Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious file repairing method and device, electronic equipment and storage medium

A malicious file and repair method technology, applied in the field of information security, can solve the problems of time-consuming and low efficiency of malicious file repair, and achieve the effect of improving repair efficiency

Pending Publication Date: 2021-07-16
SANGFOR TECH INC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned related technologies use a hard-coded method to traverse the identification codes of all virus families for file parsing and identification, and then determine the virus family to which the malicious file belongs. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file repairing method and device, electronic equipment and storage medium
  • Malicious file repairing method and device, electronic equipment and storage medium
  • Malicious file repairing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] see below figure 1 , figure 1 It is a flow chart of a method for repairing a malicious file provided in the embodiment of the present application.

[0039] Specific steps can include:

[0040] S101: Extract file features of malicious files;

[0041] Wherein, before this step, there may be a virus detection operation on the unknown file, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious file repairing method. The method comprises the following steps: extracting file characteristics of the malicious file, wherein the file features comprise file attributes and family public feature strings, the file attributes comprise any one or a combination of any more of file size, node number and node authority, and the family public feature strings comprise any one or a combination of any more of file offset addresses, entry point offset addresses and node offset addresses; determining a target infectious virus family corresponding to the malicious file according to the file characteristics; and executing a file repair operation corresponding to the target infectious virus family on the malicious file. The method can accurately identify the virus family corresponding to the malicious file and improve the repair efficiency of the malicious file. The invention further discloses a malicious file repairing device, electronic equipment and a storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method and device for repairing malicious files, an electronic device and a storage medium. Background technique [0002] With the development of artificial intelligence technology, using the generalization of AI (Artificial Intelligence) algorithm to identify malicious files has become one of the ways to detect malicious files. In related technologies, the malicious files detected by the AI ​​engine are directly sent to the infection-type repair module. The infection-type repair module will traverse the identification code of each family, and after identifying the specific family, it will go through the repair process of the specific family. The above-mentioned related technologies use a hard-coded method to traverse the identification codes of all virus families for file parsing and identification, and then determine the virus family to which the malici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/568G06F21/561
Inventor 位凯志官恩洋
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products