CN108768934B - 恶意程序发布检测方法、装置以及介质 - Google Patents
恶意程序发布检测方法、装置以及介质 Download PDFInfo
- Publication number
- CN108768934B CN108768934B CN201810322481.6A CN201810322481A CN108768934B CN 108768934 B CN108768934 B CN 108768934B CN 201810322481 A CN201810322481 A CN 201810322481A CN 108768934 B CN108768934 B CN 108768934B
- Authority
- CN
- China
- Prior art keywords
- malicious
- information
- suspicious
- network
- summary information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 claims abstract description 32
- 230000000977 initiatory effect Effects 0.000 claims abstract description 9
- 238000010586 diagram Methods 0.000 claims description 33
- 238000012545 processing Methods 0.000 claims description 24
- 238000012549 training Methods 0.000 claims description 15
- 238000000605 extraction Methods 0.000 claims description 11
- 238000012360 testing method Methods 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 7
- 230000000694 effects Effects 0.000 abstract description 10
- 230000007246 mechanism Effects 0.000 abstract description 4
- 238000013480 data collection Methods 0.000 description 10
- 238000007781 pre-processing Methods 0.000 description 6
- 239000000284 extract Substances 0.000 description 5
- 238000010801 machine learning Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 235000012907 honey Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810322481.6A CN108768934B (zh) | 2018-04-11 | 2018-04-11 | 恶意程序发布检测方法、装置以及介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810322481.6A CN108768934B (zh) | 2018-04-11 | 2018-04-11 | 恶意程序发布检测方法、装置以及介质 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108768934A CN108768934A (zh) | 2018-11-06 |
CN108768934B true CN108768934B (zh) | 2021-09-07 |
Family
ID=63981458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810322481.6A Expired - Fee Related CN108768934B (zh) | 2018-04-11 | 2018-04-11 | 恶意程序发布检测方法、装置以及介质 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108768934B (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109670317B (zh) * | 2018-12-24 | 2021-02-02 | 中国科学院软件研究所 | 一种基于原子控制流图的物联网设备继承性漏洞挖掘方法 |
CN110012013A (zh) * | 2019-04-04 | 2019-07-12 | 电子科技大学成都学院 | 一种基于knn的虚拟平台威胁行为分析方法及系统 |
CN111177717A (zh) * | 2019-06-21 | 2020-05-19 | 腾讯科技(深圳)有限公司 | 一种恶意进程的识别方法、装置、电子设备和存储介质 |
CN111126440B (zh) * | 2019-11-25 | 2023-12-22 | 广州大学 | 一种基于深度学习的一体化工控蜜罐识别系统及方法 |
CN112565274A (zh) * | 2020-12-11 | 2021-03-26 | 国家计算机网络与信息安全管理中心江苏分中心 | 一种智能识别恶意app的方法及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350053A (zh) * | 2007-10-15 | 2009-01-21 | 北京瑞星国际软件有限公司 | 防止网页浏览器被漏洞利用的方法和装置 |
CN102984162A (zh) * | 2012-12-05 | 2013-03-20 | 北京奇虎科技有限公司 | 可信网站的识别方法和收集系统 |
CN103390129A (zh) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | 检测统一资源定位符安全性的方法和装置 |
CN103701779A (zh) * | 2013-12-13 | 2014-04-02 | 北京神州绿盟信息安全科技股份有限公司 | 一种二次访问网站的方法、装置及防火墙设备 |
CN104067280A (zh) * | 2011-10-18 | 2014-09-24 | 迈可菲公司 | 用于检测恶意命令和控制通道的系统和方法 |
CN106411879A (zh) * | 2016-09-23 | 2017-02-15 | 北京网康科技有限公司 | 一种软件识别特征的获取方法和装置 |
US9888019B1 (en) * | 2013-06-28 | 2018-02-06 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
-
2018
- 2018-04-11 CN CN201810322481.6A patent/CN108768934B/zh not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350053A (zh) * | 2007-10-15 | 2009-01-21 | 北京瑞星国际软件有限公司 | 防止网页浏览器被漏洞利用的方法和装置 |
CN104067280A (zh) * | 2011-10-18 | 2014-09-24 | 迈可菲公司 | 用于检测恶意命令和控制通道的系统和方法 |
CN103390129A (zh) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | 检测统一资源定位符安全性的方法和装置 |
CN102984162A (zh) * | 2012-12-05 | 2013-03-20 | 北京奇虎科技有限公司 | 可信网站的识别方法和收集系统 |
US9888019B1 (en) * | 2013-06-28 | 2018-02-06 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
CN103701779A (zh) * | 2013-12-13 | 2014-04-02 | 北京神州绿盟信息安全科技股份有限公司 | 一种二次访问网站的方法、装置及防火墙设备 |
CN106411879A (zh) * | 2016-09-23 | 2017-02-15 | 北京网康科技有限公司 | 一种软件识别特征的获取方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
CN108768934A (zh) | 2018-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768934B (zh) | 恶意程序发布检测方法、装置以及介质 | |
Lashkari et al. | Towards a network-based framework for android malware detection and characterization | |
US10560471B2 (en) | Detecting web exploit kits by tree-based structural similarity search | |
US10855700B1 (en) | Post-intrusion detection of cyber-attacks during lateral movement within networks | |
Rafique et al. | Firma: Malware clustering and network signature generation with mixed network behaviors | |
Zhang et al. | Arrow: Generating signatures to detect drive-by downloads | |
US10721244B2 (en) | Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program | |
US9178901B2 (en) | Malicious uniform resource locator detection | |
CN109074454B (zh) | 基于赝象对恶意软件自动分组 | |
Kim et al. | Detecting fake anti-virus software distribution webpages | |
WO2013130867A1 (en) | Method and apparatus for retroactively detecting malicious or otherwise undesirable software | |
WO2018076697A1 (zh) | 僵尸特征的检测方法和装置 | |
Agrawal et al. | A survey on android malware and their detection techniques | |
US20160142432A1 (en) | Resource classification using resource requests | |
CN103618626A (zh) | 一种基于日志的安全分析报告生成的方法和系统 | |
Wu et al. | Detect repackaged android application based on http traffic similarity | |
Mohaisen | Towards automatic and lightweight detection and classification of malicious web contents | |
Canfora et al. | Detection of malicious web pages using system calls sequences | |
Su et al. | Suspicious URL filtering based on logistic regression with multi-view analysis | |
Li et al. | A method based on statistical characteristics for detection malware requests in network traffic | |
Gomez et al. | Unsupervised detection and clustering of malicious tls flows | |
Leita et al. | Exploiting diverse observation perspectives to get insights on the malware landscape | |
CN103561076B (zh) | 一种基于云的网页挂马实时防护方法及系统 | |
US9160765B1 (en) | Method for securing endpoints from onslaught of network attacks | |
JP2016525750A (ja) | 合法的オブジェクトの誤用の識別 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211124 Address after: 310051 building 3, 351 Changhe Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou rischen Anke Technology Co.,Ltd. Address before: 100192 b407, block B, science and technology wealth center, 8 Xueqing Road, Haidian District, Beijing Patentee before: BEIJING LANXUM NEW TECHNOLOGY Co.,Ltd. Patentee before: HANGZHOU GUYI NETWORK TECHNOLOGY CO.,LTD. |
|
TR01 | Transfer of patent right | ||
CP03 | Change of name, title or address |
Address after: Room 817-7, Building 1, No. 371, Mingxing Road, Economic and Technological Development Zone, Xiaoshan District, Hangzhou City, Zhejiang Province, 311215 Patentee after: Hangzhou Zhongdian Anke Modern Technology Co.,Ltd. Address before: 310051 building 3, 351 Changhe Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee before: Hangzhou rischen Anke Technology Co.,Ltd. |
|
CP03 | Change of name, title or address | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210907 |
|
CF01 | Termination of patent right due to non-payment of annual fee |