CN108073808A - 基于pdb调试信息生成攻击者画像的方法及系统 - Google Patents
基于pdb调试信息生成攻击者画像的方法及系统 Download PDFInfo
- Publication number
- CN108073808A CN108073808A CN201711392050.9A CN201711392050A CN108073808A CN 108073808 A CN108073808 A CN 108073808A CN 201711392050 A CN201711392050 A CN 201711392050A CN 108073808 A CN108073808 A CN 108073808A
- Authority
- CN
- China
- Prior art keywords
- attacker
- attack
- pdb
- information
- pdb files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711392050.9A CN108073808B (zh) | 2017-12-21 | 2017-12-21 | 基于pdb调试信息生成攻击者画像的方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711392050.9A CN108073808B (zh) | 2017-12-21 | 2017-12-21 | 基于pdb调试信息生成攻击者画像的方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108073808A true CN108073808A (zh) | 2018-05-25 |
CN108073808B CN108073808B (zh) | 2021-10-15 |
Family
ID=62158757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711392050.9A Active CN108073808B (zh) | 2017-12-21 | 2017-12-21 | 基于pdb调试信息生成攻击者画像的方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108073808B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881294A (zh) * | 2018-07-23 | 2018-11-23 | 杭州安恒信息技术股份有限公司 | 基于网络攻击行为的攻击源ip画像生成方法以及装置 |
CN108924163A (zh) * | 2018-08-14 | 2018-11-30 | 成都信息工程大学 | 基于无监督学习的攻击者画像方法及系统 |
CN109388946A (zh) * | 2018-09-28 | 2019-02-26 | 珠海市君天电子科技有限公司 | 恶意进程检测方法、装置、电子设备及存储介质 |
CN109729095A (zh) * | 2019-02-13 | 2019-05-07 | 北京奇安信科技有限公司 | 数据处理方法、装置和计算设备及介质 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090126014A1 (en) * | 2002-10-21 | 2009-05-14 | Versign, Inc. | Methods and systems for analyzing security events |
CN102332072A (zh) * | 2010-11-01 | 2012-01-25 | 卡巴斯基实验室封闭式股份公司 | 用于检测恶意软件和管理恶意软件相关信息的系统和方法 |
US20140165204A1 (en) * | 2010-03-19 | 2014-06-12 | Aspect Security Inc. | Detection of vulnerabilities in computer systems |
US20150120780A1 (en) * | 2013-10-30 | 2015-04-30 | Oracle International Corporation | System and method for integrating a database with a service deployed on a cloud platform |
CN104601591A (zh) * | 2015-02-02 | 2015-05-06 | 中国人民解放军国防科学技术大学 | 网络攻击源组织检测方法 |
CN105488405A (zh) * | 2014-12-25 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | 一种基于pdb调试信息的恶意代码分析方法及系统 |
CN105653940A (zh) * | 2015-07-14 | 2016-06-08 | 哈尔滨安天科技股份有限公司 | 一种基于pe文件分析攻击者来源的方法及系统 |
CN105991638A (zh) * | 2015-07-08 | 2016-10-05 | 北京匡恩网络科技有限责任公司 | 一种网络攻击路径分析与生成方法及系统 |
US20170111365A1 (en) * | 2015-10-15 | 2017-04-20 | Oracle International Corporation | Operating-system-level isolation of multi-tenant applications |
CN106909847A (zh) * | 2017-02-17 | 2017-06-30 | 国家计算机网络与信息安全管理中心 | 一种恶意代码检测的方法、装置及系统 |
-
2017
- 2017-12-21 CN CN201711392050.9A patent/CN108073808B/zh active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090126014A1 (en) * | 2002-10-21 | 2009-05-14 | Versign, Inc. | Methods and systems for analyzing security events |
US20140165204A1 (en) * | 2010-03-19 | 2014-06-12 | Aspect Security Inc. | Detection of vulnerabilities in computer systems |
CN102332072A (zh) * | 2010-11-01 | 2012-01-25 | 卡巴斯基实验室封闭式股份公司 | 用于检测恶意软件和管理恶意软件相关信息的系统和方法 |
US20150120780A1 (en) * | 2013-10-30 | 2015-04-30 | Oracle International Corporation | System and method for integrating a database with a service deployed on a cloud platform |
CN105488405A (zh) * | 2014-12-25 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | 一种基于pdb调试信息的恶意代码分析方法及系统 |
CN104601591A (zh) * | 2015-02-02 | 2015-05-06 | 中国人民解放军国防科学技术大学 | 网络攻击源组织检测方法 |
CN105991638A (zh) * | 2015-07-08 | 2016-10-05 | 北京匡恩网络科技有限责任公司 | 一种网络攻击路径分析与生成方法及系统 |
CN105653940A (zh) * | 2015-07-14 | 2016-06-08 | 哈尔滨安天科技股份有限公司 | 一种基于pe文件分析攻击者来源的方法及系统 |
US20170111365A1 (en) * | 2015-10-15 | 2017-04-20 | Oracle International Corporation | Operating-system-level isolation of multi-tenant applications |
CN106909847A (zh) * | 2017-02-17 | 2017-06-30 | 国家计算机网络与信息安全管理中心 | 一种恶意代码检测的方法、装置及系统 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881294A (zh) * | 2018-07-23 | 2018-11-23 | 杭州安恒信息技术股份有限公司 | 基于网络攻击行为的攻击源ip画像生成方法以及装置 |
CN108924163A (zh) * | 2018-08-14 | 2018-11-30 | 成都信息工程大学 | 基于无监督学习的攻击者画像方法及系统 |
CN109388946A (zh) * | 2018-09-28 | 2019-02-26 | 珠海市君天电子科技有限公司 | 恶意进程检测方法、装置、电子设备及存储介质 |
CN109388946B (zh) * | 2018-09-28 | 2022-02-25 | 珠海豹趣科技有限公司 | 恶意进程检测方法、装置、电子设备及存储介质 |
CN109729095A (zh) * | 2019-02-13 | 2019-05-07 | 北京奇安信科技有限公司 | 数据处理方法、装置和计算设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN108073808B (zh) | 2021-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10560471B2 (en) | Detecting web exploit kits by tree-based structural similarity search | |
Al-Asli et al. | Review of signature-based techniques in antivirus products | |
CN108073808A (zh) | 基于pdb调试信息生成攻击者画像的方法及系统 | |
Xu et al. | A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms | |
Luo et al. | Position-based automatic reverse engineering of network protocols | |
Haddadi et al. | Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification | |
US9256831B2 (en) | Match engine for detection of multi-pattern rules | |
US20050251570A1 (en) | Intrusion detection system | |
Tang et al. | Signature tree generation for polymorphic worms | |
Krueger et al. | ASAP: Automatic semantics-aware analysis of network payloads | |
CN110177114A (zh) | 网络安全威胁指标识别方法、设备、装置以及计算机可读存储介质 | |
CN113194058B (zh) | Web攻击检测方法、设备、网站应用层防火墙及介质 | |
CN104954345B (zh) | 基于对象分析的攻击识别方法及装置 | |
Wang et al. | An evolutionary study of IoT malware | |
Rene et al. | Malicious code intrusion detection using machine learning and indicators of compromise | |
CN110417768A (zh) | 一种僵尸网络的跟踪方法及装置 | |
Zhang et al. | A php and jsp web shell detection system with text processing based on machine learning | |
Aldwairi et al. | n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems | |
CN106528805B (zh) | 基于用户的移动互联网恶意程序url智能分析挖掘方法 | |
Mohammed et al. | HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis | |
Weng et al. | Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system | |
CN109194605A (zh) | 一种基于开源信息的可疑威胁指标主动验证方法和系统 | |
CN112507336A (zh) | 基于代码特征和流量行为的服务端恶意程序检测方法 | |
Paul et al. | Survey of polymorphic worm signatures | |
Sunkari et al. | Preventing input type validation vulnerabilities using network based intrusion detection systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin Hi-tech Industrial Development Zone, Harbin, Heilongjiang Province (838 Shikun Road) Applicant after: Harbin antiy Technology Group Limited by Share Ltd Address before: 150090 Room 506, No. 162 Hongqi Street, Nangang District, Harbin Development Zone, Heilongjiang Province Applicant before: Harbin Antiy Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Heilongjiang Province (No. 838, Shikun Road) Applicant after: Antan Technology Group Co.,Ltd. Address before: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Harbin, Heilongjiang Province (No. 838, Shikun Road) Applicant before: Harbin Antian Science and Technology Group Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |