Method and device for detecting data by adopting sandbox cluster
A cluster detection and sandbox technology, applied in the field of network security, can solve the problems of undiscovered solutions, network attack defense lag, etc., achieve the effect of solving low efficiency and improving the ability of analysis, tracking and positioning
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] The method embodiment provided in Embodiment 1 of the present application may be executed in a server or a similar computing device. Take running on the server as an example, figure 1 It is a block diagram of the hardware structure of a server that uses a sandbox cluster to detect data according to an embodiment of the present invention. Such as figure 1 As shown, the server 10 may include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned server can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above server. For example, server 10 may also include fig...
Embodiment 2
[0065] This embodiment also provides a device for detecting data using a sandbox cluster, which may be a server, and the device is used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0066] Figure 5 is a structural block diagram of a device for detecting data using a sandbox cluster according to an embodiment of the present invention, which can be applied in a server, such as Figure 5 As shown, the device includes: a collection module 50, a delivery module 52, and a processing module 54, wherein,
[0067] A collection module 50, configured to collect sample dat...
Embodiment 3
[0076] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0077] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0078] S1, collecting sample data, wherein the sample data includes email samples and malicious files;
[0079] S2. Post the sample data to a sandbox cluster, where the sandbox cluster includes a static sandbox and a dynamic sandbox;
[0080] S3, using the sandbox cluster to detect the sample data, and storing the detection result and the sample data in an intelligence database for advanced persistent threat (APT) attacks after associating.
[0081] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, RO...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com