WO2017012241A1 - 文件的检测方法、装置、设备及非易失性计算机存储介质 - Google Patents

文件的检测方法、装置、设备及非易失性计算机存储介质 Download PDF

Info

Publication number
WO2017012241A1
WO2017012241A1 PCT/CN2015/096561 CN2015096561W WO2017012241A1 WO 2017012241 A1 WO2017012241 A1 WO 2017012241A1 CN 2015096561 W CN2015096561 W CN 2015096561W WO 2017012241 A1 WO2017012241 A1 WO 2017012241A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
behavior
malicious
source
target process
Prior art date
Application number
PCT/CN2015/096561
Other languages
English (en)
French (fr)
Inventor
邹荣新
Original Assignee
安一恒通(北京)科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 安一恒通(北京)科技有限公司 filed Critical 安一恒通(北京)科技有限公司
Publication of WO2017012241A1 publication Critical patent/WO2017012241A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Definitions

  • the present invention relates to computer technology, and in particular, to a file detection method, device, device and non-volatile computer storage medium.
  • a virus is data that is compiled or inserted into an application that corrupts system functionality, affects the normal use of the application, and is also self-replicating, usually in the form of a set of instructions or program code.
  • Viruses also known as computer viruses, can include, but are not limited to, Trojans, backdoors, LAN worms, mail worms, spyware, infectious viruses, or Rootkits/Bootkits, which are destructive, reproducible, and infectious.
  • anti-virus software has limited monitoring capabilities, or, for example, a large variety of viruses, and a particularly fast growth rate, etc., therefore, the malicious process behavior caused by the running virus is difficult to be detected in time.
  • aspects of the present invention provide a method, apparatus, and apparatus for detecting a file and a non-volatile computer storage medium for improving security performance of the system.
  • An aspect of the present invention provides a method for detecting a file, including:
  • the file is a malicious file, obtaining a source of the file according to the operation behavior data of the file;
  • the source of the file is determined to be a malicious source.
  • file propagation source includes:
  • the access identifier of the file or
  • the source file of the file is the source file of the file.
  • the performing a virus detection operation on the file to determine whether the file is a malicious file including:
  • the performing a virus detection operation on the file to determine whether the file is a malicious file including:
  • Whether the file is a malicious file is determined according to whether the target process behavior is a malicious process behavior.
  • the behavior information of the target process behavior includes at least one of the following information:
  • the initiator information of the target process behavior
  • Target object information of the target process behavior
  • an implementation is further provided, the file comprising an executable file.
  • the method further includes:
  • a virus detection operation is performed.
  • a document detecting apparatus comprising:
  • a detecting unit configured to perform a virus detecting operation on the file to determine whether the file is a malicious file
  • a tracking unit configured to obtain, if the file is a malicious file, a source of propagation of the file according to operation behavior data of the file;
  • a determining unit for determining a source of propagation of the file as a malicious source.
  • file propagation source includes:
  • the access identifier of the file or
  • the source file of the file is the source file of the file.
  • the file is detected according to the feature data of the file to determine whether the file is a malicious file.
  • Whether the file is a malicious file is determined according to whether the target process behavior is a malicious process behavior.
  • the behavior information of the target process behavior includes at least one of the following information:
  • the initiator information of the target process behavior
  • Target object information of the target process behavior
  • an implementation is further provided, the file comprising an executable file.
  • the detecting unit is also used for
  • a virus detection operation is performed.
  • an apparatus comprising:
  • One or more processors are One or more processors;
  • One or more programs the one or more programs being stored in the memory, when executed by the one or more processors:
  • the file is a malicious file, obtaining a source of the file according to the operation behavior data of the file;
  • the source of the file is determined to be a malicious source.
  • a nonvolatile computer storage medium storing one or more programs when the one or more programs are executed by a device causes The device:
  • the file is a malicious file, obtaining a source of the file according to the operation behavior data of the file;
  • the source of the file is determined to be a malicious source.
  • the embodiment of the present invention determines whether the file is a malicious file by performing a virus detection operation on the file, and if the file is a malicious file, according to the text
  • the operational behavior data of the piece obtains the source of the file, so that the source of the file can be determined as a malicious source. Since the source of the malicious file is traced and determined as a malicious source, one can obtain one.
  • the virus detection operation is performed in advance by using the determined malicious source, so that the malicious source can be detected in time to avoid the security threat caused by the malicious file to the system, thereby improving the security performance of the system.
  • the technical solution provided by the present invention by monitoring the process behavior of the file process of the file, obtaining behavior information of the target process behavior, and further detecting the behavior of the target process according to the behavior information of the target process behavior, Determining whether the target process behavior is a malicious process behavior, so that whether the file is a malicious file is determined according to whether the target process behavior is a malicious process behavior, because no longer relying on specifying a single sample for the target process behavior Feature analysis, based on the behavior information of the target process behavior, comprehensively detecting the behavior of the target process, and detecting malicious process behavior in time, thereby improving the security performance of the system.
  • FIG. 1 is a schematic flowchart of a method for detecting a file according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a file detecting apparatus according to another embodiment of the present invention.
  • the terminals involved in the embodiments of the present invention may include, but are not limited to, a mobile phone, a personal digital assistant (PDA), a wireless handheld device, a tablet computer, and a personal computer (Personal Computer, PC). ), MP3 player, MP4 player, wearable device (for example, smart glasses, smart watches, smart bracelets, etc.).
  • PDA personal digital assistant
  • PC Personal Computer
  • FIG. 1 is a schematic flowchart of a method for detecting a file according to an embodiment of the present invention, as shown in FIG. 1 .
  • viruses also known as computer viruses
  • viruses can include, but are not limited to, Trojans, backdoors, LAN worms, mail worms, spyware, infected viruses, or Rootkits/Bootkits.
  • execution entities of 101 to 103 may be applications located in the local terminal, or may be plug-ins or software development kits (SDKs) installed in applications located in the local terminal.
  • the functional unit may also be a processing engine located in the network side server, or may be a distributed system located on the network side, which is not specifically limited in this embodiment.
  • the application may be a local application (nativeApp) installed on the terminal, or may be a web application (webApp) of the browser on the terminal, which is not specifically limited in this embodiment.
  • the file by performing a virus detection operation on the file to determine whether the file is a malicious file, if the file is a malicious file, obtaining a propagation source of the file according to the operation behavior data of the file, so that the file can be
  • the source of the file is determined to be a malicious source.
  • By tracking the source of the malicious file and identifying it as a malicious source it is possible to perform the virus detection operation by using the determined malicious source in advance before acquiring a file.
  • the malicious source is detected in time to avoid the security threat caused by malicious files to the system, thereby improving the security performance of the system.
  • the object of the virus detection operation performed may be an executable file, or may be a non-executable file of another type of file, the implementation.
  • this is not particularly limited.
  • the executable file is a portable executable (PE) file format file that can be loaded into memory and executed by the operating system loader.
  • Executable extensions can include, but are not limited to, .dll, .exe, .ocx, .bat, .js, .zip, .rar, .7z, .msi, .tar, .sys, and .scr.
  • the virus detection operation performed may be performed in advance.
  • the object information is configured to generate a configuration file.
  • the object of the virus detection operation performed can be determined according to the object information included in the configuration file.
  • the object information of the virus detection operation configured by using the configuration file can effectively improve the flexibility and reliability of information configuration.
  • the generated configuration file may be further modified to update the object information.
  • the source of the file may include, but is not limited to, the following content:
  • the access identifier of the file or
  • the source file of the file is the source file of the file.
  • the access identifier of the file refers to the identifier information used to obtain the file, and may include, but is not limited to, the download address of the file, the Uniform Resource Locator (URL) or the uniform resource name of the page to which the file belongs. (Uniform Resource Name, URN), or other identification information that can access the file, which is not specifically limited in this embodiment.
  • URL Uniform Resource Locator
  • URN Uniform Resource Name
  • the page involved in the present invention may also be referred to as a Web page, and may be a Web page written based on HyperText Markup Language (HTML), that is, an HTML page, or may be based on Web pages written in the HTML and Java languages, that is, Java Server Pages (JSPs), or web pages that can also be written in other languages, are not specifically limited in this embodiment.
  • a web page may include a display block defined by one or more page tags, such as HyperText Markup Language (HTML) tags, JSP tags, etc., called page elements, such as text, images, hyperlinks. , button, lose Into the box, drop-down box, and so on.
  • HTML HyperText Markup Language
  • JSPs Java Server Pages
  • the source file of the file refers to other files used to generate the file, for example, an installation file or a compressed file.
  • the operation behavior data of the file may be further recorded and associated with the file to obtain the file and the file.
  • An association relationship of the behavior data is obtained for obtaining operation behavior data of the file according to the association relationship.
  • the operation behavior data of the file may include, but is not limited to, at least one of the following data:
  • DNS Domain Name System
  • the process creates a behavioral action
  • the association relationship may be further stored. Specifically, the association relationship may be specifically stored in a storage device of the terminal.
  • the storage device of the terminal may be a slow storage device, specifically a hard disk of the computer system, or may be a non-operating memory of the mobile phone, that is, physical memory, for example, a read-only memory (Read- Only Memory, ROM, memory card, and the like are not particularly limited in this embodiment.
  • a slow storage device specifically a hard disk of the computer system
  • a non-operating memory of the mobile phone that is, physical memory, for example, a read-only memory (Read- Only Memory, ROM, memory card, and the like are not particularly limited in this embodiment.
  • the storage device of the terminal may also be a fast storage device, which may be a memory of the computer system, or may be a running memory of the mobile phone, that is, system memory, for example, a random access memory (Random Access Memory). , RAM, etc., this embodiment is not particularly limited.
  • a fast storage device which may be a memory of the computer system, or may be a running memory of the mobile phone, that is, system memory, for example, a random access memory (Random Access Memory). , RAM, etc., this embodiment is not particularly limited.
  • feature data of the file may be specifically obtained, and then the file is detected according to feature data of the file to determine the Whether the file is a malicious file.
  • the file may be subjected to numerical operations based on feature matching, and further, based on the operation result of the numerical operation, whether the file is a virus file is detected.
  • This method is also applicable to the detection of various types of files, as long as the matching features are properly mined according to the detection requirements.
  • a process behavior of a file process of the file may be specifically monitored to obtain behavior information of a target process behavior, and further, according to the target process behavior.
  • the behavior information is used to detect the target process behavior to determine whether the target process behavior is a malicious process behavior, and determine whether the file is a malicious file according to whether the target process behavior is a malicious process behavior. Since it is no longer dependent on the specified feature analysis of the single sample of the target process behavior, but based on the behavior information of the target process behavior, comprehensive detection of the target process behavior can detect the malicious process behavior in time, thereby improving System security performance.
  • the process behavior may include, but is not limited to, at least one of the following operations:
  • the process behavior of the file process of the file is monitored, and the operation may be based on a pre-configured suspicious behavior decision base.
  • the suspicious behavior decision-making library stores related information about the suspicious process behavior that has been determined, for example, the identification information of the suspicious target process behavior, the initiator information of the suspicious target process behavior, etc., and determines whether the process behavior of the monitored process is a suspicious process.
  • Behavior is the behavior of the target process, which in turn obtains behavioral information about the behavior of the target process.
  • the obtained behavior information of the target process behavior may include, but is not limited to, at least one of the following information:
  • the initiator information of the target process behavior
  • Target object information of the target process behavior
  • the initiator information of the target process behavior may be an object identifier that initiates a process behavior, for example, a file identifier.
  • the target object information of the target process behavior may be an object identifier to be applied by the process behavior, for example, a file identifier of another file.
  • the additional information of the target process behavior may be data information generated by the process behavior, for example.
  • the identifier information of the target process behavior may be an identifier (ID) of the process behavior.
  • the process behavior of all processes in the system can be specifically monitored to obtain behavior information of the target process behavior.
  • the process behavior of some processes in the system may be monitored according to the pre-configured identifier information of the suspicious target process behavior to obtain behavior information of the target process behavior.
  • the operation indication information may be generated according to the detection result, so that the target process behavior is performed according to the operation indication information. Perform the operation.
  • the operation indication information may include but is not limited to:
  • the pre-configured malicious behavior decision-making library may be utilized according to the behavior information of the target process behavior, where the malicious behavior decision-making library stores the determined The behavior information of the malicious process behavior is matched, and the target process behavior is detected to determine whether the target process behavior is a malicious process behavior.
  • the target process behavior may be determined to be a malicious process behavior.
  • the at least one malicious process behavior that has been determined or other detection device may be further utilized.
  • Target process behavior detecting the behavior of the unknown target process.
  • the target process behavior may be detected according to behavior information of the target process behavior and behavior information of at least one malicious process behavior that has been determined to determine whether the target process behavior is a malicious process behavior.
  • the behavior information of at least one malicious process behavior that has been determined may be clustered to obtain similar behavior information to determine whether the unknown target process behavior is a malicious process behavior. For example, according to the target object information of the target process behavior, the additional information of the target process behavior, and the identification information of the target process behavior, clustering the behavior information of the at least one malicious process behavior to obtain a similar target process behavior initiator information.
  • the target process behavior may be detected according to behavior information of the target process behavior and behavior information of other target process behaviors sent by other detecting devices to determine whether the target process behavior is a malicious process behavior.
  • the behavior information of the target process behavior and the behavior information of other target process behaviors sent by other detection devices may be clustered to obtain a clustering result. Further, the clustering result to which the behavior information of the target process behavior belongs is further analyzed to determine whether the unknown target process behavior is a malicious process behavior.
  • the determined behavior information of the target process behavior may be further added to the malicious behavior decision base to improve the decision making ability of the malicious behavior decision base.
  • the defense killing scheme for each malicious process behavior can be further stored. Then, while generating the operation indication information, the defense and killing scheme may be further obtained, so that the effective anti-virus processing can be performed according to the defense and killing scheme.
  • the malicious source may be further utilized to perform a virus detection operation. If a malicious source is detected, the spread of malicious files can be blocked as early as possible.
  • the determined feature data of the malicious source may be further stored and processed as a detection basis for the subsequent execution of the virus detection operation.
  • the object to be detected is subjected to calculations such as numerical operations or logical operations based on feature matching, and further, based on the calculation result, whether or not the object is a virus is detected.
  • the numerical operations based on the feature matching are complicated. Therefore, more processing resources may be required, which may occupy a large amount of processing resources of the terminal, resulting in a decrease in processing performance of the terminal.
  • the logic operation based on feature matching is much simpler than the numerical operation, and does not require more processing resources. Therefore, it does not occupy a large amount of processing resources of the terminal, thereby improving the processing performance of the terminal.
  • the file by performing a virus detection operation on the file to determine whether the file is a malicious file, if the file is a malicious file, obtaining a propagation source of the file according to the operation behavior data of the file, thereby enabling Determine the source of the file’s propagation as malicious
  • the source because it traces the source of the malicious file and identifies it as a malicious source, enables the virus detection operation to be performed in advance by taking the determined malicious source before acquiring a file, so that the malicious source can be detected in time. Avoid the security threats caused by malicious files to the system, thus improving the security performance of the system.
  • the technical solution provided by the present invention by monitoring the process behavior of the file process of the file, obtaining behavior information of the target process behavior, and further detecting the behavior of the target process according to the behavior information of the target process behavior, Determining whether the target process behavior is a malicious process behavior, so that whether the file is a malicious file is determined according to whether the target process behavior is a malicious process behavior, because no longer relying on specifying a single sample for the target process behavior Feature analysis, based on the behavior information of the target process behavior, comprehensively detecting the behavior of the target process, and detecting malicious process behavior in time, thereby improving the security performance of the system.
  • FIG. 2 is a schematic structural diagram of a file detecting apparatus according to another embodiment of the present invention, as shown in FIG. 2 .
  • the detecting means of the file of the embodiment may include a detecting unit 21, a tracking unit 22, and a determining unit 23.
  • the detecting unit 21 is configured to perform a virus detecting operation on the file. Determining whether the file is a malicious file; the tracking unit 22 is configured to: if the file is a malicious file, obtain a propagation source of the file according to the operation behavior data of the file; the determining unit 23 is configured to: The source of the document’s dissemination was determined to be a malicious source.
  • part or all of the detecting device of the file provided in this embodiment may be an application located in a local terminal, or may be a plug-in or a software development kit (Software Development Kit) installed in an application located in the local terminal.
  • the functional unit, such as the SDK may also be a processing engine located in the network side server, or may be a distributed system located on the network side, which is not specifically limited in this embodiment.
  • the application may be a local application (nativeApp) installed on the terminal, or may be a web application (webApp) of the browser on the terminal, which is not specifically limited in this embodiment.
  • the object of the virus detection operation performed by the detecting unit 21 may be an executable file, or may be a non-executable file of another type of file,
  • the embodiment is not particularly limited thereto.
  • the executable file is a portable executable (PE) file format file that can be loaded into memory and executed by the operating system loader.
  • Executable extensions can include, but are not limited to, .dll, .exe, .ocx, .bat, .js, .zip, .rar, .7z, .msi, .tar, .sys, and .scr.
  • the source of the file may include, but is not limited to, the following content:
  • the access identifier of the file or
  • the source file of the file is the source file of the file.
  • the tracking unit 22, And may further be used to record the operation behavior data of the file, and associate with the file to obtain an association relationship between the file and the operation behavior data of the file, to obtain the according to the association relationship.
  • the operational behavior data of the file may further be used to record the operation behavior data of the file, and associate with the file to obtain an association relationship between the file and the operation behavior data of the file, to obtain the according to the association relationship.
  • the detecting unit 21 may be specifically configured to obtain feature data of the file, and detect the file according to the feature data of the file, Determine if the file is a malicious file.
  • the detecting unit 21 may be specifically configured to monitor a process behavior of a file process of the file to obtain behavior information of a target process behavior; Behavior information of the process behavior, detecting the target process behavior to determine whether the target process behavior is a malicious process behavior; and determining whether the file is a malicious file according to whether the target process behavior is a malicious process behavior.
  • the obtained behavior information of the target process behavior may include, but is not limited to, at least one of the following information:
  • the initiator information of the target process behavior
  • Target object information of the target process behavior
  • the detecting unit 21 may be further configured to perform a virus detecting operation by using the malicious source.
  • the detection unit performs a virus detection operation on the file to determine the Whether the file is a malicious file, if the file is a malicious file, the source of the file is obtained according to the operation behavior data of the file, so that the determining unit can determine the source of the file as a malicious source, Tracking the source of the malicious file and identifying it as a malicious source, enabling the virus detection operation to be performed in advance using the identified malicious source before acquiring a file, so that the malicious source can be detected in time to avoid obtaining
  • the security threats caused by malicious files to the system improve the security performance of the system.
  • the technical solution provided by the present invention by monitoring the process behavior of the file process of the file, obtaining behavior information of the target process behavior, and further detecting the behavior of the target process according to the behavior information of the target process behavior, Determining whether the target process behavior is a malicious process behavior, so that whether the file is a malicious file is determined according to whether the target process behavior is a malicious process behavior, because no longer relying on specifying a single sample for the target process behavior Feature analysis, based on the behavior information of the target process behavior, comprehensively detecting the behavior of the target process, and detecting malicious process behavior in time, thereby improving the security performance of the system.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform the methods of the various embodiments of the present invention. Part of the steps.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Abstract

一种文件的检测方法及装置。通过对文件进行病毒检测操作,以确定所述文件是否为恶意文件(101),若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源(102),使得能够将所述文件的传播来源确定为恶意来源(103),由于追踪到了恶意文件的传播来源,并将其确定为恶意来源,使得能够在获取一个文件之前,预先利用所确定的恶意来源,执行病毒检测操作,这样,能够及时检测到恶意来源,以避免获取到恶意文件对系统所造成的安全威胁,从而提高了系统的安全性能。

Description

文件的检测方法、装置、设备及非易失性计算机存储介质
本申请要求了申请日为2015年07月21日,申请号为201510431210.0发明名称为“文件的检测方法及装置”的中国专利申请的优先权。
技术领域
本发明涉及计算机技术,尤其涉及一种文件的检测方法、装置、设备及非易失性计算机存储介质。
背景技术
病毒是编制或者在应用程序中插入的破坏系统功能的数据,其会影响应用程序的正常使用,并且还能够自我复制,通常以一组指令或者程序代码的形式呈现。病毒,又称为计算机病毒,可以包括但不限于木马、后门、局域网蠕虫、邮件蠕虫、间谍软件、感染型病毒或Rootkits/Bootkits,它们具有破坏性,复制性和传染性的特点。
然而,在一些情况下,例如,杀毒软件的监控能力有限,或者再例如,病毒种类繁多,且增长速度特别快等,因此,运行后的病毒所导致的恶意进程行为难以被及时检测到。
发明内容
本发明的多个方面提供一种文件的检测方法、装置、设备及非易失性计算机存储介质,用以提高系统的安全性能。
本发明的一方面,提供一种文件的检测方法,包括:
对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
将所述文件的传播来源确定为恶意来源。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述文件的传播来源包括:
文件的访问标识;或者
文件的来源文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源之前,还包括:
记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述对文件进行病毒检测操作,以确定所述文件是否为恶意文件,包括:
获得所述文件的特征数据;
根据所述文件的特征数据,对所述文件进行检测,以确定所述文件 是否为恶意文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述对文件进行病毒检测操作,以确定所述文件是否为恶意文件,包括:
监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息;
根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为;
根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述目标进程行为的行为信息包括下列信息中的至少一项:
目标进程行为的发起者信息;
目标进程行为的目标对象信息;
目标进程行为的附加信息;以及
目标进程行为的标识信息。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述文件包括可执行文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述将所述文件的传播来源确定为恶意来源之后,还包括:
利用所述恶意来源,执行病毒检测操作。
本发明的另一方面,提供一种文件的检测装置,包括:
检测单元,用于对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
追踪单元,用于若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
确定单元,用于将所述文件的传播来源确定为恶意来源。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述文件的传播来源包括:
文件的访问标识;或者
文件的来源文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述追踪单元,还用于
记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述检测单元,具体用于
获得所述文件的特征数据;以及
根据所述文件的特征数据,对所述文件进行检测,以确定所述文件是否为恶意文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述检测单元,具体用于
监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息;
根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为;以及
根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述目标进程行为的行为信息包括下列信息中的至少一项:
目标进程行为的发起者信息;
目标进程行为的目标对象信息;
目标进程行为的附加信息;以及
目标进程行为的标识信息。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述文件包括可执行文件。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式, 所述检测单元,还用于
利用所述恶意来源,执行病毒检测操作。
本发明的另一方面,提供一种设备,包括:
一个或者多个处理器;
存储器;
一个或者多个程序,所述一个或者多个程序存储在所述存储器中,当被所述一个或者多个处理器执行时:
对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
将所述文件的传播来源确定为恶意来源。
本发明的另一方面,提供一种非易失性计算机存储介质,所述非易失性计算机存储介质存储有一个或者多个程序,当所述一个或者多个程序被一个设备执行时,使得所述设备:
对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
将所述文件的传播来源确定为恶意来源。
由上述技术方案可知,本发明实施例通过对文件进行病毒检测操作,以确定所述文件是否为恶意文件,若所述文件为恶意文件,根据所述文 件的操作行为数据,获得所述文件的传播来源,使得能够将所述文件的传播来源确定为恶意来源,由于追踪到了恶意文件的传播来源,并将其确定为恶意来源,使得能够在获取一个文件之前,预先利用所确定的恶意来源,执行病毒检测操作,这样,能够及时检测到恶意来源,以避免获取到恶意文件对系统所造成的安全威胁,从而提高了系统的安全性能。
另外,采用本发明所提供的技术方案,通过监控文件的文件进程的进程行为,以获得目标进程行为的行为信息,进而根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为,使得能够根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件,由于不再依赖于对目标进程行为进行单个样本的指定特征分析,而是根据所述目标进程行为的行为信息,对所述目标进程行为进行综合检测,能够及时检测到恶意进程行为,从而提高了系统的安全性能。
附图说明
了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明一实施例提供的文件的检测方法的流程示意图;
图2为本发明另一实施例提供的文件的检测装置的结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明的是,本发明实施例中所涉及的终端可以包括但不限于手机、个人数字助理(Personal Digital Assistant,PDA)、无线手持设备、平板电脑(Tablet Computer)、个人电脑(Personal Computer,PC)、MP3播放器、MP4播放器、可穿戴设备(例如,智能眼镜、智能手表、智能手环等)等。
另外,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
图1为本发明一实施例提供的文件的检测方法的流程示意图,如图1所示。
101、对文件进行病毒检测操作,以确定所述文件是否为恶意文件。
102、若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源。
103、将所述文件的传播来源确定为恶意来源。
其中,病毒,又称为计算机病毒,可以包括但不限于木马、后门、局域网蠕虫、邮件蠕虫、间谍软件、感染型病毒或Rootkits/Bootkits。
需要说明的是,101~103的执行主体的部分或全部可以为位于本地终端的应用,或者还可以为设置在位于本地终端的应用中的插件或软件开发工具包(Software Development Kit,SDK)等功能单元,或者还可以为位于网络侧服务器中的处理引擎,或者还可以为位于网络侧的分布式系统,本实施例对此不进行特别限定。
可以理解的是,所述应用可以是安装在终端上的本地程序(nativeApp),或者还可以是终端上的浏览器的一个网页程序(webApp),本实施例对此不进行特别限定。
这样,通过对文件进行病毒检测操作,以确定所述文件是否为恶意文件,若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源,使得能够将所述文件的传播来源确定为恶意来源,由于追踪到了恶意文件的传播来源,并将其确定为恶意来源,使得能够在获取一个文件之前,预先利用所确定的恶意来源,执行病毒检测操作,这样,能够及时检测到恶意来源,以避免获取到恶意文件对系统所造成的安全威胁,从而提高了系统的安全性能。
可选地,在本实施例的一个可能的实现方式中,在101中,所进行的病毒检测操作的对象,可以是可执行文件,或者还可以是其他类型文件的非可执行文件,本实施例对此不进行特别限定。
具体地,可执行文件,是可移植可执行(PE)文件格式的文件,它可以加载到内存中,并由操作系统加载程序执行。可执行文件的扩展名可以包括但不限于.dll、.exe、.ocx、.bat、.js、.zip、.rar、.7z、.msi、.tar、.sys和.scr,等。
在一个具体的实现过程中,具体可以预先将所进行的病毒检测操作 的对象信息进行配置,以生成配置文件。这样,可以根据该配置文件中所包含的对象信息,确定进行的病毒检测操作的对象。由于采用了配置文件的方式配置进行的病毒检测操作的对象信息,能够有效提高信息配置的灵活性和可靠性。
在执行本发明所提供的技术方案的过程中,还可以进一步修改所生成的配置文件,以更新对象信息。
可选地,在本实施例的一个可能的实现方式中,所述文件的传播来源可以包括但不限于如下内容:
文件的访问标识;或者
文件的来源文件。
所述文件的访问标识,是指用于获取文件的标识信息,可以包括但不限于所述文件的下载地址、所述文件所属页面的统一资源定位符(Uniform Resource Locator,URL)或统一资源名称(Uniform Resource Name,URN),或者还可以包括其他能够访问所述文件的其他标识信息,本实施例对此不进行特别限定。
可以理解的是,本发明所涉及的页面,也可以称为Web页面,可以是基于超文本标记语言(HyperText Markup Language,HTML)编写的网页(Web Page),即HTML页面,或者还可以是基于HTML和Java语言编写的网页,即Java服务器页面(Java Server Page,JSP),或者还可以为其他语言编写的网页,本实施例对此不进行特别限定。Web页面可以包括由一个或者多个页面标签例如,超文本标记语言(HyperText Markup Language,HTML)标签、JSP标签等,定义的一个显示区块,称为页面元素,例如,文字、图片、超链接、按钮、输 入框、下拉框等。
所述文件的来源文件,是指用于产生文件的其他文件,例如,安装文件或压缩文件等。
可选地,在本实施例的一个可能的实现方式中,在102之前,还可以进一步记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
其中,所述文件的操作行为数据可以包括但不限于如下数据中的至少一种:
域名系统(Domain Name System,DNS)访问行为数据;
进程创建行为操作;
下载行为数据;
传输行为数据;
运行行为数据;
安装行为数据;以及
解压缩行为数据。
在获得所述文件与所述文件的操作行为数据的关联关系之后,还可以进一步对所述关联关系进行存储处理。具体地,具体可以将所述关联关系存储在终端的存储设备中。
在一个具体的实现过程中,所述终端的存储设备可以为慢速存储设备,具体可以为计算机系统的硬盘,或者还可以为手机的非运行内存即物理内存,例如,只读存储器(Read-Only Memory,ROM)和内存卡等,本实施例对此不进行特别限定。
在另一个具体的实现过程中,所述终端的存储设备还可以为快速存储设备,具体可以为计算机系统的内存,或者还可以为手机的运行内存即系统内存,例如,随机存储器(Random Access Memory,RAM)等,本实施例对此不进行特别限定。
可选地,在本实施例的一个可能的实现方式中,在101中,具体可以获得所述文件的特征数据,进而根据所述文件的特征数据,对所述文件进行检测,以确定所述文件是否为恶意文件。
具体地,可以对文件进行基于特征匹配的数值运算,进而,根据数值运算的运算结果,检测文件是否为病毒文件。这个方法同样适用于各种类型文件的检测,只要根据检测需求,合理挖掘匹配的特征即可。
然而,由于数值运算较为复杂,因此,可能需要较多的处理资源,这样,会占用终端的大量处理资源,从而导致终端的处理性能降低。
可选地,在本实施例的一个可能的实现方式中,在101中,具体可以监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息,进而,根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为,根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。由于不再依赖于对目标进程行为进行单个样本的指定特征分析,而是根据所述目标进程行为的行为信息,对所述目标进程行为进行综合检测,能够及时检测到恶意进程行为,从而提高了系统的安全性能。
其中,所述进程行为可以包括但不限于下列操作中的至少一项:
文件操作行为;
进程操作行为;以及
注册表操作行为。
在一个具体的实现过程中,监控所述文件的文件进程的进程行为,这一操作的依据,可以为一预先配置的可疑行为决策库。该可疑行为决策库中存储有已经确定的可疑进程行为的相关信息,例如,可疑目标进程行为的标识信息,可疑目标进程行为的发起者信息等,确定所监控的进程的进程行为是否为可疑进程行为即目标进程行为,进而获得该目标进程行为的行为信息。
可以理解的是,由于监控的目的,只是确定目标进程行为,并不是确定恶意进程行为,因此,所述可疑行为决策库的配置策略,可以适当地将监控范围控制得大一些,能够有效避免漏报的情况发生。
在另一个具体的实现过程中,所获得的所述目标进程行为的行为信息可以包括但不限于下列信息中的至少一项:
目标进程行为的发起者信息;
目标进程行为的目标对象信息;
目标进程行为的附加信息;以及
目标进程行为的标识信息。
其中,
所述目标进程行为的发起者信息,可以为发起进程行为的对象标识,例如,文件标识等。
所述目标进程行为的目标对象信息,可以为进程行为将要施加的对象标识,例如,其他文件的文件标识。
所述目标进程行为的附加信息,可以为进程行为所产生的数据信息,例如,。
所述目标进程行为的标识信息,可以为进程行为的标识(Identifier,ID)。
在另一个具体的实现过程中,具体可以监控系统中全部进程的进程行为,以获得目标进程行为的行为信息。
在另一个具体的实现过程中,具体可以根据预先配置的可疑目标进程行为的标识信息,监控系统中部分进程的进程行为,以获得目标进程行为的行为信息。
这样,在获得所述目标进程行为的检测结果即恶意进程行为或非恶意进程行为之后,则可以根据该检测结果,生成操作指示信息,以使得根据所述操作指示信息,对所述目标进程行为执行操作。
其中,所述操作指示信息可以包括但不限于:
用以指示所述目标进程行为为恶意进程行为的指示信息和用以指示对所述目标进程行为进行拦截操作的提示信息;或者
用以指示所述目标进程行为为非恶意进程行为的指示信息和用以指示对所述目标进程行为进行放行操作的提示信息。
在另一个具体的实现过程中,获得目标进程行为的行为信息之后,具体可以根据所述目标进程行为的行为信息,利用预先配置的恶意行为决策库,该恶意行为决策库中存储有已经确定的恶意进程行为的行为信息进行匹配,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为。
若匹配到与所述目标进程行为的行为信息一致的恶意进程行为,说明该目标进程行为为恶意进程行为,则可以确定所述目标进程行为为恶意进程行为。
若没有匹配到与所述目标进程行为的行为信息一致的恶意进程行为,说明该目标进程行为为未知的进程行为,则可以进一步利用已经确定的至少一个的恶意进程行为或者其他检测装置发送的其他目标进程行为,对该未知的目标进程行为进行检测。
具体地,具体可以根据所述目标进程行为的行为信息和已经确定的至少一个的恶意进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为。
例如,具体可以对已经确定的至少一个的恶意进程行为的行为信息进行聚类分析,以获得相似的行为信息,用以确定未知的目标进程行为是否为恶意进程行为。如,根据目标进程行为的目标对象信息、目标进程行为的附加信息和目标进程行为的标识信息,对所述至少一个的恶意进程行为的行为信息进行聚类,获得相似的目标进程行为的发起者信息。
具体地,具体可以根据所述目标进程行为的行为信息和其他检测装置发送的其他目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为。
例如,具体可以对所述目标进程行为的行为信息和其他检测装置发送的其他目标进程行为的行为信息进行聚类分析,以获得聚类结果。进而,再进一步分析所述目标进程行为的行为信息所属的聚类结果,以确定未知的目标进程行为是否为恶意进程行为。
这样,由于能够利用已经确定的至少一个的恶意进程行为或者其他检测装置发送的其他目标进程行为,对未知的目标进程行为进行检测,以确定该未知的目标进程行为是否为恶意进程行为,使得能够及时检测到恶意进程行为,能够有效提高检测的可靠性和灵活性,从而进一步提 高了系统的安全性。
可以理解的是,若所确定的未知的目标进程行为为恶意进程行为,还可以进一步将所确定的该目标进程行为的行为信息添加到恶意行为决策库中,以提高恶意行为决策库的决策能力。
可以理解的是,恶意行为决策库中,还可以进一步存储针对每个恶意进程行为的防御查杀方案。那么,在生成操作指示信息的同时,还可以进一步获取防御查杀方案,以便能够根据该防御查杀方案,进行有效的杀毒处理。
可选地,在本实施例的一个可能的实现方式中,在103之后,还可以进一步利用所述恶意来源,执行病毒检测操作。如果检测到恶意来源的存在,就可以尽早阻止恶意文件的传播。
在一个具体的实现过程中,在确定恶意来源之后,还可以进一步将所确定的恶意来源的特征数据,进行存储处理,以作为后续执行病毒检测操作的检测依据。
例如,对待检测的对象进行基于特征匹配的数值运算或逻辑运算等运算,进而,根据运算结果,检测对象是否为病毒。其中,基于特征匹配的数值运算较为复杂,因此,可能需要较多的处理资源,这样,会占用终端的大量处理资源,导致终端的处理性能降低。而基于特征匹配的逻辑运算,相比数值运算简单很多,不需要较多的处理资源,因此,不会占用终端的大量处理资源,从而提高了终端的处理性能。
本实施例中,通过对文件进行病毒检测操作,以确定所述文件是否为恶意文件,若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源,使得能够将所述文件的传播来源确定为恶意 来源,由于追踪到了恶意文件的传播来源,并将其确定为恶意来源,使得能够在获取一个文件之前,预先利用所确定的恶意来源,执行病毒检测操作,这样,能够及时检测到恶意来源,以避免获取到恶意文件对系统所造成的安全威胁,从而提高了系统的安全性能。
另外,采用本发明所提供的技术方案,通过监控文件的文件进程的进程行为,以获得目标进程行为的行为信息,进而根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为,使得能够根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件,由于不再依赖于对目标进程行为进行单个样本的指定特征分析,而是根据所述目标进程行为的行为信息,对所述目标进程行为进行综合检测,能够及时检测到恶意进程行为,从而提高了系统的安全性能。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
图2为本发明另一实施例提供的文件的检测装置的结构示意图,如图2所示。本实施例的文件的检测装置可以包括检测单元21、追踪单元22和确定单元23。其中,检测单元21,用于对文件进行病毒检测操作, 以确定所述文件是否为恶意文件;追踪单元22,用于若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;确定单元23,用于将所述文件的传播来源确定为恶意来源。
需要说明的是,本实施例所提供的文件的检测装置的部分或全部可以为位于本地终端的应用,或者还可以为设置在位于本地终端的应用中的插件或软件开发工具包(Software Development Kit,SDK)等功能单元,或者还可以为位于网络侧服务器中的处理引擎,或者还可以为位于网络侧的分布式系统,本实施例对此不进行特别限定。
可以理解的是,所述应用可以是安装在终端上的本地程序(nativeApp),或者还可以是终端上的浏览器的一个网页程序(webApp),本实施例对此不进行特别限定。
可选地,在本实施例的一个可能的实现方式中,所述检测单元21所进行的病毒检测操作的对象,可以是可执行文件,或者还可以是其他类型文件的非可执行文件,本实施例对此不进行特别限定。
具体地,可执行文件,是可移植可执行(PE)文件格式的文件,它可以加载到内存中,并由操作系统加载程序执行。可执行文件的扩展名可以包括但不限于.dll、.exe、.ocx、.bat、.js、.zip、.rar、.7z、.msi、.tar、.sys和.scr,等。
可选地,在本实施例的一个可能的实现方式中,所述文件的传播来源可以包括但不限于如下内容:
文件的访问标识;或者
文件的来源文件。
可选地,在本实施例的一个可能的实现方式中,所述追踪单元22, 还可以进一步用于记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
可选地,在本实施例的一个可能的实现方式中,所述检测单元21,具体可以用于获得所述文件的特征数据;以及根据所述文件的特征数据,对所述文件进行检测,以确定所述文件是否为恶意文件。
可选地,在本实施例的一个可能的实现方式中,所述检测单元21,具体可以用于监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息;根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为;以及根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。
在一个具体的实现过程中,所获得的所述目标进程行为的行为信息可以包括但不限于下列信息中的至少一项:
目标进程行为的发起者信息;
目标进程行为的目标对象信息;
目标进程行为的附加信息;以及
目标进程行为的标识信息。
可选地,在本实施例的一个可能的实现方式中,所述检测单元21,还可以进一步用于利用所述恶意来源,执行病毒检测操作。
需要说明的是,图1对应的实施例中方法,可以由本实施例提供的文件的检测装置实现。详细描述可以参见图1对应的实施例中的相关内容,此处不再赘述。
本实施例中,通过检测单元对文件进行病毒检测操作,以确定所述 文件是否为恶意文件,追踪单元若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源,使得确定单元能够将所述文件的传播来源确定为恶意来源,由于追踪到了恶意文件的传播来源,并将其确定为恶意来源,使得能够在获取一个文件之前,预先利用所确定的恶意来源,执行病毒检测操作,这样,能够及时检测到恶意来源,以避免获取到恶意文件对系统所造成的安全威胁,从而提高了系统的安全性能。
另外,采用本发明所提供的技术方案,通过监控文件的文件进程的进程行为,以获得目标进程行为的行为信息,进而根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为,使得能够根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件,由于不再依赖于对目标进程行为进行单个样本的指定特征分析,而是根据所述目标进程行为的行为信息,对所述目标进程行为进行综合检测,能够及时检测到恶意进程行为,从而提高了系统的安全性能。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,设备和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本发明所提供的几个实施例中,应该理解到,所揭露的系统,设备和方法,可以通过其它的方式实现。例如,以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所 显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能单元存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本发明各个实施例所述方法的部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和 范围。

Claims (18)

  1. 一种文件的检测方法,其特征在于,包括:
    对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
    若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
    将所述文件的传播来源确定为恶意来源。
  2. 根据权利要求1所述的方法,其特征在于,所述文件的传播来源包括:
    文件的访问标识;或者
    文件的来源文件。
  3. 根据权利要求1或2所述的方法,其特征在于,所述若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源之前,还包括:
    记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
  4. 根据权利要求1~3任一权利要求所述的方法,其特征在于,所述对文件进行病毒检测操作,以确定所述文件是否为恶意文件,包括:
    获得所述文件的特征数据;
    根据所述文件的特征数据,对所述文件进行检测,以确定所述文件是否为恶意文件。
  5. 根据权利要求1~4任一权利要求所述的方法,其特征在于,所述对文件进行病毒检测操作,以确定所述文件是否为恶意文件,包括:
    监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息;
    根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为;
    根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。
  6. 根据权利要求5所述的方法,其特征在于,所述目标进程行为的行为信息包括下列信息中的至少一项:
    目标进程行为的发起者信息;
    目标进程行为的目标对象信息;
    目标进程行为的附加信息;以及
    目标进程行为的标识信息。
  7. 根据权利要求1~6任一权利要求所述的方法,其特征在于,所述文件包括可执行文件。
  8. 根据权利要求1~7任一权利要求所述的方法,其特征在于,所述将所述文件的传播来源确定为恶意来源之后,还包括:
    利用所述恶意来源,执行病毒检测操作。
  9. 一种文件的检测装置,其特征在于,包括:
    检测单元,用于对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
    追踪单元,用于若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
    确定单元,用于将所述文件的传播来源确定为恶意来源。
  10. 根据权利要求9所述的装置,其特征在于,所述文件的传播来源包括:
    文件的访问标识;或者
    文件的来源文件。
  11. 根据权利要求9或10所述的装置,其特征在于,所述追踪单元,还用于
    记录所述文件的操作行为数据,并与所述文件进行关联,以获得所述文件与所述文件的操作行为数据的关联关系,以供根据所述关联关系,获得所述文件的操作行为数据。
  12. 根据权利要求9~11任一权利要求所述的装置,其特征在于,所述检测单元,具体用于
    获得所述文件的特征数据;以及
    根据所述文件的特征数据,对所述文件进行检测,以确定所述文件是否为恶意文件。
  13. 根据权利要求9~12任一权利要求所述的装置,其特征在于,所述检测单元,具体用于
    监控所述文件的文件进程的进程行为,以获得目标进程行为的行为信息;
    根据所述目标进程行为的行为信息,对所述目标进程行为进行检测,以确定所述目标进程行为是否为恶意进程行为;以及
    根据所述目标进程行为是否为恶意进程行为,确定所述文件是否为恶意文件。
  14. 根据权利要求13所述的装置,其特征在于,所述目标进程行 为的行为信息包括下列信息中的至少一项:
    目标进程行为的发起者信息;
    目标进程行为的目标对象信息;
    目标进程行为的附加信息;以及
    目标进程行为的标识信息。
  15. 根据权利要求9~14任一权利要求所述的装置,其特征在于,所述文件包括可执行文件。
  16. 根据权利要求9~15任一权利要求所述的装置,其特征在于,所述检测单元,还用于
    利用所述恶意来源,执行病毒检测操作。
  17. 一种设备,包括:
    一个或者多个处理器;
    存储器;
    一个或者多个程序,所述一个或者多个程序存储在所述存储器中,当被所述一个或者多个处理器执行时:
    对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
    若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
    将所述文件的传播来源确定为恶意来源。
  18. 一种非易失性计算机存储介质,所述非易失性计算机存储介质存储有一个或者多个程序,当所述一个或者多个程序被一个设备执行时,使得所述设备:
    对文件进行病毒检测操作,以确定所述文件是否为恶意文件;
    若所述文件为恶意文件,根据所述文件的操作行为数据,获得所述文件的传播来源;
    将所述文件的传播来源确定为恶意来源。
PCT/CN2015/096561 2015-07-21 2015-12-07 文件的检测方法、装置、设备及非易失性计算机存储介质 WO2017012241A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510431210.0 2015-07-21
CN201510431210.0A CN105095759A (zh) 2015-07-21 2015-07-21 文件的检测方法及装置

Publications (1)

Publication Number Publication Date
WO2017012241A1 true WO2017012241A1 (zh) 2017-01-26

Family

ID=54576167

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/096561 WO2017012241A1 (zh) 2015-07-21 2015-12-07 文件的检测方法、装置、设备及非易失性计算机存储介质

Country Status (2)

Country Link
CN (1) CN105095759A (zh)
WO (1) WO2017012241A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104671A (zh) * 2018-10-25 2020-05-05 阿里巴巴集团控股有限公司 应用的标识确定方法和应用的检测方法
CN111259391A (zh) * 2020-01-09 2020-06-09 鹏城实验室 文件恶意评分方法、装置、设备及计算机可读存储介质
CN111783089A (zh) * 2020-06-08 2020-10-16 Oppo广东移动通信有限公司 一种追溯恶意进程的方法、装置及存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095759A (zh) * 2015-07-21 2015-11-25 安一恒通(北京)科技有限公司 文件的检测方法及装置
CN106982188B (zh) * 2016-01-15 2020-11-27 阿里巴巴集团控股有限公司 恶意传播源的检测方法及装置
CN107277037A (zh) * 2017-07-14 2017-10-20 北京安数云信息技术有限公司 基于插件的任意文件操作检测方法和装置
CN108427884B (zh) * 2018-03-16 2021-09-10 北京奇虎科技有限公司 网页挖矿脚本的警示方法及装置
CN109388946B (zh) * 2018-09-28 2022-02-25 珠海豹趣科技有限公司 恶意进程检测方法、装置、电子设备及存储介质
CN110826067B (zh) * 2019-10-31 2022-08-09 深信服科技股份有限公司 一种病毒检测方法、装置、电子设备及存储介质
CN114285618B (zh) * 2021-12-20 2024-03-19 北京安天网络安全技术有限公司 一种网络威胁检测方法、装置、电子设备及可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559446A (zh) * 2013-11-13 2014-02-05 厦门市美亚柏科信息股份有限公司 一种基于安卓系统的设备的动态病毒检测方法和装置
CN103955645A (zh) * 2014-04-28 2014-07-30 百度在线网络技术(北京)有限公司 恶意进程行为的检测方法、装置及系统
US8990944B1 (en) * 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
CN105095759A (zh) * 2015-07-21 2015-11-25 安一恒通(北京)科技有限公司 文件的检测方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100595778C (zh) * 2007-07-16 2010-03-24 珠海金山软件股份有限公司 鉴定病毒文件的方法、装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990944B1 (en) * 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
CN103559446A (zh) * 2013-11-13 2014-02-05 厦门市美亚柏科信息股份有限公司 一种基于安卓系统的设备的动态病毒检测方法和装置
CN103955645A (zh) * 2014-04-28 2014-07-30 百度在线网络技术(北京)有限公司 恶意进程行为的检测方法、装置及系统
CN105095759A (zh) * 2015-07-21 2015-11-25 安一恒通(北京)科技有限公司 文件的检测方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104671A (zh) * 2018-10-25 2020-05-05 阿里巴巴集团控股有限公司 应用的标识确定方法和应用的检测方法
CN111104671B (zh) * 2018-10-25 2023-05-30 阿里巴巴集团控股有限公司 应用的标识确定方法和应用的检测方法
CN111259391A (zh) * 2020-01-09 2020-06-09 鹏城实验室 文件恶意评分方法、装置、设备及计算机可读存储介质
CN111783089A (zh) * 2020-06-08 2020-10-16 Oppo广东移动通信有限公司 一种追溯恶意进程的方法、装置及存储介质

Also Published As

Publication number Publication date
CN105095759A (zh) 2015-11-25

Similar Documents

Publication Publication Date Title
WO2017012241A1 (zh) 文件的检测方法、装置、设备及非易失性计算机存储介质
US11277423B2 (en) Anomaly-based malicious-behavior detection
EP3506139B1 (en) Malware detection in event loops
US10198574B1 (en) System and method for analysis of a memory dump associated with a potentially malicious content suspect
US9135443B2 (en) Identifying malicious threads
US8181264B2 (en) Method and apparatus for deferred security analysis
US10140451B2 (en) Detection of malicious scripting language code in a network environment
US10339300B2 (en) Advanced persistent threat and targeted malware defense
US9300682B2 (en) Composite analysis of executable content across enterprise network
Jang et al. Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
US20130247187A1 (en) Computing device to detect malware
EP3425547A1 (en) Malware identification via secondary file analysis
US10216934B2 (en) Inferential exploit attempt detection
US20120144488A1 (en) Computer virus detection systems and methods
US8627404B2 (en) Detecting addition of a file to a computer system and initiating remote analysis of the file for malware
EP3547121B1 (en) Combining device, combining method and combining program
EP3531329B1 (en) Anomaly-based-malicious-behavior detection
JP2013508823A (ja) リンクファイルを使用したマルウェアの検出およびマルウェアへの対応
CN106415577B (zh) 用于识别可疑事件来源的系统和方法
US11232193B1 (en) Automated generation of a sandbox configuration for malware detection
Adkins et al. Heuristic malware detection via basic block comparison
US10412101B2 (en) Detection device, detection method, and detection program
US11809556B2 (en) System and method for detecting a malicious file
US10601867B2 (en) Attack content analysis program, attack content analysis method, and attack content analysis apparatus
Jang et al. Function-oriented mobile malware analysis as first aid

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15898797

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/05/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15898797

Country of ref document: EP

Kind code of ref document: A1