CN109145599B - Protection method for malicious viruses - Google Patents

Protection method for malicious viruses Download PDF

Info

Publication number
CN109145599B
CN109145599B CN201710503889.9A CN201710503889A CN109145599B CN 109145599 B CN109145599 B CN 109145599B CN 201710503889 A CN201710503889 A CN 201710503889A CN 109145599 B CN109145599 B CN 109145599B
Authority
CN
China
Prior art keywords
electronic device
file
bait
protection program
changed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710503889.9A
Other languages
Chinese (zh)
Other versions
CN109145599A (en
Inventor
黄重景
黄锦颖
黄信铭
黄信雄
叶严仁
林永设
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Grand Mate Co Ltd
Original Assignee
Grand Mate Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Grand Mate Co Ltd filed Critical Grand Mate Co Ltd
Priority to CN201710503889.9A priority Critical patent/CN109145599B/en
Publication of CN109145599A publication Critical patent/CN109145599A/en
Application granted granted Critical
Publication of CN109145599B publication Critical patent/CN109145599B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Abstract

The invention provides a protection method of malicious viruses, which comprises the following steps: establishing a bait file on a storage medium of an electronic device; checking whether the bait file is changed, and shutting down the electronic device when the bait file is changed. Therefore, after the bait file is changed, the malicious virus can be judged to start to operate, and the electronic device can be immediately shut down, so that the malicious virus can be prevented from continuously changing the file in the storage medium, and subsequent data rescue is facilitated.

Description

Protection method for malicious viruses
Technical Field
The invention relates to computer virus protection, in particular to a protection method for malicious viruses.
Background
Viruses on electronic devices can be classified into destructive viruses and malicious viruses, and most of the destructive viruses can cause the electronic devices to be inoperable. The malicious virus encrypts a specific file in the storage medium, such as a file, a picture file, a movie file, etc., but the malicious virus does not destroy the system files of the operating system, so that the user often finds that the file is encrypted late.
Hackers mostly use e-mails, web pages, etc. for users to download attachments, the users may poison the electronic devices after downloading, and most malicious viruses use the RSA algorithm of 2048bits to encrypt the files, so that the general users cannot decrypt the files unless the encrypted files obtain the decryption key.
However, in the early stage of the appearance of malicious viruses, the anti-virus programs are mostly unable to find the existence of the malicious viruses, so that the user can only take care to avoid the malicious viruses in the electronic device. In case of poisoning, the user can only pay for redemption to obtain the decryption key, or wait for the decryption key to be released, or abandon the encrypted file.
Disclosure of Invention
In view of the above, the present invention provides a method for protecting against malicious viruses, which can prevent the malicious viruses from continuously changing files.
In order to achieve the above object, the present invention provides a method for protecting against malicious viruses, comprising the following steps: A. establishing at least one bait file on a storage medium of an electronic device; B. checking whether the bait file is changed, and shutting down the electronic device when the bait file is changed.
The invention has the advantages that after the bait file is changed, the malicious virus can be judged to start to operate, and the electronic device can be immediately shut down, so that the malicious virus can be prevented from continuously changing the file in the storage medium, and the subsequent data rescue is facilitated.
Drawings
Fig. 1 is a flowchart of a method for protecting against malicious viruses according to a first preferred embodiment of the present invention.
Fig. 2 is a schematic view of an electronic device to which the protection method of the first preferred embodiment of the invention is applied.
FIG. 3 is a system diagram illustrating a second embodiment of the protection method according to the present invention.
FIG. 4 is a system diagram illustrating a protection method according to a third preferred embodiment of the present invention.
[ notation ] to show
10 electronic device 12 storage medium
2 System
20 network 22 server 24 mobile device
3 System
30 electronic device 32 local area network
Detailed Description
To illustrate the present invention more clearly, a preferred embodiment will now be described in detail with reference to the accompanying drawings. Referring to fig. 1, a flowchart of a malicious virus protection method according to a first preferred embodiment of the present invention is shown, where the protection method is applied to an electronic device 10 shown in fig. 2, and the electronic device 10 is exemplified by a computer and has a storage medium 12, and may also be a device having a storage medium, such as a smart phone. The storage medium 12 may include a fixed storage medium 12 or a removable storage medium 12, the fixed storage medium 12 includes at least one hard disk drive or at least one solid state drive, and the removable storage medium 12 includes at least one flash drive or at least one memory card. The protection method comprises the following steps:
at least one bait file is established in a predetermined data path of the storage medium 12 of the electronic device 10, wherein the bait file has a file name, the file name includes a main file name and an extension name, and a predetermined content is established in the bait file. In this embodiment, the bait file is a plain text file (with an extension of txt), but not limited thereto, and may also be a file, a picture file, a movie file, a sound file, a compressed file, and the like. The bait file is established in a predetermined data path of the storage medium 12 of the operating system of the electronic device 10, for example, a computer, and the malicious virus typically encrypts the file in sequence according to the code number and file name of the disk drive, so that the predetermined data path is preferably "C: \ or "D: preferably, the main file name of the bait file is set to a number, for example, 0.
In practice, the number of files in each of the plurality of data paths in the storage medium may also be checked, and the decoy file may be established in the data path having the highest number of files among the plurality of data paths. Of course, the data path may be designated by the user.
Whether the bait file is changed or not is checked by a protection program, and when the bait file is changed, the electronic device 10 is powered off by the protection program. In this embodiment, the protection program is executed after the electronic device 10 is powered on, and the bait file is checked once every predetermined time (e.g. 1 minute), and if the bait file is not changed, the bait file is checked again after the predetermined time. If the file name of the bait file is not in the preset data path or the bait file is in but the preset content is not contained in the bait file, the bait file is judged to be changed.
In practice, a plurality of the bait files may be established in a plurality of data paths in the storage medium 12; and checking whether the bait files of the data paths are changed or not at preset time intervals, and powering off the electronic device when any one of the bait files is changed.
Therefore, if the electronic device 10 contains a malicious virus and the malicious virus encrypts the bait file, the method of the embodiment can shut down the electronic device to prevent the malicious virus from continuously changing other files of the storage medium 12. The user can detach the storage medium 12 of the electronic device from the electronic device and connect to another electronic device to copy or move the file in the storage medium 12 that is not changed to another storage medium 12 for storage.
The protection method of the present embodiment further includes, after the electronic device 10 is powered on again, checking, by the protection program, whether a malicious virus remover with a predetermined file name exists in a removable storage medium (not shown) connected to the electronic device;
if so, executing a malicious virus removal program to remove the malicious viruses and recover the modified file;
if not, the electronic device is shut down.
Therefore, after the user obtains the malicious virus removal program, the malicious virus removal program is stored in a removable storage medium (such as a flash drive) and is renamed to a predetermined file name, the removable storage medium is connected to the electronic device 10, and the electronic device 10 is restarted.
Fig. 3 shows a system 2 to which the method for protecting against malicious viruses according to the second preferred embodiment of the present invention is applied, where the system 2 includes at least one electronic device 10 according to the first embodiment, and the electronic device 10 is connected to a server 22 through a network 20, where the network 20 may be the internet or a local area network.
The protection method of this embodiment has substantially the same steps as the first embodiment, except that before the protection program checks whether the bait file is changed, the method further comprises:
a mobile device 24 is connected to the server 22 through a network and a corresponding relationship between the electronic device 10 and the mobile device 24 is established in the server 22.
When the bait file is changed, the electronic device 10 transmits a first message to the server 22 before the electronic device 10 is powered off.
Then, the server 22 transmits a second message to the mobile device 24 according to the first message and the corresponding relationship, so that the user can know that the electronic device 10 has a malicious virus when seeing that the mobile device 24 receives the second message, and needs to perform subsequent processing.
Fig. 4 shows a system 3 applied in the method for protecting against malicious viruses according to the third preferred embodiment of the present invention, where the system 3 includes at least one electronic device 10 according to the second embodiment and at least one other electronic device 30, and the electronic devices 10 and 30 are connected to a local area network 32. In this embodiment, the at least one other electronic device 30 is plural in number and has a storage medium, a protection program and a bait file as the electronic device 10.
The protection method of the present embodiment has substantially the same steps as the first embodiment, except that when any one of the electronic devices 10, 30 (taking the electronic device 10 as an example) in the system 3 detects that the bait file is changed, the electronic device 10 first transmits a message to the other two electronic devices 30, and after receiving the message, the two electronic devices 30 block the connection with the local area network 32. Thereby, the files of the other two electronic devices 30 are prevented from being changed. Of course, the lan 32 of this embodiment may also be connected to the server 22 of the second embodiment, and any electronic device 10 with the modified bait file transmits the information to the server 22 and then to the other two electronic devices 30 through the server 22, so that the other two electronic devices 30 can block the connection with the lan 32.
The system 3 of the present embodiment can also cooperate with the system 2 of the second embodiment to connect the server 22 and the mobile device 24, and when the bait file is checked to be changed, the electronic device 10 first transmits the first message to the server 22, and then the electronic device 10 is powered off.
Accordingly, the method for protecting against malicious viruses of the present invention places the bait file in the storage medium 12 of the electronic device 10, and determines that the malicious viruses have started to operate after the bait file is changed, and immediately shuts down the electronic device 10, thereby avoiding the situation of disasters from expanding continuously, and facilitating subsequent data rescue.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A method for protecting against malicious viruses, comprising the steps of:
A. establishing at least one bait file on a storage medium of an electronic device; wherein, the electronic device is connected with a server;
connecting a mobile device to the server and establishing a corresponding relation between the electronic device and the mobile device in the server;
B. the electronic device executes a protection program after being started, the protection program checks whether the bait file is changed, the protection program checks the bait file once every preset time, and when the bait file is changed, the protection program shuts down the electronic device;
before the protection program shuts down the electronic device in step B, the method includes sending a first message to the server, and sending a second message to the mobile device by the server according to the first message and the corresponding relationship.
2. The method according to claim 1, wherein step a comprises creating a predetermined content in the bait file; when the bait file does not contain the predetermined content in step B, it is determined that the bait file is changed.
3. The method according to claim 1, wherein the bait file is determined to be changed when the file name of the bait file is checked in step B and is not stored in the storage medium.
4. The method according to claim 1, wherein a plurality of the bait files are respectively established in a plurality of data paths in the storage medium in step a; step B, checking whether the bait files of the data paths are changed or not, and powering off the electronic device when any one of the bait files is changed.
5. The method for protecting against malicious viruses of claim 1, wherein step a comprises checking the number of files in each of a plurality of data paths in the storage medium; and establishing the bait file in a data path with the largest number of files among the data paths.
6. A method for protecting against malicious viruses, comprising the steps of:
A. establishing at least one bait file on a storage medium of an electronic device; wherein the electronic device and at least one other electronic device are connected to a local area network;
B. the electronic device executes a protection program after being started, the protection program checks whether the bait file is changed, the protection program checks the bait file once every preset time, and when the bait file is changed, the protection program shuts down the electronic device;
wherein, before the protection program shuts down the electronic device in step B, the method further includes sending a message to the other electronic device, and after the other electronic device receives the message, the other electronic device blocks the connection with the local area network.
7. A method for protecting against malicious viruses, comprising the steps of:
A. establishing at least one bait file on a storage medium of an electronic device;
B. the electronic device executes a protection program after being started, the protection program checks whether the bait file is changed, the protection program checks the bait file once every preset time, and when the bait file is changed, the protection program shuts down the electronic device;
after the electronic device is started up again, the protection program checks whether a malicious virus removing program with a preset file name exists in a removable storage medium connected to the electronic device:
if yes, executing the malicious virus removal program by the protection program;
if not, the electronic device is shut down by the protection program.
CN201710503889.9A 2017-06-27 2017-06-27 Protection method for malicious viruses Active CN109145599B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710503889.9A CN109145599B (en) 2017-06-27 2017-06-27 Protection method for malicious viruses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710503889.9A CN109145599B (en) 2017-06-27 2017-06-27 Protection method for malicious viruses

Publications (2)

Publication Number Publication Date
CN109145599A CN109145599A (en) 2019-01-04
CN109145599B true CN109145599B (en) 2022-01-07

Family

ID=64805424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710503889.9A Active CN109145599B (en) 2017-06-27 2017-06-27 Protection method for malicious viruses

Country Status (1)

Country Link
CN (1) CN109145599B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI739405B (en) * 2020-04-24 2021-09-11 新唐科技股份有限公司 Anti-virus chip and anti-virus method
CN112560040A (en) * 2020-12-25 2021-03-26 安芯网盾(北京)科技有限公司 General detection method and device for computer infectious virus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1314638A (en) * 2001-04-29 2001-09-26 北京瑞星科技股份有限公司 Method, system and medium for detecting and clearing known and anknown computer virus
CN1476554A (en) * 2000-10-24 2004-02-18 Vcis公司 Analytical virtual machine
CN1761939A (en) * 2003-03-17 2006-04-19 精工爱普生株式会社 Method and system for preventing virus infection
CN102216900A (en) * 2008-09-12 2011-10-12 马来西亚微电子系统有限公司 A honeypot host
CN104484605A (en) * 2014-12-10 2015-04-01 央视国际网络无锡有限公司 Method of detecting viral sources in cloud storage environment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194490A1 (en) * 2001-06-18 2002-12-19 Avner Halperin System and method of virus containment in computer networks
US8769684B2 (en) * 2008-12-02 2014-07-01 The Trustees Of Columbia University In The City Of New York Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
US8726032B2 (en) * 2009-03-25 2014-05-13 Pacid Technologies, Llc System and method for protecting secrets file
CN104021344B (en) * 2014-05-14 2015-06-24 南京大学 Honey pot mechanism and method used for collecting and intercepting internal storage behaviors of computer

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1476554A (en) * 2000-10-24 2004-02-18 Vcis公司 Analytical virtual machine
CN1314638A (en) * 2001-04-29 2001-09-26 北京瑞星科技股份有限公司 Method, system and medium for detecting and clearing known and anknown computer virus
CN1761939A (en) * 2003-03-17 2006-04-19 精工爱普生株式会社 Method and system for preventing virus infection
CN102216900A (en) * 2008-09-12 2011-10-12 马来西亚微电子系统有限公司 A honeypot host
CN104484605A (en) * 2014-12-10 2015-04-01 央视国际网络无锡有限公司 Method of detecting viral sources in cloud storage environment

Also Published As

Publication number Publication date
CN109145599A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
US7689835B2 (en) Computer program product and computer system for controlling performance of operations within a data processing system or networks
US8631494B2 (en) Method and device for scanning data for signatures prior to storage in a storage device
RU2617631C2 (en) Method for detection working malicious software runned from client, on server
US20150172304A1 (en) Secure backup with anti-malware scan
US9317686B1 (en) File backup to combat ransomware
US10193918B1 (en) Behavior-based ransomware detection using decoy files
US9256739B1 (en) Systems and methods for using event-correlation graphs to generate remediation procedures
EP3430559B1 (en) Systems and methods for generating tripwire files
US20090019547A1 (en) Method and computer program product for identifying or managing vulnerabilities within a data processing network
CN117040840A (en) Anti-theft and tamper-proof data protection
KR101768082B1 (en) Securing method for protecting the ransomware
CN105335654B (en) Android malicious program detection and processing method, device and equipment
CA3015352A1 (en) Cybersecurity systems and techniques
Popoola et al. Ransomware: Current trend, challenges, and research directions
CN109145599B (en) Protection method for malicious viruses
US8954624B2 (en) Method and system for securing input from an external device to a host
US10032022B1 (en) System and method for self-protecting code
US20080276299A1 (en) Wireless terminal apparatus and method of protecting system resources
Kaur et al. An empirical analysis of crypto-ransomware behavior
US10503898B2 (en) Method for defending against malware
TWI647585B (en) Malicious virus protection method
US10909245B1 (en) Secure quarantine of potentially malicious content
JP2007058862A (en) Method and apparatus for managing server process, and computer program (method or apparatus for managing server process in computer system)
CN117077180B (en) Lesu encrypted data recovery feasibility assessment and processing device, method, electronic equipment and storage medium
CN113312629A (en) Safe operating system based on android operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant