Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying computer threats and storage medium

A computer and technology to be identified, applied in computer security devices, computing, instruments, etc., can solve the problems of large data delivery and reduced server performance, and achieve the effects of low system overhead, reduced business processing, and improved efficiency.

Inactive Publication Date: 2020-01-10
成都网思科平科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To this end, the embodiment of the present invention provides a method, device and storage medium for identifying computer threats, so as to solve the problem in the prior art that the performance of the server is degraded due to the large amount of data delivered by the security detection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying computer threats and storage medium
  • Method and device for identifying computer threats and storage medium
  • Method and device for identifying computer threats and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] see figure 1 , is a method for identifying computer threats provided by Embodiment 1 of the present invention, characterized in that it includes:

[0034] Performing operations on the portable executable file to be identified obtained by the filter driver program using a cryptographic hash algorithm to obtain the first hash value of the new file;

[0035] matching the first hash value wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for identifying computer threats and a storage medium, and the method comprises the steps: carrying out the operation of a new portable executable file intercepted by a filtering drive program through employing a password hash algorithm, and obtaining a first hash value of the new file; and matching the first hash value with a pre-stored second hash value corresponding to a blacklist, if matching succeeds, judging that the portable executable file corresponding to the second hash value is a threat file, and intercepting the portableexecutable file. According to the method for identifying computer threats, which is provided by the embodiment of the invention, matching judgment is performed on portable executable files intercepted by a filter driver according to a black list, a white list and a known file list respectively, and whether the files need to be intercepted or not is further judged. On the basis of overcoming traditional full-data-volume delivery analysis matching, different strategies are detected for unknown files, and the recognition efficiency is improved.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of computer security, and in particular to a method, device and storage medium for identifying computer threats. Background technique [0002] Information systems have gradually integrated into people's daily life and work on a global scale, and the field of information security has likewise become increasingly important in today's society. Such massive convergence also presents many opportunities for malicious actors to exploit these systems. If malware can infect a host computer, it can perform any number of malicious actions, such as sending spam or malicious email from the host computer, stealing sensitive information from businesses or individuals associated with the host computer, spreading and / or help with distributed denial of service attacks. Furthermore, for some types of malware, malicious operators can sell or otherwise give access to other malicious operators, thereby ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/60G06F21/62
CPCG06F21/565G06F21/602G06F21/6218G06F2221/2107
Inventor 马寻
Owner 成都网思科平科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products