CN103428212A - Malicious code detection and defense method - Google Patents
Malicious code detection and defense method Download PDFInfo
- Publication number
- CN103428212A CN103428212A CN2013103433429A CN201310343342A CN103428212A CN 103428212 A CN103428212 A CN 103428212A CN 2013103433429 A CN2013103433429 A CN 2013103433429A CN 201310343342 A CN201310343342 A CN 201310343342A CN 103428212 A CN103428212 A CN 103428212A
- Authority
- CN
- China
- Prior art keywords
- program
- malicious code
- defence
- network
- response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103433429A CN103428212A (en) | 2013-08-08 | 2013-08-08 | Malicious code detection and defense method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103433429A CN103428212A (en) | 2013-08-08 | 2013-08-08 | Malicious code detection and defense method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103428212A true CN103428212A (en) | 2013-12-04 |
Family
ID=49652389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013103433429A Pending CN103428212A (en) | 2013-08-08 | 2013-08-08 | Malicious code detection and defense method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103428212A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096414A (en) * | 2016-06-24 | 2016-11-09 | 北京奇虎科技有限公司 | Application recovery method, device and terminal |
CN107004085A (en) * | 2014-12-27 | 2017-08-01 | 英特尔公司 | For managing the technology to the security threat of computing system using user mutual |
CN107211011A (en) * | 2014-11-25 | 2017-09-26 | 恩西洛有限公司 | System and method for Malicious Code Detection |
CN107612905A (en) * | 2017-09-15 | 2018-01-19 | 广西电网有限责任公司电力科学研究院 | The malicious code monitoring method of equipment oriented monitoring distributed system main website |
CN108985051A (en) * | 2018-08-02 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of intrusion prevention method and system of Behavior-based control tracking |
CN110795730A (en) * | 2018-10-23 | 2020-02-14 | 北京安天网络安全技术有限公司 | Method, system and storage medium for thoroughly eliminating malicious files |
CN110879884A (en) * | 2019-11-14 | 2020-03-13 | 维沃移动通信有限公司 | Information processing method, information processing device, electronic equipment and storage medium |
CN114553539A (en) * | 2022-02-22 | 2022-05-27 | 深信服科技股份有限公司 | Method and device for defending malicious program and related equipment |
CN114676421A (en) * | 2022-03-18 | 2022-06-28 | 山东鼎夏智能科技有限公司 | Method and device for protecting security software |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1314638A (en) * | 2001-04-29 | 2001-09-26 | 北京瑞星科技股份有限公司 | Method, system and medium for detecting and clearing known and anknown computer virus |
CN1710906A (en) * | 2005-07-08 | 2005-12-21 | 清华大学 | P2P worm defending system |
CN1725759A (en) * | 2004-07-21 | 2006-01-25 | 微软公司 | Containment of worms |
CN1737722A (en) * | 2005-08-03 | 2006-02-22 | 珠海金山软件股份有限公司 | System and method for detecting and defending computer worm |
CN1885224A (en) * | 2005-06-23 | 2006-12-27 | 福建东方微点信息安全有限责任公司 | Computer anti-virus protection system and method |
CN101154253A (en) * | 2006-09-26 | 2008-04-02 | 北京软通科技有限责任公司 | Computer security protection method and computer security protection instrument |
CN101162485A (en) * | 2006-10-11 | 2008-04-16 | 飞塔信息科技(北京)有限公司 | Method and system for processing computer malicious code |
CN101281571A (en) * | 2008-04-22 | 2008-10-08 | 白杰 | Method for defending unknown virus program |
CN101699787A (en) * | 2009-11-09 | 2010-04-28 | 南京邮电大学 | Worm detection method used for peer-to-peer network |
CN102034050A (en) * | 2011-01-25 | 2011-04-27 | 四川大学 | Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception |
CN103023983A (en) * | 2011-11-24 | 2013-04-03 | 卡巴斯基实验室封闭式股份公司 | System and method for distributing processing of computer security tasks |
-
2013
- 2013-08-08 CN CN2013103433429A patent/CN103428212A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1314638A (en) * | 2001-04-29 | 2001-09-26 | 北京瑞星科技股份有限公司 | Method, system and medium for detecting and clearing known and anknown computer virus |
CN1725759A (en) * | 2004-07-21 | 2006-01-25 | 微软公司 | Containment of worms |
CN1885224A (en) * | 2005-06-23 | 2006-12-27 | 福建东方微点信息安全有限责任公司 | Computer anti-virus protection system and method |
CN1710906A (en) * | 2005-07-08 | 2005-12-21 | 清华大学 | P2P worm defending system |
CN1737722A (en) * | 2005-08-03 | 2006-02-22 | 珠海金山软件股份有限公司 | System and method for detecting and defending computer worm |
CN101154253A (en) * | 2006-09-26 | 2008-04-02 | 北京软通科技有限责任公司 | Computer security protection method and computer security protection instrument |
CN101162485A (en) * | 2006-10-11 | 2008-04-16 | 飞塔信息科技(北京)有限公司 | Method and system for processing computer malicious code |
CN101281571A (en) * | 2008-04-22 | 2008-10-08 | 白杰 | Method for defending unknown virus program |
CN101699787A (en) * | 2009-11-09 | 2010-04-28 | 南京邮电大学 | Worm detection method used for peer-to-peer network |
CN102034050A (en) * | 2011-01-25 | 2011-04-27 | 四川大学 | Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception |
CN103023983A (en) * | 2011-11-24 | 2013-04-03 | 卡巴斯基实验室封闭式股份公司 | System and method for distributing processing of computer security tasks |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107211011A (en) * | 2014-11-25 | 2017-09-26 | 恩西洛有限公司 | System and method for Malicious Code Detection |
CN107004085A (en) * | 2014-12-27 | 2017-08-01 | 英特尔公司 | For managing the technology to the security threat of computing system using user mutual |
CN107004085B (en) * | 2014-12-27 | 2021-06-25 | 英特尔公司 | Techniques for managing security threats to a computing system with user interaction |
CN106096414A (en) * | 2016-06-24 | 2016-11-09 | 北京奇虎科技有限公司 | Application recovery method, device and terminal |
CN106096414B (en) * | 2016-06-24 | 2019-12-31 | 北京奇虎科技有限公司 | Application program recovery method and device and terminal |
CN107612905A (en) * | 2017-09-15 | 2018-01-19 | 广西电网有限责任公司电力科学研究院 | The malicious code monitoring method of equipment oriented monitoring distributed system main website |
CN108985051A (en) * | 2018-08-02 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of intrusion prevention method and system of Behavior-based control tracking |
CN110795730A (en) * | 2018-10-23 | 2020-02-14 | 北京安天网络安全技术有限公司 | Method, system and storage medium for thoroughly eliminating malicious files |
CN110879884A (en) * | 2019-11-14 | 2020-03-13 | 维沃移动通信有限公司 | Information processing method, information processing device, electronic equipment and storage medium |
CN114553539A (en) * | 2022-02-22 | 2022-05-27 | 深信服科技股份有限公司 | Method and device for defending malicious program and related equipment |
CN114676421A (en) * | 2022-03-18 | 2022-06-28 | 山东鼎夏智能科技有限公司 | Method and device for protecting security software |
CN114676421B (en) * | 2022-03-18 | 2022-12-27 | 山东鼎夏智能科技有限公司 | Method and device for protecting security software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103428212A (en) | Malicious code detection and defense method | |
US11687653B2 (en) | Methods and apparatus for identifying and removing malicious applications | |
US11086983B2 (en) | System and method for authenticating safe software | |
US10652274B2 (en) | Identifying and responding to security incidents based on preemptive forensics | |
US9280664B2 (en) | Apparatus and method for blocking activity of malware | |
US8850517B2 (en) | Runtime risk detection based on user, application, and system action sequence correlation | |
JP5011436B2 (en) | Method and apparatus for detecting malicious acts of a computer program | |
US8453244B2 (en) | Server, user device and malware detection method thereof | |
CN103294950B (en) | A kind of high-power secret information stealing malicious code detecting method based on backward tracing and system | |
CN109586282B (en) | Power grid unknown threat detection system and method | |
EP3220307B1 (en) | System and method of performing an antivirus scan of a file on a virtual machine | |
CN106133743A (en) | For optimizing the system and method for the scanning of pre-installation application program | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
US10839074B2 (en) | System and method of adapting patterns of dangerous behavior of programs to the computer systems of users | |
CN110417718B (en) | Method, device, equipment and storage medium for processing risk data in website | |
US10061683B2 (en) | Systems and methods for collecting error data to troubleshoot product errors | |
TW201104489A (en) | Method and system for cleaning malicious software and computer program product and storage medium | |
CN110505246B (en) | Client network communication detection method, device and storage medium | |
KR20090031393A (en) | Web shell monitoring system and method based on pattern detection | |
US11003772B2 (en) | System and method for adapting patterns of malicious program behavior from groups of computer systems | |
CN101996287B (en) | Method and system for removing malicious software | |
CN103699838A (en) | Identification method and equipment of viruses | |
KR102221726B1 (en) | Endpoint detection and response terminal device and method | |
Kono et al. | An unknown malware detection using execution registry access | |
RU2468427C1 (en) | System and method to protect computer system against activity of harmful objects |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Xiaosong Inventor after: Chen Ruidong Inventor after: Niu Weina Inventor after: Wang Dong Inventor after: Chen Ting Inventor after: Liao Jun Inventor after: Zhang Fan Inventor after: Zhang Lei Inventor before: Chen Ting Inventor before: Zhang Xiaosong Inventor before: Chen Ruidong Inventor before: Niu Weina Inventor before: Wang Dong Inventor before: Liao Jun Inventor before: Zhang Fan Inventor before: Zhang Lei |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: QU YANG WU LEYAO LIU YANCONG SHI YONGJUN SHEN LONGZE QU YANG ZHANG JUNBO ZHANG XUEWEN TO: WU LEYAO LIU YANCONG SHI YONGJUN SHEN LONGZE QU YANG QU YANG ZHANG JUNBO ZHANG XUEWEN |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131204 |