the source information of the SWF files, reparation service packs of the leak of the SWF files etc. understand for corresponding client The information of the leak of the SWF files;Otherwise, it will indicate that Hole Detection results of the SWF in the absence of leak is sent to all to upload In the client of the suspicious sample daily record of the SWF files, and the unique mark (such as signing messages) of the SWF files is remembered Record, when next time gets the suspicious sample daily record of the SWF files from client again, directly by the Hole Detection knot of the SWF files Fruit is back to corresponding client.
For the embodiment of the present invention, by setting rule, carrying out judgement using rule can quickly solve because of rogue program Various entity mutation, the uncertainty brought of behavior mutation cause the problem of fail-safe software killing rate declines.Specifically, advise Function is then set to may include the parts such as language description, visualization rule editing interface, speech analyser, Dynamic Matching device.Language Description is returned after containing regular type, rule numbers, rule ID, random fit ratio, the limitation of matching maximum times, matching Value and matching condition group.Matching condition group comprising multiple matching conditions with or, non-programmed combination.Each matching condition bag Containing matching keywords, three parts of matching operation symbol and matching target data.
For the embodiment of the present invention, by carrying out class to the data produced during tasks carrying according to the second preset rules Do not distinguish, and the data after differentiation are sent to corresponding database, can quickly solve the various realities because of rogue program The uncertainty that body mutation, behavior mutation are brought causes the problem of fail-safe software killing rate declines.
For the embodiment of the present invention, distributed high in the clouds detecting system is obtained after identification daily record, and scheduling node is to identification day Will is cached, while scheduling node stores buffered identification daily record into Hadoop group systems.
For the embodiment of the present invention, every preset time Clean Up Database.
For the embodiment of the present invention, distributed high in the clouds detecting system includes monitoring port Cubestone, can be to whole point Cloth cloud sandbox system is monitored.In embodiments of the present invention, Cubestone provides the monitoring of all tasks of schedule, for example Accuracy of process performance, mission failure rate and task result etc..
The embodiments of the invention provide the method for another pattern detection, by every preset time Clean Up Database, energy Enough the stale data stored in database is cleaned out or useless data scrubbing is fallen, so as to avoid data out of date Or useless data take the memory space of database, cause data to be stored not store to database, and then can be with The problem of avoiding the memory space inadequate of database;Compress all task datas by zip, and by the task data after compression Store to local data base, i.e., by the way that the data to be stored into local data base are compressed, local data can be saved Memory space in storehouse;By carrying out class discrimination to the data produced during tasks carrying according to the second preset rules, and Data after differentiation are sent to corresponding database, various entity mutation because of rogue program, OK can be quickly solved The uncertainty brought by mutation causes the problem of fail-safe software killing rate declines.
The embodiments of the invention provide a kind of distributed high in the clouds by detecting system, as shown in Fig. 2 the distributed high in the clouds detection System includes:Sandbox cluster inlet module 21, single node sandbox module 22, the distributed storage cluster module 23 of expansible type; Wherein,
Sandbox cluster inlet module 21, for determining multiple pending mission bit streams according to the first preset rules;To be many Individual pending mission bit stream is sent to shared queue;After at least one request message is received, according to each request message Its each self-corresponding mission bit stream is obtained from shared queue.
Single node sandbox module 22, for performing being distributed for it for task respectively by multiple single node sandboxs, must take office The data produced in business implementation procedure.
The distributed storage cluster module 23 of expansible type, is additionally operable to during the tasks carrying of single node sandbox module 21 The data of generation are sent to corresponding database.
Single node sandbox module 22, the mission bit stream specifically for reading highest priority;Determine appointing for highest priority Whether specific sample is included in information of being engaged in;When comprising specific sample, specific parametric environmental is modified;Work as amendment After finishing, the parameter configuration in the service condition and mission bit stream of Current resource determines to perform the task;When After the tasks carrying is finished, corresponding task status is changed.
Single node sandbox module 22, is specifically additionally operable to if it is determined that perform the task, then run the task in virtual machine, And by the data storage produced in operation to local disk.
Single node sandbox module 22, is specifically additionally operable in the mission bit stream when highest priority not include specific sample, When only including md5 identifiers, corresponding sample is downloaded according to md5 identifiers;According to the task number being currently executing, it is determined that Whether execution comprising download module download the download sample task;When it is determined that performing the task comprising the download sample, The download sample downloaded according to download module, generates the specifying information for including task in json files, json files;According to appoint The specifying information of business, generates the report of specified format;Change corresponding task status.
Further, as shown in Fig. 2 distributed high in the clouds detecting system also includes:Single node sandbox request of data and money Source cleaning module 24.
Single node sandbox request of data and resource cleaning modul 24, for the use state information according to local resource And/or the task in local data base overstocks status information, task requests are sent to server, task requests are used for server Request task information;The mission bit stream that the reception server is returned;Mission bit stream is stored to local data base.
The distributed storage cluster module 23 of expansible type, specifically for by the second preset rules, screening tasks carrying During belong to the data of black data in the data that produce, and the data of black data will be belonged to black data storehouse.
Single node sandbox request of data and resource cleaning modul 24, are additionally operable to every preset time, Clean Up Database.
Further, as shown in Fig. 2 distributed high in the clouds detecting system also includes:Distributed high in the clouds detecting system monitors mould Block 25.
Distributed high in the clouds detecting system monitoring modular 25, for monitoring sandbox cluster inlet module 21, single node sandbox mould Block 22, the distributed storage cluster module 23 of expansible type and single node sandbox request of data and resource cleaning modul 24.
The embodiments of the invention provide a kind of distributed high in the clouds detecting system, compared with the device of existing pattern detection, Multiple pending mission bit streams are determined according to the first preset rules, and multiple pending mission bit streams are sent to shared team Row, then after at least one request message is received, its each correspondence is obtained according to each request message from shared queue Task, and performed respectively as its distribution task by multiple single node sandboxs, obtain the data produced during tasks carrying, Then the data produced during tasks carrying are sent into corresponding database, i.e. distribution high in the clouds detecting system and be provided with Multiple single node sandboxs, and being distributed for it for task can be performed simultaneously by multiple single node sandboxs, and obtain task The data produced in implementation procedure, and the data of generation can be sent to corresponding database, to realize the detection to sample, Due to being detected by multiple single node sandboxs to sample, without manually being detected one by one to substantial amounts of sample, from And the cost of pattern detection can be reduced, and due to performing different tasks simultaneously by multiple single node sandboxs, so as to The time loss of pattern detection is reduced, and then the detection efficiency to sample can be improved.
Distributed high in the clouds detecting system provided in an embodiment of the present invention goes for above method embodiment.Herein no longer Repeat.
The embodiment of the present invention additionally provides a kind of terminal device, as shown in figure 3, for convenience of description, illustrate only and this The related part of inventive embodiments, particular technique details is not disclosed, refer to present invention method part.The terminal is set Standby can be to include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS Any terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, so that device is mobile phone as an example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure 3, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 310, memory 320, input block 330, display unit 340, Sensor 350, voicefrequency circuit 360, Wireless Fidelity (wireless fidelity, WiFi) module 370, processor 380 and The grade part of power supply 390.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 does not constitute the restriction to mobile phone, It can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 3:
RF circuits 310 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, handled to processor 380;In addition, being sent to base station by up data are designed.Generally, RF circuits 310 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 310 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 320 can be used for storage software program and module, and processor 380 is stored in memory 320 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 320 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored uses what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..In addition, memory 320 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 330 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 330 may include that contact panel 331 and other inputs are set Standby 332.Contact panel 331, also referred to as touch-screen, collecting touch operation of the user on or near it, (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 331 or near contact panel 331), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 331 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 380, and the order sent of reception processing device 380 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 331.Except contact panel 331, input Unit 330 can also include other input equipments 332.Specifically, other input equipments 332 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 340 can be used for the various of the information that is inputted by user of display or the information for being supplied to user and mobile phone Menu.Display unit 340 may include display panel 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 341.Further, contact panel 331 can cover display panel 341, when contact panel 331 is detected thereon or attached After near touch operation, processor 380 is sent to determine the type of touch event, with preprocessor 380 according to touch event Type corresponding visual output is provided on display panel 341.Although in figure 3, contact panel 331 and display panel 341 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 331 and the input that is integrated and realizing mobile phone of display panel 341 and output function.
Mobile phone may also include at least one sensor 350, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 341, proximity transducer can close display panel 341 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) acceleration Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 360, loudspeaker 361, microphone 362 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 361, sound is converted to by loudspeaker 361 by road 360 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 362, by voicefrequency circuit 360 receive after turn It is changed to voice data, then after voice data output processor 380 is handled, through RF circuits 310 to be sent to such as another mobile phone, Or export voice data to memory 320 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 370 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 3 is shown WiFi module 370, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 380 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform and be stored in software program and/or module in memory 320, and call and be stored in memory 320 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 380 can be wrapped Include one or more processing units;It is preferred that, processor 380 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 380.
Mobile phone also includes the power supply 390 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 380 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the processor 380 included by the device also has following functions:
Multiple pending mission bit streams are determined according to the first preset rules, and multiple pending mission bit streams are sent To shared queue;
After at least one request message is received, its each correspondence is obtained from shared queue according to each request message Mission bit stream, and perform being distributed for it for task respectively by multiple single node sandboxs, obtain generation during tasks carrying Data;
The data produced during tasks carrying are sent to corresponding database.
The embodiments of the invention provide a kind of terminal device, compared with the method for existing pattern detection, the present invention is implemented Example is applied to distributed high in the clouds detecting system, and distributed high in the clouds detecting system includes:Multiple single node sandboxs;It is default according to first Rule determines multiple pending mission bit streams, and multiple pending mission bit streams are sent to shared queue, then when connecing Receive after at least one request message, its each self-corresponding task is obtained from shared queue according to each request message, and lead to Cross multiple single node sandboxs to perform respectively as its distribution task, the data produced during tasks carrying are obtained, then by task The data produced in implementation procedure are sent is provided with multiple single nodes into corresponding database, i.e. distribution high in the clouds detecting system Sandbox, and can perform being distributed for it for task simultaneously by multiple single node sandboxs, and during obtaining tasks carrying The data of generation, and the data of generation can be sent to corresponding database, to realize the detection to sample, due to by many Individual single node sandbox is detected to sample, without manually being detected one by one to substantial amounts of sample, so as to reduce The cost of pattern detection, and due to performing different tasks simultaneously by multiple single node sandboxs, so as to reduce sample inspection The time loss of survey, and then the detection efficiency to sample can be improved.
Terminal device provided in an embodiment of the present invention goes for above method embodiment.It will not be repeated here.
Those skilled in the art of the present technique are appreciated that the present invention includes being related to for performing in operation described herein One or more of equipment.These equipment can be for needed for purpose and specially design and manufacture, or can also include general Known device in computer.These equipment have the computer program being stored in it, and these computer programs are optionally Activation is reconstructed.Such computer program can be stored in equipment (for example, computer) computer-readable recording medium or be stored in E-command and it is coupled to respectively in any kind of medium of bus suitable for storage, the computer-readable medium is included but not Be limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, only Read memory), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable ProgrammableRead-Only Memory, EEPROM), flash memory, magnetic card or light card. It is, computer-readable recording medium includes any medium for storing or transmitting information in the form of it can read by equipment (for example, computer).
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or The combination of each frame and these structure charts and/or the frame in block diagram and/or flow graph in block diagram and/or flow graph.This technology is led Field technique personnel be appreciated that these computer program instructions can be supplied to all-purpose computer, special purpose computer or other The processor of programmable data processing method is realized, so as to pass through the processing of computer or other programmable data processing methods The scheme that device is specified in the frame or multiple frames to perform structure chart disclosed by the invention and/or block diagram and/or flow graph.
Those skilled in the art of the present technique are appreciated that in the various operations discussed in the present invention, method, flow Step, measure, scheme can be replaced, changed, combined or deleted.Further, it is each with what is discussed in the present invention Kind operation, method, other steps in flow, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted. Further, it is of the prior art to have and the step in the various operations disclosed in the present invention, method, flow, measure, scheme It can also be replaced, changed, reset, decomposed, combined or deleted.
Described above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method of pattern detection, applied to distributed high in the clouds detecting system, it is characterised in that the distributed high in the clouds inspection Examining system includes:Multiple single node sandboxs;Methods described includes:
Multiple pending mission bit streams are determined according to the first preset rules, and the multiple pending mission bit stream is sent To shared queue;
After at least one request message is received, its each correspondence is obtained from the shared queue according to each request message Mission bit stream, and perform being distributed for it for task respectively by multiple single node sandboxs, obtain generation during tasks carrying Data;
The data produced during the tasks carrying are sent to corresponding database.
2. according to the method described in claim 1, it is characterised in that the mode that single node sandbox performs task includes:
Read the mission bit stream of highest priority;
Determine whether include specific sample in the mission bit stream of the highest priority;
If comprising specific sample, being modified to specific parametric environmental;
After amendment is finished, the parameter configuration in the service condition and mission bit stream of Current resource determines to hold The row task;
After the tasks carrying is finished, corresponding task status is changed.
3. method according to claim 2, it is characterised in that the service condition and task according to Current resource After the step of parameter configuration in information determines to perform the task, in addition to:
If it is determined that performing the task, then the task is run in virtual machine, and by the data storage produced in operation to local Disk.
4. according to the method in claim 2 or 3, it is characterised in that the mission bit stream for determining the highest priority In whether include specific sample the step of after, in addition to:
If not including specific sample in the mission bit stream of the highest priority, only comprising md5 identifiers, then according to described Md5 identifiers download corresponding sample;
According to the task number being currently executing, it is determined whether perform the including the download sample of the task;
If it is determined that performing the including the download sample of the task, then according to the download sample, json files, the json files are generated In include the specifying information of task;
According to the specifying information of the task, the report of specified format is generated, and changes corresponding task status.
5. according to the method described in claim 1, it is characterised in that methods described also includes:
Task in the use state information and/or local data base of local resource overstocks status information, is sent out to server Task requests are sent, the task requests are used for server request task information;
The mission bit stream that the server is returned is received, and the mission bit stream is stored to local data base.
6. according to the method described in claim 1, it is characterised in that described to send out the data produced during the tasks carrying The step of delivering to corresponding database, including:
By the second preset rules, the data for belonging to black data in the data produced during the tasks carrying are screened, and will The data for belonging to black data are to black data storehouse.
7. method according to claim 6, it is characterised in that methods described also includes:
Every preset time, Clean Up Database.
8. a kind of distributed high in the clouds detecting system, it is characterised in that including:
Sandbox cluster inlet module, for determining multiple pending mission bit streams according to the first preset rules;Will be the multiple Pending mission bit stream is sent to shared queue;After at least one request message is received, according to each request message from Its each self-corresponding mission bit stream is obtained in the shared queue;
Single node sandbox module, for performing being distributed for it for task respectively by multiple single node sandboxs, obtains tasks carrying During the data that produce;
The distributed storage cluster module of expansible type, is additionally operable to produce in the single node sandbox module design task implementation procedure Data send to corresponding database.
9. distributed high in the clouds detecting system according to claim 8, it is characterised in that
The single node sandbox module, the mission bit stream specifically for reading highest priority;Determine the highest priority Whether specific sample is included in mission bit stream;When comprising specific sample, specific parametric environmental is modified;When repairing After just finishing, the parameter configuration in the service condition and mission bit stream of Current resource determines to perform the task; After the tasks carrying is finished, corresponding task status is changed.
10. a kind of terminal device, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that the pattern detection described in claim any one of 1-7 is realized during the computing device described program Method.
CN201710453830.3A 2017-06-15 2017-06-15 The method of terminal device, distributed high in the clouds detecting system and pattern detection Pending CN107171894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710453830.3A CN107171894A (en) 2017-06-15 2017-06-15 The method of terminal device, distributed high in the clouds detecting system and pattern detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710453830.3A CN107171894A (en) 2017-06-15 2017-06-15 The method of terminal device, distributed high in the clouds detecting system and pattern detection

Publications (1)

Publication Number Publication Date
CN107171894A true CN107171894A (en) 2017-09-15

Family

ID=59819632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710453830.3A Pending CN107171894A (en) 2017-06-15 2017-06-15 The method of terminal device, distributed high in the clouds detecting system and pattern detection

Country Status (1)

Country Link
CN (1) CN107171894A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021400A (en) * 2017-11-29 2018-05-11 腾讯科技(深圳)有限公司 Data processing method and device, computer-readable storage medium and equipment
CN108040110A (en) * 2017-12-11 2018-05-15 国网宁夏电力有限公司信息通信公司 A kind of mobile data safety means of defence based on security sandbox
CN108377263A (en) * 2018-02-02 2018-08-07 北京杰思安全科技有限公司 Adaptive private clound sandbox setting method, equipment and medium
CN108429754A (en) * 2018-03-19 2018-08-21 深信服科技股份有限公司 A kind of high in the clouds Distributed Detection method, system and relevant apparatus
CN108874617A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 Detection task distributing method, device, electronic equipment and storage medium
CN108881150A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 A kind of processing method of Detection task, device, electronic equipment and storage medium
CN110247934A (en) * 2019-07-15 2019-09-17 杭州安恒信息技术股份有限公司 The method and system of internet-of-things terminal abnormality detection and response
CN113132324A (en) * 2019-12-31 2021-07-16 奇安信科技集团股份有限公司 Sample identification method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692267A (en) * 2009-09-15 2010-04-07 北京大学 Method and system for detecting large-scale malicious web pages
CN103685251A (en) * 2013-12-04 2014-03-26 电子科技大学 Android malicious software detecting platform oriented to mobile internet
CN104766007A (en) * 2015-03-27 2015-07-08 杭州安恒信息技术有限公司 Method for quickly recovering sandbox based on file system filter driver
CN105453097A (en) * 2013-05-31 2016-03-30 微软技术许可有限责任公司 Restricted driver platform runs drivers in sandbox in user mode
CN105760755A (en) * 2016-02-24 2016-07-13 浪潮通用软件有限公司 Visual Studio extension pack isolation method
CN106557355A (en) * 2016-12-01 2017-04-05 北京奇虎科技有限公司 The generation method and generating means of virtual machine image
CN106650423A (en) * 2016-11-28 2017-05-10 北京奇虎科技有限公司 Object sample file detecting method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692267A (en) * 2009-09-15 2010-04-07 北京大学 Method and system for detecting large-scale malicious web pages
CN105453097A (en) * 2013-05-31 2016-03-30 微软技术许可有限责任公司 Restricted driver platform runs drivers in sandbox in user mode
CN103685251A (en) * 2013-12-04 2014-03-26 电子科技大学 Android malicious software detecting platform oriented to mobile internet
CN104766007A (en) * 2015-03-27 2015-07-08 杭州安恒信息技术有限公司 Method for quickly recovering sandbox based on file system filter driver
CN105760755A (en) * 2016-02-24 2016-07-13 浪潮通用软件有限公司 Visual Studio extension pack isolation method
CN106650423A (en) * 2016-11-28 2017-05-10 北京奇虎科技有限公司 Object sample file detecting method and device
CN106557355A (en) * 2016-12-01 2017-04-05 北京奇虎科技有限公司 The generation method and generating means of virtual machine image

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021400A (en) * 2017-11-29 2018-05-11 腾讯科技(深圳)有限公司 Data processing method and device, computer-readable storage medium and equipment
CN108021400B (en) * 2017-11-29 2022-03-29 腾讯科技(深圳)有限公司 Data processing method and device, computer storage medium and equipment
CN108040110A (en) * 2017-12-11 2018-05-15 国网宁夏电力有限公司信息通信公司 A kind of mobile data safety means of defence based on security sandbox
CN108040110B (en) * 2017-12-11 2020-10-27 国网宁夏电力有限公司信息通信公司 Mobile data security protection method based on security sandbox
CN108874617B (en) * 2017-12-29 2021-09-21 北京安天网络安全技术有限公司 Detection task distribution method and device, electronic equipment and storage medium
CN108874617A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 Detection task distributing method, device, electronic equipment and storage medium
CN108881150A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 A kind of processing method of Detection task, device, electronic equipment and storage medium
CN108881150B (en) * 2017-12-29 2021-03-23 北京安天网络安全技术有限公司 Detection task processing method and device, electronic equipment and storage medium
CN108377263A (en) * 2018-02-02 2018-08-07 北京杰思安全科技有限公司 Adaptive private clound sandbox setting method, equipment and medium
CN108429754A (en) * 2018-03-19 2018-08-21 深信服科技股份有限公司 A kind of high in the clouds Distributed Detection method, system and relevant apparatus
CN110247934A (en) * 2019-07-15 2019-09-17 杭州安恒信息技术股份有限公司 The method and system of internet-of-things terminal abnormality detection and response
CN113132324A (en) * 2019-12-31 2021-07-16 奇安信科技集团股份有限公司 Sample identification method and system
CN113132324B (en) * 2019-12-31 2023-04-28 奇安信科技集团股份有限公司 Sample identification method and system

Similar Documents

Publication Publication Date Title
CN107171894A (en) The method of terminal device, distributed high in the clouds detecting system and pattern detection
US20160241589A1 (en) Method and apparatus for identifying malicious website
US8005943B2 (en) Performance monitoring of network applications
CN105553769A (en) Data collecting-analyzing system and method
CN108345543B (en) Data processing method, device, equipment and storage medium
CN103336925B (en) A kind of method and apparatus scanning acceleration
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
CN107908952B (en) Method and device for identifying real machine and simulator and terminal
CN106709346A (en) File processing method and device
CN104298686B (en) The method and apparatus for modifying server profile
CN105516321A (en) Data acquisition method and device
CN107229618A (en) A kind of method and device for showing the page
CN113254320A (en) Method and device for recording user webpage operation behaviors
CN107918529A (en) Image processing method and device, computer equipment, computer-readable recording medium
CN105653589A (en) Information processing method and device
CN111510557A (en) Content processing method and electronic equipment
CN109246233A (en) Data processing method, device, equipment and storage medium based on on-line monitoring
CN115398861B (en) Abnormal file detection method and related product
CN103618761B (en) Method and browser for processing cookie information
CN105373715A (en) Wearable device based data access method and apparatus
CN116861198A (en) Data processing method, device and storage medium
CN105978749A (en) Monitoring method of computer hardware information in local area network and system thereof
CN115203194A (en) Metadata information generation method, related device, equipment and storage medium
CN109992614B (en) Data acquisition method, device and server
CN114490307A (en) Unit testing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915

RJ01 Rejection of invention patent application after publication