CN101923617B - Cloud-based sample database dynamic maintaining method - Google Patents
Cloud-based sample database dynamic maintaining method Download PDFInfo
- Publication number
- CN101923617B CN101923617B CN2010102569589A CN201010256958A CN101923617B CN 101923617 B CN101923617 B CN 101923617B CN 2010102569589 A CN2010102569589 A CN 2010102569589A CN 201010256958 A CN201010256958 A CN 201010256958A CN 101923617 B CN101923617 B CN 101923617B
- Authority
- CN
- China
- Prior art keywords
- program
- behavior
- black
- white list
- performance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000006399 behavior Effects 0.000 claims abstract description 127
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 10
- 241000700605 Viruses Species 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 238000010835 comparative analysis Methods 0.000 description 2
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000003066 decision tree Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 210000004218 nerve net Anatomy 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (8)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310039473.8A CN103106366B (en) | 2010-08-18 | 2010-08-18 | A kind of sample database dynamic maintaining method based on cloud |
CN2010102569589A CN101923617B (en) | 2010-08-18 | 2010-08-18 | Cloud-based sample database dynamic maintaining method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102569589A CN101923617B (en) | 2010-08-18 | 2010-08-18 | Cloud-based sample database dynamic maintaining method |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310039473.8A Division CN103106366B (en) | 2010-08-18 | 2010-08-18 | A kind of sample database dynamic maintaining method based on cloud |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101923617A CN101923617A (en) | 2010-12-22 |
CN101923617B true CN101923617B (en) | 2013-03-20 |
Family
ID=43338547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102569589A Active CN101923617B (en) | 2010-08-18 | 2010-08-18 | Cloud-based sample database dynamic maintaining method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101923617B (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102955912B (en) * | 2011-08-23 | 2013-11-20 | 腾讯科技(深圳)有限公司 | Method and server for identifying application malicious attribute |
CN102750463A (en) * | 2011-12-16 | 2012-10-24 | 北京安天电子设备有限公司 | System and method for improving file rescanning speed |
CN103369003A (en) * | 2012-03-30 | 2013-10-23 | 网秦无限(北京)科技有限公司 | A method and a system for scanning redundancy files in a mobile device by using cloud computing |
CN103365882A (en) * | 2012-03-30 | 2013-10-23 | 网秦无限(北京)科技有限公司 | Method and system for cleaning junk files on mobile terminal |
CN102819713B (en) * | 2012-06-29 | 2015-09-16 | 北京奇虎科技有限公司 | A kind of method and system detecting bullet window safe |
CN105160244B (en) * | 2012-09-19 | 2019-02-22 | 北京奇安信科技有限公司 | A kind of document handling method and system |
CN102945349B (en) * | 2012-10-19 | 2016-06-22 | 北京奇虎科技有限公司 | unknown file processing method and device |
CN103795695A (en) * | 2012-10-31 | 2014-05-14 | 珠海市君天电子科技有限公司 | Self-learning file identification method and system |
CN103019676B (en) * | 2012-11-16 | 2016-03-30 | 北京奇虎科技有限公司 | A kind of method of managing software and system |
CN103023882B (en) * | 2012-11-26 | 2015-09-16 | 北京奇虎科技有限公司 | For judging the method and system of Information Security |
CN103023885B (en) * | 2012-11-26 | 2015-09-16 | 北京奇虎科技有限公司 | Secure data processing method and system |
TWI528173B (en) * | 2013-10-25 | 2016-04-01 | 緯創資通股份有限公司 | Method, apparatus and computer program product for debugging and error prevention |
CN103761476B (en) * | 2013-12-30 | 2016-11-09 | 北京奇虎科技有限公司 | The method and device of feature extraction |
CN104134143B (en) * | 2014-07-15 | 2017-05-03 | 北京奇付通科技有限公司 | Mobile payment security protection method, mobile payment security protection device and cloud server |
CN104486123B (en) * | 2014-12-18 | 2018-09-25 | 北京奇安信科技有限公司 | The method, apparatus and system of black and white lists management |
CN106909839B (en) * | 2015-12-22 | 2020-04-17 | 北京奇虎科技有限公司 | Method and device for extracting sample code features |
CN105607934A (en) * | 2015-12-24 | 2016-05-25 | 北京奇虎科技有限公司 | Application processing method and terminal |
CN106548069B (en) * | 2016-07-18 | 2020-04-24 | 北京安天网络安全技术有限公司 | Feature extraction system and method based on sorting algorithm |
CN107729753A (en) * | 2017-09-22 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of defence method and system of computer unknown virus |
CN109815702B (en) * | 2018-12-29 | 2022-07-05 | 奇安信安全技术(珠海)有限公司 | Software behavior safety detection method, device and equipment |
CN113360904A (en) * | 2021-05-17 | 2021-09-07 | 杭州美创科技有限公司 | Unknown virus detection method and system |
CN113364764B (en) * | 2021-06-02 | 2022-07-12 | ***通信集团广东有限公司 | Information security protection method and device based on big data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936910A (en) * | 2005-11-16 | 2007-03-28 | 白杰 | Method for identifying unknown virus programe and clearing method thereof |
JP2007164338A (en) * | 2005-12-12 | 2007-06-28 | Isamu Kiyu | Virus intrusion prevention system |
CN101039177A (en) * | 2007-04-27 | 2007-09-19 | 珠海金山软件股份有限公司 | Apparatus and method for on-line searching virus |
CN101308533A (en) * | 2008-06-30 | 2008-11-19 | 华为技术有限公司 | Method, apparatus and system for virus checking and killing |
CN101645125A (en) * | 2008-08-05 | 2010-02-10 | 珠海金山软件股份有限公司 | Method for filtering and monitoring behavior of program |
-
2010
- 2010-08-18 CN CN2010102569589A patent/CN101923617B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936910A (en) * | 2005-11-16 | 2007-03-28 | 白杰 | Method for identifying unknown virus programe and clearing method thereof |
JP2007164338A (en) * | 2005-12-12 | 2007-06-28 | Isamu Kiyu | Virus intrusion prevention system |
CN101039177A (en) * | 2007-04-27 | 2007-09-19 | 珠海金山软件股份有限公司 | Apparatus and method for on-line searching virus |
CN101308533A (en) * | 2008-06-30 | 2008-11-19 | 华为技术有限公司 | Method, apparatus and system for virus checking and killing |
CN101645125A (en) * | 2008-08-05 | 2010-02-10 | 珠海金山软件股份有限公司 | Method for filtering and monitoring behavior of program |
Also Published As
Publication number | Publication date |
---|---|
CN101923617A (en) | 2010-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101923617B (en) | Cloud-based sample database dynamic maintaining method | |
US9715588B2 (en) | Method of detecting a malware based on a white list | |
CN101924762B (en) | Cloud security-based active defense method | |
Rieck et al. | Automatic analysis of malware behavior using machine learning | |
US11423146B2 (en) | Provenance-based threat detection tools and stealthy malware detection | |
Bayer et al. | Scalable, behavior-based malware clustering. | |
US8667583B2 (en) | Collecting and analyzing malware data | |
US8108931B1 (en) | Method and apparatus for identifying invariants to detect software tampering | |
US7854006B1 (en) | Differential virus scan | |
CN103839003A (en) | Malicious file detection method and device | |
EP2975873A1 (en) | A computer implemented method for classifying mobile applications and computer programs thereof | |
CN102413142A (en) | Active defense method based on cloud platform | |
CN102314561A (en) | Automatic analysis method and system of malicious codes based on API (application program interface) HOOK | |
US8205261B1 (en) | Incremental virus scan | |
Huang et al. | Android malware development on public malware scanning platforms: A large-scale data-driven study | |
CN103942491A (en) | Internet malicious code disposal method | |
CN103607381A (en) | White list generation method, malicious program detection method, client and server | |
Vadrevu et al. | Maxs: Scaling malware execution with sequential multi-hypothesis testing | |
CN103475671A (en) | Method for detecting rogue programs | |
Sahoo et al. | Signature based malware detection for unstructured data in Hadoop | |
CN103646213B (en) | The sorting technique of a kind of malice software and device | |
CN103106366B (en) | A kind of sample database dynamic maintaining method based on cloud | |
Li et al. | Converting unstructured system logs into structured event list for anomaly detection | |
Bernardi et al. | Process mining meets malware evolution: a study of the behavior of malicious code | |
US20150007324A1 (en) | System and method for antivirus protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: BEIJING QIHU TECHNOLOGY CO., LTD. Free format text: FORMER OWNER: QIZHI SOFTWARE (BEIJING) CO., LTD. Effective date: 20110520 Owner name: QIZHI SOFTWARE (BEIJING) CO., LTD. |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 100016 EAST UNIT, 4/F, C + W BUILDING, NO. 14, JIUXIANQIAO ROAD, CHAOYANG DISTRICT, BEIJING TO: 100088 ROOM 112 (DESHENG PARK), TOWER D, NO. 28, XINJIEKOU OUTER STREET, XICHENG DISTRICT, BEIJING |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20110520 Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Co-applicant after: Qizhi software (Beijing) Co.,Ltd. Address before: The 4 layer 100016 unit of Beijing city Chaoyang District Jiuxianqiao Road No. 14 Building C Applicant before: Qizhi software (Beijing) Co.,Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220714 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |