A method for detecting and defending against ransomware based on access rights
A technology of access rights and software, applied in instruments, computing, electrical and digital data processing, etc., can solve problems such as poor accuracy and real-time performance, and achieve the effects of reducing system consumption, reducing scope and quantity, and simple structure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] like figure 1 As shown, the present invention provides a method for detecting and defending ransomware based on access rights, including the following steps:
[0047] S1. Set up sensitive folders in the system to be monitored, generate a list of sensitive folders, and set up defense scripts and whitelists for the system to be monitored;
[0048]S2. Configure the defense script to monitor the system API required for file traversal in real time, intercept all processes that call the file traversal system API, and set it as a process of interest, and find the software corresponding to the process of interest in the whitelist;
[0049] S3. When there is no software corresponding to the concerned process in the whitelist, configure a defense script to determine whether the folder that the concerned process calls the system API to traverse is in the list of sensitive folders;
[0050] S4. When the folder that the concerned process calls the system API to traverse is in the l...
Embodiment 2
[0052] like figure 2 As shown, the present invention provides a method for detecting and defending ransomware based on access rights, including the following steps:
[0053] S1. Set up sensitive folders in the system to be monitored, generate a list of sensitive folders, and set up defense scripts, whitelists and blacklists for the system to be monitored; sensitive folders can be set to automatically recursively include all subfolders, and subfolders can also be set Folder hierarchy scope;
[0054] S2. Configure the defense script to monitor the system API required for file traversal in real time, intercept all processes that call the file traversal system API, and set it as a process of interest, and find the software corresponding to the process of interest in the blacklist;
[0055] When there is software corresponding to the concerned process in the blacklist, block all operations of the concerned process, and return to step S2;
[0056] When the software corresponding ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com